<?xml version="1.0" encoding="UTF-8"?>
<?xml-stylesheet href="/stylesheet.xsl" type="text/xsl"?>
<rss version="2.0" xmlns:dc="http://purl.org/dc/elements/1.1/" xmlns:atom="http://www.w3.org/2005/Atom" xmlns:sy="http://purl.org/rss/1.0/modules/syndication/" xmlns:content="http://purl.org/rss/1.0/modules/content/" xmlns:itunes="http://www.itunes.com/dtds/podcast-1.0.dtd" xmlns:podcast="https://podcastindex.org/namespace/1.0">
  <channel>
    <atom:link rel="self" type="application/rss+xml" href="https://feeds.transistor.fm/talkin-bout-infosec-news" title="MP3 Audio"/>
    <atom:link rel="hub" href="https://pubsubhubbub.appspot.com/"/>
    <podcast:podping usesPodping="true"/>
    <title>Talkin' Bout [Infosec] News</title>
    <generator>Transistor (https://transistor.fm)</generator>
    <itunes:new-feed-url>https://feeds.transistor.fm/talkin-bout-infosec-news</itunes:new-feed-url>
    <description>A weekly Podcast with BHIS and Friends. We discuss notable Infosec, and infosec-adjacent news stories gathered by our community news team.
Join us live on YouTube, Monday's at 4:30PM ET</description>
    <copyright>Copyright 2025 Talkin' About [Infosec] News, Powered by Black Hills Information Security</copyright>
    <podcast:guid>7009cf9d-3ce4-5dc6-8ada-5fc1dabb887b</podcast:guid>
    <podcast:podroll>
      <podcast:remoteItem feedGuid="d7087d50-12f3-5e72-af9d-040f7921f47d" feedUrl="https://feeds.transistor.fm/bhis-webcasts"/>
      <podcast:remoteItem feedGuid="0543e6d6-b875-52ac-bb17-d2b531254cfe" feedUrl="https://feeds.transistor.fm/ai-security-ops"/>
      <podcast:remoteItem feedGuid="9529eb99-9012-5948-9d65-646598a6eb92" feedUrl="https://feeds.transistor.fm/antisyphon-training-anticasts"/>
    </podcast:podroll>
    <podcast:locked>yes</podcast:locked>
    <language>en-us</language>
    <pubDate>Wed, 22 Apr 2026 15:18:33 -0400</pubDate>
    <lastBuildDate>Fri, 24 Apr 2026 01:06:06 -0400</lastBuildDate>
    <link>https://bhisnews.transistor.fm</link>
    <image>
      <url>https://img.transistorcdn.com/AukI425sRBc3M3UIa9lVng7qjeNeYEQ8BZfzCEXhALs/rs:fill:0:0:1/w:1400/h:1400/q:60/mb:500000/aHR0cHM6Ly9pbWct/dXBsb2FkLXByb2R1/Y3Rpb24udHJhbnNp/c3Rvci5mbS8xZTA1/ZWZhNDcxZGM4ZTFj/ZGJhMTMwNmYzMmJj/ZjBkNi5wbmc.jpg</url>
      <title>Talkin' Bout [Infosec] News</title>
      <link>https://bhisnews.transistor.fm</link>
    </image>
    <itunes:category text="News">
      <itunes:category text="Tech News"/>
    </itunes:category>
    <itunes:category text="Technology"/>
    <itunes:type>episodic</itunes:type>
    <itunes:author>Black Hills Information Security</itunes:author>
    <itunes:image href="https://img.transistorcdn.com/AukI425sRBc3M3UIa9lVng7qjeNeYEQ8BZfzCEXhALs/rs:fill:0:0:1/w:1400/h:1400/q:60/mb:500000/aHR0cHM6Ly9pbWct/dXBsb2FkLXByb2R1/Y3Rpb24udHJhbnNp/c3Rvci5mbS8xZTA1/ZWZhNDcxZGM4ZTFj/ZGJhMTMwNmYzMmJj/ZjBkNi5wbmc.jpg"/>
    <itunes:summary>A weekly Podcast with BHIS and Friends. We discuss notable Infosec, and infosec-adjacent news stories gathered by our community news team.
Join us live on YouTube, Monday's at 4:30PM ET</itunes:summary>
    <itunes:subtitle>A weekly Podcast with BHIS and Friends.</itunes:subtitle>
    <itunes:keywords>Infosec,Cybersecurity,news</itunes:keywords>
    <itunes:owner>
      <itunes:name>Black Hills Information Security</itunes:name>
      <itunes:email>marketing@blackhillsinfosec.com</itunes:email>
    </itunes:owner>
    <itunes:complete>No</itunes:complete>
    <itunes:explicit>Yes</itunes:explicit>
    <item>
      <title>Tim Cook Announces Apple CEO Exit - 2026-04-20</title>
      <itunes:season>6</itunes:season>
      <podcast:season>6</podcast:season>
      <itunes:episode>16</itunes:episode>
      <podcast:episode>16</podcast:episode>
      <itunes:title>Tim Cook Announces Apple CEO Exit - 2026-04-20</itunes:title>
      <itunes:episodeType>full</itunes:episodeType>
      <guid isPermaLink="false">9770efab-bf2a-4378-9957-2c807cb45904</guid>
      <link>https://share.transistor.fm/s/ba6afeab</link>
      <description>
        <![CDATA[<p>This episode covers several major cybersecurity and tech news stories, including a supply chain–related breach at Vercel involving exposed environment variables and compromised third-party AI tooling. The hosts also discuss concerns around AI-driven data risks, including browser extensions and large-scale data collection. Additional topics include a service scraping and republishing Zoom webinar recordings, evolving issues with web cookies and tracking, and industry news such as reports of Apple CEO Tim Cook stepping down.</p><p>Join us LIVE on Mondays, 4:30pm EST.<br>A weekly Podcast with BHIS and Friends. We discuss notable Infosec, and infosec-adjacent news stories gathered by our community news team.<br><a href="https://www.youtube.com/@BlackHillsInformationSecurity">https://www.youtube.com/@BlackHillsInformationSecurity</a></p><p>Chat with us on Discord! - <br><a href="https://discord.gg/bhis">https://discord.gg/bhis</a><br>🔴live-chat</p><p><br><strong>Chapters</strong><br></p><ul><li>(00:00) - PreShow Banter™ — Watch Out for the Brownies</li>
<li>(04:35) - Tim Cook Announces Apple CEO Exit - 2026-04-20</li>
<li>(05:57) - Story # 1: Vercel April 2026 security incident</li>
<li>(19:00) - Story # 2: 'Addicted to hacking': Young hacker behind historic breach speaks out for 1st time, before reporting to prison</li>
<li>(27:19) - Story # 3: Mythos And The CVSS Problem No One Wants to Talk About (But We Need To)</li>
<li>(28:49) - Story # 4: Introducing Claude Opus 4.7</li>
<li>(32:14) - Story # 4b: Identity verification on Claude</li>
<li>(36:00) - Story # 5: Tim Cook to become Apple Executive Chairman John Ternus to become Apple CEO</li>
<li>(40:18) - Story # 6: Microsoft faces fresh Windows Recall security concerns</li>
<li>(44:12) - Story # 7: WebinarTV Secretly Scraped Zoom Meetings of Anonymous Recovery Programs</li>
<li>(48:20) - Story # 8: Google, Microsoft, Meta All Tracking You Even When You Opt Out, According to an Independent Audit</li>
<li>(51:12) - Story # 9: Little Caesars Wants ChatGPT to Order Your Pizza for You</li>
<li>(53:35) - Story # 10: NIST Updates NVD Operations to Address Record CVE Growth</li>
<li>(01:00:08) - Workshop: Rapid Endpoint Investigations for Linux and Mac</li>
<li>(01:01:20) - Cyber Threat Intelligence 101 2 Day Version</li>
<li>(01:02:24) - ANTI-CAST: How to Break Free from the Cybersecurity Burnout Trap w/ Natalia Samman</li>
</ul><br><strong>Links</strong><p>Story # 1: <a href="https://vercel.com/kb/bulletin/vercel-april-2026-security-incident">Vercel April 2026 security incident</a><br>Story # 2: ‘<a href="https://abcnews.com/US/addicted-hacking-young-hacker-historic-breach-speaks-1st/story?id=131855776">Addicted to hacking’: Young hacker behind historic breach speaks out for 1st time, before reporting to prison</a><br>Story # 3: <a href="https://www.linkedin.com/pulse/mythos-cvss-problem-one-wants-talk-we-need-john-strand-k3jyc/">Mythos And The CVSS Problem No One Wants to Talk About (But We Need To)</a><br>Story # 4: <a href="https://www.anthropic.com/news/claude-opus-4-7">Introducing Claude Opus 4.7</a><br>Story # 4b: <a href="https://support.claude.com/en/articles/14328960-identity-verification-on-claude">Identity verification on Claude</a><br>Story # 5: <a href="https://www.apple.com/newsroom/2026/04/tim-cook-to-become-apple-executive-chairman-john-ternus-to-become-apple-ceo/">Tim Cook to become Apple Executive Chairman John Ternus to become Apple CEO</a><br>Story # 6: <a href="https://www.theverge.com/report/912101/microsoft-windows-recall-new-security-concerns-response">Microsoft faces fresh Windows Recall security concerns</a><br>Story # 7: <a href="https://www.404media.co/webinartv-secretly-scraped-zoom-meetings-of-anonymous-recovery-programs/">WebinarTV Secretly Scraped Zoom Meetings of Anonymous Recovery Programs</a><br>Story # 8: <a href="https://www.404media.co/google-microsoft-meta-all-tracking-you-even-when-you-opt-out-according-to-an-independent-audit/">Google, Microsoft, Meta All Tracking You Even When You Opt Out, According to an Independent Audit</a><br>Story # 9: <a href="https://www.cnet.com/tech/services-and-software/little-caesars-chatgpt-app/">Little Caesars Wants ChatGPT to Order Your Pizza for You</a><br>Story # 10: <a href="https://www.nist.gov/news-events/news/2026/04/nist-updates-nvd-operations-address-record-cve-growth">NIST Updates NVD Operations to Address Record CVE Growth</a><br><a href="https://www.antisyphontraining.com/product/workshop-rapid-endpoint-investigations-for-linux-and-mac/">Workshop: Rapid Endpoint Investigations for Linux and Mac</a><br><a href="https://www.antisyphontraining.com/product/cyber-threat-intelligence-101-2-day-version-with-wade-wells/">Cyber Threat Intelligence 101 2 Day Version</a><br><a href="https://youtube.com/live/dYWJJy4J2Ak">ANTI-CAST: How to Break Free from the Cybersecurity Burnout Trap w/ Natalia Samman</a></p><p><br><strong><strong>Creators &amp; Guests</strong>
<ul>
  <li><a href="https://bhisnews.transistor.fm/people/corey-ham">Corey Ham</a> - Host</li>
  <li><a href="https://bhisnews.transistor.fm/people/ralph-may">Ralph May</a> - Host</li>
  <li><a href="https://bhisnews.transistor.fm/people/patterson-cake">Patterson Cake</a> - Guest</li>
  <li><a href="https://bhisnews.transistor.fm/people/wade-wells">Wade Wells</a> - Host</li>
  <li><a href="https://bhisnews.transistor.fm/people/bronwen-aker">Bronwen Aker</a> - Host</li>
  <li><a href="https://bhisnews.transistor.fm/people/meagan-bentley">Meagan Bentley</a> - Producer</li>
</ul><br><a href="https://www.youtube.com/watch?v=AzmyHLoka0o" title="Click here to watch  this episode on YouTube.">Click here to watch  this episode on YouTube.</a><br>
</strong></p><p><strong><a href="https://share.transistor.fm/s/ba6afeab/transcript" title="Click here to view the episode transcript.">Click here to view the episode transcript.</a><br>
</strong></p><p><strong>🔗 Register for FREE Infosec Webcasts, Anti-casts &amp; Summits </strong></p><p><a href="https://poweredbybhis.com/">https://poweredbybhis.com</a></p><p><br>Brought to you by:</p><p><strong>Black Hills Information Security </strong></p><p><a href="https://www.blackhillsinfosec.com/">https://www.blackhillsinfosec.com</a></p><p><br></p><p><strong>Antisyphon Training</strong></p><p><a href="https://www.antisyphontraining.com/">https://www.antisyphontraining.com/</a></p><p><br></p><p><strong>Active Countermeasures</strong></p><p><a href="https://www.activecountermeasures.com/">https://www.activecountermeasures.com</a></p><p><br></p><p><strong>Wild West Hackin Fest</strong></p><p><a href="https://wildwesthackinfest.com/">https://wildwesthackinfest.com</a></p>]]>
      </description>
      <content:encoded>
        <![CDATA[<p>This episode covers several major cybersecurity and tech news stories, including a supply chain–related breach at Vercel involving exposed environment variables and compromised third-party AI tooling. The hosts also discuss concerns around AI-driven data risks, including browser extensions and large-scale data collection. Additional topics include a service scraping and republishing Zoom webinar recordings, evolving issues with web cookies and tracking, and industry news such as reports of Apple CEO Tim Cook stepping down.</p><p>Join us LIVE on Mondays, 4:30pm EST.<br>A weekly Podcast with BHIS and Friends. We discuss notable Infosec, and infosec-adjacent news stories gathered by our community news team.<br><a href="https://www.youtube.com/@BlackHillsInformationSecurity">https://www.youtube.com/@BlackHillsInformationSecurity</a></p><p>Chat with us on Discord! - <br><a href="https://discord.gg/bhis">https://discord.gg/bhis</a><br>🔴live-chat</p><p><br><strong>Chapters</strong><br></p><ul><li>(00:00) - PreShow Banter™ — Watch Out for the Brownies</li>
<li>(04:35) - Tim Cook Announces Apple CEO Exit - 2026-04-20</li>
<li>(05:57) - Story # 1: Vercel April 2026 security incident</li>
<li>(19:00) - Story # 2: 'Addicted to hacking': Young hacker behind historic breach speaks out for 1st time, before reporting to prison</li>
<li>(27:19) - Story # 3: Mythos And The CVSS Problem No One Wants to Talk About (But We Need To)</li>
<li>(28:49) - Story # 4: Introducing Claude Opus 4.7</li>
<li>(32:14) - Story # 4b: Identity verification on Claude</li>
<li>(36:00) - Story # 5: Tim Cook to become Apple Executive Chairman John Ternus to become Apple CEO</li>
<li>(40:18) - Story # 6: Microsoft faces fresh Windows Recall security concerns</li>
<li>(44:12) - Story # 7: WebinarTV Secretly Scraped Zoom Meetings of Anonymous Recovery Programs</li>
<li>(48:20) - Story # 8: Google, Microsoft, Meta All Tracking You Even When You Opt Out, According to an Independent Audit</li>
<li>(51:12) - Story # 9: Little Caesars Wants ChatGPT to Order Your Pizza for You</li>
<li>(53:35) - Story # 10: NIST Updates NVD Operations to Address Record CVE Growth</li>
<li>(01:00:08) - Workshop: Rapid Endpoint Investigations for Linux and Mac</li>
<li>(01:01:20) - Cyber Threat Intelligence 101 2 Day Version</li>
<li>(01:02:24) - ANTI-CAST: How to Break Free from the Cybersecurity Burnout Trap w/ Natalia Samman</li>
</ul><br><strong>Links</strong><p>Story # 1: <a href="https://vercel.com/kb/bulletin/vercel-april-2026-security-incident">Vercel April 2026 security incident</a><br>Story # 2: ‘<a href="https://abcnews.com/US/addicted-hacking-young-hacker-historic-breach-speaks-1st/story?id=131855776">Addicted to hacking’: Young hacker behind historic breach speaks out for 1st time, before reporting to prison</a><br>Story # 3: <a href="https://www.linkedin.com/pulse/mythos-cvss-problem-one-wants-talk-we-need-john-strand-k3jyc/">Mythos And The CVSS Problem No One Wants to Talk About (But We Need To)</a><br>Story # 4: <a href="https://www.anthropic.com/news/claude-opus-4-7">Introducing Claude Opus 4.7</a><br>Story # 4b: <a href="https://support.claude.com/en/articles/14328960-identity-verification-on-claude">Identity verification on Claude</a><br>Story # 5: <a href="https://www.apple.com/newsroom/2026/04/tim-cook-to-become-apple-executive-chairman-john-ternus-to-become-apple-ceo/">Tim Cook to become Apple Executive Chairman John Ternus to become Apple CEO</a><br>Story # 6: <a href="https://www.theverge.com/report/912101/microsoft-windows-recall-new-security-concerns-response">Microsoft faces fresh Windows Recall security concerns</a><br>Story # 7: <a href="https://www.404media.co/webinartv-secretly-scraped-zoom-meetings-of-anonymous-recovery-programs/">WebinarTV Secretly Scraped Zoom Meetings of Anonymous Recovery Programs</a><br>Story # 8: <a href="https://www.404media.co/google-microsoft-meta-all-tracking-you-even-when-you-opt-out-according-to-an-independent-audit/">Google, Microsoft, Meta All Tracking You Even When You Opt Out, According to an Independent Audit</a><br>Story # 9: <a href="https://www.cnet.com/tech/services-and-software/little-caesars-chatgpt-app/">Little Caesars Wants ChatGPT to Order Your Pizza for You</a><br>Story # 10: <a href="https://www.nist.gov/news-events/news/2026/04/nist-updates-nvd-operations-address-record-cve-growth">NIST Updates NVD Operations to Address Record CVE Growth</a><br><a href="https://www.antisyphontraining.com/product/workshop-rapid-endpoint-investigations-for-linux-and-mac/">Workshop: Rapid Endpoint Investigations for Linux and Mac</a><br><a href="https://www.antisyphontraining.com/product/cyber-threat-intelligence-101-2-day-version-with-wade-wells/">Cyber Threat Intelligence 101 2 Day Version</a><br><a href="https://youtube.com/live/dYWJJy4J2Ak">ANTI-CAST: How to Break Free from the Cybersecurity Burnout Trap w/ Natalia Samman</a></p><p><br><strong><strong>Creators &amp; Guests</strong>
<ul>
  <li><a href="https://bhisnews.transistor.fm/people/corey-ham">Corey Ham</a> - Host</li>
  <li><a href="https://bhisnews.transistor.fm/people/ralph-may">Ralph May</a> - Host</li>
  <li><a href="https://bhisnews.transistor.fm/people/patterson-cake">Patterson Cake</a> - Guest</li>
  <li><a href="https://bhisnews.transistor.fm/people/wade-wells">Wade Wells</a> - Host</li>
  <li><a href="https://bhisnews.transistor.fm/people/bronwen-aker">Bronwen Aker</a> - Host</li>
  <li><a href="https://bhisnews.transistor.fm/people/meagan-bentley">Meagan Bentley</a> - Producer</li>
</ul><br><a href="https://www.youtube.com/watch?v=AzmyHLoka0o" title="Click here to watch  this episode on YouTube.">Click here to watch  this episode on YouTube.</a><br>
</strong></p><p><strong><a href="https://share.transistor.fm/s/ba6afeab/transcript" title="Click here to view the episode transcript.">Click here to view the episode transcript.</a><br>
</strong></p><p><strong>🔗 Register for FREE Infosec Webcasts, Anti-casts &amp; Summits </strong></p><p><a href="https://poweredbybhis.com/">https://poweredbybhis.com</a></p><p><br>Brought to you by:</p><p><strong>Black Hills Information Security </strong></p><p><a href="https://www.blackhillsinfosec.com/">https://www.blackhillsinfosec.com</a></p><p><br></p><p><strong>Antisyphon Training</strong></p><p><a href="https://www.antisyphontraining.com/">https://www.antisyphontraining.com/</a></p><p><br></p><p><strong>Active Countermeasures</strong></p><p><a href="https://www.activecountermeasures.com/">https://www.activecountermeasures.com</a></p><p><br></p><p><strong>Wild West Hackin Fest</strong></p><p><a href="https://wildwesthackinfest.com/">https://wildwesthackinfest.com</a></p>]]>
      </content:encoded>
      <pubDate>Wed, 22 Apr 2026 15:18:33 -0400</pubDate>
      <author>Black Hills Information Security</author>
      <enclosure url="https://media.transistor.fm/ba6afeab/bc6993a1.mp3" length="65140603" type="audio/mpeg"/>
      <itunes:author>Black Hills Information Security</itunes:author>
      <itunes:image href="https://img.transistorcdn.com/odxCPFz1QqUZ7cPQhGYYtTr0Gi6xMXXonLnN0Fe17Bg/rs:fill:0:0:1/w:1400/h:1400/q:60/mb:500000/aHR0cHM6Ly9pbWct/dXBsb2FkLXByb2R1/Y3Rpb24udHJhbnNp/c3Rvci5mbS8xYjE2/ZDMyNWRmYTcyZDc3/MzIyYzk5NzNhZWVm/YTRlMS5qcGc.jpg"/>
      <itunes:duration>3893</itunes:duration>
      <itunes:summary>
        <![CDATA[<p>This episode covers several major cybersecurity and tech news stories, including a supply chain–related breach at Vercel involving exposed environment variables and compromised third-party AI tooling. The hosts also discuss concerns around AI-driven data risks, including browser extensions and large-scale data collection. Additional topics include a service scraping and republishing Zoom webinar recordings, evolving issues with web cookies and tracking, and industry news such as reports of Apple CEO Tim Cook stepping down.</p><p>Join us LIVE on Mondays, 4:30pm EST.<br>A weekly Podcast with BHIS and Friends. We discuss notable Infosec, and infosec-adjacent news stories gathered by our community news team.<br><a href="https://www.youtube.com/@BlackHillsInformationSecurity">https://www.youtube.com/@BlackHillsInformationSecurity</a></p><p>Chat with us on Discord! - <br><a href="https://discord.gg/bhis">https://discord.gg/bhis</a><br>🔴live-chat</p><p><br><strong>Chapters</strong><br></p><ul><li>(00:00) - PreShow Banter™ — Watch Out for the Brownies</li>
<li>(04:35) - Tim Cook Announces Apple CEO Exit - 2026-04-20</li>
<li>(05:57) - Story # 1: Vercel April 2026 security incident</li>
<li>(19:00) - Story # 2: 'Addicted to hacking': Young hacker behind historic breach speaks out for 1st time, before reporting to prison</li>
<li>(27:19) - Story # 3: Mythos And The CVSS Problem No One Wants to Talk About (But We Need To)</li>
<li>(28:49) - Story # 4: Introducing Claude Opus 4.7</li>
<li>(32:14) - Story # 4b: Identity verification on Claude</li>
<li>(36:00) - Story # 5: Tim Cook to become Apple Executive Chairman John Ternus to become Apple CEO</li>
<li>(40:18) - Story # 6: Microsoft faces fresh Windows Recall security concerns</li>
<li>(44:12) - Story # 7: WebinarTV Secretly Scraped Zoom Meetings of Anonymous Recovery Programs</li>
<li>(48:20) - Story # 8: Google, Microsoft, Meta All Tracking You Even When You Opt Out, According to an Independent Audit</li>
<li>(51:12) - Story # 9: Little Caesars Wants ChatGPT to Order Your Pizza for You</li>
<li>(53:35) - Story # 10: NIST Updates NVD Operations to Address Record CVE Growth</li>
<li>(01:00:08) - Workshop: Rapid Endpoint Investigations for Linux and Mac</li>
<li>(01:01:20) - Cyber Threat Intelligence 101 2 Day Version</li>
<li>(01:02:24) - ANTI-CAST: How to Break Free from the Cybersecurity Burnout Trap w/ Natalia Samman</li>
</ul><br><strong>Links</strong><p>Story # 1: <a href="https://vercel.com/kb/bulletin/vercel-april-2026-security-incident">Vercel April 2026 security incident</a><br>Story # 2: ‘<a href="https://abcnews.com/US/addicted-hacking-young-hacker-historic-breach-speaks-1st/story?id=131855776">Addicted to hacking’: Young hacker behind historic breach speaks out for 1st time, before reporting to prison</a><br>Story # 3: <a href="https://www.linkedin.com/pulse/mythos-cvss-problem-one-wants-talk-we-need-john-strand-k3jyc/">Mythos And The CVSS Problem No One Wants to Talk About (But We Need To)</a><br>Story # 4: <a href="https://www.anthropic.com/news/claude-opus-4-7">Introducing Claude Opus 4.7</a><br>Story # 4b: <a href="https://support.claude.com/en/articles/14328960-identity-verification-on-claude">Identity verification on Claude</a><br>Story # 5: <a href="https://www.apple.com/newsroom/2026/04/tim-cook-to-become-apple-executive-chairman-john-ternus-to-become-apple-ceo/">Tim Cook to become Apple Executive Chairman John Ternus to become Apple CEO</a><br>Story # 6: <a href="https://www.theverge.com/report/912101/microsoft-windows-recall-new-security-concerns-response">Microsoft faces fresh Windows Recall security concerns</a><br>Story # 7: <a href="https://www.404media.co/webinartv-secretly-scraped-zoom-meetings-of-anonymous-recovery-programs/">WebinarTV Secretly Scraped Zoom Meetings of Anonymous Recovery Programs</a><br>Story # 8: <a href="https://www.404media.co/google-microsoft-meta-all-tracking-you-even-when-you-opt-out-according-to-an-independent-audit/">Google, Microsoft, Meta All Tracking You Even When You Opt Out, According to an Independent Audit</a><br>Story # 9: <a href="https://www.cnet.com/tech/services-and-software/little-caesars-chatgpt-app/">Little Caesars Wants ChatGPT to Order Your Pizza for You</a><br>Story # 10: <a href="https://www.nist.gov/news-events/news/2026/04/nist-updates-nvd-operations-address-record-cve-growth">NIST Updates NVD Operations to Address Record CVE Growth</a><br><a href="https://www.antisyphontraining.com/product/workshop-rapid-endpoint-investigations-for-linux-and-mac/">Workshop: Rapid Endpoint Investigations for Linux and Mac</a><br><a href="https://www.antisyphontraining.com/product/cyber-threat-intelligence-101-2-day-version-with-wade-wells/">Cyber Threat Intelligence 101 2 Day Version</a><br><a href="https://youtube.com/live/dYWJJy4J2Ak">ANTI-CAST: How to Break Free from the Cybersecurity Burnout Trap w/ Natalia Samman</a></p><p><br><strong><strong>Creators &amp; Guests</strong>
<ul>
  <li><a href="https://bhisnews.transistor.fm/people/corey-ham">Corey Ham</a> - Host</li>
  <li><a href="https://bhisnews.transistor.fm/people/ralph-may">Ralph May</a> - Host</li>
  <li><a href="https://bhisnews.transistor.fm/people/patterson-cake">Patterson Cake</a> - Guest</li>
  <li><a href="https://bhisnews.transistor.fm/people/wade-wells">Wade Wells</a> - Host</li>
  <li><a href="https://bhisnews.transistor.fm/people/bronwen-aker">Bronwen Aker</a> - Host</li>
  <li><a href="https://bhisnews.transistor.fm/people/meagan-bentley">Meagan Bentley</a> - Producer</li>
</ul><br><a href="https://www.youtube.com/watch?v=AzmyHLoka0o" title="Click here to watch  this episode on YouTube.">Click here to watch  this episode on YouTube.</a><br>
</strong></p><p><strong><a href="https://share.transistor.fm/s/ba6afeab/transcript" title="Click here to view the episode transcript.">Click here to view the episode transcript.</a><br>
</strong></p><p><strong>🔗 Register for FREE Infosec Webcasts, Anti-casts &amp; Summits </strong></p><p><a href="https://poweredbybhis.com/">https://poweredbybhis.com</a></p><p><br>Brought to you by:</p><p><strong>Black Hills Information Security </strong></p><p><a href="https://www.blackhillsinfosec.com/">https://www.blackhillsinfosec.com</a></p><p><br></p><p><strong>Antisyphon Training</strong></p><p><a href="https://www.antisyphontraining.com/">https://www.antisyphontraining.com/</a></p><p><br></p><p><strong>Active Countermeasures</strong></p><p><a href="https://www.activecountermeasures.com/">https://www.activecountermeasures.com</a></p><p><br></p><p><strong>Wild West Hackin Fest</strong></p><p><a href="https://wildwesthackinfest.com/">https://wildwesthackinfest.com</a></p>]]>
      </itunes:summary>
      <itunes:keywords>Infosec,Cybersecurity,news</itunes:keywords>
      <itunes:explicit>No</itunes:explicit>
      <podcast:person role="Host" href="https://www.blackhillsinfosec.com/team/corey-ham/" img="https://img.transistorcdn.com/Q9BaWxLnY_zU_A-eKpfV22Y1AiBI64lLxLJP19iD_lM/rs:fill:0:0:1/w:800/h:800/q:60/mb:500000/aHR0cHM6Ly9pbWct/dXBsb2FkLXByb2R1/Y3Rpb24udHJhbnNp/c3Rvci5mbS84MTMx/N2JlN2IzZWI2MDcz/MGU0NTk5NGU0N2Iw/NzE2Yy5qcGc.jpg">Corey Ham</podcast:person>
      <podcast:person role="Host" href="https://mwgroup.io/about/" img="https://img.transistorcdn.com/_dioeUsMeIlo4vZ0dPQkQ-f-tkMHllpfM4P-4SpyW8Q/rs:fill:0:0:1/w:800/h:800/q:60/mb:500000/aHR0cHM6Ly9pbWct/dXBsb2FkLXByb2R1/Y3Rpb24udHJhbnNp/c3Rvci5mbS9jNzA4/MDU5MTk2MDAyMjc5/NmZiZmFkMDY4NGVj/NzRmNS5qcGVn.jpg">Ralph May</podcast:person>
      <podcast:person role="Guest" href="https://www.blackhillsinfosec.com/team/patterson-cake/" img="https://img.transistorcdn.com/txG1BaGKccBjmDi7vIFEQtDXAyCKo4jzcd6DCQXhc1M/rs:fill:0:0:1/w:800/h:800/q:60/mb:500000/aHR0cHM6Ly9pbWct/dXBsb2FkLXByb2R1/Y3Rpb24udHJhbnNp/c3Rvci5mbS82MmI1/ZDliNzI5NGNmNzEw/YmEzYjZmNTllMGYw/NDNiYS5qcGc.jpg">Patterson Cake</podcast:person>
      <podcast:person role="Host" href="https://www.bsidessd.org/" img="https://img.transistorcdn.com/KeYB5iZ31d5IGBEuYGSV1SOcM5ZsEQ3dGI4HgjvyVVE/rs:fill:0:0:1/w:800/h:800/q:60/mb:500000/aHR0cHM6Ly9pbWct/dXBsb2FkLXByb2R1/Y3Rpb24udHJhbnNp/c3Rvci5mbS82ZGRm/ZWU5MGU5YzJiZjU0/MTVmZTU0OWExYTg4/OGFhMi5wbmc.jpg">Wade Wells</podcast:person>
      <podcast:person role="Host" href="https://www.blackhillsinfosec.com/team/bronwen-aker/" img="https://img.transistorcdn.com/CSShIJJhZo9yPTywdOv4zlsSYFk9yVSAIU6CrsdvdY4/rs:fill:0:0:1/w:800/h:800/q:60/mb:500000/aHR0cHM6Ly9pbWct/dXBsb2FkLXByb2R1/Y3Rpb24udHJhbnNp/c3Rvci5mbS80YWIy/MWUxODE4NjA1MmRm/OTBmZmYyYzRlYmU1/N2NhOC5qcGc.jpg">Bronwen Aker</podcast:person>
      <podcast:person role="Producer" href="https://bhisnews.transistor.fm/people/meagan-bentley">Meagan Bentley</podcast:person>
      <podcast:transcript url="https://share.transistor.fm/s/ba6afeab/transcription.vtt" type="text/vtt" rel="captions"/>
      <podcast:transcript url="https://share.transistor.fm/s/ba6afeab/transcription.srt" type="application/x-subrip" rel="captions"/>
      <podcast:transcript url="https://share.transistor.fm/s/ba6afeab/transcription.json" type="application/json" rel="captions"/>
      <podcast:transcript url="https://share.transistor.fm/s/ba6afeab/transcription.txt" type="text/plain"/>
      <podcast:transcript url="https://share.transistor.fm/s/ba6afeab/transcription" type="text/html"/>
      <podcast:chapters url="https://share.transistor.fm/s/ba6afeab/chapters.json" type="application/json+chapters"/>
    </item>
    <item>
      <title>Anthropic’s Project Glasswing is an Infosec Turning Point – 2026-04-13</title>
      <itunes:season>6</itunes:season>
      <podcast:season>6</podcast:season>
      <itunes:episode>15</itunes:episode>
      <podcast:episode>15</podcast:episode>
      <itunes:title>Anthropic’s Project Glasswing is an Infosec Turning Point – 2026-04-13</itunes:title>
      <itunes:episodeType>full</itunes:episodeType>
      <guid isPermaLink="false">a3b91cc4-dca7-4af0-8381-66b3def747b1</guid>
      <link>https://share.transistor.fm/s/90b4cb27</link>
      <description>
        <![CDATA[<p>This episode dives into Anthropic’s “Project Glasswing” and the broader implications of AI-driven offensive security, including models autonomously discovering vulnerabilities and attempting sandbox escapes. The hosts discuss how agentic AI testing approaches could reshape vulnerability research, while also raising concerns about AI safety, regulation, and real-world risk. Additional topics include the growing impact of AI on security workflows, rising infrastructure costs tied to AI demand, a new infostealer ecosystem overview, and ongoing debates about data collection practices and platform privacy.</p><p><br>Join us LIVE on Mondays, 4:30pm EST.<br>A weekly Podcast with BHIS and Friends. We discuss notable Infosec, and infosec-adjacent news stories gathered by our community news team.<br><a href="https://www.youtube.com/@BlackHillsInformationSecurity">https://www.youtube.com/@BlackHillsInformationSecurity</a></p><p>Chat with us on Discord! - <br><a href="https://discord.gg/bhis">https://discord.gg/bhis</a><br>🔴live-chat</p><p><br><strong>Chapters</strong><br></p><ul><li>(00:00) - PreShow Banter™ — A Real Studio</li>
<li>(03:43) - Anthropic’s Project Glasswing is an Infosec Turning Point – 2026-04-13</li>
<li>(05:39) - Story # 1: Project Glasswing</li>
<li>(22:20) - Story # 2: AI-Led Remediation Crisis Prompts HackerOne to Pause Bug Bounties</li>
<li>(30:36) - Story # 3: Disgruntled researcher leaks “BlueHammer” Windows zero-day exploit</li>
<li>(32:39) - WEBCAST: Proxy Execution with Microsoft Edge WebView2 w/ Matthew Eidelberg</li>
<li>(51:47) - Story # 4: New "BrowserGate" report claims LinkedIn secretly scans user browsers for installed extensions and collects device data</li>
<li>(56:32) - Story # 5: The silent “Storm”: New infostealer hijacks sessions, decrypts server-side</li>
<li>(58:46) - ChickenSec: the Chicken Accords of 2026</li>
<li>(01:00:27) - Story # 6: EFF is Leaving X</li>
<li>(01:03:01) - Workshop: How to Think Like a Cybersecurity Defender</li>
<li>(01:05:49) - AI Security Ops Podcast</li>
</ul><br><strong>Links</strong><p>Story # 1: <a href="https://www.anthropic.com/glasswing">Project Glasswing</a><br>Story # 2: <a href="https://www.darkreading.com/application-security/ai-led-remediation-crisis-prompts-hackerone-pause-bug-bounties">AI-Led Remediation Crisis Prompts HackerOne to Pause Bug Bounties</a><br>Story # 3: <a href="https://www.bleepingcomputer.com/news/security/disgruntled-researcher-leaks-bluehammer-windows-zero-day-exploit/">Disgruntled researcher leaks “BlueHammer” Windows zero-day exploit</a><br>WEBCAST: <a href="https://youtube.com/live/3GeQfShBxbY">Proxy Execution with Microsoft Edge WebView2 w/ Matthew Eidelberg</a><br>Story # 4: <a href="https://www.techradar.com/pro/security/one-of-the-largest-corporate-espionage-and-data-breach-scandals-in-digital-history-new-browsergate-report-claims-linkedin-secretly-scans-user-browsers-for-installed-extensions-and-collects-device-data">New “BrowserGate” report claims LinkedIn secretly scans user browsers for installed extensions and collects device data</a><br>Story # 5: <a href="https://www.bleepingcomputer.com/news/security/the-silent-storm-new-infostealer-hijacks-sessions-decrypts-server-side/">The silent “Storm”: New infostealer hijacks sessions, decrypts server-side</a><br>ChickenSec: <a href="https://x.com/vxunderground/status/2043727167473816159">the Chicken Accords of 2026</a><br>Story # 6: <a href="https://www.eff.org/deeplinks/2026/04/eff-leaving-x">EFF is Leaving X</a><br>Workshop: <a href="https://www.antisyphontraining.com/product/workshop-how-to-think-like-a-cybersecurity-defender/">How to Think Like a Cybersecurity Defender</a><br><a href="https://aisecurityops.transistor.fm">AI Security Ops Podcast<br></a><br><strong><strong>Creators &amp; Guests</strong>
<ul>
  <li><a href="https://bhisnews.transistor.fm/people/corey-ham">Corey Ham</a> - Host</li>
  <li><a href="https://bhisnews.transistor.fm/people/wade-wells">Wade Wells</a> - Host</li>
  <li><a href="https://bhisnews.transistor.fm/people/alex-minster-belouve">Alex Minster "Belouve"</a> - Guest</li>
  <li><a href="https://bhisnews.transistor.fm/people/bronwen-aker">Bronwen Aker</a> - Host</li>
  <li><a href="https://bhisnews.transistor.fm/people/ralph-may">Ralph May</a> - Host</li>
  <li><a href="https://bhisnews.transistor.fm/people/john-strand-8c127856-b150-4e33-af6d-5b9f7f041a37">John Strand</a> - Host</li>
  <li><a href="https://bhisnews.transistor.fm/people/doc-blackburn">Doc Blackburn</a> - Guest</li>
</ul><br><a href="https://www.youtube.com/watch?v=wa8QPKzhi18" title="Click here to watch  this episode on YouTube.">Click here to watch  this episode on YouTube.</a><br>
</strong></p><p><strong><a href="https://share.transistor.fm/s/90b4cb27/transcript" title="Click here to view the episode transcript.">Click here to view the episode transcript.</a><br>
</strong></p><p><strong>🔗 Register for FREE Infosec Webcasts, Anti-casts &amp; Summits </strong></p><p><a href="https://poweredbybhis.com/">https://poweredbybhis.com</a></p><p><br>Brought to you by:</p><p><strong>Black Hills Information Security </strong></p><p><a href="https://www.blackhillsinfosec.com/">https://www.blackhillsinfosec.com</a></p><p><br></p><p><strong>Antisyphon Training</strong></p><p><a href="https://www.antisyphontraining.com/">https://www.antisyphontraining.com/</a></p><p><br></p><p><strong>Active Countermeasures</strong></p><p><a href="https://www.activecountermeasures.com/">https://www.activecountermeasures.com</a></p><p><br></p><p><strong>Wild West Hackin Fest</strong></p><p><a href="https://wildwesthackinfest.com/">https://wildwesthackinfest.com</a></p>]]>
      </description>
      <content:encoded>
        <![CDATA[<p>This episode dives into Anthropic’s “Project Glasswing” and the broader implications of AI-driven offensive security, including models autonomously discovering vulnerabilities and attempting sandbox escapes. The hosts discuss how agentic AI testing approaches could reshape vulnerability research, while also raising concerns about AI safety, regulation, and real-world risk. Additional topics include the growing impact of AI on security workflows, rising infrastructure costs tied to AI demand, a new infostealer ecosystem overview, and ongoing debates about data collection practices and platform privacy.</p><p><br>Join us LIVE on Mondays, 4:30pm EST.<br>A weekly Podcast with BHIS and Friends. We discuss notable Infosec, and infosec-adjacent news stories gathered by our community news team.<br><a href="https://www.youtube.com/@BlackHillsInformationSecurity">https://www.youtube.com/@BlackHillsInformationSecurity</a></p><p>Chat with us on Discord! - <br><a href="https://discord.gg/bhis">https://discord.gg/bhis</a><br>🔴live-chat</p><p><br><strong>Chapters</strong><br></p><ul><li>(00:00) - PreShow Banter™ — A Real Studio</li>
<li>(03:43) - Anthropic’s Project Glasswing is an Infosec Turning Point – 2026-04-13</li>
<li>(05:39) - Story # 1: Project Glasswing</li>
<li>(22:20) - Story # 2: AI-Led Remediation Crisis Prompts HackerOne to Pause Bug Bounties</li>
<li>(30:36) - Story # 3: Disgruntled researcher leaks “BlueHammer” Windows zero-day exploit</li>
<li>(32:39) - WEBCAST: Proxy Execution with Microsoft Edge WebView2 w/ Matthew Eidelberg</li>
<li>(51:47) - Story # 4: New "BrowserGate" report claims LinkedIn secretly scans user browsers for installed extensions and collects device data</li>
<li>(56:32) - Story # 5: The silent “Storm”: New infostealer hijacks sessions, decrypts server-side</li>
<li>(58:46) - ChickenSec: the Chicken Accords of 2026</li>
<li>(01:00:27) - Story # 6: EFF is Leaving X</li>
<li>(01:03:01) - Workshop: How to Think Like a Cybersecurity Defender</li>
<li>(01:05:49) - AI Security Ops Podcast</li>
</ul><br><strong>Links</strong><p>Story # 1: <a href="https://www.anthropic.com/glasswing">Project Glasswing</a><br>Story # 2: <a href="https://www.darkreading.com/application-security/ai-led-remediation-crisis-prompts-hackerone-pause-bug-bounties">AI-Led Remediation Crisis Prompts HackerOne to Pause Bug Bounties</a><br>Story # 3: <a href="https://www.bleepingcomputer.com/news/security/disgruntled-researcher-leaks-bluehammer-windows-zero-day-exploit/">Disgruntled researcher leaks “BlueHammer” Windows zero-day exploit</a><br>WEBCAST: <a href="https://youtube.com/live/3GeQfShBxbY">Proxy Execution with Microsoft Edge WebView2 w/ Matthew Eidelberg</a><br>Story # 4: <a href="https://www.techradar.com/pro/security/one-of-the-largest-corporate-espionage-and-data-breach-scandals-in-digital-history-new-browsergate-report-claims-linkedin-secretly-scans-user-browsers-for-installed-extensions-and-collects-device-data">New “BrowserGate” report claims LinkedIn secretly scans user browsers for installed extensions and collects device data</a><br>Story # 5: <a href="https://www.bleepingcomputer.com/news/security/the-silent-storm-new-infostealer-hijacks-sessions-decrypts-server-side/">The silent “Storm”: New infostealer hijacks sessions, decrypts server-side</a><br>ChickenSec: <a href="https://x.com/vxunderground/status/2043727167473816159">the Chicken Accords of 2026</a><br>Story # 6: <a href="https://www.eff.org/deeplinks/2026/04/eff-leaving-x">EFF is Leaving X</a><br>Workshop: <a href="https://www.antisyphontraining.com/product/workshop-how-to-think-like-a-cybersecurity-defender/">How to Think Like a Cybersecurity Defender</a><br><a href="https://aisecurityops.transistor.fm">AI Security Ops Podcast<br></a><br><strong><strong>Creators &amp; Guests</strong>
<ul>
  <li><a href="https://bhisnews.transistor.fm/people/corey-ham">Corey Ham</a> - Host</li>
  <li><a href="https://bhisnews.transistor.fm/people/wade-wells">Wade Wells</a> - Host</li>
  <li><a href="https://bhisnews.transistor.fm/people/alex-minster-belouve">Alex Minster "Belouve"</a> - Guest</li>
  <li><a href="https://bhisnews.transistor.fm/people/bronwen-aker">Bronwen Aker</a> - Host</li>
  <li><a href="https://bhisnews.transistor.fm/people/ralph-may">Ralph May</a> - Host</li>
  <li><a href="https://bhisnews.transistor.fm/people/john-strand-8c127856-b150-4e33-af6d-5b9f7f041a37">John Strand</a> - Host</li>
  <li><a href="https://bhisnews.transistor.fm/people/doc-blackburn">Doc Blackburn</a> - Guest</li>
</ul><br><a href="https://www.youtube.com/watch?v=wa8QPKzhi18" title="Click here to watch  this episode on YouTube.">Click here to watch  this episode on YouTube.</a><br>
</strong></p><p><strong><a href="https://share.transistor.fm/s/90b4cb27/transcript" title="Click here to view the episode transcript.">Click here to view the episode transcript.</a><br>
</strong></p><p><strong>🔗 Register for FREE Infosec Webcasts, Anti-casts &amp; Summits </strong></p><p><a href="https://poweredbybhis.com/">https://poweredbybhis.com</a></p><p><br>Brought to you by:</p><p><strong>Black Hills Information Security </strong></p><p><a href="https://www.blackhillsinfosec.com/">https://www.blackhillsinfosec.com</a></p><p><br></p><p><strong>Antisyphon Training</strong></p><p><a href="https://www.antisyphontraining.com/">https://www.antisyphontraining.com/</a></p><p><br></p><p><strong>Active Countermeasures</strong></p><p><a href="https://www.activecountermeasures.com/">https://www.activecountermeasures.com</a></p><p><br></p><p><strong>Wild West Hackin Fest</strong></p><p><a href="https://wildwesthackinfest.com/">https://wildwesthackinfest.com</a></p>]]>
      </content:encoded>
      <pubDate>Tue, 14 Apr 2026 15:14:00 -0400</pubDate>
      <author>Black Hills Information Security</author>
      <enclosure url="https://media.transistor.fm/90b4cb27/c2677738.mp3" length="66184537" type="audio/mpeg"/>
      <itunes:author>Black Hills Information Security</itunes:author>
      <itunes:image href="https://img.transistorcdn.com/bQ6ihHgKUwpxCGjX00l87GVEFQcGldHoAsnv_w-uuFI/rs:fill:0:0:1/w:1400/h:1400/q:60/mb:500000/aHR0cHM6Ly9pbWct/dXBsb2FkLXByb2R1/Y3Rpb24udHJhbnNp/c3Rvci5mbS9kNjRh/MmM5NjViNjY0ODYz/NDVkMWYyMWNlNjdl/YjI5OC5qcGc.jpg"/>
      <itunes:duration>3987</itunes:duration>
      <itunes:summary>
        <![CDATA[<p>This episode dives into Anthropic’s “Project Glasswing” and the broader implications of AI-driven offensive security, including models autonomously discovering vulnerabilities and attempting sandbox escapes. The hosts discuss how agentic AI testing approaches could reshape vulnerability research, while also raising concerns about AI safety, regulation, and real-world risk. Additional topics include the growing impact of AI on security workflows, rising infrastructure costs tied to AI demand, a new infostealer ecosystem overview, and ongoing debates about data collection practices and platform privacy.</p><p><br>Join us LIVE on Mondays, 4:30pm EST.<br>A weekly Podcast with BHIS and Friends. We discuss notable Infosec, and infosec-adjacent news stories gathered by our community news team.<br><a href="https://www.youtube.com/@BlackHillsInformationSecurity">https://www.youtube.com/@BlackHillsInformationSecurity</a></p><p>Chat with us on Discord! - <br><a href="https://discord.gg/bhis">https://discord.gg/bhis</a><br>🔴live-chat</p><p><br><strong>Chapters</strong><br></p><ul><li>(00:00) - PreShow Banter™ — A Real Studio</li>
<li>(03:43) - Anthropic’s Project Glasswing is an Infosec Turning Point – 2026-04-13</li>
<li>(05:39) - Story # 1: Project Glasswing</li>
<li>(22:20) - Story # 2: AI-Led Remediation Crisis Prompts HackerOne to Pause Bug Bounties</li>
<li>(30:36) - Story # 3: Disgruntled researcher leaks “BlueHammer” Windows zero-day exploit</li>
<li>(32:39) - WEBCAST: Proxy Execution with Microsoft Edge WebView2 w/ Matthew Eidelberg</li>
<li>(51:47) - Story # 4: New "BrowserGate" report claims LinkedIn secretly scans user browsers for installed extensions and collects device data</li>
<li>(56:32) - Story # 5: The silent “Storm”: New infostealer hijacks sessions, decrypts server-side</li>
<li>(58:46) - ChickenSec: the Chicken Accords of 2026</li>
<li>(01:00:27) - Story # 6: EFF is Leaving X</li>
<li>(01:03:01) - Workshop: How to Think Like a Cybersecurity Defender</li>
<li>(01:05:49) - AI Security Ops Podcast</li>
</ul><br><strong>Links</strong><p>Story # 1: <a href="https://www.anthropic.com/glasswing">Project Glasswing</a><br>Story # 2: <a href="https://www.darkreading.com/application-security/ai-led-remediation-crisis-prompts-hackerone-pause-bug-bounties">AI-Led Remediation Crisis Prompts HackerOne to Pause Bug Bounties</a><br>Story # 3: <a href="https://www.bleepingcomputer.com/news/security/disgruntled-researcher-leaks-bluehammer-windows-zero-day-exploit/">Disgruntled researcher leaks “BlueHammer” Windows zero-day exploit</a><br>WEBCAST: <a href="https://youtube.com/live/3GeQfShBxbY">Proxy Execution with Microsoft Edge WebView2 w/ Matthew Eidelberg</a><br>Story # 4: <a href="https://www.techradar.com/pro/security/one-of-the-largest-corporate-espionage-and-data-breach-scandals-in-digital-history-new-browsergate-report-claims-linkedin-secretly-scans-user-browsers-for-installed-extensions-and-collects-device-data">New “BrowserGate” report claims LinkedIn secretly scans user browsers for installed extensions and collects device data</a><br>Story # 5: <a href="https://www.bleepingcomputer.com/news/security/the-silent-storm-new-infostealer-hijacks-sessions-decrypts-server-side/">The silent “Storm”: New infostealer hijacks sessions, decrypts server-side</a><br>ChickenSec: <a href="https://x.com/vxunderground/status/2043727167473816159">the Chicken Accords of 2026</a><br>Story # 6: <a href="https://www.eff.org/deeplinks/2026/04/eff-leaving-x">EFF is Leaving X</a><br>Workshop: <a href="https://www.antisyphontraining.com/product/workshop-how-to-think-like-a-cybersecurity-defender/">How to Think Like a Cybersecurity Defender</a><br><a href="https://aisecurityops.transistor.fm">AI Security Ops Podcast<br></a><br><strong><strong>Creators &amp; Guests</strong>
<ul>
  <li><a href="https://bhisnews.transistor.fm/people/corey-ham">Corey Ham</a> - Host</li>
  <li><a href="https://bhisnews.transistor.fm/people/wade-wells">Wade Wells</a> - Host</li>
  <li><a href="https://bhisnews.transistor.fm/people/alex-minster-belouve">Alex Minster "Belouve"</a> - Guest</li>
  <li><a href="https://bhisnews.transistor.fm/people/bronwen-aker">Bronwen Aker</a> - Host</li>
  <li><a href="https://bhisnews.transistor.fm/people/ralph-may">Ralph May</a> - Host</li>
  <li><a href="https://bhisnews.transistor.fm/people/john-strand-8c127856-b150-4e33-af6d-5b9f7f041a37">John Strand</a> - Host</li>
  <li><a href="https://bhisnews.transistor.fm/people/doc-blackburn">Doc Blackburn</a> - Guest</li>
</ul><br><a href="https://www.youtube.com/watch?v=wa8QPKzhi18" title="Click here to watch  this episode on YouTube.">Click here to watch  this episode on YouTube.</a><br>
</strong></p><p><strong><a href="https://share.transistor.fm/s/90b4cb27/transcript" title="Click here to view the episode transcript.">Click here to view the episode transcript.</a><br>
</strong></p><p><strong>🔗 Register for FREE Infosec Webcasts, Anti-casts &amp; Summits </strong></p><p><a href="https://poweredbybhis.com/">https://poweredbybhis.com</a></p><p><br>Brought to you by:</p><p><strong>Black Hills Information Security </strong></p><p><a href="https://www.blackhillsinfosec.com/">https://www.blackhillsinfosec.com</a></p><p><br></p><p><strong>Antisyphon Training</strong></p><p><a href="https://www.antisyphontraining.com/">https://www.antisyphontraining.com/</a></p><p><br></p><p><strong>Active Countermeasures</strong></p><p><a href="https://www.activecountermeasures.com/">https://www.activecountermeasures.com</a></p><p><br></p><p><strong>Wild West Hackin Fest</strong></p><p><a href="https://wildwesthackinfest.com/">https://wildwesthackinfest.com</a></p>]]>
      </itunes:summary>
      <itunes:keywords>Infosec,Cybersecurity,news</itunes:keywords>
      <itunes:explicit>No</itunes:explicit>
      <podcast:person role="Host" href="https://www.blackhillsinfosec.com/team/corey-ham/" img="https://img.transistorcdn.com/Q9BaWxLnY_zU_A-eKpfV22Y1AiBI64lLxLJP19iD_lM/rs:fill:0:0:1/w:800/h:800/q:60/mb:500000/aHR0cHM6Ly9pbWct/dXBsb2FkLXByb2R1/Y3Rpb24udHJhbnNp/c3Rvci5mbS84MTMx/N2JlN2IzZWI2MDcz/MGU0NTk5NGU0N2Iw/NzE2Yy5qcGc.jpg">Corey Ham</podcast:person>
      <podcast:person role="Host" href="https://www.bsidessd.org/" img="https://img.transistorcdn.com/KeYB5iZ31d5IGBEuYGSV1SOcM5ZsEQ3dGI4HgjvyVVE/rs:fill:0:0:1/w:800/h:800/q:60/mb:500000/aHR0cHM6Ly9pbWct/dXBsb2FkLXByb2R1/Y3Rpb24udHJhbnNp/c3Rvci5mbS82ZGRm/ZWU5MGU5YzJiZjU0/MTVmZTU0OWExYTg4/OGFhMi5wbmc.jpg">Wade Wells</podcast:person>
      <podcast:person role="Guest" href="https://bhisnews.transistor.fm/people/alex-minster-belouve" img="https://img.transistorcdn.com/pkWXYRcPNt2ZnnEfs05Q8vmWG5GDNmNhH10RUMs2Zro/rs:fill:0:0:1/w:800/h:800/q:60/mb:500000/aHR0cHM6Ly9pbWct/dXBsb2FkLXByb2R1/Y3Rpb24udHJhbnNp/c3Rvci5mbS9mYjZj/MDNhM2YyZmZmZmI2/NGU0YWJjYzdlMjkx/ODFkYy5qcGc.jpg">Alex Minster "Belouve"</podcast:person>
      <podcast:person role="Host" href="https://www.blackhillsinfosec.com/team/bronwen-aker/" img="https://img.transistorcdn.com/CSShIJJhZo9yPTywdOv4zlsSYFk9yVSAIU6CrsdvdY4/rs:fill:0:0:1/w:800/h:800/q:60/mb:500000/aHR0cHM6Ly9pbWct/dXBsb2FkLXByb2R1/Y3Rpb24udHJhbnNp/c3Rvci5mbS80YWIy/MWUxODE4NjA1MmRm/OTBmZmYyYzRlYmU1/N2NhOC5qcGc.jpg">Bronwen Aker</podcast:person>
      <podcast:person role="Host" href="https://mwgroup.io/about/" img="https://img.transistorcdn.com/_dioeUsMeIlo4vZ0dPQkQ-f-tkMHllpfM4P-4SpyW8Q/rs:fill:0:0:1/w:800/h:800/q:60/mb:500000/aHR0cHM6Ly9pbWct/dXBsb2FkLXByb2R1/Y3Rpb24udHJhbnNp/c3Rvci5mbS9jNzA4/MDU5MTk2MDAyMjc5/NmZiZmFkMDY4NGVj/NzRmNS5qcGVn.jpg">Ralph May</podcast:person>
      <podcast:person role="Host" href="https://www.blackhillsinfosec.com/team/john-strand/" img="https://img.transistorcdn.com/NUqk_fUpMRKpGIokj-WgaiALdQtlImwADID3aNogGds/rs:fill:0:0:1/w:800/h:800/q:60/mb:500000/aHR0cHM6Ly9pbWct/dXBsb2FkLXByb2R1/Y3Rpb24udHJhbnNp/c3Rvci5mbS84Y2Ji/YmMyMzRlMDM2Nzdi/YmNlYjhlZDQwZmM4/MmJlYy5qcGc.jpg">John Strand</podcast:person>
      <podcast:person role="Guest" href="https://www.antisyphontraining.com/instructor/docblackburn/" img="https://img.transistorcdn.com/oG00q5sxI2fPXES4ANeTKYnwHGKHk5spzbbrbxvqpD0/rs:fill:0:0:1/w:800/h:800/q:60/mb:500000/aHR0cHM6Ly9pbWct/dXBsb2FkLXByb2R1/Y3Rpb24udHJhbnNp/c3Rvci5mbS84Njc1/MjZhOTA5ODAxYjZj/MWZjN2RjNmExNGFm/NTg4OC5qcGVn.jpg">Doc Blackburn</podcast:person>
      <podcast:transcript url="https://share.transistor.fm/s/90b4cb27/transcription.vtt" type="text/vtt" rel="captions"/>
      <podcast:transcript url="https://share.transistor.fm/s/90b4cb27/transcription.srt" type="application/x-subrip" rel="captions"/>
      <podcast:transcript url="https://share.transistor.fm/s/90b4cb27/transcription.json" type="application/json" rel="captions"/>
      <podcast:transcript url="https://share.transistor.fm/s/90b4cb27/transcription.txt" type="text/plain"/>
      <podcast:transcript url="https://share.transistor.fm/s/90b4cb27/transcription" type="text/html"/>
      <podcast:chapters url="https://share.transistor.fm/s/90b4cb27/chapters.json" type="application/json+chapters"/>
    </item>
    <item>
      <title>Artemis Astronaut's Bad Outlooks - 2026-04-06</title>
      <itunes:season>6</itunes:season>
      <podcast:season>6</podcast:season>
      <itunes:episode>14</itunes:episode>
      <podcast:episode>14</podcast:episode>
      <itunes:title>Artemis Astronaut's Bad Outlooks - 2026-04-06</itunes:title>
      <itunes:episodeType>full</itunes:episodeType>
      <guid isPermaLink="false">f6f5d303-1db6-42ca-af27-c807f71b61c5</guid>
      <link>https://share.transistor.fm/s/e3b56ea6</link>
      <description>
        <![CDATA[<p>This episode covers several major cybersecurity and tech news stories, including a sophisticated NPM supply chain attack that compromised the widely used Axios library through advanced social engineering, and the broader implications for software security. The hosts also discuss the accidental leak of Anthropic’s Claude codebase, what it reveals about AI development practices, and the risks of misconfigurations exposing sensitive systems. Additional conversation touches on AI reliability, “vibe-coded” software, and the growing role of AI in both development and attack techniques.</p><p>Join us LIVE on Mondays, 4:30pm EST.<br>A weekly Podcast with BHIS and Friends. We discuss notable Infosec, and infosec-adjacent news stories gathered by our community news team.<br><a href="https://www.youtube.com/@BlackHillsInformationSecurity">https://www.youtube.com/@BlackHillsInformationSecurity</a></p><p>Chat with us on Discord! - <br><a href="https://discord.gg/bhis">https://discord.gg/bhis</a><br>🔴live-chat</p><p><br><strong>Chapters</strong><br></p><ul><li>(00:00) - PreShow Banter™ — Professional Sitters</li>
<li>(04:36) - Artemis Astronaut's Bad Outlooks - 2026-04-06</li>
<li>(07:12) - The Absolute Truths of Cybersecurity with Doc Blackburn</li>
<li>(08:52) - Professionally Evil API Testing: AAA and Keys are Not Just for Cars</li>
<li>(09:35) - Story # 1: Post Mortem: axios npm supply chain compromise</li>
<li>(19:54) - Story # 2: Artemis II astronaut: 'I have two Microsoft Outlooks, and neither one of those are working'</li>
<li>(26:02) - Story # 3: Microsoft Copilot Terms of Service Label Copilot is for Entertainment Purposes Only</li>
<li>(30:13) - Story # 4: Here’s what that Claude Code source leak reveals about Anthropic’s plans</li>
<li>(35:03) - Story # 4b: https://neuromatch.social/@jonny/116325123136895805</li>
<li>(37:57) - Story # 5: Meta freezes AI data work after breach puts training secrets at risk</li>
<li>(41:40) - Story # 6: Possible US Government iPhone Hacking Tool Leaked</li>
<li>(44:32) - Story # 7: FBI labels data breach ‘major incident,’ notifies Congress</li>
<li>(46:58) - Story # 8: vSphere and BRICKSTORM Malware: A Defender's Guide</li>
<li>(52:12) - Story # 9: CBP Facility Codes Sure Seem to Have Leaked Via Online Flashcards</li>
<li>(01:04:26) - ChickenSec: Why did the chicken wear a reflective vest? To cross the road of course</li>
</ul><br><strong>Links</strong><p><a href="https://youtube.com/live/OjqWjHoOOtg">The Absolute Truths of Cybersecurity with Doc Blackburn</a><br>Professionally Evil API Testing: AAA and Keys are Not Just for Cars<br>Story # 1: <a href="https://github.com/axios/axios/issues/10636">Post Mortem: axios npm supply chain compromise</a><br>Story # 2: <a href="https://www.theregister.com/2026/04/02/artemis_astronauts_microsoft_outlook_broken/">Artemis II astronaut: ‘I have two Microsoft Outlooks, and neither one of those are working’</a><br>Story # 3: <a href="https://cybersecuritynews.com/microsoft-copilot-terms-of-service/">Microsoft Copilot Terms of Service Label Copilot is for Entertainment Purposes Only</a><br>Story # 4: <a href="https://arstechnica.com/ai/2026/04/heres-what-that-claude-code-source-leak-reveals-about-anthropics-plans/">Here’s what that Claude Code source leak reveals about Anthropic’s plans</a><br>Story # 4b: <a href="https://neuromatch.social/@jonny/116325123136895805">https://neuromatch.social/@jonny/116325123136895805</a><br>Story # 5: <a href="https://thenextweb.com/news/meta-mercor-breach-ai-training-secrets-risk">Meta freezes AI data work after breach puts training secrets at risk</a><br>Story # 6: <a href="https://www.schneier.com/blog/archives/2026/04/possible-us-government-iphone-hacking-tool-leaked.html">Possible US Government iPhone Hacking Tool Leaked</a><br>Story # 7: <a href="https://thehill.com/policy/technology/5815310-fbi-data-breach-surveillance-system-major-incident/">FBI labels data breach ‘major incident,’ notifies Congress</a><br>Story # 8: <a href="https://cloud.google.com/blog/topics/threat-intelligence/vsphere-brickstorm-defender-guide/">vSphere and BRICKSTORM Malware: A Defender’s Guide</a><br>Story # 9: <a href="https://www.wired.com/story/cbp-facility-codes-sure-seem-to-have-leaked-via-online-flashcards/">CBP Facility Codes Sure Seem to Have Leaked Via Online Flashcards</a><br>ChickenSec: <a href="https://www.fox13memphis.com/news/trending/why-did-the-chicken-wear-a-reflective-vest-to-cross-the-road-of-course/article_fc049cd7-ac96-5bdf-bd3d-7a9efe8cd6da.html">Why did the chicken wear a reflective vest? To cross the road of course</a></p><p><strong><strong>Creators &amp; Guests</strong>
<ul>
  <li><a href="https://bhisnews.transistor.fm/people/jennifer-shannon">Jennifer Shannon</a> - Guest</li>
  <li><a href="https://bhisnews.transistor.fm/people/wade-wells">Wade Wells</a> - Host</li>
  <li><a href="https://bhisnews.transistor.fm/people/corey-ham">Corey Ham</a> - Host</li>
  <li><a href="https://bhisnews.transistor.fm/people/ralph-may">Ralph May</a> - Host</li>
  <li><a href="https://bhisnews.transistor.fm/people/ryan-poirier">Ryan Poirier</a> - Producer</li>
  <li><a href="https://bhisnews.transistor.fm/people/bronwen-aker">Bronwen Aker</a> - Host</li>
  <li><a href="https://bhisnews.transistor.fm/people/doc-blackburn">Doc Blackburn</a> - Guest</li>
</ul><br><a href="https://www.youtube.com/watch?v=XwywAcOKdrk" title="Click here to watch  this episode on YouTube.">Click here to watch  this episode on YouTube.</a><br>
</strong></p><p><strong><a href="https://share.transistor.fm/s/e3b56ea6/transcript" title="Click here to view the episode transcript.">Click here to view the episode transcript.</a><br>
</strong></p><p><strong>🔗 Register for FREE Infosec Webcasts, Anti-casts &amp; Summits </strong></p><p><a href="https://poweredbybhis.com/">https://poweredbybhis.com</a></p><p><br>Brought to you by:</p><p><strong>Black Hills Information Security </strong></p><p><a href="https://www.blackhillsinfosec.com/">https://www.blackhillsinfosec.com</a></p><p><br></p><p><strong>Antisyphon Training</strong></p><p><a href="https://www.antisyphontraining.com/">https://www.antisyphontraining.com/</a></p><p><br></p><p><strong>Active Countermeasures</strong></p><p><a href="https://www.activecountermeasures.com/">https://www.activecountermeasures.com</a></p><p><br></p><p><strong>Wild West Hackin Fest</strong></p><p><a href="https://wildwesthackinfest.com/">https://wildwesthackinfest.com</a></p>]]>
      </description>
      <content:encoded>
        <![CDATA[<p>This episode covers several major cybersecurity and tech news stories, including a sophisticated NPM supply chain attack that compromised the widely used Axios library through advanced social engineering, and the broader implications for software security. The hosts also discuss the accidental leak of Anthropic’s Claude codebase, what it reveals about AI development practices, and the risks of misconfigurations exposing sensitive systems. Additional conversation touches on AI reliability, “vibe-coded” software, and the growing role of AI in both development and attack techniques.</p><p>Join us LIVE on Mondays, 4:30pm EST.<br>A weekly Podcast with BHIS and Friends. We discuss notable Infosec, and infosec-adjacent news stories gathered by our community news team.<br><a href="https://www.youtube.com/@BlackHillsInformationSecurity">https://www.youtube.com/@BlackHillsInformationSecurity</a></p><p>Chat with us on Discord! - <br><a href="https://discord.gg/bhis">https://discord.gg/bhis</a><br>🔴live-chat</p><p><br><strong>Chapters</strong><br></p><ul><li>(00:00) - PreShow Banter™ — Professional Sitters</li>
<li>(04:36) - Artemis Astronaut's Bad Outlooks - 2026-04-06</li>
<li>(07:12) - The Absolute Truths of Cybersecurity with Doc Blackburn</li>
<li>(08:52) - Professionally Evil API Testing: AAA and Keys are Not Just for Cars</li>
<li>(09:35) - Story # 1: Post Mortem: axios npm supply chain compromise</li>
<li>(19:54) - Story # 2: Artemis II astronaut: 'I have two Microsoft Outlooks, and neither one of those are working'</li>
<li>(26:02) - Story # 3: Microsoft Copilot Terms of Service Label Copilot is for Entertainment Purposes Only</li>
<li>(30:13) - Story # 4: Here’s what that Claude Code source leak reveals about Anthropic’s plans</li>
<li>(35:03) - Story # 4b: https://neuromatch.social/@jonny/116325123136895805</li>
<li>(37:57) - Story # 5: Meta freezes AI data work after breach puts training secrets at risk</li>
<li>(41:40) - Story # 6: Possible US Government iPhone Hacking Tool Leaked</li>
<li>(44:32) - Story # 7: FBI labels data breach ‘major incident,’ notifies Congress</li>
<li>(46:58) - Story # 8: vSphere and BRICKSTORM Malware: A Defender's Guide</li>
<li>(52:12) - Story # 9: CBP Facility Codes Sure Seem to Have Leaked Via Online Flashcards</li>
<li>(01:04:26) - ChickenSec: Why did the chicken wear a reflective vest? To cross the road of course</li>
</ul><br><strong>Links</strong><p><a href="https://youtube.com/live/OjqWjHoOOtg">The Absolute Truths of Cybersecurity with Doc Blackburn</a><br>Professionally Evil API Testing: AAA and Keys are Not Just for Cars<br>Story # 1: <a href="https://github.com/axios/axios/issues/10636">Post Mortem: axios npm supply chain compromise</a><br>Story # 2: <a href="https://www.theregister.com/2026/04/02/artemis_astronauts_microsoft_outlook_broken/">Artemis II astronaut: ‘I have two Microsoft Outlooks, and neither one of those are working’</a><br>Story # 3: <a href="https://cybersecuritynews.com/microsoft-copilot-terms-of-service/">Microsoft Copilot Terms of Service Label Copilot is for Entertainment Purposes Only</a><br>Story # 4: <a href="https://arstechnica.com/ai/2026/04/heres-what-that-claude-code-source-leak-reveals-about-anthropics-plans/">Here’s what that Claude Code source leak reveals about Anthropic’s plans</a><br>Story # 4b: <a href="https://neuromatch.social/@jonny/116325123136895805">https://neuromatch.social/@jonny/116325123136895805</a><br>Story # 5: <a href="https://thenextweb.com/news/meta-mercor-breach-ai-training-secrets-risk">Meta freezes AI data work after breach puts training secrets at risk</a><br>Story # 6: <a href="https://www.schneier.com/blog/archives/2026/04/possible-us-government-iphone-hacking-tool-leaked.html">Possible US Government iPhone Hacking Tool Leaked</a><br>Story # 7: <a href="https://thehill.com/policy/technology/5815310-fbi-data-breach-surveillance-system-major-incident/">FBI labels data breach ‘major incident,’ notifies Congress</a><br>Story # 8: <a href="https://cloud.google.com/blog/topics/threat-intelligence/vsphere-brickstorm-defender-guide/">vSphere and BRICKSTORM Malware: A Defender’s Guide</a><br>Story # 9: <a href="https://www.wired.com/story/cbp-facility-codes-sure-seem-to-have-leaked-via-online-flashcards/">CBP Facility Codes Sure Seem to Have Leaked Via Online Flashcards</a><br>ChickenSec: <a href="https://www.fox13memphis.com/news/trending/why-did-the-chicken-wear-a-reflective-vest-to-cross-the-road-of-course/article_fc049cd7-ac96-5bdf-bd3d-7a9efe8cd6da.html">Why did the chicken wear a reflective vest? To cross the road of course</a></p><p><strong><strong>Creators &amp; Guests</strong>
<ul>
  <li><a href="https://bhisnews.transistor.fm/people/jennifer-shannon">Jennifer Shannon</a> - Guest</li>
  <li><a href="https://bhisnews.transistor.fm/people/wade-wells">Wade Wells</a> - Host</li>
  <li><a href="https://bhisnews.transistor.fm/people/corey-ham">Corey Ham</a> - Host</li>
  <li><a href="https://bhisnews.transistor.fm/people/ralph-may">Ralph May</a> - Host</li>
  <li><a href="https://bhisnews.transistor.fm/people/ryan-poirier">Ryan Poirier</a> - Producer</li>
  <li><a href="https://bhisnews.transistor.fm/people/bronwen-aker">Bronwen Aker</a> - Host</li>
  <li><a href="https://bhisnews.transistor.fm/people/doc-blackburn">Doc Blackburn</a> - Guest</li>
</ul><br><a href="https://www.youtube.com/watch?v=XwywAcOKdrk" title="Click here to watch  this episode on YouTube.">Click here to watch  this episode on YouTube.</a><br>
</strong></p><p><strong><a href="https://share.transistor.fm/s/e3b56ea6/transcript" title="Click here to view the episode transcript.">Click here to view the episode transcript.</a><br>
</strong></p><p><strong>🔗 Register for FREE Infosec Webcasts, Anti-casts &amp; Summits </strong></p><p><a href="https://poweredbybhis.com/">https://poweredbybhis.com</a></p><p><br>Brought to you by:</p><p><strong>Black Hills Information Security </strong></p><p><a href="https://www.blackhillsinfosec.com/">https://www.blackhillsinfosec.com</a></p><p><br></p><p><strong>Antisyphon Training</strong></p><p><a href="https://www.antisyphontraining.com/">https://www.antisyphontraining.com/</a></p><p><br></p><p><strong>Active Countermeasures</strong></p><p><a href="https://www.activecountermeasures.com/">https://www.activecountermeasures.com</a></p><p><br></p><p><strong>Wild West Hackin Fest</strong></p><p><a href="https://wildwesthackinfest.com/">https://wildwesthackinfest.com</a></p>]]>
      </content:encoded>
      <pubDate>Thu, 09 Apr 2026 15:09:30 -0400</pubDate>
      <author>Black Hills Information Security</author>
      <enclosure url="https://media.transistor.fm/e3b56ea6/5dd76053.mp3" length="66936609" type="audio/mpeg"/>
      <itunes:author>Black Hills Information Security</itunes:author>
      <itunes:image href="https://img.transistorcdn.com/LVqOgJKPYVPHsAA8hEK6BZU0us6rcBBFt5P_aarUd40/rs:fill:0:0:1/w:1400/h:1400/q:60/mb:500000/aHR0cHM6Ly9pbWct/dXBsb2FkLXByb2R1/Y3Rpb24udHJhbnNp/c3Rvci5mbS8xNzU2/MTQ5YzFhYmI0NjI3/M2RjODRlMmI0NzA4/YzI4ZC5qcGc.jpg"/>
      <itunes:duration>3963</itunes:duration>
      <itunes:summary>
        <![CDATA[<p>This episode covers several major cybersecurity and tech news stories, including a sophisticated NPM supply chain attack that compromised the widely used Axios library through advanced social engineering, and the broader implications for software security. The hosts also discuss the accidental leak of Anthropic’s Claude codebase, what it reveals about AI development practices, and the risks of misconfigurations exposing sensitive systems. Additional conversation touches on AI reliability, “vibe-coded” software, and the growing role of AI in both development and attack techniques.</p><p>Join us LIVE on Mondays, 4:30pm EST.<br>A weekly Podcast with BHIS and Friends. We discuss notable Infosec, and infosec-adjacent news stories gathered by our community news team.<br><a href="https://www.youtube.com/@BlackHillsInformationSecurity">https://www.youtube.com/@BlackHillsInformationSecurity</a></p><p>Chat with us on Discord! - <br><a href="https://discord.gg/bhis">https://discord.gg/bhis</a><br>🔴live-chat</p><p><br><strong>Chapters</strong><br></p><ul><li>(00:00) - PreShow Banter™ — Professional Sitters</li>
<li>(04:36) - Artemis Astronaut's Bad Outlooks - 2026-04-06</li>
<li>(07:12) - The Absolute Truths of Cybersecurity with Doc Blackburn</li>
<li>(08:52) - Professionally Evil API Testing: AAA and Keys are Not Just for Cars</li>
<li>(09:35) - Story # 1: Post Mortem: axios npm supply chain compromise</li>
<li>(19:54) - Story # 2: Artemis II astronaut: 'I have two Microsoft Outlooks, and neither one of those are working'</li>
<li>(26:02) - Story # 3: Microsoft Copilot Terms of Service Label Copilot is for Entertainment Purposes Only</li>
<li>(30:13) - Story # 4: Here’s what that Claude Code source leak reveals about Anthropic’s plans</li>
<li>(35:03) - Story # 4b: https://neuromatch.social/@jonny/116325123136895805</li>
<li>(37:57) - Story # 5: Meta freezes AI data work after breach puts training secrets at risk</li>
<li>(41:40) - Story # 6: Possible US Government iPhone Hacking Tool Leaked</li>
<li>(44:32) - Story # 7: FBI labels data breach ‘major incident,’ notifies Congress</li>
<li>(46:58) - Story # 8: vSphere and BRICKSTORM Malware: A Defender's Guide</li>
<li>(52:12) - Story # 9: CBP Facility Codes Sure Seem to Have Leaked Via Online Flashcards</li>
<li>(01:04:26) - ChickenSec: Why did the chicken wear a reflective vest? To cross the road of course</li>
</ul><br><strong>Links</strong><p><a href="https://youtube.com/live/OjqWjHoOOtg">The Absolute Truths of Cybersecurity with Doc Blackburn</a><br>Professionally Evil API Testing: AAA and Keys are Not Just for Cars<br>Story # 1: <a href="https://github.com/axios/axios/issues/10636">Post Mortem: axios npm supply chain compromise</a><br>Story # 2: <a href="https://www.theregister.com/2026/04/02/artemis_astronauts_microsoft_outlook_broken/">Artemis II astronaut: ‘I have two Microsoft Outlooks, and neither one of those are working’</a><br>Story # 3: <a href="https://cybersecuritynews.com/microsoft-copilot-terms-of-service/">Microsoft Copilot Terms of Service Label Copilot is for Entertainment Purposes Only</a><br>Story # 4: <a href="https://arstechnica.com/ai/2026/04/heres-what-that-claude-code-source-leak-reveals-about-anthropics-plans/">Here’s what that Claude Code source leak reveals about Anthropic’s plans</a><br>Story # 4b: <a href="https://neuromatch.social/@jonny/116325123136895805">https://neuromatch.social/@jonny/116325123136895805</a><br>Story # 5: <a href="https://thenextweb.com/news/meta-mercor-breach-ai-training-secrets-risk">Meta freezes AI data work after breach puts training secrets at risk</a><br>Story # 6: <a href="https://www.schneier.com/blog/archives/2026/04/possible-us-government-iphone-hacking-tool-leaked.html">Possible US Government iPhone Hacking Tool Leaked</a><br>Story # 7: <a href="https://thehill.com/policy/technology/5815310-fbi-data-breach-surveillance-system-major-incident/">FBI labels data breach ‘major incident,’ notifies Congress</a><br>Story # 8: <a href="https://cloud.google.com/blog/topics/threat-intelligence/vsphere-brickstorm-defender-guide/">vSphere and BRICKSTORM Malware: A Defender’s Guide</a><br>Story # 9: <a href="https://www.wired.com/story/cbp-facility-codes-sure-seem-to-have-leaked-via-online-flashcards/">CBP Facility Codes Sure Seem to Have Leaked Via Online Flashcards</a><br>ChickenSec: <a href="https://www.fox13memphis.com/news/trending/why-did-the-chicken-wear-a-reflective-vest-to-cross-the-road-of-course/article_fc049cd7-ac96-5bdf-bd3d-7a9efe8cd6da.html">Why did the chicken wear a reflective vest? To cross the road of course</a></p><p><strong><strong>Creators &amp; Guests</strong>
<ul>
  <li><a href="https://bhisnews.transistor.fm/people/jennifer-shannon">Jennifer Shannon</a> - Guest</li>
  <li><a href="https://bhisnews.transistor.fm/people/wade-wells">Wade Wells</a> - Host</li>
  <li><a href="https://bhisnews.transistor.fm/people/corey-ham">Corey Ham</a> - Host</li>
  <li><a href="https://bhisnews.transistor.fm/people/ralph-may">Ralph May</a> - Host</li>
  <li><a href="https://bhisnews.transistor.fm/people/ryan-poirier">Ryan Poirier</a> - Producer</li>
  <li><a href="https://bhisnews.transistor.fm/people/bronwen-aker">Bronwen Aker</a> - Host</li>
  <li><a href="https://bhisnews.transistor.fm/people/doc-blackburn">Doc Blackburn</a> - Guest</li>
</ul><br><a href="https://www.youtube.com/watch?v=XwywAcOKdrk" title="Click here to watch  this episode on YouTube.">Click here to watch  this episode on YouTube.</a><br>
</strong></p><p><strong><a href="https://share.transistor.fm/s/e3b56ea6/transcript" title="Click here to view the episode transcript.">Click here to view the episode transcript.</a><br>
</strong></p><p><strong>🔗 Register for FREE Infosec Webcasts, Anti-casts &amp; Summits </strong></p><p><a href="https://poweredbybhis.com/">https://poweredbybhis.com</a></p><p><br>Brought to you by:</p><p><strong>Black Hills Information Security </strong></p><p><a href="https://www.blackhillsinfosec.com/">https://www.blackhillsinfosec.com</a></p><p><br></p><p><strong>Antisyphon Training</strong></p><p><a href="https://www.antisyphontraining.com/">https://www.antisyphontraining.com/</a></p><p><br></p><p><strong>Active Countermeasures</strong></p><p><a href="https://www.activecountermeasures.com/">https://www.activecountermeasures.com</a></p><p><br></p><p><strong>Wild West Hackin Fest</strong></p><p><a href="https://wildwesthackinfest.com/">https://wildwesthackinfest.com</a></p>]]>
      </itunes:summary>
      <itunes:keywords>Infosec,Cybersecurity,news</itunes:keywords>
      <itunes:explicit>No</itunes:explicit>
      <podcast:person role="Guest" href="https://www.antisyphontraining.com/instructor/jennifer-shannon/" img="https://img.transistorcdn.com/3xygiFqpvZ2S5U4XpPGC5zFKnfpT6s1Y4eejRyC_T1s/rs:fill:0:0:1/w:800/h:800/q:60/mb:500000/aHR0cHM6Ly9pbWct/dXBsb2FkLXByb2R1/Y3Rpb24udHJhbnNp/c3Rvci5mbS9kNDM3/Zjc3NzNiNzIzYTcx/OWI1ODAwYWJhMTk5/OTUzMC5qcGc.jpg">Jennifer Shannon</podcast:person>
      <podcast:person role="Host" href="https://www.bsidessd.org/" img="https://img.transistorcdn.com/KeYB5iZ31d5IGBEuYGSV1SOcM5ZsEQ3dGI4HgjvyVVE/rs:fill:0:0:1/w:800/h:800/q:60/mb:500000/aHR0cHM6Ly9pbWct/dXBsb2FkLXByb2R1/Y3Rpb24udHJhbnNp/c3Rvci5mbS82ZGRm/ZWU5MGU5YzJiZjU0/MTVmZTU0OWExYTg4/OGFhMi5wbmc.jpg">Wade Wells</podcast:person>
      <podcast:person role="Host" href="https://www.blackhillsinfosec.com/team/corey-ham/" img="https://img.transistorcdn.com/Q9BaWxLnY_zU_A-eKpfV22Y1AiBI64lLxLJP19iD_lM/rs:fill:0:0:1/w:800/h:800/q:60/mb:500000/aHR0cHM6Ly9pbWct/dXBsb2FkLXByb2R1/Y3Rpb24udHJhbnNp/c3Rvci5mbS84MTMx/N2JlN2IzZWI2MDcz/MGU0NTk5NGU0N2Iw/NzE2Yy5qcGc.jpg">Corey Ham</podcast:person>
      <podcast:person role="Host" href="https://mwgroup.io/about/" img="https://img.transistorcdn.com/_dioeUsMeIlo4vZ0dPQkQ-f-tkMHllpfM4P-4SpyW8Q/rs:fill:0:0:1/w:800/h:800/q:60/mb:500000/aHR0cHM6Ly9pbWct/dXBsb2FkLXByb2R1/Y3Rpb24udHJhbnNp/c3Rvci5mbS9jNzA4/MDU5MTk2MDAyMjc5/NmZiZmFkMDY4NGVj/NzRmNS5qcGVn.jpg">Ralph May</podcast:person>
      <podcast:person role="Producer" href="https://www.blackhillsinfosec.com/team/ryan-poirier/">Ryan Poirier</podcast:person>
      <podcast:person role="Host" href="https://www.blackhillsinfosec.com/team/bronwen-aker/" img="https://img.transistorcdn.com/CSShIJJhZo9yPTywdOv4zlsSYFk9yVSAIU6CrsdvdY4/rs:fill:0:0:1/w:800/h:800/q:60/mb:500000/aHR0cHM6Ly9pbWct/dXBsb2FkLXByb2R1/Y3Rpb24udHJhbnNp/c3Rvci5mbS80YWIy/MWUxODE4NjA1MmRm/OTBmZmYyYzRlYmU1/N2NhOC5qcGc.jpg">Bronwen Aker</podcast:person>
      <podcast:person role="Guest" href="https://www.antisyphontraining.com/instructor/docblackburn/" img="https://img.transistorcdn.com/oG00q5sxI2fPXES4ANeTKYnwHGKHk5spzbbrbxvqpD0/rs:fill:0:0:1/w:800/h:800/q:60/mb:500000/aHR0cHM6Ly9pbWct/dXBsb2FkLXByb2R1/Y3Rpb24udHJhbnNp/c3Rvci5mbS84Njc1/MjZhOTA5ODAxYjZj/MWZjN2RjNmExNGFm/NTg4OC5qcGVn.jpg">Doc Blackburn</podcast:person>
      <podcast:transcript url="https://share.transistor.fm/s/e3b56ea6/transcription.vtt" type="text/vtt" rel="captions"/>
      <podcast:transcript url="https://share.transistor.fm/s/e3b56ea6/transcription.srt" type="application/x-subrip" rel="captions"/>
      <podcast:transcript url="https://share.transistor.fm/s/e3b56ea6/transcription.json" type="application/json" rel="captions"/>
      <podcast:transcript url="https://share.transistor.fm/s/e3b56ea6/transcription.txt" type="text/plain"/>
      <podcast:transcript url="https://share.transistor.fm/s/e3b56ea6/transcription" type="text/html"/>
      <podcast:chapters url="https://share.transistor.fm/s/e3b56ea6/chapters.json" type="application/json+chapters"/>
    </item>
    <item>
      <title>FCC Blocks Foreign-Made Routers – 2026-03-30</title>
      <itunes:season>6</itunes:season>
      <podcast:season>6</podcast:season>
      <itunes:episode>13</itunes:episode>
      <podcast:episode>13</podcast:episode>
      <itunes:title>FCC Blocks Foreign-Made Routers – 2026-03-30</itunes:title>
      <itunes:episodeType>full</itunes:episodeType>
      <guid isPermaLink="false">d939a7f2-3934-4849-8aee-ad3120e9a6b6</guid>
      <link>https://share.transistor.fm/s/961d9bc6</link>
      <description>
        <![CDATA[<p>This episode covers the FCC’s move to restrict or ban certain foreign-made networking equipment—especially routers tied to Chinese manufacturers—highlighting the potential cybersecurity risks, supply chain implications, and how the rule could affect ISPs and consumers. The hosts also discuss broader concerns around hardware trust, existing infrastructure, and what qualifies as “approved” devices under FCC guidelines, along with a brief, lighter mention of a viral robot incident making the rounds online.</p><p>Join us LIVE on Mondays, 4:30pm EST.<br>A weekly Podcast with BHIS and Friends. We discuss notable Infosec, and infosec-adjacent news stories gathered by our community news team.<br><a href="https://www.youtube.com/@BlackHillsInformationSecurity">https://www.youtube.com/@BlackHillsInformationSecurity</a></p><p>Chat with us on Discord! - <br><a href="https://discord.gg/bhis">https://discord.gg/bhis</a><br>🔴live-chat</p><p><br><strong>Chapters</strong><br></p><ul><li>(00:00) - PreShow Banter™ — Robot Handlers</li>
<li>(05:11) - FCC Blocks Foreign-Made Routers – 2026-03-30</li>
<li>(06:44) - Story # 1: FCC moves to block new foreign-made routers</li>
<li>(17:00) - Story # 2: FBI Chief Kash Patel’s Gmail Account was Hacked by Iranian Hackers</li>
<li>(20:07) - Story # 3: FancyBear Exposed: Major OPSEC Blunder Inside Russian Espionage Ops</li>
<li>(24:18) - Story # 4: LiteLLM and Telnyx compromised on PyPI: Tracing the TeamPCP supply chain campaign</li>
<li>(27:49) - Story # 4b: TeamPCP Supply Chain Campaign</li>
<li>(42:45) - Story # 5: Spylandia: How a Stretch of Florida Real Estate Has Become a Covert Corridor for Chinese and Russian Spies</li>
<li>(45:51) - Story # 6: Anthropic readies Mythos model with high cybersecurity risk</li>
<li>(57:31) - Story # 7: Google Ships WebMCP, The Browser-Based Backbone For The Agentic Web</li>
<li>(01:02:24) - Story # 8: DDR5 Memory Prices Just Took a Noticeable Dive for the First Time in Months, and Google’s TurboQuant Might Be Behind It</li>
<li>(01:04:03) - Securing the Cloud: Foundations by Andrew Krug</li>
<li>(01:04:47) - Incident Response Simplified by Patterson Cake</li>
</ul><p><br><strong>News Links</strong><br>Story # 1: <a href="https://www.pcworld.com/article/3096742/fcc-will-block-home-routers-if-theyre-made-overseas.html">FCC moves to block new foreign-made routers</a><br>Story # 2: <a href="https://cybersecuritynews.com/fbi-chief-kash-patel-gmail-hacked/">FBI Chief Kash Patel’s Gmail Account was Hacked by Iranian Hackers</a><br>Story # 3: <a href="http://ctrlaltintel.com/research/FancyBear/">FancyBear Exposed: Major OPSEC Blunder Inside Russian Espionage Ops</a><br>Story # 4: <a href="https://securitylabs.datadoghq.com/articles/litellm-compromised-pypi-teampcp-supply-chain-campaign/#responding-to-the-incident-if-youre-affected">LiteLLM and Telnyx compromised on PyPI: Tracing the TeamPCP supply chain campaign</a><br>Story # 4b: <a href="https://ramimac.me/teampcp/#teampcp">TeamPCP Supply Chain Campaign</a><br>Story # 5: <a href="https://www.vanityfair.com/news/story/spylandia-florida-spies">Spylandia: How a Stretch of Florida Real Estate Has Become a Covert Corridor for Chinese and Russian Spies</a><br>Story # 6: <a href="https://www.testingcatalog.com/anthropic-redies-powerfull-mythos-model-with-high-cybersecurity-risk/">Anthropic readies Mythos model with high cybersecurity risk</a><br>Story # 7: <a href="https://www.forbes.com/sites/joetoscano1/2026/02/19/google-ships-webmcp-the-browser-based-backbone-for-the-agentic-web/">Google Ships WebMCP, The Browser-Based Backbone For The Agentic Web</a><br>Story # 8: <a href="https://wccftech.com/ddr5-prices-just-posted-their-first-drop-in-several-months/">DDR5 Memory Prices Just Took a Noticeable Dive for the First Time in Months, and Google’s TurboQuant Might Be Behind It<br></a><br><a href="https://www.antisyphontraining.com/product/securing-the-cloud-foundations-with-andrew-krug/">Securing the Cloud: Foundations by Andrew Krug</a><br><a href="https://www.antisyphontraining.com/product/incident-response-simplified/">Incident Response Simplified by Patterson Cake</a></p><p><strong><strong>Creators &amp; Guests</strong>
<ul>
  <li><a href="https://bhisnews.transistor.fm/people/andy-pettit-nerf">Andy Pettit "Nerf"</a> - Guest</li>
  <li><a href="https://bhisnews.transistor.fm/people/andrew-krug">Andrew Krug</a> - Guest</li>
  <li><a href="https://bhisnews.transistor.fm/people/wade-wells">Wade Wells</a> - Host</li>
  <li><a href="https://bhisnews.transistor.fm/people/corey-ham">Corey Ham</a> - Host</li>
  <li><a href="https://bhisnews.transistor.fm/people/bronwen-aker">Bronwen Aker</a> - Host</li>
  <li><a href="https://bhisnews.transistor.fm/people/patterson-cake">Patterson Cake</a> - Guest</li>
  <li><a href="https://bhisnews.transistor.fm/people/ryan-poirier">Ryan Poirier</a> - Producer</li>
  <li><a href="https://bhisnews.transistor.fm/people/ralph-may">Ralph May</a> - Host</li>
</ul><br><a href="https://www.youtube.com/watch?v=kVqkBHM95JA" title="Click here to watch  this episode on YouTube.">Click here to watch  this episode on YouTube.</a><br>
</strong></p><p><strong><a href="https://share.transistor.fm/s/961d9bc6/transcript" title="Click here to view the episode transcript.">Click here to view the episode transcript.</a><br>
</strong></p><p><strong>🔗 Register for FREE Infosec Webcasts, Anti-casts &amp; Summits </strong></p><p><a href="https://poweredbybhis.com/">https://poweredbybhis.com</a></p><p><br>Brought to you by:</p><p><strong>Black Hills Information Security </strong></p><p><a href="https://www.blackhillsinfosec.com/">https://www.blackhillsinfosec.com</a></p><p><br></p><p><strong>Antisyphon Training</strong></p><p><a href="https://www.antisyphontraining.com/">https://www.antisyphontraining.com/</a></p><p><br></p><p><strong>Active Countermeasures</strong></p><p><a href="https://www.activecountermeasures.com/">https://www.activecountermeasures.com</a></p><p><br></p><p><strong>Wild West Hackin Fest</strong></p><p><a href="https://wildwesthackinfest.com/">https://wildwesthackinfest.com</a></p>]]>
      </description>
      <content:encoded>
        <![CDATA[<p>This episode covers the FCC’s move to restrict or ban certain foreign-made networking equipment—especially routers tied to Chinese manufacturers—highlighting the potential cybersecurity risks, supply chain implications, and how the rule could affect ISPs and consumers. The hosts also discuss broader concerns around hardware trust, existing infrastructure, and what qualifies as “approved” devices under FCC guidelines, along with a brief, lighter mention of a viral robot incident making the rounds online.</p><p>Join us LIVE on Mondays, 4:30pm EST.<br>A weekly Podcast with BHIS and Friends. We discuss notable Infosec, and infosec-adjacent news stories gathered by our community news team.<br><a href="https://www.youtube.com/@BlackHillsInformationSecurity">https://www.youtube.com/@BlackHillsInformationSecurity</a></p><p>Chat with us on Discord! - <br><a href="https://discord.gg/bhis">https://discord.gg/bhis</a><br>🔴live-chat</p><p><br><strong>Chapters</strong><br></p><ul><li>(00:00) - PreShow Banter™ — Robot Handlers</li>
<li>(05:11) - FCC Blocks Foreign-Made Routers – 2026-03-30</li>
<li>(06:44) - Story # 1: FCC moves to block new foreign-made routers</li>
<li>(17:00) - Story # 2: FBI Chief Kash Patel’s Gmail Account was Hacked by Iranian Hackers</li>
<li>(20:07) - Story # 3: FancyBear Exposed: Major OPSEC Blunder Inside Russian Espionage Ops</li>
<li>(24:18) - Story # 4: LiteLLM and Telnyx compromised on PyPI: Tracing the TeamPCP supply chain campaign</li>
<li>(27:49) - Story # 4b: TeamPCP Supply Chain Campaign</li>
<li>(42:45) - Story # 5: Spylandia: How a Stretch of Florida Real Estate Has Become a Covert Corridor for Chinese and Russian Spies</li>
<li>(45:51) - Story # 6: Anthropic readies Mythos model with high cybersecurity risk</li>
<li>(57:31) - Story # 7: Google Ships WebMCP, The Browser-Based Backbone For The Agentic Web</li>
<li>(01:02:24) - Story # 8: DDR5 Memory Prices Just Took a Noticeable Dive for the First Time in Months, and Google’s TurboQuant Might Be Behind It</li>
<li>(01:04:03) - Securing the Cloud: Foundations by Andrew Krug</li>
<li>(01:04:47) - Incident Response Simplified by Patterson Cake</li>
</ul><p><br><strong>News Links</strong><br>Story # 1: <a href="https://www.pcworld.com/article/3096742/fcc-will-block-home-routers-if-theyre-made-overseas.html">FCC moves to block new foreign-made routers</a><br>Story # 2: <a href="https://cybersecuritynews.com/fbi-chief-kash-patel-gmail-hacked/">FBI Chief Kash Patel’s Gmail Account was Hacked by Iranian Hackers</a><br>Story # 3: <a href="http://ctrlaltintel.com/research/FancyBear/">FancyBear Exposed: Major OPSEC Blunder Inside Russian Espionage Ops</a><br>Story # 4: <a href="https://securitylabs.datadoghq.com/articles/litellm-compromised-pypi-teampcp-supply-chain-campaign/#responding-to-the-incident-if-youre-affected">LiteLLM and Telnyx compromised on PyPI: Tracing the TeamPCP supply chain campaign</a><br>Story # 4b: <a href="https://ramimac.me/teampcp/#teampcp">TeamPCP Supply Chain Campaign</a><br>Story # 5: <a href="https://www.vanityfair.com/news/story/spylandia-florida-spies">Spylandia: How a Stretch of Florida Real Estate Has Become a Covert Corridor for Chinese and Russian Spies</a><br>Story # 6: <a href="https://www.testingcatalog.com/anthropic-redies-powerfull-mythos-model-with-high-cybersecurity-risk/">Anthropic readies Mythos model with high cybersecurity risk</a><br>Story # 7: <a href="https://www.forbes.com/sites/joetoscano1/2026/02/19/google-ships-webmcp-the-browser-based-backbone-for-the-agentic-web/">Google Ships WebMCP, The Browser-Based Backbone For The Agentic Web</a><br>Story # 8: <a href="https://wccftech.com/ddr5-prices-just-posted-their-first-drop-in-several-months/">DDR5 Memory Prices Just Took a Noticeable Dive for the First Time in Months, and Google’s TurboQuant Might Be Behind It<br></a><br><a href="https://www.antisyphontraining.com/product/securing-the-cloud-foundations-with-andrew-krug/">Securing the Cloud: Foundations by Andrew Krug</a><br><a href="https://www.antisyphontraining.com/product/incident-response-simplified/">Incident Response Simplified by Patterson Cake</a></p><p><strong><strong>Creators &amp; Guests</strong>
<ul>
  <li><a href="https://bhisnews.transistor.fm/people/andy-pettit-nerf">Andy Pettit "Nerf"</a> - Guest</li>
  <li><a href="https://bhisnews.transistor.fm/people/andrew-krug">Andrew Krug</a> - Guest</li>
  <li><a href="https://bhisnews.transistor.fm/people/wade-wells">Wade Wells</a> - Host</li>
  <li><a href="https://bhisnews.transistor.fm/people/corey-ham">Corey Ham</a> - Host</li>
  <li><a href="https://bhisnews.transistor.fm/people/bronwen-aker">Bronwen Aker</a> - Host</li>
  <li><a href="https://bhisnews.transistor.fm/people/patterson-cake">Patterson Cake</a> - Guest</li>
  <li><a href="https://bhisnews.transistor.fm/people/ryan-poirier">Ryan Poirier</a> - Producer</li>
  <li><a href="https://bhisnews.transistor.fm/people/ralph-may">Ralph May</a> - Host</li>
</ul><br><a href="https://www.youtube.com/watch?v=kVqkBHM95JA" title="Click here to watch  this episode on YouTube.">Click here to watch  this episode on YouTube.</a><br>
</strong></p><p><strong><a href="https://share.transistor.fm/s/961d9bc6/transcript" title="Click here to view the episode transcript.">Click here to view the episode transcript.</a><br>
</strong></p><p><strong>🔗 Register for FREE Infosec Webcasts, Anti-casts &amp; Summits </strong></p><p><a href="https://poweredbybhis.com/">https://poweredbybhis.com</a></p><p><br>Brought to you by:</p><p><strong>Black Hills Information Security </strong></p><p><a href="https://www.blackhillsinfosec.com/">https://www.blackhillsinfosec.com</a></p><p><br></p><p><strong>Antisyphon Training</strong></p><p><a href="https://www.antisyphontraining.com/">https://www.antisyphontraining.com/</a></p><p><br></p><p><strong>Active Countermeasures</strong></p><p><a href="https://www.activecountermeasures.com/">https://www.activecountermeasures.com</a></p><p><br></p><p><strong>Wild West Hackin Fest</strong></p><p><a href="https://wildwesthackinfest.com/">https://wildwesthackinfest.com</a></p>]]>
      </content:encoded>
      <pubDate>Wed, 01 Apr 2026 19:52:07 -0400</pubDate>
      <author>Black Hills Information Security</author>
      <enclosure url="https://media.transistor.fm/961d9bc6/a9428901.mp3" length="67116837" type="audio/mpeg"/>
      <itunes:author>Black Hills Information Security</itunes:author>
      <itunes:image href="https://img.transistorcdn.com/nT94AVlzoDeGBN3SZCVkdLjnZ10xhZFJYRvkgT2iXI0/rs:fill:0:0:1/w:1400/h:1400/q:60/mb:500000/aHR0cHM6Ly9pbWct/dXBsb2FkLXByb2R1/Y3Rpb24udHJhbnNp/c3Rvci5mbS9kYzM5/NGM3OGE4N2ZhNDdh/MmM2OWE3YzY2ZDYx/YWMyNy5qcGc.jpg"/>
      <itunes:duration>4041</itunes:duration>
      <itunes:summary>
        <![CDATA[<p>This episode covers the FCC’s move to restrict or ban certain foreign-made networking equipment—especially routers tied to Chinese manufacturers—highlighting the potential cybersecurity risks, supply chain implications, and how the rule could affect ISPs and consumers. The hosts also discuss broader concerns around hardware trust, existing infrastructure, and what qualifies as “approved” devices under FCC guidelines, along with a brief, lighter mention of a viral robot incident making the rounds online.</p><p>Join us LIVE on Mondays, 4:30pm EST.<br>A weekly Podcast with BHIS and Friends. We discuss notable Infosec, and infosec-adjacent news stories gathered by our community news team.<br><a href="https://www.youtube.com/@BlackHillsInformationSecurity">https://www.youtube.com/@BlackHillsInformationSecurity</a></p><p>Chat with us on Discord! - <br><a href="https://discord.gg/bhis">https://discord.gg/bhis</a><br>🔴live-chat</p><p><br><strong>Chapters</strong><br></p><ul><li>(00:00) - PreShow Banter™ — Robot Handlers</li>
<li>(05:11) - FCC Blocks Foreign-Made Routers – 2026-03-30</li>
<li>(06:44) - Story # 1: FCC moves to block new foreign-made routers</li>
<li>(17:00) - Story # 2: FBI Chief Kash Patel’s Gmail Account was Hacked by Iranian Hackers</li>
<li>(20:07) - Story # 3: FancyBear Exposed: Major OPSEC Blunder Inside Russian Espionage Ops</li>
<li>(24:18) - Story # 4: LiteLLM and Telnyx compromised on PyPI: Tracing the TeamPCP supply chain campaign</li>
<li>(27:49) - Story # 4b: TeamPCP Supply Chain Campaign</li>
<li>(42:45) - Story # 5: Spylandia: How a Stretch of Florida Real Estate Has Become a Covert Corridor for Chinese and Russian Spies</li>
<li>(45:51) - Story # 6: Anthropic readies Mythos model with high cybersecurity risk</li>
<li>(57:31) - Story # 7: Google Ships WebMCP, The Browser-Based Backbone For The Agentic Web</li>
<li>(01:02:24) - Story # 8: DDR5 Memory Prices Just Took a Noticeable Dive for the First Time in Months, and Google’s TurboQuant Might Be Behind It</li>
<li>(01:04:03) - Securing the Cloud: Foundations by Andrew Krug</li>
<li>(01:04:47) - Incident Response Simplified by Patterson Cake</li>
</ul><p><br><strong>News Links</strong><br>Story # 1: <a href="https://www.pcworld.com/article/3096742/fcc-will-block-home-routers-if-theyre-made-overseas.html">FCC moves to block new foreign-made routers</a><br>Story # 2: <a href="https://cybersecuritynews.com/fbi-chief-kash-patel-gmail-hacked/">FBI Chief Kash Patel’s Gmail Account was Hacked by Iranian Hackers</a><br>Story # 3: <a href="http://ctrlaltintel.com/research/FancyBear/">FancyBear Exposed: Major OPSEC Blunder Inside Russian Espionage Ops</a><br>Story # 4: <a href="https://securitylabs.datadoghq.com/articles/litellm-compromised-pypi-teampcp-supply-chain-campaign/#responding-to-the-incident-if-youre-affected">LiteLLM and Telnyx compromised on PyPI: Tracing the TeamPCP supply chain campaign</a><br>Story # 4b: <a href="https://ramimac.me/teampcp/#teampcp">TeamPCP Supply Chain Campaign</a><br>Story # 5: <a href="https://www.vanityfair.com/news/story/spylandia-florida-spies">Spylandia: How a Stretch of Florida Real Estate Has Become a Covert Corridor for Chinese and Russian Spies</a><br>Story # 6: <a href="https://www.testingcatalog.com/anthropic-redies-powerfull-mythos-model-with-high-cybersecurity-risk/">Anthropic readies Mythos model with high cybersecurity risk</a><br>Story # 7: <a href="https://www.forbes.com/sites/joetoscano1/2026/02/19/google-ships-webmcp-the-browser-based-backbone-for-the-agentic-web/">Google Ships WebMCP, The Browser-Based Backbone For The Agentic Web</a><br>Story # 8: <a href="https://wccftech.com/ddr5-prices-just-posted-their-first-drop-in-several-months/">DDR5 Memory Prices Just Took a Noticeable Dive for the First Time in Months, and Google’s TurboQuant Might Be Behind It<br></a><br><a href="https://www.antisyphontraining.com/product/securing-the-cloud-foundations-with-andrew-krug/">Securing the Cloud: Foundations by Andrew Krug</a><br><a href="https://www.antisyphontraining.com/product/incident-response-simplified/">Incident Response Simplified by Patterson Cake</a></p><p><strong><strong>Creators &amp; Guests</strong>
<ul>
  <li><a href="https://bhisnews.transistor.fm/people/andy-pettit-nerf">Andy Pettit "Nerf"</a> - Guest</li>
  <li><a href="https://bhisnews.transistor.fm/people/andrew-krug">Andrew Krug</a> - Guest</li>
  <li><a href="https://bhisnews.transistor.fm/people/wade-wells">Wade Wells</a> - Host</li>
  <li><a href="https://bhisnews.transistor.fm/people/corey-ham">Corey Ham</a> - Host</li>
  <li><a href="https://bhisnews.transistor.fm/people/bronwen-aker">Bronwen Aker</a> - Host</li>
  <li><a href="https://bhisnews.transistor.fm/people/patterson-cake">Patterson Cake</a> - Guest</li>
  <li><a href="https://bhisnews.transistor.fm/people/ryan-poirier">Ryan Poirier</a> - Producer</li>
  <li><a href="https://bhisnews.transistor.fm/people/ralph-may">Ralph May</a> - Host</li>
</ul><br><a href="https://www.youtube.com/watch?v=kVqkBHM95JA" title="Click here to watch  this episode on YouTube.">Click here to watch  this episode on YouTube.</a><br>
</strong></p><p><strong><a href="https://share.transistor.fm/s/961d9bc6/transcript" title="Click here to view the episode transcript.">Click here to view the episode transcript.</a><br>
</strong></p><p><strong>🔗 Register for FREE Infosec Webcasts, Anti-casts &amp; Summits </strong></p><p><a href="https://poweredbybhis.com/">https://poweredbybhis.com</a></p><p><br>Brought to you by:</p><p><strong>Black Hills Information Security </strong></p><p><a href="https://www.blackhillsinfosec.com/">https://www.blackhillsinfosec.com</a></p><p><br></p><p><strong>Antisyphon Training</strong></p><p><a href="https://www.antisyphontraining.com/">https://www.antisyphontraining.com/</a></p><p><br></p><p><strong>Active Countermeasures</strong></p><p><a href="https://www.activecountermeasures.com/">https://www.activecountermeasures.com</a></p><p><br></p><p><strong>Wild West Hackin Fest</strong></p><p><a href="https://wildwesthackinfest.com/">https://wildwesthackinfest.com</a></p>]]>
      </itunes:summary>
      <itunes:keywords>Infosec,Cybersecurity,news</itunes:keywords>
      <itunes:explicit>No</itunes:explicit>
      <podcast:person role="Guest" href="https://bhisnews.transistor.fm/people/andy-pettit-nerf" img="https://img.transistorcdn.com/Hm7-lytrUVM163vtKy6oq20J186th0VCEBKYtoBJ7X4/rs:fill:0:0:1/w:800/h:800/q:60/mb:500000/aHR0cHM6Ly9pbWct/dXBsb2FkLXByb2R1/Y3Rpb24udHJhbnNp/c3Rvci5mbS85NjNk/NWE4OWY5ODFhY2Yx/ZTJlMTc1MzAxMGVj/Mzg4Mi5wbmc.jpg">Andy Pettit "Nerf"</podcast:person>
      <podcast:person role="Guest" href="https://www.andrewkrug.com" img="https://img.transistorcdn.com/ss5Tc5KT-W5kyWM5_AzDREn6DUhpwIYV5yw9jjfsJhw/rs:fill:0:0:1/w:800/h:800/q:60/mb:500000/aHR0cHM6Ly9pbWct/dXBsb2FkLXByb2R1/Y3Rpb24udHJhbnNp/c3Rvci5mbS8wZTg5/YjQ2YjkwMzEyZGRi/YzYwZjdjNTA2N2Fk/ODM4ZS5qcGc.jpg">Andrew Krug</podcast:person>
      <podcast:person role="Host" href="https://www.bsidessd.org/" img="https://img.transistorcdn.com/KeYB5iZ31d5IGBEuYGSV1SOcM5ZsEQ3dGI4HgjvyVVE/rs:fill:0:0:1/w:800/h:800/q:60/mb:500000/aHR0cHM6Ly9pbWct/dXBsb2FkLXByb2R1/Y3Rpb24udHJhbnNp/c3Rvci5mbS82ZGRm/ZWU5MGU5YzJiZjU0/MTVmZTU0OWExYTg4/OGFhMi5wbmc.jpg">Wade Wells</podcast:person>
      <podcast:person role="Host" href="https://www.blackhillsinfosec.com/team/corey-ham/" img="https://img.transistorcdn.com/Q9BaWxLnY_zU_A-eKpfV22Y1AiBI64lLxLJP19iD_lM/rs:fill:0:0:1/w:800/h:800/q:60/mb:500000/aHR0cHM6Ly9pbWct/dXBsb2FkLXByb2R1/Y3Rpb24udHJhbnNp/c3Rvci5mbS84MTMx/N2JlN2IzZWI2MDcz/MGU0NTk5NGU0N2Iw/NzE2Yy5qcGc.jpg">Corey Ham</podcast:person>
      <podcast:person role="Host" href="https://www.blackhillsinfosec.com/team/bronwen-aker/" img="https://img.transistorcdn.com/CSShIJJhZo9yPTywdOv4zlsSYFk9yVSAIU6CrsdvdY4/rs:fill:0:0:1/w:800/h:800/q:60/mb:500000/aHR0cHM6Ly9pbWct/dXBsb2FkLXByb2R1/Y3Rpb24udHJhbnNp/c3Rvci5mbS80YWIy/MWUxODE4NjA1MmRm/OTBmZmYyYzRlYmU1/N2NhOC5qcGc.jpg">Bronwen Aker</podcast:person>
      <podcast:person role="Guest" href="https://www.blackhillsinfosec.com/team/patterson-cake/" img="https://img.transistorcdn.com/txG1BaGKccBjmDi7vIFEQtDXAyCKo4jzcd6DCQXhc1M/rs:fill:0:0:1/w:800/h:800/q:60/mb:500000/aHR0cHM6Ly9pbWct/dXBsb2FkLXByb2R1/Y3Rpb24udHJhbnNp/c3Rvci5mbS82MmI1/ZDliNzI5NGNmNzEw/YmEzYjZmNTllMGYw/NDNiYS5qcGc.jpg">Patterson Cake</podcast:person>
      <podcast:person role="Producer" href="https://www.blackhillsinfosec.com/team/ryan-poirier/">Ryan Poirier</podcast:person>
      <podcast:person role="Host" href="https://mwgroup.io/about/" img="https://img.transistorcdn.com/_dioeUsMeIlo4vZ0dPQkQ-f-tkMHllpfM4P-4SpyW8Q/rs:fill:0:0:1/w:800/h:800/q:60/mb:500000/aHR0cHM6Ly9pbWct/dXBsb2FkLXByb2R1/Y3Rpb24udHJhbnNp/c3Rvci5mbS9jNzA4/MDU5MTk2MDAyMjc5/NmZiZmFkMDY4NGVj/NzRmNS5qcGVn.jpg">Ralph May</podcast:person>
      <podcast:transcript url="https://share.transistor.fm/s/961d9bc6/transcription.vtt" type="text/vtt" rel="captions"/>
      <podcast:transcript url="https://share.transistor.fm/s/961d9bc6/transcription.srt" type="application/x-subrip" rel="captions"/>
      <podcast:transcript url="https://share.transistor.fm/s/961d9bc6/transcription.json" type="application/json" rel="captions"/>
      <podcast:transcript url="https://share.transistor.fm/s/961d9bc6/transcription.txt" type="text/plain"/>
      <podcast:transcript url="https://share.transistor.fm/s/961d9bc6/transcription" type="text/html"/>
      <podcast:chapters url="https://share.transistor.fm/s/961d9bc6/chapters.json" type="application/json+chapters"/>
    </item>
    <item>
      <title>Pentagon Plans to Train AI With Classified Data –  2026-03-23</title>
      <itunes:season>6</itunes:season>
      <podcast:season>6</podcast:season>
      <itunes:episode>12</itunes:episode>
      <podcast:episode>12</podcast:episode>
      <itunes:title>Pentagon Plans to Train AI With Classified Data –  2026-03-23</itunes:title>
      <itunes:episodeType>full</itunes:episodeType>
      <guid isPermaLink="false">16760002-839a-4a2d-9329-9b6daf1796a4</guid>
      <link>https://share.transistor.fm/s/835adac7</link>
      <description>
        <![CDATA[<p>This episode covers a range of cybersecurity and AI-related news, including how Pokémon Go players may have unknowingly helped train delivery robots using massive image datasets. The hosts also discuss the Pentagon’s reported plans to train AI systems on classified data and the potential risks of exposing sensitive information. Additional topics include major data breaches (such as a third-party breach impacting Crunchyroll user data), ongoing challenges in cybersecurity practices, evolving AI security concerns, and real-world examples of exploits and vulnerabilities affecting mobile devices and organizations.</p><p>Join us LIVE on Mondays, 4:30pm EST.<br>A weekly Podcast with BHIS and Friends. We discuss notable Infosec, and infosec-adjacent news stories gathered by our community news team.<br><a href="https://www.youtube.com/@BlackHillsInformationSecurity">https://www.youtube.com/@BlackHillsInformationSecurity</a></p><p>Chat with us on Discord! - <br><a href="https://discord.gg/bhis">https://discord.gg/bhis</a><br>🔴live-chat</p><p><br><strong>Chapters</strong><br></p><ul><li>(00:00) - PreShow Banter™ — Easier Than Printers</li>
<li>(05:20) - Pentagon Plans to Train AI With Classified Data – BHIS - Talkin' Bout [infosec] News 2026-03-23</li>
<li>(06:38) - Story # 1: Sears Exposed AI Chatbot Phone Calls and Text Chats to Anyone on the Web</li>
<li>(07:38) - Story # 1b: ALT Link - Sears Exposed AI Chatbot Phone Calls and Text Chats to Anyone on the Web</li>
<li>(15:35) - Story # 2: Federal cyber experts called Microsoft’s cloud a “pile of shit,” approved it anyway</li>
<li>(24:31) - Story # 3: The Pentagon is planning for AI companies to train on classified data, defense official says</li>
<li>(34:04) - Story # 4: CISA Urges Endpoint Management System Hardening After Cyberattack Against US Organization</li>
<li>(37:50) - Story # 5: Warning: Your AI-Generated Password Is a Major Security Risk. Here’s What to Use Instead</li>
<li>(42:21) - Story # 6: CISA warns of active exploitation of Microsoft SharePoint vulnerability (CVE-2026-20963)</li>
<li>(49:57) - Story # 7: Massive China Data Leak: Hackers Access 10 Petabytes of Weapons Testing Data</li>
<li>(51:28) - Story # 8: Anime fans' credit cards might be stolen from Sony streamer Crunchyroll</li>
<li>(55:03) - Story # 9: The Proliferation of DarkSword: iOS Exploit Chain Adopted by Multiple Threat Actors</li>
</ul><br><strong>Links</strong><br>Story # 1: <a href="https://www.wired.com/story/sears-exposed-ai-chatbot-phone-calls-and-text-chats-to-anyone-on-the-web/">Sears Exposed AI Chatbot Phone Calls and Text Chats to Anyone on the Web</a><br>Story # 1b: <a href="https://smry.ai/www.wired.com/story/sears-exposed-ai-chatbot-phone-calls-and-text-chats-to-anyone-on-the-web">ALT Link - Sears Exposed AI Chatbot Phone Calls and Text Chats to Anyone on the Web</a><br>Story # 2: <a href="https://arstechnica.com/information-technology/2026/03/federal-cyber-experts-called-microsofts-cloud-a-pile-of-shit-approved-it-anyway/">Federal cyber experts called Microsoft’s cloud a “pile of shit,” approved it anyway</a><br>Story # 3: <a href="https://www.technologyreview.com/2026/03/17/1134351/the-pentagon-is-planning-for-ai-companies-to-train-on-classified-data-defense-official-says/">The Pentagon is planning for AI companies to train on classified data, defense official says</a><br>Story # 4: <a href="https://www.cisa.gov/news-events/alerts/2026/03/18/cisa-urges-endpoint-management-system-hardening-after-cyberattack-against-us-organization">CISA Urges Endpoint Management System Hardening After Cyberattack Against US Organization</a><br>Story # 5: <a href="https://www.rd.com/article/ai-password-security-risk/">Warning: Your AI-Generated Password Is a Major Security Risk. Here’s What to Use Instead</a><br>Story # 6: <a href="https://www.helpnetsecurity.com/2026/03/19/sharepoint-vulnerability-cve-2026-20963-exploited/">CISA warns of active exploitation of Microsoft SharePoint vulnerability (CVE-2026-20963)</a><br>Story # 7: <a href="https://militarnyi.com/en/news/massive-china-data-leak-hackers-access-10-petabytes-of-weapons-testing-data/">Massive China Data Leak: Hackers Access 10 Petabytes of Weapons Testing Data</a><br>Story # 8: <a href="https://cybernews.com/security/crunchyroll-data-breach-telus-hack-users/">Anime fans’ credit cards might be stolen from Sony streamer Crunchyroll</a><br>Story # 9: <a href="https://cloud.google.com/blog/topics/threat-intelligence/darksword-ios-exploit-chain">The Proliferation of DarkSword: iOS Exploit Chain Adopted by Multiple Threat Actors</a><p><strong><strong>Creators &amp; Guests</strong>
<ul>
  <li><a href="https://bhisnews.transistor.fm/people/john-strand-8c127856-b150-4e33-af6d-5b9f7f041a37">John Strand</a> - Host</li>
  <li><a href="https://bhisnews.transistor.fm/people/ralph-may">Ralph May</a> - Host</li>
  <li><a href="https://bhisnews.transistor.fm/people/chadd-watson">Chadd Watson</a> - Guest</li>
  <li><a href="https://bhisnews.transistor.fm/people/wade-wells">Wade Wells</a> - Host</li>
  <li><a href="https://bhisnews.transistor.fm/people/alex-minster-belouve">Alex Minster "Belouve"</a> - Guest</li>
  <li><a href="https://bhisnews.transistor.fm/people/hayden-covington">Hayden Covington</a> - Host</li>
  <li><a href="https://bhisnews.transistor.fm/people/bruce-potter">Bruce Potter</a> - Guest</li>
  <li><a href="https://bhisnews.transistor.fm/people/ryan-poirier">Ryan Poirier</a> - Producer</li>
</ul><br><a href="https://www.youtube.com/watch?v=ImDdWIS4bqU" title="Click here to watch  this episode on YouTube.">Click here to watch  this episode on YouTube.</a><br>
</strong></p><p><strong><a href="https://share.transistor.fm/s/835adac7/transcript" title="Click here to view the episode transcript.">Click here to view the episode transcript.</a><br>
</strong></p><p><strong>🔗 Register for FREE Infosec Webcasts, Anti-casts &amp; Summits </strong></p><p><a href="https://poweredbybhis.com/">https://poweredbybhis.com</a></p><p><br>Brought to you by:</p><p><strong>Black Hills Information Security </strong></p><p><a href="https://www.blackhillsinfosec.com/">https://www.blackhillsinfosec.com</a></p><p><br></p><p><strong>Antisyphon Training</strong></p><p><a href="https://www.antisyphontraining.com/">https://www.antisyphontraining.com/</a></p><p><br></p><p><strong>Active Countermeasures</strong></p><p><a href="https://www.activecountermeasures.com/">https://www.activecountermeasures.com</a></p><p><br></p><p><strong>Wild West Hackin Fest</strong></p><p><a href="https://wildwesthackinfest.com/">https://wildwesthackinfest.com</a></p>]]>
      </description>
      <content:encoded>
        <![CDATA[<p>This episode covers a range of cybersecurity and AI-related news, including how Pokémon Go players may have unknowingly helped train delivery robots using massive image datasets. The hosts also discuss the Pentagon’s reported plans to train AI systems on classified data and the potential risks of exposing sensitive information. Additional topics include major data breaches (such as a third-party breach impacting Crunchyroll user data), ongoing challenges in cybersecurity practices, evolving AI security concerns, and real-world examples of exploits and vulnerabilities affecting mobile devices and organizations.</p><p>Join us LIVE on Mondays, 4:30pm EST.<br>A weekly Podcast with BHIS and Friends. We discuss notable Infosec, and infosec-adjacent news stories gathered by our community news team.<br><a href="https://www.youtube.com/@BlackHillsInformationSecurity">https://www.youtube.com/@BlackHillsInformationSecurity</a></p><p>Chat with us on Discord! - <br><a href="https://discord.gg/bhis">https://discord.gg/bhis</a><br>🔴live-chat</p><p><br><strong>Chapters</strong><br></p><ul><li>(00:00) - PreShow Banter™ — Easier Than Printers</li>
<li>(05:20) - Pentagon Plans to Train AI With Classified Data – BHIS - Talkin' Bout [infosec] News 2026-03-23</li>
<li>(06:38) - Story # 1: Sears Exposed AI Chatbot Phone Calls and Text Chats to Anyone on the Web</li>
<li>(07:38) - Story # 1b: ALT Link - Sears Exposed AI Chatbot Phone Calls and Text Chats to Anyone on the Web</li>
<li>(15:35) - Story # 2: Federal cyber experts called Microsoft’s cloud a “pile of shit,” approved it anyway</li>
<li>(24:31) - Story # 3: The Pentagon is planning for AI companies to train on classified data, defense official says</li>
<li>(34:04) - Story # 4: CISA Urges Endpoint Management System Hardening After Cyberattack Against US Organization</li>
<li>(37:50) - Story # 5: Warning: Your AI-Generated Password Is a Major Security Risk. Here’s What to Use Instead</li>
<li>(42:21) - Story # 6: CISA warns of active exploitation of Microsoft SharePoint vulnerability (CVE-2026-20963)</li>
<li>(49:57) - Story # 7: Massive China Data Leak: Hackers Access 10 Petabytes of Weapons Testing Data</li>
<li>(51:28) - Story # 8: Anime fans' credit cards might be stolen from Sony streamer Crunchyroll</li>
<li>(55:03) - Story # 9: The Proliferation of DarkSword: iOS Exploit Chain Adopted by Multiple Threat Actors</li>
</ul><br><strong>Links</strong><br>Story # 1: <a href="https://www.wired.com/story/sears-exposed-ai-chatbot-phone-calls-and-text-chats-to-anyone-on-the-web/">Sears Exposed AI Chatbot Phone Calls and Text Chats to Anyone on the Web</a><br>Story # 1b: <a href="https://smry.ai/www.wired.com/story/sears-exposed-ai-chatbot-phone-calls-and-text-chats-to-anyone-on-the-web">ALT Link - Sears Exposed AI Chatbot Phone Calls and Text Chats to Anyone on the Web</a><br>Story # 2: <a href="https://arstechnica.com/information-technology/2026/03/federal-cyber-experts-called-microsofts-cloud-a-pile-of-shit-approved-it-anyway/">Federal cyber experts called Microsoft’s cloud a “pile of shit,” approved it anyway</a><br>Story # 3: <a href="https://www.technologyreview.com/2026/03/17/1134351/the-pentagon-is-planning-for-ai-companies-to-train-on-classified-data-defense-official-says/">The Pentagon is planning for AI companies to train on classified data, defense official says</a><br>Story # 4: <a href="https://www.cisa.gov/news-events/alerts/2026/03/18/cisa-urges-endpoint-management-system-hardening-after-cyberattack-against-us-organization">CISA Urges Endpoint Management System Hardening After Cyberattack Against US Organization</a><br>Story # 5: <a href="https://www.rd.com/article/ai-password-security-risk/">Warning: Your AI-Generated Password Is a Major Security Risk. Here’s What to Use Instead</a><br>Story # 6: <a href="https://www.helpnetsecurity.com/2026/03/19/sharepoint-vulnerability-cve-2026-20963-exploited/">CISA warns of active exploitation of Microsoft SharePoint vulnerability (CVE-2026-20963)</a><br>Story # 7: <a href="https://militarnyi.com/en/news/massive-china-data-leak-hackers-access-10-petabytes-of-weapons-testing-data/">Massive China Data Leak: Hackers Access 10 Petabytes of Weapons Testing Data</a><br>Story # 8: <a href="https://cybernews.com/security/crunchyroll-data-breach-telus-hack-users/">Anime fans’ credit cards might be stolen from Sony streamer Crunchyroll</a><br>Story # 9: <a href="https://cloud.google.com/blog/topics/threat-intelligence/darksword-ios-exploit-chain">The Proliferation of DarkSword: iOS Exploit Chain Adopted by Multiple Threat Actors</a><p><strong><strong>Creators &amp; Guests</strong>
<ul>
  <li><a href="https://bhisnews.transistor.fm/people/john-strand-8c127856-b150-4e33-af6d-5b9f7f041a37">John Strand</a> - Host</li>
  <li><a href="https://bhisnews.transistor.fm/people/ralph-may">Ralph May</a> - Host</li>
  <li><a href="https://bhisnews.transistor.fm/people/chadd-watson">Chadd Watson</a> - Guest</li>
  <li><a href="https://bhisnews.transistor.fm/people/wade-wells">Wade Wells</a> - Host</li>
  <li><a href="https://bhisnews.transistor.fm/people/alex-minster-belouve">Alex Minster "Belouve"</a> - Guest</li>
  <li><a href="https://bhisnews.transistor.fm/people/hayden-covington">Hayden Covington</a> - Host</li>
  <li><a href="https://bhisnews.transistor.fm/people/bruce-potter">Bruce Potter</a> - Guest</li>
  <li><a href="https://bhisnews.transistor.fm/people/ryan-poirier">Ryan Poirier</a> - Producer</li>
</ul><br><a href="https://www.youtube.com/watch?v=ImDdWIS4bqU" title="Click here to watch  this episode on YouTube.">Click here to watch  this episode on YouTube.</a><br>
</strong></p><p><strong><a href="https://share.transistor.fm/s/835adac7/transcript" title="Click here to view the episode transcript.">Click here to view the episode transcript.</a><br>
</strong></p><p><strong>🔗 Register for FREE Infosec Webcasts, Anti-casts &amp; Summits </strong></p><p><a href="https://poweredbybhis.com/">https://poweredbybhis.com</a></p><p><br>Brought to you by:</p><p><strong>Black Hills Information Security </strong></p><p><a href="https://www.blackhillsinfosec.com/">https://www.blackhillsinfosec.com</a></p><p><br></p><p><strong>Antisyphon Training</strong></p><p><a href="https://www.antisyphontraining.com/">https://www.antisyphontraining.com/</a></p><p><br></p><p><strong>Active Countermeasures</strong></p><p><a href="https://www.activecountermeasures.com/">https://www.activecountermeasures.com</a></p><p><br></p><p><strong>Wild West Hackin Fest</strong></p><p><a href="https://wildwesthackinfest.com/">https://wildwesthackinfest.com</a></p>]]>
      </content:encoded>
      <pubDate>Fri, 27 Mar 2026 14:01:35 -0400</pubDate>
      <author>Black Hills Information Security</author>
      <enclosure url="https://media.transistor.fm/835adac7/f9494f79.mp3" length="64126227" type="audio/mpeg"/>
      <itunes:author>Black Hills Information Security</itunes:author>
      <itunes:image href="https://img.transistorcdn.com/pu1PzajwWSEtAk0qHxqW91qf9zDNhUMEyY0mCetbYzE/rs:fill:0:0:1/w:1400/h:1400/q:60/mb:500000/aHR0cHM6Ly9pbWct/dXBsb2FkLXByb2R1/Y3Rpb24udHJhbnNp/c3Rvci5mbS85ODUw/MTE3NzIwYjMyOTRk/OTQwYThiNzkwY2Jh/ZjcxMi5qcGc.jpg"/>
      <itunes:duration>3871</itunes:duration>
      <itunes:summary>
        <![CDATA[<p>This episode covers a range of cybersecurity and AI-related news, including how Pokémon Go players may have unknowingly helped train delivery robots using massive image datasets. The hosts also discuss the Pentagon’s reported plans to train AI systems on classified data and the potential risks of exposing sensitive information. Additional topics include major data breaches (such as a third-party breach impacting Crunchyroll user data), ongoing challenges in cybersecurity practices, evolving AI security concerns, and real-world examples of exploits and vulnerabilities affecting mobile devices and organizations.</p><p>Join us LIVE on Mondays, 4:30pm EST.<br>A weekly Podcast with BHIS and Friends. We discuss notable Infosec, and infosec-adjacent news stories gathered by our community news team.<br><a href="https://www.youtube.com/@BlackHillsInformationSecurity">https://www.youtube.com/@BlackHillsInformationSecurity</a></p><p>Chat with us on Discord! - <br><a href="https://discord.gg/bhis">https://discord.gg/bhis</a><br>🔴live-chat</p><p><br><strong>Chapters</strong><br></p><ul><li>(00:00) - PreShow Banter™ — Easier Than Printers</li>
<li>(05:20) - Pentagon Plans to Train AI With Classified Data – BHIS - Talkin' Bout [infosec] News 2026-03-23</li>
<li>(06:38) - Story # 1: Sears Exposed AI Chatbot Phone Calls and Text Chats to Anyone on the Web</li>
<li>(07:38) - Story # 1b: ALT Link - Sears Exposed AI Chatbot Phone Calls and Text Chats to Anyone on the Web</li>
<li>(15:35) - Story # 2: Federal cyber experts called Microsoft’s cloud a “pile of shit,” approved it anyway</li>
<li>(24:31) - Story # 3: The Pentagon is planning for AI companies to train on classified data, defense official says</li>
<li>(34:04) - Story # 4: CISA Urges Endpoint Management System Hardening After Cyberattack Against US Organization</li>
<li>(37:50) - Story # 5: Warning: Your AI-Generated Password Is a Major Security Risk. Here’s What to Use Instead</li>
<li>(42:21) - Story # 6: CISA warns of active exploitation of Microsoft SharePoint vulnerability (CVE-2026-20963)</li>
<li>(49:57) - Story # 7: Massive China Data Leak: Hackers Access 10 Petabytes of Weapons Testing Data</li>
<li>(51:28) - Story # 8: Anime fans' credit cards might be stolen from Sony streamer Crunchyroll</li>
<li>(55:03) - Story # 9: The Proliferation of DarkSword: iOS Exploit Chain Adopted by Multiple Threat Actors</li>
</ul><br><strong>Links</strong><br>Story # 1: <a href="https://www.wired.com/story/sears-exposed-ai-chatbot-phone-calls-and-text-chats-to-anyone-on-the-web/">Sears Exposed AI Chatbot Phone Calls and Text Chats to Anyone on the Web</a><br>Story # 1b: <a href="https://smry.ai/www.wired.com/story/sears-exposed-ai-chatbot-phone-calls-and-text-chats-to-anyone-on-the-web">ALT Link - Sears Exposed AI Chatbot Phone Calls and Text Chats to Anyone on the Web</a><br>Story # 2: <a href="https://arstechnica.com/information-technology/2026/03/federal-cyber-experts-called-microsofts-cloud-a-pile-of-shit-approved-it-anyway/">Federal cyber experts called Microsoft’s cloud a “pile of shit,” approved it anyway</a><br>Story # 3: <a href="https://www.technologyreview.com/2026/03/17/1134351/the-pentagon-is-planning-for-ai-companies-to-train-on-classified-data-defense-official-says/">The Pentagon is planning for AI companies to train on classified data, defense official says</a><br>Story # 4: <a href="https://www.cisa.gov/news-events/alerts/2026/03/18/cisa-urges-endpoint-management-system-hardening-after-cyberattack-against-us-organization">CISA Urges Endpoint Management System Hardening After Cyberattack Against US Organization</a><br>Story # 5: <a href="https://www.rd.com/article/ai-password-security-risk/">Warning: Your AI-Generated Password Is a Major Security Risk. Here’s What to Use Instead</a><br>Story # 6: <a href="https://www.helpnetsecurity.com/2026/03/19/sharepoint-vulnerability-cve-2026-20963-exploited/">CISA warns of active exploitation of Microsoft SharePoint vulnerability (CVE-2026-20963)</a><br>Story # 7: <a href="https://militarnyi.com/en/news/massive-china-data-leak-hackers-access-10-petabytes-of-weapons-testing-data/">Massive China Data Leak: Hackers Access 10 Petabytes of Weapons Testing Data</a><br>Story # 8: <a href="https://cybernews.com/security/crunchyroll-data-breach-telus-hack-users/">Anime fans’ credit cards might be stolen from Sony streamer Crunchyroll</a><br>Story # 9: <a href="https://cloud.google.com/blog/topics/threat-intelligence/darksword-ios-exploit-chain">The Proliferation of DarkSword: iOS Exploit Chain Adopted by Multiple Threat Actors</a><p><strong><strong>Creators &amp; Guests</strong>
<ul>
  <li><a href="https://bhisnews.transistor.fm/people/john-strand-8c127856-b150-4e33-af6d-5b9f7f041a37">John Strand</a> - Host</li>
  <li><a href="https://bhisnews.transistor.fm/people/ralph-may">Ralph May</a> - Host</li>
  <li><a href="https://bhisnews.transistor.fm/people/chadd-watson">Chadd Watson</a> - Guest</li>
  <li><a href="https://bhisnews.transistor.fm/people/wade-wells">Wade Wells</a> - Host</li>
  <li><a href="https://bhisnews.transistor.fm/people/alex-minster-belouve">Alex Minster "Belouve"</a> - Guest</li>
  <li><a href="https://bhisnews.transistor.fm/people/hayden-covington">Hayden Covington</a> - Host</li>
  <li><a href="https://bhisnews.transistor.fm/people/bruce-potter">Bruce Potter</a> - Guest</li>
  <li><a href="https://bhisnews.transistor.fm/people/ryan-poirier">Ryan Poirier</a> - Producer</li>
</ul><br><a href="https://www.youtube.com/watch?v=ImDdWIS4bqU" title="Click here to watch  this episode on YouTube.">Click here to watch  this episode on YouTube.</a><br>
</strong></p><p><strong><a href="https://share.transistor.fm/s/835adac7/transcript" title="Click here to view the episode transcript.">Click here to view the episode transcript.</a><br>
</strong></p><p><strong>🔗 Register for FREE Infosec Webcasts, Anti-casts &amp; Summits </strong></p><p><a href="https://poweredbybhis.com/">https://poweredbybhis.com</a></p><p><br>Brought to you by:</p><p><strong>Black Hills Information Security </strong></p><p><a href="https://www.blackhillsinfosec.com/">https://www.blackhillsinfosec.com</a></p><p><br></p><p><strong>Antisyphon Training</strong></p><p><a href="https://www.antisyphontraining.com/">https://www.antisyphontraining.com/</a></p><p><br></p><p><strong>Active Countermeasures</strong></p><p><a href="https://www.activecountermeasures.com/">https://www.activecountermeasures.com</a></p><p><br></p><p><strong>Wild West Hackin Fest</strong></p><p><a href="https://wildwesthackinfest.com/">https://wildwesthackinfest.com</a></p>]]>
      </itunes:summary>
      <itunes:keywords>Infosec,Cybersecurity,news</itunes:keywords>
      <itunes:explicit>No</itunes:explicit>
      <podcast:person role="Host" href="https://www.blackhillsinfosec.com/team/john-strand/" img="https://img.transistorcdn.com/NUqk_fUpMRKpGIokj-WgaiALdQtlImwADID3aNogGds/rs:fill:0:0:1/w:800/h:800/q:60/mb:500000/aHR0cHM6Ly9pbWct/dXBsb2FkLXByb2R1/Y3Rpb24udHJhbnNp/c3Rvci5mbS84Y2Ji/YmMyMzRlMDM2Nzdi/YmNlYjhlZDQwZmM4/MmJlYy5qcGc.jpg">John Strand</podcast:person>
      <podcast:person role="Host" href="https://mwgroup.io/about/" img="https://img.transistorcdn.com/_dioeUsMeIlo4vZ0dPQkQ-f-tkMHllpfM4P-4SpyW8Q/rs:fill:0:0:1/w:800/h:800/q:60/mb:500000/aHR0cHM6Ly9pbWct/dXBsb2FkLXByb2R1/Y3Rpb24udHJhbnNp/c3Rvci5mbS9jNzA4/MDU5MTk2MDAyMjc5/NmZiZmFkMDY4NGVj/NzRmNS5qcGVn.jpg">Ralph May</podcast:person>
      <podcast:person role="Guest" href="https://bhisnews.transistor.fm/people/chadd-watson">Chadd Watson</podcast:person>
      <podcast:person role="Host" href="https://www.bsidessd.org/" img="https://img.transistorcdn.com/KeYB5iZ31d5IGBEuYGSV1SOcM5ZsEQ3dGI4HgjvyVVE/rs:fill:0:0:1/w:800/h:800/q:60/mb:500000/aHR0cHM6Ly9pbWct/dXBsb2FkLXByb2R1/Y3Rpb24udHJhbnNp/c3Rvci5mbS82ZGRm/ZWU5MGU5YzJiZjU0/MTVmZTU0OWExYTg4/OGFhMi5wbmc.jpg">Wade Wells</podcast:person>
      <podcast:person role="Guest" href="https://bhisnews.transistor.fm/people/alex-minster-belouve" img="https://img.transistorcdn.com/pkWXYRcPNt2ZnnEfs05Q8vmWG5GDNmNhH10RUMs2Zro/rs:fill:0:0:1/w:800/h:800/q:60/mb:500000/aHR0cHM6Ly9pbWct/dXBsb2FkLXByb2R1/Y3Rpb24udHJhbnNp/c3Rvci5mbS9mYjZj/MDNhM2YyZmZmZmI2/NGU0YWJjYzdlMjkx/ODFkYy5qcGc.jpg">Alex Minster "Belouve"</podcast:person>
      <podcast:person role="Host" href="https://www.blackhillsinfosec.com/team/hayden-covington/" img="https://img.transistorcdn.com/ChX95dlWwFlhp_m8F2j-zi_PMHthvythRWvRoPYbhBo/rs:fill:0:0:1/w:800/h:800/q:60/mb:500000/aHR0cHM6Ly9pbWct/dXBsb2FkLXByb2R1/Y3Rpb24udHJhbnNp/c3Rvci5mbS81MGJl/ZTUxMjFjNmM3MzM2/OWI0M2M0ZjcyNjI3/YTIzMi5qcGc.jpg">Hayden Covington</podcast:person>
      <podcast:person role="Guest" href="https://www.turngate.io/our-story" img="https://img.transistorcdn.com/hGs_fQfPLtUVx-_Ek4U8Xfb5H31y0xSrNs79uHM_DgI/rs:fill:0:0:1/w:800/h:800/q:60/mb:500000/aHR0cHM6Ly9pbWct/dXBsb2FkLXByb2R1/Y3Rpb24udHJhbnNp/c3Rvci5mbS82ZDNi/OWQyNDZjZWYzYTI3/MzM4YTI5Y2RhNGI5/NWUwYS5qcGc.jpg">Bruce Potter</podcast:person>
      <podcast:person role="Producer" href="https://www.blackhillsinfosec.com/team/ryan-poirier/">Ryan Poirier</podcast:person>
      <podcast:transcript url="https://share.transistor.fm/s/835adac7/transcription.vtt" type="text/vtt" rel="captions"/>
      <podcast:transcript url="https://share.transistor.fm/s/835adac7/transcription.srt" type="application/x-subrip" rel="captions"/>
      <podcast:transcript url="https://share.transistor.fm/s/835adac7/transcription.json" type="application/json" rel="captions"/>
      <podcast:transcript url="https://share.transistor.fm/s/835adac7/transcription.txt" type="text/plain"/>
      <podcast:transcript url="https://share.transistor.fm/s/835adac7/transcription" type="text/html"/>
      <podcast:chapters url="https://share.transistor.fm/s/835adac7/chapters.json" type="application/json+chapters"/>
    </item>
    <item>
      <title>Iranian Hackers Claim Responsibility for Stryker Attack - 2026-03-16</title>
      <itunes:season>6</itunes:season>
      <podcast:season>6</podcast:season>
      <itunes:episode>11</itunes:episode>
      <podcast:episode>11</podcast:episode>
      <itunes:title>Iranian Hackers Claim Responsibility for Stryker Attack - 2026-03-16</itunes:title>
      <itunes:episodeType>full</itunes:episodeType>
      <guid isPermaLink="false">f51c6b9d-8b34-4eef-973e-4335f441afd0</guid>
      <link>https://share.transistor.fm/s/2612ce33</link>
      <description>
        <![CDATA[<p>This episode covers multiple cybersecurity news stories, including Iranian hackers claiming responsibility for a cyberattack on Stryker, ongoing challenges in attributing nation-state cyber operations, and broader trends in global cyber conflict. The hosts also discuss the reliability of public breach claims, emerging threats targeting critical industries, and how organizations are responding to an increasingly complex threat landscape.</p><p>Join us LIVE on Mondays, 4:30pm EST.<br>A weekly Podcast with BHIS and Friends. We discuss notable Infosec, and infosec-adjacent news stories gathered by our community news team.<br><a href="https://www.youtube.com/@BlackHillsInformationSecurity">https://www.youtube.com/@BlackHillsInformationSecurity</a></p><p>Chat with us on Discord! - <br><a href="https://discord.gg/bhis">https://discord.gg/bhis</a><br>🔴live-chat</p><p><br><strong>Chapters</strong><br></p><ul><li>(00:00) - PreShow Banter™ — Organizing Family Beets</li>
<li>(04:02) - Iranian Hackers Claim Responsibility for Stryker Attack - 2026-03-16</li>
<li>(08:56) - Story # 1: Iran-Backed Hackers Claim Wiper Attack on Medtech Firm Stryker</li>
<li>(23:38) - Story # 2: How We Hacked McKinsey's AI Platform</li>
<li>(32:30) - Story # 3: Amazon holds engineering meeting following AI-related outages</li>
<li>(39:11) - Story # 4: Meta gets into social networks for AI agents with acquisition of viral Moltbook platform</li>
<li>(45:24) - Story # 5: Meta to Shut Down Instagram End-to-End Encrypted Chat Support Starting May 2026</li>
<li>(50:45) - Story # 6: Michelin Confirms Data Breach Linked to Oracle EBS Attack</li>
<li>(51:08) - Story # 7: New Dohdoor malware campaign targets education and health care</li>
<li>(58:10) - Story # 8: Man's dog was riddled with tumors and dying. He used ChatGPT to design a custom cancer vaccine, stunning researchers</li>
</ul><br><strong>Links</strong><br>Story # 1: <a href="https://krebsonsecurity.com/2026/03/iran-backed-hackers-claim-wiper-attack-on-medtech-firm-stryker/">Iran-Backed Hackers Claim Wiper Attack on Medtech Firm Stryker</a><br>Story # 2: <a href="https://codewall.ai/blog/how-we-hacked-mckinseys-ai-platform">How We Hacked McKinsey’s AI Platform</a><br>Story # 3: <a href="https://archive.is/20260310063355/https://www.ft.com/content/7cab4ec7-4712-4137-b602-119a44f771de#selection-1581.0-1584.0">Amazon holds engineering meeting following AI-related outages</a><br>Story # 4: <a href="https://www.cnbc.com/2026/03/10/meta-social-networks-ai-agents-moltbook-acquisition.html">Meta gets into social networks for AI agents with acquisition of viral Moltbook platform</a><br>Story # 5: <a href="https://thehackernews.com/2026/03/meta-to-shut-down-instagram-end-to-end.html">Meta to Shut Down Instagram End-to-End Encrypted Chat Support Starting May 2026</a><br>Story # 6: <a href="https://www.securityweek.com/michelin-confirms-data-breach-linked-to-oracle-ebs-attack/">Michelin Confirms Data Breach Linked to Oracle EBS Attack</a><br>Story # 7: <a href="https://blog.talosintelligence.com/new-dohdoor-malware-campaign/">New Dohdoor malware campaign targets education and health care</a><br>Story # 8: <a href="https://finance.yahoo.com/news/mans-dog-riddled-tumors-dying-210500037.html?guccounter=1&amp;guce_referrer=aHR0cHM6Ly9zdGF0aWNzLnRlYW1zLmNkbi5vZmZpY2UubmV0Lw&amp;guce_referrer_sig=AQAAAMcLaIL3Tn9Esk-kExsiCdUj28NPjntqdUtWOzhMCVwkc22vAQaXFYQXR7W7flgy5KDSpriT_jKDByrjLYMGdNvoFoqZQQbfZUOcnLMiLDaqlsjhsp98KiN77tNlEVqw5xgXr54UuPrQvC6JNUN2zdi1bi8I-1_h6BbQ7Kx20Kir">Man’s dog was riddled with tumors and dying. He used ChatGPT to design a custom cancer vaccine, stunning researchers</a><p><strong><strong>Creators &amp; Guests</strong>
<ul>
  <li><a href="https://bhisnews.transistor.fm/people/dan-rearden-haircutfish">Dan Rearden (Haircutfish)</a> - Guest</li>
  <li><a href="https://bhisnews.transistor.fm/people/bronwen-aker">Bronwen Aker</a> - Host</li>
  <li><a href="https://bhisnews.transistor.fm/people/ralph-may">Ralph May</a> - Host</li>
  <li><a href="https://bhisnews.transistor.fm/people/john-strand-8c127856-b150-4e33-af6d-5b9f7f041a37">John Strand</a> - Host</li>
  <li><a href="https://bhisnews.transistor.fm/people/troy-wojewoda">Troy Wojewoda</a> - Guest</li>
  <li><a href="https://bhisnews.transistor.fm/people/corey-ham">Corey Ham</a> - Host</li>
  <li><a href="https://bhisnews.transistor.fm/people/hayden-covington">Hayden Covington</a> - Host</li>
  <li><a href="https://bhisnews.transistor.fm/people/wade-wells">Wade Wells</a> - Host</li>
  <li><a href="https://bhisnews.transistor.fm/people/meagan-bentley">Meagan Bentley</a> - Producer</li>
</ul><br><a href="https://www.youtube.com/watch?v=HKJ8JUsGCek" title="Click here to watch  this episode on YouTube.">Click here to watch  this episode on YouTube.</a><br>
</strong></p><p><strong><a href="https://share.transistor.fm/s/2612ce33/transcript" title="Click here to view the episode transcript.">Click here to view the episode transcript.</a><br>
</strong></p><p><br><strong>🔗 Register for FREE Infosec Webcasts, Anti-casts &amp; Summits </strong></p><p><a href="https://poweredbybhis.com/">https://poweredbybhis.com</a></p><p><br>Brought to you by:</p><p><strong>Black Hills Information Security </strong></p><p><a href="https://www.blackhillsinfosec.com/">https://www.blackhillsinfosec.com</a></p><p><br></p><p><strong>Antisyphon Training</strong></p><p><a href="https://www.antisyphontraining.com/">https://www.antisyphontraining.com/</a></p><p><br></p><p><strong>Active Countermeasures</strong></p><p><a href="https://www.activecountermeasures.com/">https://www.activecountermeasures.com</a></p><p><br></p><p><strong>Wild West Hackin Fest</strong></p><p><a href="https://wildwesthackinfest.com/">https://wildwesthackinfest.com</a></p>]]>
      </description>
      <content:encoded>
        <![CDATA[<p>This episode covers multiple cybersecurity news stories, including Iranian hackers claiming responsibility for a cyberattack on Stryker, ongoing challenges in attributing nation-state cyber operations, and broader trends in global cyber conflict. The hosts also discuss the reliability of public breach claims, emerging threats targeting critical industries, and how organizations are responding to an increasingly complex threat landscape.</p><p>Join us LIVE on Mondays, 4:30pm EST.<br>A weekly Podcast with BHIS and Friends. We discuss notable Infosec, and infosec-adjacent news stories gathered by our community news team.<br><a href="https://www.youtube.com/@BlackHillsInformationSecurity">https://www.youtube.com/@BlackHillsInformationSecurity</a></p><p>Chat with us on Discord! - <br><a href="https://discord.gg/bhis">https://discord.gg/bhis</a><br>🔴live-chat</p><p><br><strong>Chapters</strong><br></p><ul><li>(00:00) - PreShow Banter™ — Organizing Family Beets</li>
<li>(04:02) - Iranian Hackers Claim Responsibility for Stryker Attack - 2026-03-16</li>
<li>(08:56) - Story # 1: Iran-Backed Hackers Claim Wiper Attack on Medtech Firm Stryker</li>
<li>(23:38) - Story # 2: How We Hacked McKinsey's AI Platform</li>
<li>(32:30) - Story # 3: Amazon holds engineering meeting following AI-related outages</li>
<li>(39:11) - Story # 4: Meta gets into social networks for AI agents with acquisition of viral Moltbook platform</li>
<li>(45:24) - Story # 5: Meta to Shut Down Instagram End-to-End Encrypted Chat Support Starting May 2026</li>
<li>(50:45) - Story # 6: Michelin Confirms Data Breach Linked to Oracle EBS Attack</li>
<li>(51:08) - Story # 7: New Dohdoor malware campaign targets education and health care</li>
<li>(58:10) - Story # 8: Man's dog was riddled with tumors and dying. He used ChatGPT to design a custom cancer vaccine, stunning researchers</li>
</ul><br><strong>Links</strong><br>Story # 1: <a href="https://krebsonsecurity.com/2026/03/iran-backed-hackers-claim-wiper-attack-on-medtech-firm-stryker/">Iran-Backed Hackers Claim Wiper Attack on Medtech Firm Stryker</a><br>Story # 2: <a href="https://codewall.ai/blog/how-we-hacked-mckinseys-ai-platform">How We Hacked McKinsey’s AI Platform</a><br>Story # 3: <a href="https://archive.is/20260310063355/https://www.ft.com/content/7cab4ec7-4712-4137-b602-119a44f771de#selection-1581.0-1584.0">Amazon holds engineering meeting following AI-related outages</a><br>Story # 4: <a href="https://www.cnbc.com/2026/03/10/meta-social-networks-ai-agents-moltbook-acquisition.html">Meta gets into social networks for AI agents with acquisition of viral Moltbook platform</a><br>Story # 5: <a href="https://thehackernews.com/2026/03/meta-to-shut-down-instagram-end-to-end.html">Meta to Shut Down Instagram End-to-End Encrypted Chat Support Starting May 2026</a><br>Story # 6: <a href="https://www.securityweek.com/michelin-confirms-data-breach-linked-to-oracle-ebs-attack/">Michelin Confirms Data Breach Linked to Oracle EBS Attack</a><br>Story # 7: <a href="https://blog.talosintelligence.com/new-dohdoor-malware-campaign/">New Dohdoor malware campaign targets education and health care</a><br>Story # 8: <a href="https://finance.yahoo.com/news/mans-dog-riddled-tumors-dying-210500037.html?guccounter=1&amp;guce_referrer=aHR0cHM6Ly9zdGF0aWNzLnRlYW1zLmNkbi5vZmZpY2UubmV0Lw&amp;guce_referrer_sig=AQAAAMcLaIL3Tn9Esk-kExsiCdUj28NPjntqdUtWOzhMCVwkc22vAQaXFYQXR7W7flgy5KDSpriT_jKDByrjLYMGdNvoFoqZQQbfZUOcnLMiLDaqlsjhsp98KiN77tNlEVqw5xgXr54UuPrQvC6JNUN2zdi1bi8I-1_h6BbQ7Kx20Kir">Man’s dog was riddled with tumors and dying. He used ChatGPT to design a custom cancer vaccine, stunning researchers</a><p><strong><strong>Creators &amp; Guests</strong>
<ul>
  <li><a href="https://bhisnews.transistor.fm/people/dan-rearden-haircutfish">Dan Rearden (Haircutfish)</a> - Guest</li>
  <li><a href="https://bhisnews.transistor.fm/people/bronwen-aker">Bronwen Aker</a> - Host</li>
  <li><a href="https://bhisnews.transistor.fm/people/ralph-may">Ralph May</a> - Host</li>
  <li><a href="https://bhisnews.transistor.fm/people/john-strand-8c127856-b150-4e33-af6d-5b9f7f041a37">John Strand</a> - Host</li>
  <li><a href="https://bhisnews.transistor.fm/people/troy-wojewoda">Troy Wojewoda</a> - Guest</li>
  <li><a href="https://bhisnews.transistor.fm/people/corey-ham">Corey Ham</a> - Host</li>
  <li><a href="https://bhisnews.transistor.fm/people/hayden-covington">Hayden Covington</a> - Host</li>
  <li><a href="https://bhisnews.transistor.fm/people/wade-wells">Wade Wells</a> - Host</li>
  <li><a href="https://bhisnews.transistor.fm/people/meagan-bentley">Meagan Bentley</a> - Producer</li>
</ul><br><a href="https://www.youtube.com/watch?v=HKJ8JUsGCek" title="Click here to watch  this episode on YouTube.">Click here to watch  this episode on YouTube.</a><br>
</strong></p><p><strong><a href="https://share.transistor.fm/s/2612ce33/transcript" title="Click here to view the episode transcript.">Click here to view the episode transcript.</a><br>
</strong></p><p><br><strong>🔗 Register for FREE Infosec Webcasts, Anti-casts &amp; Summits </strong></p><p><a href="https://poweredbybhis.com/">https://poweredbybhis.com</a></p><p><br>Brought to you by:</p><p><strong>Black Hills Information Security </strong></p><p><a href="https://www.blackhillsinfosec.com/">https://www.blackhillsinfosec.com</a></p><p><br></p><p><strong>Antisyphon Training</strong></p><p><a href="https://www.antisyphontraining.com/">https://www.antisyphontraining.com/</a></p><p><br></p><p><strong>Active Countermeasures</strong></p><p><a href="https://www.activecountermeasures.com/">https://www.activecountermeasures.com</a></p><p><br></p><p><strong>Wild West Hackin Fest</strong></p><p><a href="https://wildwesthackinfest.com/">https://wildwesthackinfest.com</a></p>]]>
      </content:encoded>
      <pubDate>Tue, 17 Mar 2026 13:05:04 -0400</pubDate>
      <author>Black Hills Information Security</author>
      <enclosure url="https://media.transistor.fm/2612ce33/484b3fd1.mp3" length="60707216" type="audio/mpeg"/>
      <itunes:author>Black Hills Information Security</itunes:author>
      <itunes:image href="https://img.transistorcdn.com/6TUVnJuOo9RJczLCVSTqQKSEP009Efkrd2DDVuwHoTI/rs:fill:0:0:1/w:1400/h:1400/q:60/mb:500000/aHR0cHM6Ly9pbWct/dXBsb2FkLXByb2R1/Y3Rpb24udHJhbnNp/c3Rvci5mbS8xMjA4/ZmM3ZGM5YTdjNWI0/ZDUxMWVkNDhhOWM4/YjZhNy5qcGc.jpg"/>
      <itunes:duration>3667</itunes:duration>
      <itunes:summary>
        <![CDATA[<p>This episode covers multiple cybersecurity news stories, including Iranian hackers claiming responsibility for a cyberattack on Stryker, ongoing challenges in attributing nation-state cyber operations, and broader trends in global cyber conflict. The hosts also discuss the reliability of public breach claims, emerging threats targeting critical industries, and how organizations are responding to an increasingly complex threat landscape.</p><p>Join us LIVE on Mondays, 4:30pm EST.<br>A weekly Podcast with BHIS and Friends. We discuss notable Infosec, and infosec-adjacent news stories gathered by our community news team.<br><a href="https://www.youtube.com/@BlackHillsInformationSecurity">https://www.youtube.com/@BlackHillsInformationSecurity</a></p><p>Chat with us on Discord! - <br><a href="https://discord.gg/bhis">https://discord.gg/bhis</a><br>🔴live-chat</p><p><br><strong>Chapters</strong><br></p><ul><li>(00:00) - PreShow Banter™ — Organizing Family Beets</li>
<li>(04:02) - Iranian Hackers Claim Responsibility for Stryker Attack - 2026-03-16</li>
<li>(08:56) - Story # 1: Iran-Backed Hackers Claim Wiper Attack on Medtech Firm Stryker</li>
<li>(23:38) - Story # 2: How We Hacked McKinsey's AI Platform</li>
<li>(32:30) - Story # 3: Amazon holds engineering meeting following AI-related outages</li>
<li>(39:11) - Story # 4: Meta gets into social networks for AI agents with acquisition of viral Moltbook platform</li>
<li>(45:24) - Story # 5: Meta to Shut Down Instagram End-to-End Encrypted Chat Support Starting May 2026</li>
<li>(50:45) - Story # 6: Michelin Confirms Data Breach Linked to Oracle EBS Attack</li>
<li>(51:08) - Story # 7: New Dohdoor malware campaign targets education and health care</li>
<li>(58:10) - Story # 8: Man's dog was riddled with tumors and dying. He used ChatGPT to design a custom cancer vaccine, stunning researchers</li>
</ul><br><strong>Links</strong><br>Story # 1: <a href="https://krebsonsecurity.com/2026/03/iran-backed-hackers-claim-wiper-attack-on-medtech-firm-stryker/">Iran-Backed Hackers Claim Wiper Attack on Medtech Firm Stryker</a><br>Story # 2: <a href="https://codewall.ai/blog/how-we-hacked-mckinseys-ai-platform">How We Hacked McKinsey’s AI Platform</a><br>Story # 3: <a href="https://archive.is/20260310063355/https://www.ft.com/content/7cab4ec7-4712-4137-b602-119a44f771de#selection-1581.0-1584.0">Amazon holds engineering meeting following AI-related outages</a><br>Story # 4: <a href="https://www.cnbc.com/2026/03/10/meta-social-networks-ai-agents-moltbook-acquisition.html">Meta gets into social networks for AI agents with acquisition of viral Moltbook platform</a><br>Story # 5: <a href="https://thehackernews.com/2026/03/meta-to-shut-down-instagram-end-to-end.html">Meta to Shut Down Instagram End-to-End Encrypted Chat Support Starting May 2026</a><br>Story # 6: <a href="https://www.securityweek.com/michelin-confirms-data-breach-linked-to-oracle-ebs-attack/">Michelin Confirms Data Breach Linked to Oracle EBS Attack</a><br>Story # 7: <a href="https://blog.talosintelligence.com/new-dohdoor-malware-campaign/">New Dohdoor malware campaign targets education and health care</a><br>Story # 8: <a href="https://finance.yahoo.com/news/mans-dog-riddled-tumors-dying-210500037.html?guccounter=1&amp;guce_referrer=aHR0cHM6Ly9zdGF0aWNzLnRlYW1zLmNkbi5vZmZpY2UubmV0Lw&amp;guce_referrer_sig=AQAAAMcLaIL3Tn9Esk-kExsiCdUj28NPjntqdUtWOzhMCVwkc22vAQaXFYQXR7W7flgy5KDSpriT_jKDByrjLYMGdNvoFoqZQQbfZUOcnLMiLDaqlsjhsp98KiN77tNlEVqw5xgXr54UuPrQvC6JNUN2zdi1bi8I-1_h6BbQ7Kx20Kir">Man’s dog was riddled with tumors and dying. He used ChatGPT to design a custom cancer vaccine, stunning researchers</a><p><strong><strong>Creators &amp; Guests</strong>
<ul>
  <li><a href="https://bhisnews.transistor.fm/people/dan-rearden-haircutfish">Dan Rearden (Haircutfish)</a> - Guest</li>
  <li><a href="https://bhisnews.transistor.fm/people/bronwen-aker">Bronwen Aker</a> - Host</li>
  <li><a href="https://bhisnews.transistor.fm/people/ralph-may">Ralph May</a> - Host</li>
  <li><a href="https://bhisnews.transistor.fm/people/john-strand-8c127856-b150-4e33-af6d-5b9f7f041a37">John Strand</a> - Host</li>
  <li><a href="https://bhisnews.transistor.fm/people/troy-wojewoda">Troy Wojewoda</a> - Guest</li>
  <li><a href="https://bhisnews.transistor.fm/people/corey-ham">Corey Ham</a> - Host</li>
  <li><a href="https://bhisnews.transistor.fm/people/hayden-covington">Hayden Covington</a> - Host</li>
  <li><a href="https://bhisnews.transistor.fm/people/wade-wells">Wade Wells</a> - Host</li>
  <li><a href="https://bhisnews.transistor.fm/people/meagan-bentley">Meagan Bentley</a> - Producer</li>
</ul><br><a href="https://www.youtube.com/watch?v=HKJ8JUsGCek" title="Click here to watch  this episode on YouTube.">Click here to watch  this episode on YouTube.</a><br>
</strong></p><p><strong><a href="https://share.transistor.fm/s/2612ce33/transcript" title="Click here to view the episode transcript.">Click here to view the episode transcript.</a><br>
</strong></p><p><br><strong>🔗 Register for FREE Infosec Webcasts, Anti-casts &amp; Summits </strong></p><p><a href="https://poweredbybhis.com/">https://poweredbybhis.com</a></p><p><br>Brought to you by:</p><p><strong>Black Hills Information Security </strong></p><p><a href="https://www.blackhillsinfosec.com/">https://www.blackhillsinfosec.com</a></p><p><br></p><p><strong>Antisyphon Training</strong></p><p><a href="https://www.antisyphontraining.com/">https://www.antisyphontraining.com/</a></p><p><br></p><p><strong>Active Countermeasures</strong></p><p><a href="https://www.activecountermeasures.com/">https://www.activecountermeasures.com</a></p><p><br></p><p><strong>Wild West Hackin Fest</strong></p><p><a href="https://wildwesthackinfest.com/">https://wildwesthackinfest.com</a></p>]]>
      </itunes:summary>
      <itunes:keywords>Infosec,Cybersecurity,news</itunes:keywords>
      <itunes:explicit>No</itunes:explicit>
      <podcast:person role="Guest" href="https://www.antisyphontraining.com/instructor/danrearden/" img="https://img.transistorcdn.com/IBT8FTRQZocgK692fZ0l-qA_MIZyVC5huAB9tP92PXA/rs:fill:0:0:1/w:800/h:800/q:60/mb:500000/aHR0cHM6Ly9pbWct/dXBsb2FkLXByb2R1/Y3Rpb24udHJhbnNp/c3Rvci5mbS9lNzI0/MTUwMzk1NDFkYTk0/ODk1MWU0ZTU4ZjRh/OTRiNi5qcGVn.jpg">Dan Rearden (Haircutfish)</podcast:person>
      <podcast:person role="Host" href="https://www.blackhillsinfosec.com/team/bronwen-aker/" img="https://img.transistorcdn.com/CSShIJJhZo9yPTywdOv4zlsSYFk9yVSAIU6CrsdvdY4/rs:fill:0:0:1/w:800/h:800/q:60/mb:500000/aHR0cHM6Ly9pbWct/dXBsb2FkLXByb2R1/Y3Rpb24udHJhbnNp/c3Rvci5mbS80YWIy/MWUxODE4NjA1MmRm/OTBmZmYyYzRlYmU1/N2NhOC5qcGc.jpg">Bronwen Aker</podcast:person>
      <podcast:person role="Host" href="https://mwgroup.io/about/" img="https://img.transistorcdn.com/_dioeUsMeIlo4vZ0dPQkQ-f-tkMHllpfM4P-4SpyW8Q/rs:fill:0:0:1/w:800/h:800/q:60/mb:500000/aHR0cHM6Ly9pbWct/dXBsb2FkLXByb2R1/Y3Rpb24udHJhbnNp/c3Rvci5mbS9jNzA4/MDU5MTk2MDAyMjc5/NmZiZmFkMDY4NGVj/NzRmNS5qcGVn.jpg">Ralph May</podcast:person>
      <podcast:person role="Host" href="https://www.blackhillsinfosec.com/team/john-strand/" img="https://img.transistorcdn.com/NUqk_fUpMRKpGIokj-WgaiALdQtlImwADID3aNogGds/rs:fill:0:0:1/w:800/h:800/q:60/mb:500000/aHR0cHM6Ly9pbWct/dXBsb2FkLXByb2R1/Y3Rpb24udHJhbnNp/c3Rvci5mbS84Y2Ji/YmMyMzRlMDM2Nzdi/YmNlYjhlZDQwZmM4/MmJlYy5qcGc.jpg">John Strand</podcast:person>
      <podcast:person role="Guest" href="https://www.blackhillsinfosec.com/team/troy-wojewoda/" img="https://img.transistorcdn.com/vOD3o0PEi1Qbk5tASn-qmQG_vanNtmrAn78U365ob3w/rs:fill:0:0:1/w:800/h:800/q:60/mb:500000/aHR0cHM6Ly9pbWct/dXBsb2FkLXByb2R1/Y3Rpb24udHJhbnNp/c3Rvci5mbS9lMmU4/ODYyMWNmNTFhNmFk/Njc0ODU4YzVlMWQ3/ODk3Ni5qcGc.jpg">Troy Wojewoda</podcast:person>
      <podcast:person role="Host" href="https://www.blackhillsinfosec.com/team/corey-ham/" img="https://img.transistorcdn.com/Q9BaWxLnY_zU_A-eKpfV22Y1AiBI64lLxLJP19iD_lM/rs:fill:0:0:1/w:800/h:800/q:60/mb:500000/aHR0cHM6Ly9pbWct/dXBsb2FkLXByb2R1/Y3Rpb24udHJhbnNp/c3Rvci5mbS84MTMx/N2JlN2IzZWI2MDcz/MGU0NTk5NGU0N2Iw/NzE2Yy5qcGc.jpg">Corey Ham</podcast:person>
      <podcast:person role="Host" href="https://www.blackhillsinfosec.com/team/hayden-covington/" img="https://img.transistorcdn.com/ChX95dlWwFlhp_m8F2j-zi_PMHthvythRWvRoPYbhBo/rs:fill:0:0:1/w:800/h:800/q:60/mb:500000/aHR0cHM6Ly9pbWct/dXBsb2FkLXByb2R1/Y3Rpb24udHJhbnNp/c3Rvci5mbS81MGJl/ZTUxMjFjNmM3MzM2/OWI0M2M0ZjcyNjI3/YTIzMi5qcGc.jpg">Hayden Covington</podcast:person>
      <podcast:person role="Host" href="https://www.bsidessd.org/" img="https://img.transistorcdn.com/KeYB5iZ31d5IGBEuYGSV1SOcM5ZsEQ3dGI4HgjvyVVE/rs:fill:0:0:1/w:800/h:800/q:60/mb:500000/aHR0cHM6Ly9pbWct/dXBsb2FkLXByb2R1/Y3Rpb24udHJhbnNp/c3Rvci5mbS82ZGRm/ZWU5MGU5YzJiZjU0/MTVmZTU0OWExYTg4/OGFhMi5wbmc.jpg">Wade Wells</podcast:person>
      <podcast:person role="Producer" href="https://bhisnews.transistor.fm/people/meagan-bentley">Meagan Bentley</podcast:person>
      <podcast:transcript url="https://share.transistor.fm/s/2612ce33/transcription.vtt" type="text/vtt" rel="captions"/>
      <podcast:transcript url="https://share.transistor.fm/s/2612ce33/transcription.srt" type="application/x-subrip" rel="captions"/>
      <podcast:transcript url="https://share.transistor.fm/s/2612ce33/transcription.json" type="application/json" rel="captions"/>
      <podcast:transcript url="https://share.transistor.fm/s/2612ce33/transcription.txt" type="text/plain"/>
      <podcast:transcript url="https://share.transistor.fm/s/2612ce33/transcription" type="text/html"/>
      <podcast:chapters url="https://share.transistor.fm/s/2612ce33/chapters.json" type="application/json+chapters"/>
    </item>
    <item>
      <title>A Nightmare of Vibeware - 2026-03-09</title>
      <itunes:season>6</itunes:season>
      <podcast:season>6</podcast:season>
      <itunes:episode>10</itunes:episode>
      <podcast:episode>10</podcast:episode>
      <itunes:title>A Nightmare of Vibeware - 2026-03-09</itunes:title>
      <itunes:episodeType>full</itunes:episodeType>
      <guid isPermaLink="false">b20f74ec-4361-4e99-bc5a-bb2ac3c9eff8</guid>
      <link>https://share.transistor.fm/s/110e3954</link>
      <description>
        <![CDATA[<p>Join us LIVE on Mondays, 4:30pm EST.<br>A weekly Podcast with BHIS and Friends. We discuss notable Infosec, and infosec-adjacent news stories gathered by our community news team.<br><a href="https://www.youtube.com/@BlackHillsInformationSecurity">https://www.youtube.com/@BlackHillsInformationSecurity</a></p><p>Chat with us on Discord! - <br><a href="https://discord.gg/bhis">https://discord.gg/bhis</a><br>🔴live-chat</p><p><br><strong>Chapters</strong><br></p><ul><li>(00:00) - PreShow Banter™ — That's Not How It Works</li>
<li>(03:40) - A Nightmare of Vibeware – 2026-03-09</li>
<li>(04:54) - Story # 1: APT36: A Nightmare of Vibeware</li>
<li>(13:56) - Story # 2: Oracle Layoffs: Tech giant to slash 30,000 jobs as banks pull out from financing AI data centres</li>
<li>(16:28) - Story # 3: Iran-linked hacktivist groups target US infrastructure after Feb 28 strikes, cyber activity surges: Report</li>
<li>(24:28) - Story # 4: Introducing the First Frontier Suite built on Intelligence + Trust</li>
<li>(28:59) - Story # 5: Motorola partners with GrapheneOS for future phones</li>
<li>(29:13) - Story # 5b: GrapheneOS: Microsoft Authenticator does not support secure Android OS</li>
<li>(29:53) - Story # 6: Western allies form 6G security coalition amid tech rivalry with China</li>
<li>(34:01) - Story # 7: ShinyHunters claims ongoing Salesforce Aura data theft attacks</li>
<li>(35:47) - Story # 8: Doppelgänger / RRN Disinformation Infrastructure Ecosystem 2026</li>
<li>(44:33) - Story # 9: LexisNexis confirms data breach as hackers leak stolen files</li>
<li>(49:10) - Story # 10: Google urges Supreme Court to strike down geofence warrants as unconstitutional</li>
<li>(55:59) - ANTI-CAST : How to Detect Malicious Remote Workers w/ James McQuiggan</li>
<li>(56:47) - SOC Summit 2026</li>
</ul><br><strong>Links</strong><br>Story # 1: <a href="https://www.bitdefender.com/en-us/blog/businessinsights/apt36-nightmare-vibeware">APT36: A Nightmare of Vibeware</a><br>Story # 2: <a href="https://www.livemint.com/companies/news/oracle-layoffs-tech-giant-to-slash-30-000-jobs-as-banks-pull-out-from-financing-ai-data-centres-11769996619410.html">Oracle Layoffs: Tech giant to slash 30,000 jobs as banks pull out from financing AI data centres</a><br>Story # 3: <a href="https://www.thehansindia.com/news/international/iran-linked-hacktivist-groups-target-us-infrastructure-after-feb-28-strikes-cyber-activity-surges-report-1054981">Iran-linked hacktivist groups target US infrastructure after Feb 28 strikes, cyber activity surges: Report</a><br>Story # 4: <a href="https://blogs.microsoft.com/blog/2026/03/09/introducing-the-first-frontier-suite-built-on-intelligence-trust/">Introducing the First Frontier Suite built on Intelligence + Trust</a><br>Story # 5: <a href="https://www.theregister.com/2026/03/02/motorola_grapheneos/">Motorola partners with GrapheneOS for future phones</a><br>Story # 5b: <a href="https://www.heise.de/en/news/GrapheneOS-Microsoft-Authenticator-does-not-support-secure-Android-OS-11200495.html">GrapheneOS: Microsoft Authenticator does not support secure Android OS</a><br>Story # 6: <a href="https://therecord.media/western-allies-form-6g-security-coalition">Western allies form 6G security coalition amid tech rivalry with China</a><br>Story # 7: <a href="https://www.bleepingcomputer.com/news/security/shinyhunters-claims-ongoing-salesforce-aura-data-theft-attacks/">ShinyHunters claims ongoing Salesforce Aura data theft attacks</a><br>Story # 8: <a href="https://dti.domaintools.com/research/doppelganger-rrn-disinformation-infrastructure-ecosystem">Doppelgänger / RRN Disinformation Infrastructure Ecosystem 2026</a><br>Story # 9: <a href="https://www.bleepingcomputer.com/news/security/lexisnexis-confirms-data-breach-as-hackers-leak-stolen-files/">LexisNexis confirms data breach as hackers leak stolen files</a><br>Story # 10: <a href="https://therecord.media/google-urges-supreme-court-strike-down-geolocation-warrants">Google urges Supreme Court to strike down geofence warrants as unconstitutional</a><br>ANTI-CAST : <a href="https://youtube.com/live/yDewa1GuDPs">How to Detect Malicious Remote Workers w/ James McQuiggan</a><p><strong>Troy &amp; Wade’s Upcoming Things:</strong><br>– <a href="https://www.antisyphontraining.com/event/soc-summit">Antisyphon Training SOC Summit 2026</a><br>– <a href="https://youtube.com/live/u8rRyTVopmI">Breach Assessment - The Curious Case of the Comburglar w/ Troy Wojewoda</a><br>– <a href="https://www.antisyphontraining.com/product/network-forensics-and-incident-response-with-troy-wojewoda/">Network Forensics and Incident Response with Troy Wojewoda</a></p><p><br><strong>🔗 Register for FREE Infosec Webcasts, Anti-casts &amp; Summits </strong></p><p><a href="https://poweredbybhis.com/">https://poweredbybhis.com</a></p><p><br>Brought to you by:</p><p><strong>Black Hills Information Security </strong></p><p><a href="https://www.blackhillsinfosec.com/">https://www.blackhillsinfosec.com</a></p><p><br></p><p><strong>Antisyphon Training</strong></p><p><a href="https://www.antisyphontraining.com/">https://www.antisyphontraining.com/</a></p><p><br></p><p><strong>Active Countermeasures</strong></p><p><a href="https://www.activecountermeasures.com/">https://www.activecountermeasures.com</a></p><p><br></p><p><strong>Wild West Hackin Fest</strong></p><p><a href="https://wildwesthackinfest.com/">https://wildwesthackinfest.com</a></p>]]>
      </description>
      <content:encoded>
        <![CDATA[<p>Join us LIVE on Mondays, 4:30pm EST.<br>A weekly Podcast with BHIS and Friends. We discuss notable Infosec, and infosec-adjacent news stories gathered by our community news team.<br><a href="https://www.youtube.com/@BlackHillsInformationSecurity">https://www.youtube.com/@BlackHillsInformationSecurity</a></p><p>Chat with us on Discord! - <br><a href="https://discord.gg/bhis">https://discord.gg/bhis</a><br>🔴live-chat</p><p><br><strong>Chapters</strong><br></p><ul><li>(00:00) - PreShow Banter™ — That's Not How It Works</li>
<li>(03:40) - A Nightmare of Vibeware – 2026-03-09</li>
<li>(04:54) - Story # 1: APT36: A Nightmare of Vibeware</li>
<li>(13:56) - Story # 2: Oracle Layoffs: Tech giant to slash 30,000 jobs as banks pull out from financing AI data centres</li>
<li>(16:28) - Story # 3: Iran-linked hacktivist groups target US infrastructure after Feb 28 strikes, cyber activity surges: Report</li>
<li>(24:28) - Story # 4: Introducing the First Frontier Suite built on Intelligence + Trust</li>
<li>(28:59) - Story # 5: Motorola partners with GrapheneOS for future phones</li>
<li>(29:13) - Story # 5b: GrapheneOS: Microsoft Authenticator does not support secure Android OS</li>
<li>(29:53) - Story # 6: Western allies form 6G security coalition amid tech rivalry with China</li>
<li>(34:01) - Story # 7: ShinyHunters claims ongoing Salesforce Aura data theft attacks</li>
<li>(35:47) - Story # 8: Doppelgänger / RRN Disinformation Infrastructure Ecosystem 2026</li>
<li>(44:33) - Story # 9: LexisNexis confirms data breach as hackers leak stolen files</li>
<li>(49:10) - Story # 10: Google urges Supreme Court to strike down geofence warrants as unconstitutional</li>
<li>(55:59) - ANTI-CAST : How to Detect Malicious Remote Workers w/ James McQuiggan</li>
<li>(56:47) - SOC Summit 2026</li>
</ul><br><strong>Links</strong><br>Story # 1: <a href="https://www.bitdefender.com/en-us/blog/businessinsights/apt36-nightmare-vibeware">APT36: A Nightmare of Vibeware</a><br>Story # 2: <a href="https://www.livemint.com/companies/news/oracle-layoffs-tech-giant-to-slash-30-000-jobs-as-banks-pull-out-from-financing-ai-data-centres-11769996619410.html">Oracle Layoffs: Tech giant to slash 30,000 jobs as banks pull out from financing AI data centres</a><br>Story # 3: <a href="https://www.thehansindia.com/news/international/iran-linked-hacktivist-groups-target-us-infrastructure-after-feb-28-strikes-cyber-activity-surges-report-1054981">Iran-linked hacktivist groups target US infrastructure after Feb 28 strikes, cyber activity surges: Report</a><br>Story # 4: <a href="https://blogs.microsoft.com/blog/2026/03/09/introducing-the-first-frontier-suite-built-on-intelligence-trust/">Introducing the First Frontier Suite built on Intelligence + Trust</a><br>Story # 5: <a href="https://www.theregister.com/2026/03/02/motorola_grapheneos/">Motorola partners with GrapheneOS for future phones</a><br>Story # 5b: <a href="https://www.heise.de/en/news/GrapheneOS-Microsoft-Authenticator-does-not-support-secure-Android-OS-11200495.html">GrapheneOS: Microsoft Authenticator does not support secure Android OS</a><br>Story # 6: <a href="https://therecord.media/western-allies-form-6g-security-coalition">Western allies form 6G security coalition amid tech rivalry with China</a><br>Story # 7: <a href="https://www.bleepingcomputer.com/news/security/shinyhunters-claims-ongoing-salesforce-aura-data-theft-attacks/">ShinyHunters claims ongoing Salesforce Aura data theft attacks</a><br>Story # 8: <a href="https://dti.domaintools.com/research/doppelganger-rrn-disinformation-infrastructure-ecosystem">Doppelgänger / RRN Disinformation Infrastructure Ecosystem 2026</a><br>Story # 9: <a href="https://www.bleepingcomputer.com/news/security/lexisnexis-confirms-data-breach-as-hackers-leak-stolen-files/">LexisNexis confirms data breach as hackers leak stolen files</a><br>Story # 10: <a href="https://therecord.media/google-urges-supreme-court-strike-down-geolocation-warrants">Google urges Supreme Court to strike down geofence warrants as unconstitutional</a><br>ANTI-CAST : <a href="https://youtube.com/live/yDewa1GuDPs">How to Detect Malicious Remote Workers w/ James McQuiggan</a><p><strong>Troy &amp; Wade’s Upcoming Things:</strong><br>– <a href="https://www.antisyphontraining.com/event/soc-summit">Antisyphon Training SOC Summit 2026</a><br>– <a href="https://youtube.com/live/u8rRyTVopmI">Breach Assessment - The Curious Case of the Comburglar w/ Troy Wojewoda</a><br>– <a href="https://www.antisyphontraining.com/product/network-forensics-and-incident-response-with-troy-wojewoda/">Network Forensics and Incident Response with Troy Wojewoda</a></p><p><br><strong>🔗 Register for FREE Infosec Webcasts, Anti-casts &amp; Summits </strong></p><p><a href="https://poweredbybhis.com/">https://poweredbybhis.com</a></p><p><br>Brought to you by:</p><p><strong>Black Hills Information Security </strong></p><p><a href="https://www.blackhillsinfosec.com/">https://www.blackhillsinfosec.com</a></p><p><br></p><p><strong>Antisyphon Training</strong></p><p><a href="https://www.antisyphontraining.com/">https://www.antisyphontraining.com/</a></p><p><br></p><p><strong>Active Countermeasures</strong></p><p><a href="https://www.activecountermeasures.com/">https://www.activecountermeasures.com</a></p><p><br></p><p><strong>Wild West Hackin Fest</strong></p><p><a href="https://wildwesthackinfest.com/">https://wildwesthackinfest.com</a></p>]]>
      </content:encoded>
      <pubDate>Tue, 10 Mar 2026 13:24:37 -0400</pubDate>
      <author>Black Hills Information Security</author>
      <enclosure url="https://media.transistor.fm/110e3954/e3dc525e.mp3" length="60627341" type="audio/mpeg"/>
      <itunes:author>Black Hills Information Security</itunes:author>
      <itunes:image href="https://img.transistorcdn.com/M1GiS2neEDpa6KbIXqiTVHh7chGFc73ZkJtDnu6R7pc/rs:fill:0:0:1/w:1400/h:1400/q:60/mb:500000/aHR0cHM6Ly9pbWct/dXBsb2FkLXByb2R1/Y3Rpb24udHJhbnNp/c3Rvci5mbS85OTc0/ZmMzNzJkM2Q2NGM4/NzlhZWMwYzMxYzU5/YzgxYy5qcGc.jpg"/>
      <itunes:duration>3617</itunes:duration>
      <itunes:summary>
        <![CDATA[<p>Join us LIVE on Mondays, 4:30pm EST.<br>A weekly Podcast with BHIS and Friends. We discuss notable Infosec, and infosec-adjacent news stories gathered by our community news team.<br><a href="https://www.youtube.com/@BlackHillsInformationSecurity">https://www.youtube.com/@BlackHillsInformationSecurity</a></p><p>Chat with us on Discord! - <br><a href="https://discord.gg/bhis">https://discord.gg/bhis</a><br>🔴live-chat</p><p><br><strong>Chapters</strong><br></p><ul><li>(00:00) - PreShow Banter™ — That's Not How It Works</li>
<li>(03:40) - A Nightmare of Vibeware – 2026-03-09</li>
<li>(04:54) - Story # 1: APT36: A Nightmare of Vibeware</li>
<li>(13:56) - Story # 2: Oracle Layoffs: Tech giant to slash 30,000 jobs as banks pull out from financing AI data centres</li>
<li>(16:28) - Story # 3: Iran-linked hacktivist groups target US infrastructure after Feb 28 strikes, cyber activity surges: Report</li>
<li>(24:28) - Story # 4: Introducing the First Frontier Suite built on Intelligence + Trust</li>
<li>(28:59) - Story # 5: Motorola partners with GrapheneOS for future phones</li>
<li>(29:13) - Story # 5b: GrapheneOS: Microsoft Authenticator does not support secure Android OS</li>
<li>(29:53) - Story # 6: Western allies form 6G security coalition amid tech rivalry with China</li>
<li>(34:01) - Story # 7: ShinyHunters claims ongoing Salesforce Aura data theft attacks</li>
<li>(35:47) - Story # 8: Doppelgänger / RRN Disinformation Infrastructure Ecosystem 2026</li>
<li>(44:33) - Story # 9: LexisNexis confirms data breach as hackers leak stolen files</li>
<li>(49:10) - Story # 10: Google urges Supreme Court to strike down geofence warrants as unconstitutional</li>
<li>(55:59) - ANTI-CAST : How to Detect Malicious Remote Workers w/ James McQuiggan</li>
<li>(56:47) - SOC Summit 2026</li>
</ul><br><strong>Links</strong><br>Story # 1: <a href="https://www.bitdefender.com/en-us/blog/businessinsights/apt36-nightmare-vibeware">APT36: A Nightmare of Vibeware</a><br>Story # 2: <a href="https://www.livemint.com/companies/news/oracle-layoffs-tech-giant-to-slash-30-000-jobs-as-banks-pull-out-from-financing-ai-data-centres-11769996619410.html">Oracle Layoffs: Tech giant to slash 30,000 jobs as banks pull out from financing AI data centres</a><br>Story # 3: <a href="https://www.thehansindia.com/news/international/iran-linked-hacktivist-groups-target-us-infrastructure-after-feb-28-strikes-cyber-activity-surges-report-1054981">Iran-linked hacktivist groups target US infrastructure after Feb 28 strikes, cyber activity surges: Report</a><br>Story # 4: <a href="https://blogs.microsoft.com/blog/2026/03/09/introducing-the-first-frontier-suite-built-on-intelligence-trust/">Introducing the First Frontier Suite built on Intelligence + Trust</a><br>Story # 5: <a href="https://www.theregister.com/2026/03/02/motorola_grapheneos/">Motorola partners with GrapheneOS for future phones</a><br>Story # 5b: <a href="https://www.heise.de/en/news/GrapheneOS-Microsoft-Authenticator-does-not-support-secure-Android-OS-11200495.html">GrapheneOS: Microsoft Authenticator does not support secure Android OS</a><br>Story # 6: <a href="https://therecord.media/western-allies-form-6g-security-coalition">Western allies form 6G security coalition amid tech rivalry with China</a><br>Story # 7: <a href="https://www.bleepingcomputer.com/news/security/shinyhunters-claims-ongoing-salesforce-aura-data-theft-attacks/">ShinyHunters claims ongoing Salesforce Aura data theft attacks</a><br>Story # 8: <a href="https://dti.domaintools.com/research/doppelganger-rrn-disinformation-infrastructure-ecosystem">Doppelgänger / RRN Disinformation Infrastructure Ecosystem 2026</a><br>Story # 9: <a href="https://www.bleepingcomputer.com/news/security/lexisnexis-confirms-data-breach-as-hackers-leak-stolen-files/">LexisNexis confirms data breach as hackers leak stolen files</a><br>Story # 10: <a href="https://therecord.media/google-urges-supreme-court-strike-down-geolocation-warrants">Google urges Supreme Court to strike down geofence warrants as unconstitutional</a><br>ANTI-CAST : <a href="https://youtube.com/live/yDewa1GuDPs">How to Detect Malicious Remote Workers w/ James McQuiggan</a><p><strong>Troy &amp; Wade’s Upcoming Things:</strong><br>– <a href="https://www.antisyphontraining.com/event/soc-summit">Antisyphon Training SOC Summit 2026</a><br>– <a href="https://youtube.com/live/u8rRyTVopmI">Breach Assessment - The Curious Case of the Comburglar w/ Troy Wojewoda</a><br>– <a href="https://www.antisyphontraining.com/product/network-forensics-and-incident-response-with-troy-wojewoda/">Network Forensics and Incident Response with Troy Wojewoda</a></p><p><br><strong>🔗 Register for FREE Infosec Webcasts, Anti-casts &amp; Summits </strong></p><p><a href="https://poweredbybhis.com/">https://poweredbybhis.com</a></p><p><br>Brought to you by:</p><p><strong>Black Hills Information Security </strong></p><p><a href="https://www.blackhillsinfosec.com/">https://www.blackhillsinfosec.com</a></p><p><br></p><p><strong>Antisyphon Training</strong></p><p><a href="https://www.antisyphontraining.com/">https://www.antisyphontraining.com/</a></p><p><br></p><p><strong>Active Countermeasures</strong></p><p><a href="https://www.activecountermeasures.com/">https://www.activecountermeasures.com</a></p><p><br></p><p><strong>Wild West Hackin Fest</strong></p><p><a href="https://wildwesthackinfest.com/">https://wildwesthackinfest.com</a></p>]]>
      </itunes:summary>
      <itunes:keywords>Infosec,Cybersecurity,news</itunes:keywords>
      <itunes:explicit>No</itunes:explicit>
      <podcast:person role="Guest" href="https://jamesmcquiggan.com" img="https://img.transistorcdn.com/vXTHIVclMMYRvV-hiqUAQ4l7fJSv88dR9Q60p1xQ0z8/rs:fill:0:0:1/w:800/h:800/q:60/mb:500000/aHR0cHM6Ly9pbWct/dXBsb2FkLXByb2R1/Y3Rpb24udHJhbnNp/c3Rvci5mbS9mZjc1/YzkxM2E0ZjVjZTNk/NGY5NTRiYmM5ODU0/OTYyYi5qcGc.jpg">James McQuiggan</podcast:person>
      <podcast:person role="Producer" href="https://www.blackhillsinfosec.com/team/ryan-poirier/">Ryan Poirier</podcast:person>
      <podcast:person role="Host" href="https://www.blackhillsinfosec.com/team/john-strand/" img="https://img.transistorcdn.com/NUqk_fUpMRKpGIokj-WgaiALdQtlImwADID3aNogGds/rs:fill:0:0:1/w:800/h:800/q:60/mb:500000/aHR0cHM6Ly9pbWct/dXBsb2FkLXByb2R1/Y3Rpb24udHJhbnNp/c3Rvci5mbS84Y2Ji/YmMyMzRlMDM2Nzdi/YmNlYjhlZDQwZmM4/MmJlYy5qcGc.jpg">John Strand</podcast:person>
      <podcast:person role="Host" href="https://www.bsidessd.org/" img="https://img.transistorcdn.com/KeYB5iZ31d5IGBEuYGSV1SOcM5ZsEQ3dGI4HgjvyVVE/rs:fill:0:0:1/w:800/h:800/q:60/mb:500000/aHR0cHM6Ly9pbWct/dXBsb2FkLXByb2R1/Y3Rpb24udHJhbnNp/c3Rvci5mbS82ZGRm/ZWU5MGU5YzJiZjU0/MTVmZTU0OWExYTg4/OGFhMi5wbmc.jpg">Wade Wells</podcast:person>
      <podcast:person role="Host" href="https://www.blackhillsinfosec.com/team/corey-ham/" img="https://img.transistorcdn.com/Q9BaWxLnY_zU_A-eKpfV22Y1AiBI64lLxLJP19iD_lM/rs:fill:0:0:1/w:800/h:800/q:60/mb:500000/aHR0cHM6Ly9pbWct/dXBsb2FkLXByb2R1/Y3Rpb24udHJhbnNp/c3Rvci5mbS84MTMx/N2JlN2IzZWI2MDcz/MGU0NTk5NGU0N2Iw/NzE2Yy5qcGc.jpg">Corey Ham</podcast:person>
      <podcast:transcript url="https://share.transistor.fm/s/110e3954/transcription.vtt" type="text/vtt" rel="captions"/>
      <podcast:transcript url="https://share.transistor.fm/s/110e3954/transcription.srt" type="application/x-subrip" rel="captions"/>
      <podcast:transcript url="https://share.transistor.fm/s/110e3954/transcription.json" type="application/json" rel="captions"/>
      <podcast:transcript url="https://share.transistor.fm/s/110e3954/transcription.txt" type="text/plain"/>
      <podcast:transcript url="https://share.transistor.fm/s/110e3954/transcription" type="text/html"/>
      <podcast:chapters url="https://share.transistor.fm/s/110e3954/chapters.json" type="application/json+chapters"/>
    </item>
    <item>
      <title>Pentagon Declares Anthropic a Supply Chain Risk — 2026-03-02</title>
      <itunes:season>6</itunes:season>
      <podcast:season>6</podcast:season>
      <itunes:episode>9</itunes:episode>
      <podcast:episode>9</podcast:episode>
      <itunes:title>Pentagon Declares Anthropic a Supply Chain Risk — 2026-03-02</itunes:title>
      <itunes:episodeType>full</itunes:episodeType>
      <guid isPermaLink="false">62e4ebec-ed7e-4c47-9c7a-6ec084c15759</guid>
      <link>https://share.transistor.fm/s/2c531fda</link>
      <description>
        <![CDATA[<p>Join us LIVE on Mondays, 4:30pm EST.<br>A weekly Podcast with BHIS and Friends. We discuss notable Infosec, and infosec-adjacent news stories gathered by our community news team.<br><a href="https://www.youtube.com/@BlackHillsInformationSecurity">https://www.youtube.com/@BlackHillsInformationSecurity</a></p><p>Chat with us on Discord! - <br><a href="https://discord.gg/bhis">https://discord.gg/bhis</a><br>🔴live-chat</p><p><br><strong>Chapters</strong><br></p><ul><li>(00:00) - PreShow Banter™ — Kerberoasting Too Hard</li>
<li>(05:05) - Pentagon Declares Anthropic a Supply Chain Risk — Talkin’ Bout [infosec] News 2026-03-02</li>
<li>(08:40) - Story # 1: Pentagon Designates Anthropic Supply Chain Risk</li>
<li>(17:27) - Story # 2: European Parliament blocks AI on lawmakers’ devices, citing security risks</li>
<li>(21:23) - Story # 3: Mexican Government Breach and the Rise of Agentic Cyber Threats</li>
<li>(22:58) - Story # 4: 2026 CrowdStrike Global Threat Report: AI Accelerates Adversaries and Reshapes the Attack Surface</li>
<li>(33:04) - Story # 5: Leak confirms GrapheneOS &amp; Motorola partnership for non-Pixel hardware</li>
<li>(38:24) - Story # 5b: Motorola announces a partnership with GrapheneOS Foundation, marking a new chapter in smartphone security and expanding its enterprise portfolio</li>
<li>(39:21) - Story # 6: Immediate Action Required: CISA Issues Emergency Directive to Secure Cisco SD-WAN Systems</li>
<li>(43:12) - Story # 7: Cops back Dutch telco Odido after second wave of ShinyHunters leaks</li>
<li>(45:40) - Story # 8: Discord puts global age verification policy on hold after backlash</li>
<li>(46:30) - Story # 9: A new California law says all operating systems, including Linux, need to have some form of age verification at account setup</li>
<li>(51:51) - Story # 10: User accidentally gains control of over 6,700 robot vacuums</li>
<li>(53:35) - Story # 11: App Warns You if Someone Is Wearing Smart Glasses Nearby</li>
<li>(57:32) - Weekly CTF Winners</li>
<li>(58:28) - Story # 12: Microsoft is blocking 'Microslop' comments in Copilot's official Discord server</li>
<li>(59:01) - Story # 13: New AirSnitch attack bypasses Wi-Fi encryption in homes, offices, and enterprises</li>
</ul><br><strong>Links</strong><br>Story # 1: <a href="https://thehackernews.com/2026/02/pentagon-designates-anthropic-supply.html">Pentagon Designates Anthropic Supply Chain Risk</a><br>Story # 2: <a href="https://techcrunch.com/2026/02/17/european-parliament-blocks-ai-on-lawmakers-devices-citing-security-risks/">European Parliament blocks AI on lawmakers’ devices, citing security risks</a><br>Story # 3: <a href="https://www.reddit.com/r/cybersecurity/comments/1reg4pe/mexican_government_breach_and_the_rise_of_agentic/">Mexican Government Breach and the Rise of Agentic Cyber Threats</a><br>Story # 4: <a href="https://www.crowdstrike.com/en-us/press-releases/2026-crowdstrike-global-threat-report/">2026 CrowdStrike Global Threat Report: AI Accelerates Adversaries and Reshapes the Attack Surface</a><br>Story # 5: <a href="https://piunikaweb.com/2026/02/27/leak-confirms-grapheneos-motorola-partnership-for-non-pixel-hardware/">Leak confirms GrapheneOS &amp; Motorola partnership for non-Pixel hardware</a><br>Story # 5b: <a href="https://motorolanews.com/motorola-three-new-b2b-solutions-at-mwc-2026/">Motorola announces a partnership with GrapheneOS Foundation, marking a new chapter in smartphone security and expanding its enterprise portfolio</a><br>Story # 6: <a href="https://www.cisa.gov/news-events/news/immediate-action-required-cisa-issues-emergency-directive-secure-cisco-sd-wan-systems">Immediate Action Required: CISA Issues Emergency Directive to Secure Cisco SD-WAN Systems</a><br>Story # 7: <a href="https://www.theregister.com/2026/02/27/odido_shinyhunters_leaks/">Cops back Dutch telco Odido after second wave of ShinyHunters leaks</a><br>Story # 8: <a href="https://therecord.media/discord-age-verification-policy-on-hold-after-backlash">Discord puts global age verification policy on hold after backlash</a><br>Story # 9: <a href="https://www.pcgamer.com/software/operating-systems/a-new-california-law-says-all-operating-systems-including-linux-need-to-have-some-form-of-age-verification-at-account-setup/">A new California law says all operating systems, including Linux, need to have some form of age verification at account setup</a><br>Story # 10: <a href="https://www.tomshardware.com/tech-industry/cyber-security/user-accidentally-gains-control-of-over-6-700-robot-vacuums-while-tinkering-with-their-own-device-to-enable-control-with-a-playstation-controller-security-flaw-reveals-floor-plans-and-live-video-feeds">User accidentally gains control of over 6,700 robot vacuums</a><br>Story # 11: <a href="https://www.404media.co/this-app-warns-you-if-someone-is-wearing-smart-glasses-nearby/">App Warns You if Someone Is Wearing Smart Glasses Nearby</a><br>Story # 12: <a href="https://x.com/WindowsLatest/status/2028161757429350564">Microsoft is blocking ‘Microslop’ comments in Copilot’s official Discord server</a><br>Story # 13: <a href="https://arstechnica.com/security/2026/02/new-airsnitch-attack-breaks-wi-fi-encryption-in-homes-offices-and-enterprises/">New AirSnitch attack bypasses Wi-Fi encryption in homes, offices, and enterprises</a><p><br><strong>🔗 Register for FREE Infosec Webcasts, Anti-casts &amp; Summits </strong></p><p><a href="https://poweredbybhis.com/">https://poweredbybhis.com</a></p><p><br>Brought to you by:</p><p><strong>Black Hills Information Security </strong></p><p><a href="https://www.blackhillsinfosec.com/">https://www.blackhillsinfosec.com</a></p><p><br></p><p><strong>Antisyphon Training</strong></p><p><a href="https://www.antisyphontraining.com/">https://www.antisyphontraining.com/</a></p><p><br></p><p><strong>Active Countermeasures</strong></p><p><a href="https://www.activecountermeasures.com/">https://www.activecountermeasures.com</a></p><p><br></p><p><strong>Wild West Hackin Fest</strong></p><p><a href="https://wildwesthackinfest.com/">https://wildwesthackinfest.com</a></p>]]>
      </description>
      <content:encoded>
        <![CDATA[<p>Join us LIVE on Mondays, 4:30pm EST.<br>A weekly Podcast with BHIS and Friends. We discuss notable Infosec, and infosec-adjacent news stories gathered by our community news team.<br><a href="https://www.youtube.com/@BlackHillsInformationSecurity">https://www.youtube.com/@BlackHillsInformationSecurity</a></p><p>Chat with us on Discord! - <br><a href="https://discord.gg/bhis">https://discord.gg/bhis</a><br>🔴live-chat</p><p><br><strong>Chapters</strong><br></p><ul><li>(00:00) - PreShow Banter™ — Kerberoasting Too Hard</li>
<li>(05:05) - Pentagon Declares Anthropic a Supply Chain Risk — Talkin’ Bout [infosec] News 2026-03-02</li>
<li>(08:40) - Story # 1: Pentagon Designates Anthropic Supply Chain Risk</li>
<li>(17:27) - Story # 2: European Parliament blocks AI on lawmakers’ devices, citing security risks</li>
<li>(21:23) - Story # 3: Mexican Government Breach and the Rise of Agentic Cyber Threats</li>
<li>(22:58) - Story # 4: 2026 CrowdStrike Global Threat Report: AI Accelerates Adversaries and Reshapes the Attack Surface</li>
<li>(33:04) - Story # 5: Leak confirms GrapheneOS &amp; Motorola partnership for non-Pixel hardware</li>
<li>(38:24) - Story # 5b: Motorola announces a partnership with GrapheneOS Foundation, marking a new chapter in smartphone security and expanding its enterprise portfolio</li>
<li>(39:21) - Story # 6: Immediate Action Required: CISA Issues Emergency Directive to Secure Cisco SD-WAN Systems</li>
<li>(43:12) - Story # 7: Cops back Dutch telco Odido after second wave of ShinyHunters leaks</li>
<li>(45:40) - Story # 8: Discord puts global age verification policy on hold after backlash</li>
<li>(46:30) - Story # 9: A new California law says all operating systems, including Linux, need to have some form of age verification at account setup</li>
<li>(51:51) - Story # 10: User accidentally gains control of over 6,700 robot vacuums</li>
<li>(53:35) - Story # 11: App Warns You if Someone Is Wearing Smart Glasses Nearby</li>
<li>(57:32) - Weekly CTF Winners</li>
<li>(58:28) - Story # 12: Microsoft is blocking 'Microslop' comments in Copilot's official Discord server</li>
<li>(59:01) - Story # 13: New AirSnitch attack bypasses Wi-Fi encryption in homes, offices, and enterprises</li>
</ul><br><strong>Links</strong><br>Story # 1: <a href="https://thehackernews.com/2026/02/pentagon-designates-anthropic-supply.html">Pentagon Designates Anthropic Supply Chain Risk</a><br>Story # 2: <a href="https://techcrunch.com/2026/02/17/european-parliament-blocks-ai-on-lawmakers-devices-citing-security-risks/">European Parliament blocks AI on lawmakers’ devices, citing security risks</a><br>Story # 3: <a href="https://www.reddit.com/r/cybersecurity/comments/1reg4pe/mexican_government_breach_and_the_rise_of_agentic/">Mexican Government Breach and the Rise of Agentic Cyber Threats</a><br>Story # 4: <a href="https://www.crowdstrike.com/en-us/press-releases/2026-crowdstrike-global-threat-report/">2026 CrowdStrike Global Threat Report: AI Accelerates Adversaries and Reshapes the Attack Surface</a><br>Story # 5: <a href="https://piunikaweb.com/2026/02/27/leak-confirms-grapheneos-motorola-partnership-for-non-pixel-hardware/">Leak confirms GrapheneOS &amp; Motorola partnership for non-Pixel hardware</a><br>Story # 5b: <a href="https://motorolanews.com/motorola-three-new-b2b-solutions-at-mwc-2026/">Motorola announces a partnership with GrapheneOS Foundation, marking a new chapter in smartphone security and expanding its enterprise portfolio</a><br>Story # 6: <a href="https://www.cisa.gov/news-events/news/immediate-action-required-cisa-issues-emergency-directive-secure-cisco-sd-wan-systems">Immediate Action Required: CISA Issues Emergency Directive to Secure Cisco SD-WAN Systems</a><br>Story # 7: <a href="https://www.theregister.com/2026/02/27/odido_shinyhunters_leaks/">Cops back Dutch telco Odido after second wave of ShinyHunters leaks</a><br>Story # 8: <a href="https://therecord.media/discord-age-verification-policy-on-hold-after-backlash">Discord puts global age verification policy on hold after backlash</a><br>Story # 9: <a href="https://www.pcgamer.com/software/operating-systems/a-new-california-law-says-all-operating-systems-including-linux-need-to-have-some-form-of-age-verification-at-account-setup/">A new California law says all operating systems, including Linux, need to have some form of age verification at account setup</a><br>Story # 10: <a href="https://www.tomshardware.com/tech-industry/cyber-security/user-accidentally-gains-control-of-over-6-700-robot-vacuums-while-tinkering-with-their-own-device-to-enable-control-with-a-playstation-controller-security-flaw-reveals-floor-plans-and-live-video-feeds">User accidentally gains control of over 6,700 robot vacuums</a><br>Story # 11: <a href="https://www.404media.co/this-app-warns-you-if-someone-is-wearing-smart-glasses-nearby/">App Warns You if Someone Is Wearing Smart Glasses Nearby</a><br>Story # 12: <a href="https://x.com/WindowsLatest/status/2028161757429350564">Microsoft is blocking ‘Microslop’ comments in Copilot’s official Discord server</a><br>Story # 13: <a href="https://arstechnica.com/security/2026/02/new-airsnitch-attack-breaks-wi-fi-encryption-in-homes-offices-and-enterprises/">New AirSnitch attack bypasses Wi-Fi encryption in homes, offices, and enterprises</a><p><br><strong>🔗 Register for FREE Infosec Webcasts, Anti-casts &amp; Summits </strong></p><p><a href="https://poweredbybhis.com/">https://poweredbybhis.com</a></p><p><br>Brought to you by:</p><p><strong>Black Hills Information Security </strong></p><p><a href="https://www.blackhillsinfosec.com/">https://www.blackhillsinfosec.com</a></p><p><br></p><p><strong>Antisyphon Training</strong></p><p><a href="https://www.antisyphontraining.com/">https://www.antisyphontraining.com/</a></p><p><br></p><p><strong>Active Countermeasures</strong></p><p><a href="https://www.activecountermeasures.com/">https://www.activecountermeasures.com</a></p><p><br></p><p><strong>Wild West Hackin Fest</strong></p><p><a href="https://wildwesthackinfest.com/">https://wildwesthackinfest.com</a></p>]]>
      </content:encoded>
      <pubDate>Fri, 06 Mar 2026 16:03:45 -0500</pubDate>
      <author>Black Hills Information Security</author>
      <enclosure url="https://media.transistor.fm/2c531fda/e6b2750d.mp3" length="64195336" type="audio/mpeg"/>
      <itunes:author>Black Hills Information Security</itunes:author>
      <itunes:image href="https://img.transistorcdn.com/J0T2NYHmTRiubXYlFy2wVVB1EjdgscS0uVJOuDavVUI/rs:fill:0:0:1/w:1400/h:1400/q:60/mb:500000/aHR0cHM6Ly9pbWct/dXBsb2FkLXByb2R1/Y3Rpb24udHJhbnNp/c3Rvci5mbS8wYzg5/YmVjYjk3NmM5MTJh/OTAwNTk2MTMxYTIx/NDkzYy5qcGc.jpg"/>
      <itunes:duration>3842</itunes:duration>
      <itunes:summary>
        <![CDATA[<p>Join us LIVE on Mondays, 4:30pm EST.<br>A weekly Podcast with BHIS and Friends. We discuss notable Infosec, and infosec-adjacent news stories gathered by our community news team.<br><a href="https://www.youtube.com/@BlackHillsInformationSecurity">https://www.youtube.com/@BlackHillsInformationSecurity</a></p><p>Chat with us on Discord! - <br><a href="https://discord.gg/bhis">https://discord.gg/bhis</a><br>🔴live-chat</p><p><br><strong>Chapters</strong><br></p><ul><li>(00:00) - PreShow Banter™ — Kerberoasting Too Hard</li>
<li>(05:05) - Pentagon Declares Anthropic a Supply Chain Risk — Talkin’ Bout [infosec] News 2026-03-02</li>
<li>(08:40) - Story # 1: Pentagon Designates Anthropic Supply Chain Risk</li>
<li>(17:27) - Story # 2: European Parliament blocks AI on lawmakers’ devices, citing security risks</li>
<li>(21:23) - Story # 3: Mexican Government Breach and the Rise of Agentic Cyber Threats</li>
<li>(22:58) - Story # 4: 2026 CrowdStrike Global Threat Report: AI Accelerates Adversaries and Reshapes the Attack Surface</li>
<li>(33:04) - Story # 5: Leak confirms GrapheneOS &amp; Motorola partnership for non-Pixel hardware</li>
<li>(38:24) - Story # 5b: Motorola announces a partnership with GrapheneOS Foundation, marking a new chapter in smartphone security and expanding its enterprise portfolio</li>
<li>(39:21) - Story # 6: Immediate Action Required: CISA Issues Emergency Directive to Secure Cisco SD-WAN Systems</li>
<li>(43:12) - Story # 7: Cops back Dutch telco Odido after second wave of ShinyHunters leaks</li>
<li>(45:40) - Story # 8: Discord puts global age verification policy on hold after backlash</li>
<li>(46:30) - Story # 9: A new California law says all operating systems, including Linux, need to have some form of age verification at account setup</li>
<li>(51:51) - Story # 10: User accidentally gains control of over 6,700 robot vacuums</li>
<li>(53:35) - Story # 11: App Warns You if Someone Is Wearing Smart Glasses Nearby</li>
<li>(57:32) - Weekly CTF Winners</li>
<li>(58:28) - Story # 12: Microsoft is blocking 'Microslop' comments in Copilot's official Discord server</li>
<li>(59:01) - Story # 13: New AirSnitch attack bypasses Wi-Fi encryption in homes, offices, and enterprises</li>
</ul><br><strong>Links</strong><br>Story # 1: <a href="https://thehackernews.com/2026/02/pentagon-designates-anthropic-supply.html">Pentagon Designates Anthropic Supply Chain Risk</a><br>Story # 2: <a href="https://techcrunch.com/2026/02/17/european-parliament-blocks-ai-on-lawmakers-devices-citing-security-risks/">European Parliament blocks AI on lawmakers’ devices, citing security risks</a><br>Story # 3: <a href="https://www.reddit.com/r/cybersecurity/comments/1reg4pe/mexican_government_breach_and_the_rise_of_agentic/">Mexican Government Breach and the Rise of Agentic Cyber Threats</a><br>Story # 4: <a href="https://www.crowdstrike.com/en-us/press-releases/2026-crowdstrike-global-threat-report/">2026 CrowdStrike Global Threat Report: AI Accelerates Adversaries and Reshapes the Attack Surface</a><br>Story # 5: <a href="https://piunikaweb.com/2026/02/27/leak-confirms-grapheneos-motorola-partnership-for-non-pixel-hardware/">Leak confirms GrapheneOS &amp; Motorola partnership for non-Pixel hardware</a><br>Story # 5b: <a href="https://motorolanews.com/motorola-three-new-b2b-solutions-at-mwc-2026/">Motorola announces a partnership with GrapheneOS Foundation, marking a new chapter in smartphone security and expanding its enterprise portfolio</a><br>Story # 6: <a href="https://www.cisa.gov/news-events/news/immediate-action-required-cisa-issues-emergency-directive-secure-cisco-sd-wan-systems">Immediate Action Required: CISA Issues Emergency Directive to Secure Cisco SD-WAN Systems</a><br>Story # 7: <a href="https://www.theregister.com/2026/02/27/odido_shinyhunters_leaks/">Cops back Dutch telco Odido after second wave of ShinyHunters leaks</a><br>Story # 8: <a href="https://therecord.media/discord-age-verification-policy-on-hold-after-backlash">Discord puts global age verification policy on hold after backlash</a><br>Story # 9: <a href="https://www.pcgamer.com/software/operating-systems/a-new-california-law-says-all-operating-systems-including-linux-need-to-have-some-form-of-age-verification-at-account-setup/">A new California law says all operating systems, including Linux, need to have some form of age verification at account setup</a><br>Story # 10: <a href="https://www.tomshardware.com/tech-industry/cyber-security/user-accidentally-gains-control-of-over-6-700-robot-vacuums-while-tinkering-with-their-own-device-to-enable-control-with-a-playstation-controller-security-flaw-reveals-floor-plans-and-live-video-feeds">User accidentally gains control of over 6,700 robot vacuums</a><br>Story # 11: <a href="https://www.404media.co/this-app-warns-you-if-someone-is-wearing-smart-glasses-nearby/">App Warns You if Someone Is Wearing Smart Glasses Nearby</a><br>Story # 12: <a href="https://x.com/WindowsLatest/status/2028161757429350564">Microsoft is blocking ‘Microslop’ comments in Copilot’s official Discord server</a><br>Story # 13: <a href="https://arstechnica.com/security/2026/02/new-airsnitch-attack-breaks-wi-fi-encryption-in-homes-offices-and-enterprises/">New AirSnitch attack bypasses Wi-Fi encryption in homes, offices, and enterprises</a><p><br><strong>🔗 Register for FREE Infosec Webcasts, Anti-casts &amp; Summits </strong></p><p><a href="https://poweredbybhis.com/">https://poweredbybhis.com</a></p><p><br>Brought to you by:</p><p><strong>Black Hills Information Security </strong></p><p><a href="https://www.blackhillsinfosec.com/">https://www.blackhillsinfosec.com</a></p><p><br></p><p><strong>Antisyphon Training</strong></p><p><a href="https://www.antisyphontraining.com/">https://www.antisyphontraining.com/</a></p><p><br></p><p><strong>Active Countermeasures</strong></p><p><a href="https://www.activecountermeasures.com/">https://www.activecountermeasures.com</a></p><p><br></p><p><strong>Wild West Hackin Fest</strong></p><p><a href="https://wildwesthackinfest.com/">https://wildwesthackinfest.com</a></p>]]>
      </itunes:summary>
      <itunes:keywords>Infosec,Cybersecurity,news</itunes:keywords>
      <itunes:explicit>No</itunes:explicit>
      <podcast:person role="Host" href="https://www.blackhillsinfosec.com/team/corey-ham/" img="https://img.transistorcdn.com/Q9BaWxLnY_zU_A-eKpfV22Y1AiBI64lLxLJP19iD_lM/rs:fill:0:0:1/w:800/h:800/q:60/mb:500000/aHR0cHM6Ly9pbWct/dXBsb2FkLXByb2R1/Y3Rpb24udHJhbnNp/c3Rvci5mbS84MTMx/N2JlN2IzZWI2MDcz/MGU0NTk5NGU0N2Iw/NzE2Yy5qcGc.jpg">Corey Ham</podcast:person>
      <podcast:person role="Host" href="https://www.blackhillsinfosec.com/team/john-strand/" img="https://img.transistorcdn.com/NUqk_fUpMRKpGIokj-WgaiALdQtlImwADID3aNogGds/rs:fill:0:0:1/w:800/h:800/q:60/mb:500000/aHR0cHM6Ly9pbWct/dXBsb2FkLXByb2R1/Y3Rpb24udHJhbnNp/c3Rvci5mbS84Y2Ji/YmMyMzRlMDM2Nzdi/YmNlYjhlZDQwZmM4/MmJlYy5qcGc.jpg">John Strand</podcast:person>
      <podcast:person role="Host" href="https://www.bsidessd.org/" img="https://img.transistorcdn.com/KeYB5iZ31d5IGBEuYGSV1SOcM5ZsEQ3dGI4HgjvyVVE/rs:fill:0:0:1/w:800/h:800/q:60/mb:500000/aHR0cHM6Ly9pbWct/dXBsb2FkLXByb2R1/Y3Rpb24udHJhbnNp/c3Rvci5mbS82ZGRm/ZWU5MGU5YzJiZjU0/MTVmZTU0OWExYTg4/OGFhMi5wbmc.jpg">Wade Wells</podcast:person>
      <podcast:person role="Host" href="https://www.blackhillsinfosec.com/team/bronwen-aker/" img="https://img.transistorcdn.com/CSShIJJhZo9yPTywdOv4zlsSYFk9yVSAIU6CrsdvdY4/rs:fill:0:0:1/w:800/h:800/q:60/mb:500000/aHR0cHM6Ly9pbWct/dXBsb2FkLXByb2R1/Y3Rpb24udHJhbnNp/c3Rvci5mbS80YWIy/MWUxODE4NjA1MmRm/OTBmZmYyYzRlYmU1/N2NhOC5qcGc.jpg">Bronwen Aker</podcast:person>
      <podcast:person role="Guest" href="https://bhisnews.transistor.fm/people/aisling-nic-lynne-siriciryel" img="https://img.transistorcdn.com/Tjn3zKVqAH4r98QV7VybA-7j1NhD5T7gMfcLITgjIvc/rs:fill:0:0:1/w:800/h:800/q:60/mb:500000/aHR0cHM6Ly9pbWct/dXBsb2FkLXByb2R1/Y3Rpb24udHJhbnNp/c3Rvci5mbS84MTYw/NTJiNmMxYjE1Yjgx/M2Y3NTU3MThiYjc5/ZWNhMy5qcGVn.jpg">Aisling nic Lynne "siriciryel"</podcast:person>
      <podcast:person role="Producer" href="https://bhisnews.transistor.fm/people/meagan-bentley">Meagan Bentley</podcast:person>
      <podcast:person role="Guest" href="https://www.blackhillsinfosec.com/team/ashley-knowles/" img="https://img.transistorcdn.com/K90AqSyU54MhSZPWf96hWMbq_np4Uc63407xKFkt1gg/rs:fill:0:0:1/w:800/h:800/q:60/mb:500000/aHR0cHM6Ly9pbWct/dXBsb2FkLXByb2R1/Y3Rpb24udHJhbnNp/c3Rvci5mbS9jNjJh/YmQ4Y2Y3YjJmZTdh/ODQyZjQwYzdhZjQy/NTFhZC5qcGc.jpg">Ashley Knowles</podcast:person>
      <podcast:transcript url="https://share.transistor.fm/s/2c531fda/transcription.vtt" type="text/vtt" rel="captions"/>
      <podcast:transcript url="https://share.transistor.fm/s/2c531fda/transcription.srt" type="application/x-subrip" rel="captions"/>
      <podcast:transcript url="https://share.transistor.fm/s/2c531fda/transcription.json" type="application/json" rel="captions"/>
      <podcast:transcript url="https://share.transistor.fm/s/2c531fda/transcription.txt" type="text/plain"/>
      <podcast:transcript url="https://share.transistor.fm/s/2c531fda/transcription" type="text/html"/>
      <podcast:chapters url="https://share.transistor.fm/s/2c531fda/chapters.json" type="application/json+chapters"/>
    </item>
    <item>
      <title>The Coming SAAS Apocalypse - 2026-02-23</title>
      <itunes:season>6</itunes:season>
      <podcast:season>6</podcast:season>
      <itunes:episode>8</itunes:episode>
      <podcast:episode>8</podcast:episode>
      <itunes:title>The Coming SAAS Apocalypse - 2026-02-23</itunes:title>
      <itunes:episodeType>full</itunes:episodeType>
      <guid isPermaLink="false">96666f02-0020-4084-b7cd-8c7b5b722aa6</guid>
      <link>https://share.transistor.fm/s/af8c6d5d</link>
      <description>
        <![CDATA[<p>In this episode:</p><ul><li><strong>Agentic AI tools</strong> that can autonomously perform tasks like researching and booking flights, raising concerns about automated purchases, fraud, guardrails, and over-trust in AI systems.</li><li>The idea of a coming <strong>“SaaS apocalypse,”</strong> where AI tools could replicate or replace many small- and mid-tier SaaS products by crawling and recreating their functionality—potentially disrupting payroll, accounting, and other service platforms.</li><li><strong>Android’s shift away from its open-platform roots</strong>, including concerns about reduced openness, developer anonymity in app stores, and the broader implications for privacy-focused users and alternative operating systems.</li><li>Ongoing tensions in the tech ecosystem around <strong>platform control, openness, and general-purpose computing</strong>, particularly involving large vendors like Google, Apple, Oracle, and major cloud providers.</li><li>Broader <strong>security implications of AI adoption</strong>, including hallucinations, accountability, and how organizations are integrating AI to cut costs versus innovate.</li></ul><p>The discussion centers strictly on these current tech news developments and their security, privacy, and market impact.</p><p>Join us LIVE on Mondays, 4:30pm EST.<br>A weekly Podcast with BHIS and Friends. We discuss notable Infosec, and infosec-adjacent news stories gathered by our community news team.<br><a href="https://www.youtube.com/@BlackHillsInformationSecurity">https://www.youtube.com/@BlackHillsInformationSecurity</a></p><p>Chat with us on Discord! - <br><a href="https://discord.gg/bhis">https://discord.gg/bhis</a><br>🔴live-chat</p><p><br><strong>Chapters</strong><br></p><ul><li>(00:00) - PreShow Banter™ — Take the interstate to Dubai</li>
<li>(04:53) - The Coming SAAS Apocalypse - 2026-02-23</li>
<li>(07:39) - Story # 1: Keep Android Open</li>
<li>(15:34) - Story # 2: Meta patents AI that takes over a dead person’s account to keep posting and chatting</li>
<li>(21:13) - Story # 3: The Coming SaaS Apocalypse...</li>
<li>(28:52) - Story # 4: Firm Data on AI</li>
<li>(29:43) - Story # 4b: Thousands of CEOs just admitted AI had no impact on employment or productivity—and it has economists resurrecting a paradox from 40 years ago</li>
<li>(36:15) - Story # 5: US Defense Secretary Hegseth summons Anthropic CEO for tough talks over military use of Claude, Axios reports</li>
<li>(40:41) - Story # 6: Conduent data breach could be largest in U.S. history</li>
<li>(43:13) - Story # 6: The Erosion of Agency and the New Burden on Leaders</li>
<li>(46:02) - Story # 7: DSA-2026-079: Security Update for RecoverPoint for Virtual Machines Hardcoded Credential Vulnerability</li>
<li>(48:30) - Story # 8: AI-augmented threat actor accesses FortiGate devices at scale</li>
<li>(51:42) - Story # 9: I hacked ChatGPT and Google's AI - and it only took 20 minutes</li>
<li>(01:03:07) - Antisyphon Training SOC Summit, March 25, 2026</li>
<li>(01:03:40) - Antisyphon Training: Attacking, Defending, and Leveraging AI-LLM Systems</li>
<li>(01:03:58) - Antisyphon Workshop: Hacking AI-LLM Applications</li>
<li>(01:04:27) - Antisyphon Anti-Cast: RED TEAMING AI: OWASP LLM TOP 10 WITH BRIAN AND DEREK</li>
<li>(01:04:53) - PODCAST : A.I. Security Ops</li>
</ul><br><strong>Links</strong><br>Story # 1: <a href="https://keepandroidopen.org">Keep Android Open</a><br>Story # 2: <a href="https://www.dexerto.com/entertainment/meta-patents-ai-that-takes-over-a-dead-persons-account-to-keep-posting-and-chatting-3320326/">Meta patents AI that takes over a dead person’s account to keep posting and chatting</a><br>Story # 3: <a href="https://www.linkedin.com/pulse/coming-saas-apocalypse-john-strand-udsmc/">The Coming SaaS Apocalypse…</a><br>Story # 4: <a href="https://www.nber.org/papers/w34836">Firm Data on AI</a><br>Story # 4b: <a href="https://fortune.com/2026/02/17/ai-productivity-paradox-ceo-study-robert-solow-information-technology-age/">Thousands of CEOs just admitted AI had no impact on employment or productivity—and it has economists resurrecting a paradox from 40 years ago</a><br>Story # 5: <a href="https://www.reuters.com/world/us-defense-secretary-hegseth-summons-anthropic-ceo-tough-talks-over-military-use-2026-02-23/">US Defense Secretary Hegseth summons Anthropic CEO for tough talks over military use of Claude, Axios reports</a><br>Story # 6: <a href="https://www.wrdw.com/2026/02/20/conduent-data-breach-could-be-largest-us-history/">Conduent data breach could be largest in U.S. history</a><br>Story # 6: <a href="https://thecriticalstack.substack.com/p/the-erosion-of-agency-and-the-new">The Erosion of Agency and the New Burden on Leaders</a><br>Story # 7: <a href="https://www.dell.com/support/kbdoc/en-us/000426773/dsa-2026-079">DSA-2026-079: Security Update for RecoverPoint for Virtual Machines Hardcoded Credential Vulnerability</a><br>Story # 8: <a href="https://aws.amazon.com/blogs/security/ai-augmented-threat-actor-accesses-fortigate-devices-at-scale/">AI-augmented threat actor accesses FortiGate devices at scale</a><br>Story # 9: <a href="https://www.bbc.co.uk/future/article/20260218-i-hacked-chatgpt-and-googles-ai-and-it-only-took-20-minutes">I hacked ChatGPT and Google’s AI - and it only took 20 minutes</a><br>Antisyphon Training <a href="https://www.antisyphontraining.com/event/soc-summit/">SOC Summit, March 25, 2026</a><br>Antisyphon Training: <a href="https://www.antisyphontraining.com/product/attacking-defending-and-leveraging-ai-llm-systems/">Attacking, Defending, and Leveraging AI-LLM Systems</a><br>Antisyphon Workshop: <a href="https://www.antisyphontraining.com/product/workshop-hacking-ai-llm-applications-with-brian-fehrman-joff-thyer-and-derek-banks/">Hacking AI-LLM Applications</a><br>Antisyphon Anti-Cast: <a href="https://www.antisyphontraining.com/event/anti-cast-red-teaming-ai-owasp-llm-top-10-with-brian-and-derek/">RED TEAMING AI: OWASP LLM TOP 10 WITH BRIAN AND DEREK</a><br>PODCAST : <a href="https://aisecurityops.transistor.fm">A.I. Security Ops</a><p><br><strong>🔗 Register for FREE Infosec Webcasts, Anti-casts &amp; Summits </strong></p><p><a href="https://poweredbybhis.com/">https://poweredbybhis.com</a></p><p><br>Brought to you by:</p><p><strong>Black Hills Information Security </strong></p><p><a href="https://www.blackhillsinfosec.com/">https://www.blackhillsinfosec.com</a></p><p><br></p><p><strong>Antisyphon Training</strong></p><p><a href="https://www.antisyphontraining.com/">https://www.antisyphontraining.com/</a></p><p><br></p><p><strong>Active Countermeasures</strong></p><p><a href="https://www.activecountermeasures.com/">https://www.activecountermeasures.com</a></p><p><br></p><p><strong>Wild West Hackin Fest</strong></p><p><a href="https://wildwesthackinfest.com/">https://wildwesthackinfest.com</a></p><p><a href="https://www.youtube.com/watch?v=RjEvfmtmzKg" title="Click here to watch this episode on YouTube.">Click here to watch this episode on YouTube.</a><br>
<br><a href="https://share.transistor.fm/s/af8c6d5d/transcript" title="Click here to view the episode transcript.">Click here to view the episode transcript.</a><br>
</p>]]>
      </description>
      <content:encoded>
        <![CDATA[<p>In this episode:</p><ul><li><strong>Agentic AI tools</strong> that can autonomously perform tasks like researching and booking flights, raising concerns about automated purchases, fraud, guardrails, and over-trust in AI systems.</li><li>The idea of a coming <strong>“SaaS apocalypse,”</strong> where AI tools could replicate or replace many small- and mid-tier SaaS products by crawling and recreating their functionality—potentially disrupting payroll, accounting, and other service platforms.</li><li><strong>Android’s shift away from its open-platform roots</strong>, including concerns about reduced openness, developer anonymity in app stores, and the broader implications for privacy-focused users and alternative operating systems.</li><li>Ongoing tensions in the tech ecosystem around <strong>platform control, openness, and general-purpose computing</strong>, particularly involving large vendors like Google, Apple, Oracle, and major cloud providers.</li><li>Broader <strong>security implications of AI adoption</strong>, including hallucinations, accountability, and how organizations are integrating AI to cut costs versus innovate.</li></ul><p>The discussion centers strictly on these current tech news developments and their security, privacy, and market impact.</p><p>Join us LIVE on Mondays, 4:30pm EST.<br>A weekly Podcast with BHIS and Friends. We discuss notable Infosec, and infosec-adjacent news stories gathered by our community news team.<br><a href="https://www.youtube.com/@BlackHillsInformationSecurity">https://www.youtube.com/@BlackHillsInformationSecurity</a></p><p>Chat with us on Discord! - <br><a href="https://discord.gg/bhis">https://discord.gg/bhis</a><br>🔴live-chat</p><p><br><strong>Chapters</strong><br></p><ul><li>(00:00) - PreShow Banter™ — Take the interstate to Dubai</li>
<li>(04:53) - The Coming SAAS Apocalypse - 2026-02-23</li>
<li>(07:39) - Story # 1: Keep Android Open</li>
<li>(15:34) - Story # 2: Meta patents AI that takes over a dead person’s account to keep posting and chatting</li>
<li>(21:13) - Story # 3: The Coming SaaS Apocalypse...</li>
<li>(28:52) - Story # 4: Firm Data on AI</li>
<li>(29:43) - Story # 4b: Thousands of CEOs just admitted AI had no impact on employment or productivity—and it has economists resurrecting a paradox from 40 years ago</li>
<li>(36:15) - Story # 5: US Defense Secretary Hegseth summons Anthropic CEO for tough talks over military use of Claude, Axios reports</li>
<li>(40:41) - Story # 6: Conduent data breach could be largest in U.S. history</li>
<li>(43:13) - Story # 6: The Erosion of Agency and the New Burden on Leaders</li>
<li>(46:02) - Story # 7: DSA-2026-079: Security Update for RecoverPoint for Virtual Machines Hardcoded Credential Vulnerability</li>
<li>(48:30) - Story # 8: AI-augmented threat actor accesses FortiGate devices at scale</li>
<li>(51:42) - Story # 9: I hacked ChatGPT and Google's AI - and it only took 20 minutes</li>
<li>(01:03:07) - Antisyphon Training SOC Summit, March 25, 2026</li>
<li>(01:03:40) - Antisyphon Training: Attacking, Defending, and Leveraging AI-LLM Systems</li>
<li>(01:03:58) - Antisyphon Workshop: Hacking AI-LLM Applications</li>
<li>(01:04:27) - Antisyphon Anti-Cast: RED TEAMING AI: OWASP LLM TOP 10 WITH BRIAN AND DEREK</li>
<li>(01:04:53) - PODCAST : A.I. Security Ops</li>
</ul><br><strong>Links</strong><br>Story # 1: <a href="https://keepandroidopen.org">Keep Android Open</a><br>Story # 2: <a href="https://www.dexerto.com/entertainment/meta-patents-ai-that-takes-over-a-dead-persons-account-to-keep-posting-and-chatting-3320326/">Meta patents AI that takes over a dead person’s account to keep posting and chatting</a><br>Story # 3: <a href="https://www.linkedin.com/pulse/coming-saas-apocalypse-john-strand-udsmc/">The Coming SaaS Apocalypse…</a><br>Story # 4: <a href="https://www.nber.org/papers/w34836">Firm Data on AI</a><br>Story # 4b: <a href="https://fortune.com/2026/02/17/ai-productivity-paradox-ceo-study-robert-solow-information-technology-age/">Thousands of CEOs just admitted AI had no impact on employment or productivity—and it has economists resurrecting a paradox from 40 years ago</a><br>Story # 5: <a href="https://www.reuters.com/world/us-defense-secretary-hegseth-summons-anthropic-ceo-tough-talks-over-military-use-2026-02-23/">US Defense Secretary Hegseth summons Anthropic CEO for tough talks over military use of Claude, Axios reports</a><br>Story # 6: <a href="https://www.wrdw.com/2026/02/20/conduent-data-breach-could-be-largest-us-history/">Conduent data breach could be largest in U.S. history</a><br>Story # 6: <a href="https://thecriticalstack.substack.com/p/the-erosion-of-agency-and-the-new">The Erosion of Agency and the New Burden on Leaders</a><br>Story # 7: <a href="https://www.dell.com/support/kbdoc/en-us/000426773/dsa-2026-079">DSA-2026-079: Security Update for RecoverPoint for Virtual Machines Hardcoded Credential Vulnerability</a><br>Story # 8: <a href="https://aws.amazon.com/blogs/security/ai-augmented-threat-actor-accesses-fortigate-devices-at-scale/">AI-augmented threat actor accesses FortiGate devices at scale</a><br>Story # 9: <a href="https://www.bbc.co.uk/future/article/20260218-i-hacked-chatgpt-and-googles-ai-and-it-only-took-20-minutes">I hacked ChatGPT and Google’s AI - and it only took 20 minutes</a><br>Antisyphon Training <a href="https://www.antisyphontraining.com/event/soc-summit/">SOC Summit, March 25, 2026</a><br>Antisyphon Training: <a href="https://www.antisyphontraining.com/product/attacking-defending-and-leveraging-ai-llm-systems/">Attacking, Defending, and Leveraging AI-LLM Systems</a><br>Antisyphon Workshop: <a href="https://www.antisyphontraining.com/product/workshop-hacking-ai-llm-applications-with-brian-fehrman-joff-thyer-and-derek-banks/">Hacking AI-LLM Applications</a><br>Antisyphon Anti-Cast: <a href="https://www.antisyphontraining.com/event/anti-cast-red-teaming-ai-owasp-llm-top-10-with-brian-and-derek/">RED TEAMING AI: OWASP LLM TOP 10 WITH BRIAN AND DEREK</a><br>PODCAST : <a href="https://aisecurityops.transistor.fm">A.I. Security Ops</a><p><br><strong>🔗 Register for FREE Infosec Webcasts, Anti-casts &amp; Summits </strong></p><p><a href="https://poweredbybhis.com/">https://poweredbybhis.com</a></p><p><br>Brought to you by:</p><p><strong>Black Hills Information Security </strong></p><p><a href="https://www.blackhillsinfosec.com/">https://www.blackhillsinfosec.com</a></p><p><br></p><p><strong>Antisyphon Training</strong></p><p><a href="https://www.antisyphontraining.com/">https://www.antisyphontraining.com/</a></p><p><br></p><p><strong>Active Countermeasures</strong></p><p><a href="https://www.activecountermeasures.com/">https://www.activecountermeasures.com</a></p><p><br></p><p><strong>Wild West Hackin Fest</strong></p><p><a href="https://wildwesthackinfest.com/">https://wildwesthackinfest.com</a></p><p><a href="https://www.youtube.com/watch?v=RjEvfmtmzKg" title="Click here to watch this episode on YouTube.">Click here to watch this episode on YouTube.</a><br>
<br><a href="https://share.transistor.fm/s/af8c6d5d/transcript" title="Click here to view the episode transcript.">Click here to view the episode transcript.</a><br>
</p>]]>
      </content:encoded>
      <pubDate>Wed, 25 Feb 2026 05:00:00 -0500</pubDate>
      <author>Black Hills Information Security</author>
      <enclosure url="https://media.transistor.fm/af8c6d5d/a7b10ab9.mp3" length="66445370" type="audio/mpeg"/>
      <itunes:author>Black Hills Information Security</itunes:author>
      <itunes:image href="https://img.transistorcdn.com/2Ioe7VfKahjskeWMc6JlrG-uDcNML4YMyNs7TtgkTWM/rs:fill:0:0:1/w:1400/h:1400/q:60/mb:500000/aHR0cHM6Ly9pbWct/dXBsb2FkLXByb2R1/Y3Rpb24udHJhbnNp/c3Rvci5mbS82MGU2/MjRkMTI3YTQ5NDc3/OGE3YjExMDRjNTc3/NTM4Yi5wbmc.jpg"/>
      <itunes:duration>3964</itunes:duration>
      <itunes:summary>
        <![CDATA[<p>In this episode:</p><ul><li><strong>Agentic AI tools</strong> that can autonomously perform tasks like researching and booking flights, raising concerns about automated purchases, fraud, guardrails, and over-trust in AI systems.</li><li>The idea of a coming <strong>“SaaS apocalypse,”</strong> where AI tools could replicate or replace many small- and mid-tier SaaS products by crawling and recreating their functionality—potentially disrupting payroll, accounting, and other service platforms.</li><li><strong>Android’s shift away from its open-platform roots</strong>, including concerns about reduced openness, developer anonymity in app stores, and the broader implications for privacy-focused users and alternative operating systems.</li><li>Ongoing tensions in the tech ecosystem around <strong>platform control, openness, and general-purpose computing</strong>, particularly involving large vendors like Google, Apple, Oracle, and major cloud providers.</li><li>Broader <strong>security implications of AI adoption</strong>, including hallucinations, accountability, and how organizations are integrating AI to cut costs versus innovate.</li></ul><p>The discussion centers strictly on these current tech news developments and their security, privacy, and market impact.</p><p>Join us LIVE on Mondays, 4:30pm EST.<br>A weekly Podcast with BHIS and Friends. We discuss notable Infosec, and infosec-adjacent news stories gathered by our community news team.<br><a href="https://www.youtube.com/@BlackHillsInformationSecurity">https://www.youtube.com/@BlackHillsInformationSecurity</a></p><p>Chat with us on Discord! - <br><a href="https://discord.gg/bhis">https://discord.gg/bhis</a><br>🔴live-chat</p><p><br><strong>Chapters</strong><br></p><ul><li>(00:00) - PreShow Banter™ — Take the interstate to Dubai</li>
<li>(04:53) - The Coming SAAS Apocalypse - 2026-02-23</li>
<li>(07:39) - Story # 1: Keep Android Open</li>
<li>(15:34) - Story # 2: Meta patents AI that takes over a dead person’s account to keep posting and chatting</li>
<li>(21:13) - Story # 3: The Coming SaaS Apocalypse...</li>
<li>(28:52) - Story # 4: Firm Data on AI</li>
<li>(29:43) - Story # 4b: Thousands of CEOs just admitted AI had no impact on employment or productivity—and it has economists resurrecting a paradox from 40 years ago</li>
<li>(36:15) - Story # 5: US Defense Secretary Hegseth summons Anthropic CEO for tough talks over military use of Claude, Axios reports</li>
<li>(40:41) - Story # 6: Conduent data breach could be largest in U.S. history</li>
<li>(43:13) - Story # 6: The Erosion of Agency and the New Burden on Leaders</li>
<li>(46:02) - Story # 7: DSA-2026-079: Security Update for RecoverPoint for Virtual Machines Hardcoded Credential Vulnerability</li>
<li>(48:30) - Story # 8: AI-augmented threat actor accesses FortiGate devices at scale</li>
<li>(51:42) - Story # 9: I hacked ChatGPT and Google's AI - and it only took 20 minutes</li>
<li>(01:03:07) - Antisyphon Training SOC Summit, March 25, 2026</li>
<li>(01:03:40) - Antisyphon Training: Attacking, Defending, and Leveraging AI-LLM Systems</li>
<li>(01:03:58) - Antisyphon Workshop: Hacking AI-LLM Applications</li>
<li>(01:04:27) - Antisyphon Anti-Cast: RED TEAMING AI: OWASP LLM TOP 10 WITH BRIAN AND DEREK</li>
<li>(01:04:53) - PODCAST : A.I. Security Ops</li>
</ul><br><strong>Links</strong><br>Story # 1: <a href="https://keepandroidopen.org">Keep Android Open</a><br>Story # 2: <a href="https://www.dexerto.com/entertainment/meta-patents-ai-that-takes-over-a-dead-persons-account-to-keep-posting-and-chatting-3320326/">Meta patents AI that takes over a dead person’s account to keep posting and chatting</a><br>Story # 3: <a href="https://www.linkedin.com/pulse/coming-saas-apocalypse-john-strand-udsmc/">The Coming SaaS Apocalypse…</a><br>Story # 4: <a href="https://www.nber.org/papers/w34836">Firm Data on AI</a><br>Story # 4b: <a href="https://fortune.com/2026/02/17/ai-productivity-paradox-ceo-study-robert-solow-information-technology-age/">Thousands of CEOs just admitted AI had no impact on employment or productivity—and it has economists resurrecting a paradox from 40 years ago</a><br>Story # 5: <a href="https://www.reuters.com/world/us-defense-secretary-hegseth-summons-anthropic-ceo-tough-talks-over-military-use-2026-02-23/">US Defense Secretary Hegseth summons Anthropic CEO for tough talks over military use of Claude, Axios reports</a><br>Story # 6: <a href="https://www.wrdw.com/2026/02/20/conduent-data-breach-could-be-largest-us-history/">Conduent data breach could be largest in U.S. history</a><br>Story # 6: <a href="https://thecriticalstack.substack.com/p/the-erosion-of-agency-and-the-new">The Erosion of Agency and the New Burden on Leaders</a><br>Story # 7: <a href="https://www.dell.com/support/kbdoc/en-us/000426773/dsa-2026-079">DSA-2026-079: Security Update for RecoverPoint for Virtual Machines Hardcoded Credential Vulnerability</a><br>Story # 8: <a href="https://aws.amazon.com/blogs/security/ai-augmented-threat-actor-accesses-fortigate-devices-at-scale/">AI-augmented threat actor accesses FortiGate devices at scale</a><br>Story # 9: <a href="https://www.bbc.co.uk/future/article/20260218-i-hacked-chatgpt-and-googles-ai-and-it-only-took-20-minutes">I hacked ChatGPT and Google’s AI - and it only took 20 minutes</a><br>Antisyphon Training <a href="https://www.antisyphontraining.com/event/soc-summit/">SOC Summit, March 25, 2026</a><br>Antisyphon Training: <a href="https://www.antisyphontraining.com/product/attacking-defending-and-leveraging-ai-llm-systems/">Attacking, Defending, and Leveraging AI-LLM Systems</a><br>Antisyphon Workshop: <a href="https://www.antisyphontraining.com/product/workshop-hacking-ai-llm-applications-with-brian-fehrman-joff-thyer-and-derek-banks/">Hacking AI-LLM Applications</a><br>Antisyphon Anti-Cast: <a href="https://www.antisyphontraining.com/event/anti-cast-red-teaming-ai-owasp-llm-top-10-with-brian-and-derek/">RED TEAMING AI: OWASP LLM TOP 10 WITH BRIAN AND DEREK</a><br>PODCAST : <a href="https://aisecurityops.transistor.fm">A.I. Security Ops</a><p><br><strong>🔗 Register for FREE Infosec Webcasts, Anti-casts &amp; Summits </strong></p><p><a href="https://poweredbybhis.com/">https://poweredbybhis.com</a></p><p><br>Brought to you by:</p><p><strong>Black Hills Information Security </strong></p><p><a href="https://www.blackhillsinfosec.com/">https://www.blackhillsinfosec.com</a></p><p><br></p><p><strong>Antisyphon Training</strong></p><p><a href="https://www.antisyphontraining.com/">https://www.antisyphontraining.com/</a></p><p><br></p><p><strong>Active Countermeasures</strong></p><p><a href="https://www.activecountermeasures.com/">https://www.activecountermeasures.com</a></p><p><br></p><p><strong>Wild West Hackin Fest</strong></p><p><a href="https://wildwesthackinfest.com/">https://wildwesthackinfest.com</a></p><p><a href="https://www.youtube.com/watch?v=RjEvfmtmzKg" title="Click here to watch this episode on YouTube.">Click here to watch this episode on YouTube.</a><br>
<br><a href="https://share.transistor.fm/s/af8c6d5d/transcript" title="Click here to view the episode transcript.">Click here to view the episode transcript.</a><br>
</p>]]>
      </itunes:summary>
      <itunes:keywords>Infosec,Cybersecurity,news</itunes:keywords>
      <itunes:explicit>No</itunes:explicit>
      <podcast:person role="Guest" href="https://www.blackhillsinfosec.com/team/derek-banks/" img="https://img.transistorcdn.com/KpJhrzCdxGr_gpa7QCpzPobbC5A9jv3wALhnpbw8kV4/rs:fill:0:0:1/w:800/h:800/q:60/mb:500000/aHR0cHM6Ly9pbWct/dXBsb2FkLXByb2R1/Y3Rpb24udHJhbnNp/c3Rvci5mbS9mOTQz/MjJiOTg2MGY2NzZj/MTM3ZDA0NDIzMjIy/NjE0NS5qcGc.jpg">Derek Banks</podcast:person>
      <podcast:person role="Host" href="https://www.blackhillsinfosec.com/team/bronwen-aker/" img="https://img.transistorcdn.com/CSShIJJhZo9yPTywdOv4zlsSYFk9yVSAIU6CrsdvdY4/rs:fill:0:0:1/w:800/h:800/q:60/mb:500000/aHR0cHM6Ly9pbWct/dXBsb2FkLXByb2R1/Y3Rpb24udHJhbnNp/c3Rvci5mbS80YWIy/MWUxODE4NjA1MmRm/OTBmZmYyYzRlYmU1/N2NhOC5qcGc.jpg">Bronwen Aker</podcast:person>
      <podcast:person role="Host" href="https://www.blackhillsinfosec.com/team/john-strand/" img="https://img.transistorcdn.com/NUqk_fUpMRKpGIokj-WgaiALdQtlImwADID3aNogGds/rs:fill:0:0:1/w:800/h:800/q:60/mb:500000/aHR0cHM6Ly9pbWct/dXBsb2FkLXByb2R1/Y3Rpb24udHJhbnNp/c3Rvci5mbS84Y2Ji/YmMyMzRlMDM2Nzdi/YmNlYjhlZDQwZmM4/MmJlYy5qcGc.jpg">John Strand</podcast:person>
      <podcast:person role="Guest" href="https://bhisnews.transistor.fm/people/michael-shecky-kavka" img="https://img.transistorcdn.com/ZUl4DxZiPo9coGYCRTdIC8aRTm9MciE46ie_A4KO0mk/rs:fill:0:0:1/w:800/h:800/q:60/mb:500000/aHR0cHM6Ly9pbWct/dXBsb2FkLXByb2R1/Y3Rpb24udHJhbnNp/c3Rvci5mbS9jMjI1/OTNiOTdiNDlhNjMw/MTBkZjMxYmY1OTJj/YWI3Zi5qcGc.jpg">Michael "Shecky" Kavka</podcast:person>
      <podcast:person role="Host" href="https://www.blackhillsinfosec.com/team/corey-ham/" img="https://img.transistorcdn.com/Q9BaWxLnY_zU_A-eKpfV22Y1AiBI64lLxLJP19iD_lM/rs:fill:0:0:1/w:800/h:800/q:60/mb:500000/aHR0cHM6Ly9pbWct/dXBsb2FkLXByb2R1/Y3Rpb24udHJhbnNp/c3Rvci5mbS84MTMx/N2JlN2IzZWI2MDcz/MGU0NTk5NGU0N2Iw/NzE2Yy5qcGc.jpg">Corey Ham</podcast:person>
      <podcast:person role="Producer" href="https://bhisnews.transistor.fm/people/meagan-bentley">Meagan Bentley</podcast:person>
      <podcast:person role="Guest" href="https://www.blackhillsinfosec.com/team/brian-fehrman/" img="https://img.transistorcdn.com/o4cUnziY2uIhAk0TCiSLopI4ZIaU7PLCjdeMOYXiUso/rs:fill:0:0:1/w:800/h:800/q:60/mb:500000/aHR0cHM6Ly9pbWct/dXBsb2FkLXByb2R1/Y3Rpb24udHJhbnNp/c3Rvci5mbS9kYTlh/ZWU1MGIwMzg5Mjg1/MDAyMzVmMWIwM2Mw/OWMwYi5qcGc.jpg">Brian Fehrman</podcast:person>
      <podcast:transcript url="https://share.transistor.fm/s/af8c6d5d/transcription.vtt" type="text/vtt" rel="captions"/>
      <podcast:transcript url="https://share.transistor.fm/s/af8c6d5d/transcription.srt" type="application/x-subrip" rel="captions"/>
      <podcast:transcript url="https://share.transistor.fm/s/af8c6d5d/transcription.json" type="application/json" rel="captions"/>
      <podcast:transcript url="https://share.transistor.fm/s/af8c6d5d/transcription.txt" type="text/plain"/>
      <podcast:transcript url="https://share.transistor.fm/s/af8c6d5d/transcription" type="text/html"/>
      <podcast:chapters url="https://share.transistor.fm/s/af8c6d5d/chapters.json" type="application/json+chapters"/>
    </item>
    <item>
      <title>Palo Alto Fears China Retaliation – 2026-02-16</title>
      <itunes:season>6</itunes:season>
      <podcast:season>6</podcast:season>
      <itunes:episode>7</itunes:episode>
      <podcast:episode>7</podcast:episode>
      <itunes:title>Palo Alto Fears China Retaliation – 2026-02-16</itunes:title>
      <itunes:episodeType>full</itunes:episodeType>
      <guid isPermaLink="false">ff64044b-f78c-475f-bae5-5036aeb5b7dc</guid>
      <link>https://share.transistor.fm/s/b6fbbc23</link>
      <description>
        <![CDATA[<p>In this episode, the crew dives into reports that Palo Alto Networks allegedly avoided directly attributing a threat campaign to China over fears of retaliation—sparking a broader debate about corporate and government threat attribution, geopolitics, and whether attribution still matters in today’s cyber landscape.</p><p>They also explore the escalating AI arms race, including Meta’s aggressive (and expensive) talent poaching, the growing rivalry between OpenAI and Anthropic, and what it all means for the future of the industry.</p><p>Rounding out the episode, the team discusses the unintended consequences of the AI boom—like global hardware shortages stretching beyond GPUs to hard drives—and examines emerging prompt injection attack techniques, highlighting real-world examples and the growing security risks surrounding AI-powered tools.</p><p>Join us LIVE on Mondays, 4:30pm EST.<br>A weekly Podcast with BHIS and Friends. We discuss notable Infosec, and infosec-adjacent news stories gathered by our community news team.<br><a href="https://www.youtube.com/@BlackHillsInformationSecurity">https://www.youtube.com/@BlackHillsInformationSecurity</a></p><p>Chat with us on Discord! - <br><a href="https://discord.gg/bhis">https://discord.gg/bhis</a><br>🔴live-chat</p><p><br><strong>Chapters</strong><br></p><ul><li>(00:00) - PreShow Banter™ — Threat Actor Age Range</li>
<li>(05:37) - Palo Alto Fears China Retaliation – 2026-02-16 </li>
<li>(11:28) - Story # 1: Exclusive: Palo Alto chose not to tie China to hacking campaign for fear of retaliation from Beijing, sources say</li>
<li>(16:01) - Story # 2: Rent a Human</li>
<li>(20:39) - Story # 3: OpenClaw creator Peter Steinberger joining OpenAI, Altman says</li>
<li>(24:31) - Story # 4: Western Digital runs out of HDD capacity: CEO says massive AI deals secured, price surges ahead</li>
<li>(28:30) - Story # 5: GTIG AI Threat Tracker: Distillation, Experimentation, and (Continued) Integration of AI for Adversarial Use</li>
<li>(30:32) - Story # 6: Data Exfil from Agents in Messaging Apps</li>
<li>(32:15) - Story # 7: AMOS infostealer targets macOS through a popular AI app</li>
<li>(39:25) - Story # 8: Discord Voluntarily Pushes Mandatory Age Verification Despite Recent Data Breach</li>
<li>(46:11) - Story # 9: Vietnam bans unskippable online video ads longer than 5 seconds from next month</li>
<li>(49:59) - Story # 10: SolarWinds Web Help Desk Exploitation - February 2026</li>
<li>(54:00) - Story # 11: Devilish devs spawn 287 Chrome extensions to flog your browser history to data brokers</li>
<li>(58:13) - Story # 12: Snail mail letters target Trezor and Ledger users in crypto-theft attacks</li>
<li>(01:00:59) - Eric's Workshop</li>
<li>(01:01:31) - Jennifer's Workshop</li>
<li>(01:04:36) - SOC Summit 2026</li>
</ul><br><strong>Links</strong><br>Story # 1: <a href="https://www.reuters.com/world/china/palo-alto-chose-not-tie-china-hacking-campaign-fear-retaliation-beijing-sources-2026-02-12/">Exclusive: Palo Alto chose not to tie China to hacking campaign for fear of retaliation from Beijing, sources say</a><br>Story # 2: <a href="https://rentahuman.ai">Rent a Human</a><br>Story # 3: <a href="https://www.cnbc.com/2026/02/15/openclaw-creator-peter-steinberger-joining-openai-altman-says.html">OpenClaw creator Peter Steinberger joining OpenAI, Altman says</a><br>Story # 4: <a href="https://www.tweaktown.com/news/110168/western-digital-runs-out-of-hdd-capacity-ceo-says-massive-ai-deals-secured-price-surges-ahead/index.html">Western Digital runs out of HDD capacity: CEO says massive AI deals secured, price surges ahead</a><br>Story # 5: <a href="https://cloud.google.com/blog/topics/threat-intelligence/distillation-experimentation-integration-ai-adversarial-use">GTIG AI Threat Tracker: Distillation, Experimentation, and (Continued) Integration of AI for Adversarial Use</a><br>Story # 6: <a href="https://www.promptarmor.com/resources/llm-data-exfiltration-via-url-previews-(with-openclaw-example-and-test)">Data Exfil from Agents in Messaging Apps</a><br>Story # 7: <a href="https://www.bleepingcomputer.com/news/security/amos-infostealer-targets-macos-through-a-popular-ai-app/">AMOS infostealer targets macOS through a popular AI app</a><br>Story # 8: <a href="https://www.eff.org/deeplinks/2026/02/discord-voluntarily-pushes-mandatory-age-verification-despite-recent-data-breach">Discord Voluntarily Pushes Mandatory Age Verification Despite Recent Data Breach</a><br>Story # 9: <a href="https://news.tuoitre.vn/vietnam-bans-unskippable-online-video-ads-longer-than-5-seconds-from-next-month-103260107161208237.htm">Vietnam bans unskippable online video ads longer than 5 seconds from next month</a><br>Story # 10: <a href="https://www.elastic.co/security-labs/solarwinds-whd-exploitation">SolarWinds Web Help Desk Exploitation - February 2026</a><br>Story # 11: <a href="https://www.elastic.co/security-labs/solarwinds-whd-exploitation">Devilish devs spawn 287 Chrome extensions to flog your browser history to data brokers</a><br>Story # 12: <a href="https://www.bleepingcomputer.com/news/security/snail-mail-letters-target-trezor-and-ledger-users-in-crypto-theft-attacks/">Snail mail letters target Trezor and Ledger users in crypto-theft attacks</a><br>01:01:00 - <a href="https://www.antisyphontraining.com/product/red-team-fundamentals-for-active-directory-with-eric-kuehn/">Eric’s Workshop</a><br>01:01:31 - <a href="https://www.antisyphontraining.com/product/professionally-evil-api-testing-aaa-and-keys-are-not-just-for-cars-with-jennifer-shannon/">Jennifer’s Workshop</a><br>01:04:37 - <a href="https://events.zoom.us/ev/Arl5Wo5yxiHCyQsSfalebMe4J4Rp35g4ZTNYM8vaoTt42uF4IbW0~Avlc7kMU5zdowuWEhLRrdpCGlZF9bz8X-zMPbLEm6Vlaqk8j9mrzh_3Zaw">SOC Summit 2026</a><p><br><strong><strong>Creators &amp; Guests</strong>
<ul>
  <li><a href="https://bhisnews.transistor.fm/people/corey-ham">Corey Ham</a> - Host</li>
  <li><a href="https://bhisnews.transistor.fm/people/wade-wells">Wade Wells</a> - Host</li>
  <li><a href="https://bhisnews.transistor.fm/people/bronwen-aker">Bronwen Aker</a> - Host</li>
  <li><a href="https://bhisnews.transistor.fm/people/ralph-may">Ralph May</a> - Host</li>
  <li><a href="https://bhisnews.transistor.fm/people/ched-cheddar-wiggins">Ched "cheddar" Wiggins</a> - Guest</li>
  <li><a href="https://bhisnews.transistor.fm/people/jennifer-shannon">Jennifer Shannon</a> - Guest</li>
  <li><a href="https://bhisnews.transistor.fm/people/eric-kuehn">Eric Kuehn</a> - Guest</li>
</ul><a href="https://www.youtube.com/watch?v=xg_HI0ARf3E" title="Click here to watch a video of this episode.">Click here to watch a video of this episode.</a><br>
</strong></p><p><strong>🔗 Register for FREE Infosec Webcasts, Anti-casts &amp; Summits </strong></p><p><a href="https://poweredbybhis.com/">https://poweredbybhis.com</a></p><p><br>Brought to you by:</p><p><strong>Black Hills Information Security </strong></p><p><a href="https://www.blackhillsinfosec.com/">https://www.blackhillsinfosec.com</a></p><p><br></p><p><strong>Antisyphon Training</strong></p><p><a href="https://www.antisyphontraining.com/">https://www.antisyphontraining.com/</a></p><p><br></p><p><strong>Active Countermeasures</strong></p><p><a href="https://www.activecountermeasures.com/">https://www.activecountermeasures.com</a></p><p><br></p><p><strong>Wild West Hackin Fest</strong></p><p><a href="https://wildwesthackinfest.com/">https://wildwesthackinfest.com</a></p><p><a href="https://share.transistor.fm/s/b6fbbc23/transcript" title="Click here to view the episode transcript.">Click here to view the episode transcript.</a><br>
</p>]]>
      </description>
      <content:encoded>
        <![CDATA[<p>In this episode, the crew dives into reports that Palo Alto Networks allegedly avoided directly attributing a threat campaign to China over fears of retaliation—sparking a broader debate about corporate and government threat attribution, geopolitics, and whether attribution still matters in today’s cyber landscape.</p><p>They also explore the escalating AI arms race, including Meta’s aggressive (and expensive) talent poaching, the growing rivalry between OpenAI and Anthropic, and what it all means for the future of the industry.</p><p>Rounding out the episode, the team discusses the unintended consequences of the AI boom—like global hardware shortages stretching beyond GPUs to hard drives—and examines emerging prompt injection attack techniques, highlighting real-world examples and the growing security risks surrounding AI-powered tools.</p><p>Join us LIVE on Mondays, 4:30pm EST.<br>A weekly Podcast with BHIS and Friends. We discuss notable Infosec, and infosec-adjacent news stories gathered by our community news team.<br><a href="https://www.youtube.com/@BlackHillsInformationSecurity">https://www.youtube.com/@BlackHillsInformationSecurity</a></p><p>Chat with us on Discord! - <br><a href="https://discord.gg/bhis">https://discord.gg/bhis</a><br>🔴live-chat</p><p><br><strong>Chapters</strong><br></p><ul><li>(00:00) - PreShow Banter™ — Threat Actor Age Range</li>
<li>(05:37) - Palo Alto Fears China Retaliation – 2026-02-16 </li>
<li>(11:28) - Story # 1: Exclusive: Palo Alto chose not to tie China to hacking campaign for fear of retaliation from Beijing, sources say</li>
<li>(16:01) - Story # 2: Rent a Human</li>
<li>(20:39) - Story # 3: OpenClaw creator Peter Steinberger joining OpenAI, Altman says</li>
<li>(24:31) - Story # 4: Western Digital runs out of HDD capacity: CEO says massive AI deals secured, price surges ahead</li>
<li>(28:30) - Story # 5: GTIG AI Threat Tracker: Distillation, Experimentation, and (Continued) Integration of AI for Adversarial Use</li>
<li>(30:32) - Story # 6: Data Exfil from Agents in Messaging Apps</li>
<li>(32:15) - Story # 7: AMOS infostealer targets macOS through a popular AI app</li>
<li>(39:25) - Story # 8: Discord Voluntarily Pushes Mandatory Age Verification Despite Recent Data Breach</li>
<li>(46:11) - Story # 9: Vietnam bans unskippable online video ads longer than 5 seconds from next month</li>
<li>(49:59) - Story # 10: SolarWinds Web Help Desk Exploitation - February 2026</li>
<li>(54:00) - Story # 11: Devilish devs spawn 287 Chrome extensions to flog your browser history to data brokers</li>
<li>(58:13) - Story # 12: Snail mail letters target Trezor and Ledger users in crypto-theft attacks</li>
<li>(01:00:59) - Eric's Workshop</li>
<li>(01:01:31) - Jennifer's Workshop</li>
<li>(01:04:36) - SOC Summit 2026</li>
</ul><br><strong>Links</strong><br>Story # 1: <a href="https://www.reuters.com/world/china/palo-alto-chose-not-tie-china-hacking-campaign-fear-retaliation-beijing-sources-2026-02-12/">Exclusive: Palo Alto chose not to tie China to hacking campaign for fear of retaliation from Beijing, sources say</a><br>Story # 2: <a href="https://rentahuman.ai">Rent a Human</a><br>Story # 3: <a href="https://www.cnbc.com/2026/02/15/openclaw-creator-peter-steinberger-joining-openai-altman-says.html">OpenClaw creator Peter Steinberger joining OpenAI, Altman says</a><br>Story # 4: <a href="https://www.tweaktown.com/news/110168/western-digital-runs-out-of-hdd-capacity-ceo-says-massive-ai-deals-secured-price-surges-ahead/index.html">Western Digital runs out of HDD capacity: CEO says massive AI deals secured, price surges ahead</a><br>Story # 5: <a href="https://cloud.google.com/blog/topics/threat-intelligence/distillation-experimentation-integration-ai-adversarial-use">GTIG AI Threat Tracker: Distillation, Experimentation, and (Continued) Integration of AI for Adversarial Use</a><br>Story # 6: <a href="https://www.promptarmor.com/resources/llm-data-exfiltration-via-url-previews-(with-openclaw-example-and-test)">Data Exfil from Agents in Messaging Apps</a><br>Story # 7: <a href="https://www.bleepingcomputer.com/news/security/amos-infostealer-targets-macos-through-a-popular-ai-app/">AMOS infostealer targets macOS through a popular AI app</a><br>Story # 8: <a href="https://www.eff.org/deeplinks/2026/02/discord-voluntarily-pushes-mandatory-age-verification-despite-recent-data-breach">Discord Voluntarily Pushes Mandatory Age Verification Despite Recent Data Breach</a><br>Story # 9: <a href="https://news.tuoitre.vn/vietnam-bans-unskippable-online-video-ads-longer-than-5-seconds-from-next-month-103260107161208237.htm">Vietnam bans unskippable online video ads longer than 5 seconds from next month</a><br>Story # 10: <a href="https://www.elastic.co/security-labs/solarwinds-whd-exploitation">SolarWinds Web Help Desk Exploitation - February 2026</a><br>Story # 11: <a href="https://www.elastic.co/security-labs/solarwinds-whd-exploitation">Devilish devs spawn 287 Chrome extensions to flog your browser history to data brokers</a><br>Story # 12: <a href="https://www.bleepingcomputer.com/news/security/snail-mail-letters-target-trezor-and-ledger-users-in-crypto-theft-attacks/">Snail mail letters target Trezor and Ledger users in crypto-theft attacks</a><br>01:01:00 - <a href="https://www.antisyphontraining.com/product/red-team-fundamentals-for-active-directory-with-eric-kuehn/">Eric’s Workshop</a><br>01:01:31 - <a href="https://www.antisyphontraining.com/product/professionally-evil-api-testing-aaa-and-keys-are-not-just-for-cars-with-jennifer-shannon/">Jennifer’s Workshop</a><br>01:04:37 - <a href="https://events.zoom.us/ev/Arl5Wo5yxiHCyQsSfalebMe4J4Rp35g4ZTNYM8vaoTt42uF4IbW0~Avlc7kMU5zdowuWEhLRrdpCGlZF9bz8X-zMPbLEm6Vlaqk8j9mrzh_3Zaw">SOC Summit 2026</a><p><br><strong><strong>Creators &amp; Guests</strong>
<ul>
  <li><a href="https://bhisnews.transistor.fm/people/corey-ham">Corey Ham</a> - Host</li>
  <li><a href="https://bhisnews.transistor.fm/people/wade-wells">Wade Wells</a> - Host</li>
  <li><a href="https://bhisnews.transistor.fm/people/bronwen-aker">Bronwen Aker</a> - Host</li>
  <li><a href="https://bhisnews.transistor.fm/people/ralph-may">Ralph May</a> - Host</li>
  <li><a href="https://bhisnews.transistor.fm/people/ched-cheddar-wiggins">Ched "cheddar" Wiggins</a> - Guest</li>
  <li><a href="https://bhisnews.transistor.fm/people/jennifer-shannon">Jennifer Shannon</a> - Guest</li>
  <li><a href="https://bhisnews.transistor.fm/people/eric-kuehn">Eric Kuehn</a> - Guest</li>
</ul><a href="https://www.youtube.com/watch?v=xg_HI0ARf3E" title="Click here to watch a video of this episode.">Click here to watch a video of this episode.</a><br>
</strong></p><p><strong>🔗 Register for FREE Infosec Webcasts, Anti-casts &amp; Summits </strong></p><p><a href="https://poweredbybhis.com/">https://poweredbybhis.com</a></p><p><br>Brought to you by:</p><p><strong>Black Hills Information Security </strong></p><p><a href="https://www.blackhillsinfosec.com/">https://www.blackhillsinfosec.com</a></p><p><br></p><p><strong>Antisyphon Training</strong></p><p><a href="https://www.antisyphontraining.com/">https://www.antisyphontraining.com/</a></p><p><br></p><p><strong>Active Countermeasures</strong></p><p><a href="https://www.activecountermeasures.com/">https://www.activecountermeasures.com</a></p><p><br></p><p><strong>Wild West Hackin Fest</strong></p><p><a href="https://wildwesthackinfest.com/">https://wildwesthackinfest.com</a></p><p><a href="https://share.transistor.fm/s/b6fbbc23/transcript" title="Click here to view the episode transcript.">Click here to view the episode transcript.</a><br>
</p>]]>
      </content:encoded>
      <pubDate>Sun, 22 Feb 2026 09:47:10 -0500</pubDate>
      <author>Black Hills Information Security</author>
      <enclosure url="https://media.transistor.fm/b6fbbc23/a8dd3538.mp3" length="67642845" type="audio/mpeg"/>
      <itunes:author>Black Hills Information Security</itunes:author>
      <itunes:image href="https://img.transistorcdn.com/D4_HiLnNRH1yOU2vlc_XrvIokAyyJa9V5znt31GjUKU/rs:fill:0:0:1/w:1400/h:1400/q:60/mb:500000/aHR0cHM6Ly9pbWct/dXBsb2FkLXByb2R1/Y3Rpb24udHJhbnNp/c3Rvci5mbS80YThk/ZjM0MGNlZmI2ZjZl/MzEzZjIwNjliY2U5/ZDE4Yy5qcGc.jpg"/>
      <itunes:duration>4039</itunes:duration>
      <itunes:summary>
        <![CDATA[<p>In this episode, the crew dives into reports that Palo Alto Networks allegedly avoided directly attributing a threat campaign to China over fears of retaliation—sparking a broader debate about corporate and government threat attribution, geopolitics, and whether attribution still matters in today’s cyber landscape.</p><p>They also explore the escalating AI arms race, including Meta’s aggressive (and expensive) talent poaching, the growing rivalry between OpenAI and Anthropic, and what it all means for the future of the industry.</p><p>Rounding out the episode, the team discusses the unintended consequences of the AI boom—like global hardware shortages stretching beyond GPUs to hard drives—and examines emerging prompt injection attack techniques, highlighting real-world examples and the growing security risks surrounding AI-powered tools.</p><p>Join us LIVE on Mondays, 4:30pm EST.<br>A weekly Podcast with BHIS and Friends. We discuss notable Infosec, and infosec-adjacent news stories gathered by our community news team.<br><a href="https://www.youtube.com/@BlackHillsInformationSecurity">https://www.youtube.com/@BlackHillsInformationSecurity</a></p><p>Chat with us on Discord! - <br><a href="https://discord.gg/bhis">https://discord.gg/bhis</a><br>🔴live-chat</p><p><br><strong>Chapters</strong><br></p><ul><li>(00:00) - PreShow Banter™ — Threat Actor Age Range</li>
<li>(05:37) - Palo Alto Fears China Retaliation – 2026-02-16 </li>
<li>(11:28) - Story # 1: Exclusive: Palo Alto chose not to tie China to hacking campaign for fear of retaliation from Beijing, sources say</li>
<li>(16:01) - Story # 2: Rent a Human</li>
<li>(20:39) - Story # 3: OpenClaw creator Peter Steinberger joining OpenAI, Altman says</li>
<li>(24:31) - Story # 4: Western Digital runs out of HDD capacity: CEO says massive AI deals secured, price surges ahead</li>
<li>(28:30) - Story # 5: GTIG AI Threat Tracker: Distillation, Experimentation, and (Continued) Integration of AI for Adversarial Use</li>
<li>(30:32) - Story # 6: Data Exfil from Agents in Messaging Apps</li>
<li>(32:15) - Story # 7: AMOS infostealer targets macOS through a popular AI app</li>
<li>(39:25) - Story # 8: Discord Voluntarily Pushes Mandatory Age Verification Despite Recent Data Breach</li>
<li>(46:11) - Story # 9: Vietnam bans unskippable online video ads longer than 5 seconds from next month</li>
<li>(49:59) - Story # 10: SolarWinds Web Help Desk Exploitation - February 2026</li>
<li>(54:00) - Story # 11: Devilish devs spawn 287 Chrome extensions to flog your browser history to data brokers</li>
<li>(58:13) - Story # 12: Snail mail letters target Trezor and Ledger users in crypto-theft attacks</li>
<li>(01:00:59) - Eric's Workshop</li>
<li>(01:01:31) - Jennifer's Workshop</li>
<li>(01:04:36) - SOC Summit 2026</li>
</ul><br><strong>Links</strong><br>Story # 1: <a href="https://www.reuters.com/world/china/palo-alto-chose-not-tie-china-hacking-campaign-fear-retaliation-beijing-sources-2026-02-12/">Exclusive: Palo Alto chose not to tie China to hacking campaign for fear of retaliation from Beijing, sources say</a><br>Story # 2: <a href="https://rentahuman.ai">Rent a Human</a><br>Story # 3: <a href="https://www.cnbc.com/2026/02/15/openclaw-creator-peter-steinberger-joining-openai-altman-says.html">OpenClaw creator Peter Steinberger joining OpenAI, Altman says</a><br>Story # 4: <a href="https://www.tweaktown.com/news/110168/western-digital-runs-out-of-hdd-capacity-ceo-says-massive-ai-deals-secured-price-surges-ahead/index.html">Western Digital runs out of HDD capacity: CEO says massive AI deals secured, price surges ahead</a><br>Story # 5: <a href="https://cloud.google.com/blog/topics/threat-intelligence/distillation-experimentation-integration-ai-adversarial-use">GTIG AI Threat Tracker: Distillation, Experimentation, and (Continued) Integration of AI for Adversarial Use</a><br>Story # 6: <a href="https://www.promptarmor.com/resources/llm-data-exfiltration-via-url-previews-(with-openclaw-example-and-test)">Data Exfil from Agents in Messaging Apps</a><br>Story # 7: <a href="https://www.bleepingcomputer.com/news/security/amos-infostealer-targets-macos-through-a-popular-ai-app/">AMOS infostealer targets macOS through a popular AI app</a><br>Story # 8: <a href="https://www.eff.org/deeplinks/2026/02/discord-voluntarily-pushes-mandatory-age-verification-despite-recent-data-breach">Discord Voluntarily Pushes Mandatory Age Verification Despite Recent Data Breach</a><br>Story # 9: <a href="https://news.tuoitre.vn/vietnam-bans-unskippable-online-video-ads-longer-than-5-seconds-from-next-month-103260107161208237.htm">Vietnam bans unskippable online video ads longer than 5 seconds from next month</a><br>Story # 10: <a href="https://www.elastic.co/security-labs/solarwinds-whd-exploitation">SolarWinds Web Help Desk Exploitation - February 2026</a><br>Story # 11: <a href="https://www.elastic.co/security-labs/solarwinds-whd-exploitation">Devilish devs spawn 287 Chrome extensions to flog your browser history to data brokers</a><br>Story # 12: <a href="https://www.bleepingcomputer.com/news/security/snail-mail-letters-target-trezor-and-ledger-users-in-crypto-theft-attacks/">Snail mail letters target Trezor and Ledger users in crypto-theft attacks</a><br>01:01:00 - <a href="https://www.antisyphontraining.com/product/red-team-fundamentals-for-active-directory-with-eric-kuehn/">Eric’s Workshop</a><br>01:01:31 - <a href="https://www.antisyphontraining.com/product/professionally-evil-api-testing-aaa-and-keys-are-not-just-for-cars-with-jennifer-shannon/">Jennifer’s Workshop</a><br>01:04:37 - <a href="https://events.zoom.us/ev/Arl5Wo5yxiHCyQsSfalebMe4J4Rp35g4ZTNYM8vaoTt42uF4IbW0~Avlc7kMU5zdowuWEhLRrdpCGlZF9bz8X-zMPbLEm6Vlaqk8j9mrzh_3Zaw">SOC Summit 2026</a><p><br><strong><strong>Creators &amp; Guests</strong>
<ul>
  <li><a href="https://bhisnews.transistor.fm/people/corey-ham">Corey Ham</a> - Host</li>
  <li><a href="https://bhisnews.transistor.fm/people/wade-wells">Wade Wells</a> - Host</li>
  <li><a href="https://bhisnews.transistor.fm/people/bronwen-aker">Bronwen Aker</a> - Host</li>
  <li><a href="https://bhisnews.transistor.fm/people/ralph-may">Ralph May</a> - Host</li>
  <li><a href="https://bhisnews.transistor.fm/people/ched-cheddar-wiggins">Ched "cheddar" Wiggins</a> - Guest</li>
  <li><a href="https://bhisnews.transistor.fm/people/jennifer-shannon">Jennifer Shannon</a> - Guest</li>
  <li><a href="https://bhisnews.transistor.fm/people/eric-kuehn">Eric Kuehn</a> - Guest</li>
</ul><a href="https://www.youtube.com/watch?v=xg_HI0ARf3E" title="Click here to watch a video of this episode.">Click here to watch a video of this episode.</a><br>
</strong></p><p><strong>🔗 Register for FREE Infosec Webcasts, Anti-casts &amp; Summits </strong></p><p><a href="https://poweredbybhis.com/">https://poweredbybhis.com</a></p><p><br>Brought to you by:</p><p><strong>Black Hills Information Security </strong></p><p><a href="https://www.blackhillsinfosec.com/">https://www.blackhillsinfosec.com</a></p><p><br></p><p><strong>Antisyphon Training</strong></p><p><a href="https://www.antisyphontraining.com/">https://www.antisyphontraining.com/</a></p><p><br></p><p><strong>Active Countermeasures</strong></p><p><a href="https://www.activecountermeasures.com/">https://www.activecountermeasures.com</a></p><p><br></p><p><strong>Wild West Hackin Fest</strong></p><p><a href="https://wildwesthackinfest.com/">https://wildwesthackinfest.com</a></p><p><a href="https://share.transistor.fm/s/b6fbbc23/transcript" title="Click here to view the episode transcript.">Click here to view the episode transcript.</a><br>
</p>]]>
      </itunes:summary>
      <itunes:keywords>Infosec,Cybersecurity,news</itunes:keywords>
      <itunes:explicit>No</itunes:explicit>
      <podcast:person role="Host" href="https://www.blackhillsinfosec.com/team/corey-ham/" img="https://img.transistorcdn.com/Q9BaWxLnY_zU_A-eKpfV22Y1AiBI64lLxLJP19iD_lM/rs:fill:0:0:1/w:800/h:800/q:60/mb:500000/aHR0cHM6Ly9pbWct/dXBsb2FkLXByb2R1/Y3Rpb24udHJhbnNp/c3Rvci5mbS84MTMx/N2JlN2IzZWI2MDcz/MGU0NTk5NGU0N2Iw/NzE2Yy5qcGc.jpg">Corey Ham</podcast:person>
      <podcast:person role="Host" href="https://www.bsidessd.org/" img="https://img.transistorcdn.com/KeYB5iZ31d5IGBEuYGSV1SOcM5ZsEQ3dGI4HgjvyVVE/rs:fill:0:0:1/w:800/h:800/q:60/mb:500000/aHR0cHM6Ly9pbWct/dXBsb2FkLXByb2R1/Y3Rpb24udHJhbnNp/c3Rvci5mbS82ZGRm/ZWU5MGU5YzJiZjU0/MTVmZTU0OWExYTg4/OGFhMi5wbmc.jpg">Wade Wells</podcast:person>
      <podcast:person role="Host" href="https://www.blackhillsinfosec.com/team/bronwen-aker/" img="https://img.transistorcdn.com/CSShIJJhZo9yPTywdOv4zlsSYFk9yVSAIU6CrsdvdY4/rs:fill:0:0:1/w:800/h:800/q:60/mb:500000/aHR0cHM6Ly9pbWct/dXBsb2FkLXByb2R1/Y3Rpb24udHJhbnNp/c3Rvci5mbS80YWIy/MWUxODE4NjA1MmRm/OTBmZmYyYzRlYmU1/N2NhOC5qcGc.jpg">Bronwen Aker</podcast:person>
      <podcast:person role="Host" href="https://mwgroup.io/about/" img="https://img.transistorcdn.com/_dioeUsMeIlo4vZ0dPQkQ-f-tkMHllpfM4P-4SpyW8Q/rs:fill:0:0:1/w:800/h:800/q:60/mb:500000/aHR0cHM6Ly9pbWct/dXBsb2FkLXByb2R1/Y3Rpb24udHJhbnNp/c3Rvci5mbS9jNzA4/MDU5MTk2MDAyMjc5/NmZiZmFkMDY4NGVj/NzRmNS5qcGVn.jpg">Ralph May</podcast:person>
      <podcast:person role="Guest" href="https://bhisnews.transistor.fm/people/ched-cheddar-wiggins" img="https://img.transistorcdn.com/cW9mBWEF7f2kCRxS1pweLNSH7lwH5WszpygXc0slqq0/rs:fill:0:0:1/w:800/h:800/q:60/mb:500000/aHR0cHM6Ly9pbWct/dXBsb2FkLXByb2R1/Y3Rpb24udHJhbnNp/c3Rvci5mbS80Yjgx/ZmZjNmQyZGQ1MGE1/OWIxZWZmZDY4MjRm/NTBhYy5qcGVn.jpg">Ched "cheddar" Wiggins</podcast:person>
      <podcast:person role="Guest" href="https://www.antisyphontraining.com/instructor/jennifer-shannon/" img="https://img.transistorcdn.com/3xygiFqpvZ2S5U4XpPGC5zFKnfpT6s1Y4eejRyC_T1s/rs:fill:0:0:1/w:800/h:800/q:60/mb:500000/aHR0cHM6Ly9pbWct/dXBsb2FkLXByb2R1/Y3Rpb24udHJhbnNp/c3Rvci5mbS9kNDM3/Zjc3NzNiNzIzYTcx/OWI1ODAwYWJhMTk5/OTUzMC5qcGc.jpg">Jennifer Shannon</podcast:person>
      <podcast:person role="Guest" href="https://www.antisyphontraining.com/instructor/eric-kuehn/" img="https://img.transistorcdn.com/z9oQGS7CzP3ulQ6h9T9IhT_Kgk-EyjIiZKR8CMi-qpE/rs:fill:0:0:1/w:800/h:800/q:60/mb:500000/aHR0cHM6Ly9pbWct/dXBsb2FkLXByb2R1/Y3Rpb24udHJhbnNp/c3Rvci5mbS80ZTBl/YjJmMjMzNWJiNjBl/MjJlNzY0NTMzNWQ5/MGFiNS5qcGc.jpg">Eric Kuehn</podcast:person>
      <podcast:transcript url="https://share.transistor.fm/s/b6fbbc23/transcription.vtt" type="text/vtt" rel="captions"/>
      <podcast:transcript url="https://share.transistor.fm/s/b6fbbc23/transcription.srt" type="application/x-subrip" rel="captions"/>
      <podcast:transcript url="https://share.transistor.fm/s/b6fbbc23/transcription.json" type="application/json" rel="captions"/>
      <podcast:transcript url="https://share.transistor.fm/s/b6fbbc23/transcription.txt" type="text/plain"/>
      <podcast:transcript url="https://share.transistor.fm/s/b6fbbc23/transcription" type="text/html"/>
      <podcast:chapters url="https://share.transistor.fm/s/b6fbbc23/chapters.json" type="application/json+chapters"/>
    </item>
    <item>
      <title>Live From WWHF Mile High 2026 – 2026-02-11</title>
      <itunes:season>6</itunes:season>
      <podcast:season>6</podcast:season>
      <itunes:episode>6</itunes:episode>
      <podcast:episode>6</podcast:episode>
      <itunes:title>Live From WWHF Mile High 2026 – 2026-02-11</itunes:title>
      <itunes:episodeType>full</itunes:episodeType>
      <guid isPermaLink="false">c59d9a39-bcba-42c4-bbef-afc031631821</guid>
      <link>https://share.transistor.fm/s/7f4002a4</link>
      <description>
        <![CDATA[<p>Live from Wild West Hackin’ Fest Denver 2026, the Black Hills Information Security crew brings their signature mix of sharp security insight and off-the-cuff banter to a packed in-person audience. </p><p>This episode centers on a controversial Notepad update that introduced Markdown rendering—along with a potential remote code execution (RCE) issue. The hosts unpack what this says about modern software bloat, “vibe coding,” and the growing push to embed AI into everything—whether it belongs there or not. They also explore the implications of Discord's Age verification requirements, AI-generated code, including OpenAI’s latest Codex model, and debate whether we’re headed toward a wave of AI-assisted vulnerabilities.</p><p>Join us LIVE on Mondays, 4:30pm EST.<br>A weekly Podcast with BHIS and Friends. We discuss notable Infosec, and infosec-adjacent news stories gathered by our community news team.<br><a href="https://www.youtube.com/@BlackHillsInformationSecurity">https://www.youtube.com/@BlackHillsInformationSecurity</a></p><p>Chat with us on Discord! - <br><a href="https://discord.gg/bhis">https://discord.gg/bhis</a><br>🔴live-chat</p><p><br><strong>Chapters</strong><br></p><ul><li>(00:00) - PreShow Banter™ — Corey Olympics</li>
<li>(02:23) - Story # 1: Critical Notepad vulnerability reignites criticism of Microsoft’s forced AI features</li>
<li>(07:42) - Story # 2: Discord will require a face scan or ID for full access next month</li>
<li>(10:17) - Story # 3: 2026-01-14: The Day the telnet Died</li>
<li>(15:04) - Story # 5: BeyondTrust Remote Access Products 0-Day Vulnerability Allows Remote Code Execution</li>
<li>(16:32) - Story # GRITREP: 0APT and the Victims Who Weren’t</li>
<li>(20:54) - The advanced advancement of AI models</li>
</ul><br><strong><a href="https://www.youtube.com/watch?v=HnKSsy7HYME" title="Click here to watch a video of this episode.">Click here to watch a video of this episode.</a><br>
<strong>Creators &amp; Guests</strong>
<ul>
  <li><a href="https://bhisnews.transistor.fm/people/john-strand-8c127856-b150-4e33-af6d-5b9f7f041a37">John Strand</a> - Host</li>
  <li><a href="https://bhisnews.transistor.fm/people/corey-ham">Corey Ham</a> - Host</li>
  <li><a href="https://bhisnews.transistor.fm/people/derek-banks">Derek Banks</a> - Guest</li>
  <li><a href="https://bhisnews.transistor.fm/people/andrew-krug">Andrew Krug</a> - Guest</li>
  <li><a href="https://bhisnews.transistor.fm/people/chadd-watson">Chadd Watson</a> - Guest</li>
  <li><a href="https://bhisnews.transistor.fm/people/hayden-covington">Hayden Covington</a> - Host</li>
</ul><br><a href="https://share.transistor.fm/s/7f4002a4/transcript" title="Click here to view the episode transcript.">Click here to view the episode transcript.</a><br>
</strong><br><strong>Links</strong><br>Story # 1: <a href="https://cybernews.com/security/windows-notepad-vulnerable-to-remote-attacks-feature-creep-blamed/">Critical Notepad vulnerability reignites criticism of Microsoft’s forced AI features</a><br>Story # 2: <a href="https://www.theverge.com/tech/875309/discord-age-verification-global-roll-out">Discord will require a face scan or ID for full access next month</a><br>Story # 3: <a href="https://www.labs.greynoise.io/grimoire/2026-02-10-telnet-falls-silent/">2026-01-14: The Day the telnet Died</a><br>Story # 5: <a href="https://cybersecuritynews.com/beyondtrust-remote-access-products-0-day-vulnerability/">BeyondTrust Remote Access Products 0-Day Vulnerability Allows Remote Code Execution</a><br>Story # <a href="https://www.guidepointsecurity.com/blog/gritrep-0apt-and-the-victims-who-werent/">GRITREP: 0APT and the Victims Who Weren’t</a><p><strong>🔗 Register for FREE Infosec Webcasts, Anti-casts &amp; Summits </strong></p><p><a href="https://poweredbybhis.com/">https://poweredbybhis.com</a></p><p><br>Brought to you by:</p><p><strong>Black Hills Information Security </strong></p><p><a href="https://www.blackhillsinfosec.com/">https://www.blackhillsinfosec.com</a></p><p><br></p><p><strong>Antisyphon Training</strong></p><p><a href="https://www.antisyphontraining.com/">https://www.antisyphontraining.com/</a></p><p><br></p><p><strong>Active Countermeasures</strong></p><p><a href="https://www.activecountermeasures.com/">https://www.activecountermeasures.com</a></p><p><br></p><p><strong>Wild West Hackin Fest</strong></p><p><a href="https://wildwesthackinfest.com/">https://wildwesthackinfest.com</a></p>]]>
      </description>
      <content:encoded>
        <![CDATA[<p>Live from Wild West Hackin’ Fest Denver 2026, the Black Hills Information Security crew brings their signature mix of sharp security insight and off-the-cuff banter to a packed in-person audience. </p><p>This episode centers on a controversial Notepad update that introduced Markdown rendering—along with a potential remote code execution (RCE) issue. The hosts unpack what this says about modern software bloat, “vibe coding,” and the growing push to embed AI into everything—whether it belongs there or not. They also explore the implications of Discord's Age verification requirements, AI-generated code, including OpenAI’s latest Codex model, and debate whether we’re headed toward a wave of AI-assisted vulnerabilities.</p><p>Join us LIVE on Mondays, 4:30pm EST.<br>A weekly Podcast with BHIS and Friends. We discuss notable Infosec, and infosec-adjacent news stories gathered by our community news team.<br><a href="https://www.youtube.com/@BlackHillsInformationSecurity">https://www.youtube.com/@BlackHillsInformationSecurity</a></p><p>Chat with us on Discord! - <br><a href="https://discord.gg/bhis">https://discord.gg/bhis</a><br>🔴live-chat</p><p><br><strong>Chapters</strong><br></p><ul><li>(00:00) - PreShow Banter™ — Corey Olympics</li>
<li>(02:23) - Story # 1: Critical Notepad vulnerability reignites criticism of Microsoft’s forced AI features</li>
<li>(07:42) - Story # 2: Discord will require a face scan or ID for full access next month</li>
<li>(10:17) - Story # 3: 2026-01-14: The Day the telnet Died</li>
<li>(15:04) - Story # 5: BeyondTrust Remote Access Products 0-Day Vulnerability Allows Remote Code Execution</li>
<li>(16:32) - Story # GRITREP: 0APT and the Victims Who Weren’t</li>
<li>(20:54) - The advanced advancement of AI models</li>
</ul><br><strong><a href="https://www.youtube.com/watch?v=HnKSsy7HYME" title="Click here to watch a video of this episode.">Click here to watch a video of this episode.</a><br>
<strong>Creators &amp; Guests</strong>
<ul>
  <li><a href="https://bhisnews.transistor.fm/people/john-strand-8c127856-b150-4e33-af6d-5b9f7f041a37">John Strand</a> - Host</li>
  <li><a href="https://bhisnews.transistor.fm/people/corey-ham">Corey Ham</a> - Host</li>
  <li><a href="https://bhisnews.transistor.fm/people/derek-banks">Derek Banks</a> - Guest</li>
  <li><a href="https://bhisnews.transistor.fm/people/andrew-krug">Andrew Krug</a> - Guest</li>
  <li><a href="https://bhisnews.transistor.fm/people/chadd-watson">Chadd Watson</a> - Guest</li>
  <li><a href="https://bhisnews.transistor.fm/people/hayden-covington">Hayden Covington</a> - Host</li>
</ul><br><a href="https://share.transistor.fm/s/7f4002a4/transcript" title="Click here to view the episode transcript.">Click here to view the episode transcript.</a><br>
</strong><br><strong>Links</strong><br>Story # 1: <a href="https://cybernews.com/security/windows-notepad-vulnerable-to-remote-attacks-feature-creep-blamed/">Critical Notepad vulnerability reignites criticism of Microsoft’s forced AI features</a><br>Story # 2: <a href="https://www.theverge.com/tech/875309/discord-age-verification-global-roll-out">Discord will require a face scan or ID for full access next month</a><br>Story # 3: <a href="https://www.labs.greynoise.io/grimoire/2026-02-10-telnet-falls-silent/">2026-01-14: The Day the telnet Died</a><br>Story # 5: <a href="https://cybersecuritynews.com/beyondtrust-remote-access-products-0-day-vulnerability/">BeyondTrust Remote Access Products 0-Day Vulnerability Allows Remote Code Execution</a><br>Story # <a href="https://www.guidepointsecurity.com/blog/gritrep-0apt-and-the-victims-who-werent/">GRITREP: 0APT and the Victims Who Weren’t</a><p><strong>🔗 Register for FREE Infosec Webcasts, Anti-casts &amp; Summits </strong></p><p><a href="https://poweredbybhis.com/">https://poweredbybhis.com</a></p><p><br>Brought to you by:</p><p><strong>Black Hills Information Security </strong></p><p><a href="https://www.blackhillsinfosec.com/">https://www.blackhillsinfosec.com</a></p><p><br></p><p><strong>Antisyphon Training</strong></p><p><a href="https://www.antisyphontraining.com/">https://www.antisyphontraining.com/</a></p><p><br></p><p><strong>Active Countermeasures</strong></p><p><a href="https://www.activecountermeasures.com/">https://www.activecountermeasures.com</a></p><p><br></p><p><strong>Wild West Hackin Fest</strong></p><p><a href="https://wildwesthackinfest.com/">https://wildwesthackinfest.com</a></p>]]>
      </content:encoded>
      <pubDate>Wed, 18 Feb 2026 05:00:00 -0500</pubDate>
      <author>Black Hills Information Security</author>
      <enclosure url="https://media.transistor.fm/7f4002a4/5d216878.mp3" length="33546242" type="audio/mpeg"/>
      <itunes:author>Black Hills Information Security</itunes:author>
      <itunes:image href="https://img.transistorcdn.com/HqzlBuD7JJbxC-zLaDTP86_P74CSSyYU31rbqhz3cUQ/rs:fill:0:0:1/w:1400/h:1400/q:60/mb:500000/aHR0cHM6Ly9pbWct/dXBsb2FkLXByb2R1/Y3Rpb24udHJhbnNp/c3Rvci5mbS83NjBi/ZDc5ZDkyYzE1OTJi/ZjIzNTdhNWJiNWU4/ODhmMy5qcGc.jpg"/>
      <itunes:duration>2002</itunes:duration>
      <itunes:summary>
        <![CDATA[<p>Live from Wild West Hackin’ Fest Denver 2026, the Black Hills Information Security crew brings their signature mix of sharp security insight and off-the-cuff banter to a packed in-person audience. </p><p>This episode centers on a controversial Notepad update that introduced Markdown rendering—along with a potential remote code execution (RCE) issue. The hosts unpack what this says about modern software bloat, “vibe coding,” and the growing push to embed AI into everything—whether it belongs there or not. They also explore the implications of Discord's Age verification requirements, AI-generated code, including OpenAI’s latest Codex model, and debate whether we’re headed toward a wave of AI-assisted vulnerabilities.</p><p>Join us LIVE on Mondays, 4:30pm EST.<br>A weekly Podcast with BHIS and Friends. We discuss notable Infosec, and infosec-adjacent news stories gathered by our community news team.<br><a href="https://www.youtube.com/@BlackHillsInformationSecurity">https://www.youtube.com/@BlackHillsInformationSecurity</a></p><p>Chat with us on Discord! - <br><a href="https://discord.gg/bhis">https://discord.gg/bhis</a><br>🔴live-chat</p><p><br><strong>Chapters</strong><br></p><ul><li>(00:00) - PreShow Banter™ — Corey Olympics</li>
<li>(02:23) - Story # 1: Critical Notepad vulnerability reignites criticism of Microsoft’s forced AI features</li>
<li>(07:42) - Story # 2: Discord will require a face scan or ID for full access next month</li>
<li>(10:17) - Story # 3: 2026-01-14: The Day the telnet Died</li>
<li>(15:04) - Story # 5: BeyondTrust Remote Access Products 0-Day Vulnerability Allows Remote Code Execution</li>
<li>(16:32) - Story # GRITREP: 0APT and the Victims Who Weren’t</li>
<li>(20:54) - The advanced advancement of AI models</li>
</ul><br><strong><a href="https://www.youtube.com/watch?v=HnKSsy7HYME" title="Click here to watch a video of this episode.">Click here to watch a video of this episode.</a><br>
<strong>Creators &amp; Guests</strong>
<ul>
  <li><a href="https://bhisnews.transistor.fm/people/john-strand-8c127856-b150-4e33-af6d-5b9f7f041a37">John Strand</a> - Host</li>
  <li><a href="https://bhisnews.transistor.fm/people/corey-ham">Corey Ham</a> - Host</li>
  <li><a href="https://bhisnews.transistor.fm/people/derek-banks">Derek Banks</a> - Guest</li>
  <li><a href="https://bhisnews.transistor.fm/people/andrew-krug">Andrew Krug</a> - Guest</li>
  <li><a href="https://bhisnews.transistor.fm/people/chadd-watson">Chadd Watson</a> - Guest</li>
  <li><a href="https://bhisnews.transistor.fm/people/hayden-covington">Hayden Covington</a> - Host</li>
</ul><br><a href="https://share.transistor.fm/s/7f4002a4/transcript" title="Click here to view the episode transcript.">Click here to view the episode transcript.</a><br>
</strong><br><strong>Links</strong><br>Story # 1: <a href="https://cybernews.com/security/windows-notepad-vulnerable-to-remote-attacks-feature-creep-blamed/">Critical Notepad vulnerability reignites criticism of Microsoft’s forced AI features</a><br>Story # 2: <a href="https://www.theverge.com/tech/875309/discord-age-verification-global-roll-out">Discord will require a face scan or ID for full access next month</a><br>Story # 3: <a href="https://www.labs.greynoise.io/grimoire/2026-02-10-telnet-falls-silent/">2026-01-14: The Day the telnet Died</a><br>Story # 5: <a href="https://cybersecuritynews.com/beyondtrust-remote-access-products-0-day-vulnerability/">BeyondTrust Remote Access Products 0-Day Vulnerability Allows Remote Code Execution</a><br>Story # <a href="https://www.guidepointsecurity.com/blog/gritrep-0apt-and-the-victims-who-werent/">GRITREP: 0APT and the Victims Who Weren’t</a><p><strong>🔗 Register for FREE Infosec Webcasts, Anti-casts &amp; Summits </strong></p><p><a href="https://poweredbybhis.com/">https://poweredbybhis.com</a></p><p><br>Brought to you by:</p><p><strong>Black Hills Information Security </strong></p><p><a href="https://www.blackhillsinfosec.com/">https://www.blackhillsinfosec.com</a></p><p><br></p><p><strong>Antisyphon Training</strong></p><p><a href="https://www.antisyphontraining.com/">https://www.antisyphontraining.com/</a></p><p><br></p><p><strong>Active Countermeasures</strong></p><p><a href="https://www.activecountermeasures.com/">https://www.activecountermeasures.com</a></p><p><br></p><p><strong>Wild West Hackin Fest</strong></p><p><a href="https://wildwesthackinfest.com/">https://wildwesthackinfest.com</a></p>]]>
      </itunes:summary>
      <itunes:keywords>Infosec,Cybersecurity,news</itunes:keywords>
      <itunes:explicit>No</itunes:explicit>
      <podcast:person role="Host" href="https://www.blackhillsinfosec.com/team/john-strand/" img="https://img.transistorcdn.com/NUqk_fUpMRKpGIokj-WgaiALdQtlImwADID3aNogGds/rs:fill:0:0:1/w:800/h:800/q:60/mb:500000/aHR0cHM6Ly9pbWct/dXBsb2FkLXByb2R1/Y3Rpb24udHJhbnNp/c3Rvci5mbS84Y2Ji/YmMyMzRlMDM2Nzdi/YmNlYjhlZDQwZmM4/MmJlYy5qcGc.jpg">John Strand</podcast:person>
      <podcast:person role="Host" href="https://www.blackhillsinfosec.com/team/corey-ham/" img="https://img.transistorcdn.com/Q9BaWxLnY_zU_A-eKpfV22Y1AiBI64lLxLJP19iD_lM/rs:fill:0:0:1/w:800/h:800/q:60/mb:500000/aHR0cHM6Ly9pbWct/dXBsb2FkLXByb2R1/Y3Rpb24udHJhbnNp/c3Rvci5mbS84MTMx/N2JlN2IzZWI2MDcz/MGU0NTk5NGU0N2Iw/NzE2Yy5qcGc.jpg">Corey Ham</podcast:person>
      <podcast:person role="Guest" href="https://www.blackhillsinfosec.com/team/derek-banks/" img="https://img.transistorcdn.com/KpJhrzCdxGr_gpa7QCpzPobbC5A9jv3wALhnpbw8kV4/rs:fill:0:0:1/w:800/h:800/q:60/mb:500000/aHR0cHM6Ly9pbWct/dXBsb2FkLXByb2R1/Y3Rpb24udHJhbnNp/c3Rvci5mbS9mOTQz/MjJiOTg2MGY2NzZj/MTM3ZDA0NDIzMjIy/NjE0NS5qcGc.jpg">Derek Banks</podcast:person>
      <podcast:person role="Guest" href="https://www.andrewkrug.com" img="https://img.transistorcdn.com/ss5Tc5KT-W5kyWM5_AzDREn6DUhpwIYV5yw9jjfsJhw/rs:fill:0:0:1/w:800/h:800/q:60/mb:500000/aHR0cHM6Ly9pbWct/dXBsb2FkLXByb2R1/Y3Rpb24udHJhbnNp/c3Rvci5mbS8wZTg5/YjQ2YjkwMzEyZGRi/YzYwZjdjNTA2N2Fk/ODM4ZS5qcGc.jpg">Andrew Krug</podcast:person>
      <podcast:person role="Guest" href="https://bhisnews.transistor.fm/people/chadd-watson">Chadd Watson</podcast:person>
      <podcast:person role="Host" href="https://www.blackhillsinfosec.com/team/hayden-covington/" img="https://img.transistorcdn.com/ChX95dlWwFlhp_m8F2j-zi_PMHthvythRWvRoPYbhBo/rs:fill:0:0:1/w:800/h:800/q:60/mb:500000/aHR0cHM6Ly9pbWct/dXBsb2FkLXByb2R1/Y3Rpb24udHJhbnNp/c3Rvci5mbS81MGJl/ZTUxMjFjNmM3MzM2/OWI0M2M0ZjcyNjI3/YTIzMi5qcGc.jpg">Hayden Covington</podcast:person>
      <podcast:transcript url="https://share.transistor.fm/s/7f4002a4/transcription.vtt" type="text/vtt" rel="captions"/>
      <podcast:transcript url="https://share.transistor.fm/s/7f4002a4/transcription.srt" type="application/x-subrip" rel="captions"/>
      <podcast:transcript url="https://share.transistor.fm/s/7f4002a4/transcription.json" type="application/json" rel="captions"/>
      <podcast:transcript url="https://share.transistor.fm/s/7f4002a4/transcription.txt" type="text/plain"/>
      <podcast:transcript url="https://share.transistor.fm/s/7f4002a4/transcription" type="text/html"/>
      <podcast:chapters url="https://share.transistor.fm/s/7f4002a4/chapters.json" type="application/json+chapters"/>
    </item>
    <item>
      <title>US Defense Chief Uploads Secret Into to ChatGTP - 2026-02-02</title>
      <itunes:season>6</itunes:season>
      <podcast:season>6</podcast:season>
      <itunes:episode>5</itunes:episode>
      <podcast:episode>5</podcast:episode>
      <itunes:title>US Defense Chief Uploads Secret Into to ChatGTP - 2026-02-02</itunes:title>
      <itunes:episodeType>full</itunes:episodeType>
      <guid isPermaLink="false">a72efa63-1413-4390-bb5d-5f165d94fa18</guid>
      <link>https://share.transistor.fm/s/cf327306</link>
      <description>
        <![CDATA[<p>Join us LIVE on Mondays, 4:30pm EST.<br>A weekly Podcast with BHIS and Friends. We discuss notable Infosec, and infosec-adjacent news stories gathered by our community news team.<br><a href="https://www.youtube.com/@BlackHillsInformationSecurity">https://www.youtube.com/@BlackHillsInformationSecurity</a></p><p>Chat with us on Discord! - <br><a href="https://discord.gg/bhis">https://discord.gg/bhis</a><br>🔴live-chat</p><p>This episode breaks down recent reports of sensitive information being shared with AI tools and what that means for security and operations. The discussion covers OPSEC failures, common misuse of ChatGPT in professional environments, how data actually flows through AI systems, and what organizations should (and shouldn’t) worry about. The hosts focus on practical risk, realistic threat models, and actionable lessons for security teams navigating AI adoption.</p><p><strong>Chapters</strong><br></p><ul><li>(00:00) - PreShow Banter™ — Robot Drivers</li>
<li>(06:29) - US Defense Chief Uploads Secret Into to ChatGTP - 2026-02-02</li>
<li>(09:54) - Story # 1: US cyber defense chief accidentally uploaded secret government info to ChatGPT</li>
<li>(19:03) - Story # 2: Hackers can bypass npm’s Shai-Hulud defenses via Git dependencies</li>
<li>(23:01) - Story # 3: Notepad++ Official Update Mechanism Hijacked to Deliver Malware to Select Users</li>
<li>(26:30) - Story # 4: Millions of Gmail, Facebook and other account credentials exposed</li>
<li>(30:55) - Story # 5: Exposed Moltbook Database Let Anyone Take Control of Any AI Agent on the Site</li>
<li>(36:13) - Story # 6: County pays $600,000 to pentesters it arrested for assessing courthouse security</li>
<li>(39:12) - Story # 7: Costco reportedly removes RAM from its display PCs to prevent tech-savvy shoplifters, customers claim — GPUs also absent across stores as PC parts become a hot commodity</li>
<li>(41:13) - Story # 8: Claude Sonnet 5 Is Imminent — And It Could Be a Generation Ahead of Google</li>
<li>(45:09) - Story # 9: Researchers Find 175,000 Publicly Exposed Ollama AI Servers Across 130 Countries</li>
<li>(48:49) - Story # 10: Match, Hinge, OkCupid, and Panera Bread breached by ransomware group</li>
<li>(52:05) - Story # 11: Hunterbrook says Ubiquiti powering Russian battlefield communications in Ukraine</li>
<li>(54:28) - Story # 12: Attack on Renewable Energy Plants</li>
<li>(56:26) - Story # 13: Disrupting the World's Largest Residential Proxy Network | Google Cloud Blog</li>
</ul><br><strong>Links</strong><br>Story # 1: <a href="https://arstechnica.com/tech-policy/2026/01/us-cyber-defense-chief-accidentally-uploaded-secret-government-info-to-chatgpt/">US cyber defense chief accidentally uploaded secret government info to ChatGPT</a><br>Story # 2: <a href="https://www.bleepingcomputer.com/news/security/hackers-can-bypass-npms-shai-hulud-defenses-via-git-dependencies/">Hackers can bypass npm’s Shai-Hulud defenses via Git dependencies</a><br>Story # 3: <a href="https://thehackernews.com/2026/02/notepad-official-update-mechanism.html">Notepad++ Official Update Mechanism Hijacked to Deliver Malware to Select Users</a><br>Story # 4: <a href="https://www.scworld.com/news/millions-of-gmail-facebook-and-other-account-credentials-exposed?nbd=%7B%7Blead.HumId%7D%7D&amp;nbd_source=mrkto">Millions of Gmail, Facebook and other account credentials exposed</a><br>Story # 5: <a href="https://www.404media.co/exposed-moltbook-database-let-anyone-take-control-of-any-ai-agent-on-the-site/">Exposed Moltbook Database Let Anyone Take Control of Any AI Agent on the Site</a><br>Story # 6: <a href="https://arstechnica.com/security/2026/01/county-pays-600000-to-pentesters-it-arrested-for-assessing-courthouse-security/">County pays $600,000 to pentesters it arrested for assessing courthouse security</a><br>Story # 7: <a href="https://www.tomshardware.com/pc-components/ram/costco-removes-ram-from-its-display-pcs-to-prevent-tech-savvy-shoplifters-gpus-also-absent-across-stores-as-pc-parts-become-a-hot-commodity">Costco reportedly removes RAM from its display PCs to prevent tech-savvy shoplifters, customers claim — GPUs also absent across stores as PC parts become a hot commodity</a><br>Story # 8: <a href="https://ucstrategies.com/news/claude-sonnet-5-is-imminent-and-it-could-be-a-generation-ahead-of-google/">Claude Sonnet 5 Is Imminent — And It Could Be a Generation Ahead of Google</a><br>Story # 9: <a href="https://thehackernews.com/2026/01/researchers-find-175000-publicly.html">Researchers Find 175,000 Publicly Exposed Ollama AI Servers Across 130 Countries</a><br>Story # 10: <a href="https://www.malwarebytes.com/blog/news/2026/01/match-hinge-okcupid-and-panera-bread-breached-by-ransomware-group">Match, Hinge, OkCupid, and Panera Bread breached by ransomware group</a><br>Story # 11: <a href="https://finance.yahoo.com/news/hunterbrook-says-ubiquiti-powering-russian-132749561.html">Hunterbrook says Ubiquiti powering Russian battlefield communications in Ukraine</a><br>Story # 12: <a href="https://cert.pl/en/posts/2026/01/incident-report-energy-sector-2025/">Attack on Renewable Energy Plants</a><br>Story # 13: <a href="https://cloud.google.com/blog/topics/threat-intelligence/disrupting-largest-residential-proxy-network">Disrupting the World’s Largest Residential Proxy Network | Google Cloud Blog</a><p><br><strong>Wade &amp; Hayden on Simply Cyber - </strong><br><a href="https://www.youtube.com/live/c_lUP5gR15I">https://www.youtube.com/live/c_lUP5gR15I</a></p><p><strong>Hayden’s Class - </strong><br><a href="https://www.antisyphontraining.com/product/foundations-of-security-operations-with-hayden-covington/">https://www.antisyphontraining.com/product/foundations-of-security-operations-with-hayden-covington/</a></p><p><strong>Mishaal’s Class - </strong><br><a href="https://www.antisyphontraining.com/product/next-level-osint-with-mishaal-khan/">https://www.antisyphontraining.com/product/next-level-osint-with-mishaal-khan/</a></p><p><br><strong>🔗 Register for FREE Infosec Webcasts, Anti-casts &amp; Summits </strong></p><p><a href="https://poweredbybhis.com/">https://poweredbybhis.com</a></p><p><br>Brought to you by:</p><p><strong>Black Hills Information Security </strong></p><p><a href="https://www.blackhillsinfosec.com/">https://www.blackhillsinfosec.com</a></p><p><br></p><p><strong>Antisyphon Training</strong></p><p><a href="https://www.antisyphontraining.com/">https://www.antisyphontraining.com/</a></p><p><br></p><p><strong>Active Countermeasures</strong></p><p><a href="https://www.activecountermeasures.com/">https://www.activecountermeasures.com</a></p><p><br></p><p><strong>Wild West Hackin Fest</strong></p><p><a href="https://wildwesthackinfest.com/">https://wildwesthackinfest.com</a></p>]]>
      </description>
      <content:encoded>
        <![CDATA[<p>Join us LIVE on Mondays, 4:30pm EST.<br>A weekly Podcast with BHIS and Friends. We discuss notable Infosec, and infosec-adjacent news stories gathered by our community news team.<br><a href="https://www.youtube.com/@BlackHillsInformationSecurity">https://www.youtube.com/@BlackHillsInformationSecurity</a></p><p>Chat with us on Discord! - <br><a href="https://discord.gg/bhis">https://discord.gg/bhis</a><br>🔴live-chat</p><p>This episode breaks down recent reports of sensitive information being shared with AI tools and what that means for security and operations. The discussion covers OPSEC failures, common misuse of ChatGPT in professional environments, how data actually flows through AI systems, and what organizations should (and shouldn’t) worry about. The hosts focus on practical risk, realistic threat models, and actionable lessons for security teams navigating AI adoption.</p><p><strong>Chapters</strong><br></p><ul><li>(00:00) - PreShow Banter™ — Robot Drivers</li>
<li>(06:29) - US Defense Chief Uploads Secret Into to ChatGTP - 2026-02-02</li>
<li>(09:54) - Story # 1: US cyber defense chief accidentally uploaded secret government info to ChatGPT</li>
<li>(19:03) - Story # 2: Hackers can bypass npm’s Shai-Hulud defenses via Git dependencies</li>
<li>(23:01) - Story # 3: Notepad++ Official Update Mechanism Hijacked to Deliver Malware to Select Users</li>
<li>(26:30) - Story # 4: Millions of Gmail, Facebook and other account credentials exposed</li>
<li>(30:55) - Story # 5: Exposed Moltbook Database Let Anyone Take Control of Any AI Agent on the Site</li>
<li>(36:13) - Story # 6: County pays $600,000 to pentesters it arrested for assessing courthouse security</li>
<li>(39:12) - Story # 7: Costco reportedly removes RAM from its display PCs to prevent tech-savvy shoplifters, customers claim — GPUs also absent across stores as PC parts become a hot commodity</li>
<li>(41:13) - Story # 8: Claude Sonnet 5 Is Imminent — And It Could Be a Generation Ahead of Google</li>
<li>(45:09) - Story # 9: Researchers Find 175,000 Publicly Exposed Ollama AI Servers Across 130 Countries</li>
<li>(48:49) - Story # 10: Match, Hinge, OkCupid, and Panera Bread breached by ransomware group</li>
<li>(52:05) - Story # 11: Hunterbrook says Ubiquiti powering Russian battlefield communications in Ukraine</li>
<li>(54:28) - Story # 12: Attack on Renewable Energy Plants</li>
<li>(56:26) - Story # 13: Disrupting the World's Largest Residential Proxy Network | Google Cloud Blog</li>
</ul><br><strong>Links</strong><br>Story # 1: <a href="https://arstechnica.com/tech-policy/2026/01/us-cyber-defense-chief-accidentally-uploaded-secret-government-info-to-chatgpt/">US cyber defense chief accidentally uploaded secret government info to ChatGPT</a><br>Story # 2: <a href="https://www.bleepingcomputer.com/news/security/hackers-can-bypass-npms-shai-hulud-defenses-via-git-dependencies/">Hackers can bypass npm’s Shai-Hulud defenses via Git dependencies</a><br>Story # 3: <a href="https://thehackernews.com/2026/02/notepad-official-update-mechanism.html">Notepad++ Official Update Mechanism Hijacked to Deliver Malware to Select Users</a><br>Story # 4: <a href="https://www.scworld.com/news/millions-of-gmail-facebook-and-other-account-credentials-exposed?nbd=%7B%7Blead.HumId%7D%7D&amp;nbd_source=mrkto">Millions of Gmail, Facebook and other account credentials exposed</a><br>Story # 5: <a href="https://www.404media.co/exposed-moltbook-database-let-anyone-take-control-of-any-ai-agent-on-the-site/">Exposed Moltbook Database Let Anyone Take Control of Any AI Agent on the Site</a><br>Story # 6: <a href="https://arstechnica.com/security/2026/01/county-pays-600000-to-pentesters-it-arrested-for-assessing-courthouse-security/">County pays $600,000 to pentesters it arrested for assessing courthouse security</a><br>Story # 7: <a href="https://www.tomshardware.com/pc-components/ram/costco-removes-ram-from-its-display-pcs-to-prevent-tech-savvy-shoplifters-gpus-also-absent-across-stores-as-pc-parts-become-a-hot-commodity">Costco reportedly removes RAM from its display PCs to prevent tech-savvy shoplifters, customers claim — GPUs also absent across stores as PC parts become a hot commodity</a><br>Story # 8: <a href="https://ucstrategies.com/news/claude-sonnet-5-is-imminent-and-it-could-be-a-generation-ahead-of-google/">Claude Sonnet 5 Is Imminent — And It Could Be a Generation Ahead of Google</a><br>Story # 9: <a href="https://thehackernews.com/2026/01/researchers-find-175000-publicly.html">Researchers Find 175,000 Publicly Exposed Ollama AI Servers Across 130 Countries</a><br>Story # 10: <a href="https://www.malwarebytes.com/blog/news/2026/01/match-hinge-okcupid-and-panera-bread-breached-by-ransomware-group">Match, Hinge, OkCupid, and Panera Bread breached by ransomware group</a><br>Story # 11: <a href="https://finance.yahoo.com/news/hunterbrook-says-ubiquiti-powering-russian-132749561.html">Hunterbrook says Ubiquiti powering Russian battlefield communications in Ukraine</a><br>Story # 12: <a href="https://cert.pl/en/posts/2026/01/incident-report-energy-sector-2025/">Attack on Renewable Energy Plants</a><br>Story # 13: <a href="https://cloud.google.com/blog/topics/threat-intelligence/disrupting-largest-residential-proxy-network">Disrupting the World’s Largest Residential Proxy Network | Google Cloud Blog</a><p><br><strong>Wade &amp; Hayden on Simply Cyber - </strong><br><a href="https://www.youtube.com/live/c_lUP5gR15I">https://www.youtube.com/live/c_lUP5gR15I</a></p><p><strong>Hayden’s Class - </strong><br><a href="https://www.antisyphontraining.com/product/foundations-of-security-operations-with-hayden-covington/">https://www.antisyphontraining.com/product/foundations-of-security-operations-with-hayden-covington/</a></p><p><strong>Mishaal’s Class - </strong><br><a href="https://www.antisyphontraining.com/product/next-level-osint-with-mishaal-khan/">https://www.antisyphontraining.com/product/next-level-osint-with-mishaal-khan/</a></p><p><br><strong>🔗 Register for FREE Infosec Webcasts, Anti-casts &amp; Summits </strong></p><p><a href="https://poweredbybhis.com/">https://poweredbybhis.com</a></p><p><br>Brought to you by:</p><p><strong>Black Hills Information Security </strong></p><p><a href="https://www.blackhillsinfosec.com/">https://www.blackhillsinfosec.com</a></p><p><br></p><p><strong>Antisyphon Training</strong></p><p><a href="https://www.antisyphontraining.com/">https://www.antisyphontraining.com/</a></p><p><br></p><p><strong>Active Countermeasures</strong></p><p><a href="https://www.activecountermeasures.com/">https://www.activecountermeasures.com</a></p><p><br></p><p><strong>Wild West Hackin Fest</strong></p><p><a href="https://wildwesthackinfest.com/">https://wildwesthackinfest.com</a></p>]]>
      </content:encoded>
      <pubDate>Thu, 05 Feb 2026 05:00:00 -0500</pubDate>
      <author>Black Hills Information Security</author>
      <enclosure url="https://media.transistor.fm/cf327306/3fd18105.mp3" length="64384173" type="audio/mpeg"/>
      <itunes:author>Black Hills Information Security</itunes:author>
      <itunes:image href="https://img.transistorcdn.com/rL8v7m0L2ZHvLcODyQBXxB4RdHw_JZEhwKSBlnwwvCU/rs:fill:0:0:1/w:1400/h:1400/q:60/mb:500000/aHR0cHM6Ly9pbWct/dXBsb2FkLXByb2R1/Y3Rpb24udHJhbnNp/c3Rvci5mbS9iYWI4/YTc1ZWQxYTc0NDE0/NzJmZGRiMzAwZjMy/OGUwOS5qcGc.jpg"/>
      <itunes:duration>3871</itunes:duration>
      <itunes:summary>
        <![CDATA[<p>Join us LIVE on Mondays, 4:30pm EST.<br>A weekly Podcast with BHIS and Friends. We discuss notable Infosec, and infosec-adjacent news stories gathered by our community news team.<br><a href="https://www.youtube.com/@BlackHillsInformationSecurity">https://www.youtube.com/@BlackHillsInformationSecurity</a></p><p>Chat with us on Discord! - <br><a href="https://discord.gg/bhis">https://discord.gg/bhis</a><br>🔴live-chat</p><p>This episode breaks down recent reports of sensitive information being shared with AI tools and what that means for security and operations. The discussion covers OPSEC failures, common misuse of ChatGPT in professional environments, how data actually flows through AI systems, and what organizations should (and shouldn’t) worry about. The hosts focus on practical risk, realistic threat models, and actionable lessons for security teams navigating AI adoption.</p><p><strong>Chapters</strong><br></p><ul><li>(00:00) - PreShow Banter™ — Robot Drivers</li>
<li>(06:29) - US Defense Chief Uploads Secret Into to ChatGTP - 2026-02-02</li>
<li>(09:54) - Story # 1: US cyber defense chief accidentally uploaded secret government info to ChatGPT</li>
<li>(19:03) - Story # 2: Hackers can bypass npm’s Shai-Hulud defenses via Git dependencies</li>
<li>(23:01) - Story # 3: Notepad++ Official Update Mechanism Hijacked to Deliver Malware to Select Users</li>
<li>(26:30) - Story # 4: Millions of Gmail, Facebook and other account credentials exposed</li>
<li>(30:55) - Story # 5: Exposed Moltbook Database Let Anyone Take Control of Any AI Agent on the Site</li>
<li>(36:13) - Story # 6: County pays $600,000 to pentesters it arrested for assessing courthouse security</li>
<li>(39:12) - Story # 7: Costco reportedly removes RAM from its display PCs to prevent tech-savvy shoplifters, customers claim — GPUs also absent across stores as PC parts become a hot commodity</li>
<li>(41:13) - Story # 8: Claude Sonnet 5 Is Imminent — And It Could Be a Generation Ahead of Google</li>
<li>(45:09) - Story # 9: Researchers Find 175,000 Publicly Exposed Ollama AI Servers Across 130 Countries</li>
<li>(48:49) - Story # 10: Match, Hinge, OkCupid, and Panera Bread breached by ransomware group</li>
<li>(52:05) - Story # 11: Hunterbrook says Ubiquiti powering Russian battlefield communications in Ukraine</li>
<li>(54:28) - Story # 12: Attack on Renewable Energy Plants</li>
<li>(56:26) - Story # 13: Disrupting the World's Largest Residential Proxy Network | Google Cloud Blog</li>
</ul><br><strong>Links</strong><br>Story # 1: <a href="https://arstechnica.com/tech-policy/2026/01/us-cyber-defense-chief-accidentally-uploaded-secret-government-info-to-chatgpt/">US cyber defense chief accidentally uploaded secret government info to ChatGPT</a><br>Story # 2: <a href="https://www.bleepingcomputer.com/news/security/hackers-can-bypass-npms-shai-hulud-defenses-via-git-dependencies/">Hackers can bypass npm’s Shai-Hulud defenses via Git dependencies</a><br>Story # 3: <a href="https://thehackernews.com/2026/02/notepad-official-update-mechanism.html">Notepad++ Official Update Mechanism Hijacked to Deliver Malware to Select Users</a><br>Story # 4: <a href="https://www.scworld.com/news/millions-of-gmail-facebook-and-other-account-credentials-exposed?nbd=%7B%7Blead.HumId%7D%7D&amp;nbd_source=mrkto">Millions of Gmail, Facebook and other account credentials exposed</a><br>Story # 5: <a href="https://www.404media.co/exposed-moltbook-database-let-anyone-take-control-of-any-ai-agent-on-the-site/">Exposed Moltbook Database Let Anyone Take Control of Any AI Agent on the Site</a><br>Story # 6: <a href="https://arstechnica.com/security/2026/01/county-pays-600000-to-pentesters-it-arrested-for-assessing-courthouse-security/">County pays $600,000 to pentesters it arrested for assessing courthouse security</a><br>Story # 7: <a href="https://www.tomshardware.com/pc-components/ram/costco-removes-ram-from-its-display-pcs-to-prevent-tech-savvy-shoplifters-gpus-also-absent-across-stores-as-pc-parts-become-a-hot-commodity">Costco reportedly removes RAM from its display PCs to prevent tech-savvy shoplifters, customers claim — GPUs also absent across stores as PC parts become a hot commodity</a><br>Story # 8: <a href="https://ucstrategies.com/news/claude-sonnet-5-is-imminent-and-it-could-be-a-generation-ahead-of-google/">Claude Sonnet 5 Is Imminent — And It Could Be a Generation Ahead of Google</a><br>Story # 9: <a href="https://thehackernews.com/2026/01/researchers-find-175000-publicly.html">Researchers Find 175,000 Publicly Exposed Ollama AI Servers Across 130 Countries</a><br>Story # 10: <a href="https://www.malwarebytes.com/blog/news/2026/01/match-hinge-okcupid-and-panera-bread-breached-by-ransomware-group">Match, Hinge, OkCupid, and Panera Bread breached by ransomware group</a><br>Story # 11: <a href="https://finance.yahoo.com/news/hunterbrook-says-ubiquiti-powering-russian-132749561.html">Hunterbrook says Ubiquiti powering Russian battlefield communications in Ukraine</a><br>Story # 12: <a href="https://cert.pl/en/posts/2026/01/incident-report-energy-sector-2025/">Attack on Renewable Energy Plants</a><br>Story # 13: <a href="https://cloud.google.com/blog/topics/threat-intelligence/disrupting-largest-residential-proxy-network">Disrupting the World’s Largest Residential Proxy Network | Google Cloud Blog</a><p><br><strong>Wade &amp; Hayden on Simply Cyber - </strong><br><a href="https://www.youtube.com/live/c_lUP5gR15I">https://www.youtube.com/live/c_lUP5gR15I</a></p><p><strong>Hayden’s Class - </strong><br><a href="https://www.antisyphontraining.com/product/foundations-of-security-operations-with-hayden-covington/">https://www.antisyphontraining.com/product/foundations-of-security-operations-with-hayden-covington/</a></p><p><strong>Mishaal’s Class - </strong><br><a href="https://www.antisyphontraining.com/product/next-level-osint-with-mishaal-khan/">https://www.antisyphontraining.com/product/next-level-osint-with-mishaal-khan/</a></p><p><br><strong>🔗 Register for FREE Infosec Webcasts, Anti-casts &amp; Summits </strong></p><p><a href="https://poweredbybhis.com/">https://poweredbybhis.com</a></p><p><br>Brought to you by:</p><p><strong>Black Hills Information Security </strong></p><p><a href="https://www.blackhillsinfosec.com/">https://www.blackhillsinfosec.com</a></p><p><br></p><p><strong>Antisyphon Training</strong></p><p><a href="https://www.antisyphontraining.com/">https://www.antisyphontraining.com/</a></p><p><br></p><p><strong>Active Countermeasures</strong></p><p><a href="https://www.activecountermeasures.com/">https://www.activecountermeasures.com</a></p><p><br></p><p><strong>Wild West Hackin Fest</strong></p><p><a href="https://wildwesthackinfest.com/">https://wildwesthackinfest.com</a></p>]]>
      </itunes:summary>
      <itunes:keywords>Infosec,Cybersecurity,news</itunes:keywords>
      <itunes:explicit>No</itunes:explicit>
      <podcast:person role="Host" href="https://www.blackhillsinfosec.com/team/hayden-covington/" img="https://img.transistorcdn.com/ChX95dlWwFlhp_m8F2j-zi_PMHthvythRWvRoPYbhBo/rs:fill:0:0:1/w:800/h:800/q:60/mb:500000/aHR0cHM6Ly9pbWct/dXBsb2FkLXByb2R1/Y3Rpb24udHJhbnNp/c3Rvci5mbS81MGJl/ZTUxMjFjNmM3MzM2/OWI0M2M0ZjcyNjI3/YTIzMi5qcGc.jpg">Hayden Covington</podcast:person>
      <podcast:person role="Host" href="https://mwgroup.io/about/" img="https://img.transistorcdn.com/_dioeUsMeIlo4vZ0dPQkQ-f-tkMHllpfM4P-4SpyW8Q/rs:fill:0:0:1/w:800/h:800/q:60/mb:500000/aHR0cHM6Ly9pbWct/dXBsb2FkLXByb2R1/Y3Rpb24udHJhbnNp/c3Rvci5mbS9jNzA4/MDU5MTk2MDAyMjc5/NmZiZmFkMDY4NGVj/NzRmNS5qcGVn.jpg">Ralph May</podcast:person>
      <podcast:person role="Host" href="https://www.blackhillsinfosec.com/team/corey-ham/" img="https://img.transistorcdn.com/Q9BaWxLnY_zU_A-eKpfV22Y1AiBI64lLxLJP19iD_lM/rs:fill:0:0:1/w:800/h:800/q:60/mb:500000/aHR0cHM6Ly9pbWct/dXBsb2FkLXByb2R1/Y3Rpb24udHJhbnNp/c3Rvci5mbS84MTMx/N2JlN2IzZWI2MDcz/MGU0NTk5NGU0N2Iw/NzE2Yy5qcGc.jpg">Corey Ham</podcast:person>
      <podcast:person role="Producer" href="https://www.blackhillsinfosec.com/team/ryan-poirier/">Ryan Poirier</podcast:person>
      <podcast:person role="Guest" href="https://bhisnews.transistor.fm/people/andy-pettit-nerf" img="https://img.transistorcdn.com/Hm7-lytrUVM163vtKy6oq20J186th0VCEBKYtoBJ7X4/rs:fill:0:0:1/w:800/h:800/q:60/mb:500000/aHR0cHM6Ly9pbWct/dXBsb2FkLXByb2R1/Y3Rpb24udHJhbnNp/c3Rvci5mbS85NjNk/NWE4OWY5ODFhY2Yx/ZTJlMTc1MzAxMGVj/Mzg4Mi5wbmc.jpg">Andy Pettit "Nerf"</podcast:person>
      <podcast:person role="Guest" href="https://www.antisyphontraining.com/instructor/mishaal-khan/" img="https://img.transistorcdn.com/UUiQURCvl2TqlMUSO1-ew9ofRVIewls-niJnclBQNcc/rs:fill:0:0:1/w:800/h:800/q:60/mb:500000/aHR0cHM6Ly9pbWct/dXBsb2FkLXByb2R1/Y3Rpb24udHJhbnNp/c3Rvci5mbS9lYTEz/NzZhYmRmODQxOGE2/OThmM2FiZjgyNmU0/ZWRiNy5wbmc.jpg">Mishaal Khan</podcast:person>
      <podcast:person role="Host" href="https://www.bsidessd.org/" img="https://img.transistorcdn.com/KeYB5iZ31d5IGBEuYGSV1SOcM5ZsEQ3dGI4HgjvyVVE/rs:fill:0:0:1/w:800/h:800/q:60/mb:500000/aHR0cHM6Ly9pbWct/dXBsb2FkLXByb2R1/Y3Rpb24udHJhbnNp/c3Rvci5mbS82ZGRm/ZWU5MGU5YzJiZjU0/MTVmZTU0OWExYTg4/OGFhMi5wbmc.jpg">Wade Wells</podcast:person>
      <podcast:transcript url="https://share.transistor.fm/s/cf327306/transcription.vtt" type="text/vtt" rel="captions"/>
      <podcast:transcript url="https://share.transistor.fm/s/cf327306/transcription.srt" type="application/x-subrip" rel="captions"/>
      <podcast:transcript url="https://share.transistor.fm/s/cf327306/transcription.json" type="application/json" rel="captions"/>
      <podcast:transcript url="https://share.transistor.fm/s/cf327306/transcription.txt" type="text/plain"/>
      <podcast:transcript url="https://share.transistor.fm/s/cf327306/transcription" type="text/html"/>
      <podcast:chapters url="https://share.transistor.fm/s/cf327306/chapters.json" type="application/json+chapters"/>
    </item>
    <item>
      <title>TikTok's invasive Privacy Policy - 2026-01-26</title>
      <itunes:season>6</itunes:season>
      <podcast:season>6</podcast:season>
      <itunes:episode>4</itunes:episode>
      <podcast:episode>4</podcast:episode>
      <itunes:title>TikTok's invasive Privacy Policy - 2026-01-26</itunes:title>
      <itunes:episodeType>full</itunes:episodeType>
      <guid isPermaLink="false">60956975-3870-425a-93c2-b1711290a8b3</guid>
      <link>https://share.transistor.fm/s/8ed77c67</link>
      <description>
        <![CDATA[<p>Join us LIVE on Mondays, 4:30pm EST.<br>A weekly Podcast with BHIS and Friends. We discuss notable Infosec, and infosec-adjacent news stories gathered by our community news team.<br><a href="https://www.youtube.com/@BlackHillsInformationSecurity">https://www.youtube.com/@BlackHillsInformationSecurity</a></p><p>Chat with us on Discord! - <br><a href="https://discord.gg/bhis">https://discord.gg/bhis</a><br>🔴live-chat</p><p><br>In this episode, the hosts break down TikTok’s latest privacy policy and why it’s raising serious red flags. They discuss how the app expands data collection and tracking, what that means for user privacy, and the broader security implications—especially concerns around data access and China. Along the way, the conversation connects these changes to ongoing TikTok ban discussions, real-world risk for individuals and organizations, and what users should consider if they continue using the platform. The episode mixes technical insight with practical takeaways, making the privacy risks easy to understand without losing nuance.</p><p><strong>Chapters:<br></strong></p><ul><li>(00:00) - PreShow Banter™ — Electroshock Therapy</li>
<li>(02:28) - 2026-01-26</li>
<li>(07:33) - Story # 1: Fortinet confirms critical FortiCloud auth bypass not fully patched</li>
<li>(14:27) - Story # 2: Hackers exploit critical telnetd auth bypass flaw to get root</li>
<li>(17:37) - Story # 3: Clara Hawking’s Post on TikTok's Pivacy Policy</li>
<li>(24:05) - Story # 4: Supreme Court to hear Facebook pixel tracking case</li>
<li>(31:02) - Story # 5: Google accused of grooming kids after child receives this email</li>
<li>(34:38) - Story # 6: House of Lords backs legislation to ban social media for children under 16</li>
<li>(35:47) - Story # 6b: Australia has banned social media for kids under 16. How does it work?</li>
<li>(42:20) - Story # 7: Why Software Blocks Won’t Stop Illegally 3D Printed Guns (And What Actually Might)</li>
<li>(48:29) - Story # 8: 1Password adds pop-up warnings for suspected phishing sites</li>
<li>(52:09) - ClawdBot / Moltbot</li>
</ul><strong><br></strong><br><strong>Links:</strong><br>Story # 1: <a href="https://www.bleepingcomputer.com/news/security/fortinet-confirms-critical-forticloud-auth-bypass-not-fully-patched/">Fortinet confirms critical FortiCloud auth bypass not fully patched</a><br>Story # 2: <a href="https://www.bleepingcomputer.com/news/security/hackers-exploit-critical-telnetd-auth-bypass-flaw-to-get-root/">Hackers exploit critical telnetd auth bypass flaw to get root</a><br>Story # 3: <a href="https://www.linkedin.com/posts/clara-hawking-ba9123149_the-tiktok-privacy-debate-did-not-end-with-share-7421037691959427072-KNtl?rcm=ACoAADYriF8Bwg7DAPA0wyb_WoiJvbPF05ZqF8s">Clara Hawking’s Post on TikTok’s Pivacy Policy</a><br>Story # 4: <a href="https://therecord.media/supreme-court-case-facebook-tracking">Supreme Court to hear Facebook pixel tracking case</a><br>Story # 5: <a href="https://cybernews.com/tech/google-parental-controls-email/">Google accused of grooming kids after child receives this email</a><br>Story # 6: <a href="https://therecord.media/house-lords-bans-social-media">House of Lords backs legislation to ban social media for children under 16</a><br>Story # 6b: <a href="https://www.bbc.com/news/articles/cwyp9d3ddqyo">Australia has banned social media for kids under 16. How does it work?</a><br>Story # 7: <a href="https://all3dp.com/4/lawmakers-vs-logic-why-software-blocks-wont-stop-illegally-3d-printed-guns-and-what-actually-might/">Why Software Blocks Won’t Stop Illegally 3D Printed Guns (And What Actually Might)</a><br>Story # 8: <a href="https://www.bleepingcomputer.com/news/security/1password-adds-pop-up-warnings-for-suspected-phishing-sites/">1Password adds pop-up warnings for suspected phishing sites</a><br><a href="https://clawd.bot">ClawdBot / Moltbot</a><br><a href="https://www.antisyphontraining.com/product/workshop-foundations-of-network-forensics-and-analysis-with-troy-wojewoda/">Troy’s Workshop</a><br>ANTI-CAST: <a href="https://www.antisyphontraining.com/event/anti-cast-effective-ai-for-practical-secops-workflows-with-hayden-covington/">Effective AI for Practical SecOps Workflows w/ Hayden Covington</a><p><strong>🔗 Register for FREE Infosec Webcasts, Anti-casts &amp; Summits </strong></p><p><a href="https://poweredbybhis.com">https://poweredbybhis.com</a></p><p><br>Brought to you by:</p><p><strong>Black Hills Information Security </strong></p><p><a href="https://www.blackhillsinfosec.com">https://www.blackhillsinfosec.com</a></p><p><br></p><p><strong>Antisyphon Training</strong></p><p><a href="https://www.antisyphontraining.com/">https://www.antisyphontraining.com/</a></p><p><br></p><p><strong>Active Countermeasures</strong></p><p><a href="https://www.activecountermeasures.com">https://www.activecountermeasures.com</a></p><p><br></p><p><strong>Wild West Hackin Fest</strong></p><p><a href="https://wildwesthackinfest.com">https://wildwesthackinfest.com</a></p>]]>
      </description>
      <content:encoded>
        <![CDATA[<p>Join us LIVE on Mondays, 4:30pm EST.<br>A weekly Podcast with BHIS and Friends. We discuss notable Infosec, and infosec-adjacent news stories gathered by our community news team.<br><a href="https://www.youtube.com/@BlackHillsInformationSecurity">https://www.youtube.com/@BlackHillsInformationSecurity</a></p><p>Chat with us on Discord! - <br><a href="https://discord.gg/bhis">https://discord.gg/bhis</a><br>🔴live-chat</p><p><br>In this episode, the hosts break down TikTok’s latest privacy policy and why it’s raising serious red flags. They discuss how the app expands data collection and tracking, what that means for user privacy, and the broader security implications—especially concerns around data access and China. Along the way, the conversation connects these changes to ongoing TikTok ban discussions, real-world risk for individuals and organizations, and what users should consider if they continue using the platform. The episode mixes technical insight with practical takeaways, making the privacy risks easy to understand without losing nuance.</p><p><strong>Chapters:<br></strong></p><ul><li>(00:00) - PreShow Banter™ — Electroshock Therapy</li>
<li>(02:28) - 2026-01-26</li>
<li>(07:33) - Story # 1: Fortinet confirms critical FortiCloud auth bypass not fully patched</li>
<li>(14:27) - Story # 2: Hackers exploit critical telnetd auth bypass flaw to get root</li>
<li>(17:37) - Story # 3: Clara Hawking’s Post on TikTok's Pivacy Policy</li>
<li>(24:05) - Story # 4: Supreme Court to hear Facebook pixel tracking case</li>
<li>(31:02) - Story # 5: Google accused of grooming kids after child receives this email</li>
<li>(34:38) - Story # 6: House of Lords backs legislation to ban social media for children under 16</li>
<li>(35:47) - Story # 6b: Australia has banned social media for kids under 16. How does it work?</li>
<li>(42:20) - Story # 7: Why Software Blocks Won’t Stop Illegally 3D Printed Guns (And What Actually Might)</li>
<li>(48:29) - Story # 8: 1Password adds pop-up warnings for suspected phishing sites</li>
<li>(52:09) - ClawdBot / Moltbot</li>
</ul><strong><br></strong><br><strong>Links:</strong><br>Story # 1: <a href="https://www.bleepingcomputer.com/news/security/fortinet-confirms-critical-forticloud-auth-bypass-not-fully-patched/">Fortinet confirms critical FortiCloud auth bypass not fully patched</a><br>Story # 2: <a href="https://www.bleepingcomputer.com/news/security/hackers-exploit-critical-telnetd-auth-bypass-flaw-to-get-root/">Hackers exploit critical telnetd auth bypass flaw to get root</a><br>Story # 3: <a href="https://www.linkedin.com/posts/clara-hawking-ba9123149_the-tiktok-privacy-debate-did-not-end-with-share-7421037691959427072-KNtl?rcm=ACoAADYriF8Bwg7DAPA0wyb_WoiJvbPF05ZqF8s">Clara Hawking’s Post on TikTok’s Pivacy Policy</a><br>Story # 4: <a href="https://therecord.media/supreme-court-case-facebook-tracking">Supreme Court to hear Facebook pixel tracking case</a><br>Story # 5: <a href="https://cybernews.com/tech/google-parental-controls-email/">Google accused of grooming kids after child receives this email</a><br>Story # 6: <a href="https://therecord.media/house-lords-bans-social-media">House of Lords backs legislation to ban social media for children under 16</a><br>Story # 6b: <a href="https://www.bbc.com/news/articles/cwyp9d3ddqyo">Australia has banned social media for kids under 16. How does it work?</a><br>Story # 7: <a href="https://all3dp.com/4/lawmakers-vs-logic-why-software-blocks-wont-stop-illegally-3d-printed-guns-and-what-actually-might/">Why Software Blocks Won’t Stop Illegally 3D Printed Guns (And What Actually Might)</a><br>Story # 8: <a href="https://www.bleepingcomputer.com/news/security/1password-adds-pop-up-warnings-for-suspected-phishing-sites/">1Password adds pop-up warnings for suspected phishing sites</a><br><a href="https://clawd.bot">ClawdBot / Moltbot</a><br><a href="https://www.antisyphontraining.com/product/workshop-foundations-of-network-forensics-and-analysis-with-troy-wojewoda/">Troy’s Workshop</a><br>ANTI-CAST: <a href="https://www.antisyphontraining.com/event/anti-cast-effective-ai-for-practical-secops-workflows-with-hayden-covington/">Effective AI for Practical SecOps Workflows w/ Hayden Covington</a><p><strong>🔗 Register for FREE Infosec Webcasts, Anti-casts &amp; Summits </strong></p><p><a href="https://poweredbybhis.com">https://poweredbybhis.com</a></p><p><br>Brought to you by:</p><p><strong>Black Hills Information Security </strong></p><p><a href="https://www.blackhillsinfosec.com">https://www.blackhillsinfosec.com</a></p><p><br></p><p><strong>Antisyphon Training</strong></p><p><a href="https://www.antisyphontraining.com/">https://www.antisyphontraining.com/</a></p><p><br></p><p><strong>Active Countermeasures</strong></p><p><a href="https://www.activecountermeasures.com">https://www.activecountermeasures.com</a></p><p><br></p><p><strong>Wild West Hackin Fest</strong></p><p><a href="https://wildwesthackinfest.com">https://wildwesthackinfest.com</a></p>]]>
      </content:encoded>
      <pubDate>Wed, 28 Jan 2026 05:00:00 -0500</pubDate>
      <author>Black Hills Information Security</author>
      <enclosure url="https://media.transistor.fm/8ed77c67/5aeb48fe.mp3" length="63120179" type="audio/mpeg"/>
      <itunes:author>Black Hills Information Security</itunes:author>
      <itunes:image href="https://img.transistorcdn.com/5AGxc7tp6A-QZKL6DBRGxiAr2LSdUNPPryZP7niTX2I/rs:fill:0:0:1/w:1400/h:1400/q:60/mb:500000/aHR0cHM6Ly9pbWct/dXBsb2FkLXByb2R1/Y3Rpb24udHJhbnNp/c3Rvci5mbS9hMWMz/MDRkYTA0ODg0ODY0/ZTg5Mzk3OGFlMTY3/OTc1NC5qcGc.jpg"/>
      <itunes:duration>3807</itunes:duration>
      <itunes:summary>
        <![CDATA[<p>Join us LIVE on Mondays, 4:30pm EST.<br>A weekly Podcast with BHIS and Friends. We discuss notable Infosec, and infosec-adjacent news stories gathered by our community news team.<br><a href="https://www.youtube.com/@BlackHillsInformationSecurity">https://www.youtube.com/@BlackHillsInformationSecurity</a></p><p>Chat with us on Discord! - <br><a href="https://discord.gg/bhis">https://discord.gg/bhis</a><br>🔴live-chat</p><p><br>In this episode, the hosts break down TikTok’s latest privacy policy and why it’s raising serious red flags. They discuss how the app expands data collection and tracking, what that means for user privacy, and the broader security implications—especially concerns around data access and China. Along the way, the conversation connects these changes to ongoing TikTok ban discussions, real-world risk for individuals and organizations, and what users should consider if they continue using the platform. The episode mixes technical insight with practical takeaways, making the privacy risks easy to understand without losing nuance.</p><p><strong>Chapters:<br></strong></p><ul><li>(00:00) - PreShow Banter™ — Electroshock Therapy</li>
<li>(02:28) - 2026-01-26</li>
<li>(07:33) - Story # 1: Fortinet confirms critical FortiCloud auth bypass not fully patched</li>
<li>(14:27) - Story # 2: Hackers exploit critical telnetd auth bypass flaw to get root</li>
<li>(17:37) - Story # 3: Clara Hawking’s Post on TikTok's Pivacy Policy</li>
<li>(24:05) - Story # 4: Supreme Court to hear Facebook pixel tracking case</li>
<li>(31:02) - Story # 5: Google accused of grooming kids after child receives this email</li>
<li>(34:38) - Story # 6: House of Lords backs legislation to ban social media for children under 16</li>
<li>(35:47) - Story # 6b: Australia has banned social media for kids under 16. How does it work?</li>
<li>(42:20) - Story # 7: Why Software Blocks Won’t Stop Illegally 3D Printed Guns (And What Actually Might)</li>
<li>(48:29) - Story # 8: 1Password adds pop-up warnings for suspected phishing sites</li>
<li>(52:09) - ClawdBot / Moltbot</li>
</ul><strong><br></strong><br><strong>Links:</strong><br>Story # 1: <a href="https://www.bleepingcomputer.com/news/security/fortinet-confirms-critical-forticloud-auth-bypass-not-fully-patched/">Fortinet confirms critical FortiCloud auth bypass not fully patched</a><br>Story # 2: <a href="https://www.bleepingcomputer.com/news/security/hackers-exploit-critical-telnetd-auth-bypass-flaw-to-get-root/">Hackers exploit critical telnetd auth bypass flaw to get root</a><br>Story # 3: <a href="https://www.linkedin.com/posts/clara-hawking-ba9123149_the-tiktok-privacy-debate-did-not-end-with-share-7421037691959427072-KNtl?rcm=ACoAADYriF8Bwg7DAPA0wyb_WoiJvbPF05ZqF8s">Clara Hawking’s Post on TikTok’s Pivacy Policy</a><br>Story # 4: <a href="https://therecord.media/supreme-court-case-facebook-tracking">Supreme Court to hear Facebook pixel tracking case</a><br>Story # 5: <a href="https://cybernews.com/tech/google-parental-controls-email/">Google accused of grooming kids after child receives this email</a><br>Story # 6: <a href="https://therecord.media/house-lords-bans-social-media">House of Lords backs legislation to ban social media for children under 16</a><br>Story # 6b: <a href="https://www.bbc.com/news/articles/cwyp9d3ddqyo">Australia has banned social media for kids under 16. How does it work?</a><br>Story # 7: <a href="https://all3dp.com/4/lawmakers-vs-logic-why-software-blocks-wont-stop-illegally-3d-printed-guns-and-what-actually-might/">Why Software Blocks Won’t Stop Illegally 3D Printed Guns (And What Actually Might)</a><br>Story # 8: <a href="https://www.bleepingcomputer.com/news/security/1password-adds-pop-up-warnings-for-suspected-phishing-sites/">1Password adds pop-up warnings for suspected phishing sites</a><br><a href="https://clawd.bot">ClawdBot / Moltbot</a><br><a href="https://www.antisyphontraining.com/product/workshop-foundations-of-network-forensics-and-analysis-with-troy-wojewoda/">Troy’s Workshop</a><br>ANTI-CAST: <a href="https://www.antisyphontraining.com/event/anti-cast-effective-ai-for-practical-secops-workflows-with-hayden-covington/">Effective AI for Practical SecOps Workflows w/ Hayden Covington</a><p><strong>🔗 Register for FREE Infosec Webcasts, Anti-casts &amp; Summits </strong></p><p><a href="https://poweredbybhis.com">https://poweredbybhis.com</a></p><p><br>Brought to you by:</p><p><strong>Black Hills Information Security </strong></p><p><a href="https://www.blackhillsinfosec.com">https://www.blackhillsinfosec.com</a></p><p><br></p><p><strong>Antisyphon Training</strong></p><p><a href="https://www.antisyphontraining.com/">https://www.antisyphontraining.com/</a></p><p><br></p><p><strong>Active Countermeasures</strong></p><p><a href="https://www.activecountermeasures.com">https://www.activecountermeasures.com</a></p><p><br></p><p><strong>Wild West Hackin Fest</strong></p><p><a href="https://wildwesthackinfest.com">https://wildwesthackinfest.com</a></p>]]>
      </itunes:summary>
      <itunes:keywords>Infosec,Cybersecurity,news</itunes:keywords>
      <itunes:explicit>No</itunes:explicit>
      <podcast:person role="Host" href="https://www.blackhillsinfosec.com/team/corey-ham/" img="https://img.transistorcdn.com/Q9BaWxLnY_zU_A-eKpfV22Y1AiBI64lLxLJP19iD_lM/rs:fill:0:0:1/w:800/h:800/q:60/mb:500000/aHR0cHM6Ly9pbWct/dXBsb2FkLXByb2R1/Y3Rpb24udHJhbnNp/c3Rvci5mbS84MTMx/N2JlN2IzZWI2MDcz/MGU0NTk5NGU0N2Iw/NzE2Yy5qcGc.jpg">Corey Ham</podcast:person>
      <podcast:person role="Guest" href="https://bhisnews.transistor.fm/people/michael-shecky-kavka" img="https://img.transistorcdn.com/ZUl4DxZiPo9coGYCRTdIC8aRTm9MciE46ie_A4KO0mk/rs:fill:0:0:1/w:800/h:800/q:60/mb:500000/aHR0cHM6Ly9pbWct/dXBsb2FkLXByb2R1/Y3Rpb24udHJhbnNp/c3Rvci5mbS9jMjI1/OTNiOTdiNDlhNjMw/MTBkZjMxYmY1OTJj/YWI3Zi5qcGc.jpg">Michael "Shecky" Kavka</podcast:person>
      <podcast:person role="Producer" href="https://bhisnews.transistor.fm/people/meagan-bentley">Meagan Bentley</podcast:person>
      <podcast:person role="Host" href="https://mwgroup.io/about/" img="https://img.transistorcdn.com/_dioeUsMeIlo4vZ0dPQkQ-f-tkMHllpfM4P-4SpyW8Q/rs:fill:0:0:1/w:800/h:800/q:60/mb:500000/aHR0cHM6Ly9pbWct/dXBsb2FkLXByb2R1/Y3Rpb24udHJhbnNp/c3Rvci5mbS9jNzA4/MDU5MTk2MDAyMjc5/NmZiZmFkMDY4NGVj/NzRmNS5qcGVn.jpg">Ralph May</podcast:person>
      <podcast:person role="Host" href="https://www.bsidessd.org/" img="https://img.transistorcdn.com/KeYB5iZ31d5IGBEuYGSV1SOcM5ZsEQ3dGI4HgjvyVVE/rs:fill:0:0:1/w:800/h:800/q:60/mb:500000/aHR0cHM6Ly9pbWct/dXBsb2FkLXByb2R1/Y3Rpb24udHJhbnNp/c3Rvci5mbS82ZGRm/ZWU5MGU5YzJiZjU0/MTVmZTU0OWExYTg4/OGFhMi5wbmc.jpg">Wade Wells</podcast:person>
      <podcast:person role="Guest" href="https://www.blackhillsinfosec.com/team/troy-wojewoda/" img="https://img.transistorcdn.com/vOD3o0PEi1Qbk5tASn-qmQG_vanNtmrAn78U365ob3w/rs:fill:0:0:1/w:800/h:800/q:60/mb:500000/aHR0cHM6Ly9pbWct/dXBsb2FkLXByb2R1/Y3Rpb24udHJhbnNp/c3Rvci5mbS9lMmU4/ODYyMWNmNTFhNmFk/Njc0ODU4YzVlMWQ3/ODk3Ni5qcGc.jpg">Troy Wojewoda</podcast:person>
      <podcast:person role="Guest" href="https://www.rockcyber.com/about-us" img="https://img.transistorcdn.com/NTZIKS6YQuUolJ6c5Hsv1TqT8xnz2PuHKeojIwpP2Jw/rs:fill:0:0:1/w:800/h:800/q:60/mb:500000/aHR0cHM6Ly9pbWct/dXBsb2FkLXByb2R1/Y3Rpb24udHJhbnNp/c3Rvci5mbS8wNjcx/MWY1YzU0ZDg0OTEy/YmU2ZWUxMWNjOTk3/NjBiZi5qcGc.jpg">Rock Lambros</podcast:person>
      <podcast:person role="Host" href="https://www.blackhillsinfosec.com/team/hayden-covington/" img="https://img.transistorcdn.com/ChX95dlWwFlhp_m8F2j-zi_PMHthvythRWvRoPYbhBo/rs:fill:0:0:1/w:800/h:800/q:60/mb:500000/aHR0cHM6Ly9pbWct/dXBsb2FkLXByb2R1/Y3Rpb24udHJhbnNp/c3Rvci5mbS81MGJl/ZTUxMjFjNmM3MzM2/OWI0M2M0ZjcyNjI3/YTIzMi5qcGc.jpg">Hayden Covington</podcast:person>
      <podcast:transcript url="https://share.transistor.fm/s/8ed77c67/transcription.vtt" type="text/vtt" rel="captions"/>
      <podcast:transcript url="https://share.transistor.fm/s/8ed77c67/transcription.srt" type="application/x-subrip" rel="captions"/>
      <podcast:transcript url="https://share.transistor.fm/s/8ed77c67/transcription.json" type="application/json" rel="captions"/>
      <podcast:transcript url="https://share.transistor.fm/s/8ed77c67/transcription.txt" type="text/plain"/>
      <podcast:transcript url="https://share.transistor.fm/s/8ed77c67/transcription" type="text/html"/>
      <podcast:chapters url="https://share.transistor.fm/s/8ed77c67/chapters.json" type="application/json+chapters"/>
    </item>
    <item>
      <title>Chinese firms drop US and Israeli cybersecurity software - 2026-01-19</title>
      <itunes:season>6</itunes:season>
      <podcast:season>6</podcast:season>
      <itunes:episode>3</itunes:episode>
      <podcast:episode>3</podcast:episode>
      <itunes:title>Chinese firms drop US and Israeli cybersecurity software - 2026-01-19</itunes:title>
      <itunes:episodeType>full</itunes:episodeType>
      <guid isPermaLink="false">82e9c32e-829d-46c3-9416-bc8812ba2e89</guid>
      <link>https://share.transistor.fm/s/de594c45</link>
      <description>
        <![CDATA[<p>Join us LIVE on Mondays, 4:30pm EST.<br>A weekly Podcast with BHIS and Friends. We discuss notable Infosec, and infosec-adjacent news stories gathered by our community news team.<br><a href="https://www.youtube.com/@BlackHillsInformationSecurity">https://www.youtube.com/@BlackHillsInformationSecurity</a></p><p>Chat with us on Discord! - <br><a href="https://discord.gg/bhis">https://discord.gg/bhis</a><br>🔴live-chat</p><p>🔗 Register for FREE Infosec Webcasts, Anti-casts &amp; Summits – </p><p><a href="https://poweredbybhis.com">https://poweredbybhis.com</a></p><p><br></p><p>This episode is a rapid-fire cybersecurity news roundup covering multiple headlines and what they mean for defenders. The crew debates reports that Chinese firms are dropping U.S. and Israeli security vendors, then pivots into breach fallout, malware activity, and real-world attacker behavior. Along the way, they unpack how geopolitics affects procurement, why supply-chain dependencies make “bans” messy, and what happens when organizations swap tools fast. </p><p>Expect candid takes on ransomware trends, enterprise security operations, and where hype collides with implementation. The hosts also riff on incident response realities, risk management, and what security teams should watch for next—plus plenty of side commentary and humor in between.<br></p><p><strong>Chapters</strong><br></p><ul><li>(00:00) - PreShow Banter™ — Podcast Banter</li>
<li>(04:13) - Chinese firms to stop using US and Israeli cybersecurity software - 2026-01-19</li>
<li>(08:56) - Story # 1: Exclusive: Beijing tells Chinese firms to stop using US and Israeli cybersecurity software, sources say</li>
<li>(13:42) - Story # 2: Tennessee man to plead guilty to hacking Supreme Court’s electronic case filing system</li>
<li>(16:25) - Story # 3: Hacker gets seven years for breaching Rotterdam and Antwerp ports</li>
<li>(18:20) - Story # 4: 33-year-old Dutchman arrested for enableing criminals to test malware for antivirus programs.</li>
<li>(20:02) - Story # 5: Army to ‘kill NIPR’ at multiple locations in commercial internet experiment</li>
<li>(27:41) - Story # 6: Hungary grants asylum to former Polish minister implicated in spyware probe</li>
<li>(29:12) - Story # 7: California orders Elon Musk’s AI company to immediately stop sharing sexual deepfakes</li>
<li>(41:47) - Story # 8: ServiceNow BodySnatcher flaw highlights risks of rushed AI integrations</li>
<li>(49:30) - Story # 8b: BodySnatcher (CVE-2025-12420): A Broken Authentication and Agentic Hijacking Vulnerability in ServiceNow</li>
<li>(55:29) - CTF Winners</li>
<li>(59:19) - ChickenSec: KFC app 'more secure' than Manage My Health, expert claims</li>
</ul><br><strong>Links<br></strong>Story # 1: <a href="https://www.reuters.com/world/china/beijing-tells-chinese-firms-stop-using-us-israeli-cybersecurity-software-sources-2026-01-14/">Exclusive: Beijing tells Chinese firms to stop using US and Israeli cybersecurity software, sources say</a><br>Story # 2: <a href="https://therecord.media/guilty-plea-hacking-supreme-court-case-filing-system">Tennessee man to plead guilty to hacking Supreme Court’s electronic case filing system</a><br>Story # 3: <a href="https://www.bleepingcomputer.com/news/security/hacker-gets-seven-years-for-breaching-rotterdam-and-antwerp-ports/">Hacker gets seven years for breaching Rotterdam and Antwerp ports</a><br>Story # 4: <a href="https://www.om.nl/actueel/nieuws/2026/01/12/verdachte-aangehouden-in-onderzoek-naar-cybercriminaliteit">33-year-old Dutchman arrested for enableing criminals to test malware for antivirus programs.</a><br>Story # 5: <a href="https://defensescoop.com/2026/01/16/army-secretary-dan-driscoll-kill-nipr-commercial-internet-evaluation/">Army to ‘kill NIPR’ at multiple locations in commercial internet experiment</a><br>Story # 6: <a href="https://therecord.media/hungary-asylum-spyware-probe-poland">Hungary grants asylum to former Polish minister implicated in spyware probe</a><br>Story # 7: <a href="https://calmatters.org/economy/technology/2026/01/california-investigates-deepfakes-elon-musk-company/">California orders Elon Musk’s AI company to immediately stop sharing sexual deepfakes</a><br>Story # 8: <a href="https://www.csoonline.com/article/4118264/servicenow-bodysnatcher-flaw-highlights-risks-of-rushed-ai-integrations.html">ServiceNow BodySnatcher flaw highlights risks of rushed AI integrations</a><br>Story # 8b: <a href="https://appomni.com/ao-labs/bodysnatcher-agentic-ai-security-vulnerability-in-servicenow/">BodySnatcher (CVE-2025-12420): A Broken Authentication and Agentic Hijacking Vulnerability in ServiceNow</a><p>ChickenSec: <a href="https://www.rnz.co.nz/news/national/583887/kfc-app-more-secure-than-manage-my-health-expert-claims">KFC app ‘more secure’ than Manage My Health, expert claims</a></p><p>Brought to you by:</p><p><strong>Black Hills Information Security </strong></p><p><a href="https://www.blackhillsinfosec.com">https://www.blackhillsinfosec.com</a></p><p><br></p><p><strong>Antisyphon Training</strong></p><p><a href="https://www.antisyphontraining.com/">https://www.antisyphontraining.com/</a></p><p><br></p><p><strong>Active Countermeasures</strong></p><p><a href="https://www.activecountermeasures.com">https://www.activecountermeasures.com</a></p><p><br></p><p><strong>Wild West Hackin Fest</strong></p><p><a href="https://wildwesthackinfest.com">https://wildwesthackinfest.com</a></p>]]>
      </description>
      <content:encoded>
        <![CDATA[<p>Join us LIVE on Mondays, 4:30pm EST.<br>A weekly Podcast with BHIS and Friends. We discuss notable Infosec, and infosec-adjacent news stories gathered by our community news team.<br><a href="https://www.youtube.com/@BlackHillsInformationSecurity">https://www.youtube.com/@BlackHillsInformationSecurity</a></p><p>Chat with us on Discord! - <br><a href="https://discord.gg/bhis">https://discord.gg/bhis</a><br>🔴live-chat</p><p>🔗 Register for FREE Infosec Webcasts, Anti-casts &amp; Summits – </p><p><a href="https://poweredbybhis.com">https://poweredbybhis.com</a></p><p><br></p><p>This episode is a rapid-fire cybersecurity news roundup covering multiple headlines and what they mean for defenders. The crew debates reports that Chinese firms are dropping U.S. and Israeli security vendors, then pivots into breach fallout, malware activity, and real-world attacker behavior. Along the way, they unpack how geopolitics affects procurement, why supply-chain dependencies make “bans” messy, and what happens when organizations swap tools fast. </p><p>Expect candid takes on ransomware trends, enterprise security operations, and where hype collides with implementation. The hosts also riff on incident response realities, risk management, and what security teams should watch for next—plus plenty of side commentary and humor in between.<br></p><p><strong>Chapters</strong><br></p><ul><li>(00:00) - PreShow Banter™ — Podcast Banter</li>
<li>(04:13) - Chinese firms to stop using US and Israeli cybersecurity software - 2026-01-19</li>
<li>(08:56) - Story # 1: Exclusive: Beijing tells Chinese firms to stop using US and Israeli cybersecurity software, sources say</li>
<li>(13:42) - Story # 2: Tennessee man to plead guilty to hacking Supreme Court’s electronic case filing system</li>
<li>(16:25) - Story # 3: Hacker gets seven years for breaching Rotterdam and Antwerp ports</li>
<li>(18:20) - Story # 4: 33-year-old Dutchman arrested for enableing criminals to test malware for antivirus programs.</li>
<li>(20:02) - Story # 5: Army to ‘kill NIPR’ at multiple locations in commercial internet experiment</li>
<li>(27:41) - Story # 6: Hungary grants asylum to former Polish minister implicated in spyware probe</li>
<li>(29:12) - Story # 7: California orders Elon Musk’s AI company to immediately stop sharing sexual deepfakes</li>
<li>(41:47) - Story # 8: ServiceNow BodySnatcher flaw highlights risks of rushed AI integrations</li>
<li>(49:30) - Story # 8b: BodySnatcher (CVE-2025-12420): A Broken Authentication and Agentic Hijacking Vulnerability in ServiceNow</li>
<li>(55:29) - CTF Winners</li>
<li>(59:19) - ChickenSec: KFC app 'more secure' than Manage My Health, expert claims</li>
</ul><br><strong>Links<br></strong>Story # 1: <a href="https://www.reuters.com/world/china/beijing-tells-chinese-firms-stop-using-us-israeli-cybersecurity-software-sources-2026-01-14/">Exclusive: Beijing tells Chinese firms to stop using US and Israeli cybersecurity software, sources say</a><br>Story # 2: <a href="https://therecord.media/guilty-plea-hacking-supreme-court-case-filing-system">Tennessee man to plead guilty to hacking Supreme Court’s electronic case filing system</a><br>Story # 3: <a href="https://www.bleepingcomputer.com/news/security/hacker-gets-seven-years-for-breaching-rotterdam-and-antwerp-ports/">Hacker gets seven years for breaching Rotterdam and Antwerp ports</a><br>Story # 4: <a href="https://www.om.nl/actueel/nieuws/2026/01/12/verdachte-aangehouden-in-onderzoek-naar-cybercriminaliteit">33-year-old Dutchman arrested for enableing criminals to test malware for antivirus programs.</a><br>Story # 5: <a href="https://defensescoop.com/2026/01/16/army-secretary-dan-driscoll-kill-nipr-commercial-internet-evaluation/">Army to ‘kill NIPR’ at multiple locations in commercial internet experiment</a><br>Story # 6: <a href="https://therecord.media/hungary-asylum-spyware-probe-poland">Hungary grants asylum to former Polish minister implicated in spyware probe</a><br>Story # 7: <a href="https://calmatters.org/economy/technology/2026/01/california-investigates-deepfakes-elon-musk-company/">California orders Elon Musk’s AI company to immediately stop sharing sexual deepfakes</a><br>Story # 8: <a href="https://www.csoonline.com/article/4118264/servicenow-bodysnatcher-flaw-highlights-risks-of-rushed-ai-integrations.html">ServiceNow BodySnatcher flaw highlights risks of rushed AI integrations</a><br>Story # 8b: <a href="https://appomni.com/ao-labs/bodysnatcher-agentic-ai-security-vulnerability-in-servicenow/">BodySnatcher (CVE-2025-12420): A Broken Authentication and Agentic Hijacking Vulnerability in ServiceNow</a><p>ChickenSec: <a href="https://www.rnz.co.nz/news/national/583887/kfc-app-more-secure-than-manage-my-health-expert-claims">KFC app ‘more secure’ than Manage My Health, expert claims</a></p><p>Brought to you by:</p><p><strong>Black Hills Information Security </strong></p><p><a href="https://www.blackhillsinfosec.com">https://www.blackhillsinfosec.com</a></p><p><br></p><p><strong>Antisyphon Training</strong></p><p><a href="https://www.antisyphontraining.com/">https://www.antisyphontraining.com/</a></p><p><br></p><p><strong>Active Countermeasures</strong></p><p><a href="https://www.activecountermeasures.com">https://www.activecountermeasures.com</a></p><p><br></p><p><strong>Wild West Hackin Fest</strong></p><p><a href="https://wildwesthackinfest.com">https://wildwesthackinfest.com</a></p>]]>
      </content:encoded>
      <pubDate>Tue, 20 Jan 2026 15:29:11 -0500</pubDate>
      <author>Black Hills Information Security</author>
      <enclosure url="https://media.transistor.fm/de594c45/232f0cc8.mp3" length="63443792" type="audio/mpeg"/>
      <itunes:author>Black Hills Information Security</itunes:author>
      <itunes:image href="https://img.transistorcdn.com/oKWLT2EB7b5kyOKleOb_lShw_GzBSo-pGUJ-blMpmtg/rs:fill:0:0:1/w:1400/h:1400/q:60/mb:500000/aHR0cHM6Ly9pbWct/dXBsb2FkLXByb2R1/Y3Rpb24udHJhbnNp/c3Rvci5mbS81OWM4/MGVkZjI3NzFmYjQ5/NGVmYzE2NjkyMGE2/ZTIzNi5qcGc.jpg"/>
      <itunes:duration>3796</itunes:duration>
      <itunes:summary>
        <![CDATA[<p>Join us LIVE on Mondays, 4:30pm EST.<br>A weekly Podcast with BHIS and Friends. We discuss notable Infosec, and infosec-adjacent news stories gathered by our community news team.<br><a href="https://www.youtube.com/@BlackHillsInformationSecurity">https://www.youtube.com/@BlackHillsInformationSecurity</a></p><p>Chat with us on Discord! - <br><a href="https://discord.gg/bhis">https://discord.gg/bhis</a><br>🔴live-chat</p><p>🔗 Register for FREE Infosec Webcasts, Anti-casts &amp; Summits – </p><p><a href="https://poweredbybhis.com">https://poweredbybhis.com</a></p><p><br></p><p>This episode is a rapid-fire cybersecurity news roundup covering multiple headlines and what they mean for defenders. The crew debates reports that Chinese firms are dropping U.S. and Israeli security vendors, then pivots into breach fallout, malware activity, and real-world attacker behavior. Along the way, they unpack how geopolitics affects procurement, why supply-chain dependencies make “bans” messy, and what happens when organizations swap tools fast. </p><p>Expect candid takes on ransomware trends, enterprise security operations, and where hype collides with implementation. The hosts also riff on incident response realities, risk management, and what security teams should watch for next—plus plenty of side commentary and humor in between.<br></p><p><strong>Chapters</strong><br></p><ul><li>(00:00) - PreShow Banter™ — Podcast Banter</li>
<li>(04:13) - Chinese firms to stop using US and Israeli cybersecurity software - 2026-01-19</li>
<li>(08:56) - Story # 1: Exclusive: Beijing tells Chinese firms to stop using US and Israeli cybersecurity software, sources say</li>
<li>(13:42) - Story # 2: Tennessee man to plead guilty to hacking Supreme Court’s electronic case filing system</li>
<li>(16:25) - Story # 3: Hacker gets seven years for breaching Rotterdam and Antwerp ports</li>
<li>(18:20) - Story # 4: 33-year-old Dutchman arrested for enableing criminals to test malware for antivirus programs.</li>
<li>(20:02) - Story # 5: Army to ‘kill NIPR’ at multiple locations in commercial internet experiment</li>
<li>(27:41) - Story # 6: Hungary grants asylum to former Polish minister implicated in spyware probe</li>
<li>(29:12) - Story # 7: California orders Elon Musk’s AI company to immediately stop sharing sexual deepfakes</li>
<li>(41:47) - Story # 8: ServiceNow BodySnatcher flaw highlights risks of rushed AI integrations</li>
<li>(49:30) - Story # 8b: BodySnatcher (CVE-2025-12420): A Broken Authentication and Agentic Hijacking Vulnerability in ServiceNow</li>
<li>(55:29) - CTF Winners</li>
<li>(59:19) - ChickenSec: KFC app 'more secure' than Manage My Health, expert claims</li>
</ul><br><strong>Links<br></strong>Story # 1: <a href="https://www.reuters.com/world/china/beijing-tells-chinese-firms-stop-using-us-israeli-cybersecurity-software-sources-2026-01-14/">Exclusive: Beijing tells Chinese firms to stop using US and Israeli cybersecurity software, sources say</a><br>Story # 2: <a href="https://therecord.media/guilty-plea-hacking-supreme-court-case-filing-system">Tennessee man to plead guilty to hacking Supreme Court’s electronic case filing system</a><br>Story # 3: <a href="https://www.bleepingcomputer.com/news/security/hacker-gets-seven-years-for-breaching-rotterdam-and-antwerp-ports/">Hacker gets seven years for breaching Rotterdam and Antwerp ports</a><br>Story # 4: <a href="https://www.om.nl/actueel/nieuws/2026/01/12/verdachte-aangehouden-in-onderzoek-naar-cybercriminaliteit">33-year-old Dutchman arrested for enableing criminals to test malware for antivirus programs.</a><br>Story # 5: <a href="https://defensescoop.com/2026/01/16/army-secretary-dan-driscoll-kill-nipr-commercial-internet-evaluation/">Army to ‘kill NIPR’ at multiple locations in commercial internet experiment</a><br>Story # 6: <a href="https://therecord.media/hungary-asylum-spyware-probe-poland">Hungary grants asylum to former Polish minister implicated in spyware probe</a><br>Story # 7: <a href="https://calmatters.org/economy/technology/2026/01/california-investigates-deepfakes-elon-musk-company/">California orders Elon Musk’s AI company to immediately stop sharing sexual deepfakes</a><br>Story # 8: <a href="https://www.csoonline.com/article/4118264/servicenow-bodysnatcher-flaw-highlights-risks-of-rushed-ai-integrations.html">ServiceNow BodySnatcher flaw highlights risks of rushed AI integrations</a><br>Story # 8b: <a href="https://appomni.com/ao-labs/bodysnatcher-agentic-ai-security-vulnerability-in-servicenow/">BodySnatcher (CVE-2025-12420): A Broken Authentication and Agentic Hijacking Vulnerability in ServiceNow</a><p>ChickenSec: <a href="https://www.rnz.co.nz/news/national/583887/kfc-app-more-secure-than-manage-my-health-expert-claims">KFC app ‘more secure’ than Manage My Health, expert claims</a></p><p>Brought to you by:</p><p><strong>Black Hills Information Security </strong></p><p><a href="https://www.blackhillsinfosec.com">https://www.blackhillsinfosec.com</a></p><p><br></p><p><strong>Antisyphon Training</strong></p><p><a href="https://www.antisyphontraining.com/">https://www.antisyphontraining.com/</a></p><p><br></p><p><strong>Active Countermeasures</strong></p><p><a href="https://www.activecountermeasures.com">https://www.activecountermeasures.com</a></p><p><br></p><p><strong>Wild West Hackin Fest</strong></p><p><a href="https://wildwesthackinfest.com">https://wildwesthackinfest.com</a></p>]]>
      </itunes:summary>
      <itunes:keywords>Infosec,Cybersecurity,news</itunes:keywords>
      <itunes:explicit>No</itunes:explicit>
      <podcast:person role="Guest" href="https://www.antisyphontraining.com/instructor/faan-ross/" img="https://img.transistorcdn.com/KzBEIeSHg4RWv-6n7nGMpJ-2ZidAkEmOn5MRkFRuKsc/rs:fill:0:0:1/w:800/h:800/q:60/mb:500000/aHR0cHM6Ly9pbWct/dXBsb2FkLXByb2R1/Y3Rpb24udHJhbnNp/c3Rvci5mbS9kYjNk/MDE0ZWZmOWUxZDgz/Y2Q3ZWNhZTg4YjJi/MmJmMS5wbmc.jpg">Faan Rossouw</podcast:person>
      <podcast:person role="Guest" href="https://linktr.ee/MaryEllenKennel" img="https://img.transistorcdn.com/VREbNsyiFbDe1soTC9ll_XcoZjGzsUF1W_UiErAbtSI/rs:fill:0:0:1/w:800/h:800/q:60/mb:500000/aHR0cHM6Ly9pbWct/dXBsb2FkLXByb2R1/Y3Rpb24udHJhbnNp/c3Rvci5mbS84NmYy/Y2FhZTkzYjU0Mzk5/MTAyOWQ1N2Y1ZDdj/Y2EzZS5wbmc.jpg">MaryEllen</podcast:person>
      <podcast:person role="Host" href="https://www.bsidessd.org/" img="https://img.transistorcdn.com/KeYB5iZ31d5IGBEuYGSV1SOcM5ZsEQ3dGI4HgjvyVVE/rs:fill:0:0:1/w:800/h:800/q:60/mb:500000/aHR0cHM6Ly9pbWct/dXBsb2FkLXByb2R1/Y3Rpb24udHJhbnNp/c3Rvci5mbS82ZGRm/ZWU5MGU5YzJiZjU0/MTVmZTU0OWExYTg4/OGFhMi5wbmc.jpg">Wade Wells</podcast:person>
      <podcast:person role="Host" href="https://www.blackhillsinfosec.com/team/john-strand/" img="https://img.transistorcdn.com/NUqk_fUpMRKpGIokj-WgaiALdQtlImwADID3aNogGds/rs:fill:0:0:1/w:800/h:800/q:60/mb:500000/aHR0cHM6Ly9pbWct/dXBsb2FkLXByb2R1/Y3Rpb24udHJhbnNp/c3Rvci5mbS84Y2Ji/YmMyMzRlMDM2Nzdi/YmNlYjhlZDQwZmM4/MmJlYy5qcGc.jpg">John Strand</podcast:person>
      <podcast:person role="Guest" href="https://bhisnews.transistor.fm/people/alex-minster-belouve" img="https://img.transistorcdn.com/pkWXYRcPNt2ZnnEfs05Q8vmWG5GDNmNhH10RUMs2Zro/rs:fill:0:0:1/w:800/h:800/q:60/mb:500000/aHR0cHM6Ly9pbWct/dXBsb2FkLXByb2R1/Y3Rpb24udHJhbnNp/c3Rvci5mbS9mYjZj/MDNhM2YyZmZmZmI2/NGU0YWJjYzdlMjkx/ODFkYy5qcGc.jpg">Alex Minster "Belouve"</podcast:person>
      <podcast:person role="Host" href="https://mwgroup.io/about/" img="https://img.transistorcdn.com/_dioeUsMeIlo4vZ0dPQkQ-f-tkMHllpfM4P-4SpyW8Q/rs:fill:0:0:1/w:800/h:800/q:60/mb:500000/aHR0cHM6Ly9pbWct/dXBsb2FkLXByb2R1/Y3Rpb24udHJhbnNp/c3Rvci5mbS9jNzA4/MDU5MTk2MDAyMjc5/NmZiZmFkMDY4NGVj/NzRmNS5qcGVn.jpg">Ralph May</podcast:person>
      <podcast:person role="Host" href="https://www.blackhillsinfosec.com/team/corey-ham/" img="https://img.transistorcdn.com/Q9BaWxLnY_zU_A-eKpfV22Y1AiBI64lLxLJP19iD_lM/rs:fill:0:0:1/w:800/h:800/q:60/mb:500000/aHR0cHM6Ly9pbWct/dXBsb2FkLXByb2R1/Y3Rpb24udHJhbnNp/c3Rvci5mbS84MTMx/N2JlN2IzZWI2MDcz/MGU0NTk5NGU0N2Iw/NzE2Yy5qcGc.jpg">Corey Ham</podcast:person>
      <podcast:person role="Producer" href="https://www.blackhillsinfosec.com/team/ryan-poirier/">Ryan Poirier</podcast:person>
      <podcast:transcript url="https://share.transistor.fm/s/de594c45/transcription.vtt" type="text/vtt" rel="captions"/>
      <podcast:transcript url="https://share.transistor.fm/s/de594c45/transcription.srt" type="application/x-subrip" rel="captions"/>
      <podcast:transcript url="https://share.transistor.fm/s/de594c45/transcription.json" type="application/json" rel="captions"/>
      <podcast:transcript url="https://share.transistor.fm/s/de594c45/transcription.txt" type="text/plain"/>
      <podcast:transcript url="https://share.transistor.fm/s/de594c45/transcription" type="text/html"/>
      <podcast:chapters url="https://share.transistor.fm/s/de594c45/chapters.json" type="application/json+chapters"/>
    </item>
    <item>
      <title>BreachForums Doomsday - 2026-01-12</title>
      <itunes:season>6</itunes:season>
      <podcast:season>6</podcast:season>
      <itunes:episode>2</itunes:episode>
      <podcast:episode>2</podcast:episode>
      <itunes:title>BreachForums Doomsday - 2026-01-12</itunes:title>
      <itunes:episodeType>full</itunes:episodeType>
      <guid isPermaLink="false">68f5c25d-625f-4453-81b5-1d25b79829de</guid>
      <link>https://share.transistor.fm/s/959809d6</link>
      <description>
        <![CDATA[<p>Join us LIVE on Mondays, 4:30pm EST.<br>A weekly Podcast with BHIS and Friends. We discuss notable Infosec, and infosec-adjacent news stories gathered by our community news team.<br><a href="https://www.youtube.com/@BlackHillsInformationSecurity">https://www.youtube.com/@BlackHillsInformationSecurity</a></p><p>Chat with us on Discord! - <br><a href="https://discord.gg/bhis">https://discord.gg/bhis</a><br>🔴live-chat</p><p>🔗 Register for FREE webcasts, summits, and workshops - <br><a href="https://poweredbybhis.com/">https://poweredbybhis.com</a></p><p><br>In this episode, we break down the “Doomsday” incident: a major breach forum gets breached, reminding everyone that even cybercriminal communities suffer constant OPSEC failures. We cover what leaked, why these underground markets keep imploding, and how infighting, reused infrastructure, weak authentication, and sloppy identity hygiene turn “elite hackers” into easy targets. Then we connect the dots to law enforcement’s latest crypto actions—how DOJ seizures and mixer investigations work, why blockchain tracing matters, and what criminals try (and fail) to do to hide money flows. Finally, we translate the news into practical defense: validate breach intel, monitor for credential stuffing, enable MFA, use unique passwords, and tighten access logs. Whether you’re a defender, creator, or online, this is the real-world cybercrime story behind the headlines.</p><p><br><strong>Chapters<br><ul><li>(00:00) - PreShow Banter™ — Task Overflow</li>
<li>(02:29) - BreachForums Doomsday - 2026-01-12</li>
<li>(05:09) - Story # 1; Did DOJ Prosecutors Violate Trump’s Executive Order by Selling the Forfeited Samourai Wallet Bitcoin?</li>
<li>(15:42) - Story # 2: Cloudflare defies Italy’s Piracy Shield, won’t block websites on 1.1.1.1 DNS</li>
<li>(23:04) - Story # 3: California bans data broker reselling health data of millions</li>
<li>(28:13) - Story # 4: Apple picks Google’s Gemini to run AI-powered Siri coming this year</li>
<li>(36:00) - Story # 5: Ragebait as a phishing tactic</li>
<li>(38:00) - Story # 6: Doomsday For Cybercriminals — Data Breach Of Major Dark Web Forum</li>
<li>(40:31) - Story # 7: The Great VM Escape: ESXi Exploitation in the Wild</li>
<li>(45:39) - Story # 8: OpenAI says ChatGPT won't use your health information to train its models</li>
<li>(46:23) - Story # 8b: Anthropic brings Claude to healthcare with HIPAA-ready Enterprise tools</li>
<li>(50:15) - Story # 9: Max severity Ni8mare flaw lets hackers hijack n8n servers</li>
<li>(53:05) - Story # 10: Instagram Denies Data Breach, Fixes Unsolicited Password Reset Requests</li>
<li>(56:49) - Reporter remembers saving animals a year after L.A. wildfires</li>
<li>(57:52) - CTF Winners</li>
</ul><br>Links<br></strong>Story # 1;<a href="https://bitcoinmagazine.com/news/did-doj-prosecutors-violate-trumps-executive-order-by-selling-the-forfeited-samourai-wallet-bitcoin"> Did DOJ Prosecutors Violate Trump’s Executive Order by Selling the Forfeited Samourai Wallet Bitcoin?</a><br>Story # 2: <a href="https://arstechnica.com/tech-policy/2026/01/cloudflare-may-pull-servers-out-of-italy-over-order-that-it-block-pirate-sites/">Cloudflare defies Italy’s Piracy Shield, won’t block websites on 1.1.1.1 DNS</a><br>Story # 3: <a href="https://www.bleepingcomputer.com/news/legal/california-bans-data-broker-reselling-health-data-of-millions/">California bans data broker reselling health data of millions</a><br>Story # 4: <a href="https://www.cnbc.com/2026/01/12/apple-google-ai-siri-gemini.html">Apple picks Google’s Gemini to run AI-powered Siri coming this year</a><br>Story # 5: <a href="https://www.linkedin.com/posts/simokohonen_ragebait-as-a-phishing-tactic-a-threat-activity-7415349853754638336-gcCu?rcm=ACoAABIZhqYBjXCQuV7JX7N_3xlpxZY6alHZ77o">Ragebait as a phishing tactic</a><br>Story # 6: <a href="https://www.resecurity.com/blog/article/doomsday-for-cybercriminals-data-breach-of-major-dark-web-foru">Doomsday For Cybercriminals — Data Breach Of Major Dark Web Forum</a><br>Story # 7: <a href="https://www.huntress.com/blog/esxi-vm-escape-exploit">The Great VM Escape: ESXi Exploitation in the Wild</a><br>Story # 8: <a href="https://www.bleepingcomputer.com/news/artificial-intelligence/openai-says-chatgpt-wont-use-your-health-information-to-train-its-models/">OpenAI says ChatGPT won’t use your health information to train its models</a><br>Story # 8b: <a href="https://www.bleepingcomputer.com/news/artificial-intelligence/anthropic-brings-claude-to-healthcare-with-hipaa-ready-enterprise-tools/">Anthropic brings Claude to healthcare with HIPAA-ready Enterprise tools</a><br>Story # 9: <a href="https://www.bleepingcomputer.com/news/security/max-severity-ni8mare-flaw-lets-hackers-hijack-n8n-servers/">Max severity Ni8mare flaw lets hackers hijack n8n servers</a><br>Story # 10: <a href="https://www.pcmag.com/news/instagram-denies-data-breach-fixes-unsolicited-password-reset-requests">Instagram Denies Data Breach, Fixes Unsolicited Password Reset Requests</a><br><a href="https://www.cbsnews.com/video/reporter-remembers-saving-animals-a-year-after-la-wildfires/">Reporter remembers saving animals a year after L.A. wildfires</a></p><p><br>Brought to you by:<br>Black Hills Information Security <br><a href="https://www.blackhillsinfosec.com/">https://www.blackhillsinfosec.com</a></p><p>Antisyphon Training<br><a href="https://www.antisyphontraining.com/">https://www.antisyphontraining.com/</a></p><p>Active Countermeasures<br><a href="https://www.activecountermeasures.com/">https://www.activecountermeasures.com</a></p><p>Wild West Hackin Fest - Join us for our Hybrid Conference and Pre-Conference Training<br><a href="https://wildwesthackinfest.com/">https://wildwesthackinfest.com</a></p>]]>
      </description>
      <content:encoded>
        <![CDATA[<p>Join us LIVE on Mondays, 4:30pm EST.<br>A weekly Podcast with BHIS and Friends. We discuss notable Infosec, and infosec-adjacent news stories gathered by our community news team.<br><a href="https://www.youtube.com/@BlackHillsInformationSecurity">https://www.youtube.com/@BlackHillsInformationSecurity</a></p><p>Chat with us on Discord! - <br><a href="https://discord.gg/bhis">https://discord.gg/bhis</a><br>🔴live-chat</p><p>🔗 Register for FREE webcasts, summits, and workshops - <br><a href="https://poweredbybhis.com/">https://poweredbybhis.com</a></p><p><br>In this episode, we break down the “Doomsday” incident: a major breach forum gets breached, reminding everyone that even cybercriminal communities suffer constant OPSEC failures. We cover what leaked, why these underground markets keep imploding, and how infighting, reused infrastructure, weak authentication, and sloppy identity hygiene turn “elite hackers” into easy targets. Then we connect the dots to law enforcement’s latest crypto actions—how DOJ seizures and mixer investigations work, why blockchain tracing matters, and what criminals try (and fail) to do to hide money flows. Finally, we translate the news into practical defense: validate breach intel, monitor for credential stuffing, enable MFA, use unique passwords, and tighten access logs. Whether you’re a defender, creator, or online, this is the real-world cybercrime story behind the headlines.</p><p><br><strong>Chapters<br><ul><li>(00:00) - PreShow Banter™ — Task Overflow</li>
<li>(02:29) - BreachForums Doomsday - 2026-01-12</li>
<li>(05:09) - Story # 1; Did DOJ Prosecutors Violate Trump’s Executive Order by Selling the Forfeited Samourai Wallet Bitcoin?</li>
<li>(15:42) - Story # 2: Cloudflare defies Italy’s Piracy Shield, won’t block websites on 1.1.1.1 DNS</li>
<li>(23:04) - Story # 3: California bans data broker reselling health data of millions</li>
<li>(28:13) - Story # 4: Apple picks Google’s Gemini to run AI-powered Siri coming this year</li>
<li>(36:00) - Story # 5: Ragebait as a phishing tactic</li>
<li>(38:00) - Story # 6: Doomsday For Cybercriminals — Data Breach Of Major Dark Web Forum</li>
<li>(40:31) - Story # 7: The Great VM Escape: ESXi Exploitation in the Wild</li>
<li>(45:39) - Story # 8: OpenAI says ChatGPT won't use your health information to train its models</li>
<li>(46:23) - Story # 8b: Anthropic brings Claude to healthcare with HIPAA-ready Enterprise tools</li>
<li>(50:15) - Story # 9: Max severity Ni8mare flaw lets hackers hijack n8n servers</li>
<li>(53:05) - Story # 10: Instagram Denies Data Breach, Fixes Unsolicited Password Reset Requests</li>
<li>(56:49) - Reporter remembers saving animals a year after L.A. wildfires</li>
<li>(57:52) - CTF Winners</li>
</ul><br>Links<br></strong>Story # 1;<a href="https://bitcoinmagazine.com/news/did-doj-prosecutors-violate-trumps-executive-order-by-selling-the-forfeited-samourai-wallet-bitcoin"> Did DOJ Prosecutors Violate Trump’s Executive Order by Selling the Forfeited Samourai Wallet Bitcoin?</a><br>Story # 2: <a href="https://arstechnica.com/tech-policy/2026/01/cloudflare-may-pull-servers-out-of-italy-over-order-that-it-block-pirate-sites/">Cloudflare defies Italy’s Piracy Shield, won’t block websites on 1.1.1.1 DNS</a><br>Story # 3: <a href="https://www.bleepingcomputer.com/news/legal/california-bans-data-broker-reselling-health-data-of-millions/">California bans data broker reselling health data of millions</a><br>Story # 4: <a href="https://www.cnbc.com/2026/01/12/apple-google-ai-siri-gemini.html">Apple picks Google’s Gemini to run AI-powered Siri coming this year</a><br>Story # 5: <a href="https://www.linkedin.com/posts/simokohonen_ragebait-as-a-phishing-tactic-a-threat-activity-7415349853754638336-gcCu?rcm=ACoAABIZhqYBjXCQuV7JX7N_3xlpxZY6alHZ77o">Ragebait as a phishing tactic</a><br>Story # 6: <a href="https://www.resecurity.com/blog/article/doomsday-for-cybercriminals-data-breach-of-major-dark-web-foru">Doomsday For Cybercriminals — Data Breach Of Major Dark Web Forum</a><br>Story # 7: <a href="https://www.huntress.com/blog/esxi-vm-escape-exploit">The Great VM Escape: ESXi Exploitation in the Wild</a><br>Story # 8: <a href="https://www.bleepingcomputer.com/news/artificial-intelligence/openai-says-chatgpt-wont-use-your-health-information-to-train-its-models/">OpenAI says ChatGPT won’t use your health information to train its models</a><br>Story # 8b: <a href="https://www.bleepingcomputer.com/news/artificial-intelligence/anthropic-brings-claude-to-healthcare-with-hipaa-ready-enterprise-tools/">Anthropic brings Claude to healthcare with HIPAA-ready Enterprise tools</a><br>Story # 9: <a href="https://www.bleepingcomputer.com/news/security/max-severity-ni8mare-flaw-lets-hackers-hijack-n8n-servers/">Max severity Ni8mare flaw lets hackers hijack n8n servers</a><br>Story # 10: <a href="https://www.pcmag.com/news/instagram-denies-data-breach-fixes-unsolicited-password-reset-requests">Instagram Denies Data Breach, Fixes Unsolicited Password Reset Requests</a><br><a href="https://www.cbsnews.com/video/reporter-remembers-saving-animals-a-year-after-la-wildfires/">Reporter remembers saving animals a year after L.A. wildfires</a></p><p><br>Brought to you by:<br>Black Hills Information Security <br><a href="https://www.blackhillsinfosec.com/">https://www.blackhillsinfosec.com</a></p><p>Antisyphon Training<br><a href="https://www.antisyphontraining.com/">https://www.antisyphontraining.com/</a></p><p>Active Countermeasures<br><a href="https://www.activecountermeasures.com/">https://www.activecountermeasures.com</a></p><p>Wild West Hackin Fest - Join us for our Hybrid Conference and Pre-Conference Training<br><a href="https://wildwesthackinfest.com/">https://wildwesthackinfest.com</a></p>]]>
      </content:encoded>
      <pubDate>Wed, 14 Jan 2026 12:44:09 -0500</pubDate>
      <author>Black Hills Information Security</author>
      <enclosure url="https://media.transistor.fm/959809d6/59cef0d2.mp3" length="61353577" type="audio/mpeg"/>
      <itunes:author>Black Hills Information Security</itunes:author>
      <itunes:image href="https://img.transistorcdn.com/rBIiue6ODjs7g1iwANT5Fr1stx1c4vPBGihrpHQXF0I/rs:fill:0:0:1/w:1400/h:1400/q:60/mb:500000/aHR0cHM6Ly9pbWct/dXBsb2FkLXByb2R1/Y3Rpb24udHJhbnNp/c3Rvci5mbS80MjRk/N2Q0N2M5YjA2Mzk1/Mzk4MDU0MzNjZDlh/Nzc4Zi5qcGc.jpg"/>
      <itunes:duration>3675</itunes:duration>
      <itunes:summary>
        <![CDATA[<p>Join us LIVE on Mondays, 4:30pm EST.<br>A weekly Podcast with BHIS and Friends. We discuss notable Infosec, and infosec-adjacent news stories gathered by our community news team.<br><a href="https://www.youtube.com/@BlackHillsInformationSecurity">https://www.youtube.com/@BlackHillsInformationSecurity</a></p><p>Chat with us on Discord! - <br><a href="https://discord.gg/bhis">https://discord.gg/bhis</a><br>🔴live-chat</p><p>🔗 Register for FREE webcasts, summits, and workshops - <br><a href="https://poweredbybhis.com/">https://poweredbybhis.com</a></p><p><br>In this episode, we break down the “Doomsday” incident: a major breach forum gets breached, reminding everyone that even cybercriminal communities suffer constant OPSEC failures. We cover what leaked, why these underground markets keep imploding, and how infighting, reused infrastructure, weak authentication, and sloppy identity hygiene turn “elite hackers” into easy targets. Then we connect the dots to law enforcement’s latest crypto actions—how DOJ seizures and mixer investigations work, why blockchain tracing matters, and what criminals try (and fail) to do to hide money flows. Finally, we translate the news into practical defense: validate breach intel, monitor for credential stuffing, enable MFA, use unique passwords, and tighten access logs. Whether you’re a defender, creator, or online, this is the real-world cybercrime story behind the headlines.</p><p><br><strong>Chapters<br><ul><li>(00:00) - PreShow Banter™ — Task Overflow</li>
<li>(02:29) - BreachForums Doomsday - 2026-01-12</li>
<li>(05:09) - Story # 1; Did DOJ Prosecutors Violate Trump’s Executive Order by Selling the Forfeited Samourai Wallet Bitcoin?</li>
<li>(15:42) - Story # 2: Cloudflare defies Italy’s Piracy Shield, won’t block websites on 1.1.1.1 DNS</li>
<li>(23:04) - Story # 3: California bans data broker reselling health data of millions</li>
<li>(28:13) - Story # 4: Apple picks Google’s Gemini to run AI-powered Siri coming this year</li>
<li>(36:00) - Story # 5: Ragebait as a phishing tactic</li>
<li>(38:00) - Story # 6: Doomsday For Cybercriminals — Data Breach Of Major Dark Web Forum</li>
<li>(40:31) - Story # 7: The Great VM Escape: ESXi Exploitation in the Wild</li>
<li>(45:39) - Story # 8: OpenAI says ChatGPT won't use your health information to train its models</li>
<li>(46:23) - Story # 8b: Anthropic brings Claude to healthcare with HIPAA-ready Enterprise tools</li>
<li>(50:15) - Story # 9: Max severity Ni8mare flaw lets hackers hijack n8n servers</li>
<li>(53:05) - Story # 10: Instagram Denies Data Breach, Fixes Unsolicited Password Reset Requests</li>
<li>(56:49) - Reporter remembers saving animals a year after L.A. wildfires</li>
<li>(57:52) - CTF Winners</li>
</ul><br>Links<br></strong>Story # 1;<a href="https://bitcoinmagazine.com/news/did-doj-prosecutors-violate-trumps-executive-order-by-selling-the-forfeited-samourai-wallet-bitcoin"> Did DOJ Prosecutors Violate Trump’s Executive Order by Selling the Forfeited Samourai Wallet Bitcoin?</a><br>Story # 2: <a href="https://arstechnica.com/tech-policy/2026/01/cloudflare-may-pull-servers-out-of-italy-over-order-that-it-block-pirate-sites/">Cloudflare defies Italy’s Piracy Shield, won’t block websites on 1.1.1.1 DNS</a><br>Story # 3: <a href="https://www.bleepingcomputer.com/news/legal/california-bans-data-broker-reselling-health-data-of-millions/">California bans data broker reselling health data of millions</a><br>Story # 4: <a href="https://www.cnbc.com/2026/01/12/apple-google-ai-siri-gemini.html">Apple picks Google’s Gemini to run AI-powered Siri coming this year</a><br>Story # 5: <a href="https://www.linkedin.com/posts/simokohonen_ragebait-as-a-phishing-tactic-a-threat-activity-7415349853754638336-gcCu?rcm=ACoAABIZhqYBjXCQuV7JX7N_3xlpxZY6alHZ77o">Ragebait as a phishing tactic</a><br>Story # 6: <a href="https://www.resecurity.com/blog/article/doomsday-for-cybercriminals-data-breach-of-major-dark-web-foru">Doomsday For Cybercriminals — Data Breach Of Major Dark Web Forum</a><br>Story # 7: <a href="https://www.huntress.com/blog/esxi-vm-escape-exploit">The Great VM Escape: ESXi Exploitation in the Wild</a><br>Story # 8: <a href="https://www.bleepingcomputer.com/news/artificial-intelligence/openai-says-chatgpt-wont-use-your-health-information-to-train-its-models/">OpenAI says ChatGPT won’t use your health information to train its models</a><br>Story # 8b: <a href="https://www.bleepingcomputer.com/news/artificial-intelligence/anthropic-brings-claude-to-healthcare-with-hipaa-ready-enterprise-tools/">Anthropic brings Claude to healthcare with HIPAA-ready Enterprise tools</a><br>Story # 9: <a href="https://www.bleepingcomputer.com/news/security/max-severity-ni8mare-flaw-lets-hackers-hijack-n8n-servers/">Max severity Ni8mare flaw lets hackers hijack n8n servers</a><br>Story # 10: <a href="https://www.pcmag.com/news/instagram-denies-data-breach-fixes-unsolicited-password-reset-requests">Instagram Denies Data Breach, Fixes Unsolicited Password Reset Requests</a><br><a href="https://www.cbsnews.com/video/reporter-remembers-saving-animals-a-year-after-la-wildfires/">Reporter remembers saving animals a year after L.A. wildfires</a></p><p><br>Brought to you by:<br>Black Hills Information Security <br><a href="https://www.blackhillsinfosec.com/">https://www.blackhillsinfosec.com</a></p><p>Antisyphon Training<br><a href="https://www.antisyphontraining.com/">https://www.antisyphontraining.com/</a></p><p>Active Countermeasures<br><a href="https://www.activecountermeasures.com/">https://www.activecountermeasures.com</a></p><p>Wild West Hackin Fest - Join us for our Hybrid Conference and Pre-Conference Training<br><a href="https://wildwesthackinfest.com/">https://wildwesthackinfest.com</a></p>]]>
      </itunes:summary>
      <itunes:keywords>Infosec,Cybersecurity,news</itunes:keywords>
      <itunes:explicit>No</itunes:explicit>
      <podcast:person role="Host" href="https://www.bsidessd.org/" img="https://img.transistorcdn.com/KeYB5iZ31d5IGBEuYGSV1SOcM5ZsEQ3dGI4HgjvyVVE/rs:fill:0:0:1/w:800/h:800/q:60/mb:500000/aHR0cHM6Ly9pbWct/dXBsb2FkLXByb2R1/Y3Rpb24udHJhbnNp/c3Rvci5mbS82ZGRm/ZWU5MGU5YzJiZjU0/MTVmZTU0OWExYTg4/OGFhMi5wbmc.jpg">Wade Wells</podcast:person>
      <podcast:person role="Host" href="https://www.blackhillsinfosec.com/team/corey-ham/" img="https://img.transistorcdn.com/Q9BaWxLnY_zU_A-eKpfV22Y1AiBI64lLxLJP19iD_lM/rs:fill:0:0:1/w:800/h:800/q:60/mb:500000/aHR0cHM6Ly9pbWct/dXBsb2FkLXByb2R1/Y3Rpb24udHJhbnNp/c3Rvci5mbS84MTMx/N2JlN2IzZWI2MDcz/MGU0NTk5NGU0N2Iw/NzE2Yy5qcGc.jpg">Corey Ham</podcast:person>
      <podcast:person role="Host" href="https://www.blackhillsinfosec.com/team/bronwen-aker/" img="https://img.transistorcdn.com/CSShIJJhZo9yPTywdOv4zlsSYFk9yVSAIU6CrsdvdY4/rs:fill:0:0:1/w:800/h:800/q:60/mb:500000/aHR0cHM6Ly9pbWct/dXBsb2FkLXByb2R1/Y3Rpb24udHJhbnNp/c3Rvci5mbS80YWIy/MWUxODE4NjA1MmRm/OTBmZmYyYzRlYmU1/N2NhOC5qcGc.jpg">Bronwen Aker</podcast:person>
      <podcast:person role="Guest" href="https://www.blackhillsinfosec.com/team/cameron-cartier/" img="https://img.transistorcdn.com/N-RkB8IsLUB3sSeb58rEyOMt_NPO0Kiz8Psn9lU4lf4/rs:fill:0:0:1/w:800/h:800/q:60/mb:500000/aHR0cHM6Ly9pbWct/dXBsb2FkLXByb2R1/Y3Rpb24udHJhbnNp/c3Rvci5mbS9mYWZj/MjkyOTk1YzRjMmQ3/NTM5NGVhNTVlYzYw/MDFmNS5qcGc.jpg">Cameron Cartier</podcast:person>
      <podcast:person role="Guest" href="https://www.blackhillsinfosec.com/team/david-blandford/" img="https://img.transistorcdn.com/T6Teiq44ACh3is5TcrZu2FuFC--0kSZiIhqVCEVJP3U/rs:fill:0:0:1/w:800/h:800/q:60/mb:500000/aHR0cHM6Ly9pbWct/dXBsb2FkLXByb2R1/Y3Rpb24udHJhbnNp/c3Rvci5mbS8yZTUy/ODI2MmNmNGNjNTU4/ZWNiNWRkOTg0OWVm/ZTU5YS5qcGc.jpg">David Blandford</podcast:person>
      <podcast:person role="Host" href="https://mwgroup.io/about/" img="https://img.transistorcdn.com/_dioeUsMeIlo4vZ0dPQkQ-f-tkMHllpfM4P-4SpyW8Q/rs:fill:0:0:1/w:800/h:800/q:60/mb:500000/aHR0cHM6Ly9pbWct/dXBsb2FkLXByb2R1/Y3Rpb24udHJhbnNp/c3Rvci5mbS9jNzA4/MDU5MTk2MDAyMjc5/NmZiZmFkMDY4NGVj/NzRmNS5qcGVn.jpg">Ralph May</podcast:person>
      <podcast:person role="Guest" href="https://bhisnews.transistor.fm/people/aisling-nic-lynne-siriciryel" img="https://img.transistorcdn.com/Tjn3zKVqAH4r98QV7VybA-7j1NhD5T7gMfcLITgjIvc/rs:fill:0:0:1/w:800/h:800/q:60/mb:500000/aHR0cHM6Ly9pbWct/dXBsb2FkLXByb2R1/Y3Rpb24udHJhbnNp/c3Rvci5mbS84MTYw/NTJiNmMxYjE1Yjgx/M2Y3NTU3MThiYjc5/ZWNhMy5qcGVn.jpg">Aisling nic Lynne "siriciryel"</podcast:person>
      <podcast:transcript url="https://share.transistor.fm/s/959809d6/transcription.vtt" type="text/vtt" rel="captions"/>
      <podcast:transcript url="https://share.transistor.fm/s/959809d6/transcription.srt" type="application/x-subrip" rel="captions"/>
      <podcast:transcript url="https://share.transistor.fm/s/959809d6/transcription.json" type="application/json" rel="captions"/>
      <podcast:transcript url="https://share.transistor.fm/s/959809d6/transcription.txt" type="text/plain"/>
      <podcast:transcript url="https://share.transistor.fm/s/959809d6/transcription" type="text/html"/>
      <podcast:chapters url="https://share.transistor.fm/s/959809d6/chapters.json" type="application/json+chapters"/>
    </item>
    <item>
      <title>US Cyberattacks on Venezuela - 2026-01-05</title>
      <itunes:season>6</itunes:season>
      <podcast:season>6</podcast:season>
      <itunes:episode>1</itunes:episode>
      <podcast:episode>1</podcast:episode>
      <itunes:title>US Cyberattacks on Venezuela - 2026-01-05</itunes:title>
      <itunes:episodeType>full</itunes:episodeType>
      <guid isPermaLink="false">ab1a6611-b111-409c-bfd1-b35f510244f2</guid>
      <link>https://share.transistor.fm/s/fc5be7d4</link>
      <description>
        <![CDATA[<p>Join us LIVE on Mondays, 4:30pm EST.<br>A weekly Podcast with BHIS and Friends. We discuss notable Infosec, and infosec-adjacent news stories gathered by our community news team.<br><a href="https://www.youtube.com/@BlackHillsInformationSecurity">https://www.youtube.com/@BlackHillsInformationSecurity</a></p><p>Chat with us on Discord! - <br><a href="https://discord.gg/bhis">https://discord.gg/bhis</a><br>🔴live-chat</p><p>🔗 Register for FREE webcasts, summits, and workshops - <br><a href="https://poweredbybhis.com/">https://poweredbybhis.com</a></p><p><br>In this episode, we break down the growing debate around U.S. cyber operations against Venezuela—and what it means for modern cyber warfare, critical infrastructure security, and geopolitics. The conversation explores how nation-state attacks can target a country’s power grid, the challenges of attributing cyberattacks, and why industrial control systems (ICS/SCADA) remain a high-impact battleground. We also discuss the strategic value (and risks) of disrupting energy infrastructure, how these campaigns compare to other real-world incidents, and what defenders can learn to better protect utilities and national systems.</p><p><strong>Chapters</strong><br></p><ul><li>(00:00) - PreShow Banter™ — Undisclosed Closets</li>
<li>(09:07) - US Cyberattacks on Venezuela - 2026-01-05</li>
<li>(10:16) - Story # 1:Trump suggests US used cyberattacks to turn off lights in Venezuela during strikes</li>
<li>(11:14) - Story # 1b: There Were BGP Anomalies During The Venezuela Blackout</li>
<li>(21:06) - Story # 1c: Pizza index of war: Late-night traffic near Pentagon surges again as US strikes Venezuela</li>
<li>(32:40) - Story # 2: Finland seizes ship suspected of damaging subsea cable in Baltic Sea</li>
<li>(35:11) - Story # 3: US cybersecurity experts plead guilty to BlackCat ransomware attacks</li>
<li>(35:46) - Story # 4: MongoDB Vulnerability CVE-2025-14847 Under Active Exploitation Worldwide</li>
<li>(39:06) - Story # 5: Hackers claim to hack Resecurity, firm says it was a honeypot</li>
<li>(42:06) - Story # 6: NordVPN denies breach claims, says attackers have "dummy data"</li>
<li>(42:35) - Story # 7: Hackers say they have stolen 40 million Condé Nast Records - here's how to stay safe</li>
<li>(43:43) - Story # 8: Hacker Dressed As Pink Power Ranger Dismantles Racist Websites Live on Stage</li>
<li>(47:13) - Story # 9: NYC mayoral inauguration bans Flipper Zero, Raspberry Pi devices</li>
<li>(52:18) - Story # 10: Manufacturer issues remote kill command to disable smart vacuum after engineer blocks it from collecting data — user revives it with custom hardware and Python scripts to run offline</li>
<li>(55:15) - Story # 11: Ben Jordan Exposes Severe Security Vulnerabilities in Flock Surveillance Cameras</li>
<li>(57:26) - Story # 11b: We Tracked Ourselves with Exposed Flock Cameras</li>
</ul><br><strong>Links</strong><p>Story # 1:<a href="https://www.politico.com/news/2026/01/03/trump-venezuela-cyber-operation-maduro-00709816">Trump suggests US used cyberattacks to turn off lights in Venezuela during strikes</a><br>Story # 1b: <a href="https://loworbitsecurity.com/radar/radar16/">There Were BGP Anomalies During The Venezuela Blackout</a><br>Story # 1c: <a href="https://www.telegraphindia.com/world/pizza-index-of-war-late-night-traffic-near-pentagon-surges-again-as-us-strikes-venezuela/cid/2140898">Pizza index of war: Late-night traffic near Pentagon surges again as US strikes Venezuela</a><br>Story # 2: <a href="https://therecord.media/finland-seizes-ship-suspected-damaging-undersea-cable">Finland seizes ship suspected of damaging subsea cable in Baltic Sea</a><br>Story # 3: <a href="https://www.bleepingcomputer.com/news/security/us-cybersecurity-experts-plead-guilty-to-blackcat-alphv-ransomware-attacks/">US cybersecurity experts plead guilty to BlackCat ransomware attacks</a><br>Story # 4: <a href="https://thehackernews.com/2025/12/mongodb-vulnerability-cve-2025-14847.html">MongoDB Vulnerability CVE-2025-14847 Under Active Exploitation Worldwide</a><br>Story # 5: <a href="https://www.bleepingcomputer.com/news/security/hackers-claim-resecurity-hack-firm-says-it-was-a-honeypot/">Hackers claim to hack Resecurity, firm says it was a honeypot</a><br>Story # 6: <a href="https://www.bleepingcomputer.com/news/security/nordvpn-denies-breach-claims-says-attackers-have-dummy-data/">NordVPN denies breach claims, says attackers have “dummy data”</a><br>Story # 7: <a href="https://www.techradar.com/pro/security/hackers-say-they-have-stolen-40-million-conde-nast-records-heres-how-to-stay-safe">Hackers say they have stolen 40 million Condé Nast Records - here’s how to stay safe</a><br>Story # 8: <a href="https://www.pcmag.com/news/hacker-dressed-as-pink-power-ranger-dismantles-racist-websites-live-on">Hacker Dressed As Pink Power Ranger Dismantles Racist Websites Live on Stage</a><br>Story # 9: <a href="https://www.bleepingcomputer.com/news/security/nyc-mayoral-inauguration-bans-flipper-zero-raspberry-pi-devices/">NYC mayoral inauguration bans Flipper Zero, Raspberry Pi devices</a><br>Story # 10: <a href="https://www.tomshardware.com/tech-industry/big-tech/manufacturer-issues-remote-kill-command-to-nuke-smart-vacuum-after-engineer-blocks-it-from-collecting-data-user-revives-it-with-custom-hardware-and-python-scripts-to-run-offline">Manufacturer issues remote kill command to disable smart vacuum after engineer blocks it from collecting data — user revives it with custom hardware and Python scripts to run offline</a><br>Story # 11: <a href="https://www.privacyguides.org/news/2025/11/17/ben-jordan-exposes-severe-security-vulnerabilities-in-flock-surveillance-cameras/">Ben Jordan Exposes Severe Security Vulnerabilities in Flock Surveillance Cameras</a><br>Story # 11b: <a href="https://www.404media.co/podcast-we-tracked-ourselves-with-exposed-flock-cameras/">We Tracked Ourselves with Exposed Flock Cameras</a><br></p><p>Brought to you by:</p><p>Black Hills Information Security </p><p><a href="https://www.blackhillsinfosec.com">https://www.blackhillsinfosec.com</a></p><p><br></p><p>Antisyphon Training</p><p><a href="https://www.antisyphontraining.com/">https://www.antisyphontraining.com/</a></p><p><br></p><p>Active Countermeasures</p><p><a href="https://www.activecountermeasures.com">https://www.activecountermeasures.com</a></p><p><br></p><p>Wild West Hackin Fest</p><p><a href="https://wildwesthackinfest.com">https://wildwesthackinfest.com</a></p>]]>
      </description>
      <content:encoded>
        <![CDATA[<p>Join us LIVE on Mondays, 4:30pm EST.<br>A weekly Podcast with BHIS and Friends. We discuss notable Infosec, and infosec-adjacent news stories gathered by our community news team.<br><a href="https://www.youtube.com/@BlackHillsInformationSecurity">https://www.youtube.com/@BlackHillsInformationSecurity</a></p><p>Chat with us on Discord! - <br><a href="https://discord.gg/bhis">https://discord.gg/bhis</a><br>🔴live-chat</p><p>🔗 Register for FREE webcasts, summits, and workshops - <br><a href="https://poweredbybhis.com/">https://poweredbybhis.com</a></p><p><br>In this episode, we break down the growing debate around U.S. cyber operations against Venezuela—and what it means for modern cyber warfare, critical infrastructure security, and geopolitics. The conversation explores how nation-state attacks can target a country’s power grid, the challenges of attributing cyberattacks, and why industrial control systems (ICS/SCADA) remain a high-impact battleground. We also discuss the strategic value (and risks) of disrupting energy infrastructure, how these campaigns compare to other real-world incidents, and what defenders can learn to better protect utilities and national systems.</p><p><strong>Chapters</strong><br></p><ul><li>(00:00) - PreShow Banter™ — Undisclosed Closets</li>
<li>(09:07) - US Cyberattacks on Venezuela - 2026-01-05</li>
<li>(10:16) - Story # 1:Trump suggests US used cyberattacks to turn off lights in Venezuela during strikes</li>
<li>(11:14) - Story # 1b: There Were BGP Anomalies During The Venezuela Blackout</li>
<li>(21:06) - Story # 1c: Pizza index of war: Late-night traffic near Pentagon surges again as US strikes Venezuela</li>
<li>(32:40) - Story # 2: Finland seizes ship suspected of damaging subsea cable in Baltic Sea</li>
<li>(35:11) - Story # 3: US cybersecurity experts plead guilty to BlackCat ransomware attacks</li>
<li>(35:46) - Story # 4: MongoDB Vulnerability CVE-2025-14847 Under Active Exploitation Worldwide</li>
<li>(39:06) - Story # 5: Hackers claim to hack Resecurity, firm says it was a honeypot</li>
<li>(42:06) - Story # 6: NordVPN denies breach claims, says attackers have "dummy data"</li>
<li>(42:35) - Story # 7: Hackers say they have stolen 40 million Condé Nast Records - here's how to stay safe</li>
<li>(43:43) - Story # 8: Hacker Dressed As Pink Power Ranger Dismantles Racist Websites Live on Stage</li>
<li>(47:13) - Story # 9: NYC mayoral inauguration bans Flipper Zero, Raspberry Pi devices</li>
<li>(52:18) - Story # 10: Manufacturer issues remote kill command to disable smart vacuum after engineer blocks it from collecting data — user revives it with custom hardware and Python scripts to run offline</li>
<li>(55:15) - Story # 11: Ben Jordan Exposes Severe Security Vulnerabilities in Flock Surveillance Cameras</li>
<li>(57:26) - Story # 11b: We Tracked Ourselves with Exposed Flock Cameras</li>
</ul><br><strong>Links</strong><p>Story # 1:<a href="https://www.politico.com/news/2026/01/03/trump-venezuela-cyber-operation-maduro-00709816">Trump suggests US used cyberattacks to turn off lights in Venezuela during strikes</a><br>Story # 1b: <a href="https://loworbitsecurity.com/radar/radar16/">There Were BGP Anomalies During The Venezuela Blackout</a><br>Story # 1c: <a href="https://www.telegraphindia.com/world/pizza-index-of-war-late-night-traffic-near-pentagon-surges-again-as-us-strikes-venezuela/cid/2140898">Pizza index of war: Late-night traffic near Pentagon surges again as US strikes Venezuela</a><br>Story # 2: <a href="https://therecord.media/finland-seizes-ship-suspected-damaging-undersea-cable">Finland seizes ship suspected of damaging subsea cable in Baltic Sea</a><br>Story # 3: <a href="https://www.bleepingcomputer.com/news/security/us-cybersecurity-experts-plead-guilty-to-blackcat-alphv-ransomware-attacks/">US cybersecurity experts plead guilty to BlackCat ransomware attacks</a><br>Story # 4: <a href="https://thehackernews.com/2025/12/mongodb-vulnerability-cve-2025-14847.html">MongoDB Vulnerability CVE-2025-14847 Under Active Exploitation Worldwide</a><br>Story # 5: <a href="https://www.bleepingcomputer.com/news/security/hackers-claim-resecurity-hack-firm-says-it-was-a-honeypot/">Hackers claim to hack Resecurity, firm says it was a honeypot</a><br>Story # 6: <a href="https://www.bleepingcomputer.com/news/security/nordvpn-denies-breach-claims-says-attackers-have-dummy-data/">NordVPN denies breach claims, says attackers have “dummy data”</a><br>Story # 7: <a href="https://www.techradar.com/pro/security/hackers-say-they-have-stolen-40-million-conde-nast-records-heres-how-to-stay-safe">Hackers say they have stolen 40 million Condé Nast Records - here’s how to stay safe</a><br>Story # 8: <a href="https://www.pcmag.com/news/hacker-dressed-as-pink-power-ranger-dismantles-racist-websites-live-on">Hacker Dressed As Pink Power Ranger Dismantles Racist Websites Live on Stage</a><br>Story # 9: <a href="https://www.bleepingcomputer.com/news/security/nyc-mayoral-inauguration-bans-flipper-zero-raspberry-pi-devices/">NYC mayoral inauguration bans Flipper Zero, Raspberry Pi devices</a><br>Story # 10: <a href="https://www.tomshardware.com/tech-industry/big-tech/manufacturer-issues-remote-kill-command-to-nuke-smart-vacuum-after-engineer-blocks-it-from-collecting-data-user-revives-it-with-custom-hardware-and-python-scripts-to-run-offline">Manufacturer issues remote kill command to disable smart vacuum after engineer blocks it from collecting data — user revives it with custom hardware and Python scripts to run offline</a><br>Story # 11: <a href="https://www.privacyguides.org/news/2025/11/17/ben-jordan-exposes-severe-security-vulnerabilities-in-flock-surveillance-cameras/">Ben Jordan Exposes Severe Security Vulnerabilities in Flock Surveillance Cameras</a><br>Story # 11b: <a href="https://www.404media.co/podcast-we-tracked-ourselves-with-exposed-flock-cameras/">We Tracked Ourselves with Exposed Flock Cameras</a><br></p><p>Brought to you by:</p><p>Black Hills Information Security </p><p><a href="https://www.blackhillsinfosec.com">https://www.blackhillsinfosec.com</a></p><p><br></p><p>Antisyphon Training</p><p><a href="https://www.antisyphontraining.com/">https://www.antisyphontraining.com/</a></p><p><br></p><p>Active Countermeasures</p><p><a href="https://www.activecountermeasures.com">https://www.activecountermeasures.com</a></p><p><br></p><p>Wild West Hackin Fest</p><p><a href="https://wildwesthackinfest.com">https://wildwesthackinfest.com</a></p>]]>
      </content:encoded>
      <pubDate>Thu, 08 Jan 2026 23:02:48 -0500</pubDate>
      <author>Black Hills Information Security</author>
      <enclosure url="https://media.transistor.fm/fc5be7d4/16b58a0e.mp3" length="74338560" type="audio/mpeg"/>
      <itunes:author>Black Hills Information Security</itunes:author>
      <itunes:image href="https://img.transistorcdn.com/NTCTidSyaVOfT0w4RYAd39Cr9yMOdv1BQQEsNTrUC0w/rs:fill:0:0:1/w:1400/h:1400/q:60/mb:500000/aHR0cHM6Ly9pbWct/dXBsb2FkLXByb2R1/Y3Rpb24udHJhbnNp/c3Rvci5mbS81M2Ex/NjM1ZWQzNzg0ZGIy/NmI1YzczNzJkNGE2/OTMzYi5wbmc.jpg"/>
      <itunes:duration>4163</itunes:duration>
      <itunes:summary>
        <![CDATA[<p>Join us LIVE on Mondays, 4:30pm EST.<br>A weekly Podcast with BHIS and Friends. We discuss notable Infosec, and infosec-adjacent news stories gathered by our community news team.<br><a href="https://www.youtube.com/@BlackHillsInformationSecurity">https://www.youtube.com/@BlackHillsInformationSecurity</a></p><p>Chat with us on Discord! - <br><a href="https://discord.gg/bhis">https://discord.gg/bhis</a><br>🔴live-chat</p><p>🔗 Register for FREE webcasts, summits, and workshops - <br><a href="https://poweredbybhis.com/">https://poweredbybhis.com</a></p><p><br>In this episode, we break down the growing debate around U.S. cyber operations against Venezuela—and what it means for modern cyber warfare, critical infrastructure security, and geopolitics. The conversation explores how nation-state attacks can target a country’s power grid, the challenges of attributing cyberattacks, and why industrial control systems (ICS/SCADA) remain a high-impact battleground. We also discuss the strategic value (and risks) of disrupting energy infrastructure, how these campaigns compare to other real-world incidents, and what defenders can learn to better protect utilities and national systems.</p><p><strong>Chapters</strong><br></p><ul><li>(00:00) - PreShow Banter™ — Undisclosed Closets</li>
<li>(09:07) - US Cyberattacks on Venezuela - 2026-01-05</li>
<li>(10:16) - Story # 1:Trump suggests US used cyberattacks to turn off lights in Venezuela during strikes</li>
<li>(11:14) - Story # 1b: There Were BGP Anomalies During The Venezuela Blackout</li>
<li>(21:06) - Story # 1c: Pizza index of war: Late-night traffic near Pentagon surges again as US strikes Venezuela</li>
<li>(32:40) - Story # 2: Finland seizes ship suspected of damaging subsea cable in Baltic Sea</li>
<li>(35:11) - Story # 3: US cybersecurity experts plead guilty to BlackCat ransomware attacks</li>
<li>(35:46) - Story # 4: MongoDB Vulnerability CVE-2025-14847 Under Active Exploitation Worldwide</li>
<li>(39:06) - Story # 5: Hackers claim to hack Resecurity, firm says it was a honeypot</li>
<li>(42:06) - Story # 6: NordVPN denies breach claims, says attackers have "dummy data"</li>
<li>(42:35) - Story # 7: Hackers say they have stolen 40 million Condé Nast Records - here's how to stay safe</li>
<li>(43:43) - Story # 8: Hacker Dressed As Pink Power Ranger Dismantles Racist Websites Live on Stage</li>
<li>(47:13) - Story # 9: NYC mayoral inauguration bans Flipper Zero, Raspberry Pi devices</li>
<li>(52:18) - Story # 10: Manufacturer issues remote kill command to disable smart vacuum after engineer blocks it from collecting data — user revives it with custom hardware and Python scripts to run offline</li>
<li>(55:15) - Story # 11: Ben Jordan Exposes Severe Security Vulnerabilities in Flock Surveillance Cameras</li>
<li>(57:26) - Story # 11b: We Tracked Ourselves with Exposed Flock Cameras</li>
</ul><br><strong>Links</strong><p>Story # 1:<a href="https://www.politico.com/news/2026/01/03/trump-venezuela-cyber-operation-maduro-00709816">Trump suggests US used cyberattacks to turn off lights in Venezuela during strikes</a><br>Story # 1b: <a href="https://loworbitsecurity.com/radar/radar16/">There Were BGP Anomalies During The Venezuela Blackout</a><br>Story # 1c: <a href="https://www.telegraphindia.com/world/pizza-index-of-war-late-night-traffic-near-pentagon-surges-again-as-us-strikes-venezuela/cid/2140898">Pizza index of war: Late-night traffic near Pentagon surges again as US strikes Venezuela</a><br>Story # 2: <a href="https://therecord.media/finland-seizes-ship-suspected-damaging-undersea-cable">Finland seizes ship suspected of damaging subsea cable in Baltic Sea</a><br>Story # 3: <a href="https://www.bleepingcomputer.com/news/security/us-cybersecurity-experts-plead-guilty-to-blackcat-alphv-ransomware-attacks/">US cybersecurity experts plead guilty to BlackCat ransomware attacks</a><br>Story # 4: <a href="https://thehackernews.com/2025/12/mongodb-vulnerability-cve-2025-14847.html">MongoDB Vulnerability CVE-2025-14847 Under Active Exploitation Worldwide</a><br>Story # 5: <a href="https://www.bleepingcomputer.com/news/security/hackers-claim-resecurity-hack-firm-says-it-was-a-honeypot/">Hackers claim to hack Resecurity, firm says it was a honeypot</a><br>Story # 6: <a href="https://www.bleepingcomputer.com/news/security/nordvpn-denies-breach-claims-says-attackers-have-dummy-data/">NordVPN denies breach claims, says attackers have “dummy data”</a><br>Story # 7: <a href="https://www.techradar.com/pro/security/hackers-say-they-have-stolen-40-million-conde-nast-records-heres-how-to-stay-safe">Hackers say they have stolen 40 million Condé Nast Records - here’s how to stay safe</a><br>Story # 8: <a href="https://www.pcmag.com/news/hacker-dressed-as-pink-power-ranger-dismantles-racist-websites-live-on">Hacker Dressed As Pink Power Ranger Dismantles Racist Websites Live on Stage</a><br>Story # 9: <a href="https://www.bleepingcomputer.com/news/security/nyc-mayoral-inauguration-bans-flipper-zero-raspberry-pi-devices/">NYC mayoral inauguration bans Flipper Zero, Raspberry Pi devices</a><br>Story # 10: <a href="https://www.tomshardware.com/tech-industry/big-tech/manufacturer-issues-remote-kill-command-to-nuke-smart-vacuum-after-engineer-blocks-it-from-collecting-data-user-revives-it-with-custom-hardware-and-python-scripts-to-run-offline">Manufacturer issues remote kill command to disable smart vacuum after engineer blocks it from collecting data — user revives it with custom hardware and Python scripts to run offline</a><br>Story # 11: <a href="https://www.privacyguides.org/news/2025/11/17/ben-jordan-exposes-severe-security-vulnerabilities-in-flock-surveillance-cameras/">Ben Jordan Exposes Severe Security Vulnerabilities in Flock Surveillance Cameras</a><br>Story # 11b: <a href="https://www.404media.co/podcast-we-tracked-ourselves-with-exposed-flock-cameras/">We Tracked Ourselves with Exposed Flock Cameras</a><br></p><p>Brought to you by:</p><p>Black Hills Information Security </p><p><a href="https://www.blackhillsinfosec.com">https://www.blackhillsinfosec.com</a></p><p><br></p><p>Antisyphon Training</p><p><a href="https://www.antisyphontraining.com/">https://www.antisyphontraining.com/</a></p><p><br></p><p>Active Countermeasures</p><p><a href="https://www.activecountermeasures.com">https://www.activecountermeasures.com</a></p><p><br></p><p>Wild West Hackin Fest</p><p><a href="https://wildwesthackinfest.com">https://wildwesthackinfest.com</a></p>]]>
      </itunes:summary>
      <itunes:keywords>Infosec,Cybersecurity,news</itunes:keywords>
      <itunes:explicit>No</itunes:explicit>
      <podcast:person role="Host" href="https://www.blackhillsinfosec.com/team/bronwen-aker/" img="https://img.transistorcdn.com/CSShIJJhZo9yPTywdOv4zlsSYFk9yVSAIU6CrsdvdY4/rs:fill:0:0:1/w:800/h:800/q:60/mb:500000/aHR0cHM6Ly9pbWct/dXBsb2FkLXByb2R1/Y3Rpb24udHJhbnNp/c3Rvci5mbS80YWIy/MWUxODE4NjA1MmRm/OTBmZmYyYzRlYmU1/N2NhOC5qcGc.jpg">Bronwen Aker</podcast:person>
      <podcast:person role="Host" href="https://www.blackhillsinfosec.com/team/john-strand/" img="https://img.transistorcdn.com/NUqk_fUpMRKpGIokj-WgaiALdQtlImwADID3aNogGds/rs:fill:0:0:1/w:800/h:800/q:60/mb:500000/aHR0cHM6Ly9pbWct/dXBsb2FkLXByb2R1/Y3Rpb24udHJhbnNp/c3Rvci5mbS84Y2Ji/YmMyMzRlMDM2Nzdi/YmNlYjhlZDQwZmM4/MmJlYy5qcGc.jpg">John Strand</podcast:person>
      <podcast:person role="Host" href="https://www.blackhillsinfosec.com/team/corey-ham/" img="https://img.transistorcdn.com/Q9BaWxLnY_zU_A-eKpfV22Y1AiBI64lLxLJP19iD_lM/rs:fill:0:0:1/w:800/h:800/q:60/mb:500000/aHR0cHM6Ly9pbWct/dXBsb2FkLXByb2R1/Y3Rpb24udHJhbnNp/c3Rvci5mbS84MTMx/N2JlN2IzZWI2MDcz/MGU0NTk5NGU0N2Iw/NzE2Yy5qcGc.jpg">Corey Ham</podcast:person>
      <podcast:person role="Producer" href="https://www.blackhillsinfosec.com/team/ryan-poirier/">Ryan Poirier</podcast:person>
      <podcast:person role="Guest" href="https://www.blackhillsinfosec.com/team/kent-ickler/" img="https://img.transistorcdn.com/Cu_JnuFrPqUNEbl8EFoB3AMvM2wW3WItK0_3lamQ01Y/rs:fill:0:0:1/w:800/h:800/q:60/mb:500000/aHR0cHM6Ly9pbWct/dXBsb2FkLXByb2R1/Y3Rpb24udHJhbnNp/c3Rvci5mbS9iMWM0/N2Q1MGUwMWNkOWJi/MjQ0Nzk2NGY3MTk5/MWNhZC5qcGc.jpg">Kent Ickler</podcast:person>
      <podcast:person role="Guest" href="https://linktr.ee/MaryEllenKennel" img="https://img.transistorcdn.com/VREbNsyiFbDe1soTC9ll_XcoZjGzsUF1W_UiErAbtSI/rs:fill:0:0:1/w:800/h:800/q:60/mb:500000/aHR0cHM6Ly9pbWct/dXBsb2FkLXByb2R1/Y3Rpb24udHJhbnNp/c3Rvci5mbS84NmYy/Y2FhZTkzYjU0Mzk5/MTAyOWQ1N2Y1ZDdj/Y2EzZS5wbmc.jpg">MaryEllen</podcast:person>
      <podcast:person role="Host" href="https://mwgroup.io/about/" img="https://img.transistorcdn.com/_dioeUsMeIlo4vZ0dPQkQ-f-tkMHllpfM4P-4SpyW8Q/rs:fill:0:0:1/w:800/h:800/q:60/mb:500000/aHR0cHM6Ly9pbWct/dXBsb2FkLXByb2R1/Y3Rpb24udHJhbnNp/c3Rvci5mbS9jNzA4/MDU5MTk2MDAyMjc5/NmZiZmFkMDY4NGVj/NzRmNS5qcGVn.jpg">Ralph May</podcast:person>
      <podcast:person role="Host" href="https://www.bsidessd.org/" img="https://img.transistorcdn.com/KeYB5iZ31d5IGBEuYGSV1SOcM5ZsEQ3dGI4HgjvyVVE/rs:fill:0:0:1/w:800/h:800/q:60/mb:500000/aHR0cHM6Ly9pbWct/dXBsb2FkLXByb2R1/Y3Rpb24udHJhbnNp/c3Rvci5mbS82ZGRm/ZWU5MGU5YzJiZjU0/MTVmZTU0OWExYTg4/OGFhMi5wbmc.jpg">Wade Wells</podcast:person>
      <podcast:transcript url="https://share.transistor.fm/s/fc5be7d4/transcription.vtt" type="text/vtt" rel="captions"/>
      <podcast:transcript url="https://share.transistor.fm/s/fc5be7d4/transcription.srt" type="application/x-subrip" rel="captions"/>
      <podcast:transcript url="https://share.transistor.fm/s/fc5be7d4/transcription.json" type="application/json" rel="captions"/>
      <podcast:transcript url="https://share.transistor.fm/s/fc5be7d4/transcription.txt" type="text/plain"/>
      <podcast:transcript url="https://share.transistor.fm/s/fc5be7d4/transcription" type="text/html"/>
      <podcast:chapters url="https://share.transistor.fm/s/fc5be7d4/chapters.json" type="application/json+chapters"/>
    </item>
    <item>
      <title>Hot Take Predictions for Next Year – 2025-12-15</title>
      <itunes:season>1</itunes:season>
      <podcast:season>1</podcast:season>
      <itunes:episode>2</itunes:episode>
      <podcast:episode>2</podcast:episode>
      <itunes:title>Hot Take Predictions for Next Year – 2025-12-15</itunes:title>
      <itunes:episodeType>full</itunes:episodeType>
      <guid isPermaLink="false">2739f8d9-843d-4a68-957b-747696ef9805</guid>
      <link>https://share.transistor.fm/s/1d7c62b4</link>
      <description>
        <![CDATA[<p>Join us LIVE on Mondays, 4:30pm EST.<br>A weekly Podcast with BHIS and Friends. We discuss notable Infosec, and infosec-adjacent news stories gathered by our community news team.<br><a href="https://www.youtube.com/@BlackHillsInformationSecurity">https://www.youtube.com/@BlackHillsInformationSecurity</a></p><p>Chat with us on Discord! - <br><a href="https://discord.gg/bhis">https://discord.gg/bhis</a><br>🔴live-chat</p><p>🔗 Register for FREE webcasts, summits, and workshops - <br><a href="https://poweredbybhis.com">https://poweredbybhis.com</a></p><p><strong>Chapters</strong><br></p><ul><li>(00:00) - PreShow Banter™ —  testing testing</li>
<li>(00:11) - Hot Take Predictions for Next Year – 2025-12-15</li>
<li>(02:10) - Story # 1: Russian kids revolt as Kremlin bans Roblox, other popular apps</li>
<li>(10:21) - Story # 2: Google's killing off its dark web report because users didn't know what to do with it</li>
<li>(20:05) - Story # 3: Coupang data breach traced to ex-employee who retained system access</li>
<li>(31:13) - Story # 4: Roomba maker iRobot bought by Chinese supplier after filing for bankruptcy</li>
<li>(34:18) - Story # 5: February report from researcher found Chinese KVM had an unclearly documented microphone and communicated with China-based servers, but many of the security issues are now addressed [Updated]</li>
<li>(36:48) - Story # 6: When adversaries bring their own virtual machine for persistence</li>
<li>(41:57) - Story # 7: Oh no! Hackers snuck malware inside uber-popular Windows app Notepad++</li>
<li>(44:20) - Hot Take Predictions for 2026</li>
</ul><br><strong>Links</strong><br>Story # 1: <a href="https://therecord.media/russia-bans-roblox-drawing-criticism-from-kids">Russian kids revolt as Kremlin bans Roblox, other popular apps</a><br>Story # 2: <a href="https://www.androidauthority.com/google-dark-web-reports-3625323/">Google’s killing off its dark web report because users didn’t know what to do with it</a><br>Story # 3: <a href="https://www.bleepingcomputer.com/news/security/coupang-data-breach-traced-to-ex-employee-who-retained-system-access/">Coupang data breach traced to ex-employee who retained system access</a><br>Story # 4: <a href="https://www.theguardian.com/business/2025/dec/15/roomba-vacuum-cleaner-firm-irobot-bankruptcy-picea?CMP=oth_b-aplnews_d-1">Roomba maker iRobot bought by Chinese supplier after filing for bankruptcy</a><br>Story # 5: <a href="https://www.tomshardware.com/tech-industry/cyber-security/researcher-finds-undocumented-microphone-and-major-security-flaws-in-sipeed-nanokvm">February report from researcher found Chinese KVM had an unclearly documented microphone and communicated with China-based servers, but many of the security issues are now addressed [Updated]</a><br>Story # 6: <a href="https://redcanary.com/blog/threat-intelligence/email-bombing-virtual-machine/">When adversaries bring their own virtual machine for persistence</a><br>Story # 7: <a href="https://www.pcworld.com/article/3008425/oh-no-hackers-snuck-malware-inside-uber-popular-windows-app-notepad.html">Oh no! Hackers snuck malware inside uber-popular Windows app Notepad++</a><p><br>The team looks ahead to 2026 and shares practical, sometimes blunt predictions about where cybersecurity is heading. They discuss how AI will continue reshaping both offense and defense, with attackers using automation at scale while defenders struggle to operationalize AI beyond marketing hype. </p><p>The conversation highlights growing risk from identity abuse, cloud misconfigurations, and insecure SaaS sprawl, noting that many breaches will still come down to basic failures rather than advanced exploits. They also predict continued burnout in security teams, more consolidation among security vendors, and increasing pressure to prove real ROI from security tools. </p><p>On the positive side, the hosts see improved detection engineering, better security education, and more community-driven knowledge sharing. Overall, the message is clear: fundamentals still matter, hype won’t save you, and organizations that focus on people, process, and visibility will be better positioned for 2026.</p><p><br>Brought to you by:<br>Black Hills Information Security <br><a href="https://www.blackhillsinfosec.com/">https://www.blackhillsinfosec.com</a></p><p>Antisyphon Training<br><a href="https://www.antisyphontraining.com/">https://www.antisyphontraining.com/</a></p><p>Active Countermeasures<br><a href="https://www.activecountermeasures.com/">https://www.activecountermeasures.com</a></p><p>Wild West Hackin Fest<br><a href="https://wildwesthackinfest.com/">https://wildwesthackinfest.com</a></p>]]>
      </description>
      <content:encoded>
        <![CDATA[<p>Join us LIVE on Mondays, 4:30pm EST.<br>A weekly Podcast with BHIS and Friends. We discuss notable Infosec, and infosec-adjacent news stories gathered by our community news team.<br><a href="https://www.youtube.com/@BlackHillsInformationSecurity">https://www.youtube.com/@BlackHillsInformationSecurity</a></p><p>Chat with us on Discord! - <br><a href="https://discord.gg/bhis">https://discord.gg/bhis</a><br>🔴live-chat</p><p>🔗 Register for FREE webcasts, summits, and workshops - <br><a href="https://poweredbybhis.com">https://poweredbybhis.com</a></p><p><strong>Chapters</strong><br></p><ul><li>(00:00) - PreShow Banter™ —  testing testing</li>
<li>(00:11) - Hot Take Predictions for Next Year – 2025-12-15</li>
<li>(02:10) - Story # 1: Russian kids revolt as Kremlin bans Roblox, other popular apps</li>
<li>(10:21) - Story # 2: Google's killing off its dark web report because users didn't know what to do with it</li>
<li>(20:05) - Story # 3: Coupang data breach traced to ex-employee who retained system access</li>
<li>(31:13) - Story # 4: Roomba maker iRobot bought by Chinese supplier after filing for bankruptcy</li>
<li>(34:18) - Story # 5: February report from researcher found Chinese KVM had an unclearly documented microphone and communicated with China-based servers, but many of the security issues are now addressed [Updated]</li>
<li>(36:48) - Story # 6: When adversaries bring their own virtual machine for persistence</li>
<li>(41:57) - Story # 7: Oh no! Hackers snuck malware inside uber-popular Windows app Notepad++</li>
<li>(44:20) - Hot Take Predictions for 2026</li>
</ul><br><strong>Links</strong><br>Story # 1: <a href="https://therecord.media/russia-bans-roblox-drawing-criticism-from-kids">Russian kids revolt as Kremlin bans Roblox, other popular apps</a><br>Story # 2: <a href="https://www.androidauthority.com/google-dark-web-reports-3625323/">Google’s killing off its dark web report because users didn’t know what to do with it</a><br>Story # 3: <a href="https://www.bleepingcomputer.com/news/security/coupang-data-breach-traced-to-ex-employee-who-retained-system-access/">Coupang data breach traced to ex-employee who retained system access</a><br>Story # 4: <a href="https://www.theguardian.com/business/2025/dec/15/roomba-vacuum-cleaner-firm-irobot-bankruptcy-picea?CMP=oth_b-aplnews_d-1">Roomba maker iRobot bought by Chinese supplier after filing for bankruptcy</a><br>Story # 5: <a href="https://www.tomshardware.com/tech-industry/cyber-security/researcher-finds-undocumented-microphone-and-major-security-flaws-in-sipeed-nanokvm">February report from researcher found Chinese KVM had an unclearly documented microphone and communicated with China-based servers, but many of the security issues are now addressed [Updated]</a><br>Story # 6: <a href="https://redcanary.com/blog/threat-intelligence/email-bombing-virtual-machine/">When adversaries bring their own virtual machine for persistence</a><br>Story # 7: <a href="https://www.pcworld.com/article/3008425/oh-no-hackers-snuck-malware-inside-uber-popular-windows-app-notepad.html">Oh no! Hackers snuck malware inside uber-popular Windows app Notepad++</a><p><br>The team looks ahead to 2026 and shares practical, sometimes blunt predictions about where cybersecurity is heading. They discuss how AI will continue reshaping both offense and defense, with attackers using automation at scale while defenders struggle to operationalize AI beyond marketing hype. </p><p>The conversation highlights growing risk from identity abuse, cloud misconfigurations, and insecure SaaS sprawl, noting that many breaches will still come down to basic failures rather than advanced exploits. They also predict continued burnout in security teams, more consolidation among security vendors, and increasing pressure to prove real ROI from security tools. </p><p>On the positive side, the hosts see improved detection engineering, better security education, and more community-driven knowledge sharing. Overall, the message is clear: fundamentals still matter, hype won’t save you, and organizations that focus on people, process, and visibility will be better positioned for 2026.</p><p><br>Brought to you by:<br>Black Hills Information Security <br><a href="https://www.blackhillsinfosec.com/">https://www.blackhillsinfosec.com</a></p><p>Antisyphon Training<br><a href="https://www.antisyphontraining.com/">https://www.antisyphontraining.com/</a></p><p>Active Countermeasures<br><a href="https://www.activecountermeasures.com/">https://www.activecountermeasures.com</a></p><p>Wild West Hackin Fest<br><a href="https://wildwesthackinfest.com/">https://wildwesthackinfest.com</a></p>]]>
      </content:encoded>
      <pubDate>Thu, 18 Dec 2025 17:48:08 -0500</pubDate>
      <author>Black Hills Information Security</author>
      <enclosure url="https://media.transistor.fm/1d7c62b4/75c7ac7d.mp3" length="62090261" type="audio/mpeg"/>
      <itunes:author>Black Hills Information Security</itunes:author>
      <itunes:image href="https://img.transistorcdn.com/nFSaqaSNsmqNaKSyajhaVhJvnGjj9ivAJXKlefCVNGA/rs:fill:0:0:1/w:1400/h:1400/q:60/mb:500000/aHR0cHM6Ly9pbWct/dXBsb2FkLXByb2R1/Y3Rpb24udHJhbnNp/c3Rvci5mbS83ZjM3/OWI5ZGM1NWEzMTYw/ODg1ZDQ2NTg1Mjg2/Njg4OS5qcGc.jpg"/>
      <itunes:duration>3731</itunes:duration>
      <itunes:summary>
        <![CDATA[<p>Join us LIVE on Mondays, 4:30pm EST.<br>A weekly Podcast with BHIS and Friends. We discuss notable Infosec, and infosec-adjacent news stories gathered by our community news team.<br><a href="https://www.youtube.com/@BlackHillsInformationSecurity">https://www.youtube.com/@BlackHillsInformationSecurity</a></p><p>Chat with us on Discord! - <br><a href="https://discord.gg/bhis">https://discord.gg/bhis</a><br>🔴live-chat</p><p>🔗 Register for FREE webcasts, summits, and workshops - <br><a href="https://poweredbybhis.com">https://poweredbybhis.com</a></p><p><strong>Chapters</strong><br></p><ul><li>(00:00) - PreShow Banter™ —  testing testing</li>
<li>(00:11) - Hot Take Predictions for Next Year – 2025-12-15</li>
<li>(02:10) - Story # 1: Russian kids revolt as Kremlin bans Roblox, other popular apps</li>
<li>(10:21) - Story # 2: Google's killing off its dark web report because users didn't know what to do with it</li>
<li>(20:05) - Story # 3: Coupang data breach traced to ex-employee who retained system access</li>
<li>(31:13) - Story # 4: Roomba maker iRobot bought by Chinese supplier after filing for bankruptcy</li>
<li>(34:18) - Story # 5: February report from researcher found Chinese KVM had an unclearly documented microphone and communicated with China-based servers, but many of the security issues are now addressed [Updated]</li>
<li>(36:48) - Story # 6: When adversaries bring their own virtual machine for persistence</li>
<li>(41:57) - Story # 7: Oh no! Hackers snuck malware inside uber-popular Windows app Notepad++</li>
<li>(44:20) - Hot Take Predictions for 2026</li>
</ul><br><strong>Links</strong><br>Story # 1: <a href="https://therecord.media/russia-bans-roblox-drawing-criticism-from-kids">Russian kids revolt as Kremlin bans Roblox, other popular apps</a><br>Story # 2: <a href="https://www.androidauthority.com/google-dark-web-reports-3625323/">Google’s killing off its dark web report because users didn’t know what to do with it</a><br>Story # 3: <a href="https://www.bleepingcomputer.com/news/security/coupang-data-breach-traced-to-ex-employee-who-retained-system-access/">Coupang data breach traced to ex-employee who retained system access</a><br>Story # 4: <a href="https://www.theguardian.com/business/2025/dec/15/roomba-vacuum-cleaner-firm-irobot-bankruptcy-picea?CMP=oth_b-aplnews_d-1">Roomba maker iRobot bought by Chinese supplier after filing for bankruptcy</a><br>Story # 5: <a href="https://www.tomshardware.com/tech-industry/cyber-security/researcher-finds-undocumented-microphone-and-major-security-flaws-in-sipeed-nanokvm">February report from researcher found Chinese KVM had an unclearly documented microphone and communicated with China-based servers, but many of the security issues are now addressed [Updated]</a><br>Story # 6: <a href="https://redcanary.com/blog/threat-intelligence/email-bombing-virtual-machine/">When adversaries bring their own virtual machine for persistence</a><br>Story # 7: <a href="https://www.pcworld.com/article/3008425/oh-no-hackers-snuck-malware-inside-uber-popular-windows-app-notepad.html">Oh no! Hackers snuck malware inside uber-popular Windows app Notepad++</a><p><br>The team looks ahead to 2026 and shares practical, sometimes blunt predictions about where cybersecurity is heading. They discuss how AI will continue reshaping both offense and defense, with attackers using automation at scale while defenders struggle to operationalize AI beyond marketing hype. </p><p>The conversation highlights growing risk from identity abuse, cloud misconfigurations, and insecure SaaS sprawl, noting that many breaches will still come down to basic failures rather than advanced exploits. They also predict continued burnout in security teams, more consolidation among security vendors, and increasing pressure to prove real ROI from security tools. </p><p>On the positive side, the hosts see improved detection engineering, better security education, and more community-driven knowledge sharing. Overall, the message is clear: fundamentals still matter, hype won’t save you, and organizations that focus on people, process, and visibility will be better positioned for 2026.</p><p><br>Brought to you by:<br>Black Hills Information Security <br><a href="https://www.blackhillsinfosec.com/">https://www.blackhillsinfosec.com</a></p><p>Antisyphon Training<br><a href="https://www.antisyphontraining.com/">https://www.antisyphontraining.com/</a></p><p>Active Countermeasures<br><a href="https://www.activecountermeasures.com/">https://www.activecountermeasures.com</a></p><p>Wild West Hackin Fest<br><a href="https://wildwesthackinfest.com/">https://wildwesthackinfest.com</a></p>]]>
      </itunes:summary>
      <itunes:keywords>Infosec,Cybersecurity,news</itunes:keywords>
      <itunes:explicit>No</itunes:explicit>
      <podcast:person role="Host" href="https://www.bsidessd.org/" img="https://img.transistorcdn.com/KeYB5iZ31d5IGBEuYGSV1SOcM5ZsEQ3dGI4HgjvyVVE/rs:fill:0:0:1/w:800/h:800/q:60/mb:500000/aHR0cHM6Ly9pbWct/dXBsb2FkLXByb2R1/Y3Rpb24udHJhbnNp/c3Rvci5mbS82ZGRm/ZWU5MGU5YzJiZjU0/MTVmZTU0OWExYTg4/OGFhMi5wbmc.jpg">Wade Wells</podcast:person>
      <podcast:person role="Host" href="https://www.blackhillsinfosec.com/team/john-strand/" img="https://img.transistorcdn.com/NUqk_fUpMRKpGIokj-WgaiALdQtlImwADID3aNogGds/rs:fill:0:0:1/w:800/h:800/q:60/mb:500000/aHR0cHM6Ly9pbWct/dXBsb2FkLXByb2R1/Y3Rpb24udHJhbnNp/c3Rvci5mbS84Y2Ji/YmMyMzRlMDM2Nzdi/YmNlYjhlZDQwZmM4/MmJlYy5qcGc.jpg">John Strand</podcast:person>
      <podcast:person role="Host" href="https://www.blackhillsinfosec.com/team/corey-ham/" img="https://img.transistorcdn.com/Q9BaWxLnY_zU_A-eKpfV22Y1AiBI64lLxLJP19iD_lM/rs:fill:0:0:1/w:800/h:800/q:60/mb:500000/aHR0cHM6Ly9pbWct/dXBsb2FkLXByb2R1/Y3Rpb24udHJhbnNp/c3Rvci5mbS84MTMx/N2JlN2IzZWI2MDcz/MGU0NTk5NGU0N2Iw/NzE2Yy5qcGc.jpg">Corey Ham</podcast:person>
      <podcast:person role="Guest" href="https://linktr.ee/MaryEllenKennel" img="https://img.transistorcdn.com/VREbNsyiFbDe1soTC9ll_XcoZjGzsUF1W_UiErAbtSI/rs:fill:0:0:1/w:800/h:800/q:60/mb:500000/aHR0cHM6Ly9pbWct/dXBsb2FkLXByb2R1/Y3Rpb24udHJhbnNp/c3Rvci5mbS84NmYy/Y2FhZTkzYjU0Mzk5/MTAyOWQ1N2Y1ZDdj/Y2EzZS5wbmc.jpg">MaryEllen</podcast:person>
      <podcast:person role="Host" href="https://mwgroup.io/about/" img="https://img.transistorcdn.com/_dioeUsMeIlo4vZ0dPQkQ-f-tkMHllpfM4P-4SpyW8Q/rs:fill:0:0:1/w:800/h:800/q:60/mb:500000/aHR0cHM6Ly9pbWct/dXBsb2FkLXByb2R1/Y3Rpb24udHJhbnNp/c3Rvci5mbS9jNzA4/MDU5MTk2MDAyMjc5/NmZiZmFkMDY4NGVj/NzRmNS5qcGVn.jpg">Ralph May</podcast:person>
      <podcast:person role="Guest" href="https://bhisnews.transistor.fm/people/charles-bsdbandit">Charles "bsdbandit"</podcast:person>
      <podcast:person role="Host" href="https://www.blackhillsinfosec.com/team/hayden-covington/" img="https://img.transistorcdn.com/ChX95dlWwFlhp_m8F2j-zi_PMHthvythRWvRoPYbhBo/rs:fill:0:0:1/w:800/h:800/q:60/mb:500000/aHR0cHM6Ly9pbWct/dXBsb2FkLXByb2R1/Y3Rpb24udHJhbnNp/c3Rvci5mbS81MGJl/ZTUxMjFjNmM3MzM2/OWI0M2M0ZjcyNjI3/YTIzMi5qcGc.jpg">Hayden Covington</podcast:person>
      <podcast:person role="Producer" href="https://bhisnews.transistor.fm/people/meagan-bentley">Meagan Bentley</podcast:person>
      <podcast:person role="Guest" href="https://bhisnews.transistor.fm/people/andy-pettit-nerf" img="https://img.transistorcdn.com/Hm7-lytrUVM163vtKy6oq20J186th0VCEBKYtoBJ7X4/rs:fill:0:0:1/w:800/h:800/q:60/mb:500000/aHR0cHM6Ly9pbWct/dXBsb2FkLXByb2R1/Y3Rpb24udHJhbnNp/c3Rvci5mbS85NjNk/NWE4OWY5ODFhY2Yx/ZTJlMTc1MzAxMGVj/Mzg4Mi5wbmc.jpg">Andy Pettit "Nerf"</podcast:person>
      <podcast:person role="Guest" href="https://bhisnews.transistor.fm/people/michael-shecky-kavka" img="https://img.transistorcdn.com/ZUl4DxZiPo9coGYCRTdIC8aRTm9MciE46ie_A4KO0mk/rs:fill:0:0:1/w:800/h:800/q:60/mb:500000/aHR0cHM6Ly9pbWct/dXBsb2FkLXByb2R1/Y3Rpb24udHJhbnNp/c3Rvci5mbS9jMjI1/OTNiOTdiNDlhNjMw/MTBkZjMxYmY1OTJj/YWI3Zi5qcGc.jpg">Michael "Shecky" Kavka</podcast:person>
      <podcast:transcript url="https://share.transistor.fm/s/1d7c62b4/transcription.vtt" type="text/vtt" rel="captions"/>
      <podcast:transcript url="https://share.transistor.fm/s/1d7c62b4/transcription.srt" type="application/x-subrip" rel="captions"/>
      <podcast:transcript url="https://share.transistor.fm/s/1d7c62b4/transcription.json" type="application/json" rel="captions"/>
      <podcast:transcript url="https://share.transistor.fm/s/1d7c62b4/transcription.txt" type="text/plain"/>
      <podcast:transcript url="https://share.transistor.fm/s/1d7c62b4/transcription" type="text/html"/>
      <podcast:chapters url="https://share.transistor.fm/s/1d7c62b4/chapters.json" type="application/json+chapters"/>
    </item>
    <item>
      <title>A Live Stream From inside Lazarus Group – 2025-12-08</title>
      <itunes:season>1</itunes:season>
      <podcast:season>1</podcast:season>
      <itunes:episode>1</itunes:episode>
      <podcast:episode>1</podcast:episode>
      <itunes:title>A Live Stream From inside Lazarus Group – 2025-12-08</itunes:title>
      <itunes:episodeType>full</itunes:episodeType>
      <guid isPermaLink="false">69c51208-64d6-4b9c-b9e8-f4bfd8bc56a8</guid>
      <link>https://share.transistor.fm/s/78390cb6</link>
      <description>
        <![CDATA[<p>🔗 Register for FREE Infosec Webcasts, Anti-casts &amp; Summits – </p><p><a href="https://poweredbybhis.com">https://poweredbybhis.com</a></p><p><br>Join us LIVE on Mondays, 4:30pm EST.<br>A weekly Podcast with BHIS and Friends. We discuss notable Infosec, and infosec-adjacent news stories gathered by our community news team.<br><a href="https://www.youtube.com/@BlackHillsInformationSecurity">https://www.youtube.com/@BlackHillsInformationSecurity</a></p><p>Chat with us on Discord!<br><a href="https://discord.gg/bhis">https://discord.gg/bhis</a><br>🔴live-chat</p><p><strong>A Live Stream From inside Lazarus Group – 2025-12-08</strong><br>This BHIS episode blends cybersecurity humor, hacker culture, and livestream chaos as the team jokes about nation-state threats, leaked webcams, OPSEC mishaps, and technical glitches. With unscripted banter and light industry insights, it’s a fun, energetic listen for fans of ethical hacking, infosec podcasts, and behind-the-scenes security chatter.</p><p><br><strong>Chapters</strong><br>00:00 - PreShow Banter™ — Industry Leaders<br>02:34 - A Live Stream From inside Lazarus Group – 2025-12-08<br>04:24 - Story # 1: <a href="https://www.wiz.io/blog/critical-vulnerability-in-react-cve-2025-55182">React2Shell (CVE-2025-55182): Everything You Need to Know About the Critical React Vulnerability</a><br>08:58 - Story # 2: <a href="https://any.run/cybersecurity-blog/lazarus-group-it-workers-investigation/#chapteriithefarm-17149">A Live Stream from Inside Lazarus Group’s IT Workers Scheme</a><br>20:37 - Story # 3: <a href="https://www.bleepingcomputer.com/news/security/contractors-with-hacking-records-accused-of-wiping-96-govt-databases">Contractors with hacking records accused of wiping 96 govt databases</a><br>26:44 - Story # 4: <a href="https://www.macworld.com/article/2997281/apple-refuses-to-pre-install-government-app-on-iphones-in-india.html">Apple refuses to pre-install government app on iPhones in India</a><br>37:42 - Story # 5: <a href="https://www.reuters.com/business/retail-consumer/russia-imposes-restrictions-apples-facetime-app-agencies-say-2025-12-04">Russia blocks Apple's FaceTime in mounting push against foreign tech platforms</a><br>44:55 - Story # 6: <a href="https://techcrunch.com/2025/12/03/end-to-end-encrypted-smart-toilet-camera-is-not-actually-end-to-end-encrypted/">‘End-to-end encrypted’ smart toilet camera is not actually end-to-end encrypted</a><br>57:53 - Story # 7: <a href="https://www.404media.co/flock-uses-overseas-gig-workers-to-build-its-surveillance-ai/">Flock Uses Overseas Gig Workers to Build its Surveillance AI</a><br></p><p><strong>Brought to you by:</strong></p><p>Black Hills Information Security </p><p><a href="https://www.blackhillsinfosec.com">https://www.blackhillsinfosec.com</a></p><p><br></p><p>Antisyphon Training</p><p><a href="https://www.antisyphontraining.com/">https://www.antisyphontraining.com/</a></p><p><br></p><p>Active Countermeasures</p><p><a href="https://www.activecountermeasures.com">https://www.activecountermeasures.com</a></p><p><br></p><p>Wild West Hackin Fest</p><p><a href="https://wildwesthackinfest.com">https://wildwesthackinfest.com</a></p>
<ul><li>(00:00) - 00:00 - PreShow Banter™ — Industry Leaders</li>
<li>(02:34) - A Live Stream From inside Lazarus Group – 2025-12-08</li>
<li>(04:24) - Story # 1: React2Shell (CVE-2025-55182): Everything You Need to Know About the Critical React Vulnerability</li>
<li>(08:57) - Story # 2: A Live Stream from Inside Lazarus Group’s IT Workers Scheme</li>
<li>(20:37) - Story # 3: Contractors with hacking records accused of wiping 96 govt databases</li>
<li>(26:44) - Story # 4: Apple refuses to pre-install government app on iPhones in India</li>
<li>(37:41) - Story # 5: Russia blocks Apple's FaceTime in mounting push against foreign tech platforms</li>
<li>(44:55) - Story # 6: ‘End-to-end encrypted’ smart toilet camera is not actually end-to-end encrypted</li>
<li>(57:52) - Story # 7: Flock Uses Overseas Gig Workers to Build its Surveillance AI</li>
</ul>]]>
      </description>
      <content:encoded>
        <![CDATA[<p>🔗 Register for FREE Infosec Webcasts, Anti-casts &amp; Summits – </p><p><a href="https://poweredbybhis.com">https://poweredbybhis.com</a></p><p><br>Join us LIVE on Mondays, 4:30pm EST.<br>A weekly Podcast with BHIS and Friends. We discuss notable Infosec, and infosec-adjacent news stories gathered by our community news team.<br><a href="https://www.youtube.com/@BlackHillsInformationSecurity">https://www.youtube.com/@BlackHillsInformationSecurity</a></p><p>Chat with us on Discord!<br><a href="https://discord.gg/bhis">https://discord.gg/bhis</a><br>🔴live-chat</p><p><strong>A Live Stream From inside Lazarus Group – 2025-12-08</strong><br>This BHIS episode blends cybersecurity humor, hacker culture, and livestream chaos as the team jokes about nation-state threats, leaked webcams, OPSEC mishaps, and technical glitches. With unscripted banter and light industry insights, it’s a fun, energetic listen for fans of ethical hacking, infosec podcasts, and behind-the-scenes security chatter.</p><p><br><strong>Chapters</strong><br>00:00 - PreShow Banter™ — Industry Leaders<br>02:34 - A Live Stream From inside Lazarus Group – 2025-12-08<br>04:24 - Story # 1: <a href="https://www.wiz.io/blog/critical-vulnerability-in-react-cve-2025-55182">React2Shell (CVE-2025-55182): Everything You Need to Know About the Critical React Vulnerability</a><br>08:58 - Story # 2: <a href="https://any.run/cybersecurity-blog/lazarus-group-it-workers-investigation/#chapteriithefarm-17149">A Live Stream from Inside Lazarus Group’s IT Workers Scheme</a><br>20:37 - Story # 3: <a href="https://www.bleepingcomputer.com/news/security/contractors-with-hacking-records-accused-of-wiping-96-govt-databases">Contractors with hacking records accused of wiping 96 govt databases</a><br>26:44 - Story # 4: <a href="https://www.macworld.com/article/2997281/apple-refuses-to-pre-install-government-app-on-iphones-in-india.html">Apple refuses to pre-install government app on iPhones in India</a><br>37:42 - Story # 5: <a href="https://www.reuters.com/business/retail-consumer/russia-imposes-restrictions-apples-facetime-app-agencies-say-2025-12-04">Russia blocks Apple's FaceTime in mounting push against foreign tech platforms</a><br>44:55 - Story # 6: <a href="https://techcrunch.com/2025/12/03/end-to-end-encrypted-smart-toilet-camera-is-not-actually-end-to-end-encrypted/">‘End-to-end encrypted’ smart toilet camera is not actually end-to-end encrypted</a><br>57:53 - Story # 7: <a href="https://www.404media.co/flock-uses-overseas-gig-workers-to-build-its-surveillance-ai/">Flock Uses Overseas Gig Workers to Build its Surveillance AI</a><br></p><p><strong>Brought to you by:</strong></p><p>Black Hills Information Security </p><p><a href="https://www.blackhillsinfosec.com">https://www.blackhillsinfosec.com</a></p><p><br></p><p>Antisyphon Training</p><p><a href="https://www.antisyphontraining.com/">https://www.antisyphontraining.com/</a></p><p><br></p><p>Active Countermeasures</p><p><a href="https://www.activecountermeasures.com">https://www.activecountermeasures.com</a></p><p><br></p><p>Wild West Hackin Fest</p><p><a href="https://wildwesthackinfest.com">https://wildwesthackinfest.com</a></p>
<ul><li>(00:00) - 00:00 - PreShow Banter™ — Industry Leaders</li>
<li>(02:34) - A Live Stream From inside Lazarus Group – 2025-12-08</li>
<li>(04:24) - Story # 1: React2Shell (CVE-2025-55182): Everything You Need to Know About the Critical React Vulnerability</li>
<li>(08:57) - Story # 2: A Live Stream from Inside Lazarus Group’s IT Workers Scheme</li>
<li>(20:37) - Story # 3: Contractors with hacking records accused of wiping 96 govt databases</li>
<li>(26:44) - Story # 4: Apple refuses to pre-install government app on iPhones in India</li>
<li>(37:41) - Story # 5: Russia blocks Apple's FaceTime in mounting push against foreign tech platforms</li>
<li>(44:55) - Story # 6: ‘End-to-end encrypted’ smart toilet camera is not actually end-to-end encrypted</li>
<li>(57:52) - Story # 7: Flock Uses Overseas Gig Workers to Build its Surveillance AI</li>
</ul>]]>
      </content:encoded>
      <pubDate>Thu, 11 Dec 2025 18:19:45 -0500</pubDate>
      <author>Black Hills Information Security</author>
      <enclosure url="https://media.transistor.fm/78390cb6/333d307d.mp3" length="63050815" type="audio/mpeg"/>
      <itunes:author>Black Hills Information Security</itunes:author>
      <itunes:image href="https://img.transistorcdn.com/VnvoAtHIBZfxvnu5jhP2JkZD3MebIpw9lCR6JElsxhU/rs:fill:0:0:1/w:1400/h:1400/q:60/mb:500000/aHR0cHM6Ly9pbWct/dXBsb2FkLXByb2R1/Y3Rpb24udHJhbnNp/c3Rvci5mbS81NjMx/ZWE5ODYxNzUwZTI3/ZTI4MDgyNjRhNzg0/MGQ2YS5qcGc.jpg"/>
      <itunes:duration>3810</itunes:duration>
      <itunes:summary>
        <![CDATA[<p>🔗 Register for FREE Infosec Webcasts, Anti-casts &amp; Summits – </p><p><a href="https://poweredbybhis.com">https://poweredbybhis.com</a></p><p><br>Join us LIVE on Mondays, 4:30pm EST.<br>A weekly Podcast with BHIS and Friends. We discuss notable Infosec, and infosec-adjacent news stories gathered by our community news team.<br><a href="https://www.youtube.com/@BlackHillsInformationSecurity">https://www.youtube.com/@BlackHillsInformationSecurity</a></p><p>Chat with us on Discord!<br><a href="https://discord.gg/bhis">https://discord.gg/bhis</a><br>🔴live-chat</p><p><strong>A Live Stream From inside Lazarus Group – 2025-12-08</strong><br>This BHIS episode blends cybersecurity humor, hacker culture, and livestream chaos as the team jokes about nation-state threats, leaked webcams, OPSEC mishaps, and technical glitches. With unscripted banter and light industry insights, it’s a fun, energetic listen for fans of ethical hacking, infosec podcasts, and behind-the-scenes security chatter.</p><p><br><strong>Chapters</strong><br>00:00 - PreShow Banter™ — Industry Leaders<br>02:34 - A Live Stream From inside Lazarus Group – 2025-12-08<br>04:24 - Story # 1: <a href="https://www.wiz.io/blog/critical-vulnerability-in-react-cve-2025-55182">React2Shell (CVE-2025-55182): Everything You Need to Know About the Critical React Vulnerability</a><br>08:58 - Story # 2: <a href="https://any.run/cybersecurity-blog/lazarus-group-it-workers-investigation/#chapteriithefarm-17149">A Live Stream from Inside Lazarus Group’s IT Workers Scheme</a><br>20:37 - Story # 3: <a href="https://www.bleepingcomputer.com/news/security/contractors-with-hacking-records-accused-of-wiping-96-govt-databases">Contractors with hacking records accused of wiping 96 govt databases</a><br>26:44 - Story # 4: <a href="https://www.macworld.com/article/2997281/apple-refuses-to-pre-install-government-app-on-iphones-in-india.html">Apple refuses to pre-install government app on iPhones in India</a><br>37:42 - Story # 5: <a href="https://www.reuters.com/business/retail-consumer/russia-imposes-restrictions-apples-facetime-app-agencies-say-2025-12-04">Russia blocks Apple's FaceTime in mounting push against foreign tech platforms</a><br>44:55 - Story # 6: <a href="https://techcrunch.com/2025/12/03/end-to-end-encrypted-smart-toilet-camera-is-not-actually-end-to-end-encrypted/">‘End-to-end encrypted’ smart toilet camera is not actually end-to-end encrypted</a><br>57:53 - Story # 7: <a href="https://www.404media.co/flock-uses-overseas-gig-workers-to-build-its-surveillance-ai/">Flock Uses Overseas Gig Workers to Build its Surveillance AI</a><br></p><p><strong>Brought to you by:</strong></p><p>Black Hills Information Security </p><p><a href="https://www.blackhillsinfosec.com">https://www.blackhillsinfosec.com</a></p><p><br></p><p>Antisyphon Training</p><p><a href="https://www.antisyphontraining.com/">https://www.antisyphontraining.com/</a></p><p><br></p><p>Active Countermeasures</p><p><a href="https://www.activecountermeasures.com">https://www.activecountermeasures.com</a></p><p><br></p><p>Wild West Hackin Fest</p><p><a href="https://wildwesthackinfest.com">https://wildwesthackinfest.com</a></p>
<ul><li>(00:00) - 00:00 - PreShow Banter™ — Industry Leaders</li>
<li>(02:34) - A Live Stream From inside Lazarus Group – 2025-12-08</li>
<li>(04:24) - Story # 1: React2Shell (CVE-2025-55182): Everything You Need to Know About the Critical React Vulnerability</li>
<li>(08:57) - Story # 2: A Live Stream from Inside Lazarus Group’s IT Workers Scheme</li>
<li>(20:37) - Story # 3: Contractors with hacking records accused of wiping 96 govt databases</li>
<li>(26:44) - Story # 4: Apple refuses to pre-install government app on iPhones in India</li>
<li>(37:41) - Story # 5: Russia blocks Apple's FaceTime in mounting push against foreign tech platforms</li>
<li>(44:55) - Story # 6: ‘End-to-end encrypted’ smart toilet camera is not actually end-to-end encrypted</li>
<li>(57:52) - Story # 7: Flock Uses Overseas Gig Workers to Build its Surveillance AI</li>
</ul>]]>
      </itunes:summary>
      <itunes:keywords>cybersecurity podcast, ethical hacking, hacker culture, infosec humor, penetration testing, threat intelligence discussion, cybersecurity livestream, nation-state hacking, operational security, OPSEC, cybersecurity industry commentary, behind the scenes of cybersecurity, comedic take on hacking, live hacker roundtable, BHIS podcast episode, cybersecurity community talk, hacker news and culture, AI and security commentary, technical glitches and infosec humor, cybersecurity team banter, real-world security challenges, cybersecurity, infosec, hacking, pentesting, OSINT, red team, blue team, security culture, tech humor, livestream, BHIS, podcast episode, hacker talk</itunes:keywords>
      <itunes:explicit>No</itunes:explicit>
      <podcast:person role="Host" href="https://www.blackhillsinfosec.com/team/corey-ham/" img="https://img.transistorcdn.com/Q9BaWxLnY_zU_A-eKpfV22Y1AiBI64lLxLJP19iD_lM/rs:fill:0:0:1/w:800/h:800/q:60/mb:500000/aHR0cHM6Ly9pbWct/dXBsb2FkLXByb2R1/Y3Rpb24udHJhbnNp/c3Rvci5mbS84MTMx/N2JlN2IzZWI2MDcz/MGU0NTk5NGU0N2Iw/NzE2Yy5qcGc.jpg">Corey Ham</podcast:person>
      <podcast:person role="Host" href="https://www.blackhillsinfosec.com/team/bronwen-aker/" img="https://img.transistorcdn.com/CSShIJJhZo9yPTywdOv4zlsSYFk9yVSAIU6CrsdvdY4/rs:fill:0:0:1/w:800/h:800/q:60/mb:500000/aHR0cHM6Ly9pbWct/dXBsb2FkLXByb2R1/Y3Rpb24udHJhbnNp/c3Rvci5mbS80YWIy/MWUxODE4NjA1MmRm/OTBmZmYyYzRlYmU1/N2NhOC5qcGc.jpg">Bronwen Aker</podcast:person>
      <podcast:person role="Host" href="https://mwgroup.io/about/" img="https://img.transistorcdn.com/_dioeUsMeIlo4vZ0dPQkQ-f-tkMHllpfM4P-4SpyW8Q/rs:fill:0:0:1/w:800/h:800/q:60/mb:500000/aHR0cHM6Ly9pbWct/dXBsb2FkLXByb2R1/Y3Rpb24udHJhbnNp/c3Rvci5mbS9jNzA4/MDU5MTk2MDAyMjc5/NmZiZmFkMDY4NGVj/NzRmNS5qcGVn.jpg">Ralph May</podcast:person>
      <podcast:person role="Host" href="https://www.blackhillsinfosec.com/team/john-strand/" img="https://img.transistorcdn.com/NUqk_fUpMRKpGIokj-WgaiALdQtlImwADID3aNogGds/rs:fill:0:0:1/w:800/h:800/q:60/mb:500000/aHR0cHM6Ly9pbWct/dXBsb2FkLXByb2R1/Y3Rpb24udHJhbnNp/c3Rvci5mbS84Y2Ji/YmMyMzRlMDM2Nzdi/YmNlYjhlZDQwZmM4/MmJlYy5qcGc.jpg">John Strand</podcast:person>
      <podcast:person role="Guest" href="https://bhisnews.transistor.fm/people/aisling-nic-lynne-siriciryel" img="https://img.transistorcdn.com/Tjn3zKVqAH4r98QV7VybA-7j1NhD5T7gMfcLITgjIvc/rs:fill:0:0:1/w:800/h:800/q:60/mb:500000/aHR0cHM6Ly9pbWct/dXBsb2FkLXByb2R1/Y3Rpb24udHJhbnNp/c3Rvci5mbS84MTYw/NTJiNmMxYjE1Yjgx/M2Y3NTU3MThiYjc5/ZWNhMy5qcGVn.jpg">Aisling nic Lynne "siriciryel"</podcast:person>
      <podcast:person role="Guest" href="https://bhisnews.transistor.fm/people/andy-pettit-nerf" img="https://img.transistorcdn.com/Hm7-lytrUVM163vtKy6oq20J186th0VCEBKYtoBJ7X4/rs:fill:0:0:1/w:800/h:800/q:60/mb:500000/aHR0cHM6Ly9pbWct/dXBsb2FkLXByb2R1/Y3Rpb24udHJhbnNp/c3Rvci5mbS85NjNk/NWE4OWY5ODFhY2Yx/ZTJlMTc1MzAxMGVj/Mzg4Mi5wbmc.jpg">Andy Pettit "Nerf"</podcast:person>
      <podcast:person role="Host" href="https://www.blackhillsinfosec.com/team/hayden-covington/" img="https://img.transistorcdn.com/ChX95dlWwFlhp_m8F2j-zi_PMHthvythRWvRoPYbhBo/rs:fill:0:0:1/w:800/h:800/q:60/mb:500000/aHR0cHM6Ly9pbWct/dXBsb2FkLXByb2R1/Y3Rpb24udHJhbnNp/c3Rvci5mbS81MGJl/ZTUxMjFjNmM3MzM2/OWI0M2M0ZjcyNjI3/YTIzMi5qcGc.jpg">Hayden Covington</podcast:person>
      <podcast:person role="Producer" href="https://www.blackhillsinfosec.com/team/ryan-poirier/">Ryan Poirier</podcast:person>
      <podcast:person role="Guest" href="https://linktr.ee/MaryEllenKennel" img="https://img.transistorcdn.com/VREbNsyiFbDe1soTC9ll_XcoZjGzsUF1W_UiErAbtSI/rs:fill:0:0:1/w:800/h:800/q:60/mb:500000/aHR0cHM6Ly9pbWct/dXBsb2FkLXByb2R1/Y3Rpb24udHJhbnNp/c3Rvci5mbS84NmYy/Y2FhZTkzYjU0Mzk5/MTAyOWQ1N2Y1ZDdj/Y2EzZS5wbmc.jpg">MaryEllen</podcast:person>
      <podcast:transcript url="https://share.transistor.fm/s/78390cb6/transcription.vtt" type="text/vtt" rel="captions"/>
      <podcast:transcript url="https://share.transistor.fm/s/78390cb6/transcription.srt" type="application/x-subrip" rel="captions"/>
      <podcast:transcript url="https://share.transistor.fm/s/78390cb6/transcription.json" type="application/json" rel="captions"/>
      <podcast:transcript url="https://share.transistor.fm/s/78390cb6/transcription.txt" type="text/plain"/>
      <podcast:transcript url="https://share.transistor.fm/s/78390cb6/transcription" type="text/html"/>
      <podcast:chapters url="https://share.transistor.fm/s/78390cb6/chapters.json" type="application/json+chapters"/>
    </item>
    <item>
      <title>Lawmakers Want to Ban VPNs - 2025-12-01</title>
      <itunes:episode>1</itunes:episode>
      <podcast:episode>1</podcast:episode>
      <itunes:title>Lawmakers Want to Ban VPNs - 2025-12-01</itunes:title>
      <itunes:episodeType>full</itunes:episodeType>
      <guid isPermaLink="false">https://blubrry.com/bhis/150460941/lawmakers-want-to-ban-vpns-2025-12-01/</guid>
      <link>https://share.transistor.fm/s/259575e4</link>
      <description>
        <![CDATA[<p>Register for FREE Infosec Webcasts, Anti-casts &amp; Summits –</p><p><a href="https://poweredbybhis.com">https://poweredbybhis.com</a></p><p><br></p><p><strong>Chapters</strong><br></p><ul><li>(00:00) - PreShow Banter™ — The Problem With Extensions</li>
<li>(03:10) - Lawmakers Want to Ban VPNs – BHIS - Talkin' Bout [infosec] News 2025-12-01</li>
<li>(03:47) - Story # 1: Stop Putting Your Passwords Into Random Websites (Yes, Seriously, You Are The Problem)</li>
<li>(12:05) - Story # 2: Lawmakers Want to Ban VPNs—And They Have No Idea What They're Doing</li>
<li>(21:18) - Story # 3: Critical 7 Zip Vulnerability With Public Exploit Requires Manual Update</li>
<li>(25:48) - Story # 4: 'Slop Evader' Lets You Surf the Web Like It’s 2022</li>
<li>(37:07) - Story # 5: China’s Espionage in Europe is Deepening and More Sophisticated than Acknowledged, Expert Says</li>
<li>(39:10) - Story # 6: Apple Update Warning For All iPhone 17, 16 And 15 Users—Act Now</li>
<li>(42:38) - Story # 7: Meta is earning a fortune on a deluge of fraudulent ads, documents show</li>
<li>(50:22) - Story # 8: Meta had a 17-strike policy for sex trafficking, former safety leader claims</li>
<li>(52:40) - Story # 9: Man behind in-flight Evil Twin WiFi attacks gets 7 years in prison</li>
</ul><br><strong>News Links<br></strong><a href="https://labs.watchtowr.com/stop-putting-your-passwords-into-random-websites-yes-seriously-you-are-the-problem/">Story # 1: Stop Putting Your Passwords Into Random Websites (Yes, Seriously, You Are The Problem)</a><br><a href="https://www.eff.org/deeplinks/2025/11/lawmakers-want-ban-vpns-and-they-have-no-idea-what-theyre-doing">Story # 2: Lawmakers Want to Ban VPNs—And They Have No Idea What They're Doing</a><br><a href="https://hackread.com/7-zip-vulnerability-public-exploit-manual-update/">Story # 3: Critical 7 Zip Vulnerability With Public Exploit Requires Manual Update</a><br><a href="https://www.404media.co/slop-evader-browser-extension-pre-generative-ai-search-filter/">Story # 4: 'Slop Evader' Lets You Surf the Web Like It’s 2022</a><br><a href="https://www.kyivpost.com/post/64814">Story # 5: China’s Espionage in Europe is Deepening and More Sophisticated than Acknowledged, Expert Says</a><br><a href="https://www.forbes.com/sites/zakdoffman/2025/11/30/apple-update-warning-for-all-iphone-17-16-and-15-users-act-now/">Story # 6: Apple Update Warning For All iPhone 17, 16 And 15 Users—Act Now</a><br><a href="https://www.reuters.com/investigations/meta-is-earning-fortune-deluge-fraudulent-ads-documents-show-2025-11-06/">Story # 7: Meta is earning a fortune on a deluge of fraudulent ads, documents show</a><br><a href="https://www.theverge.com/news/827658/meta-17-strike-policy-sex-trafficking-testimony-lawsuit">Story # 8: Meta had a 17-strike policy for sex trafficking, former safety leader claims</a><br><a href="https://www.bleepingcomputer.com/news/security/man-behind-in-flight-evil-twin-wifi-attacks-gets-7-years-in-prison/">Story # 9: Man behind in-flight Evil Twin WiFi attacks gets 7 years in prison</a><p><strong>Brought to you by: </strong><br>Black Hills Information Security <br><a href="https://www.blackhillsinfosec.com/">https://www.blackhillsinfosec.com</a></p><p>Antisyphon Training<br><a href="https://www.antisyphontraining.com/">https://www.antisyphontraining.com/</a></p><p>Active Countermeasures<br><a href="https://www.activecountermeasures.com/">https://www.activecountermeasures.com</a></p><p>Wild West Hackin Fest<br><a href="https://wildwesthackinfest.com/">https://wildwesthackinfest.com</a></p>]]>
      </description>
      <content:encoded>
        <![CDATA[<p>Register for FREE Infosec Webcasts, Anti-casts &amp; Summits –</p><p><a href="https://poweredbybhis.com">https://poweredbybhis.com</a></p><p><br></p><p><strong>Chapters</strong><br></p><ul><li>(00:00) - PreShow Banter™ — The Problem With Extensions</li>
<li>(03:10) - Lawmakers Want to Ban VPNs – BHIS - Talkin' Bout [infosec] News 2025-12-01</li>
<li>(03:47) - Story # 1: Stop Putting Your Passwords Into Random Websites (Yes, Seriously, You Are The Problem)</li>
<li>(12:05) - Story # 2: Lawmakers Want to Ban VPNs—And They Have No Idea What They're Doing</li>
<li>(21:18) - Story # 3: Critical 7 Zip Vulnerability With Public Exploit Requires Manual Update</li>
<li>(25:48) - Story # 4: 'Slop Evader' Lets You Surf the Web Like It’s 2022</li>
<li>(37:07) - Story # 5: China’s Espionage in Europe is Deepening and More Sophisticated than Acknowledged, Expert Says</li>
<li>(39:10) - Story # 6: Apple Update Warning For All iPhone 17, 16 And 15 Users—Act Now</li>
<li>(42:38) - Story # 7: Meta is earning a fortune on a deluge of fraudulent ads, documents show</li>
<li>(50:22) - Story # 8: Meta had a 17-strike policy for sex trafficking, former safety leader claims</li>
<li>(52:40) - Story # 9: Man behind in-flight Evil Twin WiFi attacks gets 7 years in prison</li>
</ul><br><strong>News Links<br></strong><a href="https://labs.watchtowr.com/stop-putting-your-passwords-into-random-websites-yes-seriously-you-are-the-problem/">Story # 1: Stop Putting Your Passwords Into Random Websites (Yes, Seriously, You Are The Problem)</a><br><a href="https://www.eff.org/deeplinks/2025/11/lawmakers-want-ban-vpns-and-they-have-no-idea-what-theyre-doing">Story # 2: Lawmakers Want to Ban VPNs—And They Have No Idea What They're Doing</a><br><a href="https://hackread.com/7-zip-vulnerability-public-exploit-manual-update/">Story # 3: Critical 7 Zip Vulnerability With Public Exploit Requires Manual Update</a><br><a href="https://www.404media.co/slop-evader-browser-extension-pre-generative-ai-search-filter/">Story # 4: 'Slop Evader' Lets You Surf the Web Like It’s 2022</a><br><a href="https://www.kyivpost.com/post/64814">Story # 5: China’s Espionage in Europe is Deepening and More Sophisticated than Acknowledged, Expert Says</a><br><a href="https://www.forbes.com/sites/zakdoffman/2025/11/30/apple-update-warning-for-all-iphone-17-16-and-15-users-act-now/">Story # 6: Apple Update Warning For All iPhone 17, 16 And 15 Users—Act Now</a><br><a href="https://www.reuters.com/investigations/meta-is-earning-fortune-deluge-fraudulent-ads-documents-show-2025-11-06/">Story # 7: Meta is earning a fortune on a deluge of fraudulent ads, documents show</a><br><a href="https://www.theverge.com/news/827658/meta-17-strike-policy-sex-trafficking-testimony-lawsuit">Story # 8: Meta had a 17-strike policy for sex trafficking, former safety leader claims</a><br><a href="https://www.bleepingcomputer.com/news/security/man-behind-in-flight-evil-twin-wifi-attacks-gets-7-years-in-prison/">Story # 9: Man behind in-flight Evil Twin WiFi attacks gets 7 years in prison</a><p><strong>Brought to you by: </strong><br>Black Hills Information Security <br><a href="https://www.blackhillsinfosec.com/">https://www.blackhillsinfosec.com</a></p><p>Antisyphon Training<br><a href="https://www.antisyphontraining.com/">https://www.antisyphontraining.com/</a></p><p>Active Countermeasures<br><a href="https://www.activecountermeasures.com/">https://www.activecountermeasures.com</a></p><p>Wild West Hackin Fest<br><a href="https://wildwesthackinfest.com/">https://wildwesthackinfest.com</a></p>]]>
      </content:encoded>
      <pubDate>Wed, 03 Dec 2025 21:45:26 -0500</pubDate>
      <author>Black Hills Information Security</author>
      <enclosure url="https://media.transistor.fm/259575e4/64870d52.mp3" length="62022711" type="audio/mpeg"/>
      <itunes:author>Black Hills Information Security</itunes:author>
      <itunes:image href="https://img.transistorcdn.com/jCvgupEBkrnU4OEj94fJ9Bf--VUIHhS3qwJCJ737SmU/rs:fill:0:0:1/w:1400/h:1400/q:60/mb:500000/aHR0cHM6Ly9pbWct/dXBsb2FkLXByb2R1/Y3Rpb24udHJhbnNp/c3Rvci5mbS9kOGFi/ZGE2ZDIzZmI5MWE3/MmYwMTQyMzY3NGFj/YTQ2Zi5wbmc.jpg"/>
      <itunes:duration>3767</itunes:duration>
      <itunes:summary>
        <![CDATA[<p>Register for FREE Infosec Webcasts, Anti-casts &amp; Summits –</p><p><a href="https://poweredbybhis.com">https://poweredbybhis.com</a></p><p><br></p><p><strong>Chapters</strong><br></p><ul><li>(00:00) - PreShow Banter™ — The Problem With Extensions</li>
<li>(03:10) - Lawmakers Want to Ban VPNs – BHIS - Talkin' Bout [infosec] News 2025-12-01</li>
<li>(03:47) - Story # 1: Stop Putting Your Passwords Into Random Websites (Yes, Seriously, You Are The Problem)</li>
<li>(12:05) - Story # 2: Lawmakers Want to Ban VPNs—And They Have No Idea What They're Doing</li>
<li>(21:18) - Story # 3: Critical 7 Zip Vulnerability With Public Exploit Requires Manual Update</li>
<li>(25:48) - Story # 4: 'Slop Evader' Lets You Surf the Web Like It’s 2022</li>
<li>(37:07) - Story # 5: China’s Espionage in Europe is Deepening and More Sophisticated than Acknowledged, Expert Says</li>
<li>(39:10) - Story # 6: Apple Update Warning For All iPhone 17, 16 And 15 Users—Act Now</li>
<li>(42:38) - Story # 7: Meta is earning a fortune on a deluge of fraudulent ads, documents show</li>
<li>(50:22) - Story # 8: Meta had a 17-strike policy for sex trafficking, former safety leader claims</li>
<li>(52:40) - Story # 9: Man behind in-flight Evil Twin WiFi attacks gets 7 years in prison</li>
</ul><br><strong>News Links<br></strong><a href="https://labs.watchtowr.com/stop-putting-your-passwords-into-random-websites-yes-seriously-you-are-the-problem/">Story # 1: Stop Putting Your Passwords Into Random Websites (Yes, Seriously, You Are The Problem)</a><br><a href="https://www.eff.org/deeplinks/2025/11/lawmakers-want-ban-vpns-and-they-have-no-idea-what-theyre-doing">Story # 2: Lawmakers Want to Ban VPNs—And They Have No Idea What They're Doing</a><br><a href="https://hackread.com/7-zip-vulnerability-public-exploit-manual-update/">Story # 3: Critical 7 Zip Vulnerability With Public Exploit Requires Manual Update</a><br><a href="https://www.404media.co/slop-evader-browser-extension-pre-generative-ai-search-filter/">Story # 4: 'Slop Evader' Lets You Surf the Web Like It’s 2022</a><br><a href="https://www.kyivpost.com/post/64814">Story # 5: China’s Espionage in Europe is Deepening and More Sophisticated than Acknowledged, Expert Says</a><br><a href="https://www.forbes.com/sites/zakdoffman/2025/11/30/apple-update-warning-for-all-iphone-17-16-and-15-users-act-now/">Story # 6: Apple Update Warning For All iPhone 17, 16 And 15 Users—Act Now</a><br><a href="https://www.reuters.com/investigations/meta-is-earning-fortune-deluge-fraudulent-ads-documents-show-2025-11-06/">Story # 7: Meta is earning a fortune on a deluge of fraudulent ads, documents show</a><br><a href="https://www.theverge.com/news/827658/meta-17-strike-policy-sex-trafficking-testimony-lawsuit">Story # 8: Meta had a 17-strike policy for sex trafficking, former safety leader claims</a><br><a href="https://www.bleepingcomputer.com/news/security/man-behind-in-flight-evil-twin-wifi-attacks-gets-7-years-in-prison/">Story # 9: Man behind in-flight Evil Twin WiFi attacks gets 7 years in prison</a><p><strong>Brought to you by: </strong><br>Black Hills Information Security <br><a href="https://www.blackhillsinfosec.com/">https://www.blackhillsinfosec.com</a></p><p>Antisyphon Training<br><a href="https://www.antisyphontraining.com/">https://www.antisyphontraining.com/</a></p><p>Active Countermeasures<br><a href="https://www.activecountermeasures.com/">https://www.activecountermeasures.com</a></p><p>Wild West Hackin Fest<br><a href="https://wildwesthackinfest.com/">https://wildwesthackinfest.com</a></p>]]>
      </itunes:summary>
      <itunes:keywords>Infosec,Cybersecurity,news</itunes:keywords>
      <itunes:explicit>No</itunes:explicit>
      <podcast:person role="Host" href="https://www.blackhillsinfosec.com/team/corey-ham/" img="https://img.transistorcdn.com/Q9BaWxLnY_zU_A-eKpfV22Y1AiBI64lLxLJP19iD_lM/rs:fill:0:0:1/w:800/h:800/q:60/mb:500000/aHR0cHM6Ly9pbWct/dXBsb2FkLXByb2R1/Y3Rpb24udHJhbnNp/c3Rvci5mbS84MTMx/N2JlN2IzZWI2MDcz/MGU0NTk5NGU0N2Iw/NzE2Yy5qcGc.jpg">Corey Ham</podcast:person>
      <podcast:person role="Host" href="https://www.blackhillsinfosec.com/team/bronwen-aker/" img="https://img.transistorcdn.com/CSShIJJhZo9yPTywdOv4zlsSYFk9yVSAIU6CrsdvdY4/rs:fill:0:0:1/w:800/h:800/q:60/mb:500000/aHR0cHM6Ly9pbWct/dXBsb2FkLXByb2R1/Y3Rpb24udHJhbnNp/c3Rvci5mbS80YWIy/MWUxODE4NjA1MmRm/OTBmZmYyYzRlYmU1/N2NhOC5qcGc.jpg">Bronwen Aker</podcast:person>
      <podcast:person role="Guest" href="https://bhisnews.transistor.fm/people/michael-shecky-kavka" img="https://img.transistorcdn.com/ZUl4DxZiPo9coGYCRTdIC8aRTm9MciE46ie_A4KO0mk/rs:fill:0:0:1/w:800/h:800/q:60/mb:500000/aHR0cHM6Ly9pbWct/dXBsb2FkLXByb2R1/Y3Rpb24udHJhbnNp/c3Rvci5mbS9jMjI1/OTNiOTdiNDlhNjMw/MTBkZjMxYmY1OTJj/YWI3Zi5qcGc.jpg">Michael "Shecky" Kavka</podcast:person>
      <podcast:person role="Guest" href="https://bhisnews.transistor.fm/people/alex-minster-belouve" img="https://img.transistorcdn.com/pkWXYRcPNt2ZnnEfs05Q8vmWG5GDNmNhH10RUMs2Zro/rs:fill:0:0:1/w:800/h:800/q:60/mb:500000/aHR0cHM6Ly9pbWct/dXBsb2FkLXByb2R1/Y3Rpb24udHJhbnNp/c3Rvci5mbS9mYjZj/MDNhM2YyZmZmZmI2/NGU0YWJjYzdlMjkx/ODFkYy5qcGc.jpg">Alex Minster "Belouve"</podcast:person>
      <podcast:person role="Host" href="https://mwgroup.io/about/" img="https://img.transistorcdn.com/_dioeUsMeIlo4vZ0dPQkQ-f-tkMHllpfM4P-4SpyW8Q/rs:fill:0:0:1/w:800/h:800/q:60/mb:500000/aHR0cHM6Ly9pbWct/dXBsb2FkLXByb2R1/Y3Rpb24udHJhbnNp/c3Rvci5mbS9jNzA4/MDU5MTk2MDAyMjc5/NmZiZmFkMDY4NGVj/NzRmNS5qcGVn.jpg">Ralph May</podcast:person>
      <podcast:transcript url="https://share.transistor.fm/s/259575e4/transcription.vtt" type="text/vtt" rel="captions"/>
      <podcast:transcript url="https://share.transistor.fm/s/259575e4/transcription.srt" type="application/x-subrip" rel="captions"/>
      <podcast:transcript url="https://share.transistor.fm/s/259575e4/transcription.json" type="application/json" rel="captions"/>
      <podcast:transcript url="https://share.transistor.fm/s/259575e4/transcription.txt" type="text/plain"/>
      <podcast:transcript url="https://share.transistor.fm/s/259575e4/transcription" type="text/html"/>
      <podcast:chapters url="https://share.transistor.fm/s/259575e4/chapters.json" type="application/json+chapters"/>
    </item>
    <item>
      <title>Shai-Hulud malware leaks secrets on GitHub – 2025-11-24</title>
      <itunes:episode>1</itunes:episode>
      <podcast:episode>1</podcast:episode>
      <itunes:title>Shai-Hulud malware leaks secrets on GitHub – 2025-11-24</itunes:title>
      <itunes:episodeType>full</itunes:episodeType>
      <guid isPermaLink="false">https://blubrry.com/bhis/150237082/shai-hulud-malware-leaks-secrets-on-github-2025-17-24/</guid>
      <link>https://share.transistor.fm/s/d2b9fae1</link>
      <description>
        <![CDATA[<p>Register for FREE Infosec Webcasts, Anti-casts &amp; Summits – <a href="https://poweredbybhis.com">https://poweredbybhis.com</a></p><p><br><strong>Chapters</strong><br></p><ul><li>(00:00) - PreShow Banter™ —  Stressed about lithium batteries</li>
<li>(04:59) - Shai-Hulud malware leaks secrets on GitHub – BHIS - Talkin' Bout [infosec] News 2025-11-24</li>
<li>(05:57) - Story # 1: Shai-Hulud malware infects 500 npm packages, leaks secrets on GitHub</li>
<li>(11:18) - Story # 2: CrowdStrike catches insider feeding information to hackers</li>
<li>(15:50) - Story # 3: Fidelity sues Broadcom over access to key software to avoid outages</li>
<li>(22:17) - Story # 4: NetApp sues former CTO for alleged data breach</li>
<li>(26:48) - Story # 5: CrowdStrike Research: Security Flaws in DeepSeek-Generated Code Linked to Political Triggers</li>
<li>(36:05) - Story # 6: A major Cloudflare outage took down large parts of the internet - X, ChatGPT and more were affected, but all recovered now</li>
<li>(37:11) - Story # 6b: Cloudflare outage on November 18, 2025</li>
<li>(41:43) - Story # 7: Iran-Linked Hackers Mapped Ship AIS Data Days Before Real-World Missile Strike Attempt</li>
<li>(46:34) - Story # 8: This Hacker Conference Installed a Literal Antivirus Monitoring System</li>
<li>(51:10) - Story # 9: Microsoft to integrate Sysmon directly into Windows 11, Server 2025</li>
<li>(56:40) - Story # 10: Crypto and Carcasses: Undercover Sting Recovers $700K in Bitcoin Miners, Foils $75K Frozen Turkey Heist</li>
</ul><br><strong>News Links<br></strong>Story # 1: <a href="https://www.bleepingcomputer.com/news/security/shai-hulud-malware-infects-500-npm-packages-leaks-secrets-on-github/">Shai-Hulud malware infects 500 npm packages, leaks secrets on GitHub</a><strong><br></strong>Story # 2: <a href="https://www.bleepingcomputer.com/news/security/crowdstrike-catches-insider-feeding-information-to-hackers/">CrowdStrike catches insider feeding information to hackers</a><br>Story # 3: <a href="https://finance.yahoo.com/news/heres-much-youd-invested-1000-123002812.html">Fidelity sues Broadcom over access to key software to avoid outages</a><br>Story # 4: <a href="https://www.techzine.eu/news/privacy-compliance/136418/netapp-sues-former-cto-for-alleged-data-breach/">NetApp sues former CTO for alleged data breach</a><br>Story # 5: <a href="https://www.crowdstrike.com/en-us/blog/crowdstrike-researchers-identify-hidden-vulnerabilities-ai-coded-software/">CrowdStrike Research: Security Flaws in DeepSeek-Generated Code Linked to Political Triggers</a><br>Story # 6: <a href="https://www.techradar.com/pro/live/a-cloudflare-outage-is-taking-down-parts-of-the-internet">A major Cloudflare outage took down large parts of the internet - X, ChatGPT and more were affected, but all recovered now</a><br>Story # 6b: <a href="https://blog.cloudflare.com/18-november-2025-outage/">Cloudflare outage on November 18, 2025</a><br>Story # 7: <a href="https://thehackernews.com/2025/11/iran-linked-hackers-mapped-ship-ais.html">Iran-Linked Hackers Mapped Ship AIS Data Days Before Real-World Missile Strike Attempt</a><br>Story # 8: <a href="https://www.wired.com/story/this-hacker-conference-installed-a-literal-anti-virus-monitoring-system/">This Hacker Conference Installed a Literal Antivirus Monitoring System</a><br>Story # 9: <a href="https://www.bleepingcomputer.com/news/microsoft/microsoft-to-integrate-sysmon-directly-into-windows-11-server-2025/">Microsoft to integrate Sysmon directly into Windows 11, Server 2025</a><br>Story # 10: <a href="https://news.bitcoin.com/crypto-and-carcasses-undercover-sting-recovers-700k-in-bitcoin-miners-foils-75k-frozen-turkey-heist/">Crypto and Carcasses: Undercover Sting Recovers $700K in Bitcoin Miners, Foils $75K Frozen Turkey Heist</a><p><strong>Brought to you by:</strong></p><p>Black Hills Information Security </p><p><a href="https://www.blackhillsinfosec.com">https://www.blackhillsinfosec.com</a></p><p>Antisyphon Training<br><a href="https://www.antisyphontraining.com/">https://www.antisyphontraining.com/</a></p>]]>
      </description>
      <content:encoded>
        <![CDATA[<p>Register for FREE Infosec Webcasts, Anti-casts &amp; Summits – <a href="https://poweredbybhis.com">https://poweredbybhis.com</a></p><p><br><strong>Chapters</strong><br></p><ul><li>(00:00) - PreShow Banter™ —  Stressed about lithium batteries</li>
<li>(04:59) - Shai-Hulud malware leaks secrets on GitHub – BHIS - Talkin' Bout [infosec] News 2025-11-24</li>
<li>(05:57) - Story # 1: Shai-Hulud malware infects 500 npm packages, leaks secrets on GitHub</li>
<li>(11:18) - Story # 2: CrowdStrike catches insider feeding information to hackers</li>
<li>(15:50) - Story # 3: Fidelity sues Broadcom over access to key software to avoid outages</li>
<li>(22:17) - Story # 4: NetApp sues former CTO for alleged data breach</li>
<li>(26:48) - Story # 5: CrowdStrike Research: Security Flaws in DeepSeek-Generated Code Linked to Political Triggers</li>
<li>(36:05) - Story # 6: A major Cloudflare outage took down large parts of the internet - X, ChatGPT and more were affected, but all recovered now</li>
<li>(37:11) - Story # 6b: Cloudflare outage on November 18, 2025</li>
<li>(41:43) - Story # 7: Iran-Linked Hackers Mapped Ship AIS Data Days Before Real-World Missile Strike Attempt</li>
<li>(46:34) - Story # 8: This Hacker Conference Installed a Literal Antivirus Monitoring System</li>
<li>(51:10) - Story # 9: Microsoft to integrate Sysmon directly into Windows 11, Server 2025</li>
<li>(56:40) - Story # 10: Crypto and Carcasses: Undercover Sting Recovers $700K in Bitcoin Miners, Foils $75K Frozen Turkey Heist</li>
</ul><br><strong>News Links<br></strong>Story # 1: <a href="https://www.bleepingcomputer.com/news/security/shai-hulud-malware-infects-500-npm-packages-leaks-secrets-on-github/">Shai-Hulud malware infects 500 npm packages, leaks secrets on GitHub</a><strong><br></strong>Story # 2: <a href="https://www.bleepingcomputer.com/news/security/crowdstrike-catches-insider-feeding-information-to-hackers/">CrowdStrike catches insider feeding information to hackers</a><br>Story # 3: <a href="https://finance.yahoo.com/news/heres-much-youd-invested-1000-123002812.html">Fidelity sues Broadcom over access to key software to avoid outages</a><br>Story # 4: <a href="https://www.techzine.eu/news/privacy-compliance/136418/netapp-sues-former-cto-for-alleged-data-breach/">NetApp sues former CTO for alleged data breach</a><br>Story # 5: <a href="https://www.crowdstrike.com/en-us/blog/crowdstrike-researchers-identify-hidden-vulnerabilities-ai-coded-software/">CrowdStrike Research: Security Flaws in DeepSeek-Generated Code Linked to Political Triggers</a><br>Story # 6: <a href="https://www.techradar.com/pro/live/a-cloudflare-outage-is-taking-down-parts-of-the-internet">A major Cloudflare outage took down large parts of the internet - X, ChatGPT and more were affected, but all recovered now</a><br>Story # 6b: <a href="https://blog.cloudflare.com/18-november-2025-outage/">Cloudflare outage on November 18, 2025</a><br>Story # 7: <a href="https://thehackernews.com/2025/11/iran-linked-hackers-mapped-ship-ais.html">Iran-Linked Hackers Mapped Ship AIS Data Days Before Real-World Missile Strike Attempt</a><br>Story # 8: <a href="https://www.wired.com/story/this-hacker-conference-installed-a-literal-anti-virus-monitoring-system/">This Hacker Conference Installed a Literal Antivirus Monitoring System</a><br>Story # 9: <a href="https://www.bleepingcomputer.com/news/microsoft/microsoft-to-integrate-sysmon-directly-into-windows-11-server-2025/">Microsoft to integrate Sysmon directly into Windows 11, Server 2025</a><br>Story # 10: <a href="https://news.bitcoin.com/crypto-and-carcasses-undercover-sting-recovers-700k-in-bitcoin-miners-foils-75k-frozen-turkey-heist/">Crypto and Carcasses: Undercover Sting Recovers $700K in Bitcoin Miners, Foils $75K Frozen Turkey Heist</a><p><strong>Brought to you by:</strong></p><p>Black Hills Information Security </p><p><a href="https://www.blackhillsinfosec.com">https://www.blackhillsinfosec.com</a></p><p>Antisyphon Training<br><a href="https://www.antisyphontraining.com/">https://www.antisyphontraining.com/</a></p>]]>
      </content:encoded>
      <pubDate>Wed, 26 Nov 2025 08:16:18 -0500</pubDate>
      <author>Black Hills Information Security</author>
      <enclosure url="https://media.transistor.fm/d2b9fae1/035bad3a.mp3" length="64523203" type="audio/mpeg"/>
      <itunes:author>Black Hills Information Security</itunes:author>
      <itunes:image href="https://img.transistorcdn.com/d9NPWNDozRLs87BPCKRtmocCn3Ueb6GhduHJpqA5wG4/rs:fill:0:0:1/w:1400/h:1400/q:60/mb:500000/aHR0cHM6Ly9pbWct/dXBsb2FkLXByb2R1/Y3Rpb24udHJhbnNp/c3Rvci5mbS8wZTBi/MWI5Zjg0MjFhNzUw/ZDMzYjc0MTRkNzdm/OWIxZC5wbmc.jpg"/>
      <itunes:duration>3901</itunes:duration>
      <itunes:summary>
        <![CDATA[<p>Register for FREE Infosec Webcasts, Anti-casts &amp; Summits – <a href="https://poweredbybhis.com">https://poweredbybhis.com</a></p><p><br><strong>Chapters</strong><br></p><ul><li>(00:00) - PreShow Banter™ —  Stressed about lithium batteries</li>
<li>(04:59) - Shai-Hulud malware leaks secrets on GitHub – BHIS - Talkin' Bout [infosec] News 2025-11-24</li>
<li>(05:57) - Story # 1: Shai-Hulud malware infects 500 npm packages, leaks secrets on GitHub</li>
<li>(11:18) - Story # 2: CrowdStrike catches insider feeding information to hackers</li>
<li>(15:50) - Story # 3: Fidelity sues Broadcom over access to key software to avoid outages</li>
<li>(22:17) - Story # 4: NetApp sues former CTO for alleged data breach</li>
<li>(26:48) - Story # 5: CrowdStrike Research: Security Flaws in DeepSeek-Generated Code Linked to Political Triggers</li>
<li>(36:05) - Story # 6: A major Cloudflare outage took down large parts of the internet - X, ChatGPT and more were affected, but all recovered now</li>
<li>(37:11) - Story # 6b: Cloudflare outage on November 18, 2025</li>
<li>(41:43) - Story # 7: Iran-Linked Hackers Mapped Ship AIS Data Days Before Real-World Missile Strike Attempt</li>
<li>(46:34) - Story # 8: This Hacker Conference Installed a Literal Antivirus Monitoring System</li>
<li>(51:10) - Story # 9: Microsoft to integrate Sysmon directly into Windows 11, Server 2025</li>
<li>(56:40) - Story # 10: Crypto and Carcasses: Undercover Sting Recovers $700K in Bitcoin Miners, Foils $75K Frozen Turkey Heist</li>
</ul><br><strong>News Links<br></strong>Story # 1: <a href="https://www.bleepingcomputer.com/news/security/shai-hulud-malware-infects-500-npm-packages-leaks-secrets-on-github/">Shai-Hulud malware infects 500 npm packages, leaks secrets on GitHub</a><strong><br></strong>Story # 2: <a href="https://www.bleepingcomputer.com/news/security/crowdstrike-catches-insider-feeding-information-to-hackers/">CrowdStrike catches insider feeding information to hackers</a><br>Story # 3: <a href="https://finance.yahoo.com/news/heres-much-youd-invested-1000-123002812.html">Fidelity sues Broadcom over access to key software to avoid outages</a><br>Story # 4: <a href="https://www.techzine.eu/news/privacy-compliance/136418/netapp-sues-former-cto-for-alleged-data-breach/">NetApp sues former CTO for alleged data breach</a><br>Story # 5: <a href="https://www.crowdstrike.com/en-us/blog/crowdstrike-researchers-identify-hidden-vulnerabilities-ai-coded-software/">CrowdStrike Research: Security Flaws in DeepSeek-Generated Code Linked to Political Triggers</a><br>Story # 6: <a href="https://www.techradar.com/pro/live/a-cloudflare-outage-is-taking-down-parts-of-the-internet">A major Cloudflare outage took down large parts of the internet - X, ChatGPT and more were affected, but all recovered now</a><br>Story # 6b: <a href="https://blog.cloudflare.com/18-november-2025-outage/">Cloudflare outage on November 18, 2025</a><br>Story # 7: <a href="https://thehackernews.com/2025/11/iran-linked-hackers-mapped-ship-ais.html">Iran-Linked Hackers Mapped Ship AIS Data Days Before Real-World Missile Strike Attempt</a><br>Story # 8: <a href="https://www.wired.com/story/this-hacker-conference-installed-a-literal-anti-virus-monitoring-system/">This Hacker Conference Installed a Literal Antivirus Monitoring System</a><br>Story # 9: <a href="https://www.bleepingcomputer.com/news/microsoft/microsoft-to-integrate-sysmon-directly-into-windows-11-server-2025/">Microsoft to integrate Sysmon directly into Windows 11, Server 2025</a><br>Story # 10: <a href="https://news.bitcoin.com/crypto-and-carcasses-undercover-sting-recovers-700k-in-bitcoin-miners-foils-75k-frozen-turkey-heist/">Crypto and Carcasses: Undercover Sting Recovers $700K in Bitcoin Miners, Foils $75K Frozen Turkey Heist</a><p><strong>Brought to you by:</strong></p><p>Black Hills Information Security </p><p><a href="https://www.blackhillsinfosec.com">https://www.blackhillsinfosec.com</a></p><p>Antisyphon Training<br><a href="https://www.antisyphontraining.com/">https://www.antisyphontraining.com/</a></p>]]>
      </itunes:summary>
      <itunes:keywords>Infosec,Cybersecurity,news</itunes:keywords>
      <itunes:explicit>No</itunes:explicit>
      <podcast:person role="Host" href="https://www.blackhillsinfosec.com/team/corey-ham/" img="https://img.transistorcdn.com/Q9BaWxLnY_zU_A-eKpfV22Y1AiBI64lLxLJP19iD_lM/rs:fill:0:0:1/w:800/h:800/q:60/mb:500000/aHR0cHM6Ly9pbWct/dXBsb2FkLXByb2R1/Y3Rpb24udHJhbnNp/c3Rvci5mbS84MTMx/N2JlN2IzZWI2MDcz/MGU0NTk5NGU0N2Iw/NzE2Yy5qcGc.jpg">Corey Ham</podcast:person>
      <podcast:person role="Host" href="https://www.blackhillsinfosec.com/team/bronwen-aker/" img="https://img.transistorcdn.com/CSShIJJhZo9yPTywdOv4zlsSYFk9yVSAIU6CrsdvdY4/rs:fill:0:0:1/w:800/h:800/q:60/mb:500000/aHR0cHM6Ly9pbWct/dXBsb2FkLXByb2R1/Y3Rpb24udHJhbnNp/c3Rvci5mbS80YWIy/MWUxODE4NjA1MmRm/OTBmZmYyYzRlYmU1/N2NhOC5qcGc.jpg">Bronwen Aker</podcast:person>
      <podcast:person role="Host" href="https://www.blackhillsinfosec.com/team/hayden-covington/" img="https://img.transistorcdn.com/ChX95dlWwFlhp_m8F2j-zi_PMHthvythRWvRoPYbhBo/rs:fill:0:0:1/w:800/h:800/q:60/mb:500000/aHR0cHM6Ly9pbWct/dXBsb2FkLXByb2R1/Y3Rpb24udHJhbnNp/c3Rvci5mbS81MGJl/ZTUxMjFjNmM3MzM2/OWI0M2M0ZjcyNjI3/YTIzMi5qcGc.jpg">Hayden Covington</podcast:person>
      <podcast:person role="Guest" href="https://bhisnews.transistor.fm/people/andy-pettit-nerf" img="https://img.transistorcdn.com/Hm7-lytrUVM163vtKy6oq20J186th0VCEBKYtoBJ7X4/rs:fill:0:0:1/w:800/h:800/q:60/mb:500000/aHR0cHM6Ly9pbWct/dXBsb2FkLXByb2R1/Y3Rpb24udHJhbnNp/c3Rvci5mbS85NjNk/NWE4OWY5ODFhY2Yx/ZTJlMTc1MzAxMGVj/Mzg4Mi5wbmc.jpg">Andy Pettit "Nerf"</podcast:person>
      <podcast:person role="Guest" href="https://bhisnews.transistor.fm/people/aisling-nic-lynne-siriciryel" img="https://img.transistorcdn.com/Tjn3zKVqAH4r98QV7VybA-7j1NhD5T7gMfcLITgjIvc/rs:fill:0:0:1/w:800/h:800/q:60/mb:500000/aHR0cHM6Ly9pbWct/dXBsb2FkLXByb2R1/Y3Rpb24udHJhbnNp/c3Rvci5mbS84MTYw/NTJiNmMxYjE1Yjgx/M2Y3NTU3MThiYjc5/ZWNhMy5qcGVn.jpg">Aisling nic Lynne "siriciryel"</podcast:person>
      <podcast:person role="Guest" href="https://linktr.ee/MaryEllenKennel" img="https://img.transistorcdn.com/VREbNsyiFbDe1soTC9ll_XcoZjGzsUF1W_UiErAbtSI/rs:fill:0:0:1/w:800/h:800/q:60/mb:500000/aHR0cHM6Ly9pbWct/dXBsb2FkLXByb2R1/Y3Rpb24udHJhbnNp/c3Rvci5mbS84NmYy/Y2FhZTkzYjU0Mzk5/MTAyOWQ1N2Y1ZDdj/Y2EzZS5wbmc.jpg">MaryEllen</podcast:person>
      <podcast:transcript url="https://share.transistor.fm/s/d2b9fae1/transcription.vtt" type="text/vtt" rel="captions"/>
      <podcast:transcript url="https://share.transistor.fm/s/d2b9fae1/transcription.srt" type="application/x-subrip" rel="captions"/>
      <podcast:transcript url="https://share.transistor.fm/s/d2b9fae1/transcription.json" type="application/json" rel="captions"/>
      <podcast:transcript url="https://share.transistor.fm/s/d2b9fae1/transcription.txt" type="text/plain"/>
      <podcast:transcript url="https://share.transistor.fm/s/d2b9fae1/transcription" type="text/html"/>
      <podcast:chapters url="https://share.transistor.fm/s/d2b9fae1/chapters.json" type="application/json+chapters"/>
    </item>
    <item>
      <title>A.I. Transcription Startup Was Just A Guy Taking Notes-  2025-11-17</title>
      <itunes:episode>1</itunes:episode>
      <podcast:episode>1</podcast:episode>
      <itunes:title>A.I. Transcription Startup Was Just A Guy Taking Notes-  2025-11-17</itunes:title>
      <itunes:episodeType>full</itunes:episodeType>
      <guid isPermaLink="false">https://blubrry.com/bhis/150077328/ai-transcription-startup-was-just-a-guy-taking-notes-talkin-bout-infosec-news-2025-11-17/</guid>
      <link>https://share.transistor.fm/s/aa49f008</link>
      <description>
        <![CDATA[<p>Register for FREE Infosec Webcasts, Anti-casts &amp; Summits – </p><p>https://poweredbybhis.com</p><p><br></p><p>00:00:00 - PreShow Banter™ — The Way the Community Rumbles</p><p>00:08:21 - A.I. Transcription Startup Was Just A Guy Taking Notes - BHIS - Talkin’ Bout [infosec] News 2025-11-17</p><p>00:09:01 - Story # 1: New data shows companies are rehiring former employees as AI falls short of expectations</p><p>00:18:06 - Eric &amp; Whitney’s “Podcast” [webcast] on training your own LLM</p><p>00:22:12 - Story # 2: Founder Admits His “AI Transcription” Startup Was Just Him Joining People’s Meetings and Taking Notes by Hand</p><p>00:26:20 - Story # 3: Five Plead Guilty in U.S. for Helping North Korean IT Workers Infiltrate 136 Companies</p><p>00:37:35 - Story # 4: Google is easing up on Android’s new sideloading restrictions!</p><p>00:43:44 - Story # 5: Google is collecting troves of data from downgraded Nest thermostats</p><p>00:44:58 - Story # 5b: Hackers are saving Google’s abandoned Nest thermostats with open-source firmware</p><p>00:51:34 - Story # 6: FFmpeg to Google: Fund Us or Stop Sending Bugs</p><p>01:00:40 - Story # 7: Teens are Hacking School Systems. Let’s Teach Them to Protect Communities Instead</p><p>01:05:55 - Story # 8: Disrupting the first reported AI-orchestrated cyber espionage campaign</p><p>01:14:58 - Discord CTF Winners</p>
<ul><li>(00:00) - PreShow Banter™ — The Way the Community Rumbles</li>
<li>(08:21) - A.I. Transcription Starup Was Just A Guy Taking Notes - BHIS - Talkin' Bout [infosec] News 2025-11-17</li>
<li>(09:01) - Story # 1: New data shows companies are rehiring former employees as AI falls short of expectations</li>
<li>(18:05) - Eric &amp; Whitney's "Podcast" [webcast] on training your own LLM</li>
<li>(22:12) - Story # 2: Founder Admits His “AI Transcription” Startup Was Just Him Joining People’s Meetings and Taking Notes by Hand</li>
<li>(26:20) - Story # 3: Five Plead Guilty in U.S. for Helping North Korean IT Workers Infiltrate 136 Companies</li>
<li>(37:34) - Story # 4: Google is easing up on Android's new sideloading restrictions!</li>
<li>(43:43) - Story # 5: Google is collecting troves of data from downgraded Nest thermostats</li>
<li>(44:58) - Story # 5b: Hackers are saving Google's abandoned Nest thermostats with open-source firmware</li>
<li>(51:33) - Story # 6: FFmpeg to Google: Fund Us or Stop Sending Bugs</li>
<li>(01:00:39) - Story # 7: Teens are Hacking School Systems. Let’s Teach Them to Protect Communities Instead</li>
<li>(01:05:55) - Story # 8: Disrupting the first reported AI-orchestrated cyber espionage campaign</li>
<li>(01:14:58) - Discord CTF Winners</li>
</ul>]]>
      </description>
      <content:encoded>
        <![CDATA[<p>Register for FREE Infosec Webcasts, Anti-casts &amp; Summits – </p><p>https://poweredbybhis.com</p><p><br></p><p>00:00:00 - PreShow Banter™ — The Way the Community Rumbles</p><p>00:08:21 - A.I. Transcription Startup Was Just A Guy Taking Notes - BHIS - Talkin’ Bout [infosec] News 2025-11-17</p><p>00:09:01 - Story # 1: New data shows companies are rehiring former employees as AI falls short of expectations</p><p>00:18:06 - Eric &amp; Whitney’s “Podcast” [webcast] on training your own LLM</p><p>00:22:12 - Story # 2: Founder Admits His “AI Transcription” Startup Was Just Him Joining People’s Meetings and Taking Notes by Hand</p><p>00:26:20 - Story # 3: Five Plead Guilty in U.S. for Helping North Korean IT Workers Infiltrate 136 Companies</p><p>00:37:35 - Story # 4: Google is easing up on Android’s new sideloading restrictions!</p><p>00:43:44 - Story # 5: Google is collecting troves of data from downgraded Nest thermostats</p><p>00:44:58 - Story # 5b: Hackers are saving Google’s abandoned Nest thermostats with open-source firmware</p><p>00:51:34 - Story # 6: FFmpeg to Google: Fund Us or Stop Sending Bugs</p><p>01:00:40 - Story # 7: Teens are Hacking School Systems. Let’s Teach Them to Protect Communities Instead</p><p>01:05:55 - Story # 8: Disrupting the first reported AI-orchestrated cyber espionage campaign</p><p>01:14:58 - Discord CTF Winners</p>
<ul><li>(00:00) - PreShow Banter™ — The Way the Community Rumbles</li>
<li>(08:21) - A.I. Transcription Starup Was Just A Guy Taking Notes - BHIS - Talkin' Bout [infosec] News 2025-11-17</li>
<li>(09:01) - Story # 1: New data shows companies are rehiring former employees as AI falls short of expectations</li>
<li>(18:05) - Eric &amp; Whitney's "Podcast" [webcast] on training your own LLM</li>
<li>(22:12) - Story # 2: Founder Admits His “AI Transcription” Startup Was Just Him Joining People’s Meetings and Taking Notes by Hand</li>
<li>(26:20) - Story # 3: Five Plead Guilty in U.S. for Helping North Korean IT Workers Infiltrate 136 Companies</li>
<li>(37:34) - Story # 4: Google is easing up on Android's new sideloading restrictions!</li>
<li>(43:43) - Story # 5: Google is collecting troves of data from downgraded Nest thermostats</li>
<li>(44:58) - Story # 5b: Hackers are saving Google's abandoned Nest thermostats with open-source firmware</li>
<li>(51:33) - Story # 6: FFmpeg to Google: Fund Us or Stop Sending Bugs</li>
<li>(01:00:39) - Story # 7: Teens are Hacking School Systems. Let’s Teach Them to Protect Communities Instead</li>
<li>(01:05:55) - Story # 8: Disrupting the first reported AI-orchestrated cyber espionage campaign</li>
<li>(01:14:58) - Discord CTF Winners</li>
</ul>]]>
      </content:encoded>
      <pubDate>Thu, 20 Nov 2025 20:48:00 -0500</pubDate>
      <author>Black Hills Information Security</author>
      <enclosure url="https://media.transistor.fm/aa49f008/766dc680.mp3" length="75578468" type="audio/mpeg"/>
      <itunes:author>Black Hills Information Security</itunes:author>
      <itunes:image href="https://img.transistorcdn.com/2kGtSkZX0zordzSDUm_n5z_y7aun_6gc4ycmrwjAc_A/rs:fill:0:0:1/w:1400/h:1400/q:60/mb:500000/aHR0cHM6Ly9pbWct/dXBsb2FkLXByb2R1/Y3Rpb24udHJhbnNp/c3Rvci5mbS80NGIx/MjJiMTg0ZjE3NDc2/ZDI2MWI3ZjVkNWRk/NTY4ZC5qcGc.jpg"/>
      <itunes:duration>4593</itunes:duration>
      <itunes:summary>Register for FREE Infosec Webcasts, Anti-casts &amp;amp; Summits – https://poweredbybhis.com00:00:00 - PreShow Banter™ — The Way the Community Rumbles00:08:21 - A.I. Transcription Startup Was Just A Guy Taking Notes - BHIS - Talkin’ Bout [infosec] News 2025-11-1700:09:01 - Story # 1: New data shows companies are rehiring former employees as AI falls short of expectations00:18:06 - Eric &amp;amp; Whitney’s “Podcast” [webcast] on training your own LLM00:22:12 - Story # 2: Founder Admits His “AI Transcription” Startup Was Just Him Joining People’s Meetings and Taking Notes by Hand00:26:20 - Story # 3: Five Plead Guilty in U.S. for Helping North Korean IT Workers Infiltrate 136 Companies00:37:35 - Story # 4: Google is easing up on Android’s new sideloading restrictions!00:43:44 - Story # 5: Google is collecting troves of data from downgraded Nest thermostats00:44:58 - Story # 5b: Hackers are saving Google’s abandoned Nest thermostats with open-source firmware00:51:34 - Story # 6: FFmpeg to Google: Fund Us or Stop Sending Bugs01:00:40 - Story # 7: Teens are Hacking School Systems. Let’s Teach Them to Protect Communities Instead01:05:55 - Story # 8: Disrupting the first reported AI-orchestrated cyber espionage campaign01:14:58 - Discord CTF Winners</itunes:summary>
      <itunes:subtitle>Register for FREE Infosec Webcasts, Anti-casts &amp;amp; Summits – https://poweredbybhis.com00:00:00 - PreShow Banter™ — The Way the Community Rumbles00:08:21 - A.I. Transcription Startup Was Just A Guy Taking Notes - BHIS - Talkin’ Bout [infosec] News 2025-1</itunes:subtitle>
      <itunes:keywords>Infosec,Cybersecurity,news</itunes:keywords>
      <itunes:explicit>No</itunes:explicit>
      <podcast:person role="Host" href="https://www.blackhillsinfosec.com/team/corey-ham/" img="https://img.transistorcdn.com/Q9BaWxLnY_zU_A-eKpfV22Y1AiBI64lLxLJP19iD_lM/rs:fill:0:0:1/w:800/h:800/q:60/mb:500000/aHR0cHM6Ly9pbWct/dXBsb2FkLXByb2R1/Y3Rpb24udHJhbnNp/c3Rvci5mbS84MTMx/N2JlN2IzZWI2MDcz/MGU0NTk5NGU0N2Iw/NzE2Yy5qcGc.jpg">Corey Ham</podcast:person>
      <podcast:person role="Guest" href="https://bhisnews.transistor.fm/people/michael-shecky-kavka" img="https://img.transistorcdn.com/ZUl4DxZiPo9coGYCRTdIC8aRTm9MciE46ie_A4KO0mk/rs:fill:0:0:1/w:800/h:800/q:60/mb:500000/aHR0cHM6Ly9pbWct/dXBsb2FkLXByb2R1/Y3Rpb24udHJhbnNp/c3Rvci5mbS9jMjI1/OTNiOTdiNDlhNjMw/MTBkZjMxYmY1OTJj/YWI3Zi5qcGc.jpg">Michael "Shecky" Kavka</podcast:person>
      <podcast:person role="Host" href="https://www.blackhillsinfosec.com/team/bronwen-aker/" img="https://img.transistorcdn.com/CSShIJJhZo9yPTywdOv4zlsSYFk9yVSAIU6CrsdvdY4/rs:fill:0:0:1/w:800/h:800/q:60/mb:500000/aHR0cHM6Ly9pbWct/dXBsb2FkLXByb2R1/Y3Rpb24udHJhbnNp/c3Rvci5mbS80YWIy/MWUxODE4NjA1MmRm/OTBmZmYyYzRlYmU1/N2NhOC5qcGc.jpg">Bronwen Aker</podcast:person>
      <podcast:person role="Producer" href="https://bhisnews.transistor.fm/people/meagan-bentley">Meagan Bentley</podcast:person>
      <podcast:person role="Host" href="https://www.bsidessd.org/" img="https://img.transistorcdn.com/KeYB5iZ31d5IGBEuYGSV1SOcM5ZsEQ3dGI4HgjvyVVE/rs:fill:0:0:1/w:800/h:800/q:60/mb:500000/aHR0cHM6Ly9pbWct/dXBsb2FkLXByb2R1/Y3Rpb24udHJhbnNp/c3Rvci5mbS82ZGRm/ZWU5MGU5YzJiZjU0/MTVmZTU0OWExYTg4/OGFhMi5wbmc.jpg">Wade Wells</podcast:person>
      <podcast:person role="Guest" href="https://bhisnews.transistor.fm/people/andy-pettit-nerf" img="https://img.transistorcdn.com/Hm7-lytrUVM163vtKy6oq20J186th0VCEBKYtoBJ7X4/rs:fill:0:0:1/w:800/h:800/q:60/mb:500000/aHR0cHM6Ly9pbWct/dXBsb2FkLXByb2R1/Y3Rpb24udHJhbnNp/c3Rvci5mbS85NjNk/NWE4OWY5ODFhY2Yx/ZTJlMTc1MzAxMGVj/Mzg4Mi5wbmc.jpg">Andy Pettit "Nerf"</podcast:person>
      <podcast:person role="Guest" href="https://bhisnews.transistor.fm/people/aisling-nic-lynne-siriciryel" img="https://img.transistorcdn.com/Tjn3zKVqAH4r98QV7VybA-7j1NhD5T7gMfcLITgjIvc/rs:fill:0:0:1/w:800/h:800/q:60/mb:500000/aHR0cHM6Ly9pbWct/dXBsb2FkLXByb2R1/Y3Rpb24udHJhbnNp/c3Rvci5mbS84MTYw/NTJiNmMxYjE1Yjgx/M2Y3NTU3MThiYjc5/ZWNhMy5qcGVn.jpg">Aisling nic Lynne "siriciryel"</podcast:person>
      <podcast:person role="Guest" href="https://linktr.ee/MaryEllenKennel" img="https://img.transistorcdn.com/VREbNsyiFbDe1soTC9ll_XcoZjGzsUF1W_UiErAbtSI/rs:fill:0:0:1/w:800/h:800/q:60/mb:500000/aHR0cHM6Ly9pbWct/dXBsb2FkLXByb2R1/Y3Rpb24udHJhbnNp/c3Rvci5mbS84NmYy/Y2FhZTkzYjU0Mzk5/MTAyOWQ1N2Y1ZDdj/Y2EzZS5wbmc.jpg">MaryEllen</podcast:person>
      <podcast:chapters url="https://share.transistor.fm/s/aa49f008/chapters.json" type="application/json+chapters"/>
    </item>
    <item>
      <title>Louvre’s Video Security Password Was ‘Louvre’ 2025-11-10</title>
      <itunes:episode>1</itunes:episode>
      <podcast:episode>1</podcast:episode>
      <itunes:title>Louvre’s Video Security Password Was ‘Louvre’ 2025-11-10</itunes:title>
      <itunes:episodeType>full</itunes:episodeType>
      <guid isPermaLink="false">https://blubrry.com/bhis/149896098/louvres-video-security-password-was-louvre-2025-11-10/</guid>
      <link>https://share.transistor.fm/s/df38b3e9</link>
      <description>
        <![CDATA[<p>Register for FREE Infosec Webcasts, Anti-casts &amp; Summits – https://poweredbybhis.com </p><p><br></p><p>Chapters</p><p><br></p><p>00:00 - PreShow Banter™ — Humans are Done</p><p>03:04 - Louvre’s video security password was ‘Louvre’ – BHIS - Talkin’ Bout [infosec] News 2025-11-10</p><p>05:11 - Story # 1: I Tried the Robot That’s Coming to Live With You. It’s Still Part Human.</p><p>15:14 - Story # 2: How to trade your $214,000 cybersecurity job for a jail cell</p><p>25:14 - Story # 3: The Louvre’s video security password was reportedly ‘Louvre’</p><p>29:04 - Story # 4: Dangerous runC flaws could allow hackers to escape Docker containers</p><p>32:58 - Story # 5: List of AI Tools Promoted by Threat Actors in Underground Forums and Their Capabilities</p><p>40:00 - Story # 5b: GTIG AI Threat Tracker: Advances in Threat Actor Usage of AI Tools</p><p>56:37 - BHIS Webcast – X-Typhoon - Not your Father’s China with John Strand</p>
<ul><li>(00:00) - PreShow Banter™ — Humans are Done</li>
<li>(03:03) - Louvre’s video security password was ‘Louvre’ – BHIS - Talkin' Bout [infosec] News 2025-11-10</li>
<li>(05:10) - Story # 1: I Tried the Robot That’s Coming to Live With You. It’s Still Part Human.</li>
<li>(15:14) - Story # 2: How to trade your $214,000 cybersecurity job for a jail cell</li>
<li>(25:13) - Story # 3: The Louvre’s video security password was reportedly ‘Louvre’</li>
<li>(29:03) - Story # 4: Dangerous runC flaws could allow hackers to escape Docker containers</li>
<li>(32:58) - Story # 5: List of AI Tools Promoted by Threat Actors in Underground Forums and Their Capabilities</li>
<li>(40:00) - Story # 5b: GTIG AI Threat Tracker: Advances in Threat Actor Usage of AI Tools</li>
<li>(56:37) - BHIS Webcast – X-Typhoon - Not your Father's China with John Strand</li>
</ul>]]>
      </description>
      <content:encoded>
        <![CDATA[<p>Register for FREE Infosec Webcasts, Anti-casts &amp; Summits – https://poweredbybhis.com </p><p><br></p><p>Chapters</p><p><br></p><p>00:00 - PreShow Banter™ — Humans are Done</p><p>03:04 - Louvre’s video security password was ‘Louvre’ – BHIS - Talkin’ Bout [infosec] News 2025-11-10</p><p>05:11 - Story # 1: I Tried the Robot That’s Coming to Live With You. It’s Still Part Human.</p><p>15:14 - Story # 2: How to trade your $214,000 cybersecurity job for a jail cell</p><p>25:14 - Story # 3: The Louvre’s video security password was reportedly ‘Louvre’</p><p>29:04 - Story # 4: Dangerous runC flaws could allow hackers to escape Docker containers</p><p>32:58 - Story # 5: List of AI Tools Promoted by Threat Actors in Underground Forums and Their Capabilities</p><p>40:00 - Story # 5b: GTIG AI Threat Tracker: Advances in Threat Actor Usage of AI Tools</p><p>56:37 - BHIS Webcast – X-Typhoon - Not your Father’s China with John Strand</p>
<ul><li>(00:00) - PreShow Banter™ — Humans are Done</li>
<li>(03:03) - Louvre’s video security password was ‘Louvre’ – BHIS - Talkin' Bout [infosec] News 2025-11-10</li>
<li>(05:10) - Story # 1: I Tried the Robot That’s Coming to Live With You. It’s Still Part Human.</li>
<li>(15:14) - Story # 2: How to trade your $214,000 cybersecurity job for a jail cell</li>
<li>(25:13) - Story # 3: The Louvre’s video security password was reportedly ‘Louvre’</li>
<li>(29:03) - Story # 4: Dangerous runC flaws could allow hackers to escape Docker containers</li>
<li>(32:58) - Story # 5: List of AI Tools Promoted by Threat Actors in Underground Forums and Their Capabilities</li>
<li>(40:00) - Story # 5b: GTIG AI Threat Tracker: Advances in Threat Actor Usage of AI Tools</li>
<li>(56:37) - BHIS Webcast – X-Typhoon - Not your Father's China with John Strand</li>
</ul>]]>
      </content:encoded>
      <pubDate>Thu, 13 Nov 2025 16:26:01 -0500</pubDate>
      <author>Black Hills Information Security</author>
      <enclosure url="https://media.transistor.fm/df38b3e9/d9a2a18e.mp3" length="58221567" type="audio/mpeg"/>
      <itunes:author>Black Hills Information Security</itunes:author>
      <itunes:image href="https://img.transistorcdn.com/6znXpX8A0XtZ2CHFo3N80UeULRhVzcO-NAwQ7Uj4PQY/rs:fill:0:0:1/w:1400/h:1400/q:60/mb:500000/aHR0cHM6Ly9pbWct/dXBsb2FkLXByb2R1/Y3Rpb24udHJhbnNp/c3Rvci5mbS8xZTFk/ZTNlODQ1MmI3ZmRk/YmQwM2ZhZDA3ZDY1/NWZkOC5qcGc.jpg"/>
      <itunes:duration>3537</itunes:duration>
      <itunes:summary>Register for FREE Infosec Webcasts, Anti-casts &amp;amp; Summits – 
https://poweredbybhis.com Chapters00:00 - PreShow Banter™ — Humans are Done03:04 - Louvre’s video security password was ‘Louvre’ – BHIS - Talkin’ Bout [infosec] News 2025-11-1005:11 - Story # 1: I Tried the Robot That’s Coming to Live With You. It’s Still Part Human.15:14 - Story # 2: How to trade your $214,000 cybersecurity job for a jail cell25:14 - Story # 3: The Louvre’s video security password was reportedly ‘Louvre’29:04 - Story # 4: Dangerous runC flaws could allow hackers to escape Docker containers32:58 - Story # 5: List of AI Tools Promoted by Threat Actors in Underground Forums and Their Capabilities40:00 - Story # 5b: GTIG AI Threat Tracker: Advances in Threat Actor Usage of AI Tools56:37 - BHIS Webcast – X-Typhoon - Not your Father’s China with John Strand</itunes:summary>
      <itunes:subtitle>Register for FREE Infosec Webcasts, Anti-casts &amp;amp; Summits – 
https://poweredbybhis.com Chapters00:00 - PreShow Banter™ — Humans are Done03:04 - Louvre’s video security password was ‘Louvre’ – BHIS - Talkin’ Bout [infosec] News 2025-11-1005:11 - Story </itunes:subtitle>
      <itunes:keywords>Infosec,Cybersecurity,news</itunes:keywords>
      <itunes:explicit>No</itunes:explicit>
      <podcast:person role="Host" href="https://www.blackhillsinfosec.com/team/corey-ham/" img="https://img.transistorcdn.com/Q9BaWxLnY_zU_A-eKpfV22Y1AiBI64lLxLJP19iD_lM/rs:fill:0:0:1/w:800/h:800/q:60/mb:500000/aHR0cHM6Ly9pbWct/dXBsb2FkLXByb2R1/Y3Rpb24udHJhbnNp/c3Rvci5mbS84MTMx/N2JlN2IzZWI2MDcz/MGU0NTk5NGU0N2Iw/NzE2Yy5qcGc.jpg">Corey Ham</podcast:person>
      <podcast:person role="Guest" href="https://linktr.ee/MaryEllenKennel" img="https://img.transistorcdn.com/VREbNsyiFbDe1soTC9ll_XcoZjGzsUF1W_UiErAbtSI/rs:fill:0:0:1/w:800/h:800/q:60/mb:500000/aHR0cHM6Ly9pbWct/dXBsb2FkLXByb2R1/Y3Rpb24udHJhbnNp/c3Rvci5mbS84NmYy/Y2FhZTkzYjU0Mzk5/MTAyOWQ1N2Y1ZDdj/Y2EzZS5wbmc.jpg">MaryEllen</podcast:person>
      <podcast:person role="Guest" href="https://bhisnews.transistor.fm/people/michael-shecky-kavka" img="https://img.transistorcdn.com/ZUl4DxZiPo9coGYCRTdIC8aRTm9MciE46ie_A4KO0mk/rs:fill:0:0:1/w:800/h:800/q:60/mb:500000/aHR0cHM6Ly9pbWct/dXBsb2FkLXByb2R1/Y3Rpb24udHJhbnNp/c3Rvci5mbS9jMjI1/OTNiOTdiNDlhNjMw/MTBkZjMxYmY1OTJj/YWI3Zi5qcGc.jpg">Michael "Shecky" Kavka</podcast:person>
      <podcast:person role="Host" href="https://www.blackhillsinfosec.com/team/john-strand/" img="https://img.transistorcdn.com/NUqk_fUpMRKpGIokj-WgaiALdQtlImwADID3aNogGds/rs:fill:0:0:1/w:800/h:800/q:60/mb:500000/aHR0cHM6Ly9pbWct/dXBsb2FkLXByb2R1/Y3Rpb24udHJhbnNp/c3Rvci5mbS84Y2Ji/YmMyMzRlMDM2Nzdi/YmNlYjhlZDQwZmM4/MmJlYy5qcGc.jpg">John Strand</podcast:person>
      <podcast:person role="Producer" href="https://www.blackhillsinfosec.com/team/ryan-poirier/">Ryan Poirier</podcast:person>
      <podcast:person role="Host" href="https://mwgroup.io/about/" img="https://img.transistorcdn.com/_dioeUsMeIlo4vZ0dPQkQ-f-tkMHllpfM4P-4SpyW8Q/rs:fill:0:0:1/w:800/h:800/q:60/mb:500000/aHR0cHM6Ly9pbWct/dXBsb2FkLXByb2R1/Y3Rpb24udHJhbnNp/c3Rvci5mbS9jNzA4/MDU5MTk2MDAyMjc5/NmZiZmFkMDY4NGVj/NzRmNS5qcGVn.jpg">Ralph May</podcast:person>
      <podcast:person role="Guest" href="https://bhisnews.transistor.fm/people/alex-minster-belouve" img="https://img.transistorcdn.com/pkWXYRcPNt2ZnnEfs05Q8vmWG5GDNmNhH10RUMs2Zro/rs:fill:0:0:1/w:800/h:800/q:60/mb:500000/aHR0cHM6Ly9pbWct/dXBsb2FkLXByb2R1/Y3Rpb24udHJhbnNp/c3Rvci5mbS9mYjZj/MDNhM2YyZmZmZmI2/NGU0YWJjYzdlMjkx/ODFkYy5qcGc.jpg">Alex Minster "Belouve"</podcast:person>
      <podcast:chapters url="https://share.transistor.fm/s/df38b3e9/chapters.json" type="application/json+chapters"/>
    </item>
    <item>
      <title>Ransomware Victims Stop Paying Hackers – 2025-11-03</title>
      <itunes:episode>1</itunes:episode>
      <podcast:episode>1</podcast:episode>
      <itunes:title>Ransomware Victims Stop Paying Hackers – 2025-11-03</itunes:title>
      <itunes:episodeType>full</itunes:episodeType>
      <guid isPermaLink="false">https://blubrry.com/bhis/149726945/ransomeware-victims-stop-paying-hackers-2025-11-03/</guid>
      <link>https://share.transistor.fm/s/1992c9fb</link>
      <description>
        <![CDATA[<p>Register for FREE Infosec Webcasts, Anti-casts &amp; Summits – https://poweredbybhis.com</p><p><br></p><p>00:00 - PreShow Banter™ — Musical Views of the Universe</p><p>04:05 - – BHIS - Talkin’ Bout [infosec] News 2025-11-03</p><p>04:39 - Story # 1: Ransomware profits drop as victims stop paying hackers</p><p>06:22 - Chart since 2019</p><p>16:06 - Story # 2: More than a million people every week show suicidal intent when chatting with ChatGPT, OpenAI estimates</p><p>33:02 - Story # 3: 10M people watched a YouTuber shim a lock; the lock company sued him. Bad idea.</p><p>41:18 - Story # 4: ‘Dangerous’ YouTube videos struck down for bypassing Windows 11 account setup [Update: Restored]</p><p>47:13 - Story # 5: Chicago firm that resolves ransomware attacks had rogue workers carrying out their own hacks, FBI says</p><p>51:08 - Story # 6: Microsoft: DNS outage impacts Azure and Microsoft 365 services</p><p>54:33 - Story # 7: EY Data Leak – Massive 4TB SQL Server Backup Exposed Publicly on Microsoft Azure</p><p>55:22 - Stordy # 8: Black Hat Europe 2025 Arsenal: 8 AI Security Tools Transforming Cybersecurity</p>
<ul><li>(00:00) - PreShow Banter™ — Musical Views of the Universe</li>
<li>(04:04) - Ransomware Victims Stop Paying Hackers – BHIS - Talkin' Bout [infosec] News 2025-11-03</li>
<li>(04:38) - Story # 1: Ransomware profits drop as victims stop paying hackers</li>
<li>(06:22) - Chart since 2019 (thumbnail)</li>
<li>(16:06) - Story # 2: More than a million people every week show suicidal intent when chatting with ChatGPT, OpenAI estimates</li>
<li>(33:02) - Story # 3: 10M people watched a YouTuber shim a lock; the lock company sued him. Bad idea.</li>
<li>(41:18) - Story # 4: ‘Dangerous’ YouTube videos struck down for bypassing Windows 11 account setup [Update: Restored]</li>
<li>(47:12) - Story # 5: Chicago firm that resolves ransomware attacks had rogue workers carrying out their own hacks, FBI says</li>
<li>(51:07) - Story # 6: Microsoft: DNS outage impacts Azure and Microsoft 365 services</li>
<li>(54:33) - Story # 7: EY Data Leak – Massive 4TB SQL Server Backup Exposed Publicly on Microsoft Azure</li>
<li>(55:22) - Story # 8: Black Hat Europe 2025 Arsenal: 8 AI Security Tools Transforming Cybersecurity</li>
</ul>]]>
      </description>
      <content:encoded>
        <![CDATA[<p>Register for FREE Infosec Webcasts, Anti-casts &amp; Summits – https://poweredbybhis.com</p><p><br></p><p>00:00 - PreShow Banter™ — Musical Views of the Universe</p><p>04:05 - – BHIS - Talkin’ Bout [infosec] News 2025-11-03</p><p>04:39 - Story # 1: Ransomware profits drop as victims stop paying hackers</p><p>06:22 - Chart since 2019</p><p>16:06 - Story # 2: More than a million people every week show suicidal intent when chatting with ChatGPT, OpenAI estimates</p><p>33:02 - Story # 3: 10M people watched a YouTuber shim a lock; the lock company sued him. Bad idea.</p><p>41:18 - Story # 4: ‘Dangerous’ YouTube videos struck down for bypassing Windows 11 account setup [Update: Restored]</p><p>47:13 - Story # 5: Chicago firm that resolves ransomware attacks had rogue workers carrying out their own hacks, FBI says</p><p>51:08 - Story # 6: Microsoft: DNS outage impacts Azure and Microsoft 365 services</p><p>54:33 - Story # 7: EY Data Leak – Massive 4TB SQL Server Backup Exposed Publicly on Microsoft Azure</p><p>55:22 - Stordy # 8: Black Hat Europe 2025 Arsenal: 8 AI Security Tools Transforming Cybersecurity</p>
<ul><li>(00:00) - PreShow Banter™ — Musical Views of the Universe</li>
<li>(04:04) - Ransomware Victims Stop Paying Hackers – BHIS - Talkin' Bout [infosec] News 2025-11-03</li>
<li>(04:38) - Story # 1: Ransomware profits drop as victims stop paying hackers</li>
<li>(06:22) - Chart since 2019 (thumbnail)</li>
<li>(16:06) - Story # 2: More than a million people every week show suicidal intent when chatting with ChatGPT, OpenAI estimates</li>
<li>(33:02) - Story # 3: 10M people watched a YouTuber shim a lock; the lock company sued him. Bad idea.</li>
<li>(41:18) - Story # 4: ‘Dangerous’ YouTube videos struck down for bypassing Windows 11 account setup [Update: Restored]</li>
<li>(47:12) - Story # 5: Chicago firm that resolves ransomware attacks had rogue workers carrying out their own hacks, FBI says</li>
<li>(51:07) - Story # 6: Microsoft: DNS outage impacts Azure and Microsoft 365 services</li>
<li>(54:33) - Story # 7: EY Data Leak – Massive 4TB SQL Server Backup Exposed Publicly on Microsoft Azure</li>
<li>(55:22) - Story # 8: Black Hat Europe 2025 Arsenal: 8 AI Security Tools Transforming Cybersecurity</li>
</ul>]]>
      </content:encoded>
      <pubDate>Thu, 06 Nov 2025 08:36:00 -0500</pubDate>
      <author>Black Hills Information Security</author>
      <enclosure url="https://media.transistor.fm/1992c9fb/d9c36182.mp3" length="62970188" type="audio/mpeg"/>
      <itunes:author>Black Hills Information Security</itunes:author>
      <itunes:image href="https://img.transistorcdn.com/P_owjixN7_1pspcvEPpcFLR-HeXHjlIccxAK3dZU9XA/rs:fill:0:0:1/w:1400/h:1400/q:60/mb:500000/aHR0cHM6Ly9pbWct/dXBsb2FkLXByb2R1/Y3Rpb24udHJhbnNp/c3Rvci5mbS9lMTg2/ZDEzY2NlMWM2MjY1/NzI2NzQxM2UzOWQ5/YWMxNC5qcGc.jpg"/>
      <itunes:duration>3814</itunes:duration>
      <itunes:summary>Register for FREE Infosec Webcasts, Anti-casts &amp;amp; Summits – https://poweredbybhis.com00:00 - PreShow Banter™ — Musical Views of the Universe04:05 - – BHIS - Talkin’ Bout [infosec] News 2025-11-0304:39 - Story # 1: Ransomware profits drop as victims stop paying hackers06:22 - Chart since 201916:06 - Story # 2: More than a million people every week show suicidal intent when chatting with ChatGPT, OpenAI estimates33:02 - Story # 3: 10M people watched a YouTuber shim a lock; the lock company sued him. Bad idea.41:18 - Story # 4: ‘Dangerous’ YouTube videos struck down for bypassing Windows 11 account setup [Update: Restored]47:13 - Story # 5: Chicago firm that resolves ransomware attacks had rogue workers carrying out their own hacks, FBI says51:08 - Story # 6: Microsoft: DNS outage impacts Azure and Microsoft 365 services54:33 - Story # 7: EY Data Leak – Massive 4TB SQL Server Backup Exposed Publicly on Microsoft Azure55:22 - Stordy # 8: Black Hat Europe 2025 Arsenal: 8 AI Security Tools Transforming Cybersecurity</itunes:summary>
      <itunes:subtitle>Register for FREE Infosec Webcasts, Anti-casts &amp;amp; Summits – https://poweredbybhis.com00:00 - PreShow Banter™ — Musical Views of the Universe04:05 - – BHIS - Talkin’ Bout [infosec] News 2025-11-0304:39 - Story # 1: Ransomware profits drop as victims sto</itunes:subtitle>
      <itunes:keywords>Infosec,Cybersecurity,news</itunes:keywords>
      <itunes:explicit>No</itunes:explicit>
      <podcast:person role="Host" href="https://www.blackhillsinfosec.com/team/corey-ham/" img="https://img.transistorcdn.com/Q9BaWxLnY_zU_A-eKpfV22Y1AiBI64lLxLJP19iD_lM/rs:fill:0:0:1/w:800/h:800/q:60/mb:500000/aHR0cHM6Ly9pbWct/dXBsb2FkLXByb2R1/Y3Rpb24udHJhbnNp/c3Rvci5mbS84MTMx/N2JlN2IzZWI2MDcz/MGU0NTk5NGU0N2Iw/NzE2Yy5qcGc.jpg">Corey Ham</podcast:person>
      <podcast:chapters url="https://share.transistor.fm/s/1992c9fb/chapters.json" type="application/json+chapters"/>
    </item>
    <item>
      <title>The AI Browser Wars - 2025-10-27</title>
      <itunes:episode>1</itunes:episode>
      <podcast:episode>1</podcast:episode>
      <itunes:title>The AI Browser Wars - 2025-10-27</itunes:title>
      <itunes:episodeType>full</itunes:episodeType>
      <guid isPermaLink="false">https://blubrry.com/bhis/149580389/the-ai-browser-wars-2025-10-27/</guid>
      <link>https://share.transistor.fm/s/d33331f0</link>
      <description>
        <![CDATA[<p>Register for FREE Infosec Webcasts, Anti-casts &amp; Summits – </p><p>https://poweredbybhis.com</p><p><br></p><p>The BHIS crew breaks down the latest cybersecurity stories making waves — from data breaches and malware campaigns to privacy issues, exploit trends, and tech policy shake-ups. Join our panel of security pros for expert analysis, sharp humor, and practical insights you can actually use. Whether it’s social engineering, AI-powered attacks, or bizarre security headlines, we dig into what matters most for defenders and curious minds alike. Stay informed, entertained, and one step ahead in the ever-changing world of infosec.</p><p><br></p><p>00:00:00 - PreShow Banter™ — The Cost of War.xyz</p><p>00:03:42 - The AI Browser Wars - BHIS - Talkin’ Bout [infosec] News 2025-10-27</p><p>00:04:04 - Story # 1: Smart bed owners experience AWS outage nightmare as they’re left sweating and stuck in upright position</p><p>00:10:49 - Story # 2: Robots May Replace 600,000 Human Employees at Amazon</p><p>00:14:40 - Story # 3: Meet Mico, Microsoft’s AI version of Clippy</p><p>00:20:59 - Story # 4: Exploitation of Windows Server Update Services Remote Code Execution Vulnerability</p><p>00:26:31 - Story # 5: Ex-L3Harris executive accused of selling trade secrets to Russia</p><p>00:31:29 - Story # 6: Introducing ChatGPT Atlas</p><p>00:43:34 - Story # 7: ‘Phased Out’—Google Confirms Bad News For 3 Billion Chrome Users</p><p>00:52:26 - Story # 8: The Y2K38 Bug Is a Vulnerability, Not Just a Date Problem, Researchers Warn</p><p>01:00:16 - Story # 9: KFC Venezuela Alleged Data Breach – 1 Million Customer Records Exposed</p>
<ul><li>(00:00) - PreShow Banter™ — The Cost of War.xyz</li>
<li>(03:42) - The AI Browser Wars - BHIS - Talkin' Bout [infosec] News 2025-10-27</li>
<li>(04:04) - Story # 1: Smart bed owners experience AWS outage nightmare as they're left sweating and stuck in upright position</li>
<li>(10:48) - Story # 2: Robots May Replace 600,000 Human Employees at Amazon</li>
<li>(14:40) - Story # 3: Meet Mico, Microsoft’s AI version of Clippy</li>
<li>(20:58) - Story # 4: Exploitation of Windows Server Update Services Remote Code Execution Vulnerability</li>
<li>(26:30) - Story # 5: Ex-L3Harris executive accused of selling trade secrets to Russia</li>
<li>(31:28) - Story # 6: Introducing ChatGPT Atlas</li>
<li>(43:34) - Story # 7: ‘Phased Out’—Google Confirms Bad News For 3 Billion Chrome Users</li>
<li>(52:25) - Story # 8: The Y2K38 Bug Is a Vulnerability, Not Just a Date Problem, Researchers Warn</li>
<li>(01:00:15) - Story # 9: KFC Venezuela Alleged Data Breach – 1 Million Customer Records Exposed</li>
</ul>]]>
      </description>
      <content:encoded>
        <![CDATA[<p>Register for FREE Infosec Webcasts, Anti-casts &amp; Summits – </p><p>https://poweredbybhis.com</p><p><br></p><p>The BHIS crew breaks down the latest cybersecurity stories making waves — from data breaches and malware campaigns to privacy issues, exploit trends, and tech policy shake-ups. Join our panel of security pros for expert analysis, sharp humor, and practical insights you can actually use. Whether it’s social engineering, AI-powered attacks, or bizarre security headlines, we dig into what matters most for defenders and curious minds alike. Stay informed, entertained, and one step ahead in the ever-changing world of infosec.</p><p><br></p><p>00:00:00 - PreShow Banter™ — The Cost of War.xyz</p><p>00:03:42 - The AI Browser Wars - BHIS - Talkin’ Bout [infosec] News 2025-10-27</p><p>00:04:04 - Story # 1: Smart bed owners experience AWS outage nightmare as they’re left sweating and stuck in upright position</p><p>00:10:49 - Story # 2: Robots May Replace 600,000 Human Employees at Amazon</p><p>00:14:40 - Story # 3: Meet Mico, Microsoft’s AI version of Clippy</p><p>00:20:59 - Story # 4: Exploitation of Windows Server Update Services Remote Code Execution Vulnerability</p><p>00:26:31 - Story # 5: Ex-L3Harris executive accused of selling trade secrets to Russia</p><p>00:31:29 - Story # 6: Introducing ChatGPT Atlas</p><p>00:43:34 - Story # 7: ‘Phased Out’—Google Confirms Bad News For 3 Billion Chrome Users</p><p>00:52:26 - Story # 8: The Y2K38 Bug Is a Vulnerability, Not Just a Date Problem, Researchers Warn</p><p>01:00:16 - Story # 9: KFC Venezuela Alleged Data Breach – 1 Million Customer Records Exposed</p>
<ul><li>(00:00) - PreShow Banter™ — The Cost of War.xyz</li>
<li>(03:42) - The AI Browser Wars - BHIS - Talkin' Bout [infosec] News 2025-10-27</li>
<li>(04:04) - Story # 1: Smart bed owners experience AWS outage nightmare as they're left sweating and stuck in upright position</li>
<li>(10:48) - Story # 2: Robots May Replace 600,000 Human Employees at Amazon</li>
<li>(14:40) - Story # 3: Meet Mico, Microsoft’s AI version of Clippy</li>
<li>(20:58) - Story # 4: Exploitation of Windows Server Update Services Remote Code Execution Vulnerability</li>
<li>(26:30) - Story # 5: Ex-L3Harris executive accused of selling trade secrets to Russia</li>
<li>(31:28) - Story # 6: Introducing ChatGPT Atlas</li>
<li>(43:34) - Story # 7: ‘Phased Out’—Google Confirms Bad News For 3 Billion Chrome Users</li>
<li>(52:25) - Story # 8: The Y2K38 Bug Is a Vulnerability, Not Just a Date Problem, Researchers Warn</li>
<li>(01:00:15) - Story # 9: KFC Venezuela Alleged Data Breach – 1 Million Customer Records Exposed</li>
</ul>]]>
      </content:encoded>
      <pubDate>Thu, 30 Oct 2025 22:20:00 -0400</pubDate>
      <author>Black Hills Information Security</author>
      <enclosure url="https://media.transistor.fm/d33331f0/b9f86fd6.mp3" length="60487348" type="audio/mpeg"/>
      <itunes:author>Black Hills Information Security</itunes:author>
      <itunes:image href="https://img.transistorcdn.com/vaAKpaQQZlb_BNanIjgFEeQj7MHwkei7EaKiHLLTZR4/rs:fill:0:0:1/w:1400/h:1400/q:60/mb:500000/aHR0cHM6Ly9pbWct/dXBsb2FkLXByb2R1/Y3Rpb24udHJhbnNp/c3Rvci5mbS82MzYx/MWYwZGVlZjFiNTlm/ZTRmNGQ2NjYyZTYx/NTFlNy5qcGc.jpg"/>
      <itunes:duration>3669</itunes:duration>
      <itunes:summary>Register for FREE Infosec Webcasts, Anti-casts &amp;amp; Summits – https://poweredbybhis.comThe BHIS crew breaks down the latest cybersecurity stories making waves — from data breaches and malware campaigns to privacy issues, exploit trends, and tech policy shake-ups. Join our panel of security pros for expert analysis, sharp humor, and practical insights you can actually use. Whether it’s social engineering, AI-powered attacks, or bizarre security headlines, we dig into what matters most for defenders and curious minds alike. Stay informed, entertained, and one step ahead in the ever-changing world of infosec.00:00:00 - PreShow Banter™ — The Cost of War.xyz00:03:42 - The AI Browser Wars - BHIS - Talkin’ Bout [infosec] News 2025-10-2700:04:04 - Story # 1: Smart bed owners experience AWS outage nightmare as they’re left sweating and stuck in upright position00:10:49 - Story # 2: Robots May Replace 600,000 Human Employees at Amazon00:14:40 - Story # 3: Meet Mico, Microsoft’s AI version of Clippy00:20:59 - Story # 4: Exploitation of Windows Server Update Services Remote Code Execution Vulnerability00:26:31 - Story # 5: Ex-L3Harris executive accused of selling trade secrets to Russia00:31:29 - Story # 6: Introducing ChatGPT Atlas00:43:34 - Story # 7: ‘Phased Out’—Google Confirms Bad News For 3 Billion Chrome Users00:52:26 - Story # 8: The Y2K38 Bug Is a Vulnerability, Not Just a Date Problem, Researchers Warn01:00:16 - Story # 9: KFC Venezuela Alleged Data Breach – 1 Million Customer Records Exposed</itunes:summary>
      <itunes:subtitle>Register for FREE Infosec Webcasts, Anti-casts &amp;amp; Summits – https://poweredbybhis.comThe BHIS crew breaks down the latest cybersecurity stories making waves — from data breaches and malware campaigns to privacy issues, exploit trends, and tech policy s</itunes:subtitle>
      <itunes:keywords>Infosec,Cybersecurity,news</itunes:keywords>
      <itunes:explicit>No</itunes:explicit>
      <podcast:person role="Host" href="https://www.blackhillsinfosec.com/team/corey-ham/" img="https://img.transistorcdn.com/Q9BaWxLnY_zU_A-eKpfV22Y1AiBI64lLxLJP19iD_lM/rs:fill:0:0:1/w:800/h:800/q:60/mb:500000/aHR0cHM6Ly9pbWct/dXBsb2FkLXByb2R1/Y3Rpb24udHJhbnNp/c3Rvci5mbS84MTMx/N2JlN2IzZWI2MDcz/MGU0NTk5NGU0N2Iw/NzE2Yy5qcGc.jpg">Corey Ham</podcast:person>
      <podcast:chapters url="https://share.transistor.fm/s/d33331f0/chapters.json" type="application/json+chapters"/>
    </item>
    <item>
      <title>Online Book Store Takes Down Half the Internet - BHIS - Talkin' Bout [infosec] News 2025-10-20</title>
      <itunes:episode>1</itunes:episode>
      <podcast:episode>1</podcast:episode>
      <itunes:title>Online Book Store Takes Down Half the Internet - BHIS - Talkin' Bout [infosec] News 2025-10-20</itunes:title>
      <itunes:episodeType>full</itunes:episodeType>
      <guid isPermaLink="false">https://blubrry.com/bhis/149432243/online-book-store-takes-down-half-the-internet-bhis-talkin-bout-infosec-news-2025-10-20/</guid>
      <link>https://share.transistor.fm/s/794de5d6</link>
      <description>
        <![CDATA[<p>Register for FREE Infosec Webcasts, Anti-casts &amp; Summits – </p><p>https://poweredbybhis.com</p><p><br></p><p>00:00:00 - PreShow Banter™ — AWS Snow Day Party</p><p>00:11:31 - Online Book Store Takes Down Half of the Internet - BHIS - Talkin’ Bout [infosec] News 2025-10-20</p><p>00:12:12 - Story # 1: F5 says hackers stole undisclosed BIG-IP flaws, source code</p><p>00:35:11 - Story # 2: Newsom signs age verification law, siding with tech giants over Hollywood</p><p>00:48:39 - Story # 3: Researchers find a startlingly cheap way to steal your secrets from space</p><p>00:55:04 - Story # 4: Jeff Bezos Has a Plan to Curb AI’s Carbon Footprint: Send Data Centers to Space</p><p>01:02:22 - Story # 5: SolarWinds Security Chief reflects on the Russian hack that exposed US government agencies</p>
<ul><li>(00:00) - PreShow Banter™ — AWS Snow Day Party</li>
<li>(11:30) - Online Book Store Takes Down Half of the Internet - BHIS - Talkin' Bout [infosec] News 2025-10-20</li>
<li>(12:12) - Story # 1: F5 says hackers stole undisclosed BIG-IP flaws, source code</li>
<li>(35:10) - Story # 2: Newsom signs age verification law, siding with tech giants over Hollywood</li>
<li>(48:39) - Story # 3: Researchers find a startlingly cheap way to steal your secrets from space</li>
<li>(55:03) - Story # 4: Jeff Bezos Has a Plan to Curb AI’s Carbon Footprint: Send Data Centers to Space</li>
<li>(01:02:21) - Story # 5: SolarWinds Security Chief reflects on the Russian hack that exposed US government agencies</li>
</ul>]]>
      </description>
      <content:encoded>
        <![CDATA[<p>Register for FREE Infosec Webcasts, Anti-casts &amp; Summits – </p><p>https://poweredbybhis.com</p><p><br></p><p>00:00:00 - PreShow Banter™ — AWS Snow Day Party</p><p>00:11:31 - Online Book Store Takes Down Half of the Internet - BHIS - Talkin’ Bout [infosec] News 2025-10-20</p><p>00:12:12 - Story # 1: F5 says hackers stole undisclosed BIG-IP flaws, source code</p><p>00:35:11 - Story # 2: Newsom signs age verification law, siding with tech giants over Hollywood</p><p>00:48:39 - Story # 3: Researchers find a startlingly cheap way to steal your secrets from space</p><p>00:55:04 - Story # 4: Jeff Bezos Has a Plan to Curb AI’s Carbon Footprint: Send Data Centers to Space</p><p>01:02:22 - Story # 5: SolarWinds Security Chief reflects on the Russian hack that exposed US government agencies</p>
<ul><li>(00:00) - PreShow Banter™ — AWS Snow Day Party</li>
<li>(11:30) - Online Book Store Takes Down Half of the Internet - BHIS - Talkin' Bout [infosec] News 2025-10-20</li>
<li>(12:12) - Story # 1: F5 says hackers stole undisclosed BIG-IP flaws, source code</li>
<li>(35:10) - Story # 2: Newsom signs age verification law, siding with tech giants over Hollywood</li>
<li>(48:39) - Story # 3: Researchers find a startlingly cheap way to steal your secrets from space</li>
<li>(55:03) - Story # 4: Jeff Bezos Has a Plan to Curb AI’s Carbon Footprint: Send Data Centers to Space</li>
<li>(01:02:21) - Story # 5: SolarWinds Security Chief reflects on the Russian hack that exposed US government agencies</li>
</ul>]]>
      </content:encoded>
      <pubDate>Fri, 24 Oct 2025 00:13:58 -0400</pubDate>
      <author>Black Hills Information Security</author>
      <enclosure url="https://media.transistor.fm/794de5d6/ff36dfcb.mp3" length="66728179" type="audio/mpeg"/>
      <itunes:author>Black Hills Information Security</itunes:author>
      <itunes:image href="https://img.transistorcdn.com/CyfmITiJKRQhgov8Hj6K3Umrfchk4vswz8k676fHSyM/rs:fill:0:0:1/w:1400/h:1400/q:60/mb:500000/aHR0cHM6Ly9pbWct/dXBsb2FkLXByb2R1/Y3Rpb24udHJhbnNp/c3Rvci5mbS9kMjJk/MjhjNTY5YzgwZTZh/MDA2ZDNiNmQ0NmI3/YjE4OS5qcGc.jpg"/>
      <itunes:duration>4081</itunes:duration>
      <itunes:summary>Register for FREE Infosec Webcasts, Anti-casts &amp;amp; Summits – https://poweredbybhis.com00:00:00 - PreShow Banter™ — AWS Snow Day Party00:11:31 - Online Book Store Takes Down Half of the Internet - BHIS - Talkin’ Bout [infosec] News 2025-10-2000:12:12 - Story # 1: F5 says hackers stole undisclosed BIG-IP flaws, source code00:35:11 - Story # 2: Newsom signs age verification law, siding with tech giants over Hollywood00:48:39 - Story # 3: Researchers find a startlingly cheap way to steal your secrets from space00:55:04 - Story # 4: Jeff Bezos Has a Plan to Curb AI’s Carbon Footprint: Send Data Centers to Space01:02:22 - Story # 5: SolarWinds Security Chief reflects on the Russian hack that exposed US government agencies</itunes:summary>
      <itunes:subtitle>Register for FREE Infosec Webcasts, Anti-casts &amp;amp; Summits – https://poweredbybhis.com00:00:00 - PreShow Banter™ — AWS Snow Day Party00:11:31 - Online Book Store Takes Down Half of the Internet - BHIS - Talkin’ Bout [infosec] News 2025-10-2000:12:12 - S</itunes:subtitle>
      <itunes:keywords>Infosec,Cybersecurity,news</itunes:keywords>
      <itunes:explicit>No</itunes:explicit>
      <podcast:person role="Host" href="https://www.blackhillsinfosec.com/team/corey-ham/" img="https://img.transistorcdn.com/Q9BaWxLnY_zU_A-eKpfV22Y1AiBI64lLxLJP19iD_lM/rs:fill:0:0:1/w:800/h:800/q:60/mb:500000/aHR0cHM6Ly9pbWct/dXBsb2FkLXByb2R1/Y3Rpb24udHJhbnNp/c3Rvci5mbS84MTMx/N2JlN2IzZWI2MDcz/MGU0NTk5NGU0N2Iw/NzE2Yy5qcGc.jpg">Corey Ham</podcast:person>
      <podcast:chapters url="https://share.transistor.fm/s/794de5d6/chapters.json" type="application/json+chapters"/>
    </item>
    <item>
      <title>Hackers claim Discord breach exposed data of 5.5 million users - 2025-10-13</title>
      <itunes:episode>1</itunes:episode>
      <podcast:episode>1</podcast:episode>
      <itunes:title>Hackers claim Discord breach exposed data of 5.5 million users - 2025-10-13</itunes:title>
      <itunes:episodeType>full</itunes:episodeType>
      <guid isPermaLink="false">https://blubrry.com/bhis/149294547/hackers-claim-discord-breach-exposed-data-of-55-million-users-2025-10-13/</guid>
      <link>https://share.transistor.fm/s/0df597c4</link>
      <description>
        <![CDATA[<p>Register for FREE Infosec Webcasts, Anti-casts &amp; Summits – </p><p>https://poweredbybhis.com</p><p><br></p><p>00:00 - PreShow Banter™ — A Real Podcast</p><p>03:15 - Hackers claim Discord breach exposed data of 5.5 million users – BHIS - Talkin' Bout [infosec] News 2025-10-13</p><p>05:44 - Story # 1: CamoLeak: Critical GitHub Copilot Vulnerability Leaks Private Source Code</p><p>24:27 - Story # 2: Hackers claim Discord breach exposed data of 5.5 million users</p><p>36:52 - Story # 3: Velociraptor leveraged in ransomware attacks</p><p>46:47 - Story # 4: Huntress Threat Advisory: Widespread SonicWall SSLVPN Compromise</p><p>54:48 - CTF Challenge</p>
<ul><li>(00:00) - PreShow Banter™ — A Real Podcast</li>
<li>(03:14) - Hackers claim Discord breach exposed data of 5.5 million users – BHIS - Talkin' Bout [infosec] News 2025-10-13</li>
<li>(05:43) - Story # 1: CamoLeak: Critical GitHub Copilot Vulnerability Leaks Private Source Code</li>
<li>(24:26) - Story # 2: Hackers claim Discord breach exposed data of 5.5 million users</li>
<li>(36:52) - Story # 3: Velociraptor leveraged in ransomware attacks</li>
<li>(46:46) - Story # 4: Huntress Threat Advisory: Widespread SonicWall SSLVPN Compromise</li>
<li>(54:48) - CTF Challenge</li>
</ul>]]>
      </description>
      <content:encoded>
        <![CDATA[<p>Register for FREE Infosec Webcasts, Anti-casts &amp; Summits – </p><p>https://poweredbybhis.com</p><p><br></p><p>00:00 - PreShow Banter™ — A Real Podcast</p><p>03:15 - Hackers claim Discord breach exposed data of 5.5 million users – BHIS - Talkin' Bout [infosec] News 2025-10-13</p><p>05:44 - Story # 1: CamoLeak: Critical GitHub Copilot Vulnerability Leaks Private Source Code</p><p>24:27 - Story # 2: Hackers claim Discord breach exposed data of 5.5 million users</p><p>36:52 - Story # 3: Velociraptor leveraged in ransomware attacks</p><p>46:47 - Story # 4: Huntress Threat Advisory: Widespread SonicWall SSLVPN Compromise</p><p>54:48 - CTF Challenge</p>
<ul><li>(00:00) - PreShow Banter™ — A Real Podcast</li>
<li>(03:14) - Hackers claim Discord breach exposed data of 5.5 million users – BHIS - Talkin' Bout [infosec] News 2025-10-13</li>
<li>(05:43) - Story # 1: CamoLeak: Critical GitHub Copilot Vulnerability Leaks Private Source Code</li>
<li>(24:26) - Story # 2: Hackers claim Discord breach exposed data of 5.5 million users</li>
<li>(36:52) - Story # 3: Velociraptor leveraged in ransomware attacks</li>
<li>(46:46) - Story # 4: Huntress Threat Advisory: Widespread SonicWall SSLVPN Compromise</li>
<li>(54:48) - CTF Challenge</li>
</ul>]]>
      </content:encoded>
      <pubDate>Fri, 17 Oct 2025 22:51:47 -0400</pubDate>
      <author>Black Hills Information Security</author>
      <enclosure url="https://media.transistor.fm/0df597c4/8228cf2b.mp3" length="57608672" type="audio/mpeg"/>
      <itunes:author>Black Hills Information Security</itunes:author>
      <itunes:image href="https://img.transistorcdn.com/FW5QRZ6uw87zO7_XskD2QNXcfLtUSW-0tjaf0Hs_DZg/rs:fill:0:0:1/w:1400/h:1400/q:60/mb:500000/aHR0cHM6Ly9pbWct/dXBsb2FkLXByb2R1/Y3Rpb24udHJhbnNp/c3Rvci5mbS8zOWY0/MjFiMTAxMzcwNWRi/MjM4Nzk5ODY1MGJi/NDZmOC5qcGc.jpg"/>
      <itunes:duration>3517</itunes:duration>
      <itunes:summary>Register for FREE Infosec Webcasts, Anti-casts &amp;amp; Summits – https://poweredbybhis.com00:00 - PreShow Banter™ — A Real Podcast03:15 - Hackers claim Discord breach exposed data of 5.5 million users – BHIS - Talkin' Bout [infosec] News 2025-10-1305:44 - Story # 1: CamoLeak: Critical GitHub Copilot Vulnerability Leaks Private Source Code24:27 - Story # 2: Hackers claim Discord breach exposed data of 5.5 million users36:52 - Story # 3: Velociraptor leveraged in ransomware attacks46:47 - Story # 4: Huntress Threat Advisory: Widespread SonicWall SSLVPN Compromise54:48 - CTF Challenge</itunes:summary>
      <itunes:subtitle>Register for FREE Infosec Webcasts, Anti-casts &amp;amp; Summits – https://poweredbybhis.com00:00 - PreShow Banter™ — A Real Podcast03:15 - Hackers claim Discord breach exposed data of 5.5 million users – BHIS - Talkin' Bout [infosec] News 2025-10-1305:44 - S</itunes:subtitle>
      <itunes:keywords>Infosec,Cybersecurity,news</itunes:keywords>
      <itunes:explicit>No</itunes:explicit>
      <podcast:chapters url="https://share.transistor.fm/s/0df597c4/chapters.json" type="application/json+chapters"/>
    </item>
    <item>
      <title>2 Million Cisco Devices Targeted by Exploited 0-Day – 2025-09-29</title>
      <itunes:episode>1</itunes:episode>
      <podcast:episode>1</podcast:episode>
      <itunes:title>2 Million Cisco Devices Targeted by Exploited 0-Day – 2025-09-29</itunes:title>
      <itunes:episodeType>full</itunes:episodeType>
      <guid isPermaLink="false">https://blubrry.com/bhis/148913604/2-million-cisco-devices-targeted-by-exploited-0-day-2025-09-29/</guid>
      <link>https://share.transistor.fm/s/c39a2d45</link>
      <description>
        <![CDATA[<p>Register for FREE Infosec Webcasts, Anti-casts &amp; Summits – 
https://poweredbybhis.com </p><p><br></p><p>00:00 - PreShow Banter™ — A little radiation never hurt anybody.</p><p>03:07 - BHIS - Talkin’ Bout [infosec] News 2025-09-29</p><p>03:29 - Story # 1: As many as 2 million Cisco devices affected by actively exploited 0-day</p><p>19:07 - Story # 2: Viral call-recording app Neon goes dark after exposing users’ phone numbers, call recordings, and transcripts | TechCrunch</p><p>24:25 - Story # 3: AI Darwin Awards Show AI’s Biggest Problem Is Human</p><p>29:32 - Story # 4: Nikon revokes all C2PA image authenticity certificates after major vulnerability exposed</p><p>34:14 - Story # 5: ‘You’ll never need to work again’: Criminals offer reporter money to hack BBC</p><p>38:18 - Story # 6: Cybersecurity Training Programs Don’t Prevent Employees from Falling for Phishing Scams</p><p>46:48 - Mini CTF Walkthrough</p><p>56:03 - Story # 7: U.S. Secret Service dismantles imminent telecommunications threat in New York tristate area</p>
<ul><li>(00:00) - PreShow Banter™ — A little radiation never hurt anybody.</li>
<li>(03:07) - BHIS - Talkin' Bout [infosec] News 2025-09-29</li>
<li>(03:28) - Story # 1: As many as 2 million Cisco devices affected by actively exploited 0-day</li>
<li>(19:06) - Story # 2: Viral call-recording app Neon goes dark after exposing users' phone numbers, call recordings, and transcripts | TechCrunch</li>
<li>(24:24) - Story # 3: AI Darwin Awards Show AI’s Biggest Problem Is Human</li>
<li>(29:31) - Story # 4: Nikon revokes all C2PA image authenticity certificates after major vulnerability exposed</li>
<li>(34:14) - Story # 5: 'You'll never need to work again': Criminals offer reporter money to hack BBC</li>
<li>(38:18) - Story # 6: Cybersecurity Training Programs Don’t Prevent Employees from Falling for Phishing Scams</li>
<li>(46:48) - Mini CTF Walkthrough</li>
<li>(56:02) - Story # 7: U.S. Secret Service dismantles imminent telecommunications threat in New York tristate area</li>
</ul>]]>
      </description>
      <content:encoded>
        <![CDATA[<p>Register for FREE Infosec Webcasts, Anti-casts &amp; Summits – 
https://poweredbybhis.com </p><p><br></p><p>00:00 - PreShow Banter™ — A little radiation never hurt anybody.</p><p>03:07 - BHIS - Talkin’ Bout [infosec] News 2025-09-29</p><p>03:29 - Story # 1: As many as 2 million Cisco devices affected by actively exploited 0-day</p><p>19:07 - Story # 2: Viral call-recording app Neon goes dark after exposing users’ phone numbers, call recordings, and transcripts | TechCrunch</p><p>24:25 - Story # 3: AI Darwin Awards Show AI’s Biggest Problem Is Human</p><p>29:32 - Story # 4: Nikon revokes all C2PA image authenticity certificates after major vulnerability exposed</p><p>34:14 - Story # 5: ‘You’ll never need to work again’: Criminals offer reporter money to hack BBC</p><p>38:18 - Story # 6: Cybersecurity Training Programs Don’t Prevent Employees from Falling for Phishing Scams</p><p>46:48 - Mini CTF Walkthrough</p><p>56:03 - Story # 7: U.S. Secret Service dismantles imminent telecommunications threat in New York tristate area</p>
<ul><li>(00:00) - PreShow Banter™ — A little radiation never hurt anybody.</li>
<li>(03:07) - BHIS - Talkin' Bout [infosec] News 2025-09-29</li>
<li>(03:28) - Story # 1: As many as 2 million Cisco devices affected by actively exploited 0-day</li>
<li>(19:06) - Story # 2: Viral call-recording app Neon goes dark after exposing users' phone numbers, call recordings, and transcripts | TechCrunch</li>
<li>(24:24) - Story # 3: AI Darwin Awards Show AI’s Biggest Problem Is Human</li>
<li>(29:31) - Story # 4: Nikon revokes all C2PA image authenticity certificates after major vulnerability exposed</li>
<li>(34:14) - Story # 5: 'You'll never need to work again': Criminals offer reporter money to hack BBC</li>
<li>(38:18) - Story # 6: Cybersecurity Training Programs Don’t Prevent Employees from Falling for Phishing Scams</li>
<li>(46:48) - Mini CTF Walkthrough</li>
<li>(56:02) - Story # 7: U.S. Secret Service dismantles imminent telecommunications threat in New York tristate area</li>
</ul>]]>
      </content:encoded>
      <pubDate>Wed, 01 Oct 2025 22:55:59 -0400</pubDate>
      <author>Black Hills Information Security</author>
      <enclosure url="https://media.transistor.fm/c39a2d45/ef2db1d5.mp3" length="60621150" type="audio/mpeg"/>
      <itunes:author>Black Hills Information Security</itunes:author>
      <itunes:image href="https://img.transistorcdn.com/wDmj7e_CeOEM_m_hXA41sMvMcPMPF1O21SMg79uycl0/rs:fill:0:0:1/w:1400/h:1400/q:60/mb:500000/aHR0cHM6Ly9pbWct/dXBsb2FkLXByb2R1/Y3Rpb24udHJhbnNp/c3Rvci5mbS8zMzYz/NTg1MTU2MzM3MmE3/NGY4YjZkM2RhMGI4/NDNiNy5qcGc.jpg"/>
      <itunes:duration>3690</itunes:duration>
      <itunes:summary>Register for FREE Infosec Webcasts, Anti-casts &amp;amp; Summits – 
https://poweredbybhis.com 00:00 - PreShow Banter™ — A little radiation never hurt anybody.03:07 - BHIS - Talkin’ Bout [infosec] News 2025-09-2903:29 - Story # 1: As many as 2 million Cisco devices affected by actively exploited 0-day19:07 - Story # 2: Viral call-recording app Neon goes dark after exposing users’ phone numbers, call recordings, and transcripts | TechCrunch24:25 - Story # 3: AI Darwin Awards Show AI’s Biggest Problem Is Human29:32 - Story # 4: Nikon revokes all C2PA image authenticity certificates after major vulnerability exposed34:14 - Story # 5: ‘You’ll never need to work again’: Criminals offer reporter money to hack BBC38:18 - Story # 6: Cybersecurity Training Programs Don’t Prevent Employees from Falling for Phishing Scams46:48 - Mini CTF Walkthrough56:03 - Story # 7: U.S. Secret Service dismantles imminent telecommunications threat in New York tristate area</itunes:summary>
      <itunes:subtitle>Register for FREE Infosec Webcasts, Anti-casts &amp;amp; Summits – 
https://poweredbybhis.com 00:00 - PreShow Banter™ — A little radiation never hurt anybody.03:07 - BHIS - Talkin’ Bout [infosec] News 2025-09-2903:29 - Story # 1: As many as 2 million Cisco de</itunes:subtitle>
      <itunes:keywords>Infosec,Cybersecurity,news</itunes:keywords>
      <itunes:explicit>No</itunes:explicit>
      <podcast:chapters url="https://share.transistor.fm/s/c39a2d45/chapters.json" type="application/json+chapters"/>
    </item>
    <item>
      <title>Dirk-Jan Mollema Walks Us Through the Entra ID Cross-Tenant Vulnerability Discovery– 2025-09-22</title>
      <itunes:episode>1</itunes:episode>
      <podcast:episode>1</podcast:episode>
      <itunes:title>Dirk-Jan Mollema Walks Us Through the Entra ID Cross-Tenant Vulnerability Discovery– 2025-09-22</itunes:title>
      <itunes:episodeType>full</itunes:episodeType>
      <guid isPermaLink="false">https://blubrry.com/bhis/148745401/dirk-jan-mollema-walks-us-through-the-entra-id-cross-tenant-vulnerability-discovery-2025-09-22/</guid>
      <link>https://share.transistor.fm/s/c77a6ea4</link>
      <description>
        <![CDATA[<p>Register for FREE Infosec Webcasts, Anti-casts &amp; Summits – https://poweredbybhis.com</p><p><br></p><p>00:00 - PreShow Banter™ — Unnatural European Fridges</p><p>03:34 - The Entra ID Cross-Tenant Vulnerability Discovery – BHIS - Talkin’ Bout [infosec] News 2025-09-22</p><p>04:14 - Story # 1: One Token to rule them all - obtaining Global Admin in every Entra ID tenant via Actor tokens</p><p>21:32 - Story # 2: Shai-Hulud: Self-Replicating Worm Compromises 500+ NPM Packages</p><p>40:50 - OSSPREY – NPM Package @Ctrl/Tinycolor Compromised: Shai Hulud Malware Targets Secrets and Persistence</p><p>51:41 - Story # 3: Verified Steam game steals streamer’s cancer treatment donations</p><p>57:16 - Story # 4: Heathrow warns of second day of disruption after cyber-attack</p>
<ul><li>(00:00) - PreShow Banter™ — Unnatural European Fridges</li>
<li>(03:07) - The Entra ID Cross-Tenant Vulnerability Discovery – BHIS - Talkin' Bout [infosec] News 2025-09-22</li>
<li>(03:45) - Story # 1: One Token to rule them all - obtaining Global Admin in every Entra ID tenant via Actor tokens</li>
<li>(20:09) - Story # 2: Shai-Hulud: Self-Replicating Worm Compromises 500+ NPM Packages</li>
<li>(38:51) - OSSPREY – NPM Package @Ctrl/Tinycolor Compromised: Shai Hulud Malware Targets Secrets and Persistence</li>
<li>(49:28) - Story # 3: Verified Steam game steals streamer's cancer treatment donations</li>
<li>(54:51) - Story # 4: Heathrow warns of second day of disruption after cyber-attack</li>
</ul>]]>
      </description>
      <content:encoded>
        <![CDATA[<p>Register for FREE Infosec Webcasts, Anti-casts &amp; Summits – https://poweredbybhis.com</p><p><br></p><p>00:00 - PreShow Banter™ — Unnatural European Fridges</p><p>03:34 - The Entra ID Cross-Tenant Vulnerability Discovery – BHIS - Talkin’ Bout [infosec] News 2025-09-22</p><p>04:14 - Story # 1: One Token to rule them all - obtaining Global Admin in every Entra ID tenant via Actor tokens</p><p>21:32 - Story # 2: Shai-Hulud: Self-Replicating Worm Compromises 500+ NPM Packages</p><p>40:50 - OSSPREY – NPM Package @Ctrl/Tinycolor Compromised: Shai Hulud Malware Targets Secrets and Persistence</p><p>51:41 - Story # 3: Verified Steam game steals streamer’s cancer treatment donations</p><p>57:16 - Story # 4: Heathrow warns of second day of disruption after cyber-attack</p>
<ul><li>(00:00) - PreShow Banter™ — Unnatural European Fridges</li>
<li>(03:07) - The Entra ID Cross-Tenant Vulnerability Discovery – BHIS - Talkin' Bout [infosec] News 2025-09-22</li>
<li>(03:45) - Story # 1: One Token to rule them all - obtaining Global Admin in every Entra ID tenant via Actor tokens</li>
<li>(20:09) - Story # 2: Shai-Hulud: Self-Replicating Worm Compromises 500+ NPM Packages</li>
<li>(38:51) - OSSPREY – NPM Package @Ctrl/Tinycolor Compromised: Shai Hulud Malware Targets Secrets and Persistence</li>
<li>(49:28) - Story # 3: Verified Steam game steals streamer's cancer treatment donations</li>
<li>(54:51) - Story # 4: Heathrow warns of second day of disruption after cyber-attack</li>
</ul>]]>
      </content:encoded>
      <pubDate>Wed, 24 Sep 2025 23:03:00 -0400</pubDate>
      <author>Black Hills Information Security</author>
      <enclosure url="https://media.transistor.fm/c77a6ea4/3f4ef566.mp3" length="59202178" type="audio/mpeg"/>
      <itunes:author>Black Hills Information Security</itunes:author>
      <itunes:image href="https://img.transistorcdn.com/9ZsJnw9W1TmBkAX_Z8soshDitXyT5-KkPa7X3-FVsuE/rs:fill:0:0:1/w:1400/h:1400/q:60/mb:500000/aHR0cHM6Ly9pbWct/dXBsb2FkLXByb2R1/Y3Rpb24udHJhbnNp/c3Rvci5mbS9kYTYx/MmEzMjEyNjE3Njky/YjYwMGVlMWEwNGJm/Zjk5ZC5qcGc.jpg"/>
      <itunes:duration>3619</itunes:duration>
      <itunes:summary>Register for FREE Infosec Webcasts, Anti-casts &amp;amp; Summits – https://poweredbybhis.com00:00 - PreShow Banter™ — Unnatural European Fridges03:34 - The Entra ID Cross-Tenant Vulnerability Discovery – BHIS - Talkin’ Bout [infosec] News 2025-09-2204:14 - Story # 1: One Token to rule them all - obtaining Global Admin in every Entra ID tenant via Actor tokens21:32 - Story # 2: Shai-Hulud: Self-Replicating Worm Compromises 500+ NPM Packages40:50 - OSSPREY – NPM Package @Ctrl/Tinycolor Compromised: Shai Hulud Malware Targets Secrets and Persistence51:41 - Story # 3: Verified Steam game steals streamer’s cancer treatment donations57:16 - Story # 4: Heathrow warns of second day of disruption after cyber-attack</itunes:summary>
      <itunes:subtitle>Register for FREE Infosec Webcasts, Anti-casts &amp;amp; Summits – https://poweredbybhis.com00:00 - PreShow Banter™ — Unnatural European Fridges03:34 - The Entra ID Cross-Tenant Vulnerability Discovery – BHIS - Talkin’ Bout [infosec] News 2025-09-2204:14 - St</itunes:subtitle>
      <itunes:keywords>Infosec,Cybersecurity,news</itunes:keywords>
      <itunes:explicit>No</itunes:explicit>
      <podcast:chapters url="https://share.transistor.fm/s/c77a6ea4/chapters.json" type="application/json+chapters"/>
    </item>
    <item>
      <title>Kerberoasting Goes to Washington – 2025-09-15</title>
      <itunes:episode>1</itunes:episode>
      <podcast:episode>1</podcast:episode>
      <itunes:title>Kerberoasting Goes to Washington – 2025-09-15</itunes:title>
      <itunes:episodeType>full</itunes:episodeType>
      <guid isPermaLink="false">https://blubrry.com/bhis/148630611/kerberoasting-goes-to-washington-2025-09-15/</guid>
      <link>https://share.transistor.fm/s/8e12936d</link>
      <description>
        <![CDATA[<p>???? Register for FREE Infosec Webcasts, Anti-casts &amp; Summits – 
https://poweredbybhis.com </p><p><br></p><p>00:00 - PreShow Banter™ — Enter Dark John</p><p>03:15 - Kerberoasting Goes to Washington – BHIS - Talkin’ Bout [infosec] News 2025-09-15</p><p>03:49 - Story # 1: Senator blasts Microsoft for making default Windows vulnerable to “Kerberoasting”</p><p>12:46 - Story # 2: How an Attacker’s Blunder Gave Us a Rare Look Inside Their Day-to-Day Operations</p><p>32:42 - Story # 3: Some JLR suppliers ‘face bankruptcy’ due to hack crisis</p><p>41:30 - Story # 4: AI-Powered Villager Pen Testing Tool Hits 11,000 PyPI Downloads Amid Abuse Concerns</p><p>46:07 - Story # 5: All your vulns are belong to us! CISA wants to maintain gov control of CVE program</p><p>49:55 - Story # 6: Qantas penalizes executives for July cyberattack</p><p>51:15 - Story # 7: America’s second largest egg producer breached, claim hackers</p><p>54:55 - Story # 8: Undocumented Radios Found in Solar-Powered Devices</p>
<ul><li>(00:00) - PreShow Banter™ — Enter Dark John</li>
<li>(03:14) - Kerberoasting Goes to Washington – BHIS - Talkin' Bout [infosec] News 2025-09-15</li>
<li>(03:49) - Story # 1: Senator blasts Microsoft for making default Windows vulnerable to “Kerberoasting”</li>
<li>(12:46) - Story # 2: How an Attacker’s Blunder Gave Us a Rare Look Inside Their Day-to-Day Operations</li>
<li>(32:41) - Story # 3: Some JLR suppliers 'face bankruptcy' due to hack crisis</li>
<li>(41:29) - Story # 4: AI-Powered Villager Pen Testing Tool Hits 11,000 PyPI Downloads Amid Abuse Concerns</li>
<li>(46:06) - Story # 5: All your vulns are belong to us! CISA wants to maintain gov control of CVE program</li>
<li>(49:54) - Story # 6: Qantas penalizes executives for July cyberattack</li>
<li>(51:14) - Story # 7: America’s second largest egg producer breached, claim hackers</li>
<li>(54:55) - Story # 8: Undocumented Radios Found in Solar-Powered Devices</li>
</ul>]]>
      </description>
      <content:encoded>
        <![CDATA[<p>???? Register for FREE Infosec Webcasts, Anti-casts &amp; Summits – 
https://poweredbybhis.com </p><p><br></p><p>00:00 - PreShow Banter™ — Enter Dark John</p><p>03:15 - Kerberoasting Goes to Washington – BHIS - Talkin’ Bout [infosec] News 2025-09-15</p><p>03:49 - Story # 1: Senator blasts Microsoft for making default Windows vulnerable to “Kerberoasting”</p><p>12:46 - Story # 2: How an Attacker’s Blunder Gave Us a Rare Look Inside Their Day-to-Day Operations</p><p>32:42 - Story # 3: Some JLR suppliers ‘face bankruptcy’ due to hack crisis</p><p>41:30 - Story # 4: AI-Powered Villager Pen Testing Tool Hits 11,000 PyPI Downloads Amid Abuse Concerns</p><p>46:07 - Story # 5: All your vulns are belong to us! CISA wants to maintain gov control of CVE program</p><p>49:55 - Story # 6: Qantas penalizes executives for July cyberattack</p><p>51:15 - Story # 7: America’s second largest egg producer breached, claim hackers</p><p>54:55 - Story # 8: Undocumented Radios Found in Solar-Powered Devices</p>
<ul><li>(00:00) - PreShow Banter™ — Enter Dark John</li>
<li>(03:14) - Kerberoasting Goes to Washington – BHIS - Talkin' Bout [infosec] News 2025-09-15</li>
<li>(03:49) - Story # 1: Senator blasts Microsoft for making default Windows vulnerable to “Kerberoasting”</li>
<li>(12:46) - Story # 2: How an Attacker’s Blunder Gave Us a Rare Look Inside Their Day-to-Day Operations</li>
<li>(32:41) - Story # 3: Some JLR suppliers 'face bankruptcy' due to hack crisis</li>
<li>(41:29) - Story # 4: AI-Powered Villager Pen Testing Tool Hits 11,000 PyPI Downloads Amid Abuse Concerns</li>
<li>(46:06) - Story # 5: All your vulns are belong to us! CISA wants to maintain gov control of CVE program</li>
<li>(49:54) - Story # 6: Qantas penalizes executives for July cyberattack</li>
<li>(51:14) - Story # 7: America’s second largest egg producer breached, claim hackers</li>
<li>(54:55) - Story # 8: Undocumented Radios Found in Solar-Powered Devices</li>
</ul>]]>
      </content:encoded>
      <pubDate>Fri, 19 Sep 2025 21:02:04 -0400</pubDate>
      <author>Black Hills Information Security</author>
      <enclosure url="https://media.transistor.fm/8e12936d/7a48f32e.mp3" length="62214224" type="audio/mpeg"/>
      <itunes:author>Black Hills Information Security</itunes:author>
      <itunes:image href="https://img.transistorcdn.com/MW1tw-bSaRkloeFoIvi_BAri6C1CrxRGa7nE5vGRIyY/rs:fill:0:0:1/w:1400/h:1400/q:60/mb:500000/aHR0cHM6Ly9pbWct/dXBsb2FkLXByb2R1/Y3Rpb24udHJhbnNp/c3Rvci5mbS83YWUz/YmY1ZmZmN2EwYmVj/NTdiYTdiODg5ZjI3/NGUzNy5qcGc.jpg"/>
      <itunes:duration>3778</itunes:duration>
      <itunes:summary>???? Register for FREE Infosec Webcasts, Anti-casts &amp;amp; Summits – 
https://poweredbybhis.com 00:00 - PreShow Banter™ — Enter Dark John03:15 - Kerberoasting Goes to Washington – BHIS - Talkin’ Bout [infosec] News 2025-09-1503:49 - Story # 1: Senator blasts Microsoft for making default Windows vulnerable to “Kerberoasting”12:46 - Story # 2: How an Attacker’s Blunder Gave Us a Rare Look Inside Their Day-to-Day Operations32:42 - Story # 3: Some JLR suppliers ‘face bankruptcy’ due to hack crisis41:30 - Story # 4: AI-Powered Villager Pen Testing Tool Hits 11,000 PyPI Downloads Amid Abuse Concerns46:07 - Story # 5: All your vulns are belong to us! CISA wants to maintain gov control of CVE program49:55 - Story # 6: Qantas penalizes executives for July cyberattack51:15 - Story # 7: America’s second largest egg producer breached, claim hackers54:55 - Story # 8: Undocumented Radios Found in Solar-Powered Devices</itunes:summary>
      <itunes:subtitle>???? Register for FREE Infosec Webcasts, Anti-casts &amp;amp; Summits – 
https://poweredbybhis.com 00:00 - PreShow Banter™ — Enter Dark John03:15 - Kerberoasting Goes to Washington – BHIS - Talkin’ Bout [infosec] News 2025-09-1503:49 - Story # 1: Senator blas</itunes:subtitle>
      <itunes:keywords>Infosec,Cybersecurity,news</itunes:keywords>
      <itunes:explicit>No</itunes:explicit>
      <podcast:chapters url="https://share.transistor.fm/s/8e12936d/chapters.json" type="application/json+chapters"/>
    </item>
    <item>
      <title>Anthropic 1.5 Billion © Settlement - 2025-09-08</title>
      <itunes:episode>1</itunes:episode>
      <podcast:episode>1</podcast:episode>
      <itunes:title>Anthropic 1.5 Billion © Settlement - 2025-09-08</itunes:title>
      <itunes:episodeType>full</itunes:episodeType>
      <guid isPermaLink="false">https://blubrry.com/bhis/148406425/anthropic-15-billion-settlement-2025-09-08/</guid>
      <link>https://share.transistor.fm/s/273513da</link>
      <description>
        <![CDATA[<p>Register for FREE Infosec Webcasts, Anti-casts &amp; Summits – </p><p>https://poweredbybhis.com</p><p><br></p><p>00:00 - PreShow Banter™ — If I Were French</p><p>04:35 - Anthropic 1.5 Billion © Settlement - BHIS - Talkin’ Bout [infosec] News 2025-09-08</p><p>05:48 - Hackers Threaten to Submit Artists’ Data to AI Models If Art Site Doesn’t Pay Up</p><p>08:40 - Anthropic Agrees to Pay Authors at Least $1.5 Billion in AI Copyright Settlement</p><p>23:58 - This Company Turns Dashcams into ‘Virtual CCTV Cameras.’ Then Hackers Got In</p><p>33:38 - Ice obtains access to Israeli-made spyware that can hack phones and encrypted apps</p><p>40:07 - Cloudflare Blocks Record-Breaking 11.5 Tbps DDoS Attack</p><p>44:27 - npm Packages With 2 Billion Weekly Downloads Hacked in Major Attack</p><p>46:38 - Update on Mandiant Drift and Salesloft Application Investigations</p><p>51:04 - M&amp;S hackers claim to be behind Jaguar Land Rover cyber attack</p><p>51:55 - New TP-Link zero-day surfaces as CISA warns other flaws are exploited</p><p>54:52 - ChickenSec: US turns to Russia for chicken eggs for the first time in 32 years, despite sanctions to cripple its economy</p><p>57:58 - Cybercriminals Exploit X’s Grok AI to Bypass Ad Protections and Spread Malware to Millions</p>
<ul><li>(00:00) - PreShow Banter™ — If I Were French</li>
<li>(04:35) - Anthropic 1.5 Billion © Settlement - BHIS - Talkin' Bout [infosec] News 2025-09-08</li>
<li>(05:47) - Hackers Threaten to Submit Artists' Data to AI Models If Art Site Doesn't Pay Up</li>
<li>(08:40) - Anthropic Agrees to Pay Authors at Least $1.5 Billion in AI Copyright Settlement</li>
<li>(23:57) - This Company Turns Dashcams into ‘Virtual CCTV Cameras.’ Then Hackers Got In</li>
<li>(33:38) - Ice obtains access to Israeli-made spyware that can hack phones and encrypted apps</li>
<li>(40:07) - Cloudflare Blocks Record-Breaking 11.5 Tbps DDoS Attack</li>
<li>(44:26) - npm Packages With 2 Billion Weekly Downloads Hacked in Major Attack</li>
<li>(46:37) - Update on Mandiant Drift and Salesloft Application Investigations</li>
<li>(51:03) - M&amp;S hackers claim to be behind Jaguar Land Rover cyber attack</li>
<li>(51:54) - New TP-Link zero-day surfaces as CISA warns other flaws are exploited</li>
<li>(54:52) - ChickenSec: US turns to Russia for chicken eggs for the first time in 32 years, despite sanctions to cripple its economy</li>
<li>(57:57) - Cybercriminals Exploit X's Grok AI to Bypass Ad Protections and Spread Malware to Millions</li>
</ul>]]>
      </description>
      <content:encoded>
        <![CDATA[<p>Register for FREE Infosec Webcasts, Anti-casts &amp; Summits – </p><p>https://poweredbybhis.com</p><p><br></p><p>00:00 - PreShow Banter™ — If I Were French</p><p>04:35 - Anthropic 1.5 Billion © Settlement - BHIS - Talkin’ Bout [infosec] News 2025-09-08</p><p>05:48 - Hackers Threaten to Submit Artists’ Data to AI Models If Art Site Doesn’t Pay Up</p><p>08:40 - Anthropic Agrees to Pay Authors at Least $1.5 Billion in AI Copyright Settlement</p><p>23:58 - This Company Turns Dashcams into ‘Virtual CCTV Cameras.’ Then Hackers Got In</p><p>33:38 - Ice obtains access to Israeli-made spyware that can hack phones and encrypted apps</p><p>40:07 - Cloudflare Blocks Record-Breaking 11.5 Tbps DDoS Attack</p><p>44:27 - npm Packages With 2 Billion Weekly Downloads Hacked in Major Attack</p><p>46:38 - Update on Mandiant Drift and Salesloft Application Investigations</p><p>51:04 - M&amp;S hackers claim to be behind Jaguar Land Rover cyber attack</p><p>51:55 - New TP-Link zero-day surfaces as CISA warns other flaws are exploited</p><p>54:52 - ChickenSec: US turns to Russia for chicken eggs for the first time in 32 years, despite sanctions to cripple its economy</p><p>57:58 - Cybercriminals Exploit X’s Grok AI to Bypass Ad Protections and Spread Malware to Millions</p>
<ul><li>(00:00) - PreShow Banter™ — If I Were French</li>
<li>(04:35) - Anthropic 1.5 Billion © Settlement - BHIS - Talkin' Bout [infosec] News 2025-09-08</li>
<li>(05:47) - Hackers Threaten to Submit Artists' Data to AI Models If Art Site Doesn't Pay Up</li>
<li>(08:40) - Anthropic Agrees to Pay Authors at Least $1.5 Billion in AI Copyright Settlement</li>
<li>(23:57) - This Company Turns Dashcams into ‘Virtual CCTV Cameras.’ Then Hackers Got In</li>
<li>(33:38) - Ice obtains access to Israeli-made spyware that can hack phones and encrypted apps</li>
<li>(40:07) - Cloudflare Blocks Record-Breaking 11.5 Tbps DDoS Attack</li>
<li>(44:26) - npm Packages With 2 Billion Weekly Downloads Hacked in Major Attack</li>
<li>(46:37) - Update on Mandiant Drift and Salesloft Application Investigations</li>
<li>(51:03) - M&amp;S hackers claim to be behind Jaguar Land Rover cyber attack</li>
<li>(51:54) - New TP-Link zero-day surfaces as CISA warns other flaws are exploited</li>
<li>(54:52) - ChickenSec: US turns to Russia for chicken eggs for the first time in 32 years, despite sanctions to cripple its economy</li>
<li>(57:57) - Cybercriminals Exploit X's Grok AI to Bypass Ad Protections and Spread Malware to Millions</li>
</ul>]]>
      </content:encoded>
      <pubDate>Wed, 10 Sep 2025 18:20:50 -0400</pubDate>
      <author>Black Hills Information Security</author>
      <enclosure url="https://media.transistor.fm/273513da/dc06b557.mp3" length="59597881" type="audio/mpeg"/>
      <itunes:author>Black Hills Information Security</itunes:author>
      <itunes:image href="https://img.transistorcdn.com/4qTwO54S_f471zug3blVNnzI7oeWEzUxABLmjIY-cVA/rs:fill:0:0:1/w:1400/h:1400/q:60/mb:500000/aHR0cHM6Ly9pbWct/dXBsb2FkLXByb2R1/Y3Rpb24udHJhbnNp/c3Rvci5mbS9mNzcz/NTU0YmZmZTNmNDdl/YjM4MWE4YTg2ZjM3/YTJmZC5qcGc.jpg"/>
      <itunes:duration>3594</itunes:duration>
      <itunes:summary>Register for FREE Infosec Webcasts, Anti-casts &amp;amp; Summits – https://poweredbybhis.com00:00 - PreShow Banter™ — If I Were French04:35 - Anthropic 1.5 Billion © Settlement - BHIS - Talkin’ Bout [infosec] News 2025-09-0805:48 - Hackers Threaten to Submit Artists’ Data to AI Models If Art Site Doesn’t Pay Up08:40 - Anthropic Agrees to Pay Authors at Least $1.5 Billion in AI Copyright Settlement23:58 - This Company Turns Dashcams into ‘Virtual CCTV Cameras.’ Then Hackers Got In33:38 - Ice obtains access to Israeli-made spyware that can hack phones and encrypted apps40:07 - Cloudflare Blocks Record-Breaking 11.5 Tbps DDoS Attack44:27 - npm Packages With 2 Billion Weekly Downloads Hacked in Major Attack46:38 - Update on Mandiant Drift and Salesloft Application Investigations51:04 - M&amp;amp;S hackers claim to be behind Jaguar Land Rover cyber attack51:55 - New TP-Link zero-day surfaces as CISA warns other flaws are exploited54:52 - ChickenSec: US turns to Russia for chicken eggs for the first time in 32 years, despite sanctions to cripple its economy57:58 - Cybercriminals Exploit X’s Grok AI to Bypass Ad Protections and Spread Malware to Millions</itunes:summary>
      <itunes:subtitle>Register for FREE Infosec Webcasts, Anti-casts &amp;amp; Summits – https://poweredbybhis.com00:00 - PreShow Banter™ — If I Were French04:35 - Anthropic 1.5 Billion © Settlement - BHIS - Talkin’ Bout [infosec] News 2025-09-0805:48 - Hackers Threaten to Submit </itunes:subtitle>
      <itunes:keywords>Infosec,Cybersecurity,news</itunes:keywords>
      <itunes:explicit>No</itunes:explicit>
      <podcast:chapters url="https://share.transistor.fm/s/273513da/chapters.json" type="application/json+chapters"/>
    </item>
    <item>
      <title>Chinese agent tried to recruit Stanford Student - 2025-09-02</title>
      <itunes:episode>1</itunes:episode>
      <podcast:episode>1</podcast:episode>
      <itunes:title>Chinese agent tried to recruit Stanford Student - 2025-09-02</itunes:title>
      <itunes:episodeType>full</itunes:episodeType>
      <guid isPermaLink="false">https://blubrry.com/bhis/148305701/chinese-agent-tried-to-recruit-stanford-student-2025-09-02/</guid>
      <link>https://share.transistor.fm/s/2963e9e1</link>
      <description>
        <![CDATA[<p>Register for FREE Infosec Webcasts, Anti-casts &amp; Summits – </p><p>https://poweredbybhis.com</p><p><br></p><p><br></p><p>00:00 - PreShow Banter™ — It’s 8ft skeleton season.</p><p>02:18 - BHIS - Talkin’ Bout [infosec] News 2025-09-02</p><p>03:07 - Story # 1: Salesloft breached to steal OAuth tokens for Salesforce data-theft attacks</p><p>07:35 - Story # 2: DSLRoot, Proxies, and the Threat of ‘Legal Botnets’</p><p>13:46 - Story # 3: Attackers Abuse Velociraptor Forensic Tool to Deploy Visual Studio Code for C2 Tunneling</p><p>17:44 - Story # 4: Ransomware crooks knock Swedish municipalities offline for measly sum of $168K</p><p>19:39 - Story # 5: As crippling cyberattack against Nevada continues, Lombardo says ‘we’re working through it.’</p><p>20:56 - Story # 6: Citrix forgot to tell you CVE-2025–6543 has been used as a zero day since May 2025</p><p>22:43 - Story # 7: NetScaler ADC and NetScaler Gateway Security Bulletin for CVE-2025-7775, CVE-2025-7776 and CVE-2025-8424</p><p>25:20 - Story # 8: First known AI-powered ransomware uncovered by ESET Research</p><p>30:00 - Story # 9: In the rush to adopt hot new tech, security is often forgotten. AI is no exception</p><p>32:06 - Story # 10: TransUnion suffers data breach impacting over 4.4 million people</p><p>34:17 - Story # 11: ChickenSec FollowUp: Artificial Intelligence: The other AI</p><p>35:20 - Story # 12: They weren’t lovin’ it - hacker cracks McDonald’s security in quest for free nuggets, and it was apparently not too tricky</p><p>39:29 - Identify the birds you see or hear with Merlin Bird ID</p><p>40:04 - Story # 13: Detecting and countering misuse of AI: August 2025</p><p>51:31 - Story # 14: I’m a Stanford student. A Chinese agent tried to recruit me as a spy</p>
<ul><li>(00:00) - PreShow Banter™ — It’s 8ft skeleton season.</li>
<li>(02:17) - BHIS - Talkin' Bout [infosec] News 2025-09-02</li>
<li>(03:07) - Story # 1: Salesloft breached to steal OAuth tokens for Salesforce data-theft attacks</li>
<li>(07:35) - Story # 2: DSLRoot, Proxies, and the Threat of ‘Legal Botnets’</li>
<li>(13:46) - Story # 3: Attackers Abuse Velociraptor Forensic Tool to Deploy Visual Studio Code for C2 Tunneling</li>
<li>(17:44) - Story # 4: Ransomware crooks knock Swedish municipalities offline for measly sum of $168K</li>
<li>(19:39) - Story # 5: As crippling cyberattack against Nevada continues, Lombardo says ‘we’re working through it.’</li>
<li>(20:56) - Story # 6: Citrix forgot to tell you CVE-2025–6543 has been used as a zero day since May 2025</li>
<li>(22:43) - Story # 7: NetScaler ADC and NetScaler Gateway Security Bulletin for CVE-2025-7775, CVE-2025-7776 and CVE-2025-8424</li>
<li>(25:19) - Story # 8: First known AI-powered ransomware uncovered by ESET Research</li>
<li>(30:00) - Story # 9: In the rush to adopt hot new tech, security is often forgotten. AI is no exception</li>
<li>(32:05) - Story # 10: TransUnion suffers data breach impacting over 4.4 million people</li>
<li>(34:16) - Story # 11: ChickenSec FollowUp: Artificial Intelligence: The other AI</li>
<li>(35:20) - Story # 12: They weren't lovin' it - hacker cracks McDonald's security in quest for free nuggets, and it was apparently not too tricky</li>
<li>(39:29) - Identify the birds you see or hear with Merlin Bird ID</li>
<li>(40:03) - Story # 13: Detecting and countering misuse of AI: August 2025</li>
<li>(51:31) - Story # 14: I’m a Stanford student. A Chinese agent tried to recruit me as a spy</li>
</ul>]]>
      </description>
      <content:encoded>
        <![CDATA[<p>Register for FREE Infosec Webcasts, Anti-casts &amp; Summits – </p><p>https://poweredbybhis.com</p><p><br></p><p><br></p><p>00:00 - PreShow Banter™ — It’s 8ft skeleton season.</p><p>02:18 - BHIS - Talkin’ Bout [infosec] News 2025-09-02</p><p>03:07 - Story # 1: Salesloft breached to steal OAuth tokens for Salesforce data-theft attacks</p><p>07:35 - Story # 2: DSLRoot, Proxies, and the Threat of ‘Legal Botnets’</p><p>13:46 - Story # 3: Attackers Abuse Velociraptor Forensic Tool to Deploy Visual Studio Code for C2 Tunneling</p><p>17:44 - Story # 4: Ransomware crooks knock Swedish municipalities offline for measly sum of $168K</p><p>19:39 - Story # 5: As crippling cyberattack against Nevada continues, Lombardo says ‘we’re working through it.’</p><p>20:56 - Story # 6: Citrix forgot to tell you CVE-2025–6543 has been used as a zero day since May 2025</p><p>22:43 - Story # 7: NetScaler ADC and NetScaler Gateway Security Bulletin for CVE-2025-7775, CVE-2025-7776 and CVE-2025-8424</p><p>25:20 - Story # 8: First known AI-powered ransomware uncovered by ESET Research</p><p>30:00 - Story # 9: In the rush to adopt hot new tech, security is often forgotten. AI is no exception</p><p>32:06 - Story # 10: TransUnion suffers data breach impacting over 4.4 million people</p><p>34:17 - Story # 11: ChickenSec FollowUp: Artificial Intelligence: The other AI</p><p>35:20 - Story # 12: They weren’t lovin’ it - hacker cracks McDonald’s security in quest for free nuggets, and it was apparently not too tricky</p><p>39:29 - Identify the birds you see or hear with Merlin Bird ID</p><p>40:04 - Story # 13: Detecting and countering misuse of AI: August 2025</p><p>51:31 - Story # 14: I’m a Stanford student. A Chinese agent tried to recruit me as a spy</p>
<ul><li>(00:00) - PreShow Banter™ — It’s 8ft skeleton season.</li>
<li>(02:17) - BHIS - Talkin' Bout [infosec] News 2025-09-02</li>
<li>(03:07) - Story # 1: Salesloft breached to steal OAuth tokens for Salesforce data-theft attacks</li>
<li>(07:35) - Story # 2: DSLRoot, Proxies, and the Threat of ‘Legal Botnets’</li>
<li>(13:46) - Story # 3: Attackers Abuse Velociraptor Forensic Tool to Deploy Visual Studio Code for C2 Tunneling</li>
<li>(17:44) - Story # 4: Ransomware crooks knock Swedish municipalities offline for measly sum of $168K</li>
<li>(19:39) - Story # 5: As crippling cyberattack against Nevada continues, Lombardo says ‘we’re working through it.’</li>
<li>(20:56) - Story # 6: Citrix forgot to tell you CVE-2025–6543 has been used as a zero day since May 2025</li>
<li>(22:43) - Story # 7: NetScaler ADC and NetScaler Gateway Security Bulletin for CVE-2025-7775, CVE-2025-7776 and CVE-2025-8424</li>
<li>(25:19) - Story # 8: First known AI-powered ransomware uncovered by ESET Research</li>
<li>(30:00) - Story # 9: In the rush to adopt hot new tech, security is often forgotten. AI is no exception</li>
<li>(32:05) - Story # 10: TransUnion suffers data breach impacting over 4.4 million people</li>
<li>(34:16) - Story # 11: ChickenSec FollowUp: Artificial Intelligence: The other AI</li>
<li>(35:20) - Story # 12: They weren't lovin' it - hacker cracks McDonald's security in quest for free nuggets, and it was apparently not too tricky</li>
<li>(39:29) - Identify the birds you see or hear with Merlin Bird ID</li>
<li>(40:03) - Story # 13: Detecting and countering misuse of AI: August 2025</li>
<li>(51:31) - Story # 14: I’m a Stanford student. A Chinese agent tried to recruit me as a spy</li>
</ul>]]>
      </content:encoded>
      <pubDate>Sat, 06 Sep 2025 12:03:47 -0400</pubDate>
      <author>Black Hills Information Security</author>
      <enclosure url="https://media.transistor.fm/2963e9e1/af2a3994.mp3" length="56498652" type="audio/mpeg"/>
      <itunes:author>Black Hills Information Security</itunes:author>
      <itunes:image href="https://img.transistorcdn.com/yfKqcngyO6m-qRWi5DMgCC_OjA_ROA9SCuSInJas4-g/rs:fill:0:0:1/w:1400/h:1400/q:60/mb:500000/aHR0cHM6Ly9pbWct/dXBsb2FkLXByb2R1/Y3Rpb24udHJhbnNp/c3Rvci5mbS8wMGI0/ODdjNDBmYjY2MjAy/Zjk5Yjk5MTgwNjY5/N2JiOC5qcGc.jpg"/>
      <itunes:duration>3374</itunes:duration>
      <itunes:summary>Register for FREE Infosec Webcasts, Anti-casts &amp;amp; Summits – https://poweredbybhis.com00:00 - PreShow Banter™ — It’s 8ft skeleton season.02:18 - BHIS - Talkin’ Bout [infosec] News 2025-09-0203:07 - Story # 1: Salesloft breached to steal OAuth tokens for Salesforce data-theft attacks07:35 - Story # 2: DSLRoot, Proxies, and the Threat of ‘Legal Botnets’13:46 - Story # 3: Attackers Abuse Velociraptor Forensic Tool to Deploy Visual Studio Code for C2 Tunneling17:44 - Story # 4: Ransomware crooks knock Swedish municipalities offline for measly sum of $168K19:39 - Story # 5: As crippling cyberattack against Nevada continues, Lombardo says ‘we’re working through it.’20:56 - Story # 6: Citrix forgot to tell you CVE-2025–6543 has been used as a zero day since May 202522:43 - Story # 7: NetScaler ADC and NetScaler Gateway Security Bulletin for CVE-2025-7775, CVE-2025-7776 and CVE-2025-842425:20 - Story # 8: First known AI-powered ransomware uncovered by ESET Research30:00 - Story # 9: In the rush to adopt hot new tech, security is often forgotten. AI is no exception32:06 - Story # 10: TransUnion suffers data breach impacting over 4.4 million people34:17 - Story # 11: ChickenSec FollowUp: Artificial Intelligence: The other AI35:20 - Story # 12: They weren’t lovin’ it - hacker cracks McDonald’s security in quest for free nuggets, and it was apparently not too tricky39:29 - Identify the birds you see or hear with Merlin Bird ID40:04 - Story # 13: Detecting and countering misuse of AI: August 202551:31 - Story # 14: I’m a Stanford student. A Chinese agent tried to recruit me as a spy</itunes:summary>
      <itunes:subtitle>Register for FREE Infosec Webcasts, Anti-casts &amp;amp; Summits – https://poweredbybhis.com00:00 - PreShow Banter™ — It’s 8ft skeleton season.02:18 - BHIS - Talkin’ Bout [infosec] News 2025-09-0203:07 - Story # 1: Salesloft breached to steal OAuth tokens for</itunes:subtitle>
      <itunes:keywords>Infosec,Cybersecurity,news</itunes:keywords>
      <itunes:explicit>No</itunes:explicit>
      <podcast:chapters url="https://share.transistor.fm/s/2963e9e1/chapters.json" type="application/json+chapters"/>
    </item>
    <item>
      <title>The Impending AI Bubble 2025-08-25</title>
      <itunes:episode>1</itunes:episode>
      <podcast:episode>1</podcast:episode>
      <itunes:title>The Impending AI Bubble 2025-08-25</itunes:title>
      <itunes:episodeType>full</itunes:episodeType>
      <guid isPermaLink="false">https://blubrry.com/bhis/148148589/the-impending-ai-bubble-2025-08-25/</guid>
      <link>https://share.transistor.fm/s/ba10a614</link>
      <description>
        <![CDATA[<p>Register for FREE Infosec Webcasts, Anti-casts &amp; Summits – </p><p>https://poweredbybhis.com</p><p><br></p><p>00:00 - PreShow Banter™ — Canadian Chicken</p><p>02:01 - The AI Bubble BHIS - Talkin’ Bout [infosec] News 2025-08-25</p><p>02:23 - Story # 1: Congressman proposes bringing back letters of marque for cyber privateers</p><p>09:27 - Story # 2: SIM-Swapper, Scattered Spider Hacker Gets 10 Years</p><p>12:43 - Story # 3: Developer jailed for taking down employer’s network with kill switch malware</p><p>16:33 - Story # 4: Agentic Browser Security: Indirect Prompt Injection in Perplexity Comet</p><p>20:42 - The Utopia Chronicles</p><p>23:20 - Story # 5: “Unstoppable Power Surges”: China’s Quantum Processor Outspeeds Supercomputers by 1 Quadrillion and Triggers US Intelligence Panic</p><p>28:47 - Story # 6: Bank forced to rehire workers after lying about chatbot productivity, union says</p><p>41:21 - Story # 7: It Took Many Years And Billions Of Dollars, But Microsoft Finally Invented A Calculator That Is Wrong Sometimes</p><p>43:41 - Story # 8: Copilot Broke Your Audit Log, but Microsoft Won’t Tell You</p><p>46:33 - Story # 9: Russian state-sponsored espionage group Static Tundra compromises unpatched end-of-life network devices</p><p>49:24 - Story # 10 : Zero-Day Clickjacking Flaws Found in Password Managers Used by Millions</p><p>53:12 - Story # 11: Cybersecurity training doesn’t work: time wasted with no impact, study finds</p><p>59:07 - ChickenSec: Artificial Intelligence: The other AI</p>
<ul><li>(00:00) - PreShow Banter™ — Canadian Chicken</li>
<li>(02:01) - The AI Bubble BHIS - Talkin' Bout [infosec] News 2025-08-25</li>
<li>(02:23) - Story # 1: Congressman proposes bringing back letters of marque for cyber privateers</li>
<li>(09:27) - Story # 2: SIM-Swapper, Scattered Spider Hacker Gets 10 Years</li>
<li>(12:42) - Story # 3: Developer jailed for taking down employer's network with kill switch malware</li>
<li>(16:33) - Story # 4: Agentic Browser Security: Indirect Prompt Injection in Perplexity Comet</li>
<li>(20:41) - The Utopia Chronicles</li>
<li>(23:20) - Story # 5: “Unstoppable Power Surges”: China’s Quantum Processor Outspeeds Supercomputers by 1 Quadrillion and Triggers US Intelligence Panic</li>
<li>(28:46) - Story # 6: Bank forced to rehire workers after lying about chatbot productivity, union says</li>
<li>(41:21) - Story # 7: It Took Many Years And Billions Of Dollars, But Microsoft Finally Invented A Calculator That Is Wrong Sometimes</li>
<li>(43:41) - Story # 8: Copilot Broke Your Audit Log, but Microsoft Won’t Tell You</li>
<li>(46:33) - Story # 9: Russian state-sponsored espionage group Static Tundra compromises unpatched end-of-life network devices</li>
<li>(49:24) - Story # 10 : Zero-Day Clickjacking Flaws Found in Password Managers Used by Millions</li>
<li>(53:12) - Story # 11: Cybersecurity training doesn’t work: time wasted with no impact, study finds</li>
<li>(59:06) - ChickenSec: Artificial Intelligence: The other AI</li>
</ul>]]>
      </description>
      <content:encoded>
        <![CDATA[<p>Register for FREE Infosec Webcasts, Anti-casts &amp; Summits – </p><p>https://poweredbybhis.com</p><p><br></p><p>00:00 - PreShow Banter™ — Canadian Chicken</p><p>02:01 - The AI Bubble BHIS - Talkin’ Bout [infosec] News 2025-08-25</p><p>02:23 - Story # 1: Congressman proposes bringing back letters of marque for cyber privateers</p><p>09:27 - Story # 2: SIM-Swapper, Scattered Spider Hacker Gets 10 Years</p><p>12:43 - Story # 3: Developer jailed for taking down employer’s network with kill switch malware</p><p>16:33 - Story # 4: Agentic Browser Security: Indirect Prompt Injection in Perplexity Comet</p><p>20:42 - The Utopia Chronicles</p><p>23:20 - Story # 5: “Unstoppable Power Surges”: China’s Quantum Processor Outspeeds Supercomputers by 1 Quadrillion and Triggers US Intelligence Panic</p><p>28:47 - Story # 6: Bank forced to rehire workers after lying about chatbot productivity, union says</p><p>41:21 - Story # 7: It Took Many Years And Billions Of Dollars, But Microsoft Finally Invented A Calculator That Is Wrong Sometimes</p><p>43:41 - Story # 8: Copilot Broke Your Audit Log, but Microsoft Won’t Tell You</p><p>46:33 - Story # 9: Russian state-sponsored espionage group Static Tundra compromises unpatched end-of-life network devices</p><p>49:24 - Story # 10 : Zero-Day Clickjacking Flaws Found in Password Managers Used by Millions</p><p>53:12 - Story # 11: Cybersecurity training doesn’t work: time wasted with no impact, study finds</p><p>59:07 - ChickenSec: Artificial Intelligence: The other AI</p>
<ul><li>(00:00) - PreShow Banter™ — Canadian Chicken</li>
<li>(02:01) - The AI Bubble BHIS - Talkin' Bout [infosec] News 2025-08-25</li>
<li>(02:23) - Story # 1: Congressman proposes bringing back letters of marque for cyber privateers</li>
<li>(09:27) - Story # 2: SIM-Swapper, Scattered Spider Hacker Gets 10 Years</li>
<li>(12:42) - Story # 3: Developer jailed for taking down employer's network with kill switch malware</li>
<li>(16:33) - Story # 4: Agentic Browser Security: Indirect Prompt Injection in Perplexity Comet</li>
<li>(20:41) - The Utopia Chronicles</li>
<li>(23:20) - Story # 5: “Unstoppable Power Surges”: China’s Quantum Processor Outspeeds Supercomputers by 1 Quadrillion and Triggers US Intelligence Panic</li>
<li>(28:46) - Story # 6: Bank forced to rehire workers after lying about chatbot productivity, union says</li>
<li>(41:21) - Story # 7: It Took Many Years And Billions Of Dollars, But Microsoft Finally Invented A Calculator That Is Wrong Sometimes</li>
<li>(43:41) - Story # 8: Copilot Broke Your Audit Log, but Microsoft Won’t Tell You</li>
<li>(46:33) - Story # 9: Russian state-sponsored espionage group Static Tundra compromises unpatched end-of-life network devices</li>
<li>(49:24) - Story # 10 : Zero-Day Clickjacking Flaws Found in Password Managers Used by Millions</li>
<li>(53:12) - Story # 11: Cybersecurity training doesn’t work: time wasted with no impact, study finds</li>
<li>(59:06) - ChickenSec: Artificial Intelligence: The other AI</li>
</ul>]]>
      </content:encoded>
      <pubDate>Sat, 30 Aug 2025 18:59:28 -0400</pubDate>
      <author>Black Hills Information Security</author>
      <enclosure url="https://media.transistor.fm/ba10a614/b2799d69.mp3" length="63685946" type="audio/mpeg"/>
      <itunes:author>Black Hills Information Security</itunes:author>
      <itunes:image href="https://img.transistorcdn.com/hZFRHnTnEt8Dqpgj4nVEXfQQfywqLiUx25gn1m6g034/rs:fill:0:0:1/w:1400/h:1400/q:60/mb:500000/aHR0cHM6Ly9pbWct/dXBsb2FkLXByb2R1/Y3Rpb24udHJhbnNp/c3Rvci5mbS81MGQy/ZTljNGVjY2YyY2Ez/ZjFlZjM1ODhiYTc2/YzM1YS5qcGc.jpg"/>
      <itunes:duration>3841</itunes:duration>
      <itunes:summary>Register for FREE Infosec Webcasts, Anti-casts &amp;amp; Summits – https://poweredbybhis.com00:00 - PreShow Banter™ — Canadian Chicken02:01 - The AI Bubble BHIS - Talkin’ Bout [infosec] News 2025-08-2502:23 - Story # 1: Congressman proposes bringing back letters of marque for cyber privateers09:27 - Story # 2: SIM-Swapper, Scattered Spider Hacker Gets 10 Years12:43 - Story # 3: Developer jailed for taking down employer’s network with kill switch malware16:33 - Story # 4: Agentic Browser Security: Indirect Prompt Injection in Perplexity Comet20:42 - The Utopia Chronicles23:20 - Story # 5: “Unstoppable Power Surges”: China’s Quantum Processor Outspeeds Supercomputers by 1 Quadrillion and Triggers US Intelligence Panic28:47 - Story # 6: Bank forced to rehire workers after lying about chatbot productivity, union says41:21 - Story # 7: It Took Many Years And Billions Of Dollars, But Microsoft Finally Invented A Calculator That Is Wrong Sometimes43:41 - Story # 8: Copilot Broke Your Audit Log, but Microsoft Won’t Tell You46:33 - Story # 9: Russian state-sponsored espionage group Static Tundra compromises unpatched end-of-life network devices49:24 - Story # 10 : Zero-Day Clickjacking Flaws Found in Password Managers Used by Millions53:12 - Story # 11: Cybersecurity training doesn’t work: time wasted with no impact, study finds59:07 - ChickenSec: Artificial Intelligence: The other AI</itunes:summary>
      <itunes:subtitle>Register for FREE Infosec Webcasts, Anti-casts &amp;amp; Summits – https://poweredbybhis.com00:00 - PreShow Banter™ — Canadian Chicken02:01 - The AI Bubble BHIS - Talkin’ Bout [infosec] News 2025-08-2502:23 - Story # 1: Congressman proposes bringing back lett</itunes:subtitle>
      <itunes:keywords>Infosec,Cybersecurity,news</itunes:keywords>
      <itunes:explicit>No</itunes:explicit>
      <podcast:chapters url="https://share.transistor.fm/s/ba10a614/chapters.json" type="application/json+chapters"/>
    </item>
    <item>
      <title>Cyberattack Bricks Speed Cameras – 2025-08-18</title>
      <itunes:episode>1</itunes:episode>
      <podcast:episode>1</podcast:episode>
      <itunes:title>Cyberattack Bricks Speed Cameras – 2025-08-18</itunes:title>
      <itunes:episodeType>full</itunes:episodeType>
      <guid isPermaLink="false">https://blubrry.com/bhis/147915818/cyberattack-bricks-speed-cameras-2025-08-18/</guid>
      <link>https://share.transistor.fm/s/01ba00b9</link>
      <description>
        <![CDATA[<p>Register for FREE Infosec Webcasts, Anti-casts &amp; Summits – </p><p>https://poweredbybhis.com</p><p><br></p><p>00:00 - PreShow Banter™ — The gif that keeps on giffing</p><p>01:46 - Cyberattack Bricks Speed Cameras – BHIS - Talkin’ Bout [infosec] News 2025-08-18</p><p>02:39 - Story # 1: Perplexity made a sky-high $34.5 billion bid for Google Chrome — a bold and unusual move in the midst of antitrust scrutiny</p><p>07:16 - Story # 2: Exclusive: US embeds trackers in AI chip shipments to catch diversions to China, sources say</p><p>10:22 - Story # 3: How we found TeaOnHer spilling users’ driver’s licenses in less than 10 minutes</p><p>12:17 - Story # 4: Cisco discloses maximum-severity defect in firewall software</p><p>13:56 - Story # 5: Data Dump From APT Actor Yields Clues to Attacker Capabilities</p><p>19:13 - Story # 6: Russian cyberattack in the Netherlands leaves speed cameras offline indefinitely</p><p>23:30 - Story # 7: HTTP/2 MadeYouReset Vulnerability Enables Massive DDoS Attacks</p><p>24:51 - Story # 8: LAPD Eyes ‘GeoSpy’, an AI Tool That Can Geolocate Photos in Seconds</p><p>29:05 - Story # 9: Manpower discloses data breach affecting nearly 145,000 people</p><p>34:51 - Story # 10: Hacker Offers to Sell 15.8 Million Plain-Text PayPal Credentials On Dark Web Forum</p><p>35:34 - Story # 11: The First Federal Cybersecurity Disaster of Trump 2.0 Has Arrived</p><p>40:54 - Story # 12: New Clever Phishing Attack Uses Japanese Character “ん” to Mimic Forward Slash “/”</p><p>46:28 - Story # 13: Fortinet warns of FortiSIEM pre-auth RCE flaw with exploit in the wild</p><p>48:13 - Story # 14: Plex warns users to patch security vulnerability immediately</p><p>50:53 - ChickenSec: Noble Foods using soil mapping technology at organic egg farm</p>
<ul><li>(00:00) - PreShow Banter™ — The gif that keeps on giffing</li>
<li>(01:46) - Cyberattack Bricks Speed Cameras – BHIS - Talkin' Bout [infosec] News 2025-08-18</li>
<li>(02:38) - Story # 1: Perplexity made a sky-high $34.5 billion bid for Google Chrome — a bold and unusual move in the midst of antitrust scrutiny</li>
<li>(07:16) - Story # 2: Exclusive: US embeds trackers in AI chip shipments to catch diversions to China, sources say</li>
<li>(10:22) - Story # 3: How we found TeaOnHer spilling users’ driver’s licenses in less than 10 minutes</li>
<li>(12:16) - Story # 4: Cisco discloses maximum-severity defect in firewall software</li>
<li>(13:55) - Story # 5: Data Dump From APT Actor Yields Clues to Attacker Capabilities</li>
<li>(19:13) - Story # 6: Russian cyberattack in the Netherlands leaves speed cameras offline indefinitely</li>
<li>(23:30) - Story # 7: HTTP/2 MadeYouReset Vulnerability Enables Massive DDoS Attacks</li>
<li>(24:51) - Story # 8: LAPD Eyes ‘GeoSpy’, an AI Tool That Can Geolocate Photos in Seconds</li>
<li>(29:04) - Story # 9: Manpower discloses data breach affecting nearly 145,000 people</li>
<li>(34:50) - Story # 10: Hacker Offers to Sell 15.8 Million Plain-Text PayPal Credentials On Dark Web Forum</li>
<li>(35:34) - Story # 11: The First Federal Cybersecurity Disaster of Trump 2.0 Has Arrived</li>
<li>(40:53) - Story # 12: New Clever Phishing Attack Uses Japanese Character “ん” to Mimic Forward Slash “/”</li>
<li>(46:27) - Story # 13: Fortinet warns of FortiSIEM pre-auth RCE flaw with exploit in the wild</li>
<li>(48:13) - Story # 14: Plex warns users to patch security vulnerability immediately</li>
<li>(50:52) - ChickenSec: Noble Foods using soil mapping technology at organic egg farm</li>
</ul>]]>
      </description>
      <content:encoded>
        <![CDATA[<p>Register for FREE Infosec Webcasts, Anti-casts &amp; Summits – </p><p>https://poweredbybhis.com</p><p><br></p><p>00:00 - PreShow Banter™ — The gif that keeps on giffing</p><p>01:46 - Cyberattack Bricks Speed Cameras – BHIS - Talkin’ Bout [infosec] News 2025-08-18</p><p>02:39 - Story # 1: Perplexity made a sky-high $34.5 billion bid for Google Chrome — a bold and unusual move in the midst of antitrust scrutiny</p><p>07:16 - Story # 2: Exclusive: US embeds trackers in AI chip shipments to catch diversions to China, sources say</p><p>10:22 - Story # 3: How we found TeaOnHer spilling users’ driver’s licenses in less than 10 minutes</p><p>12:17 - Story # 4: Cisco discloses maximum-severity defect in firewall software</p><p>13:56 - Story # 5: Data Dump From APT Actor Yields Clues to Attacker Capabilities</p><p>19:13 - Story # 6: Russian cyberattack in the Netherlands leaves speed cameras offline indefinitely</p><p>23:30 - Story # 7: HTTP/2 MadeYouReset Vulnerability Enables Massive DDoS Attacks</p><p>24:51 - Story # 8: LAPD Eyes ‘GeoSpy’, an AI Tool That Can Geolocate Photos in Seconds</p><p>29:05 - Story # 9: Manpower discloses data breach affecting nearly 145,000 people</p><p>34:51 - Story # 10: Hacker Offers to Sell 15.8 Million Plain-Text PayPal Credentials On Dark Web Forum</p><p>35:34 - Story # 11: The First Federal Cybersecurity Disaster of Trump 2.0 Has Arrived</p><p>40:54 - Story # 12: New Clever Phishing Attack Uses Japanese Character “ん” to Mimic Forward Slash “/”</p><p>46:28 - Story # 13: Fortinet warns of FortiSIEM pre-auth RCE flaw with exploit in the wild</p><p>48:13 - Story # 14: Plex warns users to patch security vulnerability immediately</p><p>50:53 - ChickenSec: Noble Foods using soil mapping technology at organic egg farm</p>
<ul><li>(00:00) - PreShow Banter™ — The gif that keeps on giffing</li>
<li>(01:46) - Cyberattack Bricks Speed Cameras – BHIS - Talkin' Bout [infosec] News 2025-08-18</li>
<li>(02:38) - Story # 1: Perplexity made a sky-high $34.5 billion bid for Google Chrome — a bold and unusual move in the midst of antitrust scrutiny</li>
<li>(07:16) - Story # 2: Exclusive: US embeds trackers in AI chip shipments to catch diversions to China, sources say</li>
<li>(10:22) - Story # 3: How we found TeaOnHer spilling users’ driver’s licenses in less than 10 minutes</li>
<li>(12:16) - Story # 4: Cisco discloses maximum-severity defect in firewall software</li>
<li>(13:55) - Story # 5: Data Dump From APT Actor Yields Clues to Attacker Capabilities</li>
<li>(19:13) - Story # 6: Russian cyberattack in the Netherlands leaves speed cameras offline indefinitely</li>
<li>(23:30) - Story # 7: HTTP/2 MadeYouReset Vulnerability Enables Massive DDoS Attacks</li>
<li>(24:51) - Story # 8: LAPD Eyes ‘GeoSpy’, an AI Tool That Can Geolocate Photos in Seconds</li>
<li>(29:04) - Story # 9: Manpower discloses data breach affecting nearly 145,000 people</li>
<li>(34:50) - Story # 10: Hacker Offers to Sell 15.8 Million Plain-Text PayPal Credentials On Dark Web Forum</li>
<li>(35:34) - Story # 11: The First Federal Cybersecurity Disaster of Trump 2.0 Has Arrived</li>
<li>(40:53) - Story # 12: New Clever Phishing Attack Uses Japanese Character “ん” to Mimic Forward Slash “/”</li>
<li>(46:27) - Story # 13: Fortinet warns of FortiSIEM pre-auth RCE flaw with exploit in the wild</li>
<li>(48:13) - Story # 14: Plex warns users to patch security vulnerability immediately</li>
<li>(50:52) - ChickenSec: Noble Foods using soil mapping technology at organic egg farm</li>
</ul>]]>
      </content:encoded>
      <pubDate>Wed, 20 Aug 2025 17:33:03 -0400</pubDate>
      <author>Black Hills Information Security</author>
      <enclosure url="https://media.transistor.fm/01ba00b9/c61b1c8a.mp3" length="58345090" type="audio/mpeg"/>
      <itunes:author>Black Hills Information Security</itunes:author>
      <itunes:image href="https://img.transistorcdn.com/w5f6qx6rGRR48FIEC5hjC7SGn-s1-FNvbH-9liMOBnI/rs:fill:0:0:1/w:1400/h:1400/q:60/mb:500000/aHR0cHM6Ly9pbWct/dXBsb2FkLXByb2R1/Y3Rpb24udHJhbnNp/c3Rvci5mbS80Zjc0/ODNiZjhmYjdhNmE3/ZTZlY2YwZGZmOTBk/NDFlOS5qcGc.jpg"/>
      <itunes:duration>3490</itunes:duration>
      <itunes:summary>Register for FREE Infosec Webcasts, Anti-casts &amp;amp; Summits – https://poweredbybhis.com00:00 - PreShow Banter™ — The gif that keeps on giffing01:46 - Cyberattack Bricks Speed Cameras – BHIS - Talkin’ Bout [infosec] News 2025-08-1802:39 - Story # 1: Perplexity made a sky-high $34.5 billion bid for Google Chrome — a bold and unusual move in the midst of antitrust scrutiny07:16 - Story # 2: Exclusive: US embeds trackers in AI chip shipments to catch diversions to China, sources say10:22 - Story # 3: How we found TeaOnHer spilling users’ driver’s licenses in less than 10 minutes12:17 - Story # 4: Cisco discloses maximum-severity defect in firewall software13:56 - Story # 5: Data Dump From APT Actor Yields Clues to Attacker Capabilities19:13 - Story # 6: Russian cyberattack in the Netherlands leaves speed cameras offline indefinitely23:30 - Story # 7: HTTP/2 MadeYouReset Vulnerability Enables Massive DDoS Attacks24:51 - Story # 8: LAPD Eyes ‘GeoSpy’, an AI Tool That Can Geolocate Photos in Seconds29:05 - Story # 9: Manpower discloses data breach affecting nearly 145,000 people34:51 - Story # 10: Hacker Offers to Sell 15.8 Million Plain-Text PayPal Credentials On Dark Web Forum35:34 - Story # 11: The First Federal Cybersecurity Disaster of Trump 2.0 Has Arrived40:54 - Story # 12: New Clever Phishing Attack Uses Japanese Character “ん” to Mimic Forward Slash “/”46:28 - Story # 13: Fortinet warns of FortiSIEM pre-auth RCE flaw with exploit in the wild48:13 - Story # 14: Plex warns users to patch security vulnerability immediately50:53 - ChickenSec: Noble Foods using soil mapping technology at organic egg farm</itunes:summary>
      <itunes:subtitle>Register for FREE Infosec Webcasts, Anti-casts &amp;amp; Summits – https://poweredbybhis.com00:00 - PreShow Banter™ — The gif that keeps on giffing01:46 - Cyberattack Bricks Speed Cameras – BHIS - Talkin’ Bout [infosec] News 2025-08-1802:39 - Story # 1: Perpl</itunes:subtitle>
      <itunes:keywords>Infosec,Cybersecurity,news</itunes:keywords>
      <itunes:explicit>No</itunes:explicit>
      <podcast:chapters url="https://share.transistor.fm/s/01ba00b9/chapters.json" type="application/json+chapters"/>
    </item>
    <item>
      <title>DEF CON RECAP – 2025-08-11</title>
      <itunes:episode>1</itunes:episode>
      <podcast:episode>1</podcast:episode>
      <itunes:title>DEF CON RECAP – 2025-08-11</itunes:title>
      <itunes:episodeType>full</itunes:episodeType>
      <guid isPermaLink="false">https://blubrry.com/bhis/147780033/def-con-recap-2025-08-11/</guid>
      <link>https://share.transistor.fm/s/7ab2a496</link>
      <description>
        <![CDATA[<p>Register for FREE Infosec Webcasts, Anti-casts &amp; Summits – </p><p>https://poweredbybhis.com</p><p><br></p><p>00:00 - PreShow Banter™ — Wading Through Woods</p><p>06:06 - DEF CON RECAP - Talkin’ Bout [infosec] News 2025-08-11</p><p>09:16 - Story # 1: It’s time to acknowledge HTTP/1.1 is insecure</p><p>12:36 - Story # 2: Research reveals possible privacy gaps in Apple Intelligence’s data handling</p><p>17:51 - Story # 3: Federal court filing system hit in sweeping hack</p><p>21:09 - Story # 4: Cisco discloses data breach impacting Cisco.com user accounts</p><p>32:17 - Story # 5: Google says its AI-based bug hunter found 20 security vulnerabilities</p><p>34:20 - Story # 6: Automate security reviews with Claude Code</p><p>39:01 - Story # 7: Flipper Zero ‘DarkWeb’ Firmware Bypasses Rolling Code Security on Major Vehicle Brands</p><p>44:44 - Story # 7b: OnStar assists CHP in stopping fleeing SUV with toddler inside</p><p>47:12 - Story # 7c: That viral video of a ‘deactivated’ Tesla Cybertruck is a fake</p><p>49:37 - Story # 8: LegalPwn Attack Tricks GenAI Tools Into Misclassifying Malware as Safe Code</p><p>50:53 - Story # 9: Microsoft Launches Project Ire to Autonomously Classify Malware Using AI Tools</p><p>53:08 - Story # 10: A Single Poisoned Document Could Leak ‘Secret’ Data Via ChatGPT</p><p>58:10 - Story # 11: Millions of Dell Laptops Vulnerable to Device Takeover and Persistent Malware Attacks</p>
<ul><li>(00:00) - PreShow Banter™ — Wading Through Woods</li>
<li>(06:06) - DEF CON RECAP - Talkin' Bout [infosec] News 2025-08-11</li>
<li>(09:15) - Story # 1: It's time to acknowledge HTTP/1.1 is insecure</li>
<li>(12:36) - Story # 2: Research reveals possible privacy gaps in Apple Intelligence’s data handling</li>
<li>(17:50) - Story # 3: Federal court filing system hit in sweeping hack</li>
<li>(21:08) - Story # 4: Cisco discloses data breach impacting Cisco.com user accounts</li>
<li>(32:16) - Story # 5: Google says its AI-based bug hunter found 20 security vulnerabilities</li>
<li>(34:20) - Story # 6: Automate security reviews with Claude Code</li>
<li>(39:00) - Story # 7: Flipper Zero ‘DarkWeb’ Firmware Bypasses Rolling Code Security on Major Vehicle Brands</li>
<li>(44:43) - Story # 7b: OnStar assists CHP in stopping fleeing SUV with toddler inside</li>
<li>(47:11) - Story # 7c: That viral video of a ‘deactivated’ Tesla Cybertruck is a fake</li>
<li>(49:36) - Story # 8: LegalPwn Attack Tricks GenAI Tools Into Misclassifying Malware as Safe Code</li>
<li>(50:52) - Story # 9: Microsoft Launches Project Ire to Autonomously Classify Malware Using AI Tools</li>
<li>(53:08) - Story # 10: A Single Poisoned Document Could Leak ‘Secret’ Data Via ChatGPT</li>
<li>(58:09) - Story # 11: Millions of Dell Laptops Vulnerable to Device Takeover and Persistent Malware Attacks</li>
</ul>]]>
      </description>
      <content:encoded>
        <![CDATA[<p>Register for FREE Infosec Webcasts, Anti-casts &amp; Summits – </p><p>https://poweredbybhis.com</p><p><br></p><p>00:00 - PreShow Banter™ — Wading Through Woods</p><p>06:06 - DEF CON RECAP - Talkin’ Bout [infosec] News 2025-08-11</p><p>09:16 - Story # 1: It’s time to acknowledge HTTP/1.1 is insecure</p><p>12:36 - Story # 2: Research reveals possible privacy gaps in Apple Intelligence’s data handling</p><p>17:51 - Story # 3: Federal court filing system hit in sweeping hack</p><p>21:09 - Story # 4: Cisco discloses data breach impacting Cisco.com user accounts</p><p>32:17 - Story # 5: Google says its AI-based bug hunter found 20 security vulnerabilities</p><p>34:20 - Story # 6: Automate security reviews with Claude Code</p><p>39:01 - Story # 7: Flipper Zero ‘DarkWeb’ Firmware Bypasses Rolling Code Security on Major Vehicle Brands</p><p>44:44 - Story # 7b: OnStar assists CHP in stopping fleeing SUV with toddler inside</p><p>47:12 - Story # 7c: That viral video of a ‘deactivated’ Tesla Cybertruck is a fake</p><p>49:37 - Story # 8: LegalPwn Attack Tricks GenAI Tools Into Misclassifying Malware as Safe Code</p><p>50:53 - Story # 9: Microsoft Launches Project Ire to Autonomously Classify Malware Using AI Tools</p><p>53:08 - Story # 10: A Single Poisoned Document Could Leak ‘Secret’ Data Via ChatGPT</p><p>58:10 - Story # 11: Millions of Dell Laptops Vulnerable to Device Takeover and Persistent Malware Attacks</p>
<ul><li>(00:00) - PreShow Banter™ — Wading Through Woods</li>
<li>(06:06) - DEF CON RECAP - Talkin' Bout [infosec] News 2025-08-11</li>
<li>(09:15) - Story # 1: It's time to acknowledge HTTP/1.1 is insecure</li>
<li>(12:36) - Story # 2: Research reveals possible privacy gaps in Apple Intelligence’s data handling</li>
<li>(17:50) - Story # 3: Federal court filing system hit in sweeping hack</li>
<li>(21:08) - Story # 4: Cisco discloses data breach impacting Cisco.com user accounts</li>
<li>(32:16) - Story # 5: Google says its AI-based bug hunter found 20 security vulnerabilities</li>
<li>(34:20) - Story # 6: Automate security reviews with Claude Code</li>
<li>(39:00) - Story # 7: Flipper Zero ‘DarkWeb’ Firmware Bypasses Rolling Code Security on Major Vehicle Brands</li>
<li>(44:43) - Story # 7b: OnStar assists CHP in stopping fleeing SUV with toddler inside</li>
<li>(47:11) - Story # 7c: That viral video of a ‘deactivated’ Tesla Cybertruck is a fake</li>
<li>(49:36) - Story # 8: LegalPwn Attack Tricks GenAI Tools Into Misclassifying Malware as Safe Code</li>
<li>(50:52) - Story # 9: Microsoft Launches Project Ire to Autonomously Classify Malware Using AI Tools</li>
<li>(53:08) - Story # 10: A Single Poisoned Document Could Leak ‘Secret’ Data Via ChatGPT</li>
<li>(58:09) - Story # 11: Millions of Dell Laptops Vulnerable to Device Takeover and Persistent Malware Attacks</li>
</ul>]]>
      </content:encoded>
      <pubDate>Thu, 14 Aug 2025 17:43:54 -0400</pubDate>
      <author>Black Hills Information Security</author>
      <enclosure url="https://media.transistor.fm/7ab2a496/e83eb1b2.mp3" length="59878415" type="audio/mpeg"/>
      <itunes:author>Black Hills Information Security</itunes:author>
      <itunes:image href="https://img.transistorcdn.com/DCIqA5BalDNlHiU6v4jS8S_dSvL5Drq1Gq6UBFd9PcQ/rs:fill:0:0:1/w:1400/h:1400/q:60/mb:500000/aHR0cHM6Ly9pbWct/dXBsb2FkLXByb2R1/Y3Rpb24udHJhbnNp/c3Rvci5mbS9lZjAz/YmViMWE0ZGYwMTQx/NjU2ZjE1Njc4NWVk/NzAwMi5qcGc.jpg"/>
      <itunes:duration>3594</itunes:duration>
      <itunes:summary>Register for FREE Infosec Webcasts, Anti-casts &amp;amp; Summits – https://poweredbybhis.com00:00 - PreShow Banter™ — Wading Through Woods06:06 - DEF CON RECAP - Talkin’ Bout [infosec] News 2025-08-1109:16 - Story # 1: It’s time to acknowledge HTTP/1.1 is insecure12:36 - Story # 2: Research reveals possible privacy gaps in Apple Intelligence’s data handling17:51 - Story # 3: Federal court filing system hit in sweeping hack21:09 - Story # 4: Cisco discloses data breach impacting Cisco.com user accounts32:17 - Story # 5: Google says its AI-based bug hunter found 20 security vulnerabilities34:20 - Story # 6: Automate security reviews with Claude Code39:01 - Story # 7: Flipper Zero ‘DarkWeb’ Firmware Bypasses Rolling Code Security on Major Vehicle Brands44:44 - Story # 7b: OnStar assists CHP in stopping fleeing SUV with toddler inside47:12 - Story # 7c: That viral video of a ‘deactivated’ Tesla Cybertruck is a fake49:37 - Story # 8: LegalPwn Attack Tricks GenAI Tools Into Misclassifying Malware as Safe Code50:53 - Story # 9: Microsoft Launches Project Ire to Autonomously Classify Malware Using AI Tools53:08 - Story # 10: A Single Poisoned Document Could Leak ‘Secret’ Data Via ChatGPT58:10 - Story # 11: Millions of Dell Laptops Vulnerable to Device Takeover and Persistent Malware Attacks</itunes:summary>
      <itunes:subtitle>Register for FREE Infosec Webcasts, Anti-casts &amp;amp; Summits – https://poweredbybhis.com00:00 - PreShow Banter™ — Wading Through Woods06:06 - DEF CON RECAP - Talkin’ Bout [infosec] News 2025-08-1109:16 - Story # 1: It’s time to acknowledge HTTP/1.1 is ins</itunes:subtitle>
      <itunes:keywords>Infosec,Cybersecurity,news</itunes:keywords>
      <itunes:explicit>No</itunes:explicit>
      <podcast:chapters url="https://share.transistor.fm/s/7ab2a496/chapters.json" type="application/json+chapters"/>
    </item>
    <item>
      <title>Perplexity Stealth Crawlers Evade No-Crawl Directives - 2025-08-04</title>
      <itunes:episode>1</itunes:episode>
      <podcast:episode>1</podcast:episode>
      <itunes:title>Perplexity Stealth Crawlers Evade No-Crawl Directives - 2025-08-04</itunes:title>
      <itunes:episodeType>full</itunes:episodeType>
      <guid isPermaLink="false">https://blubrry.com/bhis/147618398/perplexity-stealth-crawlers-evade-no-crawl-directives-2025-08-04/</guid>
      <link>https://share.transistor.fm/s/41f84f22</link>
      <description>
        <![CDATA[<p>Register for FREE Infosec Webcasts, Anti-casts &amp; Summits – </p><p>https://poweredbybhis.com</p><p><br></p><p>00:00:00 - PreShow Banter™ — Stop Asking Wade if he’s in Vegas</p><p>00:02:16 - Perplexity Uses Stealth Crawlers to Evade No-Crawl Directives – 2025-08-04</p><p>00:11:25 - Story # 1: Insurance won’t cover $5M in City of Hamilton claims for cyberattack, citing lack of log-in security</p><p>00:18:40 - Story # 2: States Enact Safe Harbor Laws that Provide Affirmative Defenses in Data Breach Litigation</p><p>00:26:45 - Story # 3: Hackers Destroy Aeroflot’s IT Infrastructure, Causing Over 42 Flight Cancellations</p><p>00:34:18 - Story # 4: Attackers exploit link-wrapping services to steal Microsoft 365 logins</p><p>00:40:09 - Story # 5: Mozilla flags phishing wave aimed at hijacking trusted Firefox add-ons</p><p>00:42:18 - Wade’s plugin recommendation</p><p>00:44:39 - Story # 6: Perplexity is using stealth, undeclared crawlers to evade website no-crawl directives</p><p>00:51:11 - Story # 7: After Backlash, ChatGPT Removes Option to Have Private Chats Indexed by Google</p><p>00:55:21 - AI 2027</p><p>01:01:01 - What’s Ralph been up to?</p>
<ul><li>(00:00) - PreShow Banter™ — Stop Asking Wade if he's in Vegas</li>
<li>(02:16) - Perplexity Uses Stealth Crawlers to Evade No-Crawl Directives – 2025-08-04</li>
<li>(11:25) - Story # 1: Insurance won't cover $5M in City of Hamilton claims for cyberattack, citing lack of log-in security</li>
<li>(18:39) - Story # 2: States Enact Safe Harbor Laws that Provide Affirmative Defenses in Data Breach Litigation</li>
<li>(26:44) - Story # 3: Hackers Destroy Aeroflot’s IT Infrastructure, Causing Over 42 Flight Cancellations</li>
<li>(34:18) - Story # 4: Attackers exploit link-wrapping services to steal Microsoft 365 logins</li>
<li>(40:09) - Story # 5: Mozilla flags phishing wave aimed at hijacking trusted Firefox add-ons</li>
<li>(42:17) - Wade’s plugin recommendation</li>
<li>(44:38) - Story # 6: Perplexity is using stealth, undeclared crawlers to evade website no-crawl directives</li>
<li>(51:10) - Story # 7: After Backlash, ChatGPT Removes Option to Have Private Chats Indexed by Google</li>
<li>(55:20) - AI 2027</li>
<li>(01:01:00) - What’s Ralph been up to?</li>
</ul>]]>
      </description>
      <content:encoded>
        <![CDATA[<p>Register for FREE Infosec Webcasts, Anti-casts &amp; Summits – </p><p>https://poweredbybhis.com</p><p><br></p><p>00:00:00 - PreShow Banter™ — Stop Asking Wade if he’s in Vegas</p><p>00:02:16 - Perplexity Uses Stealth Crawlers to Evade No-Crawl Directives – 2025-08-04</p><p>00:11:25 - Story # 1: Insurance won’t cover $5M in City of Hamilton claims for cyberattack, citing lack of log-in security</p><p>00:18:40 - Story # 2: States Enact Safe Harbor Laws that Provide Affirmative Defenses in Data Breach Litigation</p><p>00:26:45 - Story # 3: Hackers Destroy Aeroflot’s IT Infrastructure, Causing Over 42 Flight Cancellations</p><p>00:34:18 - Story # 4: Attackers exploit link-wrapping services to steal Microsoft 365 logins</p><p>00:40:09 - Story # 5: Mozilla flags phishing wave aimed at hijacking trusted Firefox add-ons</p><p>00:42:18 - Wade’s plugin recommendation</p><p>00:44:39 - Story # 6: Perplexity is using stealth, undeclared crawlers to evade website no-crawl directives</p><p>00:51:11 - Story # 7: After Backlash, ChatGPT Removes Option to Have Private Chats Indexed by Google</p><p>00:55:21 - AI 2027</p><p>01:01:01 - What’s Ralph been up to?</p>
<ul><li>(00:00) - PreShow Banter™ — Stop Asking Wade if he's in Vegas</li>
<li>(02:16) - Perplexity Uses Stealth Crawlers to Evade No-Crawl Directives – 2025-08-04</li>
<li>(11:25) - Story # 1: Insurance won't cover $5M in City of Hamilton claims for cyberattack, citing lack of log-in security</li>
<li>(18:39) - Story # 2: States Enact Safe Harbor Laws that Provide Affirmative Defenses in Data Breach Litigation</li>
<li>(26:44) - Story # 3: Hackers Destroy Aeroflot’s IT Infrastructure, Causing Over 42 Flight Cancellations</li>
<li>(34:18) - Story # 4: Attackers exploit link-wrapping services to steal Microsoft 365 logins</li>
<li>(40:09) - Story # 5: Mozilla flags phishing wave aimed at hijacking trusted Firefox add-ons</li>
<li>(42:17) - Wade’s plugin recommendation</li>
<li>(44:38) - Story # 6: Perplexity is using stealth, undeclared crawlers to evade website no-crawl directives</li>
<li>(51:10) - Story # 7: After Backlash, ChatGPT Removes Option to Have Private Chats Indexed by Google</li>
<li>(55:20) - AI 2027</li>
<li>(01:01:00) - What’s Ralph been up to?</li>
</ul>]]>
      </content:encoded>
      <pubDate>Thu, 07 Aug 2025 15:13:00 -0400</pubDate>
      <author>Black Hills Information Security</author>
      <enclosure url="https://media.transistor.fm/41f84f22/e0c08bd8.mp3" length="62697339" type="audio/mpeg"/>
      <itunes:author>Black Hills Information Security</itunes:author>
      <itunes:image href="https://img.transistorcdn.com/3CpV2nppsJ2NB4CUp5deDjSwGN7xZahfkj8Ah3HR0Vc/rs:fill:0:0:1/w:1400/h:1400/q:60/mb:500000/aHR0cHM6Ly9pbWct/dXBsb2FkLXByb2R1/Y3Rpb24udHJhbnNp/c3Rvci5mbS9mYmQz/MTEzY2YwMzViMmE1/ZGI3NTIzYTMwNjAz/OWViOC5qcGc.jpg"/>
      <itunes:duration>3787</itunes:duration>
      <itunes:summary>Register for FREE Infosec Webcasts, Anti-casts &amp;amp; Summits – https://poweredbybhis.com00:00:00 - PreShow Banter™ — Stop Asking Wade if he’s in Vegas00:02:16 - Perplexity Uses Stealth Crawlers to Evade No-Crawl Directives – 2025-08-0400:11:25 - Story # 1: Insurance won’t cover $5M in City of Hamilton claims for cyberattack, citing lack of log-in security00:18:40 - Story # 2: States Enact Safe Harbor Laws that Provide Affirmative Defenses in Data Breach Litigation00:26:45 - Story # 3: Hackers Destroy Aeroflot’s IT Infrastructure, Causing Over 42 Flight Cancellations00:34:18 - Story # 4: Attackers exploit link-wrapping services to steal Microsoft 365 logins00:40:09 - Story # 5: Mozilla flags phishing wave aimed at hijacking trusted Firefox add-ons00:42:18 - Wade’s plugin recommendation00:44:39 - Story # 6: Perplexity is using stealth, undeclared crawlers to evade website no-crawl directives00:51:11 - Story # 7: After Backlash, ChatGPT Removes Option to Have Private Chats Indexed by Google00:55:21 - AI 202701:01:01 - What’s Ralph been up to?</itunes:summary>
      <itunes:subtitle>Register for FREE Infosec Webcasts, Anti-casts &amp;amp; Summits – https://poweredbybhis.com00:00:00 - PreShow Banter™ — Stop Asking Wade if he’s in Vegas00:02:16 - Perplexity Uses Stealth Crawlers to Evade No-Crawl Directives – 2025-08-0400:11:25 - Story # 1</itunes:subtitle>
      <itunes:keywords>Infosec,Cybersecurity,news</itunes:keywords>
      <itunes:explicit>No</itunes:explicit>
      <podcast:chapters url="https://share.transistor.fm/s/41f84f22/chapters.json" type="application/json+chapters"/>
    </item>
    <item>
      <title>UK Bans Ransomware Payments - 2025-07-28</title>
      <itunes:episode>1</itunes:episode>
      <podcast:episode>1</podcast:episode>
      <itunes:title>UK Bans Ransomware Payments - 2025-07-28</itunes:title>
      <itunes:episodeType>full</itunes:episodeType>
      <guid isPermaLink="false">https://blubrry.com/bhis/147431291/uk-bans-ransomware-payments-2025-07-28/</guid>
      <link>https://share.transistor.fm/s/81f5c6be</link>
      <description>
        <![CDATA[<p>Register for FREE Infosec Webcasts, Anti-casts &amp; Summits – 
https://poweredbybhis.com </p><p><br></p><p><br></p><p>00:00 - PreShow Banter™ — National Chicken Wing Day</p><p>04:16 - BHIS - Talkin’ Bout [infosec] News 2025-07-28</p><p>05:30 - Story # 1: Bad vibes: How an AI agent coded its way to disaster</p><p>08:40 - Story # 1b: Replit goes rogue, deletes entire database.</p><p>15:44 - Story # 2: A major AI training data set contains millions of examples of personal data</p><p>26:05 - Story # 3: Women Dating Safety App ‘Tea’ Breached, Users’ IDs Posted to 4chan</p><p>33:19 - Story # 4:A Startup is Selling Data Hacked from Peoples’ Computers to Debt Collectors</p><p>40:28 - Story # 5: Clorox Sues IT Provider Cognizant For Simply Giving Employee Password to Hackers</p><p>49:46 - Story # 6: Businesses banned from paying hackers’ ransoms to target cybercrime</p><p>57:38 - SharePoint Follow Up</p>
<ul><li>(00:00) - PreShow Banter™ — National Chicken Wing Day</li>
<li>(04:15) - BHIS - Talkin' Bout [infosec] News 2025-07-28</li>
<li>(05:29) - Story # 1: Bad vibes: How an AI agent coded its way to disaster</li>
<li>(08:39) - Story # 1b: Replit goes rogue, deletes entire database.</li>
<li>(15:43) - Story # 2: A major AI training data set contains millions of examples of personal data</li>
<li>(26:04) - Story # 3: Women Dating Safety App 'Tea' Breached, Users' IDs Posted to 4chan</li>
<li>(33:18) - Story # 4:A Startup is Selling Data Hacked from Peoples’ Computers to Debt Collectors</li>
<li>(40:27) - Story # 5: Clorox Sues IT Provider Cognizant For Simply Giving Employee Password to Hackers</li>
<li>(49:46) - Story # 6: Businesses banned from paying hackers’ ransoms to target cybercrime</li>
<li>(57:38) - SharePoint Follow Up</li>
</ul>]]>
      </description>
      <content:encoded>
        <![CDATA[<p>Register for FREE Infosec Webcasts, Anti-casts &amp; Summits – 
https://poweredbybhis.com </p><p><br></p><p><br></p><p>00:00 - PreShow Banter™ — National Chicken Wing Day</p><p>04:16 - BHIS - Talkin’ Bout [infosec] News 2025-07-28</p><p>05:30 - Story # 1: Bad vibes: How an AI agent coded its way to disaster</p><p>08:40 - Story # 1b: Replit goes rogue, deletes entire database.</p><p>15:44 - Story # 2: A major AI training data set contains millions of examples of personal data</p><p>26:05 - Story # 3: Women Dating Safety App ‘Tea’ Breached, Users’ IDs Posted to 4chan</p><p>33:19 - Story # 4:A Startup is Selling Data Hacked from Peoples’ Computers to Debt Collectors</p><p>40:28 - Story # 5: Clorox Sues IT Provider Cognizant For Simply Giving Employee Password to Hackers</p><p>49:46 - Story # 6: Businesses banned from paying hackers’ ransoms to target cybercrime</p><p>57:38 - SharePoint Follow Up</p>
<ul><li>(00:00) - PreShow Banter™ — National Chicken Wing Day</li>
<li>(04:15) - BHIS - Talkin' Bout [infosec] News 2025-07-28</li>
<li>(05:29) - Story # 1: Bad vibes: How an AI agent coded its way to disaster</li>
<li>(08:39) - Story # 1b: Replit goes rogue, deletes entire database.</li>
<li>(15:43) - Story # 2: A major AI training data set contains millions of examples of personal data</li>
<li>(26:04) - Story # 3: Women Dating Safety App 'Tea' Breached, Users' IDs Posted to 4chan</li>
<li>(33:18) - Story # 4:A Startup is Selling Data Hacked from Peoples’ Computers to Debt Collectors</li>
<li>(40:27) - Story # 5: Clorox Sues IT Provider Cognizant For Simply Giving Employee Password to Hackers</li>
<li>(49:46) - Story # 6: Businesses banned from paying hackers’ ransoms to target cybercrime</li>
<li>(57:38) - SharePoint Follow Up</li>
</ul>]]>
      </content:encoded>
      <pubDate>Thu, 31 Jul 2025 21:11:44 -0400</pubDate>
      <author>Black Hills Information Security</author>
      <enclosure url="https://media.transistor.fm/81f5c6be/efbaeedf.mp3" length="61366184" type="audio/mpeg"/>
      <itunes:author>Black Hills Information Security</itunes:author>
      <itunes:image href="https://img.transistorcdn.com/skB8xV61OPHOu0WsZb2STB_q4iKiygMv8NIQlreB6Q0/rs:fill:0:0:1/w:1400/h:1400/q:60/mb:500000/aHR0cHM6Ly9pbWct/dXBsb2FkLXByb2R1/Y3Rpb24udHJhbnNp/c3Rvci5mbS81MDAw/MWFiYTMyYjJkZWMy/MTI3NmI4ZjE0OWJj/ZWRmNC5qcGc.jpg"/>
      <itunes:duration>3736</itunes:duration>
      <itunes:summary>Register for FREE Infosec Webcasts, Anti-casts &amp;amp; Summits – 
https://poweredbybhis.com 00:00 - PreShow Banter™ — National Chicken Wing Day04:16 - BHIS - Talkin’ Bout [infosec] News 2025-07-2805:30 - Story # 1: Bad vibes: How an AI agent coded its way to disaster08:40 - Story # 1b: Replit goes rogue, deletes entire database.15:44 - Story # 2: A major AI training data set contains millions of examples of personal data26:05 - Story # 3: Women Dating Safety App ‘Tea’ Breached, Users’ IDs Posted to 4chan33:19 - Story # 4:A Startup is Selling Data Hacked from Peoples’ Computers to Debt Collectors40:28 - Story # 5: Clorox Sues IT Provider Cognizant For Simply Giving Employee Password to Hackers49:46 - Story # 6: Businesses banned from paying hackers’ ransoms to target cybercrime57:38 - SharePoint Follow Up</itunes:summary>
      <itunes:subtitle>Register for FREE Infosec Webcasts, Anti-casts &amp;amp; Summits – 
https://poweredbybhis.com 00:00 - PreShow Banter™ — National Chicken Wing Day04:16 - BHIS - Talkin’ Bout [infosec] News 2025-07-2805:30 - Story # 1: Bad vibes: How an AI agent coded its way t</itunes:subtitle>
      <itunes:keywords>Infosec,Cybersecurity,news</itunes:keywords>
      <itunes:explicit>No</itunes:explicit>
      <podcast:chapters url="https://share.transistor.fm/s/81f5c6be/chapters.json" type="application/json+chapters"/>
    </item>
    <item>
      <title>Microsoft's OverSharePoint 0-Day Exploit – 2025-07-21</title>
      <itunes:episode>1</itunes:episode>
      <podcast:episode>1</podcast:episode>
      <itunes:title>Microsoft's OverSharePoint 0-Day Exploit – 2025-07-21</itunes:title>
      <itunes:episodeType>full</itunes:episodeType>
      <guid isPermaLink="false">https://blubrry.com/bhis/147246697/microsofts-oversharepoint-0-day-exploit-2025-07-21/</guid>
      <link>https://share.transistor.fm/s/b8bb9e8a</link>
      <description>
        <![CDATA[<p>Register for FREE Infosec Webcasts, Anti-casts &amp; Summits – </p><p>https://poweredbybhis.com</p><p><br></p><p>00:00 - PreShow Banter™ — PaintBallers</p><p>03:55 - BHIS - Talkin’ Bout [infosec] News 2025-07-21</p><p>04:21 - Story # 1: Microsoft 0-day Mass Exploitation</p><p>09:39 - Story # 2: Replit AI went rogue, deleted a company’s entire database, then hid it and lied about it</p><p>13:15 - Story # 3: ‘All US forces must now assume their networks are compromised’ after Salt Typhoon breach</p><p>18:08 - Story # 4: After FBI Warning, Alaska Airlines Grounded; Salt Typhoon Suspected</p><p>20:45 - Story # 5: FBI Cybersecurity Breach Led to Murders of Informants in El Chapo Case</p><p>21:54 - Story # 5b: FBI’s Report</p><p>29:57 - Story # 6: Google fixes actively exploited sandbox escape zero day in Chrome</p><p>31:30 - Story # 7: Exploited Wing file transfer bug risks ‘total server compromise,’ CISA warns</p><p>32:33 - Story # 8: CitrixBleed 2 situation update — everybody already got owned</p><p>33:01 - Story # 9: At Least 750 US Hospitals Faced Disruptions During Last Year’s CrowdStrike Outage, Study Finds</p><p>46:14 - Story # 10: Amazon Ring Doorbell May 28 Mass Hacking Claim Goes Viral</p><p>48:56 - jdbgmgr.exe virus hoax</p><p>51:52 - Story # 11: HPE warns of hardcoded passwords in Aruba access points</p>
<ul><li>(00:00) - PreShow Banter™ — PaintBallers</li>
<li>(03:55) - BHIS - Talkin' Bout [infosec] News 2025-07-21</li>
<li>(04:20) - Story # 1: Microsoft 0-day Mass Exploitation</li>
<li>(09:39) - Story # 2: Replit AI went rogue, deleted a company's entire database, then hid it and lied about it</li>
<li>(13:14) - Story # 3: ‘All US forces must now assume their networks are compromised’ after Salt Typhoon breach</li>
<li>(18:08) - Story # 4: After FBI Warning, Alaska Airlines Grounded; Salt Typhoon Suspected</li>
<li>(20:44) - Story # 5: FBI Cybersecurity Breach Led to Murders of Informants in El Chapo Case</li>
<li>(21:53) - Story # 5b: FBI's Report</li>
<li>(29:56) - Story # 6: Google fixes actively exploited sandbox escape zero day in Chrome</li>
<li>(31:30) - Story # 7: Exploited Wing file transfer bug risks ‘total server compromise,’ CISA warns</li>
<li>(32:32) - Story # 8: CitrixBleed 2 situation update — everybody already got owned</li>
<li>(33:00) - Story # 9: At Least 750 US Hospitals Faced Disruptions During Last Year’s CrowdStrike Outage, Study Finds</li>
<li>(46:14) - Story # 10: Amazon Ring Doorbell May 28 Mass Hacking Claim Goes Viral</li>
<li>(48:55) - jdbgmgr.exe virus hoax</li>
<li>(51:52) - Story # 11: HPE warns of hardcoded passwords in Aruba access points</li>
</ul>]]>
      </description>
      <content:encoded>
        <![CDATA[<p>Register for FREE Infosec Webcasts, Anti-casts &amp; Summits – </p><p>https://poweredbybhis.com</p><p><br></p><p>00:00 - PreShow Banter™ — PaintBallers</p><p>03:55 - BHIS - Talkin’ Bout [infosec] News 2025-07-21</p><p>04:21 - Story # 1: Microsoft 0-day Mass Exploitation</p><p>09:39 - Story # 2: Replit AI went rogue, deleted a company’s entire database, then hid it and lied about it</p><p>13:15 - Story # 3: ‘All US forces must now assume their networks are compromised’ after Salt Typhoon breach</p><p>18:08 - Story # 4: After FBI Warning, Alaska Airlines Grounded; Salt Typhoon Suspected</p><p>20:45 - Story # 5: FBI Cybersecurity Breach Led to Murders of Informants in El Chapo Case</p><p>21:54 - Story # 5b: FBI’s Report</p><p>29:57 - Story # 6: Google fixes actively exploited sandbox escape zero day in Chrome</p><p>31:30 - Story # 7: Exploited Wing file transfer bug risks ‘total server compromise,’ CISA warns</p><p>32:33 - Story # 8: CitrixBleed 2 situation update — everybody already got owned</p><p>33:01 - Story # 9: At Least 750 US Hospitals Faced Disruptions During Last Year’s CrowdStrike Outage, Study Finds</p><p>46:14 - Story # 10: Amazon Ring Doorbell May 28 Mass Hacking Claim Goes Viral</p><p>48:56 - jdbgmgr.exe virus hoax</p><p>51:52 - Story # 11: HPE warns of hardcoded passwords in Aruba access points</p>
<ul><li>(00:00) - PreShow Banter™ — PaintBallers</li>
<li>(03:55) - BHIS - Talkin' Bout [infosec] News 2025-07-21</li>
<li>(04:20) - Story # 1: Microsoft 0-day Mass Exploitation</li>
<li>(09:39) - Story # 2: Replit AI went rogue, deleted a company's entire database, then hid it and lied about it</li>
<li>(13:14) - Story # 3: ‘All US forces must now assume their networks are compromised’ after Salt Typhoon breach</li>
<li>(18:08) - Story # 4: After FBI Warning, Alaska Airlines Grounded; Salt Typhoon Suspected</li>
<li>(20:44) - Story # 5: FBI Cybersecurity Breach Led to Murders of Informants in El Chapo Case</li>
<li>(21:53) - Story # 5b: FBI's Report</li>
<li>(29:56) - Story # 6: Google fixes actively exploited sandbox escape zero day in Chrome</li>
<li>(31:30) - Story # 7: Exploited Wing file transfer bug risks ‘total server compromise,’ CISA warns</li>
<li>(32:32) - Story # 8: CitrixBleed 2 situation update — everybody already got owned</li>
<li>(33:00) - Story # 9: At Least 750 US Hospitals Faced Disruptions During Last Year’s CrowdStrike Outage, Study Finds</li>
<li>(46:14) - Story # 10: Amazon Ring Doorbell May 28 Mass Hacking Claim Goes Viral</li>
<li>(48:55) - jdbgmgr.exe virus hoax</li>
<li>(51:52) - Story # 11: HPE warns of hardcoded passwords in Aruba access points</li>
</ul>]]>
      </content:encoded>
      <pubDate>Wed, 23 Jul 2025 16:04:39 -0400</pubDate>
      <author>Black Hills Information Security</author>
      <enclosure url="https://media.transistor.fm/b8bb9e8a/a75a51da.mp3" length="64342914" type="audio/mpeg"/>
      <itunes:author>Black Hills Information Security</itunes:author>
      <itunes:image href="https://img.transistorcdn.com/BNNsuIzVHEyuZrEWYCZkKkb_B9id3raBAtf3VhcivV0/rs:fill:0:0:1/w:1400/h:1400/q:60/mb:500000/aHR0cHM6Ly9pbWct/dXBsb2FkLXByb2R1/Y3Rpb24udHJhbnNp/c3Rvci5mbS9jZWJi/MjJkOGMzNGE0NzA3/YWJmZGMwZThmODJj/MjYxYS5qcGc.jpg"/>
      <itunes:duration>3855</itunes:duration>
      <itunes:summary>Register for FREE Infosec Webcasts, Anti-casts &amp;amp; Summits – https://poweredbybhis.com00:00 - PreShow Banter™ — PaintBallers03:55 - BHIS - Talkin’ Bout [infosec] News 2025-07-2104:21 - Story # 1: Microsoft 0-day Mass Exploitation09:39 - Story # 2: Replit AI went rogue, deleted a company’s entire database, then hid it and lied about it13:15 - Story # 3: ‘All US forces must now assume their networks are compromised’ after Salt Typhoon breach18:08 - Story # 4: After FBI Warning, Alaska Airlines Grounded; Salt Typhoon Suspected20:45 - Story # 5: FBI Cybersecurity Breach Led to Murders of Informants in El Chapo Case21:54 - Story # 5b: FBI’s Report29:57 - Story # 6: Google fixes actively exploited sandbox escape zero day in Chrome31:30 - Story # 7: Exploited Wing file transfer bug risks ‘total server compromise,’ CISA warns32:33 - Story # 8: CitrixBleed 2 situation update — everybody already got owned33:01 - Story # 9: At Least 750 US Hospitals Faced Disruptions During Last Year’s CrowdStrike Outage, Study Finds46:14 - Story # 10: Amazon Ring Doorbell May 28 Mass Hacking Claim Goes Viral48:56 - jdbgmgr.exe virus hoax51:52 - Story # 11: HPE warns of hardcoded passwords in Aruba access points</itunes:summary>
      <itunes:subtitle>Register for FREE Infosec Webcasts, Anti-casts &amp;amp; Summits – https://poweredbybhis.com00:00 - PreShow Banter™ — PaintBallers03:55 - BHIS - Talkin’ Bout [infosec] News 2025-07-2104:21 - Story # 1: Microsoft 0-day Mass Exploitation09:39 - Story # 2: Repli</itunes:subtitle>
      <itunes:keywords>Infosec,Cybersecurity,news</itunes:keywords>
      <itunes:explicit>No</itunes:explicit>
      <podcast:chapters url="https://share.transistor.fm/s/b8bb9e8a/chapters.json" type="application/json+chapters"/>
    </item>
    <item>
      <title>McDonald’s Over 64 Million Exposed Job Applicants -  2025-07-14</title>
      <itunes:episode>1</itunes:episode>
      <podcast:episode>1</podcast:episode>
      <itunes:title>McDonald’s Over 64 Million Exposed Job Applicants -  2025-07-14</itunes:title>
      <itunes:episodeType>full</itunes:episodeType>
      <guid isPermaLink="false">https://blubrry.com/bhis/147088437/mcdonalds-over-64-million-exposed-job-applicants-2025-07-14/</guid>
      <link>https://share.transistor.fm/s/04d0e7cc</link>
      <description>
        <![CDATA[<p>Register for FREE Infosec Webcasts, Anti-casts &amp; Summits – 
https://poweredbybhis.com </p><p><br></p><p>00:00 - PreShow Banter™ — Traditional Finger</p><p>00:21 - BHIS - Talkin’ Bout [infosec] News 2025-07-14</p><p>01:29 - Story # 1: ‘123456’ password exposed chats for 64 million McDonald’s job chatbot applications</p><p>22:12 - Story # 2: Employee gets $920 for credentials used in $140 million bank heist</p><p>33:50 - Story # 3: Microsoft laying off about 9,000 employees in latest round of cuts</p><p>37:21 - Story # 5: Scammy YouTube Ads</p><p>46:31 - Story # 6: New ServiceNow flaw lets attackers enumerate restricted data</p>
<ul><li>(00:00) - PreShow Banter™ — Traditional Finger</li>
<li>(00:21) - BHIS - Talkin' Bout [infosec] News 2025-07-14</li>
<li>(01:28) - Story # 1: '123456' password exposed chats for 64 million McDonald’s job chatbot applications</li>
<li>(22:12) - Story # 2: Employee gets $920 for credentials used in $140 million bank heist</li>
<li>(33:50) - Story # 3: Microsoft laying off about 9,000 employees in latest round of cuts</li>
<li>(37:20) - Story # 5: Scammy YouTube Ads</li>
<li>(46:31) - Story # 6: New ServiceNow flaw lets attackers enumerate restricted data</li>
</ul>]]>
      </description>
      <content:encoded>
        <![CDATA[<p>Register for FREE Infosec Webcasts, Anti-casts &amp; Summits – 
https://poweredbybhis.com </p><p><br></p><p>00:00 - PreShow Banter™ — Traditional Finger</p><p>00:21 - BHIS - Talkin’ Bout [infosec] News 2025-07-14</p><p>01:29 - Story # 1: ‘123456’ password exposed chats for 64 million McDonald’s job chatbot applications</p><p>22:12 - Story # 2: Employee gets $920 for credentials used in $140 million bank heist</p><p>33:50 - Story # 3: Microsoft laying off about 9,000 employees in latest round of cuts</p><p>37:21 - Story # 5: Scammy YouTube Ads</p><p>46:31 - Story # 6: New ServiceNow flaw lets attackers enumerate restricted data</p>
<ul><li>(00:00) - PreShow Banter™ — Traditional Finger</li>
<li>(00:21) - BHIS - Talkin' Bout [infosec] News 2025-07-14</li>
<li>(01:28) - Story # 1: '123456' password exposed chats for 64 million McDonald’s job chatbot applications</li>
<li>(22:12) - Story # 2: Employee gets $920 for credentials used in $140 million bank heist</li>
<li>(33:50) - Story # 3: Microsoft laying off about 9,000 employees in latest round of cuts</li>
<li>(37:20) - Story # 5: Scammy YouTube Ads</li>
<li>(46:31) - Story # 6: New ServiceNow flaw lets attackers enumerate restricted data</li>
</ul>]]>
      </content:encoded>
      <pubDate>Wed, 16 Jul 2025 16:00:50 -0400</pubDate>
      <author>Black Hills Information Security</author>
      <enclosure url="https://media.transistor.fm/04d0e7cc/a68b05b0.mp3" length="54113725" type="audio/mpeg"/>
      <itunes:author>Black Hills Information Security</itunes:author>
      <itunes:image href="https://img.transistorcdn.com/_SLJVzMpGtGYamKTgYAREraoFIjqvCVY5WuEJTRrBXY/rs:fill:0:0:1/w:1400/h:1400/q:60/mb:500000/aHR0cHM6Ly9pbWct/dXBsb2FkLXByb2R1/Y3Rpb24udHJhbnNp/c3Rvci5mbS83MTEy/ZDg4MDdhOWFjNzA0/Njk3OWRlNGNhNmEw/YTViMS5qcGc.jpg"/>
      <itunes:duration>3307</itunes:duration>
      <itunes:summary>Register for FREE Infosec Webcasts, Anti-casts &amp;amp; Summits – 
https://poweredbybhis.com 00:00 - PreShow Banter™ — Traditional Finger00:21 - BHIS - Talkin’ Bout [infosec] News 2025-07-1401:29 - Story # 1: ‘123456’ password exposed chats for 64 million McDonald’s job chatbot applications22:12 - Story # 2: Employee gets $920 for credentials used in $140 million bank heist33:50 - Story # 3: Microsoft laying off about 9,000 employees in latest round of cuts37:21 - Story # 5: Scammy YouTube Ads46:31 - Story # 6: New ServiceNow flaw lets attackers enumerate restricted data</itunes:summary>
      <itunes:subtitle>Register for FREE Infosec Webcasts, Anti-casts &amp;amp; Summits – 
https://poweredbybhis.com 00:00 - PreShow Banter™ — Traditional Finger00:21 - BHIS - Talkin’ Bout [infosec] News 2025-07-1401:29 - Story # 1: ‘123456’ password exposed chats for 64 million Mc</itunes:subtitle>
      <itunes:keywords>Infosec,Cybersecurity,news</itunes:keywords>
      <itunes:explicit>No</itunes:explicit>
      <podcast:chapters url="https://share.transistor.fm/s/04d0e7cc/chapters.json" type="application/json+chapters"/>
    </item>
    <item>
      <title>North Korean Remote Workers are at it Again! – BHIS - Talkin' Bout [infosec] News 2025-07-07</title>
      <itunes:episode>1</itunes:episode>
      <podcast:episode>1</podcast:episode>
      <itunes:title>North Korean Remote Workers are at it Again! – BHIS - Talkin' Bout [infosec] News 2025-07-07</itunes:title>
      <itunes:episodeType>full</itunes:episodeType>
      <guid isPermaLink="false">https://blubrry.com/bhis/146906004/north-korean-remote-workers-are-at-it-again-bhis-talkin-bout-infosec-news-2025-07-07/</guid>
      <link>https://share.transistor.fm/s/e0dc2806</link>
      <description>
        <![CDATA[<p>Register for FREE Infosec Webcasts, Anti-casts &amp; Summits – </p><p>https://poweredbybhis.com</p><p><br></p><p>00:00 - PreShow Banter™ — Pre Stream Appropriate</p><p>03:39 - N. Korean Remote Workers are at it Again! – BHIS - Talkin’ Bout [infosec] News 2025-07-07</p><p>05:41 - Story # 1: Fortune 500 Cyber Spending Pays Off: Large Enterprise Risk Falls 33% Despite Rising Threats</p><p>20:01 - Story # 2: Jasper Sleet: North Korean remote IT workers’ evolving tactics to infiltrate organizations</p><p>25:49 - Story # 2b: Engineer caught juggling multiple startup jobs is a cautionary tale of ‘extreme’ hustle culture, experts say</p><p>34:47 - Story # 3: Taking SHELLTER: a commercial evasion framework abused in- the- wild</p><p>42:15 - Story # 3b: Statement Regarding Recent Misuse of Shellter Elite and Elastic Security Labs’ Handling</p><p>46:58 - Story # 4: Ingram Micro outage caused by SafePay ransomware attack</p><p>49:45 - Story # 5: Germany asks Google, Apple to remove DeepSeek AI from app stores</p><p>53:13 - Story # 6: This Call of Duty game just hit Xbox Game Pass, but it’s infested with RCE hackers — I’d take cover and avoid playing until there’s a fix</p>
<ul><li>(00:00) - PreShow Banter™ — Pre Stream Appropriate</li>
<li>(03:39) - N. Korean Remote Workers are at it Again! – BHIS - Talkin' Bout [infosec] News 2025-07-07</li>
<li>(05:40) - Story # 1: Fortune 500 Cyber Spending Pays Off: Large Enterprise Risk Falls 33% Despite Rising Threats</li>
<li>(20:00) - Story # 2: Jasper Sleet: North Korean remote IT workers’ evolving tactics to infiltrate organizations</li>
<li>(25:49) - Story # 2b: Engineer caught juggling multiple startup jobs is a cautionary tale of ‘extreme’ hustle culture, experts say</li>
<li>(34:47) - Story # 3: Taking SHELLTER: a commercial evasion framework abused in- the- wild</li>
<li>(42:14) - Story # 3b: Statement Regarding Recent Misuse of Shellter Elite and Elastic Security Labs’ Handling</li>
<li>(46:58) - Story # 4: Ingram Micro outage caused by SafePay ransomware attack</li>
<li>(49:44) - Story # 5: Germany asks Google, Apple to remove DeepSeek AI from app stores</li>
<li>(53:13) - Story # 6: This Call of Duty game just hit Xbox Game Pass, but it's infested with RCE hackers — I'd take cover and avoid playing until there's a fix</li>
</ul>]]>
      </description>
      <content:encoded>
        <![CDATA[<p>Register for FREE Infosec Webcasts, Anti-casts &amp; Summits – </p><p>https://poweredbybhis.com</p><p><br></p><p>00:00 - PreShow Banter™ — Pre Stream Appropriate</p><p>03:39 - N. Korean Remote Workers are at it Again! – BHIS - Talkin’ Bout [infosec] News 2025-07-07</p><p>05:41 - Story # 1: Fortune 500 Cyber Spending Pays Off: Large Enterprise Risk Falls 33% Despite Rising Threats</p><p>20:01 - Story # 2: Jasper Sleet: North Korean remote IT workers’ evolving tactics to infiltrate organizations</p><p>25:49 - Story # 2b: Engineer caught juggling multiple startup jobs is a cautionary tale of ‘extreme’ hustle culture, experts say</p><p>34:47 - Story # 3: Taking SHELLTER: a commercial evasion framework abused in- the- wild</p><p>42:15 - Story # 3b: Statement Regarding Recent Misuse of Shellter Elite and Elastic Security Labs’ Handling</p><p>46:58 - Story # 4: Ingram Micro outage caused by SafePay ransomware attack</p><p>49:45 - Story # 5: Germany asks Google, Apple to remove DeepSeek AI from app stores</p><p>53:13 - Story # 6: This Call of Duty game just hit Xbox Game Pass, but it’s infested with RCE hackers — I’d take cover and avoid playing until there’s a fix</p>
<ul><li>(00:00) - PreShow Banter™ — Pre Stream Appropriate</li>
<li>(03:39) - N. Korean Remote Workers are at it Again! – BHIS - Talkin' Bout [infosec] News 2025-07-07</li>
<li>(05:40) - Story # 1: Fortune 500 Cyber Spending Pays Off: Large Enterprise Risk Falls 33% Despite Rising Threats</li>
<li>(20:00) - Story # 2: Jasper Sleet: North Korean remote IT workers’ evolving tactics to infiltrate organizations</li>
<li>(25:49) - Story # 2b: Engineer caught juggling multiple startup jobs is a cautionary tale of ‘extreme’ hustle culture, experts say</li>
<li>(34:47) - Story # 3: Taking SHELLTER: a commercial evasion framework abused in- the- wild</li>
<li>(42:14) - Story # 3b: Statement Regarding Recent Misuse of Shellter Elite and Elastic Security Labs’ Handling</li>
<li>(46:58) - Story # 4: Ingram Micro outage caused by SafePay ransomware attack</li>
<li>(49:44) - Story # 5: Germany asks Google, Apple to remove DeepSeek AI from app stores</li>
<li>(53:13) - Story # 6: This Call of Duty game just hit Xbox Game Pass, but it's infested with RCE hackers — I'd take cover and avoid playing until there's a fix</li>
</ul>]]>
      </content:encoded>
      <pubDate>Wed, 09 Jul 2025 14:40:44 -0400</pubDate>
      <author>Black Hills Information Security</author>
      <enclosure url="https://media.transistor.fm/e0dc2806/6dc31e16.mp3" length="55340762" type="audio/mpeg"/>
      <itunes:author>Black Hills Information Security</itunes:author>
      <itunes:image href="https://img.transistorcdn.com/K-dMJ4Rj8qBP-kJd1f5rMqkEXWqYnJ_VnSGt2ddz2sw/rs:fill:0:0:1/w:1400/h:1400/q:60/mb:500000/aHR0cHM6Ly9pbWct/dXBsb2FkLXByb2R1/Y3Rpb24udHJhbnNp/c3Rvci5mbS84MGM0/M2Q5NjJiNTYzZjli/ZjE5MmI3NjgwMDY5/MDEyYS5qcGc.jpg"/>
      <itunes:duration>3359</itunes:duration>
      <itunes:summary>Register for FREE Infosec Webcasts, Anti-casts &amp;amp; Summits – https://poweredbybhis.com00:00 - PreShow Banter™ — Pre Stream Appropriate03:39 - N. Korean Remote Workers are at it Again! – BHIS - Talkin’ Bout [infosec] News 2025-07-0705:41 - Story # 1: Fortune 500 Cyber Spending Pays Off: Large Enterprise Risk Falls 33% Despite Rising Threats20:01 - Story # 2: Jasper Sleet: North Korean remote IT workers’ evolving tactics to infiltrate organizations25:49 - Story # 2b: Engineer caught juggling multiple startup jobs is a cautionary tale of ‘extreme’ hustle culture, experts say34:47 - Story # 3: Taking SHELLTER: a commercial evasion framework abused in- the- wild42:15 - Story # 3b: Statement Regarding Recent Misuse of Shellter Elite and Elastic Security Labs’ Handling46:58 - Story # 4: Ingram Micro outage caused by SafePay ransomware attack49:45 - Story # 5: Germany asks Google, Apple to remove DeepSeek AI from app stores53:13 - Story # 6: This Call of Duty game just hit Xbox Game Pass, but it’s infested with RCE hackers — I’d take cover and avoid playing until there’s a fix</itunes:summary>
      <itunes:subtitle>Register for FREE Infosec Webcasts, Anti-casts &amp;amp; Summits – https://poweredbybhis.com00:00 - PreShow Banter™ — Pre Stream Appropriate03:39 - N. Korean Remote Workers are at it Again! – BHIS - Talkin’ Bout [infosec] News 2025-07-0705:41 - Story # 1: For</itunes:subtitle>
      <itunes:keywords>Infosec,Cybersecurity,news</itunes:keywords>
      <itunes:explicit>No</itunes:explicit>
      <podcast:chapters url="https://share.transistor.fm/s/e0dc2806/chapters.json" type="application/json+chapters"/>
    </item>
    <item>
      <title>Year of the [European Union] Linux Desktop Finally Arrives? | BHIS - Talkin' Bout [infosec] News 2025-06-30</title>
      <itunes:episode>1</itunes:episode>
      <podcast:episode>1</podcast:episode>
      <itunes:title>Year of the [European Union] Linux Desktop Finally Arrives? | BHIS - Talkin' Bout [infosec] News 2025-06-30</itunes:title>
      <itunes:episodeType>full</itunes:episodeType>
      <guid isPermaLink="false">https://blubrry.com/bhis/146777893/year-of-the-european-union-linux-desktop-finally-arrives-bhis-talkin-bout-infosec-news-2025-06-30/</guid>
      <link>https://share.transistor.fm/s/4a16e87e</link>
      <description>
        <![CDATA[<p>Register for FREE Infosec Webcasts, Anti-casts &amp; Summits – </p><p>https://poweredbybhis.com</p><p><br></p><p>Chapters:</p><p><br></p><p>00:00 - PreShow Banter™ — Names on Cups</p><p>01:39 - Year of the [European Union] Linux Desktop Finally Arrives? | BHIS - Talkin’ Bout [infosec] News 2025-06-30</p><p>03:34 - Story # 1: You should probably delete any sensitive screenshots you have in your phone right now.</p><p>10:55 - Story # 2: Ongoing Campaign Abuses Microsoft 365’s Direct Send to Deliver Phishing Emails</p><p>14:07 - Story # 3: The year of the European Union Linux desktop may finally arrive</p><p>24:46 - Story # 4: Restricted data once again leaked on War Thunder forums</p><p>27:04 - Story # 5: Scale AI Leaks Meta, Google, xAI Confidential Files Through ‘Incredibly Janky’ Document Practices</p><p>31:47 - Story # 6: French police reportedly arrest suspected BreachForums administrators</p><p>34:22 - Story # 7: Another Wave: North Korean Contagious Interview Campaign Drops 35 New Malicious npm Packages</p><p>39:41 - Story # 8: CitrixBleed 2: Electric Boogaloo — CVE-2025–5777</p><p>42:16 - Story # 9: Millions of Brother Printers Hit by Critical, Unpatchable Bug</p><p>47:05 - Story # 10: Canada orders China’s Hikvision to close Canadian operations</p><p>50:13 - Story # 11: US House bans WhatsApp on staff devices over security concerns</p><p>53:17 - ChickenSec: Chickens are becoming 3rd most popular pet: Tractor Supply CEO</p><p>56:34 - Story # 12: Norway Dam Hacked, Valve Opened But No Danger</p><p>58:11 - Review your calendar invites!</p>
<ul><li>(00:00) - PreShow Banter™ — Names on Cups</li>
<li>(01:38) - Year of the [European Union] Linux Desktop Finally Arrives? | BHIS - Talkin' Bout [infosec] News 2025-06-30</li>
<li>(03:33) - Story # 1: You should probably delete any sensitive screenshots you have in your phone right now.</li>
<li>(10:55) - Story # 2: Ongoing Campaign Abuses Microsoft 365’s Direct Send to Deliver Phishing Emails</li>
<li>(14:07) - Story # 3: The year of the European Union Linux desktop may finally arrive</li>
<li>(24:45) - Story # 4: Restricted data once again leaked on War Thunder forums</li>
<li>(27:03) - Story # 5: Scale AI Leaks Meta, Google, xAI Confidential Files Through ‘Incredibly Janky’ Document Practices</li>
<li>(31:46) - Story # 6: French police reportedly arrest suspected BreachForums administrators</li>
<li>(34:21) - Story # 7: Another Wave: North Korean Contagious Interview Campaign Drops 35 New Malicious npm Packages</li>
<li>(39:40) - Story # 8: CitrixBleed 2: Electric Boogaloo — CVE-2025–5777</li>
<li>(42:16) - Story # 9: Millions of Brother Printers Hit by Critical, Unpatchable Bug</li>
<li>(47:05) - Story # 10: Canada orders China's Hikvision to close Canadian operations</li>
<li>(50:12) - Story # 11: US House bans WhatsApp on staff devices over security concerns</li>
<li>(53:16) - ChickenSec: Chickens are becoming 3rd most popular pet: Tractor Supply CEO</li>
<li>(56:33) - Story # 12: Norway Dam Hacked, Valve Opened But No Danger</li>
<li>(58:11) - Review your calendar invites!</li>
</ul>]]>
      </description>
      <content:encoded>
        <![CDATA[<p>Register for FREE Infosec Webcasts, Anti-casts &amp; Summits – </p><p>https://poweredbybhis.com</p><p><br></p><p>Chapters:</p><p><br></p><p>00:00 - PreShow Banter™ — Names on Cups</p><p>01:39 - Year of the [European Union] Linux Desktop Finally Arrives? | BHIS - Talkin’ Bout [infosec] News 2025-06-30</p><p>03:34 - Story # 1: You should probably delete any sensitive screenshots you have in your phone right now.</p><p>10:55 - Story # 2: Ongoing Campaign Abuses Microsoft 365’s Direct Send to Deliver Phishing Emails</p><p>14:07 - Story # 3: The year of the European Union Linux desktop may finally arrive</p><p>24:46 - Story # 4: Restricted data once again leaked on War Thunder forums</p><p>27:04 - Story # 5: Scale AI Leaks Meta, Google, xAI Confidential Files Through ‘Incredibly Janky’ Document Practices</p><p>31:47 - Story # 6: French police reportedly arrest suspected BreachForums administrators</p><p>34:22 - Story # 7: Another Wave: North Korean Contagious Interview Campaign Drops 35 New Malicious npm Packages</p><p>39:41 - Story # 8: CitrixBleed 2: Electric Boogaloo — CVE-2025–5777</p><p>42:16 - Story # 9: Millions of Brother Printers Hit by Critical, Unpatchable Bug</p><p>47:05 - Story # 10: Canada orders China’s Hikvision to close Canadian operations</p><p>50:13 - Story # 11: US House bans WhatsApp on staff devices over security concerns</p><p>53:17 - ChickenSec: Chickens are becoming 3rd most popular pet: Tractor Supply CEO</p><p>56:34 - Story # 12: Norway Dam Hacked, Valve Opened But No Danger</p><p>58:11 - Review your calendar invites!</p>
<ul><li>(00:00) - PreShow Banter™ — Names on Cups</li>
<li>(01:38) - Year of the [European Union] Linux Desktop Finally Arrives? | BHIS - Talkin' Bout [infosec] News 2025-06-30</li>
<li>(03:33) - Story # 1: You should probably delete any sensitive screenshots you have in your phone right now.</li>
<li>(10:55) - Story # 2: Ongoing Campaign Abuses Microsoft 365’s Direct Send to Deliver Phishing Emails</li>
<li>(14:07) - Story # 3: The year of the European Union Linux desktop may finally arrive</li>
<li>(24:45) - Story # 4: Restricted data once again leaked on War Thunder forums</li>
<li>(27:03) - Story # 5: Scale AI Leaks Meta, Google, xAI Confidential Files Through ‘Incredibly Janky’ Document Practices</li>
<li>(31:46) - Story # 6: French police reportedly arrest suspected BreachForums administrators</li>
<li>(34:21) - Story # 7: Another Wave: North Korean Contagious Interview Campaign Drops 35 New Malicious npm Packages</li>
<li>(39:40) - Story # 8: CitrixBleed 2: Electric Boogaloo — CVE-2025–5777</li>
<li>(42:16) - Story # 9: Millions of Brother Printers Hit by Critical, Unpatchable Bug</li>
<li>(47:05) - Story # 10: Canada orders China's Hikvision to close Canadian operations</li>
<li>(50:12) - Story # 11: US House bans WhatsApp on staff devices over security concerns</li>
<li>(53:16) - ChickenSec: Chickens are becoming 3rd most popular pet: Tractor Supply CEO</li>
<li>(56:33) - Story # 12: Norway Dam Hacked, Valve Opened But No Danger</li>
<li>(58:11) - Review your calendar invites!</li>
</ul>]]>
      </content:encoded>
      <pubDate>Thu, 03 Jul 2025 20:32:02 -0400</pubDate>
      <author>Black Hills Information Security</author>
      <enclosure url="https://media.transistor.fm/4a16e87e/42b04547.mp3" length="59716785" type="audio/mpeg"/>
      <itunes:author>Black Hills Information Security</itunes:author>
      <itunes:image href="https://img.transistorcdn.com/O-R-aKpV5KNPN0Vy8rCwmHCd7wiT0_yUhOq_elKMqWM/rs:fill:0:0:1/w:1400/h:1400/q:60/mb:500000/aHR0cHM6Ly9pbWct/dXBsb2FkLXByb2R1/Y3Rpb24udHJhbnNp/c3Rvci5mbS80ZGQ1/MDEyZTU3ZDcxNzVj/MDc0NWJlNGQ5MWNl/ZDI1ZC5qcGc.jpg"/>
      <itunes:duration>3565</itunes:duration>
      <itunes:summary>Register for FREE Infosec Webcasts, Anti-casts &amp;amp; Summits – https://poweredbybhis.comChapters:00:00 - PreShow Banter™ — Names on Cups01:39 - Year of the [European Union] Linux Desktop Finally Arrives? | BHIS - Talkin’ Bout [infosec] News 2025-06-3003:34 - Story # 1: You should probably delete any sensitive screenshots you have in your phone right now.10:55 - Story # 2: Ongoing Campaign Abuses Microsoft 365’s Direct Send to Deliver Phishing Emails14:07 - Story # 3: The year of the European Union Linux desktop may finally arrive24:46 - Story # 4: Restricted data once again leaked on War Thunder forums27:04 - Story # 5: Scale AI Leaks Meta, Google, xAI Confidential Files Through ‘Incredibly Janky’ Document Practices31:47 - Story # 6: French police reportedly arrest suspected BreachForums administrators34:22 - Story # 7: Another Wave: North Korean Contagious Interview Campaign Drops 35 New Malicious npm Packages39:41 - Story # 8: CitrixBleed 2: Electric Boogaloo — CVE-2025–577742:16 - Story # 9: Millions of Brother Printers Hit by Critical, Unpatchable Bug47:05 - Story # 10: Canada orders China’s Hikvision to close Canadian operations50:13 - Story # 11: US House bans WhatsApp on staff devices over security concerns53:17 - ChickenSec: Chickens are becoming 3rd most popular pet: Tractor Supply CEO56:34 - Story # 12: Norway Dam Hacked, Valve Opened But No Danger58:11 - Review your calendar invites!</itunes:summary>
      <itunes:subtitle>Register for FREE Infosec Webcasts, Anti-casts &amp;amp; Summits – https://poweredbybhis.comChapters:00:00 - PreShow Banter™ — Names on Cups01:39 - Year of the [European Union] Linux Desktop Finally Arrives? | BHIS - Talkin’ Bout [infosec] News 2025-06-3003:3</itunes:subtitle>
      <itunes:keywords>Infosec,Cybersecurity,news</itunes:keywords>
      <itunes:explicit>No</itunes:explicit>
      <podcast:chapters url="https://share.transistor.fm/s/4a16e87e/chapters.json" type="application/json+chapters"/>
    </item>
    <item>
      <title>Iran Shuts Down It's Own Internet - 2025-06-23</title>
      <itunes:episode>1</itunes:episode>
      <podcast:episode>1</podcast:episode>
      <itunes:title>Iran Shuts Down It's Own Internet - 2025-06-23</itunes:title>
      <itunes:episodeType>full</itunes:episodeType>
      <guid isPermaLink="false">https://blubrry.com/bhis/146596252/iran-shuts-down-its-own-internet-2025-06-23/</guid>
      <link>https://share.transistor.fm/s/f3da37c3</link>
      <description>
        <![CDATA[<p>Register for Free, Live webcasts &amp; summits:</p><p>https://poweredbybhis.com</p><p><br></p><p><br></p><p>00:00 - PreShow Banter™ — Explaining the Muppets</p><p>03:09 - Iran Shuts Down It's Own Internet- BHIS - Talkin’ Bout [infosec] News 2025-06-23</p><p>04:52 - Story # 1: Iran’s government says it shut down internet to protect against cyberattacks</p><p>20:20 - Story # 2: Iranian bank linked to revolutionary guard hit by ‘cyber attack’</p><p>22:11 - Story # 3: Hackers switch to targeting U.S. insurance companies</p><p>23:32 - Story # 3b: Statement: Erie Insurance Information Security Incident (June 23)</p><p>33:33 - Story # 4: No, the 16 billion credentials leak is not a new data breach</p><p>43:23 - Story # 5: ‘Water Curse’ Targets Infosec Pros via Poisoned GitHub Repositories</p><p>47:09 - Story # 6: CISA Reveals ‘Pattern’ of Ransomware Attacks Against SimpleHelp RMM</p><p>48:49 - Story # 7: Report Links Los Pollos and RichAds to Malware Traffic Operations</p><p>58:29 - Story # 8: Minnesota lawmaker’s alleged killer had list of data broker websites in car, FBI says</p>
<ul><li>(00:00) - PreShow Banter™ — Explaining the Muppets</li>
<li>(03:08) - Iran Shuts Down It's Own Internet - BHIS - Talkin' Bout [infosec] News 2025-06-23</li>
<li>(04:52) - Story # 1: Iran’s government says it shut down internet to protect against cyberattacks</li>
<li>(20:19) - Story # 2: Iranian bank linked to revolutionary guard hit by ‘cyber attack’</li>
<li>(22:11) - Story # 3: Hackers switch to targeting U.S. insurance companies</li>
<li>(23:31) - Story # 3b: Statement: Erie Insurance Information Security Incident (June 23)</li>
<li>(33:32) - Story # 4: No, the 16 billion credentials leak is not a new data breach</li>
<li>(43:22) - Story # 5: 'Water Curse' Targets Infosec Pros via Poisoned GitHub Repositories</li>
<li>(47:09) - Story # 6: CISA Reveals 'Pattern' of Ransomware Attacks Against SimpleHelp RMM</li>
<li>(48:48) - Story # 7: Report Links Los Pollos and RichAds to Malware Traffic Operations</li>
<li>(58:29) - Story # 8: Minnesota lawmaker’s alleged killer had list of data broker websites in car, FBI says</li>
</ul>]]>
      </description>
      <content:encoded>
        <![CDATA[<p>Register for Free, Live webcasts &amp; summits:</p><p>https://poweredbybhis.com</p><p><br></p><p><br></p><p>00:00 - PreShow Banter™ — Explaining the Muppets</p><p>03:09 - Iran Shuts Down It's Own Internet- BHIS - Talkin’ Bout [infosec] News 2025-06-23</p><p>04:52 - Story # 1: Iran’s government says it shut down internet to protect against cyberattacks</p><p>20:20 - Story # 2: Iranian bank linked to revolutionary guard hit by ‘cyber attack’</p><p>22:11 - Story # 3: Hackers switch to targeting U.S. insurance companies</p><p>23:32 - Story # 3b: Statement: Erie Insurance Information Security Incident (June 23)</p><p>33:33 - Story # 4: No, the 16 billion credentials leak is not a new data breach</p><p>43:23 - Story # 5: ‘Water Curse’ Targets Infosec Pros via Poisoned GitHub Repositories</p><p>47:09 - Story # 6: CISA Reveals ‘Pattern’ of Ransomware Attacks Against SimpleHelp RMM</p><p>48:49 - Story # 7: Report Links Los Pollos and RichAds to Malware Traffic Operations</p><p>58:29 - Story # 8: Minnesota lawmaker’s alleged killer had list of data broker websites in car, FBI says</p>
<ul><li>(00:00) - PreShow Banter™ — Explaining the Muppets</li>
<li>(03:08) - Iran Shuts Down It's Own Internet - BHIS - Talkin' Bout [infosec] News 2025-06-23</li>
<li>(04:52) - Story # 1: Iran’s government says it shut down internet to protect against cyberattacks</li>
<li>(20:19) - Story # 2: Iranian bank linked to revolutionary guard hit by ‘cyber attack’</li>
<li>(22:11) - Story # 3: Hackers switch to targeting U.S. insurance companies</li>
<li>(23:31) - Story # 3b: Statement: Erie Insurance Information Security Incident (June 23)</li>
<li>(33:32) - Story # 4: No, the 16 billion credentials leak is not a new data breach</li>
<li>(43:22) - Story # 5: 'Water Curse' Targets Infosec Pros via Poisoned GitHub Repositories</li>
<li>(47:09) - Story # 6: CISA Reveals 'Pattern' of Ransomware Attacks Against SimpleHelp RMM</li>
<li>(48:48) - Story # 7: Report Links Los Pollos and RichAds to Malware Traffic Operations</li>
<li>(58:29) - Story # 8: Minnesota lawmaker’s alleged killer had list of data broker websites in car, FBI says</li>
</ul>]]>
      </content:encoded>
      <pubDate>Thu, 26 Jun 2025 12:24:56 -0400</pubDate>
      <author>Black Hills Information Security</author>
      <enclosure url="https://media.transistor.fm/f3da37c3/896539e9.mp3" length="65200331" type="audio/mpeg"/>
      <itunes:author>Black Hills Information Security</itunes:author>
      <itunes:image href="https://img.transistorcdn.com/XcbhW684tI-6I9Opy8tHKFU5KKn5zX3ttCXwKfzpfKA/rs:fill:0:0:1/w:1400/h:1400/q:60/mb:500000/aHR0cHM6Ly9pbWct/dXBsb2FkLXByb2R1/Y3Rpb24udHJhbnNp/c3Rvci5mbS84Y2Fi/NTg5MmUxNDRiMDdl/Yzc3YTYyMmY1OGUy/MjY2OS5qcGc.jpg"/>
      <itunes:duration>3955</itunes:duration>
      <itunes:summary>Register for Free, Live webcasts &amp;amp; summits:https://poweredbybhis.com00:00 - PreShow Banter™ — Explaining the Muppets03:09 - Iran Shuts Down It's Own Internet- BHIS - Talkin’ Bout [infosec] News 2025-06-2304:52 - Story # 1: Iran’s government says it shut down internet to protect against cyberattacks20:20 - Story # 2: Iranian bank linked to revolutionary guard hit by ‘cyber attack’22:11 - Story # 3: Hackers switch to targeting U.S. insurance companies23:32 - Story # 3b: Statement: Erie Insurance Information Security Incident (June 23)33:33 - Story # 4: No, the 16 billion credentials leak is not a new data breach43:23 - Story # 5: ‘Water Curse’ Targets Infosec Pros via Poisoned GitHub Repositories47:09 - Story # 6: CISA Reveals ‘Pattern’ of Ransomware Attacks Against SimpleHelp RMM48:49 - Story # 7: Report Links Los Pollos and RichAds to Malware Traffic Operations58:29 - Story # 8: Minnesota lawmaker’s alleged killer had list of data broker websites in car, FBI says</itunes:summary>
      <itunes:subtitle>Register for Free, Live webcasts &amp;amp; summits:https://poweredbybhis.com00:00 - PreShow Banter™ — Explaining the Muppets03:09 - Iran Shuts Down It's Own Internet- BHIS - Talkin’ Bout [infosec] News 2025-06-2304:52 - Story # 1: Iran’s government says it sh</itunes:subtitle>
      <itunes:keywords>Infosec,Cybersecurity,news</itunes:keywords>
      <itunes:explicit>No</itunes:explicit>
      <podcast:chapters url="https://share.transistor.fm/s/f3da37c3/chapters.json" type="application/json+chapters"/>
    </item>
    <item>
      <title>Denmark is Done with Teams! - 2025-06-16</title>
      <itunes:episode>1</itunes:episode>
      <podcast:episode>1</podcast:episode>
      <itunes:title>Denmark is Done with Teams! - 2025-06-16</itunes:title>
      <itunes:episodeType>full</itunes:episodeType>
      <guid isPermaLink="false">https://blubrry.com/bhis/146400542/denmark-is-done-with-teams-2025-06-16/</guid>
      <link>https://share.transistor.fm/s/ad0e5f0a</link>
      <description>
        <![CDATA[<p>Register for Free, Live webcasts &amp; summits:</p><p>https://poweredbybhis.com</p><p><br></p><p>00:00 - PreShow Banter™ — Government Linux</p><p>04:16 - Denmark is Done with Teams! - Talkin’ Bout [infosec] News 2025-06-16</p><p>05:02 - Story # 1: ‘We’re done with Teams’: German state hits uninstall on Microsoft</p><p>17:34 - Story # 1b: Denmark Wants to Dump Microsoft Software for Linux, LibreOffice</p><p>18:14 - Story # 2: Zero-click AI data leak flaw uncovered in Microsoft 365 Copilot</p><p>25:50 - Story # 3: Fog ransomware attacks use employee monitoring tool to break into business networks</p><p>30:25 - Story # 4: Expired Discord Invites Hijacked for Stealthy Malware Attacks</p><p>34:00 - Story # 5: SmartAttack uses smartwatches to steal data from air-gapped systems</p><p>40:25 - Story # 6: Mirai Botnets Exploiting Wazuh Security Platform Vulnerability</p><p>44:47 - Story # 7: Google Cloud and Cloudflare hit by widespread service outages</p><p>48:04 - Story # 8: UNFI cyberattack shuts down network and leaves Whole Foods and others in limbo</p><p>50:34 - Story # 9: New SharePoint Phishing Attacks Using Lick Deceptive Techniques</p><p>51:08 - Story # 10: US-backed Israeli company’s spyware used to target European journalists, Citizen Lab finds</p><p>53:32 - Story # 11: Five Zero-Days, 15 Misconfigurations Found in Salesforce Industry Cloud</p>
<ul><li>(00:00) - PreShow Banter™ — Government Linux</li>
<li>(04:15) - Denmark is Done with Teams! - Talkin' Bout [infosec] News 2025-06-16</li>
<li>(05:02) - Story # 1: 'We're done with Teams': German state hits uninstall on Microsoft</li>
<li>(17:33) - Story # 1b: Denmark Wants to Dump Microsoft Software for Linux, LibreOffice</li>
<li>(18:14) - Story # 2: Zero-click AI data leak flaw uncovered in Microsoft 365 Copilot</li>
<li>(25:49) - Story # 3: Fog ransomware attacks use employee monitoring tool to break into business networks</li>
<li>(30:24) - Story # 4: Expired Discord Invites Hijacked for Stealthy Malware Attacks</li>
<li>(33:59) - Story # 5: SmartAttack uses smartwatches to steal data from air-gapped systems</li>
<li>(40:25) - Story # 6: Mirai Botnets Exploiting Wazuh Security Platform Vulnerability</li>
<li>(44:47) - Story # 7: Google Cloud and Cloudflare hit by widespread service outages</li>
<li>(48:03) - Story # 8: UNFI cyberattack shuts down network and leaves Whole Foods and others in limbo</li>
<li>(50:33) - Story # 9: New SharePoint Phishing Attacks Using Lick Deceptive Techniques</li>
<li>(51:08) - Story # 10: US-backed Israeli company’s spyware used to target European journalists, Citizen Lab finds</li>
<li>(53:31) - Story # 11: Five Zero-Days, 15 Misconfigurations Found in Salesforce Industry Cloud</li>
</ul>]]>
      </description>
      <content:encoded>
        <![CDATA[<p>Register for Free, Live webcasts &amp; summits:</p><p>https://poweredbybhis.com</p><p><br></p><p>00:00 - PreShow Banter™ — Government Linux</p><p>04:16 - Denmark is Done with Teams! - Talkin’ Bout [infosec] News 2025-06-16</p><p>05:02 - Story # 1: ‘We’re done with Teams’: German state hits uninstall on Microsoft</p><p>17:34 - Story # 1b: Denmark Wants to Dump Microsoft Software for Linux, LibreOffice</p><p>18:14 - Story # 2: Zero-click AI data leak flaw uncovered in Microsoft 365 Copilot</p><p>25:50 - Story # 3: Fog ransomware attacks use employee monitoring tool to break into business networks</p><p>30:25 - Story # 4: Expired Discord Invites Hijacked for Stealthy Malware Attacks</p><p>34:00 - Story # 5: SmartAttack uses smartwatches to steal data from air-gapped systems</p><p>40:25 - Story # 6: Mirai Botnets Exploiting Wazuh Security Platform Vulnerability</p><p>44:47 - Story # 7: Google Cloud and Cloudflare hit by widespread service outages</p><p>48:04 - Story # 8: UNFI cyberattack shuts down network and leaves Whole Foods and others in limbo</p><p>50:34 - Story # 9: New SharePoint Phishing Attacks Using Lick Deceptive Techniques</p><p>51:08 - Story # 10: US-backed Israeli company’s spyware used to target European journalists, Citizen Lab finds</p><p>53:32 - Story # 11: Five Zero-Days, 15 Misconfigurations Found in Salesforce Industry Cloud</p>
<ul><li>(00:00) - PreShow Banter™ — Government Linux</li>
<li>(04:15) - Denmark is Done with Teams! - Talkin' Bout [infosec] News 2025-06-16</li>
<li>(05:02) - Story # 1: 'We're done with Teams': German state hits uninstall on Microsoft</li>
<li>(17:33) - Story # 1b: Denmark Wants to Dump Microsoft Software for Linux, LibreOffice</li>
<li>(18:14) - Story # 2: Zero-click AI data leak flaw uncovered in Microsoft 365 Copilot</li>
<li>(25:49) - Story # 3: Fog ransomware attacks use employee monitoring tool to break into business networks</li>
<li>(30:24) - Story # 4: Expired Discord Invites Hijacked for Stealthy Malware Attacks</li>
<li>(33:59) - Story # 5: SmartAttack uses smartwatches to steal data from air-gapped systems</li>
<li>(40:25) - Story # 6: Mirai Botnets Exploiting Wazuh Security Platform Vulnerability</li>
<li>(44:47) - Story # 7: Google Cloud and Cloudflare hit by widespread service outages</li>
<li>(48:03) - Story # 8: UNFI cyberattack shuts down network and leaves Whole Foods and others in limbo</li>
<li>(50:33) - Story # 9: New SharePoint Phishing Attacks Using Lick Deceptive Techniques</li>
<li>(51:08) - Story # 10: US-backed Israeli company’s spyware used to target European journalists, Citizen Lab finds</li>
<li>(53:31) - Story # 11: Five Zero-Days, 15 Misconfigurations Found in Salesforce Industry Cloud</li>
</ul>]]>
      </content:encoded>
      <pubDate>Wed, 18 Jun 2025 12:16:00 -0400</pubDate>
      <author>Black Hills Information Security</author>
      <enclosure url="https://media.transistor.fm/ad0e5f0a/051000d4.mp3" length="56162197" type="audio/mpeg"/>
      <itunes:author>Black Hills Information Security</itunes:author>
      <itunes:image href="https://img.transistorcdn.com/6lLoZ_kzl8jGOgrDm_qbS3NyxpkLiAtC2pHn1UnEcj8/rs:fill:0:0:1/w:1400/h:1400/q:60/mb:500000/aHR0cHM6Ly9pbWct/dXBsb2FkLXByb2R1/Y3Rpb24udHJhbnNp/c3Rvci5mbS81NTNm/MjUwNDJkZGRmMGM2/OTc0ZGM3NGQ5N2Jl/Y2I3OS5qcGc.jpg"/>
      <itunes:duration>3380</itunes:duration>
      <itunes:summary>Register for Free, Live webcasts &amp;amp; summits:https://poweredbybhis.com00:00 - PreShow Banter™ — Government Linux04:16 - Denmark is Done with Teams! - Talkin’ Bout [infosec] News 2025-06-1605:02 - Story # 1: ‘We’re done with Teams’: German state hits uninstall on Microsoft17:34 - Story # 1b: Denmark Wants to Dump Microsoft Software for Linux, LibreOffice18:14 - Story # 2: Zero-click AI data leak flaw uncovered in Microsoft 365 Copilot25:50 - Story # 3: Fog ransomware attacks use employee monitoring tool to break into business networks30:25 - Story # 4: Expired Discord Invites Hijacked for Stealthy Malware Attacks34:00 - Story # 5: SmartAttack uses smartwatches to steal data from air-gapped systems40:25 - Story # 6: Mirai Botnets Exploiting Wazuh Security Platform Vulnerability44:47 - Story # 7: Google Cloud and Cloudflare hit by widespread service outages48:04 - Story # 8: UNFI cyberattack shuts down network and leaves Whole Foods and others in limbo50:34 - Story # 9: New SharePoint Phishing Attacks Using Lick Deceptive Techniques51:08 - Story # 10: US-backed Israeli company’s spyware used to target European journalists, Citizen Lab finds53:32 - Story # 11: Five Zero-Days, 15 Misconfigurations Found in Salesforce Industry Cloud</itunes:summary>
      <itunes:subtitle>Register for Free, Live webcasts &amp;amp; summits:https://poweredbybhis.com00:00 - PreShow Banter™ — Government Linux04:16 - Denmark is Done with Teams! - Talkin’ Bout [infosec] News 2025-06-1605:02 - Story # 1: ‘We’re done with Teams’: German state hits uni</itunes:subtitle>
      <itunes:keywords>Infosec,Cybersecurity,news</itunes:keywords>
      <itunes:explicit>No</itunes:explicit>
      <podcast:chapters url="https://share.transistor.fm/s/ad0e5f0a/chapters.json" type="application/json+chapters"/>
    </item>
    <item>
      <title>Chatbot Tells Addict to Take Drugs - 2025-06-09</title>
      <itunes:episode>1</itunes:episode>
      <podcast:episode>1</podcast:episode>
      <itunes:title>Chatbot Tells Addict to Take Drugs - 2025-06-09</itunes:title>
      <itunes:episodeType>full</itunes:episodeType>
      <guid isPermaLink="false">https://blubrry.com/bhis/146193908/chatbot-tells-addict-to-take-drugs-2025-06-09/</guid>
      <link>https://share.transistor.fm/s/2cf82351</link>
      <description>
        <![CDATA[<p>Register for Free, Live webcasts &amp; summits:</p><p>https://poweredbybhis.com</p><p><br></p><p>00:00 - PreShow Banter™ — Time to Bake</p><p>05:12 - Chatbot Tells Addict to Take Drugs - Talkin’ Bout [infosec] News 2025-05-06</p><p>06:08 - Story # 1: Meta and Yandex are de-anonymizing Android users’ web browsing identifiers</p><p>12:55 - Story # 2: Therapy Chatbot Tells Recovering Addict to Have a Little Meth as a Treat</p><p>16:11 - Story # 3: The Cost of a Call: From Voice Phishing to Data Extortion</p><p>26:56 - Story # 4: Questions Swirl Around ConnectWise Flaw Used in Attacks</p><p>27:40 - Story # 4b: ConnectWise email</p><p>35:28 - Story # 5: Critical Cisco ISE Auth Bypass Flaw Impacts Cloud Deployments on AWS, Azure, and OCI</p><p>39:27 - Story # 6: Misconfigured HMIs Expose US Water Systems to Anyone With a Browser</p><p>52:20 - Story # 7: Fact Sheet: President Donald J. Trump Reprioritizes Cybersecurity Efforts to Protect America</p>
<ul><li>(00:00) - PreShow Banter™ — Time to Bake</li>
<li>(05:12) - Chatbot Tells Addict to Take Drugs - Talkin' Bout [infosec] News 2025-05-06</li>
<li>(06:08) - Story # 1: Meta and Yandex are de-anonymizing Android users’ web browsing identifiers</li>
<li>(12:55) - Story # 2: Therapy Chatbot Tells Recovering Addict to Have a Little Meth as a Treat</li>
<li>(16:11) - Story # 3: The Cost of a Call: From Voice Phishing to Data Extortion</li>
<li>(26:56) - Story # 4: Questions Swirl Around ConnectWise Flaw Used in Attacks</li>
<li>(27:40) - Story # 4b: ConnectWise email</li>
<li>(35:27) - Story # 5: Critical Cisco ISE Auth Bypass Flaw Impacts Cloud Deployments on AWS, Azure, and OCI</li>
<li>(39:26) - Story # 6: Misconfigured HMIs Expose US Water Systems to Anyone With a Browser</li>
<li>(52:19) - Story # 7: Trump cyber executive order takes aim at prior orders, secure software, identity</li>
</ul>]]>
      </description>
      <content:encoded>
        <![CDATA[<p>Register for Free, Live webcasts &amp; summits:</p><p>https://poweredbybhis.com</p><p><br></p><p>00:00 - PreShow Banter™ — Time to Bake</p><p>05:12 - Chatbot Tells Addict to Take Drugs - Talkin’ Bout [infosec] News 2025-05-06</p><p>06:08 - Story # 1: Meta and Yandex are de-anonymizing Android users’ web browsing identifiers</p><p>12:55 - Story # 2: Therapy Chatbot Tells Recovering Addict to Have a Little Meth as a Treat</p><p>16:11 - Story # 3: The Cost of a Call: From Voice Phishing to Data Extortion</p><p>26:56 - Story # 4: Questions Swirl Around ConnectWise Flaw Used in Attacks</p><p>27:40 - Story # 4b: ConnectWise email</p><p>35:28 - Story # 5: Critical Cisco ISE Auth Bypass Flaw Impacts Cloud Deployments on AWS, Azure, and OCI</p><p>39:27 - Story # 6: Misconfigured HMIs Expose US Water Systems to Anyone With a Browser</p><p>52:20 - Story # 7: Fact Sheet: President Donald J. Trump Reprioritizes Cybersecurity Efforts to Protect America</p>
<ul><li>(00:00) - PreShow Banter™ — Time to Bake</li>
<li>(05:12) - Chatbot Tells Addict to Take Drugs - Talkin' Bout [infosec] News 2025-05-06</li>
<li>(06:08) - Story # 1: Meta and Yandex are de-anonymizing Android users’ web browsing identifiers</li>
<li>(12:55) - Story # 2: Therapy Chatbot Tells Recovering Addict to Have a Little Meth as a Treat</li>
<li>(16:11) - Story # 3: The Cost of a Call: From Voice Phishing to Data Extortion</li>
<li>(26:56) - Story # 4: Questions Swirl Around ConnectWise Flaw Used in Attacks</li>
<li>(27:40) - Story # 4b: ConnectWise email</li>
<li>(35:27) - Story # 5: Critical Cisco ISE Auth Bypass Flaw Impacts Cloud Deployments on AWS, Azure, and OCI</li>
<li>(39:26) - Story # 6: Misconfigured HMIs Expose US Water Systems to Anyone With a Browser</li>
<li>(52:19) - Story # 7: Trump cyber executive order takes aim at prior orders, secure software, identity</li>
</ul>]]>
      </content:encoded>
      <pubDate>Wed, 11 Jun 2025 20:45:28 -0400</pubDate>
      <author>Black Hills Information Security</author>
      <enclosure url="https://media.transistor.fm/2cf82351/97819bca.mp3" length="60100922" type="audio/mpeg"/>
      <itunes:author>Black Hills Information Security</itunes:author>
      <itunes:image href="https://img.transistorcdn.com/7uHJBedX86mXFV_Mac9Ah9Qxe9LO7QWHBuELaNvzVEk/rs:fill:0:0:1/w:1400/h:1400/q:60/mb:500000/aHR0cHM6Ly9pbWct/dXBsb2FkLXByb2R1/Y3Rpb24udHJhbnNp/c3Rvci5mbS9iOTNl/NzBkOTU5ZmU2MjM3/MGQwMGM3OTFjMjMw/YWZkNC5qcGc.jpg"/>
      <itunes:duration>3622</itunes:duration>
      <itunes:summary>Register for Free, Live webcasts &amp;amp; summits:https://poweredbybhis.com00:00 - PreShow Banter™ — Time to Bake05:12 - Chatbot Tells Addict to Take Drugs - Talkin’ Bout [infosec] News 2025-05-0606:08 - Story # 1: Meta and Yandex are de-anonymizing Android users’ web browsing identifiers12:55 - Story # 2: Therapy Chatbot Tells Recovering Addict to Have a Little Meth as a Treat16:11 - Story # 3: The Cost of a Call: From Voice Phishing to Data Extortion26:56 - Story # 4: Questions Swirl Around ConnectWise Flaw Used in Attacks27:40 - Story # 4b: ConnectWise email35:28 - Story # 5: Critical Cisco ISE Auth Bypass Flaw Impacts Cloud Deployments on AWS, Azure, and OCI39:27 - Story # 6: Misconfigured HMIs Expose US Water Systems to Anyone With a Browser52:20 - Story # 7: Fact Sheet: President Donald J. Trump Reprioritizes Cybersecurity Efforts to Protect America</itunes:summary>
      <itunes:subtitle>Register for Free, Live webcasts &amp;amp; summits:https://poweredbybhis.com00:00 - PreShow Banter™ — Time to Bake05:12 - Chatbot Tells Addict to Take Drugs - Talkin’ Bout [infosec] News 2025-05-0606:08 - Story # 1: Meta and Yandex are de-anonymizing Android </itunes:subtitle>
      <itunes:keywords>Infosec,Cybersecurity,news</itunes:keywords>
      <itunes:explicit>No</itunes:explicit>
      <podcast:chapters url="https://share.transistor.fm/s/2cf82351/chapters.json" type="application/json+chapters"/>
    </item>
    <item>
      <title>Victoria’s Secrets are Compromised - 2025-06-02</title>
      <itunes:episode>1</itunes:episode>
      <podcast:episode>1</podcast:episode>
      <itunes:title>Victoria’s Secrets are Compromised - 2025-06-02</itunes:title>
      <itunes:episodeType>full</itunes:episodeType>
      <guid isPermaLink="false">https://blubrry.com/bhis/146045966/victorias-secrets-are-compromised-2025-06-02/</guid>
      <link>https://share.transistor.fm/s/caf0f488</link>
      <description>
        <![CDATA[<p>Register for Free, Live webcasts &amp; summits:</p><p>https://poweredbybhis.com</p><p><br></p><p>00:00 - PreShow Banter™ — natural MSG</p><p>05:31 - Victoria’s Secrets are Compromised - Talkin’ Bout [infosec] News 2025-06-02</p><p>06:31 - Story # 1: Authors Are Accidentally Leaving AI Prompts In their Novels</p><p>08:36 - Story # 1b: This Latest AI Book Debacle Is A Disturbing Part Of A Growing Trend</p><p>09:41 - Story # 2: Developer Builds Tool That Scrapes YouTube Comments, Uses AI to Predict Where Users Live</p><p>10:48 - Story # 2b: AI-powered OSINT tool profiles YouTube users, raising privacy concerns</p><p>15:55 - Story # 2c: Researchers Dump 2 Billion Scraped Discord Messages Online</p><p>20:28 - Story # 3: Vending-Bench: A Benchmark for Long-Term Coherence of Autonomous Agents</p><p>21:02 - Story # 3b: An AI Goes Insane, Emails FBI Over $2 (YouTube)</p><p>26:55 - Story # 4: The UK will totally replace two-thirds of junior civil servants with AI chatbots, says the chatbot</p><p>27:27 - Story # 4b: Reeves confirms 15% cut to Civil Service running costs</p><p>29:29 - Story # 5: ConnectWise Breached, ScreenConnect Customers Targeted</p><p>31:28 - LOLRMM - a curated list of Remote Monitoring and Management (RMM) tools that could potentially be abused by threat actors.</p><p>35:34 - Story # 6: New Windows RAT Evades Detection for Weeks Using Corrupted DOS and PE Headers</p><p>36:19 - Story # 7: US intelligence employee arrested for alleged double-dealing of classified info</p><p>40:12 - Story # 8: Victoria’s Secret takes down website after security incident</p><p>45:43 - Story # 9: Microsoft and CrowdStrike partner to link hacking group names</p><p>46:59 - Story # 10: Zscaler Acquisition of Red Canary</p><p>49:57 - Story # 11: Most of CISA’s senior leaders are leaving the agency</p><p>51:22 - Story # 12: Telegram announces partnership with Musk’s xAI</p><p>51:32 - Story # 13: Google warns of Vietnam-based hackers using bogus AI video generators to spread malware</p>
<ul><li>(00:00) - PreShow Banter™ — natural MSG</li>
<li>(05:31) - BHIS - Talkin' Bout [infosec] News 2025-06-02</li>
<li>(06:31) - Story # 1: Authors Are Accidentally Leaving AI Prompts In their Novels</li>
<li>(08:36) - Story # 1b: This Latest AI Book Debacle Is A Disturbing Part Of A Growing Trend</li>
<li>(09:40) - Story # 2: Developer Builds Tool That Scrapes YouTube Comments, Uses AI to Predict Where Users Live</li>
<li>(10:47) - Story # 2b: AI-powered OSINT tool profiles YouTube users, raising privacy concerns</li>
<li>(15:55) - Story # 2c: Researchers Dump 2 Billion Scraped Discord Messages Online</li>
<li>(20:28) - Story # 3: Vending-Bench: A Benchmark for Long-Term Coherence of Autonomous Agents</li>
<li>(21:02) - Story # 3b: An AI Goes Insane, Emails FBI Over $2 (YouTube)</li>
<li>(26:55) - Story # 4: The UK will totally replace two-thirds of junior civil servants with AI chatbots, says the chatbot</li>
<li>(27:27) - Story # 4b: Reeves confirms 15% cut to Civil Service running costs</li>
<li>(29:28) - Story # 5: ConnectWise Breached, ScreenConnect Customers Targeted</li>
<li>(31:27) - LOLRMM - a curated list of Remote Monitoring and Management (RMM) tools that could potentially be abused by threat actors.</li>
<li>(35:33) - Story # 6: New Windows RAT Evades Detection for Weeks Using Corrupted DOS and PE Headers</li>
<li>(36:18) - Story # 7: US intelligence employee arrested for alleged double-dealing of classified info</li>
<li>(40:12) - Story # 8: Victoria’s Secret takes down website after security incident</li>
<li>(45:42) - Story # 9: Microsoft and CrowdStrike partner to link hacking group names</li>
<li>(46:59) - Story # 10: Zscaler Acquisition of Red Canary</li>
<li>(49:57) - Story # 11: Most of CISA’s senior leaders are leaving the agency</li>
<li>(51:21) - Story # 12: Telegram announces partnership with Musk's xAI</li>
<li>(51:32) - Story # 13: Google warns of Vietnam-based hackers using bogus AI video generators to spread malware</li>
</ul>]]>
      </description>
      <content:encoded>
        <![CDATA[<p>Register for Free, Live webcasts &amp; summits:</p><p>https://poweredbybhis.com</p><p><br></p><p>00:00 - PreShow Banter™ — natural MSG</p><p>05:31 - Victoria’s Secrets are Compromised - Talkin’ Bout [infosec] News 2025-06-02</p><p>06:31 - Story # 1: Authors Are Accidentally Leaving AI Prompts In their Novels</p><p>08:36 - Story # 1b: This Latest AI Book Debacle Is A Disturbing Part Of A Growing Trend</p><p>09:41 - Story # 2: Developer Builds Tool That Scrapes YouTube Comments, Uses AI to Predict Where Users Live</p><p>10:48 - Story # 2b: AI-powered OSINT tool profiles YouTube users, raising privacy concerns</p><p>15:55 - Story # 2c: Researchers Dump 2 Billion Scraped Discord Messages Online</p><p>20:28 - Story # 3: Vending-Bench: A Benchmark for Long-Term Coherence of Autonomous Agents</p><p>21:02 - Story # 3b: An AI Goes Insane, Emails FBI Over $2 (YouTube)</p><p>26:55 - Story # 4: The UK will totally replace two-thirds of junior civil servants with AI chatbots, says the chatbot</p><p>27:27 - Story # 4b: Reeves confirms 15% cut to Civil Service running costs</p><p>29:29 - Story # 5: ConnectWise Breached, ScreenConnect Customers Targeted</p><p>31:28 - LOLRMM - a curated list of Remote Monitoring and Management (RMM) tools that could potentially be abused by threat actors.</p><p>35:34 - Story # 6: New Windows RAT Evades Detection for Weeks Using Corrupted DOS and PE Headers</p><p>36:19 - Story # 7: US intelligence employee arrested for alleged double-dealing of classified info</p><p>40:12 - Story # 8: Victoria’s Secret takes down website after security incident</p><p>45:43 - Story # 9: Microsoft and CrowdStrike partner to link hacking group names</p><p>46:59 - Story # 10: Zscaler Acquisition of Red Canary</p><p>49:57 - Story # 11: Most of CISA’s senior leaders are leaving the agency</p><p>51:22 - Story # 12: Telegram announces partnership with Musk’s xAI</p><p>51:32 - Story # 13: Google warns of Vietnam-based hackers using bogus AI video generators to spread malware</p>
<ul><li>(00:00) - PreShow Banter™ — natural MSG</li>
<li>(05:31) - BHIS - Talkin' Bout [infosec] News 2025-06-02</li>
<li>(06:31) - Story # 1: Authors Are Accidentally Leaving AI Prompts In their Novels</li>
<li>(08:36) - Story # 1b: This Latest AI Book Debacle Is A Disturbing Part Of A Growing Trend</li>
<li>(09:40) - Story # 2: Developer Builds Tool That Scrapes YouTube Comments, Uses AI to Predict Where Users Live</li>
<li>(10:47) - Story # 2b: AI-powered OSINT tool profiles YouTube users, raising privacy concerns</li>
<li>(15:55) - Story # 2c: Researchers Dump 2 Billion Scraped Discord Messages Online</li>
<li>(20:28) - Story # 3: Vending-Bench: A Benchmark for Long-Term Coherence of Autonomous Agents</li>
<li>(21:02) - Story # 3b: An AI Goes Insane, Emails FBI Over $2 (YouTube)</li>
<li>(26:55) - Story # 4: The UK will totally replace two-thirds of junior civil servants with AI chatbots, says the chatbot</li>
<li>(27:27) - Story # 4b: Reeves confirms 15% cut to Civil Service running costs</li>
<li>(29:28) - Story # 5: ConnectWise Breached, ScreenConnect Customers Targeted</li>
<li>(31:27) - LOLRMM - a curated list of Remote Monitoring and Management (RMM) tools that could potentially be abused by threat actors.</li>
<li>(35:33) - Story # 6: New Windows RAT Evades Detection for Weeks Using Corrupted DOS and PE Headers</li>
<li>(36:18) - Story # 7: US intelligence employee arrested for alleged double-dealing of classified info</li>
<li>(40:12) - Story # 8: Victoria’s Secret takes down website after security incident</li>
<li>(45:42) - Story # 9: Microsoft and CrowdStrike partner to link hacking group names</li>
<li>(46:59) - Story # 10: Zscaler Acquisition of Red Canary</li>
<li>(49:57) - Story # 11: Most of CISA’s senior leaders are leaving the agency</li>
<li>(51:21) - Story # 12: Telegram announces partnership with Musk's xAI</li>
<li>(51:32) - Story # 13: Google warns of Vietnam-based hackers using bogus AI video generators to spread malware</li>
</ul>]]>
      </content:encoded>
      <pubDate>Thu, 05 Jun 2025 16:21:56 -0400</pubDate>
      <author>Black Hills Information Security</author>
      <enclosure url="https://media.transistor.fm/caf0f488/e340dc55.mp3" length="55715852" type="audio/mpeg"/>
      <itunes:author>Black Hills Information Security</itunes:author>
      <itunes:image href="https://img.transistorcdn.com/wv1r9E1uWd4PE9kvecXH-DMZW7_H90GebW2SgWcIhr0/rs:fill:0:0:1/w:1400/h:1400/q:60/mb:500000/aHR0cHM6Ly9pbWct/dXBsb2FkLXByb2R1/Y3Rpb24udHJhbnNp/c3Rvci5mbS8xZjY3/ZTE4ZTY0YjUxZThm/OTNlMGVkMTYzOGQ1/YmUxZC5qcGc.jpg"/>
      <itunes:duration>3276</itunes:duration>
      <itunes:summary>Register for Free, Live webcasts &amp;amp; summits:https://poweredbybhis.com00:00 - PreShow Banter™ — natural MSG05:31 - Victoria’s Secrets are Compromised - Talkin’ Bout [infosec] News 2025-06-0206:31 - Story # 1: Authors Are Accidentally Leaving AI Prompts In their Novels08:36 - Story # 1b: This Latest AI Book Debacle Is A Disturbing Part Of A Growing Trend09:41 - Story # 2: Developer Builds Tool That Scrapes YouTube Comments, Uses AI to Predict Where Users Live10:48 - Story # 2b: AI-powered OSINT tool profiles YouTube users, raising privacy concerns15:55 - Story # 2c: Researchers Dump 2 Billion Scraped Discord Messages Online20:28 - Story # 3: Vending-Bench: A Benchmark for Long-Term Coherence of Autonomous Agents21:02 - Story # 3b: An AI Goes Insane, Emails FBI Over $2 (YouTube)26:55 - Story # 4: The UK will totally replace two-thirds of junior civil servants with AI chatbots, says the chatbot27:27 - Story # 4b: Reeves confirms 15% cut to Civil Service running costs29:29 - Story # 5: ConnectWise Breached, ScreenConnect Customers Targeted31:28 - LOLRMM - a curated list of Remote Monitoring and Management (RMM) tools that could potentially be abused by threat actors.35:34 - Story # 6: New Windows RAT Evades Detection for Weeks Using Corrupted DOS and PE Headers36:19 - Story # 7: US intelligence employee arrested for alleged double-dealing of classified info40:12 - Story # 8: Victoria’s Secret takes down website after security incident45:43 - Story # 9: Microsoft and CrowdStrike partner to link hacking group names46:59 - Story # 10: Zscaler Acquisition of Red Canary49:57 - Story # 11: Most of CISA’s senior leaders are leaving the agency51:22 - Story # 12: Telegram announces partnership with Musk’s xAI51:32 - Story # 13: Google warns of Vietnam-based hackers using bogus AI video generators to spread malware</itunes:summary>
      <itunes:subtitle>Register for Free, Live webcasts &amp;amp; summits:https://poweredbybhis.com00:00 - PreShow Banter™ — natural MSG05:31 - Victoria’s Secrets are Compromised - Talkin’ Bout [infosec] News 2025-06-0206:31 - Story # 1: Authors Are Accidentally Leaving AI Prompts </itunes:subtitle>
      <itunes:keywords>Infosec,Cybersecurity,news</itunes:keywords>
      <itunes:explicit>No</itunes:explicit>
      <podcast:chapters url="https://share.transistor.fm/s/caf0f488/chapters.json" type="application/json+chapters"/>
    </item>
    <item>
      <title>Blackmailing A.I. - 2025-05-27</title>
      <itunes:episode>1</itunes:episode>
      <podcast:episode>1</podcast:episode>
      <itunes:title>Blackmailing A.I. - 2025-05-27</itunes:title>
      <itunes:episodeType>full</itunes:episodeType>
      <guid isPermaLink="false">https://blubrry.com/bhis/145886081/blackmailing-ai-2025-05-27/</guid>
      <link>https://share.transistor.fm/s/3a638ebb</link>
      <description>
        <![CDATA[<p>Register for Free, Live webcasts &amp; summits:</p><p>https://poweredbybhis.com</p><p><br></p><p>00:00 - PreShow Banter™ — I just want Jorts!</p><p>05:42 - Blackmailing A.I. - Talkin’ Bout [infosec] News 2025-05-27</p><p>07:01 - Story # 1: Experimental drones developed to neutralize mass shooters, disable weapons</p><p>11:29 - Story # 2: How a global malware operation was taken down from a federal court in Georgia</p><p>13:50 - Story # 3: Judge allows Workday AI bias lawsuit to proceed as collective action</p><p>15:23 - Marker 17</p><p>19:25 - Story # 4: Anthropic’s new AI model turns to blackmail when engineers try to take it offline</p><p>32:19 - Story # 5: TeleMessage customers include DC Police, Andreessen Horowitz, JP Morgan, and hundreds more</p><p>34:53 - Story # 6: TikTok videos now push infostealer malware in ClickFix attacks</p><p>36:57 - Story # 7: Beware, Coinbase users. Crypto thieves are taking fingers now</p><p>40:56 - Story # 8: Signal now blocks Microsoft Recall screenshots on Windows 11</p><p>43:16 - Story # 9: Suspected InfoStealer Malware Data Breach Exposed 184 Million Logins and Passwords</p><p>44:54 - Story # 10: Google Chrome’s Built-in Manager Lets Users Update Breached Passwords with One Click</p><p>48:09 - Story # 11: Russian military hackers ‘Fancy Bear’ target Western aid supply chains to Ukraine, NSA report says</p><p>50:13 - Story # 12: Google Gemini AI assistant coming to new cars in 2025, starting with Volvo</p><p>54:17 - Story # 13: Hacker Conference HOPE Says U.S. Immigration Crackdown Caused Massive Crash in Ticket Sales</p><p>56:55 - Story # 13b: [HOPE_16] International Travel Tips</p>
<ul><li>(00:00) - PreShow Banter™ — I just want Jorts!</li>
<li>(05:41) - Blackmailing A.I. - Talkin' Bout [infosec] News 2025-05-27</li>
<li>(07:00) - Story # 1: Experimental drones developed to neutralize mass shooters, disable weapons</li>
<li>(11:28) - Story # 2: How a global malware operation was taken down from a federal court in Georgia</li>
<li>(13:49) - Story # 3: Judge allows Workday AI bias lawsuit to proceed as collective action</li>
<li>(19:24) - Story # 4: Anthropic’s new AI model turns to blackmail when engineers try to take it offline</li>
<li>(32:18) - Story # 5: TeleMessage customers include DC Police, Andreessen Horowitz, JP Morgan, and hundreds more</li>
<li>(34:53) - Story # 6: TikTok videos now push infostealer malware in ClickFix attacks</li>
<li>(36:57) - Story # 7: Beware, Coinbase users. Crypto thieves are taking fingers now</li>
<li>(40:56) - Story # 8: Signal now blocks Microsoft Recall screenshots on Windows 11</li>
<li>(43:16) - Story # 9: Suspected InfoStealer Malware Data Breach Exposed 184 Million Logins and Passwords</li>
<li>(44:53) - Story # 10: Google Chrome's Built-in Manager Lets Users Update Breached Passwords with One Click</li>
<li>(48:08) - Story # 11: Russian military hackers 'Fancy Bear' target Western aid supply chains to Ukraine, NSA report says</li>
<li>(50:13) - Story # 12: Google Gemini AI assistant coming to new cars in 2025, starting with Volvo</li>
<li>(54:17) - Story # 13: Hacker Conference HOPE Says U.S. Immigration Crackdown Caused Massive Crash in Ticket Sales</li>
<li>(56:54) - Story # 13b: [HOPE_16] International Travel Tips</li>
</ul>]]>
      </description>
      <content:encoded>
        <![CDATA[<p>Register for Free, Live webcasts &amp; summits:</p><p>https://poweredbybhis.com</p><p><br></p><p>00:00 - PreShow Banter™ — I just want Jorts!</p><p>05:42 - Blackmailing A.I. - Talkin’ Bout [infosec] News 2025-05-27</p><p>07:01 - Story # 1: Experimental drones developed to neutralize mass shooters, disable weapons</p><p>11:29 - Story # 2: How a global malware operation was taken down from a federal court in Georgia</p><p>13:50 - Story # 3: Judge allows Workday AI bias lawsuit to proceed as collective action</p><p>15:23 - Marker 17</p><p>19:25 - Story # 4: Anthropic’s new AI model turns to blackmail when engineers try to take it offline</p><p>32:19 - Story # 5: TeleMessage customers include DC Police, Andreessen Horowitz, JP Morgan, and hundreds more</p><p>34:53 - Story # 6: TikTok videos now push infostealer malware in ClickFix attacks</p><p>36:57 - Story # 7: Beware, Coinbase users. Crypto thieves are taking fingers now</p><p>40:56 - Story # 8: Signal now blocks Microsoft Recall screenshots on Windows 11</p><p>43:16 - Story # 9: Suspected InfoStealer Malware Data Breach Exposed 184 Million Logins and Passwords</p><p>44:54 - Story # 10: Google Chrome’s Built-in Manager Lets Users Update Breached Passwords with One Click</p><p>48:09 - Story # 11: Russian military hackers ‘Fancy Bear’ target Western aid supply chains to Ukraine, NSA report says</p><p>50:13 - Story # 12: Google Gemini AI assistant coming to new cars in 2025, starting with Volvo</p><p>54:17 - Story # 13: Hacker Conference HOPE Says U.S. Immigration Crackdown Caused Massive Crash in Ticket Sales</p><p>56:55 - Story # 13b: [HOPE_16] International Travel Tips</p>
<ul><li>(00:00) - PreShow Banter™ — I just want Jorts!</li>
<li>(05:41) - Blackmailing A.I. - Talkin' Bout [infosec] News 2025-05-27</li>
<li>(07:00) - Story # 1: Experimental drones developed to neutralize mass shooters, disable weapons</li>
<li>(11:28) - Story # 2: How a global malware operation was taken down from a federal court in Georgia</li>
<li>(13:49) - Story # 3: Judge allows Workday AI bias lawsuit to proceed as collective action</li>
<li>(19:24) - Story # 4: Anthropic’s new AI model turns to blackmail when engineers try to take it offline</li>
<li>(32:18) - Story # 5: TeleMessage customers include DC Police, Andreessen Horowitz, JP Morgan, and hundreds more</li>
<li>(34:53) - Story # 6: TikTok videos now push infostealer malware in ClickFix attacks</li>
<li>(36:57) - Story # 7: Beware, Coinbase users. Crypto thieves are taking fingers now</li>
<li>(40:56) - Story # 8: Signal now blocks Microsoft Recall screenshots on Windows 11</li>
<li>(43:16) - Story # 9: Suspected InfoStealer Malware Data Breach Exposed 184 Million Logins and Passwords</li>
<li>(44:53) - Story # 10: Google Chrome's Built-in Manager Lets Users Update Breached Passwords with One Click</li>
<li>(48:08) - Story # 11: Russian military hackers 'Fancy Bear' target Western aid supply chains to Ukraine, NSA report says</li>
<li>(50:13) - Story # 12: Google Gemini AI assistant coming to new cars in 2025, starting with Volvo</li>
<li>(54:17) - Story # 13: Hacker Conference HOPE Says U.S. Immigration Crackdown Caused Massive Crash in Ticket Sales</li>
<li>(56:54) - Story # 13b: [HOPE_16] International Travel Tips</li>
</ul>]]>
      </content:encoded>
      <pubDate>Thu, 29 May 2025 20:02:21 -0400</pubDate>
      <author>Black Hills Information Security</author>
      <enclosure url="https://media.transistor.fm/3a638ebb/7303a0d9.mp3" length="58513439" type="audio/mpeg"/>
      <itunes:author>Black Hills Information Security</itunes:author>
      <itunes:image href="https://img.transistorcdn.com/m20K_wYbGRmeMCZjvwVJQKUIU1SY7I0iuIMVJayZzDo/rs:fill:0:0:1/w:1400/h:1400/q:60/mb:500000/aHR0cHM6Ly9pbWct/dXBsb2FkLXByb2R1/Y3Rpb24udHJhbnNp/c3Rvci5mbS8xMzdi/OTNlOGViMjc1ZTNj/MjUyZDljZjY5MDBi/ZmJhZi5qcGc.jpg"/>
      <itunes:duration>3516</itunes:duration>
      <itunes:summary>Register for Free, Live webcasts &amp;amp; summits:https://poweredbybhis.com00:00 - PreShow Banter™ — I just want Jorts!05:42 - Blackmailing A.I. - Talkin’ Bout [infosec] News 2025-05-2707:01 - Story # 1: Experimental drones developed to neutralize mass shooters, disable weapons11:29 - Story # 2: How a global malware operation was taken down from a federal court in Georgia13:50 - Story # 3: Judge allows Workday AI bias lawsuit to proceed as collective action15:23 - Marker 1719:25 - Story # 4: Anthropic’s new AI model turns to blackmail when engineers try to take it offline32:19 - Story # 5: TeleMessage customers include DC Police, Andreessen Horowitz, JP Morgan, and hundreds more34:53 - Story # 6: TikTok videos now push infostealer malware in ClickFix attacks36:57 - Story # 7: Beware, Coinbase users. Crypto thieves are taking fingers now40:56 - Story # 8: Signal now blocks Microsoft Recall screenshots on Windows 1143:16 - Story # 9: Suspected InfoStealer Malware Data Breach Exposed 184 Million Logins and Passwords44:54 - Story # 10: Google Chrome’s Built-in Manager Lets Users Update Breached Passwords with One Click48:09 - Story # 11: Russian military hackers ‘Fancy Bear’ target Western aid supply chains to Ukraine, NSA report says50:13 - Story # 12: Google Gemini AI assistant coming to new cars in 2025, starting with Volvo54:17 - Story # 13: Hacker Conference HOPE Says U.S. Immigration Crackdown Caused Massive Crash in Ticket Sales56:55 - Story # 13b: [HOPE_16] International Travel Tips</itunes:summary>
      <itunes:subtitle>Register for Free, Live webcasts &amp;amp; summits:https://poweredbybhis.com00:00 - PreShow Banter™ — I just want Jorts!05:42 - Blackmailing A.I. - Talkin’ Bout [infosec] News 2025-05-2707:01 - Story # 1: Experimental drones developed to neutralize mass shoot</itunes:subtitle>
      <itunes:keywords>Infosec,Cybersecurity,news</itunes:keywords>
      <itunes:explicit>No</itunes:explicit>
      <podcast:chapters url="https://share.transistor.fm/s/3a638ebb/chapters.json" type="application/json+chapters"/>
    </item>
    <item>
      <title>WORLDS FIRST CPU Ransomware! - 2025-05-19</title>
      <itunes:episode>1</itunes:episode>
      <podcast:episode>1</podcast:episode>
      <itunes:title>WORLDS FIRST CPU Ransomware! - 2025-05-19</itunes:title>
      <itunes:episodeType>full</itunes:episodeType>
      <guid isPermaLink="false">https://blubrry.com/bhis/145662898/worlds-first-cpu-ransomware-2025-05-19/</guid>
      <link>https://share.transistor.fm/s/39ae05c4</link>
      <description>
        <![CDATA[<p>Register for Free, Live webcasts &amp; summits:</p><p>https://poweredbybhis.coma</p><p><br></p><p>00:00 - PreShow Banter™ — Twiddle Me This</p><p>02:04 - WORLDS FIRST CPU Ransomware! - Talkin’ Bout [infosec] News 2025-05-19</p><p>03:10 - Story # 1: Coinbase - Standing Up to Extortionists</p><p>11:26 - Story # 2: World’s first CPU-level ransomware</p><p>15:09 - Story # 3: New Intel CPU flaws leak sensitive data from privileged memory</p><p>19:04 - Story # 4: After latest kidnap attempt, crypto types tell crime bosses: Transfers are traceable</p><p>21:39 - Story # 5: Chinese ‘kill switches’ found hidden in US solar farms</p><p>27:52 - Story # 6: Congress proposes 10-year ban on state AI regulations</p><p>31:41 - Story # 7: Hackers Abuse Copilot AI in SharePoint to Steal Passwords and Sensitive Data</p><p>36:02 - Story # 8: European Vulnerability Database Launches Amid US CVE Chaos</p><p>37:32 - Story # 9: 89 million Steam accounts reportedly leaked. Change your password now.</p><p>40:06 - Story # 10: Hackers Now Targeting US Retailers After UK Attacks, Google</p><p>41:11 - Story # 11: How the Signal Knockoff App TeleMessage Got Hacked in 20 Minutes</p><p>43:08 - Story # 11b: DDoSecrets publishes 410 GB of heap dumps, hacked from TeleMessage’s archive server</p><p>47:12 - ChickenSec: ‘A Minecraft Movie’ Viral TikTok Trend Wreaks Havoc In Theaters</p><p>51:20 - Story # 12: Education giant Pearson hit by cyberattack exposing customer data</p>
<ul><li>(00:00) - PreShow Banter™ — Twiddle Me This</li>
<li>(02:03) - WORLDS FIRST CPU Ransomware! - Talkin' Bout [infosec] News 2025-05-19</li>
<li>(03:10) - Story # 1: Coinbase - Standing Up to Extortionists</li>
<li>(11:25) - Story # 2: World's first CPU-level ransomware</li>
<li>(15:09) - Story # 3: New Intel CPU flaws leak sensitive data from privileged memory</li>
<li>(19:03) - Story # 4: After latest kidnap attempt, crypto types tell crime bosses: Transfers are traceable</li>
<li>(21:38) - Story # 5: Chinese ‘kill switches’ found hidden in US solar farms</li>
<li>(27:52) - Story # 6: Congress proposes 10-year ban on state AI regulations</li>
<li>(31:41) - Story # 7: Hackers Abuse Copilot AI in SharePoint to Steal Passwords and Sensitive Data</li>
<li>(36:01) - Story # 8: European Vulnerability Database Launches Amid US CVE Chaos</li>
<li>(37:32) - Story # 9: 89 million Steam accounts reportedly leaked. Change your password now.</li>
<li>(40:06) - Story # 10: Hackers Now Targeting US Retailers After UK Attacks, Google</li>
<li>(41:10) - Story # 11: How the Signal Knockoff App TeleMessage Got Hacked in 20 Minutes</li>
<li>(43:08) - Story # 11b: DDoSecrets publishes 410 GB of heap dumps, hacked from TeleMessage's archive server</li>
<li>(47:12) - ChickenSec: ‘A Minecraft Movie’ Viral TikTok Trend Wreaks Havoc In Theaters</li>
<li>(51:20) - Story # 12: Education giant Pearson hit by cyberattack exposing customer data</li>
</ul>]]>
      </description>
      <content:encoded>
        <![CDATA[<p>Register for Free, Live webcasts &amp; summits:</p><p>https://poweredbybhis.coma</p><p><br></p><p>00:00 - PreShow Banter™ — Twiddle Me This</p><p>02:04 - WORLDS FIRST CPU Ransomware! - Talkin’ Bout [infosec] News 2025-05-19</p><p>03:10 - Story # 1: Coinbase - Standing Up to Extortionists</p><p>11:26 - Story # 2: World’s first CPU-level ransomware</p><p>15:09 - Story # 3: New Intel CPU flaws leak sensitive data from privileged memory</p><p>19:04 - Story # 4: After latest kidnap attempt, crypto types tell crime bosses: Transfers are traceable</p><p>21:39 - Story # 5: Chinese ‘kill switches’ found hidden in US solar farms</p><p>27:52 - Story # 6: Congress proposes 10-year ban on state AI regulations</p><p>31:41 - Story # 7: Hackers Abuse Copilot AI in SharePoint to Steal Passwords and Sensitive Data</p><p>36:02 - Story # 8: European Vulnerability Database Launches Amid US CVE Chaos</p><p>37:32 - Story # 9: 89 million Steam accounts reportedly leaked. Change your password now.</p><p>40:06 - Story # 10: Hackers Now Targeting US Retailers After UK Attacks, Google</p><p>41:11 - Story # 11: How the Signal Knockoff App TeleMessage Got Hacked in 20 Minutes</p><p>43:08 - Story # 11b: DDoSecrets publishes 410 GB of heap dumps, hacked from TeleMessage’s archive server</p><p>47:12 - ChickenSec: ‘A Minecraft Movie’ Viral TikTok Trend Wreaks Havoc In Theaters</p><p>51:20 - Story # 12: Education giant Pearson hit by cyberattack exposing customer data</p>
<ul><li>(00:00) - PreShow Banter™ — Twiddle Me This</li>
<li>(02:03) - WORLDS FIRST CPU Ransomware! - Talkin' Bout [infosec] News 2025-05-19</li>
<li>(03:10) - Story # 1: Coinbase - Standing Up to Extortionists</li>
<li>(11:25) - Story # 2: World's first CPU-level ransomware</li>
<li>(15:09) - Story # 3: New Intel CPU flaws leak sensitive data from privileged memory</li>
<li>(19:03) - Story # 4: After latest kidnap attempt, crypto types tell crime bosses: Transfers are traceable</li>
<li>(21:38) - Story # 5: Chinese ‘kill switches’ found hidden in US solar farms</li>
<li>(27:52) - Story # 6: Congress proposes 10-year ban on state AI regulations</li>
<li>(31:41) - Story # 7: Hackers Abuse Copilot AI in SharePoint to Steal Passwords and Sensitive Data</li>
<li>(36:01) - Story # 8: European Vulnerability Database Launches Amid US CVE Chaos</li>
<li>(37:32) - Story # 9: 89 million Steam accounts reportedly leaked. Change your password now.</li>
<li>(40:06) - Story # 10: Hackers Now Targeting US Retailers After UK Attacks, Google</li>
<li>(41:10) - Story # 11: How the Signal Knockoff App TeleMessage Got Hacked in 20 Minutes</li>
<li>(43:08) - Story # 11b: DDoSecrets publishes 410 GB of heap dumps, hacked from TeleMessage's archive server</li>
<li>(47:12) - ChickenSec: ‘A Minecraft Movie’ Viral TikTok Trend Wreaks Havoc In Theaters</li>
<li>(51:20) - Story # 12: Education giant Pearson hit by cyberattack exposing customer data</li>
</ul>]]>
      </content:encoded>
      <pubDate>Wed, 21 May 2025 17:58:17 -0400</pubDate>
      <author>Black Hills Information Security</author>
      <enclosure url="https://media.transistor.fm/39ae05c4/65a24c18.mp3" length="53836218" type="audio/mpeg"/>
      <itunes:author>Black Hills Information Security</itunes:author>
      <itunes:image href="https://img.transistorcdn.com/omSbTeIc-sQfwIbAcFuG81KRDdMhd4nAHuKdQx3DAZ8/rs:fill:0:0:1/w:1400/h:1400/q:60/mb:500000/aHR0cHM6Ly9pbWct/dXBsb2FkLXByb2R1/Y3Rpb24udHJhbnNp/c3Rvci5mbS8zNTI4/MjJhY2ExMWE2MGVi/OGZhMGJlYjg4Y2M3/ZTAwOC5qcGc.jpg"/>
      <itunes:duration>3207</itunes:duration>
      <itunes:summary>Register for Free, Live webcasts &amp;amp; summits:https://poweredbybhis.coma00:00 - PreShow Banter™ — Twiddle Me This02:04 - WORLDS FIRST CPU Ransomware! - Talkin’ Bout [infosec] News 2025-05-1903:10 - Story # 1: Coinbase - Standing Up to Extortionists11:26 - Story # 2: World’s first CPU-level ransomware15:09 - Story # 3: New Intel CPU flaws leak sensitive data from privileged memory19:04 - Story # 4: After latest kidnap attempt, crypto types tell crime bosses: Transfers are traceable21:39 - Story # 5: Chinese ‘kill switches’ found hidden in US solar farms27:52 - Story # 6: Congress proposes 10-year ban on state AI regulations31:41 - Story # 7: Hackers Abuse Copilot AI in SharePoint to Steal Passwords and Sensitive Data36:02 - Story # 8: European Vulnerability Database Launches Amid US CVE Chaos37:32 - Story # 9: 89 million Steam accounts reportedly leaked. Change your password now.40:06 - Story # 10: Hackers Now Targeting US Retailers After UK Attacks, Google41:11 - Story # 11: How the Signal Knockoff App TeleMessage Got Hacked in 20 Minutes43:08 - Story # 11b: DDoSecrets publishes 410 GB of heap dumps, hacked from TeleMessage’s archive server47:12 - ChickenSec: ‘A Minecraft Movie’ Viral TikTok Trend Wreaks Havoc In Theaters51:20 - Story # 12: Education giant Pearson hit by cyberattack exposing customer data</itunes:summary>
      <itunes:subtitle>Register for Free, Live webcasts &amp;amp; summits:https://poweredbybhis.coma00:00 - PreShow Banter™ — Twiddle Me This02:04 - WORLDS FIRST CPU Ransomware! - Talkin’ Bout [infosec] News 2025-05-1903:10 - Story # 1: Coinbase - Standing Up to Extortionists11:26 </itunes:subtitle>
      <itunes:keywords>Infosec,Cybersecurity,news</itunes:keywords>
      <itunes:explicit>No</itunes:explicit>
      <podcast:chapters url="https://share.transistor.fm/s/39ae05c4/chapters.json" type="application/json+chapters"/>
    </item>
    <item>
      <title>Inside DragonForce 2025-05-12</title>
      <itunes:episode>1</itunes:episode>
      <podcast:episode>1</podcast:episode>
      <itunes:title>Inside DragonForce 2025-05-12</itunes:title>
      <itunes:episodeType>full</itunes:episodeType>
      <guid isPermaLink="false">https://blubrry.com/bhis/145464417/inside-dragonforce-2025-05-12/</guid>
      <link>https://share.transistor.fm/s/d1de1ba1</link>
      <description>
        <![CDATA[<p>Register for Free, Live webcasts &amp; summits:</p><p>https://poweredbybhis.coma</p><p><br></p><p>00:00 - PreShow Banter™ — Crime is bad</p><p>00:18 - dangerous trend of destroying Chromebooks</p><p>04:33 - BHIS - Talkin’ Bout [infosec] News 2025-05-12</p><p>05:40 - Story # 1: LockBit Ransomware Hacked, Insider Secrets Exposed</p><p>06:36 - Story # 1b: https://ransomch.at</p><p>09:31 - Story # 2: White House Proposes $500 Million Cut to CISA</p><p>10:35 - Story # 2b: Update to How CISA Shares Cyber-Related Alerts and Notifications</p><p>18:09 - Story # 3: Inside DragonForce, the Group Tied to M&amp;S, Co-op and Harrods Hacks</p><p>22:28 - Story # 4: Despite ransom payment, PowerSchool hacker now extorting individual school districts</p><p>26:28 - Story # 5: Tech CEOs warn Senate: Outdated US power grid threatens AI ambitions</p><p>32:20 - Story # 6: Warning — 19 Billion Compromised Passwords Have Been Published Online</p><p>34:37 - Story # 7: Botnet Dismantled in International Operation, Russian and Kazakhstani Administrators Indicted</p><p>36:33 - Story # 8: How a new type of AI is helping police skirt facial recognition bans</p><p>48:38 - Story # 9: Threat Actor Bypass SentinelOne EDR to Deploy Babuk Ransomware</p><p>51:33 - Story # 10: A Framework to Report AI’s Flaws</p><p>53:42 - Story # 10b: MITRE ATLAS™</p><p>54:49 - Simply Hot Ones Challenge | LIVE FIRE SPICE
</p><ul><li>(00:00) - PreShow Banter™ — Crime is bad</li>
<li>(00:18) - dangerous trend of destroying Chromebooks</li>
<li>(04:32) - BHIS - Talkin' Bout [infosec] News 2025-05-12</li>
<li>(05:39) - Story # 1: LockBit Ransomware Hacked, Insider Secrets Exposed</li>
<li>(06:36) - Story # 1b: https://ransomch.at</li>
<li>(09:31) - Story # 2: White House Proposes $500 Million Cut to CISA</li>
<li>(10:35) - Story # 2b: Update to How CISA Shares Cyber-Related Alerts and Notifications</li>
<li>(18:08) - Story # 3: Inside DragonForce, the Group Tied to M&amp;S, Co-op and Harrods Hacks</li>
<li>(22:28) - Story # 4: Despite ransom payment, PowerSchool hacker now extorting individual school districts</li>
<li>(26:28) - Story # 5: Tech CEOs warn Senate: Outdated US power grid threatens AI ambitions</li>
<li>(32:20) - Story # 6: Warning — 19 Billion Compromised Passwords Have Been Published Online</li>
<li>(34:37) - Story # 7: Botnet Dismantled in International Operation, Russian and Kazakhstani Administrators Indicted</li>
<li>(36:33) - Story # 8: How a new type of AI is helping police skirt facial recognition bans</li>
<li>(48:37) - Story # 9: Threat Actor Bypass SentinelOne EDR to Deploy Babuk Ransomware</li>
<li>(51:32) - Story # 10: A Framework to Report AI’s Flaws</li>
<li>(53:42) - Story # 10b: MITRE ATLAS™</li>
<li>(54:48) - Simply Hot Ones Challenge | LIVE FIRE SPICE 🔥 and CYBER</li>
</ul>]]>
      </description>
      <content:encoded>
        <![CDATA[<p>Register for Free, Live webcasts &amp; summits:</p><p>https://poweredbybhis.coma</p><p><br></p><p>00:00 - PreShow Banter™ — Crime is bad</p><p>00:18 - dangerous trend of destroying Chromebooks</p><p>04:33 - BHIS - Talkin’ Bout [infosec] News 2025-05-12</p><p>05:40 - Story # 1: LockBit Ransomware Hacked, Insider Secrets Exposed</p><p>06:36 - Story # 1b: https://ransomch.at</p><p>09:31 - Story # 2: White House Proposes $500 Million Cut to CISA</p><p>10:35 - Story # 2b: Update to How CISA Shares Cyber-Related Alerts and Notifications</p><p>18:09 - Story # 3: Inside DragonForce, the Group Tied to M&amp;S, Co-op and Harrods Hacks</p><p>22:28 - Story # 4: Despite ransom payment, PowerSchool hacker now extorting individual school districts</p><p>26:28 - Story # 5: Tech CEOs warn Senate: Outdated US power grid threatens AI ambitions</p><p>32:20 - Story # 6: Warning — 19 Billion Compromised Passwords Have Been Published Online</p><p>34:37 - Story # 7: Botnet Dismantled in International Operation, Russian and Kazakhstani Administrators Indicted</p><p>36:33 - Story # 8: How a new type of AI is helping police skirt facial recognition bans</p><p>48:38 - Story # 9: Threat Actor Bypass SentinelOne EDR to Deploy Babuk Ransomware</p><p>51:33 - Story # 10: A Framework to Report AI’s Flaws</p><p>53:42 - Story # 10b: MITRE ATLAS™</p><p>54:49 - Simply Hot Ones Challenge | LIVE FIRE SPICE
</p><ul><li>(00:00) - PreShow Banter™ — Crime is bad</li>
<li>(00:18) - dangerous trend of destroying Chromebooks</li>
<li>(04:32) - BHIS - Talkin' Bout [infosec] News 2025-05-12</li>
<li>(05:39) - Story # 1: LockBit Ransomware Hacked, Insider Secrets Exposed</li>
<li>(06:36) - Story # 1b: https://ransomch.at</li>
<li>(09:31) - Story # 2: White House Proposes $500 Million Cut to CISA</li>
<li>(10:35) - Story # 2b: Update to How CISA Shares Cyber-Related Alerts and Notifications</li>
<li>(18:08) - Story # 3: Inside DragonForce, the Group Tied to M&amp;S, Co-op and Harrods Hacks</li>
<li>(22:28) - Story # 4: Despite ransom payment, PowerSchool hacker now extorting individual school districts</li>
<li>(26:28) - Story # 5: Tech CEOs warn Senate: Outdated US power grid threatens AI ambitions</li>
<li>(32:20) - Story # 6: Warning — 19 Billion Compromised Passwords Have Been Published Online</li>
<li>(34:37) - Story # 7: Botnet Dismantled in International Operation, Russian and Kazakhstani Administrators Indicted</li>
<li>(36:33) - Story # 8: How a new type of AI is helping police skirt facial recognition bans</li>
<li>(48:37) - Story # 9: Threat Actor Bypass SentinelOne EDR to Deploy Babuk Ransomware</li>
<li>(51:32) - Story # 10: A Framework to Report AI’s Flaws</li>
<li>(53:42) - Story # 10b: MITRE ATLAS™</li>
<li>(54:48) - Simply Hot Ones Challenge | LIVE FIRE SPICE 🔥 and CYBER</li>
</ul>]]>
      </content:encoded>
      <pubDate>Wed, 14 May 2025 20:39:43 -0400</pubDate>
      <author>Black Hills Information Security</author>
      <enclosure url="https://media.transistor.fm/d1de1ba1/4510bfa7.mp3" length="56651783" type="audio/mpeg"/>
      <itunes:author>Black Hills Information Security</itunes:author>
      <itunes:image href="https://img.transistorcdn.com/TR-2S5fXGUBYEr4Jyh4mYFlFpVhlAwIKIcyK1EMYPps/rs:fill:0:0:1/w:1400/h:1400/q:60/mb:500000/aHR0cHM6Ly9pbWct/dXBsb2FkLXByb2R1/Y3Rpb24udHJhbnNp/c3Rvci5mbS8wMDUw/OWNlNjdjYzdkZWI2/MTkwYTE3ZjEyZGE0/ZWZhYS5qcGc.jpg"/>
      <itunes:duration>3375</itunes:duration>
      <itunes:summary>Register for Free, Live webcasts &amp;amp; summits:https://poweredbybhis.coma00:00 - PreShow Banter™ — Crime is bad00:18 - dangerous trend of destroying Chromebooks04:33 - BHIS - Talkin’ Bout [infosec] News 2025-05-1205:40 - Story # 1: LockBit Ransomware Hacked, Insider Secrets Exposed06:36 - Story # 1b: https://ransomch.at09:31 - Story # 2: White House Proposes $500 Million Cut to CISA10:35 - Story # 2b: Update to How CISA Shares Cyber-Related Alerts and Notifications18:09 - Story # 3: Inside DragonForce, the Group Tied to M&amp;amp;S, Co-op and Harrods Hacks22:28 - Story # 4: Despite ransom payment, PowerSchool hacker now extorting individual school districts26:28 - Story # 5: Tech CEOs warn Senate: Outdated US power grid threatens AI ambitions32:20 - Story # 6: Warning — 19 Billion Compromised Passwords Have Been Published Online34:37 - Story # 7: Botnet Dismantled in International Operation, Russian and Kazakhstani Administrators Indicted36:33 - Story # 8: How a new type of AI is helping police skirt facial recognition bans48:38 - Story # 9: Threat Actor Bypass SentinelOne EDR to Deploy Babuk Ransomware51:33 - Story # 10: A Framework to Report AI’s Flaws53:42 - Story # 10b: MITRE ATLAS™54:49 - Simply Hot Ones Challenge | LIVE FIRE SPICE</itunes:summary>
      <itunes:subtitle>Register for Free, Live webcasts &amp;amp; summits:https://poweredbybhis.coma00:00 - PreShow Banter™ — Crime is bad00:18 - dangerous trend of destroying Chromebooks04:33 - BHIS - Talkin’ Bout [infosec] News 2025-05-1205:40 - Story # 1: LockBit Ransomware Hack</itunes:subtitle>
      <itunes:keywords>Infosec,Cybersecurity,news</itunes:keywords>
      <itunes:explicit>No</itunes:explicit>
      <podcast:chapters url="https://share.transistor.fm/s/d1de1ba1/chapters.json" type="application/json+chapters"/>
    </item>
    <item>
      <title>Scatterd Spider Weaves Another Attack-  2025-05-05</title>
      <itunes:episode>1</itunes:episode>
      <podcast:episode>1</podcast:episode>
      <itunes:title>Scatterd Spider Weaves Another Attack-  2025-05-05</itunes:title>
      <itunes:episodeType>full</itunes:episodeType>
      <guid isPermaLink="false">https://blubrry.com/bhis/145286962/scatterd-spider-weaves-another-attack-2025-05-05/</guid>
      <link>https://share.transistor.fm/s/00d6bf12</link>
      <description>
        <![CDATA[<p>Register for Free, Live webcasts &amp; summits:</p><p>https://poweredbybhis.com</p><p><br></p><p>00:00 - PreShow Banter™ — Double Coffee</p><p>05:04 - BHIS - Talkin’ Bout [infosec] News 2025-05-05</p><p>06:05 - Story # 1: Largest bank in the world issues stark security warning about technology that billions use every single day</p><p>11:15 - Story # 2: M&amp;S cyber-attack linked to hacking group Scattered Spider</p><p>13:47 - Story # 3: Top Tier Target | What It Takes to Defend a Cybersecurity Company from Today’s Adversaries</p><p>20:10 - Story # 4: A North Korean agent applied for a job at a popular crypto firm: They tripped him up with a simple question about Halloween</p><p>21:54 - Story # 4b: The one interview question that will protect you from North Korean fake workers</p><p>23:09 - Story # 5: Santa Clarita Man Agrees to Plead Guilty to Hacking Disney Employee’s Computer, Downloading Confidential Data from Company</p><p>25:33 - Story # 6: TerraStealerV2 and TerraLogger: Golden Chickens’ New Malware Families Discovered</p><p>29:19 - Story # 7: Gremlin Stealer: New Stealer on Sale in Underground Forum</p><p>33:17 - Story # 8: Over 290,000 citizens at risk: CloudSEK uncovers major data breach at Bangalore Water Supply and Sewerage Board</p><p>34:56 - Story # 9: The Signal Clone the Trump Admin Uses Was Hacked</p><p>39:58 - Story # 10: Windows RDP lets you log in using revoked passwords. Microsoft is OK with that.</p><p>42:19 - Story # 11: Software dev fortifies his blog with ‘zip bombs’ — attacking bots meet their end with explosive data package</p><p>43:44 - Story # 12: WhatsApp says in-app AI tools will still keep messages secret</p><p>45:37 - Story # 13: House passes bill to study routers’ national security risks</p><p>49:48 - Simply Hot Ones Challenge (YouTube)</p>
<ul><li>(00:00) - PreShow Banter™ — Double Coffee</li>
<li>(05:03) - BHIS - Talkin' Bout [infosec] News 2025-05-05</li>
<li>(06:05) - Story # 1: Largest bank in the world issues stark security warning about technology that billions use every single day</li>
<li>(11:15) - Story # 2: M&amp;S cyber-attack linked to hacking group Scattered Spider</li>
<li>(13:46) - Story # 3: Top Tier Target | What It Takes to Defend a Cybersecurity Company from Today’s Adversaries</li>
<li>(20:10) - Story # 4: A North Korean agent applied for a job at a popular crypto firm: They tripped him up with a simple question about Halloween</li>
<li>(21:54) - Story # 4b: The one interview question that will protect you from North Korean fake workers</li>
<li>(23:09) - Story # 5: Santa Clarita Man Agrees to Plead Guilty to Hacking Disney Employee’s Computer, Downloading Confidential Data from Company</li>
<li>(25:33) - Story # 6: TerraStealerV2 and TerraLogger: Golden Chickens' New Malware Families Discovered</li>
<li>(29:19) - Story # 7: Gremlin Stealer: New Stealer on Sale in Underground Forum</li>
<li>(33:16) - Story # 8: Over 290,000 citizens at risk: CloudSEK uncovers major data breach at Bangalore Water Supply and Sewerage Board</li>
<li>(34:55) - Story # 9: The Signal Clone the Trump Admin Uses Was Hacked</li>
<li>(39:57) - Story # 10: Windows RDP lets you log in using revoked passwords. Microsoft is OK with that.</li>
<li>(42:19) - Story # 11: Software dev fortifies his blog with 'zip bombs' — attacking bots meet their end with explosive data package</li>
<li>(43:43) - Story # 12: WhatsApp says in-app AI tools will still keep messages secret</li>
<li>(45:36) - Story # 13: House passes bill to study routers’ national security risks</li>
<li>(49:47) - Simply Hot Ones Challenge (YouTube)</li>
</ul>]]>
      </description>
      <content:encoded>
        <![CDATA[<p>Register for Free, Live webcasts &amp; summits:</p><p>https://poweredbybhis.com</p><p><br></p><p>00:00 - PreShow Banter™ — Double Coffee</p><p>05:04 - BHIS - Talkin’ Bout [infosec] News 2025-05-05</p><p>06:05 - Story # 1: Largest bank in the world issues stark security warning about technology that billions use every single day</p><p>11:15 - Story # 2: M&amp;S cyber-attack linked to hacking group Scattered Spider</p><p>13:47 - Story # 3: Top Tier Target | What It Takes to Defend a Cybersecurity Company from Today’s Adversaries</p><p>20:10 - Story # 4: A North Korean agent applied for a job at a popular crypto firm: They tripped him up with a simple question about Halloween</p><p>21:54 - Story # 4b: The one interview question that will protect you from North Korean fake workers</p><p>23:09 - Story # 5: Santa Clarita Man Agrees to Plead Guilty to Hacking Disney Employee’s Computer, Downloading Confidential Data from Company</p><p>25:33 - Story # 6: TerraStealerV2 and TerraLogger: Golden Chickens’ New Malware Families Discovered</p><p>29:19 - Story # 7: Gremlin Stealer: New Stealer on Sale in Underground Forum</p><p>33:17 - Story # 8: Over 290,000 citizens at risk: CloudSEK uncovers major data breach at Bangalore Water Supply and Sewerage Board</p><p>34:56 - Story # 9: The Signal Clone the Trump Admin Uses Was Hacked</p><p>39:58 - Story # 10: Windows RDP lets you log in using revoked passwords. Microsoft is OK with that.</p><p>42:19 - Story # 11: Software dev fortifies his blog with ‘zip bombs’ — attacking bots meet their end with explosive data package</p><p>43:44 - Story # 12: WhatsApp says in-app AI tools will still keep messages secret</p><p>45:37 - Story # 13: House passes bill to study routers’ national security risks</p><p>49:48 - Simply Hot Ones Challenge (YouTube)</p>
<ul><li>(00:00) - PreShow Banter™ — Double Coffee</li>
<li>(05:03) - BHIS - Talkin' Bout [infosec] News 2025-05-05</li>
<li>(06:05) - Story # 1: Largest bank in the world issues stark security warning about technology that billions use every single day</li>
<li>(11:15) - Story # 2: M&amp;S cyber-attack linked to hacking group Scattered Spider</li>
<li>(13:46) - Story # 3: Top Tier Target | What It Takes to Defend a Cybersecurity Company from Today’s Adversaries</li>
<li>(20:10) - Story # 4: A North Korean agent applied for a job at a popular crypto firm: They tripped him up with a simple question about Halloween</li>
<li>(21:54) - Story # 4b: The one interview question that will protect you from North Korean fake workers</li>
<li>(23:09) - Story # 5: Santa Clarita Man Agrees to Plead Guilty to Hacking Disney Employee’s Computer, Downloading Confidential Data from Company</li>
<li>(25:33) - Story # 6: TerraStealerV2 and TerraLogger: Golden Chickens' New Malware Families Discovered</li>
<li>(29:19) - Story # 7: Gremlin Stealer: New Stealer on Sale in Underground Forum</li>
<li>(33:16) - Story # 8: Over 290,000 citizens at risk: CloudSEK uncovers major data breach at Bangalore Water Supply and Sewerage Board</li>
<li>(34:55) - Story # 9: The Signal Clone the Trump Admin Uses Was Hacked</li>
<li>(39:57) - Story # 10: Windows RDP lets you log in using revoked passwords. Microsoft is OK with that.</li>
<li>(42:19) - Story # 11: Software dev fortifies his blog with 'zip bombs' — attacking bots meet their end with explosive data package</li>
<li>(43:43) - Story # 12: WhatsApp says in-app AI tools will still keep messages secret</li>
<li>(45:36) - Story # 13: House passes bill to study routers’ national security risks</li>
<li>(49:47) - Simply Hot Ones Challenge (YouTube)</li>
</ul>]]>
      </content:encoded>
      <pubDate>Fri, 09 May 2025 00:07:00 -0400</pubDate>
      <author>Black Hills Information Security</author>
      <enclosure url="https://media.transistor.fm/00d6bf12/f1d9147b.mp3" length="55133076" type="audio/mpeg"/>
      <itunes:author>Black Hills Information Security</itunes:author>
      <itunes:image href="https://img.transistorcdn.com/x90tkuaEUT7L-rv6HTE74gBGDZNjHS2Wk-8173P7VxE/rs:fill:0:0:1/w:1400/h:1400/q:60/mb:500000/aHR0cHM6Ly9pbWct/dXBsb2FkLXByb2R1/Y3Rpb24udHJhbnNp/c3Rvci5mbS9kYTVj/YjkyNmZlOTFjNmQw/YTc3MGZlZTIwZmRm/YmE3YS5qcGc.jpg"/>
      <itunes:duration>3283</itunes:duration>
      <itunes:summary>Register for Free, Live webcasts &amp;amp; summits:https://poweredbybhis.com00:00 - PreShow Banter™ — Double Coffee05:04 - BHIS - Talkin’ Bout [infosec] News 2025-05-0506:05 - Story # 1: Largest bank in the world issues stark security warning about technology that billions use every single day11:15 - Story # 2: M&amp;amp;S cyber-attack linked to hacking group Scattered Spider13:47 - Story # 3: Top Tier Target | What It Takes to Defend a Cybersecurity Company from Today’s Adversaries20:10 - Story # 4: A North Korean agent applied for a job at a popular crypto firm: They tripped him up with a simple question about Halloween21:54 - Story # 4b: The one interview question that will protect you from North Korean fake workers23:09 - Story # 5: Santa Clarita Man Agrees to Plead Guilty to Hacking Disney Employee’s Computer, Downloading Confidential Data from Company25:33 - Story # 6: TerraStealerV2 and TerraLogger: Golden Chickens’ New Malware Families Discovered29:19 - Story # 7: Gremlin Stealer: New Stealer on Sale in Underground Forum33:17 - Story # 8: Over 290,000 citizens at risk: CloudSEK uncovers major data breach at Bangalore Water Supply and Sewerage Board34:56 - Story # 9: The Signal Clone the Trump Admin Uses Was Hacked39:58 - Story # 10: Windows RDP lets you log in using revoked passwords. Microsoft is OK with that.42:19 - Story # 11: Software dev fortifies his blog with ‘zip bombs’ — attacking bots meet their end with explosive data package43:44 - Story # 12: WhatsApp says in-app AI tools will still keep messages secret45:37 - Story # 13: House passes bill to study routers’ national security risks49:48 - Simply Hot Ones Challenge (YouTube)</itunes:summary>
      <itunes:subtitle>Register for Free, Live webcasts &amp;amp; summits:https://poweredbybhis.com00:00 - PreShow Banter™ — Double Coffee05:04 - BHIS - Talkin’ Bout [infosec] News 2025-05-0506:05 - Story # 1: Largest bank in the world issues stark security warning about technology</itunes:subtitle>
      <itunes:keywords>Infosec,Cybersecurity,news</itunes:keywords>
      <itunes:explicit>No</itunes:explicit>
      <podcast:chapters url="https://share.transistor.fm/s/00d6bf12/chapters.json" type="application/json+chapters"/>
    </item>
    <item>
      <title>InfoSec CEO Charged with Installing Malware! – 2025-04-28</title>
      <itunes:episode>1</itunes:episode>
      <podcast:episode>1</podcast:episode>
      <itunes:title>InfoSec CEO Charged with Installing Malware! – 2025-04-28</itunes:title>
      <itunes:episodeType>full</itunes:episodeType>
      <guid isPermaLink="false">https://blubrry.com/bhis/145067657/infosec-ceo-charged-with-installing-malware-2025-04-28/</guid>
      <link>https://share.transistor.fm/s/95ab2bb3</link>
      <description>
        <![CDATA[<p>Register for upcoming webcasts &amp; summits - </p><p>https://poweredbybhis.com</p><p><br></p><p>00:00 - PreShow Banter™ — Talking Bout Red Green</p><p>02:24 - InfoSec CEO Charged with Installing Malware! – BHIS - Talkin’ Bout [infosec] News 2025-04-28</p><p>03:01 - Story # 1: CEO of cybersecurity firm charged with installing malware on hospital systems</p><p>11:22 - Story # 2: 2025 Data Breach Investigations Report</p><p>25:05 - Story # 3: The Age of Realtime Deepfake Fraud Is Here</p><p>29:00 - Story # 4: Whistleblower: DOGE Siphoned NLRB Case Data</p><p>33:09 - Story # 5: Top employee monitoring app leaks 21 million screenshots on thousands of users</p><p>36:59 - Story # 6: 159 CVEs Exploited in Q1 2025 — 28.3% Within 24 Hours of Disclosure</p><p>42:13 - Story # 7: SAP zero-day vulnerability under widespread active exploitation</p><p>46:29 - Story # 8: FBI: US lost record $16.6 billion to cybercrime in 2024</p><p>47:55 - Story # 8b: FBI Report Doc</p><p>53:50 - Story # 9: M- Trends 2025 Report</p>
<ul><li>(00:00) - PreShow Banter™ — Talking Bout Red Green</li>
<li>(02:24) - InfoSec CEO Charged with Installing Malware! – BHIS - Talkin' Bout [infosec] News 2025-04-28</li>
<li>(03:01) - Story # 1: CEO of cybersecurity firm charged with installing malware on hospital systems</li>
<li>(11:21) - Story # 2: 2025 Data Breach Investigations Report</li>
<li>(25:04) - Story # 3: The Age of Realtime Deepfake Fraud Is Here</li>
<li>(28:59) - Story # 4: Whistleblower: DOGE Siphoned NLRB Case Data</li>
<li>(33:09) - Story # 5: Top employee monitoring app leaks 21 million screenshots on thousands of users</li>
<li>(36:58) - Story # 6: 159 CVEs Exploited in Q1 2025 — 28.3% Within 24 Hours of Disclosure</li>
<li>(42:12) - Story # 7: SAP zero-day vulnerability under widespread active exploitation</li>
<li>(46:29) - Story # 8: FBI: US lost record $16.6 billion to cybercrime in 2024</li>
<li>(47:54) - Story # 8b: FBI Report Doc</li>
<li>(53:49) - Story # 9: M- Trends 2025 Report</li>
</ul>]]>
      </description>
      <content:encoded>
        <![CDATA[<p>Register for upcoming webcasts &amp; summits - </p><p>https://poweredbybhis.com</p><p><br></p><p>00:00 - PreShow Banter™ — Talking Bout Red Green</p><p>02:24 - InfoSec CEO Charged with Installing Malware! – BHIS - Talkin’ Bout [infosec] News 2025-04-28</p><p>03:01 - Story # 1: CEO of cybersecurity firm charged with installing malware on hospital systems</p><p>11:22 - Story # 2: 2025 Data Breach Investigations Report</p><p>25:05 - Story # 3: The Age of Realtime Deepfake Fraud Is Here</p><p>29:00 - Story # 4: Whistleblower: DOGE Siphoned NLRB Case Data</p><p>33:09 - Story # 5: Top employee monitoring app leaks 21 million screenshots on thousands of users</p><p>36:59 - Story # 6: 159 CVEs Exploited in Q1 2025 — 28.3% Within 24 Hours of Disclosure</p><p>42:13 - Story # 7: SAP zero-day vulnerability under widespread active exploitation</p><p>46:29 - Story # 8: FBI: US lost record $16.6 billion to cybercrime in 2024</p><p>47:55 - Story # 8b: FBI Report Doc</p><p>53:50 - Story # 9: M- Trends 2025 Report</p>
<ul><li>(00:00) - PreShow Banter™ — Talking Bout Red Green</li>
<li>(02:24) - InfoSec CEO Charged with Installing Malware! – BHIS - Talkin' Bout [infosec] News 2025-04-28</li>
<li>(03:01) - Story # 1: CEO of cybersecurity firm charged with installing malware on hospital systems</li>
<li>(11:21) - Story # 2: 2025 Data Breach Investigations Report</li>
<li>(25:04) - Story # 3: The Age of Realtime Deepfake Fraud Is Here</li>
<li>(28:59) - Story # 4: Whistleblower: DOGE Siphoned NLRB Case Data</li>
<li>(33:09) - Story # 5: Top employee monitoring app leaks 21 million screenshots on thousands of users</li>
<li>(36:58) - Story # 6: 159 CVEs Exploited in Q1 2025 — 28.3% Within 24 Hours of Disclosure</li>
<li>(42:12) - Story # 7: SAP zero-day vulnerability under widespread active exploitation</li>
<li>(46:29) - Story # 8: FBI: US lost record $16.6 billion to cybercrime in 2024</li>
<li>(47:54) - Story # 8b: FBI Report Doc</li>
<li>(53:49) - Story # 9: M- Trends 2025 Report</li>
</ul>]]>
      </content:encoded>
      <pubDate>Wed, 30 Apr 2025 16:32:43 -0400</pubDate>
      <author>Black Hills Information Security</author>
      <enclosure url="https://media.transistor.fm/95ab2bb3/66371467.mp3" length="60664179" type="audio/mpeg"/>
      <itunes:author>Black Hills Information Security</itunes:author>
      <itunes:image href="https://img.transistorcdn.com/sB-tDi1TV4RhW3_Emz3QV71PlYOpEwtnk-_82N5x5Dg/rs:fill:0:0:1/w:1400/h:1400/q:60/mb:500000/aHR0cHM6Ly9pbWct/dXBsb2FkLXByb2R1/Y3Rpb24udHJhbnNp/c3Rvci5mbS84YzVj/MmE2NTMxYWYyYjc0/MjY0ZTNhMjAwZmNk/OTJjZS5qcGc.jpg"/>
      <itunes:duration>3658</itunes:duration>
      <itunes:summary>Register for upcoming webcasts &amp;amp; summits - https://poweredbybhis.com00:00 - PreShow Banter™ — Talking Bout Red Green02:24 - InfoSec CEO Charged with Installing Malware! – BHIS - Talkin’ Bout [infosec] News 2025-04-2803:01 - Story # 1: CEO of cybersecurity firm charged with installing malware on hospital systems11:22 - Story # 2: 2025 Data Breach Investigations Report25:05 - Story # 3: The Age of Realtime Deepfake Fraud Is Here29:00 - Story # 4: Whistleblower: DOGE Siphoned NLRB Case Data33:09 - Story # 5: Top employee monitoring app leaks 21 million screenshots on thousands of users36:59 - Story # 6: 159 CVEs Exploited in Q1 2025 — 28.3% Within 24 Hours of Disclosure42:13 - Story # 7: SAP zero-day vulnerability under widespread active exploitation46:29 - Story # 8: FBI: US lost record $16.6 billion to cybercrime in 202447:55 - Story # 8b: FBI Report Doc53:50 - Story # 9: M- Trends 2025 Report</itunes:summary>
      <itunes:subtitle>Register for upcoming webcasts &amp;amp; summits - https://poweredbybhis.com00:00 - PreShow Banter™ — Talking Bout Red Green02:24 - InfoSec CEO Charged with Installing Malware! – BHIS - Talkin’ Bout [infosec] News 2025-04-2803:01 - Story # 1: CEO of cybersecu</itunes:subtitle>
      <itunes:keywords>Infosec,Cybersecurity,news</itunes:keywords>
      <itunes:explicit>No</itunes:explicit>
      <podcast:chapters url="https://share.transistor.fm/s/95ab2bb3/chapters.json" type="application/json+chapters"/>
    </item>
    <item>
      <title>The CVE Saga - Talkin’ Bout [infosec] News 2025-04-21</title>
      <itunes:episode>1</itunes:episode>
      <podcast:episode>1</podcast:episode>
      <itunes:title>The CVE Saga - Talkin’ Bout [infosec] News 2025-04-21</itunes:title>
      <itunes:episodeType>full</itunes:episodeType>
      <guid isPermaLink="false">https://blubrry.com/bhis/144872293/the-cve-saga-talkin-bout-infosec-news-2025-04-21/</guid>
      <link>https://share.transistor.fm/s/f8ee166b</link>
      <description>
        <![CDATA[<p>Register for upcoming webcasts &amp; summits - </p><p>https://poweredbybhis.com</p><p><br></p><p>00:00 - PreShow Banter™ — A Monocle and a Glass of Wine</p><p>05:36 - The CVE Saga - Talkin’ Bout [infosec] News 2025-04-21</p><p>06:43 - Story # 1: US agency extends support for cyber vulnerability database</p><p>29:08 - Story # 1b: CVE Foundation</p><p>32:35 - Story # 2: Former cybersecurity agency chief Chris Krebs leaves SentinelOne after Trump targets him in executive order</p><p>33:57 - Story # 3: 4chan Is Down Following What Looks to Be a Major Hack Spurred By Meme War</p><p>37:17 - Story # 4: TA Phone Home: EDR Evasion Testing Reveals Extortion Actor’s Toolkit</p><p>44:57 - Story # 5: The Sophos Annual Threat Report: Cybercrime on Main Street 2025</p>
<ul><li>(00:00) - PreShow Banter™ — A Monocle and a Glass of Wine</li>
<li>(05:36) - The CVE Saga - Talkin' Bout [infosec] News 2025-04-21</li>
<li>(06:43) - Story # 1: US agency extends support for cyber vulnerability database</li>
<li>(29:08) - Story # 1b: CVE Foundation</li>
<li>(32:34) - Story # 2: Former cybersecurity agency chief Chris Krebs leaves SentinelOne after Trump targets him in executive order</li>
<li>(33:57) - Story # 3: 4chan Is Down Following What Looks to Be a Major Hack Spurred By Meme War</li>
<li>(37:16) - Story # 4: TA Phone Home: EDR Evasion Testing Reveals Extortion Actor's Toolkit</li>
<li>(44:56) - Story # 5: The Sophos Annual Threat Report: Cybercrime on Main Street 2025</li>
</ul>]]>
      </description>
      <content:encoded>
        <![CDATA[<p>Register for upcoming webcasts &amp; summits - </p><p>https://poweredbybhis.com</p><p><br></p><p>00:00 - PreShow Banter™ — A Monocle and a Glass of Wine</p><p>05:36 - The CVE Saga - Talkin’ Bout [infosec] News 2025-04-21</p><p>06:43 - Story # 1: US agency extends support for cyber vulnerability database</p><p>29:08 - Story # 1b: CVE Foundation</p><p>32:35 - Story # 2: Former cybersecurity agency chief Chris Krebs leaves SentinelOne after Trump targets him in executive order</p><p>33:57 - Story # 3: 4chan Is Down Following What Looks to Be a Major Hack Spurred By Meme War</p><p>37:17 - Story # 4: TA Phone Home: EDR Evasion Testing Reveals Extortion Actor’s Toolkit</p><p>44:57 - Story # 5: The Sophos Annual Threat Report: Cybercrime on Main Street 2025</p>
<ul><li>(00:00) - PreShow Banter™ — A Monocle and a Glass of Wine</li>
<li>(05:36) - The CVE Saga - Talkin' Bout [infosec] News 2025-04-21</li>
<li>(06:43) - Story # 1: US agency extends support for cyber vulnerability database</li>
<li>(29:08) - Story # 1b: CVE Foundation</li>
<li>(32:34) - Story # 2: Former cybersecurity agency chief Chris Krebs leaves SentinelOne after Trump targets him in executive order</li>
<li>(33:57) - Story # 3: 4chan Is Down Following What Looks to Be a Major Hack Spurred By Meme War</li>
<li>(37:16) - Story # 4: TA Phone Home: EDR Evasion Testing Reveals Extortion Actor's Toolkit</li>
<li>(44:56) - Story # 5: The Sophos Annual Threat Report: Cybercrime on Main Street 2025</li>
</ul>]]>
      </content:encoded>
      <pubDate>Wed, 23 Apr 2025 19:00:00 -0400</pubDate>
      <author>Black Hills Information Security</author>
      <enclosure url="https://media.transistor.fm/f8ee166b/6b473fd5.mp3" length="57582547" type="audio/mpeg"/>
      <itunes:author>Black Hills Information Security</itunes:author>
      <itunes:image href="https://img.transistorcdn.com/lf6aZNP09fnXtofmGx8EAtC7IQGPA2BvdPcjKbfCG8I/rs:fill:0:0:1/w:1400/h:1400/q:60/mb:500000/aHR0cHM6Ly9pbWct/dXBsb2FkLXByb2R1/Y3Rpb24udHJhbnNp/c3Rvci5mbS9iNzll/YmJlZWY2MGYzNjg0/NTA2ZjJhODdiNWQ0/ZjRjOS5qcGc.jpg"/>
      <itunes:duration>3509</itunes:duration>
      <itunes:summary>Register for upcoming webcasts &amp;amp; summits - https://poweredbybhis.com00:00 - PreShow Banter™ — A Monocle and a Glass of Wine05:36 - The CVE Saga - Talkin’ Bout [infosec] News 2025-04-2106:43 - Story # 1: US agency extends support for cyber vulnerability database29:08 - Story # 1b: CVE Foundation32:35 - Story # 2: Former cybersecurity agency chief Chris Krebs leaves SentinelOne after Trump targets him in executive order33:57 - Story # 3: 4chan Is Down Following What Looks to Be a Major Hack Spurred By Meme War37:17 - Story # 4: TA Phone Home: EDR Evasion Testing Reveals Extortion Actor’s Toolkit44:57 - Story # 5: The Sophos Annual Threat Report: Cybercrime on Main Street 2025</itunes:summary>
      <itunes:subtitle>Register for upcoming webcasts &amp;amp; summits - https://poweredbybhis.com00:00 - PreShow Banter™ — A Monocle and a Glass of Wine05:36 - The CVE Saga - Talkin’ Bout [infosec] News 2025-04-2106:43 - Story # 1: US agency extends support for cyber vulnerabilit</itunes:subtitle>
      <itunes:keywords>Infosec,Cybersecurity,news</itunes:keywords>
      <itunes:explicit>No</itunes:explicit>
      <podcast:chapters url="https://share.transistor.fm/s/f8ee166b/chapters.json" type="application/json+chapters"/>
    </item>
    <item>
      <title>Largest Corporate Espionage Case this Century - 2025-04-14</title>
      <itunes:episode>1</itunes:episode>
      <podcast:episode>1</podcast:episode>
      <itunes:title>Largest Corporate Espionage Case this Century - 2025-04-14</itunes:title>
      <itunes:episodeType>full</itunes:episodeType>
      <guid isPermaLink="false">https://blubrry.com/bhis/144661585/largest-corporate-espionage-case-this-century-2025-04-14/</guid>
      <link>https://share.transistor.fm/s/10cd53f8</link>
      <description>
        <![CDATA[<p>Register for upcoming webcasts &amp; summits - </p><p>https://poweredbybhis.com</p><p><br></p><p>00:00 - PreShow Banter™ — Trigger Warning</p><p>00:42 - Trump Vs Chris Krebs | BHIS - Talkin’ Bout [infosec] News 2025-04-14</p><p>01:54 - Story # 1: Cybersecurity Community Must Not Remain Silent On Executive Order Attacking Former CISA Director</p><p>17:04 - Story # 2: Cybersecurity industry falls silent as Trump turns ire on SentinelOne</p><p>18:00 - Story # 3: Maryland pharmacist used keyloggers to spy on coworkers for a decade, victim alleges</p><p>33:13 - Story # 4: Rippling Believe it or Not: How the Largest Corporate Espionage Case this Century Happened</p><p>41:36 - Story # 5: Moroccan cybercrime group Atlas Lion hiding in plain sight during attacks on retailers</p><p>52:18 - Story # 6: Pentagon to end $5.1 billion in contracts with Accenture, Deloitte, others</p>
<ul><li>(00:00) - PreShow Banter™ — Trigger Warning</li>
<li>(00:41) - Trump Vs Chris Krebs | BHIS - Talkin' Bout [infosec] News 2025-04-14</li>
<li>(01:54) - Story # 1: Cybersecurity Community Must Not Remain Silent On Executive Order Attacking Former CISA Director</li>
<li>(17:03) - Story # 2: Cybersecurity industry falls silent as Trump turns ire on SentinelOne</li>
<li>(17:59) - Story # 3: Maryland pharmacist used keyloggers to spy on coworkers for a decade, victim alleges</li>
<li>(33:12) - Story # 4: Rippling Believe it or Not: How the Largest Corporate Espionage Case this Century Happened</li>
<li>(41:36) - Story # 5: Moroccan cybercrime group Atlas Lion hiding in plain sight during attacks on retailers</li>
<li>(52:17) - Story # 6: Pentagon to end $5.1 billion in contracts with Accenture, Deloitte, others</li>
</ul>]]>
      </description>
      <content:encoded>
        <![CDATA[<p>Register for upcoming webcasts &amp; summits - </p><p>https://poweredbybhis.com</p><p><br></p><p>00:00 - PreShow Banter™ — Trigger Warning</p><p>00:42 - Trump Vs Chris Krebs | BHIS - Talkin’ Bout [infosec] News 2025-04-14</p><p>01:54 - Story # 1: Cybersecurity Community Must Not Remain Silent On Executive Order Attacking Former CISA Director</p><p>17:04 - Story # 2: Cybersecurity industry falls silent as Trump turns ire on SentinelOne</p><p>18:00 - Story # 3: Maryland pharmacist used keyloggers to spy on coworkers for a decade, victim alleges</p><p>33:13 - Story # 4: Rippling Believe it or Not: How the Largest Corporate Espionage Case this Century Happened</p><p>41:36 - Story # 5: Moroccan cybercrime group Atlas Lion hiding in plain sight during attacks on retailers</p><p>52:18 - Story # 6: Pentagon to end $5.1 billion in contracts with Accenture, Deloitte, others</p>
<ul><li>(00:00) - PreShow Banter™ — Trigger Warning</li>
<li>(00:41) - Trump Vs Chris Krebs | BHIS - Talkin' Bout [infosec] News 2025-04-14</li>
<li>(01:54) - Story # 1: Cybersecurity Community Must Not Remain Silent On Executive Order Attacking Former CISA Director</li>
<li>(17:03) - Story # 2: Cybersecurity industry falls silent as Trump turns ire on SentinelOne</li>
<li>(17:59) - Story # 3: Maryland pharmacist used keyloggers to spy on coworkers for a decade, victim alleges</li>
<li>(33:12) - Story # 4: Rippling Believe it or Not: How the Largest Corporate Espionage Case this Century Happened</li>
<li>(41:36) - Story # 5: Moroccan cybercrime group Atlas Lion hiding in plain sight during attacks on retailers</li>
<li>(52:17) - Story # 6: Pentagon to end $5.1 billion in contracts with Accenture, Deloitte, others</li>
</ul>]]>
      </content:encoded>
      <pubDate>Wed, 16 Apr 2025 11:00:00 -0400</pubDate>
      <author>Black Hills Information Security</author>
      <enclosure url="https://media.transistor.fm/10cd53f8/f141daa7.mp3" length="58869121" type="audio/mpeg"/>
      <itunes:author>Black Hills Information Security</itunes:author>
      <itunes:image href="https://img.transistorcdn.com/3VXPZXJ9pOmXVFwR7iuuAJKX8MUdID2CUKdVi1HaIOM/rs:fill:0:0:1/w:1400/h:1400/q:60/mb:500000/aHR0cHM6Ly9pbWct/dXBsb2FkLXByb2R1/Y3Rpb24udHJhbnNp/c3Rvci5mbS85MGE3/MDFjOTRmZmY5NWE5/MWE5NzU1OTFiODBh/ZjViNC5qcGc.jpg"/>
      <itunes:duration>3590</itunes:duration>
      <itunes:summary>Register for upcoming webcasts &amp;amp; summits - https://poweredbybhis.com00:00 - PreShow Banter™ — Trigger Warning00:42 - Trump Vs Chris Krebs | BHIS - Talkin’ Bout [infosec] News 2025-04-1401:54 - Story # 1: Cybersecurity Community Must Not Remain Silent On Executive Order Attacking Former CISA Director17:04 - Story # 2: Cybersecurity industry falls silent as Trump turns ire on SentinelOne18:00 - Story # 3: Maryland pharmacist used keyloggers to spy on coworkers for a decade, victim alleges33:13 - Story # 4: Rippling Believe it or Not: How the Largest Corporate Espionage Case this Century Happened41:36 - Story # 5: Moroccan cybercrime group Atlas Lion hiding in plain sight during attacks on retailers52:18 - Story # 6: Pentagon to end $5.1 billion in contracts with Accenture, Deloitte, others</itunes:summary>
      <itunes:subtitle>Register for upcoming webcasts &amp;amp; summits - https://poweredbybhis.com00:00 - PreShow Banter™ — Trigger Warning00:42 - Trump Vs Chris Krebs | BHIS - Talkin’ Bout [infosec] News 2025-04-1401:54 - Story # 1: Cybersecurity Community Must Not Remain Silent </itunes:subtitle>
      <itunes:keywords>Infosec,Cybersecurity,news</itunes:keywords>
      <itunes:explicit>No</itunes:explicit>
      <podcast:chapters url="https://share.transistor.fm/s/10cd53f8/chapters.json" type="application/json+chapters"/>
    </item>
    <item>
      <title>Desperate Times Makes for More Cyber Crimes -2025-04-07</title>
      <itunes:episode>1</itunes:episode>
      <podcast:episode>1</podcast:episode>
      <itunes:title>Desperate Times Makes for More Cyber Crimes -2025-04-07</itunes:title>
      <itunes:episodeType>full</itunes:episodeType>
      <guid isPermaLink="false">https://blubrry.com/bhis/144384428/desperate-times-makes-for-more-cyber-crimes-2025-04-07/</guid>
      <link>https://share.transistor.fm/s/2b18a9aa</link>
      <description>
        <![CDATA[<p>Register for upcoming webcasts &amp; summits - </p><p><a href="https://poweredbybhis.com">https://poweredbybhis.com</a></p><p><br></p><p>Chapters</p><p>00:00 - PreShow Banter™ — A Complex Business</p><p>06:40 - BHIS - Talkin’ Bout [infosec] News 2025-04-07</p><p>07:34 - Story # 1: Oracle quietly admits data breach, days after lawsuit accused it of cover-up</p><p>12:47 - Story # 2: Twitter (X) Hit by 2.8 Billion Profile Data Leak in Alleged Insider Job</p><p>21:13 - Story # 3: Phishing platform ‘Lucid’ behind wave of iOS, Android SMS attacks</p><p>28:14 - Story # 4: GitHub expands security tools after 39 million secrets leaked in 2024</p><p>37:28 - Story # 5: The 10 Biggest Crypto Hacks in History</p><p>40:11 - Story # 6: OpenAI tests watermarking for ChatGPT-4o Image Generation model</p><p>45:44 - Story # 7: National Security Agency chief fired as Trump ousts another top military officer</p>
<ul><li>(00:00) - PreShow Banter™ — A Complex Business</li>
<li>(06:40) - BHIS - Talkin' Bout [infosec] News 2025-04-07</li>
<li>(07:34) - Story # 1: Oracle quietly admits data breach, days after lawsuit accused it of cover-up</li>
<li>(12:46) - Story # 2: Twitter (X) Hit by 2.8 Billion Profile Data Leak in Alleged Insider Job</li>
<li>(21:12) - Story # 3: Phishing platform 'Lucid' behind wave of iOS, Android SMS attacks</li>
<li>(28:13) - Story # 4: GitHub expands security tools after 39 million secrets leaked in 2024</li>
<li>(37:28) - Story # 5: The 10 Biggest Crypto Hacks in History</li>
<li>(40:10) - Story # 6: OpenAI tests watermarking for ChatGPT-4o Image Generation model</li>
<li>(45:43) - Story # 7: National Security Agency chief fired as Trump ousts another top military officer</li>
</ul>]]>
      </description>
      <content:encoded>
        <![CDATA[<p>Register for upcoming webcasts &amp; summits - </p><p><a href="https://poweredbybhis.com">https://poweredbybhis.com</a></p><p><br></p><p>Chapters</p><p>00:00 - PreShow Banter™ — A Complex Business</p><p>06:40 - BHIS - Talkin’ Bout [infosec] News 2025-04-07</p><p>07:34 - Story # 1: Oracle quietly admits data breach, days after lawsuit accused it of cover-up</p><p>12:47 - Story # 2: Twitter (X) Hit by 2.8 Billion Profile Data Leak in Alleged Insider Job</p><p>21:13 - Story # 3: Phishing platform ‘Lucid’ behind wave of iOS, Android SMS attacks</p><p>28:14 - Story # 4: GitHub expands security tools after 39 million secrets leaked in 2024</p><p>37:28 - Story # 5: The 10 Biggest Crypto Hacks in History</p><p>40:11 - Story # 6: OpenAI tests watermarking for ChatGPT-4o Image Generation model</p><p>45:44 - Story # 7: National Security Agency chief fired as Trump ousts another top military officer</p>
<ul><li>(00:00) - PreShow Banter™ — A Complex Business</li>
<li>(06:40) - BHIS - Talkin' Bout [infosec] News 2025-04-07</li>
<li>(07:34) - Story # 1: Oracle quietly admits data breach, days after lawsuit accused it of cover-up</li>
<li>(12:46) - Story # 2: Twitter (X) Hit by 2.8 Billion Profile Data Leak in Alleged Insider Job</li>
<li>(21:12) - Story # 3: Phishing platform 'Lucid' behind wave of iOS, Android SMS attacks</li>
<li>(28:13) - Story # 4: GitHub expands security tools after 39 million secrets leaked in 2024</li>
<li>(37:28) - Story # 5: The 10 Biggest Crypto Hacks in History</li>
<li>(40:10) - Story # 6: OpenAI tests watermarking for ChatGPT-4o Image Generation model</li>
<li>(45:43) - Story # 7: National Security Agency chief fired as Trump ousts another top military officer</li>
</ul>]]>
      </content:encoded>
      <pubDate>Wed, 09 Apr 2025 13:30:00 -0400</pubDate>
      <author>Black Hills Information Security</author>
      <enclosure url="https://media.transistor.fm/2b18a9aa/07b73e4e.mp3" length="48137050" type="audio/mpeg"/>
      <itunes:author>Black Hills Information Security</itunes:author>
      <itunes:image href="https://img.transistorcdn.com/ORLipqWUIybnMBViE_BQRtdqeh8yT4bJHJs1Ghzjc78/rs:fill:0:0:1/w:1400/h:1400/q:60/mb:500000/aHR0cHM6Ly9pbWct/dXBsb2FkLXByb2R1/Y3Rpb24udHJhbnNp/c3Rvci5mbS81NWI2/ODJiMGI1YTU2YzFl/OTQzMzk2OGI3MjQ0/YmUxMS5qcGc.jpg"/>
      <itunes:duration>2912</itunes:duration>
      <itunes:summary>Register for upcoming webcasts &amp;amp; summits - https://poweredbybhis.com (https://poweredbybhis.com)Chapters00:00 - PreShow Banter™ — A Complex Business06:40 - BHIS - Talkin’ Bout [infosec] News 2025-04-0707:34 - Story # 1: Oracle quietly admits data breach, days after lawsuit accused it of cover-up12:47 - Story # 2: Twitter (X) Hit by 2.8 Billion Profile Data Leak in Alleged Insider Job21:13 - Story # 3: Phishing platform ‘Lucid’ behind wave of iOS, Android SMS attacks28:14 - Story # 4: GitHub expands security tools after 39 million secrets leaked in 202437:28 - Story # 5: The 10 Biggest Crypto Hacks in History40:11 - Story # 6: OpenAI tests watermarking for ChatGPT-4o Image Generation model45:44 - Story # 7: National Security Agency chief fired as Trump ousts another top military officer</itunes:summary>
      <itunes:subtitle>Register for upcoming webcasts &amp;amp; summits - https://poweredbybhis.com (https://poweredbybhis.com)Chapters00:00 - PreShow Banter™ — A Complex Business06:40 - BHIS - Talkin’ Bout [infosec] News 2025-04-0707:34 - Story # 1: Oracle quietly admits data brea</itunes:subtitle>
      <itunes:keywords>Infosec,Cybersecurity,news</itunes:keywords>
      <itunes:explicit>No</itunes:explicit>
      <podcast:chapters url="https://share.transistor.fm/s/2b18a9aa/chapters.json" type="application/json+chapters"/>
    </item>
    <item>
      <title>The Oracle of Lies! – 2025-03-31</title>
      <itunes:episode>1</itunes:episode>
      <podcast:episode>1</podcast:episode>
      <itunes:title>The Oracle of Lies! – 2025-03-31</itunes:title>
      <itunes:episodeType>full</itunes:episodeType>
      <guid isPermaLink="false">https://blubrry.com/bhis/144149149/the-oracle-of-lies-2025-03-31/</guid>
      <link>https://share.transistor.fm/s/a67a6f92</link>
      <description>
        <![CDATA[<p>00:00 - PreShow Banter™ — The Bed Slinger</p><p>08:34 - The Oracle of Lies! - BHIS - Talkin’ Bout [infosec] News 2025-03-31</p><p>10:43 - Story # 1: Oracle attempt to hide serious cybersecurity incident from customers in Oracle SaaS service</p><p>20:00 - Story # 2: A Sneaky Phish Just Grabbed my Mailchimp Mailing List</p><p>26:17 - Story # 3: Windows 11 is closing a loophole that let you skip making a Microsoft account</p><p>29:51 - Story # 4: The Trump Administration Accidentally Texted Me Its War Plans</p><p>32:51 - Story # 4b: Signal is ‘absolutely not suitable’ for government use: Former NSA hacker</p><p>37:42 - Story # 5: How the FBI Tracked, and Froze, Millions Sent to Criminals in Massive Caesars Casino Hack</p><p>42:27 - Story # 6: Retail giant Sam’s Club investigates Clop ransomware breach claims</p><p>45:07 - WEBCAST – Keeping Things Local – Making Your Own Private LLM w/ Bronwen Aker</p><p>46:16 - Story # 7: New VanHelsing ransomware targets Windows, ARM, ESXi systems</p><p>48:28 - Story # 8: Infostealer campaign compromises 10 npm packages, targets devs</p><p>53:13 - Story # 9: Risky Biz News: EU bans anonymous crypto payments</p><p>56:02 - ChickenSec: South African Poultry Company Reports $1M Loss After Cyber Intrusion</p>
<ul><li>(00:00) - PreShow Banter™ — The Bed Slinger</li>
<li>(08:34) - BHIS - Talkin' Bout [infosec] News 2025-03-31</li>
<li>(10:43) - Story # 1: Oracle attempt to hide serious cybersecurity incident from customers in Oracle SaaS service</li>
<li>(20:00) - Story # 2: A Sneaky Phish Just Grabbed my Mailchimp Mailing List</li>
<li>(26:16) - Story # 3: Windows 11 is closing a loophole that let you skip making a Microsoft account</li>
<li>(29:50) - Story # 4: The Trump Administration Accidentally Texted Me Its War Plans</li>
<li>(32:51) - Story # 4b: Signal is 'absolutely not suitable' for government use: Former NSA hacker</li>
<li>(37:41) - Story # 5: How the FBI Tracked, and Froze, Millions Sent to Criminals in Massive Caesars Casino Hack</li>
<li>(42:26) - Story # 6: Retail giant Sam’s Club investigates Clop ransomware breach claims</li>
<li>(45:07) - WEBCAST – Keeping Things Local – Making Your Own Private LLM w/ Bronwen Aker</li>
<li>(46:15) - Story # 7: New VanHelsing ransomware targets Windows, ARM, ESXi systems</li>
<li>(48:27) - Story # 8: Infostealer campaign compromises 10 npm packages, targets devs</li>
<li>(53:12) - Story # 9: Risky Biz News: EU bans anonymous crypto payments</li>
<li>(56:02) - ChickenSec: South African Poultry Company Reports $1M Loss After Cyber Intrusion</li>
</ul>]]>
      </description>
      <content:encoded>
        <![CDATA[<p>00:00 - PreShow Banter™ — The Bed Slinger</p><p>08:34 - The Oracle of Lies! - BHIS - Talkin’ Bout [infosec] News 2025-03-31</p><p>10:43 - Story # 1: Oracle attempt to hide serious cybersecurity incident from customers in Oracle SaaS service</p><p>20:00 - Story # 2: A Sneaky Phish Just Grabbed my Mailchimp Mailing List</p><p>26:17 - Story # 3: Windows 11 is closing a loophole that let you skip making a Microsoft account</p><p>29:51 - Story # 4: The Trump Administration Accidentally Texted Me Its War Plans</p><p>32:51 - Story # 4b: Signal is ‘absolutely not suitable’ for government use: Former NSA hacker</p><p>37:42 - Story # 5: How the FBI Tracked, and Froze, Millions Sent to Criminals in Massive Caesars Casino Hack</p><p>42:27 - Story # 6: Retail giant Sam’s Club investigates Clop ransomware breach claims</p><p>45:07 - WEBCAST – Keeping Things Local – Making Your Own Private LLM w/ Bronwen Aker</p><p>46:16 - Story # 7: New VanHelsing ransomware targets Windows, ARM, ESXi systems</p><p>48:28 - Story # 8: Infostealer campaign compromises 10 npm packages, targets devs</p><p>53:13 - Story # 9: Risky Biz News: EU bans anonymous crypto payments</p><p>56:02 - ChickenSec: South African Poultry Company Reports $1M Loss After Cyber Intrusion</p>
<ul><li>(00:00) - PreShow Banter™ — The Bed Slinger</li>
<li>(08:34) - BHIS - Talkin' Bout [infosec] News 2025-03-31</li>
<li>(10:43) - Story # 1: Oracle attempt to hide serious cybersecurity incident from customers in Oracle SaaS service</li>
<li>(20:00) - Story # 2: A Sneaky Phish Just Grabbed my Mailchimp Mailing List</li>
<li>(26:16) - Story # 3: Windows 11 is closing a loophole that let you skip making a Microsoft account</li>
<li>(29:50) - Story # 4: The Trump Administration Accidentally Texted Me Its War Plans</li>
<li>(32:51) - Story # 4b: Signal is 'absolutely not suitable' for government use: Former NSA hacker</li>
<li>(37:41) - Story # 5: How the FBI Tracked, and Froze, Millions Sent to Criminals in Massive Caesars Casino Hack</li>
<li>(42:26) - Story # 6: Retail giant Sam’s Club investigates Clop ransomware breach claims</li>
<li>(45:07) - WEBCAST – Keeping Things Local – Making Your Own Private LLM w/ Bronwen Aker</li>
<li>(46:15) - Story # 7: New VanHelsing ransomware targets Windows, ARM, ESXi systems</li>
<li>(48:27) - Story # 8: Infostealer campaign compromises 10 npm packages, targets devs</li>
<li>(53:12) - Story # 9: Risky Biz News: EU bans anonymous crypto payments</li>
<li>(56:02) - ChickenSec: South African Poultry Company Reports $1M Loss After Cyber Intrusion</li>
</ul>]]>
      </content:encoded>
      <pubDate>Thu, 03 Apr 2025 16:00:00 -0400</pubDate>
      <author>Black Hills Information Security</author>
      <enclosure url="https://media.transistor.fm/a67a6f92/367df460.mp3" length="62273988" type="audio/mpeg"/>
      <itunes:author>Black Hills Information Security</itunes:author>
      <itunes:image href="https://img.transistorcdn.com/5YozY-JQQ5QbOrBGSqt-ZQoRJQIlqGP9-mqGvFyquIc/rs:fill:0:0:1/w:1400/h:1400/q:60/mb:500000/aHR0cHM6Ly9pbWct/dXBsb2FkLXByb2R1/Y3Rpb24udHJhbnNp/c3Rvci5mbS83NTEz/ZDRlN2Q4NDUxMDg4/MzE3NzA4ZjExNGM4/NmVjOC5qcGc.jpg"/>
      <itunes:duration>3766</itunes:duration>
      <itunes:summary>00:00 - PreShow Banter™ — The Bed Slinger08:34 - The Oracle of Lies! - BHIS - Talkin’ Bout [infosec] News 2025-03-3110:43 - Story # 1: Oracle attempt to hide serious cybersecurity incident from customers in Oracle SaaS service20:00 - Story # 2: A Sneaky Phish Just Grabbed my Mailchimp Mailing List26:17 - Story # 3: Windows 11 is closing a loophole that let you skip making a Microsoft account29:51 - Story # 4: The Trump Administration Accidentally Texted Me Its War Plans32:51 - Story # 4b: Signal is ‘absolutely not suitable’ for government use: Former NSA hacker37:42 - Story # 5: How the FBI Tracked, and Froze, Millions Sent to Criminals in Massive Caesars Casino Hack42:27 - Story # 6: Retail giant Sam’s Club investigates Clop ransomware breach claims45:07 - WEBCAST – Keeping Things Local – Making Your Own Private LLM w/ Bronwen Aker46:16 - Story # 7: New VanHelsing ransomware targets Windows, ARM, ESXi systems48:28 - Story # 8: Infostealer campaign compromises 10 npm packages, targets devs53:13 - Story # 9: Risky Biz News: EU bans anonymous crypto payments56:02 - ChickenSec: South African Poultry Company Reports $1M Loss After Cyber Intrusion</itunes:summary>
      <itunes:subtitle>00:00 - PreShow Banter™ — The Bed Slinger08:34 - The Oracle of Lies! - BHIS - Talkin’ Bout [infosec] News 2025-03-3110:43 - Story # 1: Oracle attempt to hide serious cybersecurity incident from customers in Oracle SaaS service20:00 - Story # 2: A Sneaky P</itunes:subtitle>
      <itunes:keywords>Infosec,Cybersecurity,news</itunes:keywords>
      <itunes:explicit>No</itunes:explicit>
      <podcast:chapters url="https://share.transistor.fm/s/a67a6f92/chapters.json" type="application/json+chapters"/>
    </item>
    <item>
      <title>Trading in Jock Straps for Jock Hacks – 2025-03-24</title>
      <itunes:episode>1</itunes:episode>
      <podcast:episode>1</podcast:episode>
      <itunes:title>Trading in Jock Straps for Jock Hacks – 2025-03-24</itunes:title>
      <itunes:episodeType>full</itunes:episodeType>
      <guid isPermaLink="false">https://blubrry.com/bhis/143813761/trading-in-jock-straps-for-jock-hacks-2025-03-24/</guid>
      <link>https://share.transistor.fm/s/886fa5af</link>
      <description>
        <![CDATA[<p>00:00 - PreShow Banter™ — We’re Not Ready For the Finger Thing</p><p>01:40 - Trading in Jock Straps for Jock Hacks – BHIS - Talkin’ Bout [infosec] News 2025-03-24</p><p>03:24 - Story # 1: GitHub Action hack likely led to another in cascading supply chain attack</p><p>07:53 - Story # 2: Wiz to Join Google Cloud: Making Magic Together</p><p>14:47 - Story # 3: Oracle denies breach after hacker claims theft of 6 million data records</p><p>19:52 - Story # 4: Critical flaw in Next.js lets hackers bypass authorization</p><p>25:47 - Story # 5: Cloudflare builds an AI to lead AI scraper bots into a horrible maze of junk content</p><p>29:20 - Story # 6: Ex-Michigan QB coach Matt Weiss facing 24 federal charges in hack of thousands of student accounts</p><p>35:47 - Story # 7: DNA of 15 Million People for Sale in 23andMe Bankruptcy</p><p>38:40 - Story # 8: Everything you say to your Echo will be sent to Amazon starting on March 28</p><p>44:03 - Story # 9: We partner with world-renowned scambusters to create our own fraud-fighting call centre</p><p>52:01 - Story # 10: Sperm donation giant California Cryobank warns of a data breach</p><p>54:19 - Story # 11: Microsoft: New RAT malware used for crypto theft, reconnaissance</p><p>56:32 - Story # 12: TrustedSec | Trimarc Joins Forces with TrustedSec to Strengthen…</p>
<ul><li>(00:00) - PreShow Banter™ — We're Not Ready For the Finger Thing</li>
<li>(01:40) - Trading in Jock Straps for Jock Hacks – BHIS - Talkin' Bout [infosec] News 2025-03-24</li>
<li>(03:23) - Story # 1: GitHub Action hack likely led to another in cascading supply chain attack</li>
<li>(07:53) - Story # 2: Wiz to Join Google Cloud: Making Magic Together</li>
<li>(14:46) - Story # 3: Oracle denies breach after hacker claims theft of 6 million data records</li>
<li>(19:51) - Story # 4: Critical flaw in Next.js lets hackers bypass authorization</li>
<li>(25:46) - Story # 5: Cloudflare builds an AI to lead AI scraper bots into a horrible maze of junk content</li>
<li>(29:20) - Story # 6: Ex-Michigan QB coach Matt Weiss facing 24 federal charges in hack of thousands of student accounts</li>
<li>(35:46) - Story # 7: DNA of 15 Million People for Sale in 23andMe Bankruptcy</li>
<li>(38:40) - Story # 8: Everything you say to your Echo will be sent to Amazon starting on March 28</li>
<li>(44:02) - Story # 9: We partner with world-renowned scambusters to create our own fraud-fighting call centre</li>
<li>(52:00) - Story # 10: Sperm donation giant California Cryobank warns of a data breach</li>
<li>(54:19) - Story # 11: Microsoft: New RAT malware used for crypto theft, reconnaissance</li>
<li>(56:32) - Story # 12: TrustedSec | Trimarc Joins Forces with TrustedSec to Strengthen…</li>
</ul>]]>
      </description>
      <content:encoded>
        <![CDATA[<p>00:00 - PreShow Banter™ — We’re Not Ready For the Finger Thing</p><p>01:40 - Trading in Jock Straps for Jock Hacks – BHIS - Talkin’ Bout [infosec] News 2025-03-24</p><p>03:24 - Story # 1: GitHub Action hack likely led to another in cascading supply chain attack</p><p>07:53 - Story # 2: Wiz to Join Google Cloud: Making Magic Together</p><p>14:47 - Story # 3: Oracle denies breach after hacker claims theft of 6 million data records</p><p>19:52 - Story # 4: Critical flaw in Next.js lets hackers bypass authorization</p><p>25:47 - Story # 5: Cloudflare builds an AI to lead AI scraper bots into a horrible maze of junk content</p><p>29:20 - Story # 6: Ex-Michigan QB coach Matt Weiss facing 24 federal charges in hack of thousands of student accounts</p><p>35:47 - Story # 7: DNA of 15 Million People for Sale in 23andMe Bankruptcy</p><p>38:40 - Story # 8: Everything you say to your Echo will be sent to Amazon starting on March 28</p><p>44:03 - Story # 9: We partner with world-renowned scambusters to create our own fraud-fighting call centre</p><p>52:01 - Story # 10: Sperm donation giant California Cryobank warns of a data breach</p><p>54:19 - Story # 11: Microsoft: New RAT malware used for crypto theft, reconnaissance</p><p>56:32 - Story # 12: TrustedSec | Trimarc Joins Forces with TrustedSec to Strengthen…</p>
<ul><li>(00:00) - PreShow Banter™ — We're Not Ready For the Finger Thing</li>
<li>(01:40) - Trading in Jock Straps for Jock Hacks – BHIS - Talkin' Bout [infosec] News 2025-03-24</li>
<li>(03:23) - Story # 1: GitHub Action hack likely led to another in cascading supply chain attack</li>
<li>(07:53) - Story # 2: Wiz to Join Google Cloud: Making Magic Together</li>
<li>(14:46) - Story # 3: Oracle denies breach after hacker claims theft of 6 million data records</li>
<li>(19:51) - Story # 4: Critical flaw in Next.js lets hackers bypass authorization</li>
<li>(25:46) - Story # 5: Cloudflare builds an AI to lead AI scraper bots into a horrible maze of junk content</li>
<li>(29:20) - Story # 6: Ex-Michigan QB coach Matt Weiss facing 24 federal charges in hack of thousands of student accounts</li>
<li>(35:46) - Story # 7: DNA of 15 Million People for Sale in 23andMe Bankruptcy</li>
<li>(38:40) - Story # 8: Everything you say to your Echo will be sent to Amazon starting on March 28</li>
<li>(44:02) - Story # 9: We partner with world-renowned scambusters to create our own fraud-fighting call centre</li>
<li>(52:00) - Story # 10: Sperm donation giant California Cryobank warns of a data breach</li>
<li>(54:19) - Story # 11: Microsoft: New RAT malware used for crypto theft, reconnaissance</li>
<li>(56:32) - Story # 12: TrustedSec | Trimarc Joins Forces with TrustedSec to Strengthen…</li>
</ul>]]>
      </content:encoded>
      <pubDate>Wed, 26 Mar 2025 15:30:00 -0400</pubDate>
      <author>Black Hills Information Security</author>
      <enclosure url="https://media.transistor.fm/886fa5af/20b5827b.mp3" length="58659758" type="audio/mpeg"/>
      <itunes:author>Black Hills Information Security</itunes:author>
      <itunes:image href="https://img.transistorcdn.com/EHr1TtjxPoHLG3KMwPRy9CL0rXmmF_jP9jibN0Q1Ioo/rs:fill:0:0:1/w:1400/h:1400/q:60/mb:500000/aHR0cHM6Ly9pbWct/dXBsb2FkLXByb2R1/Y3Rpb24udHJhbnNp/c3Rvci5mbS9kZDhj/NzhmZGUzNDllM2M1/MWQ4OTAwYWY4MmRl/OTYzYy5qcGc.jpg"/>
      <itunes:duration>3525</itunes:duration>
      <itunes:summary>00:00 - PreShow Banter™ — We’re Not Ready For the Finger Thing01:40 - Trading in Jock Straps for Jock Hacks – BHIS - Talkin’ Bout [infosec] News 2025-03-2403:24 - Story # 1: GitHub Action hack likely led to another in cascading supply chain attack07:53 - Story # 2: Wiz to Join Google Cloud: Making Magic Together14:47 - Story # 3: Oracle denies breach after hacker claims theft of 6 million data records19:52 - Story # 4: Critical flaw in Next.js lets hackers bypass authorization25:47 - Story # 5: Cloudflare builds an AI to lead AI scraper bots into a horrible maze of junk content29:20 - Story # 6: Ex-Michigan QB coach Matt Weiss facing 24 federal charges in hack of thousands of student accounts35:47 - Story # 7: DNA of 15 Million People for Sale in 23andMe Bankruptcy38:40 - Story # 8: Everything you say to your Echo will be sent to Amazon starting on March 2844:03 - Story # 9: We partner with world-renowned scambusters to create our own fraud-fighting call centre52:01 - Story # 10: Sperm donation giant California Cryobank warns of a data breach54:19 - Story # 11: Microsoft: New RAT malware used for crypto theft, reconnaissance56:32 - Story # 12: TrustedSec | Trimarc Joins Forces with TrustedSec to Strengthen…</itunes:summary>
      <itunes:subtitle>00:00 - PreShow Banter™ — We’re Not Ready For the Finger Thing01:40 - Trading in Jock Straps for Jock Hacks – BHIS - Talkin’ Bout [infosec] News 2025-03-2403:24 - Story # 1: GitHub Action hack likely led to another in cascading supply chain attack07:53 - </itunes:subtitle>
      <itunes:keywords>Infosec,Cybersecurity,news</itunes:keywords>
      <itunes:explicit>No</itunes:explicit>
      <podcast:chapters url="https://share.transistor.fm/s/886fa5af/chapters.json" type="application/json+chapters"/>
    </item>
    <item>
      <title>News 2025-03-17 - Malicious Browser Plugins will Destroy us ALL!!!!!</title>
      <itunes:episode>1</itunes:episode>
      <podcast:episode>1</podcast:episode>
      <itunes:title>News 2025-03-17 - Malicious Browser Plugins will Destroy us ALL!!!!!</itunes:title>
      <itunes:episodeType>full</itunes:episodeType>
      <guid isPermaLink="false">https://blubrry.com/bhis/143509594/news-2025-03-17-malicious-browser-plugins-will-destroy-us-all/</guid>
      <link>https://share.transistor.fm/s/579f8b5e</link>
      <description>
        <![CDATA[<p>00:00 - PreShow Banter™ — Fun Jank Decks</p><p>05:25 - BHIS - Talkin’ Bout [infosec] News 2025-03-17 - Malicious browser plugins will destroy us ALL!!!!!</p><p>06:35 - Story # 1: Polymorphic Extensions: The Sneaky Extension That Can Impersonate Any Browser Extension</p><p>14:37 - Story # 1b: Chrome Web Store is a mess</p><p>31:14 - Story # 2: Lazarus Strikes npm Again with New Wave of Malicious Packages</p><p>36:17 - Story # 3: China’s Volt Typhoon Hackers Dwelled in US Electric Grid for 300 Days</p><p>44:44 - Story # 4: Saudi Arabia Buys Pokémon Go, and Probably All of Your Location Data</p><p>49:31 - Story # 5: Second biggest bank in US hit by major data breach stealing social security numbers and other personal info</p><p>51:25 - Story # 6: Hackers Take Credit for X Cyberattack</p><p>54:32 - Story # 7: Hackers Using Advanced MFA-Bypassing Techniques To Gain Access To User Account</p>
<ul><li>(00:00) - PreShow Banter™ — Fun Jank Decks</li>
<li>(05:24) - BHIS - Talkin' Bout [infosec] News 2025-03-17 - Malicious Browser Plugins will Destroy us ALL!!</li>
<li>(06:35) - Story # 1: Polymorphic Extensions: The Sneaky Extension That Can Impersonate Any Browser Extension</li>
<li>(14:37) - Story # 1b: Chrome Web Store is a mess</li>
<li>(31:14) - Story # 2: Lazarus Strikes npm Again with New Wave of Malicious Packages</li>
<li>(36:17) - Story # 3: China’s Volt Typhoon Hackers Dwelled in US Electric Grid for 300 Days</li>
<li>(44:43) - Story # 4: Saudi Arabia Buys Pokémon Go, and Probably All of Your Location Data</li>
<li>(49:31) - Story # 5: Second biggest bank in US hit by major data breach stealing social security numbers and other personal info</li>
<li>(51:25) - Story # 6: Hackers Take Credit for X Cyberattack</li>
<li>(54:32) - Story # 7: Hackers Using Advanced MFA-Bypassing Techniques To Gain Access To User Account</li>
</ul>]]>
      </description>
      <content:encoded>
        <![CDATA[<p>00:00 - PreShow Banter™ — Fun Jank Decks</p><p>05:25 - BHIS - Talkin’ Bout [infosec] News 2025-03-17 - Malicious browser plugins will destroy us ALL!!!!!</p><p>06:35 - Story # 1: Polymorphic Extensions: The Sneaky Extension That Can Impersonate Any Browser Extension</p><p>14:37 - Story # 1b: Chrome Web Store is a mess</p><p>31:14 - Story # 2: Lazarus Strikes npm Again with New Wave of Malicious Packages</p><p>36:17 - Story # 3: China’s Volt Typhoon Hackers Dwelled in US Electric Grid for 300 Days</p><p>44:44 - Story # 4: Saudi Arabia Buys Pokémon Go, and Probably All of Your Location Data</p><p>49:31 - Story # 5: Second biggest bank in US hit by major data breach stealing social security numbers and other personal info</p><p>51:25 - Story # 6: Hackers Take Credit for X Cyberattack</p><p>54:32 - Story # 7: Hackers Using Advanced MFA-Bypassing Techniques To Gain Access To User Account</p>
<ul><li>(00:00) - PreShow Banter™ — Fun Jank Decks</li>
<li>(05:24) - BHIS - Talkin' Bout [infosec] News 2025-03-17 - Malicious Browser Plugins will Destroy us ALL!!</li>
<li>(06:35) - Story # 1: Polymorphic Extensions: The Sneaky Extension That Can Impersonate Any Browser Extension</li>
<li>(14:37) - Story # 1b: Chrome Web Store is a mess</li>
<li>(31:14) - Story # 2: Lazarus Strikes npm Again with New Wave of Malicious Packages</li>
<li>(36:17) - Story # 3: China’s Volt Typhoon Hackers Dwelled in US Electric Grid for 300 Days</li>
<li>(44:43) - Story # 4: Saudi Arabia Buys Pokémon Go, and Probably All of Your Location Data</li>
<li>(49:31) - Story # 5: Second biggest bank in US hit by major data breach stealing social security numbers and other personal info</li>
<li>(51:25) - Story # 6: Hackers Take Credit for X Cyberattack</li>
<li>(54:32) - Story # 7: Hackers Using Advanced MFA-Bypassing Techniques To Gain Access To User Account</li>
</ul>]]>
      </content:encoded>
      <pubDate>Wed, 19 Mar 2025 00:00:00 -0400</pubDate>
      <author>Black Hills Information Security</author>
      <enclosure url="https://media.transistor.fm/579f8b5e/df486f45.mp3" length="60004578" type="audio/mpeg"/>
      <itunes:author>Black Hills Information Security</itunes:author>
      <itunes:image href="https://img.transistorcdn.com/WkJFMLSKPtbflsZGg-OJd0dJiYKjDBfUAdZb-IcW0l0/rs:fill:0:0:1/w:1400/h:1400/q:60/mb:500000/aHR0cHM6Ly9pbWct/dXBsb2FkLXByb2R1/Y3Rpb24udHJhbnNp/c3Rvci5mbS9iZmUz/MWYyZGU1OTFkZDcy/MDFiYWZmYTg4OGVj/NzZlMy5qcGc.jpg"/>
      <itunes:duration>3641</itunes:duration>
      <itunes:summary>00:00 - PreShow Banter™ — Fun Jank Decks05:25 - BHIS - Talkin’ Bout [infosec] News 2025-03-17 - Malicious browser plugins will destroy us ALL!!!!!06:35 - Story # 1: Polymorphic Extensions: The Sneaky Extension That Can Impersonate Any Browser Extension14:37 - Story # 1b: Chrome Web Store is a mess31:14 - Story # 2: Lazarus Strikes npm Again with New Wave of Malicious Packages36:17 - Story # 3: China’s Volt Typhoon Hackers Dwelled in US Electric Grid for 300 Days44:44 - Story # 4: Saudi Arabia Buys Pokémon Go, and Probably All of Your Location Data49:31 - Story # 5: Second biggest bank in US hit by major data breach stealing social security numbers and other personal info51:25 - Story # 6: Hackers Take Credit for X Cyberattack54:32 - Story # 7: Hackers Using Advanced MFA-Bypassing Techniques To Gain Access To User Account</itunes:summary>
      <itunes:subtitle>00:00 - PreShow Banter™ — Fun Jank Decks05:25 - BHIS - Talkin’ Bout [infosec] News 2025-03-17 - Malicious browser plugins will destroy us ALL!!!!!06:35 - Story # 1: Polymorphic Extensions: The Sneaky Extension That Can Impersonate Any Browser Extension14:</itunes:subtitle>
      <itunes:keywords>Infosec,Cybersecurity,news</itunes:keywords>
      <itunes:explicit>No</itunes:explicit>
      <podcast:chapters url="https://share.transistor.fm/s/579f8b5e/chapters.json" type="application/json+chapters"/>
    </item>
    <item>
      <title>2025-03-10 — Agent A.I.</title>
      <itunes:episode>1</itunes:episode>
      <podcast:episode>1</podcast:episode>
      <itunes:title>2025-03-10 — Agent A.I.</itunes:title>
      <itunes:episodeType>full</itunes:episodeType>
      <guid isPermaLink="false">https://blubrry.com/bhis/143216628/2025-03-10-agent-ai/</guid>
      <link>https://share.transistor.fm/s/8bf9e3e4</link>
      <description>
        <![CDATA[<p>00:00 - PreShow Banter™ — Agent A.I.</p><p>07:35 - BHIS - Talkin’ Bout [infosec] News 2025-03-10</p><p>10:47 - Story # 1: 12 Chinese hackers charged with US Treasury breach — and much, much more</p><p>15:25 - Story # 2: Signal President Meredith Whittaker calls out agentic AI as having ‘profound’ security and privacy issues</p><p>25:33 - Story # 3: X/Twitter is down for a third time today</p><p>27:33 - Story # 4: Developer sabotaged ex-employer with kill switch activated when he was let go</p><p>33:37 - Story # 5: Undocumented commands found in Bluetooth chip used by a billion devices</p><p>45:37 - Story # 6: Cybercrime’s Cobalt Strike Use Plummets 80% Worldwide</p><p>46:19 - Story # 7: Majority of Orgs Hit by AI Cyber-Attacks as Detection Lags</p><p>55:01 - Story # 8: Ransomware gang encrypted network from a webcam to bypass EDR</p>
<ul><li>(00:00) - PreShow Banter™— Agent A.I.</li>
<li>(07:35) - BHIS - Talkin' Bout [infosec] News 2025-03-10</li>
<li>(10:47) - Story # 1: 12 Chinese hackers charged with US Treasury breach — and much, much more</li>
<li>(15:24) - Story # 2: Signal President Meredith Whittaker calls out agentic AI as having ‘profound’ security and privacy issues</li>
<li>(25:32) - Story # 3: X/Twitter is down for a third time today</li>
<li>(27:33) - Story # 4: Developer sabotaged ex-employer with kill switch activated when he was let go</li>
<li>(33:37) - Story # 5: Undocumented commands found in Bluetooth chip used by a billion devices</li>
<li>(45:36) - Story # 6: Cybercrime's Cobalt Strike Use Plummets 80% Worldwide</li>
<li>(46:19) - Story # 7: Majority of Orgs Hit by AI Cyber-Attacks as Detection Lags</li>
<li>(55:00) - Story # 8: Ransomware gang encrypted network from a webcam to bypass EDR</li>
</ul>]]>
      </description>
      <content:encoded>
        <![CDATA[<p>00:00 - PreShow Banter™ — Agent A.I.</p><p>07:35 - BHIS - Talkin’ Bout [infosec] News 2025-03-10</p><p>10:47 - Story # 1: 12 Chinese hackers charged with US Treasury breach — and much, much more</p><p>15:25 - Story # 2: Signal President Meredith Whittaker calls out agentic AI as having ‘profound’ security and privacy issues</p><p>25:33 - Story # 3: X/Twitter is down for a third time today</p><p>27:33 - Story # 4: Developer sabotaged ex-employer with kill switch activated when he was let go</p><p>33:37 - Story # 5: Undocumented commands found in Bluetooth chip used by a billion devices</p><p>45:37 - Story # 6: Cybercrime’s Cobalt Strike Use Plummets 80% Worldwide</p><p>46:19 - Story # 7: Majority of Orgs Hit by AI Cyber-Attacks as Detection Lags</p><p>55:01 - Story # 8: Ransomware gang encrypted network from a webcam to bypass EDR</p>
<ul><li>(00:00) - PreShow Banter™— Agent A.I.</li>
<li>(07:35) - BHIS - Talkin' Bout [infosec] News 2025-03-10</li>
<li>(10:47) - Story # 1: 12 Chinese hackers charged with US Treasury breach — and much, much more</li>
<li>(15:24) - Story # 2: Signal President Meredith Whittaker calls out agentic AI as having ‘profound’ security and privacy issues</li>
<li>(25:32) - Story # 3: X/Twitter is down for a third time today</li>
<li>(27:33) - Story # 4: Developer sabotaged ex-employer with kill switch activated when he was let go</li>
<li>(33:37) - Story # 5: Undocumented commands found in Bluetooth chip used by a billion devices</li>
<li>(45:36) - Story # 6: Cybercrime's Cobalt Strike Use Plummets 80% Worldwide</li>
<li>(46:19) - Story # 7: Majority of Orgs Hit by AI Cyber-Attacks as Detection Lags</li>
<li>(55:00) - Story # 8: Ransomware gang encrypted network from a webcam to bypass EDR</li>
</ul>]]>
      </content:encoded>
      <pubDate>Wed, 12 Mar 2025 12:00:00 -0400</pubDate>
      <author>Black Hills Information Security</author>
      <enclosure url="https://media.transistor.fm/8bf9e3e4/ff12b2e0.mp3" length="63142294" type="audio/mpeg"/>
      <itunes:author>Black Hills Information Security</itunes:author>
      <itunes:image href="https://img.transistorcdn.com/V0F05bRaM-dNFzWrM4X_z_3bzWV1sSfE6WB0dVEoGL0/rs:fill:0:0:1/w:1400/h:1400/q:60/mb:500000/aHR0cHM6Ly9pbWct/dXBsb2FkLXByb2R1/Y3Rpb24udHJhbnNp/c3Rvci5mbS8zYjQy/OTU3ZTUyZmNhZDVh/YmMyM2MwYTA2ODhl/OTE2My5qcGc.jpg"/>
      <itunes:duration>3851</itunes:duration>
      <itunes:summary>00:00 - PreShow Banter™ — Agent A.I.07:35 - BHIS - Talkin’ Bout [infosec] News 2025-03-1010:47 - Story # 1: 12 Chinese hackers charged with US Treasury breach — and much, much more15:25 - Story # 2: Signal President Meredith Whittaker calls out agentic AI as having ‘profound’ security and privacy issues25:33 - Story # 3: X/Twitter is down for a third time today27:33 - Story # 4: Developer sabotaged ex-employer with kill switch activated when he was let go33:37 - Story # 5: Undocumented commands found in Bluetooth chip used by a billion devices45:37 - Story # 6: Cybercrime’s Cobalt Strike Use Plummets 80% Worldwide46:19 - Story # 7: Majority of Orgs Hit by AI Cyber-Attacks as Detection Lags55:01 - Story # 8: Ransomware gang encrypted network from a webcam to bypass EDR</itunes:summary>
      <itunes:subtitle>00:00 - PreShow Banter™ — Agent A.I.07:35 - BHIS - Talkin’ Bout [infosec] News 2025-03-1010:47 - Story # 1: 12 Chinese hackers charged with US Treasury breach — and much, much more15:25 - Story # 2: Signal President Meredith Whittaker calls out agentic AI</itunes:subtitle>
      <itunes:keywords>Infosec,Cybersecurity,news</itunes:keywords>
      <itunes:explicit>No</itunes:explicit>
      <podcast:chapters url="https://share.transistor.fm/s/8bf9e3e4/chapters.json" type="application/json+chapters"/>
    </item>
    <item>
      <title>2025-03-03 - Not Talking About Anything</title>
      <itunes:episode>1</itunes:episode>
      <podcast:episode>1</podcast:episode>
      <itunes:title>2025-03-03 - Not Talking About Anything</itunes:title>
      <itunes:episodeType>full</itunes:episodeType>
      <guid isPermaLink="false">https://blubrry.com/bhis/142922144/2025-03-03-not-talking-about-anything/</guid>
      <link>https://share.transistor.fm/s/cc7f5677</link>
      <description>
        <![CDATA[<p>00:00 - PreShow Banter™ — Not Talking About Anything</p><p>04:29 - BHIS - Talkin’ Bout [infosec] News 2025-03-03</p><p>05:42 - Story # 1: FBI Warns iPhone, Android Users—We Want ‘Lawful Access’ To All Your Encrypted Data</p><p>24:28 - Story # 2: Disney engineer downloaded ‘helpful’ AI tool that ended up completely destroying his life</p><p>34:28 - Story # 3: Have I Been Pwned adds 284M accounts stolen by infostealer malware</p><p>43:22 - Story # 4: Dragos’s 8th Annual OT Cybersecurity Year in Review Is Now Available</p><p>45:53 - Story # 5: Trump administration retreats in fight against Russian cyber threats</p><p>55:19 - Story # 5b: Exclusive: US intel shows Russia and China are attempting to recruit disgruntled federal employees, sources say</p><p>57:33 - Story # 6: Feds: Army soldier suspected of AT&amp;T heist Googled ‘can hacking be treason,’ ‘defecting to Russia’</p>
<ul><li>(00:00) - PreShow Banter™ — Not Talking About Anything</li>
<li>(04:28) - BHIS - Talkin' Bout [infosec] News 2025-03-03</li>
<li>(05:42) - Story # 1: FBI Warns iPhone, Android Users—We Want ‘Lawful Access’ To All Your Encrypted Data</li>
<li>(24:27) - Story # 2: Disney engineer downloaded 'helpful' AI tool that ended up completely destroying his life</li>
<li>(34:27) - Story # 3: Have I Been Pwned adds 284M accounts stolen by infostealer malware</li>
<li>(43:22) - Story # 4: Dragos's 8th Annual OT Cybersecurity Year in Review Is Now Available</li>
<li>(45:53) - Story # 5: Trump administration retreats in fight against Russian cyber threats</li>
<li>(55:19) - Story # 5b: Exclusive: US intel shows Russia and China are attempting to recruit disgruntled federal employees, sources say</li>
<li>(57:32) - Story # 6: Feds: Army soldier suspected of AT&amp;T heist Googled ‘can hacking be treason,’ ‘defecting to Russia’</li>
</ul>]]>
      </description>
      <content:encoded>
        <![CDATA[<p>00:00 - PreShow Banter™ — Not Talking About Anything</p><p>04:29 - BHIS - Talkin’ Bout [infosec] News 2025-03-03</p><p>05:42 - Story # 1: FBI Warns iPhone, Android Users—We Want ‘Lawful Access’ To All Your Encrypted Data</p><p>24:28 - Story # 2: Disney engineer downloaded ‘helpful’ AI tool that ended up completely destroying his life</p><p>34:28 - Story # 3: Have I Been Pwned adds 284M accounts stolen by infostealer malware</p><p>43:22 - Story # 4: Dragos’s 8th Annual OT Cybersecurity Year in Review Is Now Available</p><p>45:53 - Story # 5: Trump administration retreats in fight against Russian cyber threats</p><p>55:19 - Story # 5b: Exclusive: US intel shows Russia and China are attempting to recruit disgruntled federal employees, sources say</p><p>57:33 - Story # 6: Feds: Army soldier suspected of AT&amp;T heist Googled ‘can hacking be treason,’ ‘defecting to Russia’</p>
<ul><li>(00:00) - PreShow Banter™ — Not Talking About Anything</li>
<li>(04:28) - BHIS - Talkin' Bout [infosec] News 2025-03-03</li>
<li>(05:42) - Story # 1: FBI Warns iPhone, Android Users—We Want ‘Lawful Access’ To All Your Encrypted Data</li>
<li>(24:27) - Story # 2: Disney engineer downloaded 'helpful' AI tool that ended up completely destroying his life</li>
<li>(34:27) - Story # 3: Have I Been Pwned adds 284M accounts stolen by infostealer malware</li>
<li>(43:22) - Story # 4: Dragos's 8th Annual OT Cybersecurity Year in Review Is Now Available</li>
<li>(45:53) - Story # 5: Trump administration retreats in fight against Russian cyber threats</li>
<li>(55:19) - Story # 5b: Exclusive: US intel shows Russia and China are attempting to recruit disgruntled federal employees, sources say</li>
<li>(57:32) - Story # 6: Feds: Army soldier suspected of AT&amp;T heist Googled ‘can hacking be treason,’ ‘defecting to Russia’</li>
</ul>]]>
      </content:encoded>
      <pubDate>Wed, 05 Mar 2025 12:00:00 -0500</pubDate>
      <author>Black Hills Information Security</author>
      <enclosure url="https://media.transistor.fm/cc7f5677/ae0565bb.mp3" length="57852741" type="audio/mpeg"/>
      <itunes:author>Black Hills Information Security</itunes:author>
      <itunes:image href="https://img.transistorcdn.com/BKLKs_Oyjt9hQQp5k_U_4UdsoAd8XabYia5hFIe1O5c/rs:fill:0:0:1/w:1400/h:1400/q:60/mb:500000/aHR0cHM6Ly9pbWct/dXBsb2FkLXByb2R1/Y3Rpb24udHJhbnNp/c3Rvci5mbS9lMzJl/NGI5NjE2ZjVlNDU1/YzNkM2UyMjhmN2Uz/NmZhZS5qcGc.jpg"/>
      <itunes:duration>3521</itunes:duration>
      <itunes:summary>00:00 - PreShow Banter™ — Not Talking About Anything04:29 - BHIS - Talkin’ Bout [infosec] News 2025-03-0305:42 - Story # 1: FBI Warns iPhone, Android Users—We Want ‘Lawful Access’ To All Your Encrypted Data24:28 - Story # 2: Disney engineer downloaded ‘helpful’ AI tool that ended up completely destroying his life34:28 - Story # 3: Have I Been Pwned adds 284M accounts stolen by infostealer malware43:22 - Story # 4: Dragos’s 8th Annual OT Cybersecurity Year in Review Is Now Available45:53 - Story # 5: Trump administration retreats in fight against Russian cyber threats55:19 - Story # 5b: Exclusive: US intel shows Russia and China are attempting to recruit disgruntled federal employees, sources say57:33 - Story # 6: Feds: Army soldier suspected of AT&amp;amp;T heist Googled ‘can hacking be treason,’ ‘defecting to Russia’</itunes:summary>
      <itunes:subtitle>00:00 - PreShow Banter™ — Not Talking About Anything04:29 - BHIS - Talkin’ Bout [infosec] News 2025-03-0305:42 - Story # 1: FBI Warns iPhone, Android Users—We Want ‘Lawful Access’ To All Your Encrypted Data24:28 - Story # 2: Disney engineer downloaded ‘he</itunes:subtitle>
      <itunes:keywords>Infosec,Cybersecurity,news</itunes:keywords>
      <itunes:explicit>No</itunes:explicit>
      <podcast:chapters url="https://share.transistor.fm/s/cc7f5677/chapters.json" type="application/json+chapters"/>
    </item>
    <item>
      <title>2025-05-24 - Get Political (With Jake Williams)</title>
      <itunes:episode>1</itunes:episode>
      <podcast:episode>1</podcast:episode>
      <itunes:title>2025-05-24 - Get Political (With Jake Williams)</itunes:title>
      <itunes:episodeType>full</itunes:episodeType>
      <guid isPermaLink="false">https://blubrry.com/bhis/142629404/2025-05-24-get-political-with-jake-williams/</guid>
      <link>https://share.transistor.fm/s/d8d7528a</link>
      <description>
        <![CDATA[<p>00:00 - PreShow Banter™ — Get Political</p><p>05:27 - BHIS - Talkin’ Bout [infosec] News 2025-02-25</p><p>06:07 - Story # 1: Trump 2.0 Brings Cuts to Cyber, Consumer Protections</p><p>37:57 - Story # 2: OpenAI Uncovers Evidence of A.I.-Powered Chinese Surveillance Tool</p><p>49:48 - Story # 3: Apple pulls data protection tool after UK government security row</p><p>55:00 - Story # 4: Judge dismisses Chris Hadnagy lawsuit against DEF CON</p>
<ul><li>(00:00) - PreShow Banter™ — Get Political</li>
<li>(05:26) - BHIS - Talkin' Bout [infosec] News 2025-02-25</li>
<li>(06:07) - Story # 1: Trump 2.0 Brings Cuts to Cyber, Consumer Protections</li>
<li>(37:56) - Story # 2: OpenAI Uncovers Evidence of A.I.-Powered Chinese Surveillance Tool</li>
<li>(49:48) - Story # 3: Apple pulls data protection tool after UK government security row</li>
<li>(54:59) - Story # 4: Judge dismisses Chris Hadnagy lawsuit against DEF CON</li>
</ul>]]>
      </description>
      <content:encoded>
        <![CDATA[<p>00:00 - PreShow Banter™ — Get Political</p><p>05:27 - BHIS - Talkin’ Bout [infosec] News 2025-02-25</p><p>06:07 - Story # 1: Trump 2.0 Brings Cuts to Cyber, Consumer Protections</p><p>37:57 - Story # 2: OpenAI Uncovers Evidence of A.I.-Powered Chinese Surveillance Tool</p><p>49:48 - Story # 3: Apple pulls data protection tool after UK government security row</p><p>55:00 - Story # 4: Judge dismisses Chris Hadnagy lawsuit against DEF CON</p>
<ul><li>(00:00) - PreShow Banter™ — Get Political</li>
<li>(05:26) - BHIS - Talkin' Bout [infosec] News 2025-02-25</li>
<li>(06:07) - Story # 1: Trump 2.0 Brings Cuts to Cyber, Consumer Protections</li>
<li>(37:56) - Story # 2: OpenAI Uncovers Evidence of A.I.-Powered Chinese Surveillance Tool</li>
<li>(49:48) - Story # 3: Apple pulls data protection tool after UK government security row</li>
<li>(54:59) - Story # 4: Judge dismisses Chris Hadnagy lawsuit against DEF CON</li>
</ul>]]>
      </content:encoded>
      <pubDate>Wed, 26 Feb 2025 12:03:08 -0500</pubDate>
      <author>Black Hills Information Security</author>
      <enclosure url="https://media.transistor.fm/d8d7528a/83315620.mp3" length="60997394" type="audio/mpeg"/>
      <itunes:author>Black Hills Information Security</itunes:author>
      <itunes:image href="https://img.transistorcdn.com/unWsLZGINmnBDIBDWt2hXlERSxAg3XJZ89-1Gw3Uf-E/rs:fill:0:0:1/w:1400/h:1400/q:60/mb:500000/aHR0cHM6Ly9pbWct/dXBsb2FkLXByb2R1/Y3Rpb24udHJhbnNp/c3Rvci5mbS9kNmE1/M2Q4Mzk0MjM1YWRl/N2Y3ZDQ2MmUwNjIw/NDJmZC5qcGc.jpg"/>
      <itunes:duration>3750</itunes:duration>
      <itunes:summary>00:00 - PreShow Banter™ — Get Political05:27 - BHIS - Talkin’ Bout [infosec] News 2025-02-2506:07 - Story # 1: Trump 2.0 Brings Cuts to Cyber, Consumer Protections37:57 - Story # 2: OpenAI Uncovers Evidence of A.I.-Powered Chinese Surveillance Tool49:48 - Story # 3: Apple pulls data protection tool after UK government security row55:00 - Story # 4: Judge dismisses Chris Hadnagy lawsuit against DEF CON</itunes:summary>
      <itunes:subtitle>00:00 - PreShow Banter™ — Get Political05:27 - BHIS - Talkin’ Bout [infosec] News 2025-02-2506:07 - Story # 1: Trump 2.0 Brings Cuts to Cyber, Consumer Protections37:57 - Story # 2: OpenAI Uncovers Evidence of A.I.-Powered Chinese Surveillance Tool49:48 -</itunes:subtitle>
      <itunes:keywords>Infosec,Cybersecurity,news</itunes:keywords>
      <itunes:explicit>No</itunes:explicit>
      <podcast:chapters url="https://share.transistor.fm/s/d8d7528a/chapters.json" type="application/json+chapters"/>
    </item>
    <item>
      <title>2025-02-17 - Prove That You're Wearing Pants</title>
      <itunes:episode>1</itunes:episode>
      <podcast:episode>1</podcast:episode>
      <itunes:title>2025-02-17 - Prove That You're Wearing Pants</itunes:title>
      <itunes:episodeType>full</itunes:episodeType>
      <guid isPermaLink="false">https://blubrry.com/bhis/142348859/2025-02-17-prove-that-youre-wearing-pants/</guid>
      <link>https://share.transistor.fm/s/0df00f55</link>
      <description>
        <![CDATA[<p> </p><p>00:00 - PreShow Banter™ — Prove That You’re Wearing Pants</p><p>05:50 - BHIS - Talkin’ Bout [infosec] News 2025-05-17</p><p>06:46 - Story # 1: Fortinet discloses second firewall auth bypass patched in January</p><p>07:12 - Story # 1b: Fortinet CEO boasts it was voted the “most trusted” cybersecurity firm. Don’t die laughing</p><p>08:45 - Story # 1c: Forbes Most Trusted Companies in America 2025 List</p><p>16:25 - Story # 2: SAML Bypass Authentication on GitHub Enterprise Servers to Login as Other User Account</p><p>18:37 - Story # 2b: Rapid7 Flags New PostgreSQL Zero-Day Connected to BeyondTrust Exploitation</p><p>20:04 - Story # 3: Putting the human back into AI is key, former NSA Director Nakasone says</p><p>36:35 - Story # 4: Apple Confirms USB Restricted Mode Exploited in ‘Extremely Sophisticated’ Attack</p><p>37:44 - Story # 5: DOGE Exposes Once-Secret Government Networks, Making Cyber-Espionage Easier than Ever</p><p>43:14 - Story # 5b: DOGE’s .gov site lampooned as coders quickly realize it can be edited by anyone</p><p>46:59 - Story # 6: Man who SIM-swapped the SEC’s X account pleads guilty</p><p>51:26 - Story # 7: Russia’s Sandworm caught snarfing credentials, data from American and Brit orgs</p><p>53:55 - Story # 8: Nearly 10 years after Data and Goliath, Bruce Schneier says: Privacy’s still screwed</p><p> </p>
<ul><li>(00:00) - PreShow Banter™ — Prove That You're Wearing Pants</li>
<li>(05:49) - BHIS - Talkin' Bout [infosec] News 2025-05-17</li>
<li>(06:46) - Story # 1: Fortinet discloses second firewall auth bypass patched in January</li>
<li>(07:11) - Story # 1b: Fortinet CEO boasts it was voted the “most trusted” cybersecurity firm. Don't die laughing</li>
<li>(08:44) - Story # 1c: Forbes Most Trusted Companies in America 2025 List</li>
<li>(16:24) - Story # 2: SAML Bypass Authentication on GitHub Enterprise Servers to Login as Other User Account</li>
<li>(18:37) - Story # 2b: Rapid7 Flags New PostgreSQL Zero-Day Connected to BeyondTrust Exploitation</li>
<li>(20:04) - Story # 3: Putting the human back into AI is key, former NSA Director Nakasone says</li>
<li>(36:34) - Story # 4: Apple Confirms USB Restricted Mode Exploited in ‘Extremely Sophisticated’ Attack</li>
<li>(37:43) - Story # 5: DOGE Exposes Once-Secret Government Networks, Making Cyber-Espionage Easier than Ever</li>
<li>(43:14) - Story # 5b: DOGE’s .gov site lampooned as coders quickly realize it can be edited by anyone</li>
<li>(46:58) - Story # 6: Man who SIM-swapped the SEC's X account pleads guilty</li>
<li>(51:26) - Story # 7: Russia's Sandworm caught snarfing credentials, data from American and Brit orgs</li>
<li>(53:55) - Story # 8: Nearly 10 years after Data and Goliath, Bruce Schneier says: Privacy’s still screwed</li>
</ul>]]>
      </description>
      <content:encoded>
        <![CDATA[<p> </p><p>00:00 - PreShow Banter™ — Prove That You’re Wearing Pants</p><p>05:50 - BHIS - Talkin’ Bout [infosec] News 2025-05-17</p><p>06:46 - Story # 1: Fortinet discloses second firewall auth bypass patched in January</p><p>07:12 - Story # 1b: Fortinet CEO boasts it was voted the “most trusted” cybersecurity firm. Don’t die laughing</p><p>08:45 - Story # 1c: Forbes Most Trusted Companies in America 2025 List</p><p>16:25 - Story # 2: SAML Bypass Authentication on GitHub Enterprise Servers to Login as Other User Account</p><p>18:37 - Story # 2b: Rapid7 Flags New PostgreSQL Zero-Day Connected to BeyondTrust Exploitation</p><p>20:04 - Story # 3: Putting the human back into AI is key, former NSA Director Nakasone says</p><p>36:35 - Story # 4: Apple Confirms USB Restricted Mode Exploited in ‘Extremely Sophisticated’ Attack</p><p>37:44 - Story # 5: DOGE Exposes Once-Secret Government Networks, Making Cyber-Espionage Easier than Ever</p><p>43:14 - Story # 5b: DOGE’s .gov site lampooned as coders quickly realize it can be edited by anyone</p><p>46:59 - Story # 6: Man who SIM-swapped the SEC’s X account pleads guilty</p><p>51:26 - Story # 7: Russia’s Sandworm caught snarfing credentials, data from American and Brit orgs</p><p>53:55 - Story # 8: Nearly 10 years after Data and Goliath, Bruce Schneier says: Privacy’s still screwed</p><p> </p>
<ul><li>(00:00) - PreShow Banter™ — Prove That You're Wearing Pants</li>
<li>(05:49) - BHIS - Talkin' Bout [infosec] News 2025-05-17</li>
<li>(06:46) - Story # 1: Fortinet discloses second firewall auth bypass patched in January</li>
<li>(07:11) - Story # 1b: Fortinet CEO boasts it was voted the “most trusted” cybersecurity firm. Don't die laughing</li>
<li>(08:44) - Story # 1c: Forbes Most Trusted Companies in America 2025 List</li>
<li>(16:24) - Story # 2: SAML Bypass Authentication on GitHub Enterprise Servers to Login as Other User Account</li>
<li>(18:37) - Story # 2b: Rapid7 Flags New PostgreSQL Zero-Day Connected to BeyondTrust Exploitation</li>
<li>(20:04) - Story # 3: Putting the human back into AI is key, former NSA Director Nakasone says</li>
<li>(36:34) - Story # 4: Apple Confirms USB Restricted Mode Exploited in ‘Extremely Sophisticated’ Attack</li>
<li>(37:43) - Story # 5: DOGE Exposes Once-Secret Government Networks, Making Cyber-Espionage Easier than Ever</li>
<li>(43:14) - Story # 5b: DOGE’s .gov site lampooned as coders quickly realize it can be edited by anyone</li>
<li>(46:58) - Story # 6: Man who SIM-swapped the SEC's X account pleads guilty</li>
<li>(51:26) - Story # 7: Russia's Sandworm caught snarfing credentials, data from American and Brit orgs</li>
<li>(53:55) - Story # 8: Nearly 10 years after Data and Goliath, Bruce Schneier says: Privacy’s still screwed</li>
</ul>]]>
      </content:encoded>
      <pubDate>Wed, 19 Feb 2025 17:16:36 -0500</pubDate>
      <author>Black Hills Information Security</author>
      <enclosure url="https://media.transistor.fm/0df00f55/cf761683.mp3" length="65004406" type="audio/mpeg"/>
      <itunes:author>Black Hills Information Security</itunes:author>
      <itunes:image href="https://img.transistorcdn.com/4D_suGGWe_TRH_bP7Z7QdqdlnstwFAQDqdHrTSPBIAo/rs:fill:0:0:1/w:1400/h:1400/q:60/mb:500000/aHR0cHM6Ly9pbWct/dXBsb2FkLXByb2R1/Y3Rpb24udHJhbnNp/c3Rvci5mbS9kZDYw/MDZmM2ExNzQzNmU5/MmI4OGVkNjFkNTM3/ZTFiNC5qcGc.jpg"/>
      <itunes:duration>3931</itunes:duration>
      <itunes:summary> 00:00 - PreShow Banter™ — Prove That You’re Wearing Pants05:50 - BHIS - Talkin’ Bout [infosec] News 2025-05-1706:46 - Story # 1: Fortinet discloses second firewall auth bypass patched in January07:12 - Story # 1b: Fortinet CEO boasts it was voted the “most trusted” cybersecurity firm. Don’t die laughing08:45 - Story # 1c: Forbes Most Trusted Companies in America 2025 List16:25 - Story # 2: SAML Bypass Authentication on GitHub Enterprise Servers to Login as Other User Account18:37 - Story # 2b: Rapid7 Flags New PostgreSQL Zero-Day Connected to BeyondTrust Exploitation20:04 - Story # 3: Putting the human back into AI is key, former NSA Director Nakasone says36:35 - Story # 4: Apple Confirms USB Restricted Mode Exploited in ‘Extremely Sophisticated’ Attack37:44 - Story # 5: DOGE Exposes Once-Secret Government Networks, Making Cyber-Espionage Easier than Ever43:14 - Story # 5b: DOGE’s .gov site lampooned as coders quickly realize it can be edited by anyone46:59 - Story # 6: Man who SIM-swapped the SEC’s X account pleads guilty51:26 - Story # 7: Russia’s Sandworm caught snarfing credentials, data from American and Brit orgs53:55 - Story # 8: Nearly 10 years after Data and Goliath, Bruce Schneier says: Privacy’s still screwed </itunes:summary>
      <itunes:subtitle> 00:00 - PreShow Banter™ — Prove That You’re Wearing Pants05:50 - BHIS - Talkin’ Bout [infosec] News 2025-05-1706:46 - Story # 1: Fortinet discloses second firewall auth bypass patched in January07:12 - Story # 1b: Fortinet CEO boasts it was voted the “mo</itunes:subtitle>
      <itunes:keywords>Infosec,Cybersecurity,news</itunes:keywords>
      <itunes:explicit>No</itunes:explicit>
      <podcast:chapters url="https://share.transistor.fm/s/0df00f55/chapters.json" type="application/json+chapters"/>
    </item>
    <item>
      <title>2025-02-10 - Walking Through Denver</title>
      <itunes:episode>1</itunes:episode>
      <podcast:episode>1</podcast:episode>
      <itunes:title>2025-02-10 - Walking Through Denver</itunes:title>
      <itunes:episodeType>full</itunes:episodeType>
      <guid isPermaLink="false">https://blubrry.com/bhis/142117872/2025-02-10-walking-through-denver/</guid>
      <link>https://share.transistor.fm/s/11b31bb4</link>
      <description>
        <![CDATA[<p>00:00 - PreShow Banter™ — Walking Through Denver</p><p>02:23 - BHIS - Talkin’ Bout [infosec] News 2025-02-10</p><p>04:35 - Story # 1: Ransomware payments declined in 2024 despite massive. well-known hacks</p><p>05:02 - Story # 1b: 35% Year-over-Year Decrease in Ransomware Payments, Less than Half of Recorded Incidents Resulted in Victim Payments</p><p>14:19 - Story # 2: Critical Cisco ISE bug can let attackers run commands as root</p><p>16:43 - Story # 3: The Untold Story of a Crypto Crimefighter’s Descent Into Nigerian Prison</p><p>24:18 - Story # 4: IoT’s botnet problem is up 500% – three things admins must do now</p><p>31:49 - Story # 5: WhatsApp identifies dozens of users hacked by Paragon spyware company</p><p>39:41 - Story # 6: Sri Lanka goes bananas after monkey unplugs nation</p><p>43:36 - Story # 7: Microsoft Study Finds AI Makes Human Cognition “Atrophied and Unprepared”</p><p>50:17 - ChickenSec Story #: 1 Here’s a Super Bowl riddle: Why are egg prices surging — but not chicken wings?</p><p>52:21 - Story # 8: DOGE Staffer Previously Fired From Cybersecurity Company for Leaking Secrets</p><p>58:07 - ChickenSec Story #2: Americans to Eat 1.47 Billion Chicken Wings for Super Bowl LIX</p>
<ul><li>(00:00) - PreShow Banter™ — Walking Through Denver</li>
<li>(02:23) - BHIS - Talkin' Bout [infosec] News 2025-02-10</li>
<li>(04:34) - Story # 1: Ransomware payments declined in 2024 despite massive. well-known hacks</li>
<li>(05:02) - Story # 1b: 35% Year-over-Year Decrease in Ransomware Payments, Less than Half of Recorded Incidents Resulted in Victim Payments</li>
<li>(14:18) - Story # 2: Critical Cisco ISE bug can let attackers run commands as root</li>
<li>(16:42) - Story # 3: The Untold Story of a Crypto Crimefighter’s Descent Into Nigerian Prison</li>
<li>(24:17) - Story # 4: IoT’s botnet problem is up 500% – three things admins must do now</li>
<li>(31:48) - Story # 5: WhatsApp identifies dozens of users hacked by Paragon spyware company</li>
<li>(39:40) - Story # 6: Sri Lanka goes bananas after monkey unplugs nation</li>
<li>(43:35) - Story # 7: Microsoft Study Finds AI Makes Human Cognition “Atrophied and Unprepared”</li>
<li>(50:16) - ChickenSec Story #: 1 Here's a Super Bowl riddle: Why are egg prices surging — but not chicken wings?</li>
<li>(52:21) - Story # 8: DOGE Staffer Previously Fired From Cybersecurity Company for Leaking Secrets</li>
<li>(58:06) - ChickenSec Story #2: Americans to Eat 1.47 Billion Chicken Wings for Super Bowl LIX</li>
</ul>]]>
      </description>
      <content:encoded>
        <![CDATA[<p>00:00 - PreShow Banter™ — Walking Through Denver</p><p>02:23 - BHIS - Talkin’ Bout [infosec] News 2025-02-10</p><p>04:35 - Story # 1: Ransomware payments declined in 2024 despite massive. well-known hacks</p><p>05:02 - Story # 1b: 35% Year-over-Year Decrease in Ransomware Payments, Less than Half of Recorded Incidents Resulted in Victim Payments</p><p>14:19 - Story # 2: Critical Cisco ISE bug can let attackers run commands as root</p><p>16:43 - Story # 3: The Untold Story of a Crypto Crimefighter’s Descent Into Nigerian Prison</p><p>24:18 - Story # 4: IoT’s botnet problem is up 500% – three things admins must do now</p><p>31:49 - Story # 5: WhatsApp identifies dozens of users hacked by Paragon spyware company</p><p>39:41 - Story # 6: Sri Lanka goes bananas after monkey unplugs nation</p><p>43:36 - Story # 7: Microsoft Study Finds AI Makes Human Cognition “Atrophied and Unprepared”</p><p>50:17 - ChickenSec Story #: 1 Here’s a Super Bowl riddle: Why are egg prices surging — but not chicken wings?</p><p>52:21 - Story # 8: DOGE Staffer Previously Fired From Cybersecurity Company for Leaking Secrets</p><p>58:07 - ChickenSec Story #2: Americans to Eat 1.47 Billion Chicken Wings for Super Bowl LIX</p>
<ul><li>(00:00) - PreShow Banter™ — Walking Through Denver</li>
<li>(02:23) - BHIS - Talkin' Bout [infosec] News 2025-02-10</li>
<li>(04:34) - Story # 1: Ransomware payments declined in 2024 despite massive. well-known hacks</li>
<li>(05:02) - Story # 1b: 35% Year-over-Year Decrease in Ransomware Payments, Less than Half of Recorded Incidents Resulted in Victim Payments</li>
<li>(14:18) - Story # 2: Critical Cisco ISE bug can let attackers run commands as root</li>
<li>(16:42) - Story # 3: The Untold Story of a Crypto Crimefighter’s Descent Into Nigerian Prison</li>
<li>(24:17) - Story # 4: IoT’s botnet problem is up 500% – three things admins must do now</li>
<li>(31:48) - Story # 5: WhatsApp identifies dozens of users hacked by Paragon spyware company</li>
<li>(39:40) - Story # 6: Sri Lanka goes bananas after monkey unplugs nation</li>
<li>(43:35) - Story # 7: Microsoft Study Finds AI Makes Human Cognition “Atrophied and Unprepared”</li>
<li>(50:16) - ChickenSec Story #: 1 Here's a Super Bowl riddle: Why are egg prices surging — but not chicken wings?</li>
<li>(52:21) - Story # 8: DOGE Staffer Previously Fired From Cybersecurity Company for Leaking Secrets</li>
<li>(58:06) - ChickenSec Story #2: Americans to Eat 1.47 Billion Chicken Wings for Super Bowl LIX</li>
</ul>]]>
      </content:encoded>
      <pubDate>Thu, 13 Feb 2025 13:12:08 -0500</pubDate>
      <author>Black Hills Information Security</author>
      <enclosure url="https://media.transistor.fm/11b31bb4/c9177f21.mp3" length="62396943" type="audio/mpeg"/>
      <itunes:author>Black Hills Information Security</itunes:author>
      <itunes:image href="https://img.transistorcdn.com/5xR6zQUIysTzJoQMO2qdqY_6ONdx4CxD4I9TJfD7_aY/rs:fill:0:0:1/w:1400/h:1400/q:60/mb:500000/aHR0cHM6Ly9pbWct/dXBsb2FkLXByb2R1/Y3Rpb24udHJhbnNp/c3Rvci5mbS9lYzc0/NGI3NWI3MTAzMTMw/MDY3MmNmMDAyZGIx/ZWU4OS5qcGc.jpg"/>
      <itunes:duration>3768</itunes:duration>
      <itunes:summary>00:00 - PreShow Banter™ — Walking Through Denver02:23 - BHIS - Talkin’ Bout [infosec] News 2025-02-1004:35 - Story # 1: Ransomware payments declined in 2024 despite massive. well-known hacks05:02 - Story # 1b: 35% Year-over-Year Decrease in Ransomware Payments, Less than Half of Recorded Incidents Resulted in Victim Payments14:19 - Story # 2: Critical Cisco ISE bug can let attackers run commands as root16:43 - Story # 3: The Untold Story of a Crypto Crimefighter’s Descent Into Nigerian Prison24:18 - Story # 4: IoT’s botnet problem is up 500% – three things admins must do now31:49 - Story # 5: WhatsApp identifies dozens of users hacked by Paragon spyware company39:41 - Story # 6: Sri Lanka goes bananas after monkey unplugs nation43:36 - Story # 7: Microsoft Study Finds AI Makes Human Cognition “Atrophied and Unprepared”50:17 - ChickenSec Story #: 1 Here’s a Super Bowl riddle: Why are egg prices surging — but not chicken wings?52:21 - Story # 8: DOGE Staffer Previously Fired From Cybersecurity Company for Leaking Secrets58:07 - ChickenSec Story #2: Americans to Eat 1.47 Billion Chicken Wings for Super Bowl LIX</itunes:summary>
      <itunes:subtitle>00:00 - PreShow Banter™ — Walking Through Denver02:23 - BHIS - Talkin’ Bout [infosec] News 2025-02-1004:35 - Story # 1: Ransomware payments declined in 2024 despite massive. well-known hacks05:02 - Story # 1b: 35% Year-over-Year Decrease in Ransomware Pay</itunes:subtitle>
      <itunes:keywords>Infosec,Cybersecurity,news</itunes:keywords>
      <itunes:explicit>No</itunes:explicit>
      <podcast:chapters url="https://share.transistor.fm/s/11b31bb4/chapters.json" type="application/json+chapters"/>
    </item>
    <item>
      <title>2025-02-05 - LIVE FROM WWHF DENVER 2025</title>
      <itunes:episode>1</itunes:episode>
      <podcast:episode>1</podcast:episode>
      <itunes:title>2025-02-05 - LIVE FROM WWHF DENVER 2025</itunes:title>
      <itunes:episodeType>full</itunes:episodeType>
      <guid isPermaLink="false">https://blubrry.com/bhis/142039430/2025-02-05-live-from-wwhf-denver-2025/</guid>
      <link>https://share.transistor.fm/s/f424ea40</link>
      <description>
        <![CDATA[<p>00:00 - PreShow Banter™ — Community Swear Bucket</p><p>01:40 - BHIS - Talkin’ Bout [infosec] News 2025-02-05</p><p>03:27 - Story # 1: DeepSeek R1 Exposed: Security Flaws in China’s AI Model</p><p>11:25 - Story # 2: Backdoor found in two healthcare patient monitors, linked to IP in China</p><p>15:21 - Story # 3: Facebook flags Linux topics as ‘cybersecurity threats’ — posts and users being blocked</p><p>20:56 - Story # 4: Here’s how Musk’s access to Treasury system may impact Social Security, other government payments</p><p>31:29 - Story # 5: Russian Cybercrime Groups Exploiting 7-Zip Flaw to Bypass Windows MotW Protections</p><p>34:34 - Story # 6: Insurance Company Globe Life Notifying 850,000 People of Data Breach</p><p>36:15 - Story # 10: DeepSeek Fails Researchers’ Safety Tests</p><p>38:35 - Story # 11: Engineering giant Smiths Group discloses security breach</p>
<ul><li>(00:00) - PreShow Banter™ — Community Swear Bucket</li>
<li>(01:39) - BHIS - Talkin' Bout [infosec] News 2025-02-05</li>
<li>(03:26) - Story # 1: DeepSeek R1 Exposed: Security Flaws in China’s AI Model</li>
<li>(11:24) - Story # 2: Backdoor found in two healthcare patient monitors, linked to IP in China</li>
<li>(15:20) - Story # 3: Facebook flags Linux topics as 'cybersecurity threats' — posts and users being blocked</li>
<li>(20:55) - Story # 4: Here’s how Musk’s access to Treasury system may impact Social Security, other government payments</li>
<li>(31:28) - Story # 5: Russian Cybercrime Groups Exploiting 7-Zip Flaw to Bypass Windows MotW Protections</li>
<li>(34:34) - Story # 6: Insurance Company Globe Life Notifying 850,000 People of Data Breach</li>
<li>(36:15) - Story # 10: DeepSeek Fails Researchers' Safety Tests</li>
<li>(38:35) - Story # 11: Engineering giant Smiths Group discloses security breach</li>
</ul>]]>
      </description>
      <content:encoded>
        <![CDATA[<p>00:00 - PreShow Banter™ — Community Swear Bucket</p><p>01:40 - BHIS - Talkin’ Bout [infosec] News 2025-02-05</p><p>03:27 - Story # 1: DeepSeek R1 Exposed: Security Flaws in China’s AI Model</p><p>11:25 - Story # 2: Backdoor found in two healthcare patient monitors, linked to IP in China</p><p>15:21 - Story # 3: Facebook flags Linux topics as ‘cybersecurity threats’ — posts and users being blocked</p><p>20:56 - Story # 4: Here’s how Musk’s access to Treasury system may impact Social Security, other government payments</p><p>31:29 - Story # 5: Russian Cybercrime Groups Exploiting 7-Zip Flaw to Bypass Windows MotW Protections</p><p>34:34 - Story # 6: Insurance Company Globe Life Notifying 850,000 People of Data Breach</p><p>36:15 - Story # 10: DeepSeek Fails Researchers’ Safety Tests</p><p>38:35 - Story # 11: Engineering giant Smiths Group discloses security breach</p>
<ul><li>(00:00) - PreShow Banter™ — Community Swear Bucket</li>
<li>(01:39) - BHIS - Talkin' Bout [infosec] News 2025-02-05</li>
<li>(03:26) - Story # 1: DeepSeek R1 Exposed: Security Flaws in China’s AI Model</li>
<li>(11:24) - Story # 2: Backdoor found in two healthcare patient monitors, linked to IP in China</li>
<li>(15:20) - Story # 3: Facebook flags Linux topics as 'cybersecurity threats' — posts and users being blocked</li>
<li>(20:55) - Story # 4: Here’s how Musk’s access to Treasury system may impact Social Security, other government payments</li>
<li>(31:28) - Story # 5: Russian Cybercrime Groups Exploiting 7-Zip Flaw to Bypass Windows MotW Protections</li>
<li>(34:34) - Story # 6: Insurance Company Globe Life Notifying 850,000 People of Data Breach</li>
<li>(36:15) - Story # 10: DeepSeek Fails Researchers' Safety Tests</li>
<li>(38:35) - Story # 11: Engineering giant Smiths Group discloses security breach</li>
</ul>]]>
      </content:encoded>
      <pubDate>Wed, 12 Feb 2025 12:00:00 -0500</pubDate>
      <author>Black Hills Information Security</author>
      <enclosure url="https://media.transistor.fm/f424ea40/5c5ed2b2.mp3" length="44697957" type="audio/mpeg"/>
      <itunes:author>Black Hills Information Security</itunes:author>
      <itunes:image href="https://img.transistorcdn.com/ena5Cl0fOcGmsG64FqxyRYM6FgIK906UohlEm5Tw518/rs:fill:0:0:1/w:1400/h:1400/q:60/mb:500000/aHR0cHM6Ly9pbWct/dXBsb2FkLXByb2R1/Y3Rpb24udHJhbnNp/c3Rvci5mbS9kNWJm/ZWZlOGNhODUzZGI5/OTdiZTQxZmEwMzAy/NTQ4OS5qcGc.jpg"/>
      <itunes:duration>2682</itunes:duration>
      <itunes:summary>00:00 - PreShow Banter™ — Community Swear Bucket01:40 - BHIS - Talkin’ Bout [infosec] News 2025-02-0503:27 - Story # 1: DeepSeek R1 Exposed: Security Flaws in China’s AI Model11:25 - Story # 2: Backdoor found in two healthcare patient monitors, linked to IP in China15:21 - Story # 3: Facebook flags Linux topics as ‘cybersecurity threats’ — posts and users being blocked20:56 - Story # 4: Here’s how Musk’s access to Treasury system may impact Social Security, other government payments31:29 - Story # 5: Russian Cybercrime Groups Exploiting 7-Zip Flaw to Bypass Windows MotW Protections34:34 - Story # 6: Insurance Company Globe Life Notifying 850,000 People of Data Breach36:15 - Story # 10: DeepSeek Fails Researchers’ Safety Tests38:35 - Story # 11: Engineering giant Smiths Group discloses security breach</itunes:summary>
      <itunes:subtitle>00:00 - PreShow Banter™ — Community Swear Bucket01:40 - BHIS - Talkin’ Bout [infosec] News 2025-02-0503:27 - Story # 1: DeepSeek R1 Exposed: Security Flaws in China’s AI Model11:25 - Story # 2: Backdoor found in two healthcare patient monitors, linked to </itunes:subtitle>
      <itunes:keywords>Infosec,Cybersecurity,news</itunes:keywords>
      <itunes:explicit>No</itunes:explicit>
      <podcast:chapters url="https://share.transistor.fm/s/f424ea40/chapters.json" type="application/json+chapters"/>
    </item>
    <item>
      <title>2025-01-27 - Fake Australian</title>
      <itunes:episode>1</itunes:episode>
      <podcast:episode>1</podcast:episode>
      <itunes:title>2025-01-27 - Fake Australian</itunes:title>
      <itunes:episodeType>full</itunes:episodeType>
      <guid isPermaLink="false">https://blubrry.com/bhis/141568675/2025-01-27-fake-australian/</guid>
      <link>https://share.transistor.fm/s/44ddf69d</link>
      <description>
        <![CDATA[<p>00:00 - PreShow Banter™ — Fake Australian</p><p>04:17 - BHIS - Talkin’ Bout [infosec] News 2025-01-27</p><p>04:34 - Story # 1: DeepSeek sparks AI stock selloff; Nvidia posts record market-cap loss</p><p>30:50 - Story # 2: Tech giants are putting $500bn into ‘Stargate’ to build up AI in US</p><p>42:23 - Story # 3: DeepSeek Faces Large-scale Cyberattack, Halts New User Registrations</p><p>43:34 - Story # 4: DHS cyber review board cleaned out in Trump move to eliminate ‘misuse of resources’</p><p>47:38 - Story # 5: UnitedHealth estimates 190M people impacted by Change Healthcare cyberattack</p><p>50:02 - Story # 5b: UnitedHealth now says 190 million impacted by 2024 data breach</p><p>53:09 - Story # 6: Cloudflare Issue Can Leak Chat App Users’ Broad Location</p><p>54:09 - Story # 7: Hacking Subaru: Tracking and Controlling Cars via the STARLINK Admin Panel</p><p>59:40 - Story # 8: Researchers say new attack could take down the European power grid</p>
<ul><li>(00:00) - PreShow Banter™ — Fake Australian</li>
<li>(04:17) - BHIS - Talkin' Bout [infosec] News 2025-01-27</li>
<li>(04:34) - Story # 1: DeepSeek sparks AI stock selloff; Nvidia posts record market-cap loss</li>
<li>(30:49) - Story # 2: Tech giants are putting $500bn into 'Stargate' to build up AI in US</li>
<li>(42:23) - Story # 3: DeepSeek Faces Large-scale Cyberattack, Halts New User Registrations</li>
<li>(43:33) - Story # 4: DHS cyber review board cleaned out in Trump move to eliminate ‘misuse of resources’</li>
<li>(47:38) - Story # 5: UnitedHealth estimates 190M people impacted by Change Healthcare cyberattack</li>
<li>(50:01) - Story # 5b: UnitedHealth now says 190 million impacted by 2024 data breach</li>
<li>(53:08) - Story # 6: Cloudflare Issue Can Leak Chat App Users' Broad Location</li>
<li>(54:09) - Story # 7: Hacking Subaru: Tracking and Controlling Cars via the STARLINK Admin Panel</li>
<li>(59:39) - Story # 8: Researchers say new attack could take down the European power grid</li>
</ul>]]>
      </description>
      <content:encoded>
        <![CDATA[<p>00:00 - PreShow Banter™ — Fake Australian</p><p>04:17 - BHIS - Talkin’ Bout [infosec] News 2025-01-27</p><p>04:34 - Story # 1: DeepSeek sparks AI stock selloff; Nvidia posts record market-cap loss</p><p>30:50 - Story # 2: Tech giants are putting $500bn into ‘Stargate’ to build up AI in US</p><p>42:23 - Story # 3: DeepSeek Faces Large-scale Cyberattack, Halts New User Registrations</p><p>43:34 - Story # 4: DHS cyber review board cleaned out in Trump move to eliminate ‘misuse of resources’</p><p>47:38 - Story # 5: UnitedHealth estimates 190M people impacted by Change Healthcare cyberattack</p><p>50:02 - Story # 5b: UnitedHealth now says 190 million impacted by 2024 data breach</p><p>53:09 - Story # 6: Cloudflare Issue Can Leak Chat App Users’ Broad Location</p><p>54:09 - Story # 7: Hacking Subaru: Tracking and Controlling Cars via the STARLINK Admin Panel</p><p>59:40 - Story # 8: Researchers say new attack could take down the European power grid</p>
<ul><li>(00:00) - PreShow Banter™ — Fake Australian</li>
<li>(04:17) - BHIS - Talkin' Bout [infosec] News 2025-01-27</li>
<li>(04:34) - Story # 1: DeepSeek sparks AI stock selloff; Nvidia posts record market-cap loss</li>
<li>(30:49) - Story # 2: Tech giants are putting $500bn into 'Stargate' to build up AI in US</li>
<li>(42:23) - Story # 3: DeepSeek Faces Large-scale Cyberattack, Halts New User Registrations</li>
<li>(43:33) - Story # 4: DHS cyber review board cleaned out in Trump move to eliminate ‘misuse of resources’</li>
<li>(47:38) - Story # 5: UnitedHealth estimates 190M people impacted by Change Healthcare cyberattack</li>
<li>(50:01) - Story # 5b: UnitedHealth now says 190 million impacted by 2024 data breach</li>
<li>(53:08) - Story # 6: Cloudflare Issue Can Leak Chat App Users' Broad Location</li>
<li>(54:09) - Story # 7: Hacking Subaru: Tracking and Controlling Cars via the STARLINK Admin Panel</li>
<li>(59:39) - Story # 8: Researchers say new attack could take down the European power grid</li>
</ul>]]>
      </content:encoded>
      <pubDate>Wed, 29 Jan 2025 12:00:00 -0500</pubDate>
      <author>Black Hills Information Security</author>
      <enclosure url="https://media.transistor.fm/44ddf69d/02b18725.mp3" length="62567728" type="audio/mpeg"/>
      <itunes:author>Black Hills Information Security</itunes:author>
      <itunes:image href="https://img.transistorcdn.com/JRRHHBo7hORY4URneWUFUK1VJlZgCuhnWalXt444WQY/rs:fill:0:0:1/w:1400/h:1400/q:60/mb:500000/aHR0cHM6Ly9pbWct/dXBsb2FkLXByb2R1/Y3Rpb24udHJhbnNp/c3Rvci5mbS85ZGRh/MTI2NDdlODQ2ZjFj/MzVmYmI5MGI3YmVi/NzcxMy5qcGc.jpg"/>
      <itunes:duration>3800</itunes:duration>
      <itunes:summary>00:00 - PreShow Banter™ — Fake Australian04:17 - BHIS - Talkin’ Bout [infosec] News 2025-01-2704:34 - Story # 1: DeepSeek sparks AI stock selloff; Nvidia posts record market-cap loss30:50 - Story # 2: Tech giants are putting $500bn into ‘Stargate’ to build up AI in US42:23 - Story # 3: DeepSeek Faces Large-scale Cyberattack, Halts New User Registrations43:34 - Story # 4: DHS cyber review board cleaned out in Trump move to eliminate ‘misuse of resources’47:38 - Story # 5: UnitedHealth estimates 190M people impacted by Change Healthcare cyberattack50:02 - Story # 5b: UnitedHealth now says 190 million impacted by 2024 data breach53:09 - Story # 6: Cloudflare Issue Can Leak Chat App Users’ Broad Location54:09 - Story # 7: Hacking Subaru: Tracking and Controlling Cars via the STARLINK Admin Panel59:40 - Story # 8: Researchers say new attack could take down the European power grid</itunes:summary>
      <itunes:subtitle>00:00 - PreShow Banter™ — Fake Australian04:17 - BHIS - Talkin’ Bout [infosec] News 2025-01-2704:34 - Story # 1: DeepSeek sparks AI stock selloff; Nvidia posts record market-cap loss30:50 - Story # 2: Tech giants are putting $500bn into ‘Stargate’ to buil</itunes:subtitle>
      <itunes:keywords>Infosec,Cybersecurity,news</itunes:keywords>
      <itunes:explicit>No</itunes:explicit>
      <podcast:chapters url="https://share.transistor.fm/s/44ddf69d/chapters.json" type="application/json+chapters"/>
    </item>
    <item>
      <title>2025-01-20 - Highest Rated Chalk</title>
      <itunes:episode>1</itunes:episode>
      <podcast:episode>1</podcast:episode>
      <itunes:title>2025-01-20 - Highest Rated Chalk</itunes:title>
      <itunes:episodeType>full</itunes:episodeType>
      <guid isPermaLink="false">https://blubrry.com/bhis/141285683/2025-01-20-highest-rated-chalk/</guid>
      <link>https://share.transistor.fm/s/3455aa4a</link>
      <description>
        <![CDATA[<p>00:00 - PreShow Banter™ — Highest Rated Chalk</p><p>04:14 - BHIS - Talkin’ Bout [infosec] News 2025-01-20</p><p>08:53 - Story # 1: Data From 15,000 Fortinet Firewalls Leaked by Hackers</p><p>14:25 - Story # 2: China’s Salt Typhoon spies spotted on US govt networks before telcos, CISA boss says</p><p>16:29 - Story # 3: TikTok reportedly plans ‘immediate’ Sunday shutdown in the US if it’s banned</p><p>25:47 - Story # 4: FBI forces Chinese malware to delete itself from thousands of US computers</p><p>35:06 - WWHF Denver</p><p>36:03 - BSides San Diego</p><p>37:23 - Security Stadium</p><p>38:22 - Story # 5: Exchange 2016 and 2019 reach end-of-life status later this year</p><p>42:45 - Story # 6: Snyk security researcher deploys malicious NPM packages targeting Cursor.com</p><p>46:17 - Story # 7: New UEFI Secure Boot flaw exposes systems to bootkits, patch now</p><p>57:34 - Story # 8: Lawsuit: Allstate used GasBuddy and other apps to quietly track driving</p>
<ul><li>(00:00) - PreShow Banter™ — Highest Rated Chalk</li>
<li>(04:13) - BHIS - Talkin' Bout [infosec] News 2025-01-20</li>
<li>(08:53) - Story # 1: Data From 15,000 Fortinet Firewalls Leaked by Hackers</li>
<li>(14:24) - Story # 2: China's Salt Typhoon spies spotted on US govt networks before telcos, CISA boss says</li>
<li>(16:28) - Story # 3: TikTok reportedly plans ‘immediate’ Sunday shutdown in the US if it’s banned</li>
<li>(25:47) - Story # 4: FBI forces Chinese malware to delete itself from thousands of US computers</li>
<li>(35:05) - WWHF Denver</li>
<li>(36:03) - BSides San Diego</li>
<li>(37:22) - Security Stadium</li>
<li>(38:21) - Story # 5: Exchange 2016 and 2019 reach end-of-life status later this year</li>
<li>(42:45) - Story # 6: Snyk security researcher deploys malicious NPM packages targeting Cursor.com</li>
<li>(46:16) - Story # 7: New UEFI Secure Boot flaw exposes systems to bootkits, patch now</li>
<li>(57:33) - Story # 8: Lawsuit: Allstate used GasBuddy and other apps to quietly track driving behavior</li>
</ul>]]>
      </description>
      <content:encoded>
        <![CDATA[<p>00:00 - PreShow Banter™ — Highest Rated Chalk</p><p>04:14 - BHIS - Talkin’ Bout [infosec] News 2025-01-20</p><p>08:53 - Story # 1: Data From 15,000 Fortinet Firewalls Leaked by Hackers</p><p>14:25 - Story # 2: China’s Salt Typhoon spies spotted on US govt networks before telcos, CISA boss says</p><p>16:29 - Story # 3: TikTok reportedly plans ‘immediate’ Sunday shutdown in the US if it’s banned</p><p>25:47 - Story # 4: FBI forces Chinese malware to delete itself from thousands of US computers</p><p>35:06 - WWHF Denver</p><p>36:03 - BSides San Diego</p><p>37:23 - Security Stadium</p><p>38:22 - Story # 5: Exchange 2016 and 2019 reach end-of-life status later this year</p><p>42:45 - Story # 6: Snyk security researcher deploys malicious NPM packages targeting Cursor.com</p><p>46:17 - Story # 7: New UEFI Secure Boot flaw exposes systems to bootkits, patch now</p><p>57:34 - Story # 8: Lawsuit: Allstate used GasBuddy and other apps to quietly track driving</p>
<ul><li>(00:00) - PreShow Banter™ — Highest Rated Chalk</li>
<li>(04:13) - BHIS - Talkin' Bout [infosec] News 2025-01-20</li>
<li>(08:53) - Story # 1: Data From 15,000 Fortinet Firewalls Leaked by Hackers</li>
<li>(14:24) - Story # 2: China's Salt Typhoon spies spotted on US govt networks before telcos, CISA boss says</li>
<li>(16:28) - Story # 3: TikTok reportedly plans ‘immediate’ Sunday shutdown in the US if it’s banned</li>
<li>(25:47) - Story # 4: FBI forces Chinese malware to delete itself from thousands of US computers</li>
<li>(35:05) - WWHF Denver</li>
<li>(36:03) - BSides San Diego</li>
<li>(37:22) - Security Stadium</li>
<li>(38:21) - Story # 5: Exchange 2016 and 2019 reach end-of-life status later this year</li>
<li>(42:45) - Story # 6: Snyk security researcher deploys malicious NPM packages targeting Cursor.com</li>
<li>(46:16) - Story # 7: New UEFI Secure Boot flaw exposes systems to bootkits, patch now</li>
<li>(57:33) - Story # 8: Lawsuit: Allstate used GasBuddy and other apps to quietly track driving behavior</li>
</ul>]]>
      </content:encoded>
      <pubDate>Wed, 22 Jan 2025 12:00:00 -0500</pubDate>
      <author>Black Hills Information Security</author>
      <enclosure url="https://media.transistor.fm/3455aa4a/ed79e1c7.mp3" length="64617865" type="audio/mpeg"/>
      <itunes:author>Black Hills Information Security</itunes:author>
      <itunes:image href="https://img.transistorcdn.com/L23D71CeLF469UcC2zNOSuP_OYsbvlc14hZ-5gp9Dgw/rs:fill:0:0:1/w:1400/h:1400/q:60/mb:500000/aHR0cHM6Ly9pbWct/dXBsb2FkLXByb2R1/Y3Rpb24udHJhbnNp/c3Rvci5mbS9iYzBk/MzQ0MDUyZjY2NmJk/NGNiYTRlMmUyOWY1/YTQ0ZS5qcGc.jpg"/>
      <itunes:duration>3891</itunes:duration>
      <itunes:summary>00:00 - PreShow Banter™ — Highest Rated Chalk04:14 - BHIS - Talkin’ Bout [infosec] News 2025-01-2008:53 - Story # 1: Data From 15,000 Fortinet Firewalls Leaked by Hackers14:25 - Story # 2: China’s Salt Typhoon spies spotted on US govt networks before telcos, CISA boss says16:29 - Story # 3: TikTok reportedly plans ‘immediate’ Sunday shutdown in the US if it’s banned25:47 - Story # 4: FBI forces Chinese malware to delete itself from thousands of US computers35:06 - WWHF Denver36:03 - BSides San Diego37:23 - Security Stadium38:22 - Story # 5: Exchange 2016 and 2019 reach end-of-life status later this year42:45 - Story # 6: Snyk security researcher deploys malicious NPM packages targeting Cursor.com46:17 - Story # 7: New UEFI Secure Boot flaw exposes systems to bootkits, patch now57:34 - Story # 8: Lawsuit: Allstate used GasBuddy and other apps to quietly track driving</itunes:summary>
      <itunes:subtitle>00:00 - PreShow Banter™ — Highest Rated Chalk04:14 - BHIS - Talkin’ Bout [infosec] News 2025-01-2008:53 - Story # 1: Data From 15,000 Fortinet Firewalls Leaked by Hackers14:25 - Story # 2: China’s Salt Typhoon spies spotted on US govt networks before telc</itunes:subtitle>
      <itunes:keywords>Infosec,Cybersecurity,news</itunes:keywords>
      <itunes:explicit>No</itunes:explicit>
      <podcast:chapters url="https://share.transistor.fm/s/3455aa4a/chapters.json" type="application/json+chapters"/>
    </item>
    <item>
      <title>2025-01-13 — An RGB State of Mind</title>
      <itunes:episode>1</itunes:episode>
      <podcast:episode>1</podcast:episode>
      <itunes:title>2025-01-13 — An RGB State of Mind</itunes:title>
      <itunes:episodeType>full</itunes:episodeType>
      <guid isPermaLink="false">https://blubrry.com/bhis/141000212/2025-01-13-an-rgb-state-of-mind/</guid>
      <link>https://share.transistor.fm/s/06654f85</link>
      <description>
        <![CDATA[<p>00:00:00 - PreShow Banter™ — An RGB State of Mind</p><p>00:07:20 - BHIS - Talkin’ Bout [infosec] News 2025-01-13</p><p>00:10:24 - Story # 1: A Day in the Life of a Prolific Voice Phishing Crew</p><p>00:18:39 - Story # 2: Dental group lied through teeth about data breach, fined $350,000</p><p>00:25:49 - Story # 3: Hacker claims breach of US location tracking company Gravy Analytics</p><p>00:27:48 - Story # 4: License Plate Readers Are Leaking Real-Time Video Feeds and Vehicle Data</p><p>00:33:19 - Story # 5: US Cyber Trust Mark launches as the Energy Star of smart home security</p><p>00:43:08 - Story # 6: Hackers are exploiting a new Ivanti VPN security bug to hack into company networks</p><p>00:45:09 - Story # 7: Hacker Broke into ‘Path of Exile 2’ Admin Account, Hijacked Wave of Characters</p><p>00:47:36 - Story # 8: Information Stealer Masquerades as LDAPNightmare (CVE-2024-49113) PoC Exploit</p><p>00:54:47 - Story # 9: Ransomware crew abuses AWS native encryption</p><p>01:00:41 - Story # 10: Cannabis company Stiiizy says hackers accessed customers’ ID documents</p>
<ul><li>(00:00) - PreShow Banter™ — An RGB State of Mind</li>
<li>(07:19) - BHIS - Talkin' Bout [infosec] News 2025-01-13</li>
<li>(10:24) - Story # 1: A Day in the Life of a Prolific Voice Phishing Crew</li>
<li>(18:38) - Story # 2: Dental group lied through teeth about data breach, fined $350,000</li>
<li>(25:48) - Story # 3: Hacker claims breach of US location tracking company Gravy Analytics</li>
<li>(27:47) - Story # 4: License Plate Readers Are Leaking Real-Time Video Feeds and Vehicle Data</li>
<li>(33:18) - Story # 5: US Cyber Trust Mark launches as the Energy Star of smart home security</li>
<li>(43:08) - Story # 6: Hackers are exploiting a new Ivanti VPN security bug to hack into company networks</li>
<li>(45:09) - Story # 7: Hacker Broke into ‘Path of Exile 2’ Admin Account, Hijacked Wave of Characters</li>
<li>(47:35) - Story # 8: Information Stealer Masquerades as LDAPNightmare (CVE-2024-49113) PoC Exploit</li>
<li>(54:47) - Story # 9: Ransomware crew abuses AWS native encryption</li>
<li>(01:00:40) - Story # 10: Cannabis company Stiiizy says hackers accessed customers’ ID documents</li>
</ul>]]>
      </description>
      <content:encoded>
        <![CDATA[<p>00:00:00 - PreShow Banter™ — An RGB State of Mind</p><p>00:07:20 - BHIS - Talkin’ Bout [infosec] News 2025-01-13</p><p>00:10:24 - Story # 1: A Day in the Life of a Prolific Voice Phishing Crew</p><p>00:18:39 - Story # 2: Dental group lied through teeth about data breach, fined $350,000</p><p>00:25:49 - Story # 3: Hacker claims breach of US location tracking company Gravy Analytics</p><p>00:27:48 - Story # 4: License Plate Readers Are Leaking Real-Time Video Feeds and Vehicle Data</p><p>00:33:19 - Story # 5: US Cyber Trust Mark launches as the Energy Star of smart home security</p><p>00:43:08 - Story # 6: Hackers are exploiting a new Ivanti VPN security bug to hack into company networks</p><p>00:45:09 - Story # 7: Hacker Broke into ‘Path of Exile 2’ Admin Account, Hijacked Wave of Characters</p><p>00:47:36 - Story # 8: Information Stealer Masquerades as LDAPNightmare (CVE-2024-49113) PoC Exploit</p><p>00:54:47 - Story # 9: Ransomware crew abuses AWS native encryption</p><p>01:00:41 - Story # 10: Cannabis company Stiiizy says hackers accessed customers’ ID documents</p>
<ul><li>(00:00) - PreShow Banter™ — An RGB State of Mind</li>
<li>(07:19) - BHIS - Talkin' Bout [infosec] News 2025-01-13</li>
<li>(10:24) - Story # 1: A Day in the Life of a Prolific Voice Phishing Crew</li>
<li>(18:38) - Story # 2: Dental group lied through teeth about data breach, fined $350,000</li>
<li>(25:48) - Story # 3: Hacker claims breach of US location tracking company Gravy Analytics</li>
<li>(27:47) - Story # 4: License Plate Readers Are Leaking Real-Time Video Feeds and Vehicle Data</li>
<li>(33:18) - Story # 5: US Cyber Trust Mark launches as the Energy Star of smart home security</li>
<li>(43:08) - Story # 6: Hackers are exploiting a new Ivanti VPN security bug to hack into company networks</li>
<li>(45:09) - Story # 7: Hacker Broke into ‘Path of Exile 2’ Admin Account, Hijacked Wave of Characters</li>
<li>(47:35) - Story # 8: Information Stealer Masquerades as LDAPNightmare (CVE-2024-49113) PoC Exploit</li>
<li>(54:47) - Story # 9: Ransomware crew abuses AWS native encryption</li>
<li>(01:00:40) - Story # 10: Cannabis company Stiiizy says hackers accessed customers’ ID documents</li>
</ul>]]>
      </content:encoded>
      <pubDate>Wed, 15 Jan 2025 00:00:00 -0500</pubDate>
      <author>Black Hills Information Security</author>
      <enclosure url="https://media.transistor.fm/06654f85/a1bbd1cc.mp3" length="67000151" type="audio/mpeg"/>
      <itunes:author>Black Hills Information Security</itunes:author>
      <itunes:image href="https://img.transistorcdn.com/QDf6wpsa7568nqGpEM9G-_q6T3UpOIowyyzuLlyfhMM/rs:fill:0:0:1/w:1400/h:1400/q:60/mb:500000/aHR0cHM6Ly9pbWct/dXBsb2FkLXByb2R1/Y3Rpb24udHJhbnNp/c3Rvci5mbS9jYWM0/MDU5Nzk5NWFiOTZk/OTRiOTAyZjJjMzFk/NmZiMS5qcGc.jpg"/>
      <itunes:duration>4074</itunes:duration>
      <itunes:summary>00:00:00 - PreShow Banter™ — An RGB State of Mind00:07:20 - BHIS - Talkin’ Bout [infosec] News 2025-01-1300:10:24 - Story # 1: A Day in the Life of a Prolific Voice Phishing Crew00:18:39 - Story # 2: Dental group lied through teeth about data breach, fined $350,00000:25:49 - Story # 3: Hacker claims breach of US location tracking company Gravy Analytics00:27:48 - Story # 4: License Plate Readers Are Leaking Real-Time Video Feeds and Vehicle Data00:33:19 - Story # 5: US Cyber Trust Mark launches as the Energy Star of smart home security00:43:08 - Story # 6: Hackers are exploiting a new Ivanti VPN security bug to hack into company networks00:45:09 - Story # 7: Hacker Broke into ‘Path of Exile 2’ Admin Account, Hijacked Wave of Characters00:47:36 - Story # 8: Information Stealer Masquerades as LDAPNightmare (CVE-2024-49113) PoC Exploit00:54:47 - Story # 9: Ransomware crew abuses AWS native encryption01:00:41 - Story # 10: Cannabis company Stiiizy says hackers accessed customers’ ID documents</itunes:summary>
      <itunes:subtitle>00:00:00 - PreShow Banter™ — An RGB State of Mind00:07:20 - BHIS - Talkin’ Bout [infosec] News 2025-01-1300:10:24 - Story # 1: A Day in the Life of a Prolific Voice Phishing Crew00:18:39 - Story # 2: Dental group lied through teeth about data breach, fine</itunes:subtitle>
      <itunes:keywords>Infosec,Cybersecurity,news</itunes:keywords>
      <itunes:explicit>No</itunes:explicit>
      <podcast:chapters url="https://share.transistor.fm/s/06654f85/chapters.json" type="application/json+chapters"/>
    </item>
    <item>
      <title>2025-01-06 - Coffee With Wade</title>
      <itunes:episode>1</itunes:episode>
      <podcast:episode>1</podcast:episode>
      <itunes:title>2025-01-06 - Coffee With Wade</itunes:title>
      <itunes:episodeType>full</itunes:episodeType>
      <guid isPermaLink="false">https://blubrry.com/bhis/140787162/2025-01-06-coffee-with-wade/</guid>
      <link>https://share.transistor.fm/s/8fbf5a42</link>
      <description>
        <![CDATA[<p>00:00:00 - PreShow Banter™ — Coffee With Wade Wells</p><p>00:05:41 - BHIS - Talkin’ Bout [infosec] News 2025-01-06</p><p>00:06:45 - Story # 1: BeyondTrust says hackers breached Remote Support SaaS instances</p><p>00:13:18 - Things Continued to be ignored in 2025</p><p>00:24:39 - Story # 2: Classified fighter jet specs leaked on War Thunder – again</p><p>00:28:26 - Story # 3: New Proposed HIPAA Security Rule Changes</p><p>00:34:33 - Story # 4: The Breachies 2024: The Worst, Weirdest, Most Impactful Data Breaches of the Year</p><p>00:35:47 - Story # 5: AT&amp;T and Verizon say networks secure after Salt Typhoon breach</p><p>00:37:20 - Story # 6: Net Neutrality Rules Struck Down by Appeals Court</p><p>00:41:56 - Story # 7: U.S. Army Soldier Arrested in AT&amp;T, Verizon Extortions</p><p>00:45:28 - Story # 8: New U.S. DoJ Rule Halts Bulk Data Transfers to Adversarial Nations to Protect Privacy</p><p>00:48:38 - Story # 9: Meta’s AI Profiles Are Indistinguishable From Terrible Spam That Took Over Facebook</p><p>00:50:42 - Story # 9b: Meta deletes AI character profiles after backlash, racism accusations</p><p>00:51:40 - Story # 10: Watch: Tiny robot ‘kidnaps’ 12 big Chinese bots from a Shanghai showroom, shocks world</p><p>00:55:27 - Story # 11: China Arrests 4 Who Weaponized ChatGPT for Ransomware Attacks</p><p>00:58:42 - Story # 12: Man Accused of SQL Injection Hacking Gets 69-Month Prison Sentence</p><p>01:01:22 - Story # 13: Germany cuts hacker access to 30,000 devices infected with BadBox malware</p>
<ul><li>(00:00) - PreShow Banter™ — Coffee With Wade Wells</li>
<li>(05:40) - BHIS - Talkin' Bout [infosec] News 2025-01-06</li>
<li>(06:44) - Story # 1: BeyondTrust says hackers breached Remote Support SaaS instances</li>
<li>(13:17) - Things Continued to be ignored in 2025</li>
<li>(24:38) - Story # 2: Classified fighter jet specs leaked on War Thunder – again</li>
<li>(28:25) - Story # 3: New Proposed HIPAA Security Rule Changes</li>
<li>(34:32) - Story # 4: The Breachies 2024: The Worst, Weirdest, Most Impactful Data Breaches of the Year</li>
<li>(35:46) - Story # 5: AT&amp;T and Verizon say networks secure after Salt Typhoon breach</li>
<li>(37:19) - Story # 6: Net Neutrality Rules Struck Down by Appeals Court</li>
<li>(41:55) - Story # 7: U.S. Army Soldier Arrested in AT&amp;T, Verizon Extortions</li>
<li>(45:28) - Story # 8: New U.S. DoJ Rule Halts Bulk Data Transfers to Adversarial Nations to Protect Privacy</li>
<li>(48:38) - Story # 9: Meta's AI Profiles Are Indistinguishable From Terrible Spam That Took Over Facebook</li>
<li>(50:41) - Story # 9b: Meta deletes AI character profiles after backlash, racism accusations</li>
<li>(51:40) - Story # 10: Watch: Tiny robot ‘kidnaps’ 12 big Chinese bots from a Shanghai showroom, shocks world</li>
<li>(55:27) - Story # 11: China Arrests 4 Who Weaponized ChatGPT for Ransomware Attacks</li>
<li>(58:42) - Story # 12: Man Accused of SQL Injection Hacking Gets 69-Month Prison Sentence</li>
</ul>]]>
      </description>
      <content:encoded>
        <![CDATA[<p>00:00:00 - PreShow Banter™ — Coffee With Wade Wells</p><p>00:05:41 - BHIS - Talkin’ Bout [infosec] News 2025-01-06</p><p>00:06:45 - Story # 1: BeyondTrust says hackers breached Remote Support SaaS instances</p><p>00:13:18 - Things Continued to be ignored in 2025</p><p>00:24:39 - Story # 2: Classified fighter jet specs leaked on War Thunder – again</p><p>00:28:26 - Story # 3: New Proposed HIPAA Security Rule Changes</p><p>00:34:33 - Story # 4: The Breachies 2024: The Worst, Weirdest, Most Impactful Data Breaches of the Year</p><p>00:35:47 - Story # 5: AT&amp;T and Verizon say networks secure after Salt Typhoon breach</p><p>00:37:20 - Story # 6: Net Neutrality Rules Struck Down by Appeals Court</p><p>00:41:56 - Story # 7: U.S. Army Soldier Arrested in AT&amp;T, Verizon Extortions</p><p>00:45:28 - Story # 8: New U.S. DoJ Rule Halts Bulk Data Transfers to Adversarial Nations to Protect Privacy</p><p>00:48:38 - Story # 9: Meta’s AI Profiles Are Indistinguishable From Terrible Spam That Took Over Facebook</p><p>00:50:42 - Story # 9b: Meta deletes AI character profiles after backlash, racism accusations</p><p>00:51:40 - Story # 10: Watch: Tiny robot ‘kidnaps’ 12 big Chinese bots from a Shanghai showroom, shocks world</p><p>00:55:27 - Story # 11: China Arrests 4 Who Weaponized ChatGPT for Ransomware Attacks</p><p>00:58:42 - Story # 12: Man Accused of SQL Injection Hacking Gets 69-Month Prison Sentence</p><p>01:01:22 - Story # 13: Germany cuts hacker access to 30,000 devices infected with BadBox malware</p>
<ul><li>(00:00) - PreShow Banter™ — Coffee With Wade Wells</li>
<li>(05:40) - BHIS - Talkin' Bout [infosec] News 2025-01-06</li>
<li>(06:44) - Story # 1: BeyondTrust says hackers breached Remote Support SaaS instances</li>
<li>(13:17) - Things Continued to be ignored in 2025</li>
<li>(24:38) - Story # 2: Classified fighter jet specs leaked on War Thunder – again</li>
<li>(28:25) - Story # 3: New Proposed HIPAA Security Rule Changes</li>
<li>(34:32) - Story # 4: The Breachies 2024: The Worst, Weirdest, Most Impactful Data Breaches of the Year</li>
<li>(35:46) - Story # 5: AT&amp;T and Verizon say networks secure after Salt Typhoon breach</li>
<li>(37:19) - Story # 6: Net Neutrality Rules Struck Down by Appeals Court</li>
<li>(41:55) - Story # 7: U.S. Army Soldier Arrested in AT&amp;T, Verizon Extortions</li>
<li>(45:28) - Story # 8: New U.S. DoJ Rule Halts Bulk Data Transfers to Adversarial Nations to Protect Privacy</li>
<li>(48:38) - Story # 9: Meta's AI Profiles Are Indistinguishable From Terrible Spam That Took Over Facebook</li>
<li>(50:41) - Story # 9b: Meta deletes AI character profiles after backlash, racism accusations</li>
<li>(51:40) - Story # 10: Watch: Tiny robot ‘kidnaps’ 12 big Chinese bots from a Shanghai showroom, shocks world</li>
<li>(55:27) - Story # 11: China Arrests 4 Who Weaponized ChatGPT for Ransomware Attacks</li>
<li>(58:42) - Story # 12: Man Accused of SQL Injection Hacking Gets 69-Month Prison Sentence</li>
</ul>]]>
      </content:encoded>
      <pubDate>Thu, 09 Jan 2025 12:00:00 -0500</pubDate>
      <author>Black Hills Information Security</author>
      <enclosure url="https://media.transistor.fm/8fbf5a42/7246d91f.mp3" length="64490154" type="audio/mpeg"/>
      <itunes:author>Black Hills Information Security</itunes:author>
      <itunes:image href="https://img.transistorcdn.com/m_4yl-5JzBHZroxT7kb45IdA1LWU63AxO-4Oc4hHfr8/rs:fill:0:0:1/w:1400/h:1400/q:60/mb:500000/aHR0cHM6Ly9pbWct/dXBsb2FkLXByb2R1/Y3Rpb24udHJhbnNp/c3Rvci5mbS82NGI2/ZGZmYWJmMzk5MmE0/MWNlNjY1NTg5MjQ3/NDI1OC5qcGc.jpg"/>
      <itunes:duration>3878</itunes:duration>
      <itunes:summary>00:00:00 - PreShow Banter™ — Coffee With Wade Wells00:05:41 - BHIS - Talkin’ Bout [infosec] News 2025-01-0600:06:45 - Story # 1: BeyondTrust says hackers breached Remote Support SaaS instances00:13:18 - Things Continued to be ignored in 202500:24:39 - Story # 2: Classified fighter jet specs leaked on War Thunder – again00:28:26 - Story # 3: New Proposed HIPAA Security Rule Changes00:34:33 - Story # 4: The Breachies 2024: The Worst, Weirdest, Most Impactful Data Breaches of the Year00:35:47 - Story # 5: AT&amp;amp;T and Verizon say networks secure after Salt Typhoon breach00:37:20 - Story # 6: Net Neutrality Rules Struck Down by Appeals Court00:41:56 - Story # 7: U.S. Army Soldier Arrested in AT&amp;amp;T, Verizon Extortions00:45:28 - Story # 8: New U.S. DoJ Rule Halts Bulk Data Transfers to Adversarial Nations to Protect Privacy00:48:38 - Story # 9: Meta’s AI Profiles Are Indistinguishable From Terrible Spam That Took Over Facebook00:50:42 - Story # 9b: Meta deletes AI character profiles after backlash, racism accusations00:51:40 - Story # 10: Watch: Tiny robot ‘kidnaps’ 12 big Chinese bots from a Shanghai showroom, shocks world00:55:27 - Story # 11: China Arrests 4 Who Weaponized ChatGPT for Ransomware Attacks00:58:42 - Story # 12: Man Accused of SQL Injection Hacking Gets 69-Month Prison Sentence01:01:22 - Story # 13: Germany cuts hacker access to 30,000 devices infected with BadBox malware</itunes:summary>
      <itunes:subtitle>00:00:00 - PreShow Banter™ — Coffee With Wade Wells00:05:41 - BHIS - Talkin’ Bout [infosec] News 2025-01-0600:06:45 - Story # 1: BeyondTrust says hackers breached Remote Support SaaS instances00:13:18 - Things Continued to be ignored in 202500:24:39 - Sto</itunes:subtitle>
      <itunes:keywords>Infosec,Cybersecurity,news</itunes:keywords>
      <itunes:explicit>No</itunes:explicit>
      <podcast:chapters url="https://share.transistor.fm/s/8fbf5a42/chapters.json" type="application/json+chapters"/>
    </item>
    <item>
      <title>2024-12-16 - ChickenSec News Part 3</title>
      <itunes:episode>1</itunes:episode>
      <podcast:episode>1</podcast:episode>
      <itunes:title>2024-12-16 - ChickenSec News Part 3</itunes:title>
      <itunes:episodeType>full</itunes:episodeType>
      <guid isPermaLink="false">https://blubrry.com/bhis/139913743/2024-12-16-chickensec-news-part-3/</guid>
      <link>https://share.transistor.fm/s/33bd1cbd</link>
      <description>
        <![CDATA[<p>00:00 - PreShow Banter™ — ChickenSec News Part 3</p><p>12:23 - BHIS - Talkin’ Bout [infosec] News 2024-12-16</p><p>14:48 - Story # 1: $50 Million Radiant Capital Heist Blamed on North Korean Hackers</p><p>20:30 - Story # 2: Trump administration wants to go on cyber offensive against China</p><p>32:53 - Story # 3: Krispy Kreme cyberattack impacts online orders and operations</p><p>43:02 - Story # 4: Arctic Wolf and BlackBerry Announce Acquisition Agreement for Cylance</p><p>52:02 - Story # 5: Europol announces takedown of major DDoS-for-hire network</p><p>56:50 - Story # 6: Data breach at Senior Dating website spills info of 765,000 users</p><p>58:46 - Story # 7: US sanctions Chinese firm for hacking firewalls in ransomware attacks</p>
<ul><li>(00:00) - PreShow Banter™ — ChickenSec News Part 3</li>
<li>(12:22) - BHIS - Talkin' Bout [infosec] News 2024-12-16</li>
<li>(14:47) - Story # 1: $50 Million Radiant Capital Heist Blamed on North Korean Hackers</li>
<li>(20:29) - Story # 2: Trump administration wants to go on cyber offensive against China</li>
<li>(32:53) - Story # 3: Krispy Kreme cyberattack impacts online orders and operations</li>
<li>(43:01) - Story # 4: Arctic Wolf and BlackBerry Announce Acquisition Agreement for Cylance</li>
<li>(52:02) - Story # 5: Europol announces takedown of major DDoS-for-hire network</li>
<li>(56:50) - Story # 6: Data breach at Senior Dating website spills info of 765,000 users</li>
<li>(58:45) - Story # 7: US sanctions Chinese firm for hacking firewalls in ransomware attacks</li>
</ul>]]>
      </description>
      <content:encoded>
        <![CDATA[<p>00:00 - PreShow Banter™ — ChickenSec News Part 3</p><p>12:23 - BHIS - Talkin’ Bout [infosec] News 2024-12-16</p><p>14:48 - Story # 1: $50 Million Radiant Capital Heist Blamed on North Korean Hackers</p><p>20:30 - Story # 2: Trump administration wants to go on cyber offensive against China</p><p>32:53 - Story # 3: Krispy Kreme cyberattack impacts online orders and operations</p><p>43:02 - Story # 4: Arctic Wolf and BlackBerry Announce Acquisition Agreement for Cylance</p><p>52:02 - Story # 5: Europol announces takedown of major DDoS-for-hire network</p><p>56:50 - Story # 6: Data breach at Senior Dating website spills info of 765,000 users</p><p>58:46 - Story # 7: US sanctions Chinese firm for hacking firewalls in ransomware attacks</p>
<ul><li>(00:00) - PreShow Banter™ — ChickenSec News Part 3</li>
<li>(12:22) - BHIS - Talkin' Bout [infosec] News 2024-12-16</li>
<li>(14:47) - Story # 1: $50 Million Radiant Capital Heist Blamed on North Korean Hackers</li>
<li>(20:29) - Story # 2: Trump administration wants to go on cyber offensive against China</li>
<li>(32:53) - Story # 3: Krispy Kreme cyberattack impacts online orders and operations</li>
<li>(43:01) - Story # 4: Arctic Wolf and BlackBerry Announce Acquisition Agreement for Cylance</li>
<li>(52:02) - Story # 5: Europol announces takedown of major DDoS-for-hire network</li>
<li>(56:50) - Story # 6: Data breach at Senior Dating website spills info of 765,000 users</li>
<li>(58:45) - Story # 7: US sanctions Chinese firm for hacking firewalls in ransomware attacks</li>
</ul>]]>
      </content:encoded>
      <pubDate>Wed, 18 Dec 2024 12:00:00 -0500</pubDate>
      <author>Black Hills Information Security</author>
      <enclosure url="https://media.transistor.fm/33bd1cbd/c714494f.mp3" length="69314157" type="audio/mpeg"/>
      <itunes:author>Black Hills Information Security</itunes:author>
      <itunes:image href="https://img.transistorcdn.com/h2gABtwlt2pXvcalVyyQL-JOEFNYk-s7TaYQw3U-OsM/rs:fill:0:0:1/w:1400/h:1400/q:60/mb:500000/aHR0cHM6Ly9pbWct/dXBsb2FkLXByb2R1/Y3Rpb24udHJhbnNp/c3Rvci5mbS9mODZj/NmI1YTU2MzdiZWIy/ZDhjYzE3NDg0NDA0/MTNiZC5qcGc.jpg"/>
      <itunes:duration>4235</itunes:duration>
      <itunes:summary>00:00 - PreShow Banter™ — ChickenSec News Part 312:23 - BHIS - Talkin’ Bout [infosec] News 2024-12-1614:48 - Story # 1: $50 Million Radiant Capital Heist Blamed on North Korean Hackers20:30 - Story # 2: Trump administration wants to go on cyber offensive against China32:53 - Story # 3: Krispy Kreme cyberattack impacts online orders and operations43:02 - Story # 4: Arctic Wolf and BlackBerry Announce Acquisition Agreement for Cylance52:02 - Story # 5: Europol announces takedown of major DDoS-for-hire network56:50 - Story # 6: Data breach at Senior Dating website spills info of 765,000 users58:46 - Story # 7: US sanctions Chinese firm for hacking firewalls in ransomware attacks</itunes:summary>
      <itunes:subtitle>00:00 - PreShow Banter™ — ChickenSec News Part 312:23 - BHIS - Talkin’ Bout [infosec] News 2024-12-1614:48 - Story # 1: $50 Million Radiant Capital Heist Blamed on North Korean Hackers20:30 - Story # 2: Trump administration wants to go on cyber offensive </itunes:subtitle>
      <itunes:keywords>Infosec,Cybersecurity,news</itunes:keywords>
      <itunes:explicit>No</itunes:explicit>
      <podcast:chapters url="https://share.transistor.fm/s/33bd1cbd/chapters.json" type="application/json+chapters"/>
    </item>
    <item>
      <title>2024-12-09 - A Better Mike</title>
      <itunes:episode>1</itunes:episode>
      <podcast:episode>1</podcast:episode>
      <itunes:title>2024-12-09 - A Better Mike</itunes:title>
      <itunes:episodeType>full</itunes:episodeType>
      <guid isPermaLink="false">https://blubrry.com/bhis/139556135/2024-12-09-a-better-mike/</guid>
      <link>https://share.transistor.fm/s/2adbcd9f</link>
      <description>
        <![CDATA[<p>00:00 - PreShow Banter™ — A Better Mike</p><p>04:46 - BHIS - Talkin’ Bout [infosec] News 2024-12-09</p><p>05:43 - Story # 1: FBI Warns iPhone And Android Users—Stop Sending Texts</p><p>23:36 - Story # 2: US agency proposes new rule blocking data brokers from selling Americans’ sensitive personal data</p><p>42:55 - Story # 3: Vodka maker Stoli files for bankruptcy in US after ransomware attack</p><p>46:48 - Story # 4: British hospitals hit by cyberattacks still battling to get systems back online</p>
<ul><li>(00:00) - PreShow Banter™ — A Better Mike</li>
<li>(04:46) - BHIS - Talkin' Bout [infosec] News 2024-12-09</li>
<li>(05:43) - Story # 1: FBI Warns iPhone And Android Users—Stop Sending Texts</li>
<li>(23:36) - Story # 2: US agency proposes new rule blocking data brokers from selling Americans’ sensitive personal data</li>
<li>(42:55) - Story # 3: Vodka maker Stoli files for bankruptcy in US after ransomware attack</li>
<li>(46:48) - Story # 4: British hospitals hit by cyberattacks still battling to get systems back online</li>
</ul>]]>
      </description>
      <content:encoded>
        <![CDATA[<p>00:00 - PreShow Banter™ — A Better Mike</p><p>04:46 - BHIS - Talkin’ Bout [infosec] News 2024-12-09</p><p>05:43 - Story # 1: FBI Warns iPhone And Android Users—Stop Sending Texts</p><p>23:36 - Story # 2: US agency proposes new rule blocking data brokers from selling Americans’ sensitive personal data</p><p>42:55 - Story # 3: Vodka maker Stoli files for bankruptcy in US after ransomware attack</p><p>46:48 - Story # 4: British hospitals hit by cyberattacks still battling to get systems back online</p>
<ul><li>(00:00) - PreShow Banter™ — A Better Mike</li>
<li>(04:46) - BHIS - Talkin' Bout [infosec] News 2024-12-09</li>
<li>(05:43) - Story # 1: FBI Warns iPhone And Android Users—Stop Sending Texts</li>
<li>(23:36) - Story # 2: US agency proposes new rule blocking data brokers from selling Americans’ sensitive personal data</li>
<li>(42:55) - Story # 3: Vodka maker Stoli files for bankruptcy in US after ransomware attack</li>
<li>(46:48) - Story # 4: British hospitals hit by cyberattacks still battling to get systems back online</li>
</ul>]]>
      </content:encoded>
      <pubDate>Wed, 11 Dec 2024 12:00:00 -0500</pubDate>
      <author>Black Hills Information Security</author>
      <enclosure url="https://media.transistor.fm/2adbcd9f/ab06888a.mp3" length="63301673" type="audio/mpeg"/>
      <itunes:author>Black Hills Information Security</itunes:author>
      <itunes:image href="https://img.transistorcdn.com/nHfDVa94skgK2mwsWoYSj5dDW1pw906VsjDQ8735dds/rs:fill:0:0:1/w:1400/h:1400/q:60/mb:500000/aHR0cHM6Ly9pbWct/dXBsb2FkLXByb2R1/Y3Rpb24udHJhbnNp/c3Rvci5mbS84ODlm/ZmI4YzNkMWRmOGRk/MjliYzYyNWIyMjA3/ZjMxYS5qcGc.jpg"/>
      <itunes:duration>3885</itunes:duration>
      <itunes:summary>00:00 - PreShow Banter™ — A Better Mike04:46 - BHIS - Talkin’ Bout [infosec] News 2024-12-0905:43 - Story # 1: FBI Warns iPhone And Android Users—Stop Sending Texts23:36 - Story # 2: US agency proposes new rule blocking data brokers from selling Americans’ sensitive personal data42:55 - Story # 3: Vodka maker Stoli files for bankruptcy in US after ransomware attack46:48 - Story # 4: British hospitals hit by cyberattacks still battling to get systems back online</itunes:summary>
      <itunes:subtitle>00:00 - PreShow Banter™ — A Better Mike04:46 - BHIS - Talkin’ Bout [infosec] News 2024-12-0905:43 - Story # 1: FBI Warns iPhone And Android Users—Stop Sending Texts23:36 - Story # 2: US agency proposes new rule blocking data brokers from selling Americans</itunes:subtitle>
      <itunes:keywords>Infosec,Cybersecurity,news</itunes:keywords>
      <itunes:explicit>No</itunes:explicit>
      <podcast:chapters url="https://share.transistor.fm/s/2adbcd9f/chapters.json" type="application/json+chapters"/>
    </item>
    <item>
      <title>2024-12-02 - C Squad</title>
      <itunes:episode>1</itunes:episode>
      <podcast:episode>1</podcast:episode>
      <itunes:title>2024-12-02 - C Squad</itunes:title>
      <itunes:episodeType>full</itunes:episodeType>
      <guid isPermaLink="false">https://blubrry.com/bhis/139252805/2024-12-02-c-squad/</guid>
      <link>https://share.transistor.fm/s/15319986</link>
      <description>
        <![CDATA[<p>00:00:00 - PreShow Banter™ — C Squad</p><p>00:11:03 - BHIS - Talkin’ Bout [infosec] News 2024-12-02</p><p>00:15:43 - Story # 1: Gaming Engines: An Undetected Playground for Malware Loaders - Check Point Research</p><p>00:30:41 - Story # 2: FTC finds that smart-device makers fail to make clear how long their products will be supported</p><p>00:44:47 - Story # 3: US senators propose law to require bare minimum security standards</p><p>00:46:35 - Story # 4: Starbucks baristas can’t view their schedules after ransomware attack on vendor</p><p>01:04:26 - Story # 5: Volunteer DEF CON hackers dive into America’s leaky water infrastructure</p><p>01:08:45 - Shameless Plugs</p>
<ul><li>(00:00) - PreShow Banter™ — C Squad</li>
<li>(11:02) - BHIS - Talkin' Bout [infosec] News 2024-12-02</li>
<li>(15:42) - Story # 1: Gaming Engines: An Undetected Playground for Malware Loaders - Check Point Research</li>
<li>(30:40) - Story # 2: FTC finds that smart-device makers fail to make clear how long their products will be supported</li>
<li>(44:46) - Story # 3: US senators propose law to require bare minimum security standards</li>
<li>(46:35) - Story # 4: Starbucks baristas can’t view their schedules after ransomware attack on vendor</li>
<li>(01:04:26) - Story # 5: Volunteer DEF CON hackers dive into America's leaky water infrastructure</li>
<li>(01:08:44) - Shameless Plugs - 40% off all items in the store -- cYb3rM0nD@Y40OFF  This discount is good until Tuesday, Dec 2nd at 8pm ET.  https://spearphish-general-store.myshopify.com/</li>
</ul>]]>
      </description>
      <content:encoded>
        <![CDATA[<p>00:00:00 - PreShow Banter™ — C Squad</p><p>00:11:03 - BHIS - Talkin’ Bout [infosec] News 2024-12-02</p><p>00:15:43 - Story # 1: Gaming Engines: An Undetected Playground for Malware Loaders - Check Point Research</p><p>00:30:41 - Story # 2: FTC finds that smart-device makers fail to make clear how long their products will be supported</p><p>00:44:47 - Story # 3: US senators propose law to require bare minimum security standards</p><p>00:46:35 - Story # 4: Starbucks baristas can’t view their schedules after ransomware attack on vendor</p><p>01:04:26 - Story # 5: Volunteer DEF CON hackers dive into America’s leaky water infrastructure</p><p>01:08:45 - Shameless Plugs</p>
<ul><li>(00:00) - PreShow Banter™ — C Squad</li>
<li>(11:02) - BHIS - Talkin' Bout [infosec] News 2024-12-02</li>
<li>(15:42) - Story # 1: Gaming Engines: An Undetected Playground for Malware Loaders - Check Point Research</li>
<li>(30:40) - Story # 2: FTC finds that smart-device makers fail to make clear how long their products will be supported</li>
<li>(44:46) - Story # 3: US senators propose law to require bare minimum security standards</li>
<li>(46:35) - Story # 4: Starbucks baristas can’t view their schedules after ransomware attack on vendor</li>
<li>(01:04:26) - Story # 5: Volunteer DEF CON hackers dive into America's leaky water infrastructure</li>
<li>(01:08:44) - Shameless Plugs - 40% off all items in the store -- cYb3rM0nD@Y40OFF  This discount is good until Tuesday, Dec 2nd at 8pm ET.  https://spearphish-general-store.myshopify.com/</li>
</ul>]]>
      </content:encoded>
      <pubDate>Wed, 04 Dec 2024 12:00:00 -0500</pubDate>
      <author>Black Hills Information Security</author>
      <enclosure url="https://media.transistor.fm/15319986/0052fa0d.mp3" length="70864670" type="audio/mpeg"/>
      <itunes:author>Black Hills Information Security</itunes:author>
      <itunes:image href="https://img.transistorcdn.com/yovpWCbXuPDeHoeCCZAV9ZOq_LeciQfgjnv4jUnnQgk/rs:fill:0:0:1/w:1400/h:1400/q:60/mb:500000/aHR0cHM6Ly9pbWct/dXBsb2FkLXByb2R1/Y3Rpb24udHJhbnNp/c3Rvci5mbS85Mzcy/OTBlZGY4ZDdmYWQ5/NDBmNzFiNWYxNjcw/ODllZi5qcGc.jpg"/>
      <itunes:duration>4339</itunes:duration>
      <itunes:summary>00:00:00 - PreShow Banter™ — C Squad00:11:03 - BHIS - Talkin’ Bout [infosec] News 2024-12-0200:15:43 - Story # 1: Gaming Engines: An Undetected Playground for Malware Loaders - Check Point Research00:30:41 - Story # 2: FTC finds that smart-device makers fail to make clear how long their products will be supported00:44:47 - Story # 3: US senators propose law to require bare minimum security standards00:46:35 - Story # 4: Starbucks baristas can’t view their schedules after ransomware attack on vendor01:04:26 - Story # 5: Volunteer DEF CON hackers dive into America’s leaky water infrastructure01:08:45 - Shameless Plugs</itunes:summary>
      <itunes:subtitle>00:00:00 - PreShow Banter™ — C Squad00:11:03 - BHIS - Talkin’ Bout [infosec] News 2024-12-0200:15:43 - Story # 1: Gaming Engines: An Undetected Playground for Malware Loaders - Check Point Research00:30:41 - Story # 2: FTC finds that smart-device makers f</itunes:subtitle>
      <itunes:keywords>Infosec,Cybersecurity,news</itunes:keywords>
      <itunes:explicit>No</itunes:explicit>
      <podcast:chapters url="https://share.transistor.fm/s/15319986/chapters.json" type="application/json+chapters"/>
    </item>
    <item>
      <title>2024-11-25 - Discordgate</title>
      <itunes:episode>1</itunes:episode>
      <podcast:episode>1</podcast:episode>
      <itunes:title>2024-11-25 - Discordgate</itunes:title>
      <itunes:episodeType>full</itunes:episodeType>
      <guid isPermaLink="false">https://blubrry.com/bhis/139008131/2024-11-25-discordgate/</guid>
      <link>https://share.transistor.fm/s/8c97ac1a</link>
      <description>
        <![CDATA[<p>00:00:00 - PreShow Banter™ — Discordgate</p><p>00:09:24 - BHIS - Talkin’ Bout [infosec] News 2024-11-25</p><p>00:10:46 - Story # 1: DOJ says Google must sell Chrome to crack open its search monopoly</p><p>00:12:08 - Story # 1b: DOJ’s staggering proposal would hurt consumers and America’s global technological leadership</p><p>00:19:16 - Story # 2: The Nearest Neighbor Attack: How A Russian APT Weaponized Nearby Wi-Fi Networks for Covert Access</p><p>00:24:37 - Story # 3: Palo Alto Networks tackles firewall-busting zero-days with critical patches</p><p>00:25:46 - Discordgate Follow Up</p><p>00:26:26 - Story # 4: Enhancing Cyber Resilience: Insights from CISA Red Team Assessment of a US Critical Infrastructure Sector Organization</p><p>00:31:08 - Story # 5: Fintech giant Finastra investigates data breach after SFTP hack</p><p>00:34:01 - Story # 6: CFPB Finalizes Rule on Federal Oversight of Popular Digital Payment Apps to Protect Personal Data, Reduce Fraud, and Stop Illegal “Debanking”</p><p>00:38:49 - Story # 7: T-Mobile finally managed to thwart a data breach before it occured</p><p>00:40:22 - Story # 8: D-Link urges users to retire VPN routers impacted by unfixed RCE flaw</p><p>00:43:07 - Story # 9: US seizes PopeyeTools cybercrime marketplace, charges administrators</p><p>00:46:19 - Story # 10: Razzlekhan, crypto’s most embarrassing rapper, is going to prison</p><p>00:48:31 - Story # 10b: Netflix has a perfectly timed Razzlekhan doc coming out in December</p><p>00:50:10 - Story # 11: Microsoft Defender Is Not Enough Anymore—This Malware Gets Around It</p><p>00:55:11 - Story # 12: Microsoft president asks Trump to “push harder” against Russian hacks</p><p>00:57:02 - Story # 13: Hackers Breach Andrew Tate’s Online ‘University,’ Exposing 800,000 Users</p><p>01:00:36 - Story # 14: 7-Zip affected by dangerous vulnerability: users must update the app manually</p><p>01:01:31 - Story # 15: Microsoft disrupts ONNX phishing-as-a-service infrastructure</p><p>01:03:07 - Story # 16: US charges five linked to Scattered Spider cybercrime gang</p><p>01:04:25 - Plug: Secure Code Summit 2024</p>
<ul><li>(00:00) - PreShow Banter™ — Discordgate</li>
<li>(09:23) - BHIS - Talkin' Bout [infosec] News 2024-11-25</li>
<li>(10:45) - Story # 1: DOJ says Google must sell Chrome to crack open its search monopoly</li>
<li>(12:07) - Story # 1b: DOJ’s staggering proposal would hurt consumers and America’s global technological leadership</li>
<li>(19:15) - Story # 2: The Nearest Neighbor Attack: How A Russian APT Weaponized Nearby Wi-Fi Networks for Covert Access</li>
<li>(24:37) - Story # 3: Palo Alto Networks tackles firewall-busting zero-days with critical patches</li>
<li>(25:46) - Discordgate Follow Up</li>
<li>(26:25) - Story # 4: Enhancing Cyber Resilience: Insights from CISA Red Team Assessment of a US Critical Infrastructure Sector Organization</li>
<li>(31:07) - Story # 5: Fintech giant Finastra investigates data breach after SFTP hack</li>
<li>(34:01) - Story # 6: CFPB Finalizes Rule on Federal Oversight of Popular Digital Payment Apps to Protect Personal Data, Reduce Fraud, and Stop Illegal “Debanking”</li>
<li>(38:49) - Story # 7: T-Mobile finally managed to thwart a data breach before it occured</li>
<li>(40:21) - Story # 8: D-Link urges users to retire VPN routers impacted by unfixed RCE flaw</li>
<li>(43:06) - Story # 9: US seizes PopeyeTools cybercrime marketplace, charges administrators</li>
<li>(46:19) - Story # 10: Razzlekhan, crypto’s most embarrassing rapper, is going to prison</li>
<li>(48:31) - Story # 10b: Netflix has a perfectly timed Razzlekhan doc coming out in December</li>
<li>(50:10) - Story # 11: Microsoft Defender Is Not Enough Anymore—This Malware Gets Around It</li>
<li>(55:11) - Story # 12: Microsoft president asks Trump to “push harder” against Russian hacks</li>
<li>(57:02) - Story # 13: Hackers Breach Andrew Tate's Online 'University,' Exposing 800,000 Users</li>
<li>(01:00:36) - Story # 14: 7-Zip affected by dangerous vulnerability: users must update the app manually</li>
<li>(01:01:31) - Story # 15: Microsoft disrupts ONNX phishing-as-a-service infrastructure</li>
<li>(01:03:06) - Story # 16: US charges five linked to Scattered Spider cybercrime gang</li>
<li>(01:04:25) - Plug: Secure Code Summit 2024</li>
</ul>]]>
      </description>
      <content:encoded>
        <![CDATA[<p>00:00:00 - PreShow Banter™ — Discordgate</p><p>00:09:24 - BHIS - Talkin’ Bout [infosec] News 2024-11-25</p><p>00:10:46 - Story # 1: DOJ says Google must sell Chrome to crack open its search monopoly</p><p>00:12:08 - Story # 1b: DOJ’s staggering proposal would hurt consumers and America’s global technological leadership</p><p>00:19:16 - Story # 2: The Nearest Neighbor Attack: How A Russian APT Weaponized Nearby Wi-Fi Networks for Covert Access</p><p>00:24:37 - Story # 3: Palo Alto Networks tackles firewall-busting zero-days with critical patches</p><p>00:25:46 - Discordgate Follow Up</p><p>00:26:26 - Story # 4: Enhancing Cyber Resilience: Insights from CISA Red Team Assessment of a US Critical Infrastructure Sector Organization</p><p>00:31:08 - Story # 5: Fintech giant Finastra investigates data breach after SFTP hack</p><p>00:34:01 - Story # 6: CFPB Finalizes Rule on Federal Oversight of Popular Digital Payment Apps to Protect Personal Data, Reduce Fraud, and Stop Illegal “Debanking”</p><p>00:38:49 - Story # 7: T-Mobile finally managed to thwart a data breach before it occured</p><p>00:40:22 - Story # 8: D-Link urges users to retire VPN routers impacted by unfixed RCE flaw</p><p>00:43:07 - Story # 9: US seizes PopeyeTools cybercrime marketplace, charges administrators</p><p>00:46:19 - Story # 10: Razzlekhan, crypto’s most embarrassing rapper, is going to prison</p><p>00:48:31 - Story # 10b: Netflix has a perfectly timed Razzlekhan doc coming out in December</p><p>00:50:10 - Story # 11: Microsoft Defender Is Not Enough Anymore—This Malware Gets Around It</p><p>00:55:11 - Story # 12: Microsoft president asks Trump to “push harder” against Russian hacks</p><p>00:57:02 - Story # 13: Hackers Breach Andrew Tate’s Online ‘University,’ Exposing 800,000 Users</p><p>01:00:36 - Story # 14: 7-Zip affected by dangerous vulnerability: users must update the app manually</p><p>01:01:31 - Story # 15: Microsoft disrupts ONNX phishing-as-a-service infrastructure</p><p>01:03:07 - Story # 16: US charges five linked to Scattered Spider cybercrime gang</p><p>01:04:25 - Plug: Secure Code Summit 2024</p>
<ul><li>(00:00) - PreShow Banter™ — Discordgate</li>
<li>(09:23) - BHIS - Talkin' Bout [infosec] News 2024-11-25</li>
<li>(10:45) - Story # 1: DOJ says Google must sell Chrome to crack open its search monopoly</li>
<li>(12:07) - Story # 1b: DOJ’s staggering proposal would hurt consumers and America’s global technological leadership</li>
<li>(19:15) - Story # 2: The Nearest Neighbor Attack: How A Russian APT Weaponized Nearby Wi-Fi Networks for Covert Access</li>
<li>(24:37) - Story # 3: Palo Alto Networks tackles firewall-busting zero-days with critical patches</li>
<li>(25:46) - Discordgate Follow Up</li>
<li>(26:25) - Story # 4: Enhancing Cyber Resilience: Insights from CISA Red Team Assessment of a US Critical Infrastructure Sector Organization</li>
<li>(31:07) - Story # 5: Fintech giant Finastra investigates data breach after SFTP hack</li>
<li>(34:01) - Story # 6: CFPB Finalizes Rule on Federal Oversight of Popular Digital Payment Apps to Protect Personal Data, Reduce Fraud, and Stop Illegal “Debanking”</li>
<li>(38:49) - Story # 7: T-Mobile finally managed to thwart a data breach before it occured</li>
<li>(40:21) - Story # 8: D-Link urges users to retire VPN routers impacted by unfixed RCE flaw</li>
<li>(43:06) - Story # 9: US seizes PopeyeTools cybercrime marketplace, charges administrators</li>
<li>(46:19) - Story # 10: Razzlekhan, crypto’s most embarrassing rapper, is going to prison</li>
<li>(48:31) - Story # 10b: Netflix has a perfectly timed Razzlekhan doc coming out in December</li>
<li>(50:10) - Story # 11: Microsoft Defender Is Not Enough Anymore—This Malware Gets Around It</li>
<li>(55:11) - Story # 12: Microsoft president asks Trump to “push harder” against Russian hacks</li>
<li>(57:02) - Story # 13: Hackers Breach Andrew Tate's Online 'University,' Exposing 800,000 Users</li>
<li>(01:00:36) - Story # 14: 7-Zip affected by dangerous vulnerability: users must update the app manually</li>
<li>(01:01:31) - Story # 15: Microsoft disrupts ONNX phishing-as-a-service infrastructure</li>
<li>(01:03:06) - Story # 16: US charges five linked to Scattered Spider cybercrime gang</li>
<li>(01:04:25) - Plug: Secure Code Summit 2024</li>
</ul>]]>
      </content:encoded>
      <pubDate>Wed, 27 Nov 2024 12:26:15 -0500</pubDate>
      <author>Black Hills Information Security</author>
      <enclosure url="https://media.transistor.fm/8c97ac1a/1334a3ae.mp3" length="67177600" type="audio/mpeg"/>
      <itunes:author>Black Hills Information Security</itunes:author>
      <itunes:image href="https://img.transistorcdn.com/rXpsicO1aPsVW1yGhbgOApmyjFTF8rZqPG4soqK_l2U/rs:fill:0:0:1/w:1400/h:1400/q:60/mb:500000/aHR0cHM6Ly9pbWct/dXBsb2FkLXByb2R1/Y3Rpb24udHJhbnNp/c3Rvci5mbS84OWNh/NGIxMWFhZDJjYmEw/Mjk0Mzg5NGNmMDBi/YmY0ZC5qcGc.jpg"/>
      <itunes:duration>3983</itunes:duration>
      <itunes:summary>00:00:00 - PreShow Banter™ — Discordgate00:09:24 - BHIS - Talkin’ Bout [infosec] News 2024-11-2500:10:46 - Story # 1: DOJ says Google must sell Chrome to crack open its search monopoly00:12:08 - Story # 1b: DOJ’s staggering proposal would hurt consumers and America’s global technological leadership00:19:16 - Story # 2: The Nearest Neighbor Attack: How A Russian APT Weaponized Nearby Wi-Fi Networks for Covert Access00:24:37 - Story # 3: Palo Alto Networks tackles firewall-busting zero-days with critical patches00:25:46 - Discordgate Follow Up00:26:26 - Story # 4: Enhancing Cyber Resilience: Insights from CISA Red Team Assessment of a US Critical Infrastructure Sector Organization00:31:08 - Story # 5: Fintech giant Finastra investigates data breach after SFTP hack00:34:01 - Story # 6: CFPB Finalizes Rule on Federal Oversight of Popular Digital Payment Apps to Protect Personal Data, Reduce Fraud, and Stop Illegal “Debanking”00:38:49 - Story # 7: T-Mobile finally managed to thwart a data breach before it occured00:40:22 - Story # 8: D-Link urges users to retire VPN routers impacted by unfixed RCE flaw00:43:07 - Story # 9: US seizes PopeyeTools cybercrime marketplace, charges administrators00:46:19 - Story # 10: Razzlekhan, crypto’s most embarrassing rapper, is going to prison00:48:31 - Story # 10b: Netflix has a perfectly timed Razzlekhan doc coming out in December00:50:10 - Story # 11: Microsoft Defender Is Not Enough Anymore—This Malware Gets Around It00:55:11 - Story # 12: Microsoft president asks Trump to “push harder” against Russian hacks00:57:02 - Story # 13: Hackers Breach Andrew Tate’s Online ‘University,’ Exposing 800,000 Users01:00:36 - Story # 14: 7-Zip affected by dangerous vulnerability: users must update the app manually01:01:31 - Story # 15: Microsoft disrupts ONNX phishing-as-a-service infrastructure01:03:07 - Story # 16: US charges five linked to Scattered Spider cybercrime gang01:04:25 - Plug: Secure Code Summit 2024</itunes:summary>
      <itunes:subtitle>00:00:00 - PreShow Banter™ — Discordgate00:09:24 - BHIS - Talkin’ Bout [infosec] News 2024-11-2500:10:46 - Story # 1: DOJ says Google must sell Chrome to crack open its search monopoly00:12:08 - Story # 1b: DOJ’s staggering proposal would hurt consumers a</itunes:subtitle>
      <itunes:keywords>Infosec,Cybersecurity,news</itunes:keywords>
      <itunes:explicit>No</itunes:explicit>
      <podcast:chapters url="https://share.transistor.fm/s/8c97ac1a/chapters.json" type="application/json+chapters"/>
    </item>
    <item>
      <title>2024-11-18 - Yacht Doc</title>
      <itunes:episode>1</itunes:episode>
      <podcast:episode>1</podcast:episode>
      <itunes:title>2024-11-18 - Yacht Doc</itunes:title>
      <itunes:episodeType>full</itunes:episodeType>
      <guid isPermaLink="false">https://blubrry.com/bhis/138772070/2024-11-18-yacht-doc/</guid>
      <link>https://share.transistor.fm/s/5a564b81</link>
      <description>
        <![CDATA[<p>00:00 - PreShow Banter™ — Yacht Doc</p><p>07:40 - BHIS - Talkin’ Bout [infosec] News 2024-11-18</p><p>08:49 - Story # 1: Mystery Palo Alto Networks hijack-my-firewall zero-day now officially under exploit</p><p>16:02 - Story # 2: CISA Director Jen Easterly to depart agency on January 20</p><p>19:26 - Story # 3: Fake North Korean IT Worker Linked to BeaverTail Video Conference App Phishing Attack</p><p>28:44 - Story # 4: T-Mobile hacked in massive Chinese breach of telecom networks, WSJ reports</p><p>30:55 - Story # 4b: T-Mobile confirms it was hacked in recent wave of telecom breaches</p><p>33:03 - Story # 5: An Interview With the Target &amp; Home Depot Hacker</p><p>40:04 - Story # 6: Hacker gets 10 years in prison for extorting US healthcare provider</p><p>42:47 - Story # 7: Ransomware fiends boast they’ve stolen 1.4TB from US pharmacy network</p><p>44:21 - Story # 8: A surge in Pro-Russia cyberattacks after decision to monitor North Korean Troops in Ukraine</p><p>45:23 - Story # 9: 23andMe cuts 40% of its workforce and discontinues therapeutics division</p><p>50:38 - Story # 10: FBI, CISA, and NSA reveal most exploited vulnerabilities of 2023</p><p>56:45 - CPTC - Education Through Competition</p>
<ul><li>(00:00) - PreShow Banter™ — Yacht Doc</li>
<li>(07:39) - BHIS - Talkin' Bout [infosec] News 2024-11-18</li>
<li>(08:49) - Story # 1: Mystery Palo Alto Networks hijack-my-firewall zero-day now officially under exploit</li>
<li>(16:01) - Story # 2: CISA Director Jen Easterly to depart agency on January 20</li>
<li>(19:26) - Story # 3: Fake North Korean IT Worker Linked to BeaverTail Video Conference App Phishing Attack</li>
<li>(28:43) - Story # 4: T-Mobile hacked in massive Chinese breach of telecom networks, WSJ reports</li>
<li>(30:55) - Story # 4b: T-Mobile confirms it was hacked in recent wave of telecom breaches</li>
<li>(33:02) - Story # 5: An Interview With the Target &amp; Home Depot Hacker</li>
<li>(40:03) - Story # 6: Hacker gets 10 years in prison for extorting US healthcare provider</li>
<li>(42:47) - Story # 7: Ransomware fiends boast they've stolen 1.4TB from US pharmacy network</li>
<li>(44:20) - Story # 8: A surge in Pro-Russia cyberattacks after decision to monitor North Korean Troops in Ukraine</li>
<li>(45:22) - Story # 9: 23andMe cuts 40% of its workforce and discontinues therapeutics division</li>
<li>(50:37) - Story # 10: FBI, CISA, and NSA reveal most exploited vulnerabilities of 2023</li>
<li>(56:44) - CPTC - Education Through Competition</li>
</ul>]]>
      </description>
      <content:encoded>
        <![CDATA[<p>00:00 - PreShow Banter™ — Yacht Doc</p><p>07:40 - BHIS - Talkin’ Bout [infosec] News 2024-11-18</p><p>08:49 - Story # 1: Mystery Palo Alto Networks hijack-my-firewall zero-day now officially under exploit</p><p>16:02 - Story # 2: CISA Director Jen Easterly to depart agency on January 20</p><p>19:26 - Story # 3: Fake North Korean IT Worker Linked to BeaverTail Video Conference App Phishing Attack</p><p>28:44 - Story # 4: T-Mobile hacked in massive Chinese breach of telecom networks, WSJ reports</p><p>30:55 - Story # 4b: T-Mobile confirms it was hacked in recent wave of telecom breaches</p><p>33:03 - Story # 5: An Interview With the Target &amp; Home Depot Hacker</p><p>40:04 - Story # 6: Hacker gets 10 years in prison for extorting US healthcare provider</p><p>42:47 - Story # 7: Ransomware fiends boast they’ve stolen 1.4TB from US pharmacy network</p><p>44:21 - Story # 8: A surge in Pro-Russia cyberattacks after decision to monitor North Korean Troops in Ukraine</p><p>45:23 - Story # 9: 23andMe cuts 40% of its workforce and discontinues therapeutics division</p><p>50:38 - Story # 10: FBI, CISA, and NSA reveal most exploited vulnerabilities of 2023</p><p>56:45 - CPTC - Education Through Competition</p>
<ul><li>(00:00) - PreShow Banter™ — Yacht Doc</li>
<li>(07:39) - BHIS - Talkin' Bout [infosec] News 2024-11-18</li>
<li>(08:49) - Story # 1: Mystery Palo Alto Networks hijack-my-firewall zero-day now officially under exploit</li>
<li>(16:01) - Story # 2: CISA Director Jen Easterly to depart agency on January 20</li>
<li>(19:26) - Story # 3: Fake North Korean IT Worker Linked to BeaverTail Video Conference App Phishing Attack</li>
<li>(28:43) - Story # 4: T-Mobile hacked in massive Chinese breach of telecom networks, WSJ reports</li>
<li>(30:55) - Story # 4b: T-Mobile confirms it was hacked in recent wave of telecom breaches</li>
<li>(33:02) - Story # 5: An Interview With the Target &amp; Home Depot Hacker</li>
<li>(40:03) - Story # 6: Hacker gets 10 years in prison for extorting US healthcare provider</li>
<li>(42:47) - Story # 7: Ransomware fiends boast they've stolen 1.4TB from US pharmacy network</li>
<li>(44:20) - Story # 8: A surge in Pro-Russia cyberattacks after decision to monitor North Korean Troops in Ukraine</li>
<li>(45:22) - Story # 9: 23andMe cuts 40% of its workforce and discontinues therapeutics division</li>
<li>(50:37) - Story # 10: FBI, CISA, and NSA reveal most exploited vulnerabilities of 2023</li>
<li>(56:44) - CPTC - Education Through Competition</li>
</ul>]]>
      </content:encoded>
      <pubDate>Thu, 21 Nov 2024 00:00:00 -0500</pubDate>
      <author>Black Hills Information Security</author>
      <enclosure url="https://media.transistor.fm/5a564b81/4a4e7faf.mp3" length="60852697" type="audio/mpeg"/>
      <itunes:author>Black Hills Information Security</itunes:author>
      <itunes:image href="https://img.transistorcdn.com/CxqfIzhNfaUiQpTy8TWjAB4y5w1S9wHUemfwwd_6Lg4/rs:fill:0:0:1/w:1400/h:1400/q:60/mb:500000/aHR0cHM6Ly9pbWct/dXBsb2FkLXByb2R1/Y3Rpb24udHJhbnNp/c3Rvci5mbS83NmQz/MGRiZTNlMjQ0NWRk/YzMxZDk3NDMxZGEz/NWE0NS5qcGc.jpg"/>
      <itunes:duration>3642</itunes:duration>
      <itunes:summary>00:00 - PreShow Banter™ — Yacht Doc07:40 - BHIS - Talkin’ Bout [infosec] News 2024-11-1808:49 - Story # 1: Mystery Palo Alto Networks hijack-my-firewall zero-day now officially under exploit16:02 - Story # 2: CISA Director Jen Easterly to depart agency on January 2019:26 - Story # 3: Fake North Korean IT Worker Linked to BeaverTail Video Conference App Phishing Attack28:44 - Story # 4: T-Mobile hacked in massive Chinese breach of telecom networks, WSJ reports30:55 - Story # 4b: T-Mobile confirms it was hacked in recent wave of telecom breaches33:03 - Story # 5: An Interview With the Target &amp;amp; Home Depot Hacker40:04 - Story # 6: Hacker gets 10 years in prison for extorting US healthcare provider42:47 - Story # 7: Ransomware fiends boast they’ve stolen 1.4TB from US pharmacy network44:21 - Story # 8: A surge in Pro-Russia cyberattacks after decision to monitor North Korean Troops in Ukraine45:23 - Story # 9: 23andMe cuts 40% of its workforce and discontinues therapeutics division50:38 - Story # 10: FBI, CISA, and NSA reveal most exploited vulnerabilities of 202356:45 - CPTC - Education Through Competition</itunes:summary>
      <itunes:subtitle>00:00 - PreShow Banter™ — Yacht Doc07:40 - BHIS - Talkin’ Bout [infosec] News 2024-11-1808:49 - Story # 1: Mystery Palo Alto Networks hijack-my-firewall zero-day now officially under exploit16:02 - Story # 2: CISA Director Jen Easterly to depart agency on</itunes:subtitle>
      <itunes:keywords>Infosec,Cybersecurity,news</itunes:keywords>
      <itunes:explicit>No</itunes:explicit>
      <podcast:chapters url="https://share.transistor.fm/s/5a564b81/chapters.json" type="application/json+chapters"/>
    </item>
    <item>
      <title>2024-11-11 - The Old and The New</title>
      <itunes:episode>1</itunes:episode>
      <podcast:episode>1</podcast:episode>
      <itunes:title>2024-11-11 - The Old and The New</itunes:title>
      <itunes:episodeType>full</itunes:episodeType>
      <guid isPermaLink="false">https://blubrry.com/bhis/138565451/2024-11-11-the-old-and-the-new/</guid>
      <link>https://share.transistor.fm/s/bdad7731</link>
      <description>
        <![CDATA[<p>00:00 - PreShow Banter™ — The Old and The New</p><p>02:27 - BHIS - Talkin’ Bout [infosec] News 2024-11-11</p><p>03:44 - Story # 1: Mattel pulls thousands of ‘Wicked’ dolls off shelves after printing adult website on packaging</p><p>08:03 - Story # 2: Office apps crash on Windows 11 24H2 PCs with CrowdStrike antivirus</p><p>11:41 - Story # 3: Mislabeled patch sends Windows Server 2022 admins on unwanted upgrade to 2025</p><p>16:49 - Story # 4: Suspected Snowflake Hacker Arrested in Canada</p><p>18:26 - Story # 5: Interpol Cybercrime Sweep Takes Down 22,000 IP Addresses, Arrests 41</p><p>29:47 - Story # 6: Google Cloud to mandate MFA for all users in 2025</p><p>41:30 - Story # 7: Cisco scores a perfect CVSS 10 with critical flaw in its wireless system</p><p>49:26 - Story # 8: H.I.G. Capital and Thoma Bravo to Acquire CompTIA Brand and Products</p><p>59:05 - SANS Holiday Hack Challenge™ 2024</p>
<ul><li>(00:00) - PreShow Banter™ — The Old and The New</li>
<li>(02:27) - BHIS - Talkin' Bout [infosec] News 2024-11-11</li>
<li>(03:44) - Story # 1: Mattel pulls thousands of 'Wicked' dolls off shelves after printing adult website on packaging</li>
<li>(08:03) - Story # 2: Office apps crash on Windows 11 24H2 PCs with CrowdStrike antivirus</li>
<li>(11:41) - Story # 3: Mislabeled patch sends Windows Server 2022 admins on unwanted upgrade to 2025</li>
<li>(16:48) - Story # 4: Suspected Snowflake Hacker Arrested in Canada</li>
<li>(18:25) - Story # 5: Interpol Cybercrime Sweep Takes Down 22,000 IP Addresses, Arrests 41</li>
<li>(29:47) - Story # 6: Google Cloud to mandate MFA for all users in 2025</li>
<li>(41:30) - Story # 7: Cisco scores a perfect CVSS 10 with critical flaw in its wireless system</li>
<li>(49:26) - Story # 8: H.I.G. Capital and Thoma Bravo to Acquire CompTIA Brand and Products</li>
<li>(59:04) - SANS Holiday Hack Challenge™ 2024</li>
</ul>]]>
      </description>
      <content:encoded>
        <![CDATA[<p>00:00 - PreShow Banter™ — The Old and The New</p><p>02:27 - BHIS - Talkin’ Bout [infosec] News 2024-11-11</p><p>03:44 - Story # 1: Mattel pulls thousands of ‘Wicked’ dolls off shelves after printing adult website on packaging</p><p>08:03 - Story # 2: Office apps crash on Windows 11 24H2 PCs with CrowdStrike antivirus</p><p>11:41 - Story # 3: Mislabeled patch sends Windows Server 2022 admins on unwanted upgrade to 2025</p><p>16:49 - Story # 4: Suspected Snowflake Hacker Arrested in Canada</p><p>18:26 - Story # 5: Interpol Cybercrime Sweep Takes Down 22,000 IP Addresses, Arrests 41</p><p>29:47 - Story # 6: Google Cloud to mandate MFA for all users in 2025</p><p>41:30 - Story # 7: Cisco scores a perfect CVSS 10 with critical flaw in its wireless system</p><p>49:26 - Story # 8: H.I.G. Capital and Thoma Bravo to Acquire CompTIA Brand and Products</p><p>59:05 - SANS Holiday Hack Challenge™ 2024</p>
<ul><li>(00:00) - PreShow Banter™ — The Old and The New</li>
<li>(02:27) - BHIS - Talkin' Bout [infosec] News 2024-11-11</li>
<li>(03:44) - Story # 1: Mattel pulls thousands of 'Wicked' dolls off shelves after printing adult website on packaging</li>
<li>(08:03) - Story # 2: Office apps crash on Windows 11 24H2 PCs with CrowdStrike antivirus</li>
<li>(11:41) - Story # 3: Mislabeled patch sends Windows Server 2022 admins on unwanted upgrade to 2025</li>
<li>(16:48) - Story # 4: Suspected Snowflake Hacker Arrested in Canada</li>
<li>(18:25) - Story # 5: Interpol Cybercrime Sweep Takes Down 22,000 IP Addresses, Arrests 41</li>
<li>(29:47) - Story # 6: Google Cloud to mandate MFA for all users in 2025</li>
<li>(41:30) - Story # 7: Cisco scores a perfect CVSS 10 with critical flaw in its wireless system</li>
<li>(49:26) - Story # 8: H.I.G. Capital and Thoma Bravo to Acquire CompTIA Brand and Products</li>
<li>(59:04) - SANS Holiday Hack Challenge™ 2024</li>
</ul>]]>
      </content:encoded>
      <pubDate>Fri, 15 Nov 2024 13:12:57 -0500</pubDate>
      <author>Black Hills Information Security</author>
      <enclosure url="https://media.transistor.fm/bdad7731/a3e60495.mp3" length="59775060" type="audio/mpeg"/>
      <itunes:author>Black Hills Information Security</itunes:author>
      <itunes:image href="https://img.transistorcdn.com/SLdIG5OYp9nghS7bcPk5gJ_yZLGqVlZhbYP_fcu1yq4/rs:fill:0:0:1/w:1400/h:1400/q:60/mb:500000/aHR0cHM6Ly9pbWct/dXBsb2FkLXByb2R1/Y3Rpb24udHJhbnNp/c3Rvci5mbS80YjA1/NzY1ZjBlMzQ3ZjAw/NDZmZmY3YTIwMGNi/MjQ1Zi5qcGc.jpg"/>
      <itunes:duration>3614</itunes:duration>
      <itunes:summary>00:00 - PreShow Banter™ — The Old and The New02:27 - BHIS - Talkin’ Bout [infosec] News 2024-11-1103:44 - Story # 1: Mattel pulls thousands of ‘Wicked’ dolls off shelves after printing adult website on packaging08:03 - Story # 2: Office apps crash on Windows 11 24H2 PCs with CrowdStrike antivirus11:41 - Story # 3: Mislabeled patch sends Windows Server 2022 admins on unwanted upgrade to 202516:49 - Story # 4: Suspected Snowflake Hacker Arrested in Canada18:26 - Story # 5: Interpol Cybercrime Sweep Takes Down 22,000 IP Addresses, Arrests 4129:47 - Story # 6: Google Cloud to mandate MFA for all users in 202541:30 - Story # 7: Cisco scores a perfect CVSS 10 with critical flaw in its wireless system49:26 - Story # 8: H.I.G. Capital and Thoma Bravo to Acquire CompTIA Brand and Products59:05 - SANS Holiday Hack Challenge™ 2024</itunes:summary>
      <itunes:subtitle>00:00 - PreShow Banter™ — The Old and The New02:27 - BHIS - Talkin’ Bout [infosec] News 2024-11-1103:44 - Story # 1: Mattel pulls thousands of ‘Wicked’ dolls off shelves after printing adult website on packaging08:03 - Story # 2: Office apps crash on Wind</itunes:subtitle>
      <itunes:keywords>Infosec,Cybersecurity,news</itunes:keywords>
      <itunes:explicit>No</itunes:explicit>
      <podcast:chapters url="https://share.transistor.fm/s/bdad7731/chapters.json" type="application/json+chapters"/>
    </item>
    <item>
      <title>2024-11-04 - The Grey Times</title>
      <itunes:episode>1</itunes:episode>
      <podcast:episode>1</podcast:episode>
      <itunes:title>2024-11-04 - The Grey Times</itunes:title>
      <itunes:episodeType>full</itunes:episodeType>
      <guid isPermaLink="false">https://blubrry.com/bhis/138218700/2024-11-04-the-grey-times/</guid>
      <link>https://share.transistor.fm/s/eec71f64</link>
      <description>
        <![CDATA[<p>00:00:00 - PreShow Banter™ — The Grey Times</p><p>00:04:33 - BHIS - Talkin’ Bout [infosec] News 2024-11-04</p><p>00:05:54 - Story # 1: Midnight Blizzard conducts large-scale spear-phishing campaign using RDP files</p><p>00:16:45 - Story # 2: Follow Up - 5 Things To Know On Delta’s Lawsuit Against CrowdStrike</p><p>00:17:43 - Story # 2b: CrowdStrike Sues Delta: 5 Key Takeaways</p><p>00:22:04 - Story # 3: Russian charged by U.S. for creating RedLine infostealer malware</p><p>00:22:59 - Story # 3b: How a series of opsec failures led US authorities to the alleged developer of the Redline password-stealing malware</p><p>00:28:09 - Story # 4: Fired Disney staffer accused of hacking menu to add profanity, wingdings, removes allergen info</p><p>00:30:02 - Story # 4b: ‘We strive to put humanity above all’: Disney drops arbitration demand over wrongful death lawsuit after woman died from fatal food allergy</p><p>00:37:10 - Story # 5: OCR Announces First Financial Penalty Under HIPAA Risk Analysis Enforcement Initiative</p><p>00:44:54 - Story # 6: Security researchers found a serious zero-click bug in Synology’s Photos app</p><p>00:50:10 - Story # 7: Inside a Firewall Vendor’s 5-Year War With the Chinese Hackers Hijacking Its Devices</p><p>00:52:21 - Story # 8: Microsoft wants $30 if you want to delay Windows 11 switch</p><p>01:00:03 - Story # 9: Colorado Secretary of State posted spreadsheet with voting system passwords</p>
<ul><li>(00:00) - PreShow Banter™ — The Grey Times</li>
<li>(04:33) - BHIS - Talkin' Bout [infosec] News 2024-11-04</li>
<li>(05:54) - Story # 1: Midnight Blizzard conducts large-scale spear-phishing campaign using RDP files</li>
<li>(16:46) - Story # 2: Follow Up - 5 Things To Know On Delta’s Lawsuit Against CrowdStrike</li>
<li>(17:44) - Story # 2b: CrowdStrike Sues Delta: 5 Key Takeaways</li>
<li>(22:05) - Story # 3: Russian charged by U.S. for creating RedLine infostealer malware</li>
<li>(23:00) - Story # 3b: How a series of opsec failures led US authorities to the alleged developer of the Redline password-stealing malware</li>
<li>(28:10) - Story # 4: Fired Disney staffer accused of hacking menu to add profanity, wingdings, removes allergen info</li>
<li>(30:04) - Story # 4b: ‘We strive to put humanity above all’: Disney drops arbitration demand over wrongful death lawsuit after woman died from fatal food allergy</li>
<li>(37:11) - Story # 5: OCR Announces First Financial Penalty Under HIPAA Risk Analysis Enforcement Initiative</li>
<li>(44:56) - Story # 6: Security researchers found a serious zero-click bug in Synology's Photos app</li>
<li>(50:12) - Story # 7: Inside a Firewall Vendor's 5-Year War With the Chinese Hackers Hijacking Its Devices</li>
<li>(52:23) - Story # 8: Microsoft wants $30 if you want to delay Windows 11 switch</li>
<li>(01:00:06) - Story # 9: Colorado Secretary of State posted spreadsheet with voting system passwords</li>
</ul>]]>
      </description>
      <content:encoded>
        <![CDATA[<p>00:00:00 - PreShow Banter™ — The Grey Times</p><p>00:04:33 - BHIS - Talkin’ Bout [infosec] News 2024-11-04</p><p>00:05:54 - Story # 1: Midnight Blizzard conducts large-scale spear-phishing campaign using RDP files</p><p>00:16:45 - Story # 2: Follow Up - 5 Things To Know On Delta’s Lawsuit Against CrowdStrike</p><p>00:17:43 - Story # 2b: CrowdStrike Sues Delta: 5 Key Takeaways</p><p>00:22:04 - Story # 3: Russian charged by U.S. for creating RedLine infostealer malware</p><p>00:22:59 - Story # 3b: How a series of opsec failures led US authorities to the alleged developer of the Redline password-stealing malware</p><p>00:28:09 - Story # 4: Fired Disney staffer accused of hacking menu to add profanity, wingdings, removes allergen info</p><p>00:30:02 - Story # 4b: ‘We strive to put humanity above all’: Disney drops arbitration demand over wrongful death lawsuit after woman died from fatal food allergy</p><p>00:37:10 - Story # 5: OCR Announces First Financial Penalty Under HIPAA Risk Analysis Enforcement Initiative</p><p>00:44:54 - Story # 6: Security researchers found a serious zero-click bug in Synology’s Photos app</p><p>00:50:10 - Story # 7: Inside a Firewall Vendor’s 5-Year War With the Chinese Hackers Hijacking Its Devices</p><p>00:52:21 - Story # 8: Microsoft wants $30 if you want to delay Windows 11 switch</p><p>01:00:03 - Story # 9: Colorado Secretary of State posted spreadsheet with voting system passwords</p>
<ul><li>(00:00) - PreShow Banter™ — The Grey Times</li>
<li>(04:33) - BHIS - Talkin' Bout [infosec] News 2024-11-04</li>
<li>(05:54) - Story # 1: Midnight Blizzard conducts large-scale spear-phishing campaign using RDP files</li>
<li>(16:46) - Story # 2: Follow Up - 5 Things To Know On Delta’s Lawsuit Against CrowdStrike</li>
<li>(17:44) - Story # 2b: CrowdStrike Sues Delta: 5 Key Takeaways</li>
<li>(22:05) - Story # 3: Russian charged by U.S. for creating RedLine infostealer malware</li>
<li>(23:00) - Story # 3b: How a series of opsec failures led US authorities to the alleged developer of the Redline password-stealing malware</li>
<li>(28:10) - Story # 4: Fired Disney staffer accused of hacking menu to add profanity, wingdings, removes allergen info</li>
<li>(30:04) - Story # 4b: ‘We strive to put humanity above all’: Disney drops arbitration demand over wrongful death lawsuit after woman died from fatal food allergy</li>
<li>(37:11) - Story # 5: OCR Announces First Financial Penalty Under HIPAA Risk Analysis Enforcement Initiative</li>
<li>(44:56) - Story # 6: Security researchers found a serious zero-click bug in Synology's Photos app</li>
<li>(50:12) - Story # 7: Inside a Firewall Vendor's 5-Year War With the Chinese Hackers Hijacking Its Devices</li>
<li>(52:23) - Story # 8: Microsoft wants $30 if you want to delay Windows 11 switch</li>
<li>(01:00:06) - Story # 9: Colorado Secretary of State posted spreadsheet with voting system passwords</li>
</ul>]]>
      </content:encoded>
      <pubDate>Wed, 06 Nov 2024 12:00:00 -0500</pubDate>
      <author>Black Hills Information Security</author>
      <enclosure url="https://media.transistor.fm/eec71f64/2230dde4.mp3" length="66243753" type="audio/mpeg"/>
      <itunes:author>Black Hills Information Security</itunes:author>
      <itunes:image href="https://img.transistorcdn.com/ZsnEptgQstwBtalgXPu5gvKVsplCiIVojiO-LTV0K9E/rs:fill:0:0:1/w:1400/h:1400/q:60/mb:500000/aHR0cHM6Ly9pbWct/dXBsb2FkLXByb2R1/Y3Rpb24udHJhbnNp/c3Rvci5mbS8xY2Rm/OTIzZGEzNGM3NzZm/MDIyNTdmYjliZTI3/ZmYwYy5qcGc.jpg"/>
      <itunes:duration>3992</itunes:duration>
      <itunes:summary>00:00:00 - PreShow Banter™ — The Grey Times00:04:33 - BHIS - Talkin’ Bout [infosec] News 2024-11-0400:05:54 - Story # 1: Midnight Blizzard conducts large-scale spear-phishing campaign using RDP files00:16:45 - Story # 2: Follow Up - 5 Things To Know On Delta’s Lawsuit Against CrowdStrike00:17:43 - Story # 2b: CrowdStrike Sues Delta: 5 Key Takeaways00:22:04 - Story # 3: Russian charged by U.S. for creating RedLine infostealer malware00:22:59 - Story # 3b: How a series of opsec failures led US authorities to the alleged developer of the Redline password-stealing malware00:28:09 - Story # 4: Fired Disney staffer accused of hacking menu to add profanity, wingdings, removes allergen info00:30:02 - Story # 4b: ‘We strive to put humanity above all’: Disney drops arbitration demand over wrongful death lawsuit after woman died from fatal food allergy00:37:10 - Story # 5: OCR Announces First Financial Penalty Under HIPAA Risk Analysis Enforcement Initiative00:44:54 - Story # 6: Security researchers found a serious zero-click bug in Synology’s Photos app00:50:10 - Story # 7: Inside a Firewall Vendor’s 5-Year War With the Chinese Hackers Hijacking Its Devices00:52:21 - Story # 8: Microsoft wants $30 if you want to delay Windows 11 switch01:00:03 - Story # 9: Colorado Secretary of State posted spreadsheet with voting system passwords</itunes:summary>
      <itunes:subtitle>00:00:00 - PreShow Banter™ — The Grey Times00:04:33 - BHIS - Talkin’ Bout [infosec] News 2024-11-0400:05:54 - Story # 1: Midnight Blizzard conducts large-scale spear-phishing campaign using RDP files00:16:45 - Story # 2: Follow Up - 5 Things To Know On De</itunes:subtitle>
      <itunes:keywords>Infosec,Cybersecurity,news</itunes:keywords>
      <itunes:explicit>No</itunes:explicit>
      <podcast:chapters url="https://share.transistor.fm/s/eec71f64/chapters.json" type="application/json+chapters"/>
    </item>
    <item>
      <title>2024-10-28 - Sarsaparilla</title>
      <itunes:episode>1</itunes:episode>
      <podcast:episode>1</podcast:episode>
      <itunes:title>2024-10-28 - Sarsaparilla</itunes:title>
      <itunes:episodeType>full</itunes:episodeType>
      <guid isPermaLink="false">https://blubrry.com/bhis/138032112/2024-10-28-sarsaparilla/</guid>
      <link>https://share.transistor.fm/s/a687fd65</link>
      <description>
        <![CDATA[<p>00:00:00 - PreShow Banter™ — Sarsaparilla</p><p>00:05:50 - BHIS - Talkin’ Bout [infosec] News 2024-10-28</p><p>00:06:46 - Story # 1: AWS, Azure auth keys found in Android and iOS apps used by millions</p><p>00:15:02 - Story # 2: Burning Zero Days: FortiJump FortiManager vulnerability used by nation state in espionage via MSPs</p><p>00:29:03 - Story # 3: Delta officially launches lawyers at $500M CrowdStrike problem</p><p>00:40:60 - Story # 4: New Rules for US National Security Agencies Balance AI’s Promise With Need to Protect Against Risks</p><p>00:46:25 - Story # 4b: CISA proposes new security requirements to protect govt, personal data</p><p>00:51:03 - Story # 5: Largest Retail Breach in History: 350 Million “Hot Topic” Customers’ Personal &amp; Payment Data Exposed — As a Result of Infostealer Infection</p><p>00:55:35 - Story # 6: Throne’s toilet camera takes pictures of your poop</p><p>01:04:57 - A Community Support Moment - https://www.crisistextline.org</p>
<ul><li>(00:00) - PreShow Banter™ — Sarsaparilla</li>
<li>(05:49) - BHIS - Talkin' Bout [infosec] News 2024-10-28</li>
<li>(06:45) - Story # 1: AWS, Azure auth keys found in Android and iOS apps used by millions</li>
<li>(15:02) - Story # 2: Burning Zero Days: FortiJump FortiManager vulnerability used by nation state in espionage via MSPs</li>
<li>(29:03) - Story # 3: Delta officially launches lawyers at $500M CrowdStrike problem</li>
<li>(40:59) - Story # 4: New Rules for US National Security Agencies Balance AI’s Promise With Need to Protect Against Risks</li>
<li>(46:25) - Story # 4b: CISA proposes new security requirements to protect govt, personal data</li>
<li>(51:02) - Story # 5: Largest Retail Breach in History: 350 Million “Hot Topic” Customers’ Personal &amp; Payment Data Exposed — As a Result of Infostealer Infection</li>
<li>(55:35) - Story # 6: Throne’s toilet camera takes pictures of your poop</li>
<li>(01:04:56) - A Community Support Moment - https://www.crisistextline.org</li>
</ul>]]>
      </description>
      <content:encoded>
        <![CDATA[<p>00:00:00 - PreShow Banter™ — Sarsaparilla</p><p>00:05:50 - BHIS - Talkin’ Bout [infosec] News 2024-10-28</p><p>00:06:46 - Story # 1: AWS, Azure auth keys found in Android and iOS apps used by millions</p><p>00:15:02 - Story # 2: Burning Zero Days: FortiJump FortiManager vulnerability used by nation state in espionage via MSPs</p><p>00:29:03 - Story # 3: Delta officially launches lawyers at $500M CrowdStrike problem</p><p>00:40:60 - Story # 4: New Rules for US National Security Agencies Balance AI’s Promise With Need to Protect Against Risks</p><p>00:46:25 - Story # 4b: CISA proposes new security requirements to protect govt, personal data</p><p>00:51:03 - Story # 5: Largest Retail Breach in History: 350 Million “Hot Topic” Customers’ Personal &amp; Payment Data Exposed — As a Result of Infostealer Infection</p><p>00:55:35 - Story # 6: Throne’s toilet camera takes pictures of your poop</p><p>01:04:57 - A Community Support Moment - https://www.crisistextline.org</p>
<ul><li>(00:00) - PreShow Banter™ — Sarsaparilla</li>
<li>(05:49) - BHIS - Talkin' Bout [infosec] News 2024-10-28</li>
<li>(06:45) - Story # 1: AWS, Azure auth keys found in Android and iOS apps used by millions</li>
<li>(15:02) - Story # 2: Burning Zero Days: FortiJump FortiManager vulnerability used by nation state in espionage via MSPs</li>
<li>(29:03) - Story # 3: Delta officially launches lawyers at $500M CrowdStrike problem</li>
<li>(40:59) - Story # 4: New Rules for US National Security Agencies Balance AI’s Promise With Need to Protect Against Risks</li>
<li>(46:25) - Story # 4b: CISA proposes new security requirements to protect govt, personal data</li>
<li>(51:02) - Story # 5: Largest Retail Breach in History: 350 Million “Hot Topic” Customers’ Personal &amp; Payment Data Exposed — As a Result of Infostealer Infection</li>
<li>(55:35) - Story # 6: Throne’s toilet camera takes pictures of your poop</li>
<li>(01:04:56) - A Community Support Moment - https://www.crisistextline.org</li>
</ul>]]>
      </content:encoded>
      <pubDate>Wed, 30 Oct 2024 16:33:51 -0400</pubDate>
      <author>Black Hills Information Security</author>
      <enclosure url="https://media.transistor.fm/a687fd65/b7f08497.mp3" length="66256132" type="audio/mpeg"/>
      <itunes:author>Black Hills Information Security</itunes:author>
      <itunes:image href="https://img.transistorcdn.com/q_DAg7WcxXc8KGU26L_TqRsFCwPhFTubVfIb3OEGQa8/rs:fill:0:0:1/w:1400/h:1400/q:60/mb:500000/aHR0cHM6Ly9pbWct/dXBsb2FkLXByb2R1/Y3Rpb24udHJhbnNp/c3Rvci5mbS8wM2Ew/ZjRkMmI2NTQwMTNh/NjRmNDM2OGFmMDQ0/YTA3Ni5qcGc.jpg"/>
      <itunes:duration>4039</itunes:duration>
      <itunes:summary>00:00:00 - PreShow Banter™ — Sarsaparilla00:05:50 - BHIS - Talkin’ Bout [infosec] News 2024-10-2800:06:46 - Story # 1: AWS, Azure auth keys found in Android and iOS apps used by millions00:15:02 - Story # 2: Burning Zero Days: FortiJump FortiManager vulnerability used by nation state in espionage via MSPs00:29:03 - Story # 3: Delta officially launches lawyers at $500M CrowdStrike problem00:40:60 - Story # 4: New Rules for US National Security Agencies Balance AI’s Promise With Need to Protect Against Risks00:46:25 - Story # 4b: CISA proposes new security requirements to protect govt, personal data00:51:03 - Story # 5: Largest Retail Breach in History: 350 Million “Hot Topic” Customers’ Personal &amp;amp; Payment Data Exposed — As a Result of Infostealer Infection00:55:35 - Story # 6: Throne’s toilet camera takes pictures of your poop01:04:57 - A Community Support Moment - https://www.crisistextline.org</itunes:summary>
      <itunes:subtitle>00:00:00 - PreShow Banter™ — Sarsaparilla00:05:50 - BHIS - Talkin’ Bout [infosec] News 2024-10-2800:06:46 - Story # 1: AWS, Azure auth keys found in Android and iOS apps used by millions00:15:02 - Story # 2: Burning Zero Days: FortiJump FortiManager vulne</itunes:subtitle>
      <itunes:keywords>Infosec,Cybersecurity,news</itunes:keywords>
      <itunes:explicit>No</itunes:explicit>
      <podcast:chapters url="https://share.transistor.fm/s/a687fd65/chapters.json" type="application/json+chapters"/>
    </item>
    <item>
      <title>2024-10-21 - Logging Con</title>
      <itunes:episode>1</itunes:episode>
      <podcast:episode>1</podcast:episode>
      <itunes:title>2024-10-21 - Logging Con</itunes:title>
      <itunes:episodeType>full</itunes:episodeType>
      <guid isPermaLink="false">https://blubrry.com/bhis/137869766/2024-10-21-logging-con/</guid>
      <link>https://share.transistor.fm/s/7b1255cf</link>
      <description>
        <![CDATA[<p>00:00:00 - PreShow Banter™ — Log Con</p><p>00:11:41 - BHIS - Talkin’ Bout [infosec] News 2024-10-21</p><p>00:12:51 - Story # 1: Internet Archive exposed again – this time through Zendesk</p><p>00:14:57 - Story # 1b: Hackers steal information from 31 million Internet Archive users</p><p>00:20:42 - Story # 2: Sophos buys Secureworks for $859 mln to beef up cybersecurity portfolio</p><p>00:24:21 - Story # 3: USDoD hacker behind National Public Data breach arrested in Brazil</p><p>00:27:12 - Story # 4: Debunking Hype: China Hasn’t Broken Military Encryption With Quantum</p><p>00:32:14 - Story # 5: Microsoft said it lost weeks of security logs for its customers’ cloud products</p><p>00:35:03 - Story # 6: Should We Chat, Too? FAQ</p><p>00:40:05 - Story # 7: More than two dozen countries have used internet outages to sway elections</p><p>00:43:50 - Story # 8: Pokemon dev Game Freak confirms breach after stolen data leaks online</p><p>00:46:32 - Story # 9: Hackers made robot vacuums randomly yell racial slurs</p><p>00:49:19 - Story # 9b: We hacked a robot vacuum — and could watch live through its camera</p><p>00:50:19 - Story # 10: The government is getting fed up with ransomware payments fueling endless cycle of cyberattacks</p><p>00:54:55 - Story # 11: Google’s Chrome Browser Starts Disabling uBlock Origin</p><p>01:01:00 - WWHF Recorvery</p>
<ul><li>(00:00) - PreShow Banter™ — Log Con</li>
<li>(11:41) - BHIS - Talkin' Bout [infosec] News 2024-10-21</li>
<li>(12:50) - Story # 1: Internet Archive exposed again – this time through Zendesk</li>
<li>(14:56) - Story # 1b: Hackers steal information from 31 million Internet Archive users</li>
<li>(20:42) - Story # 2: Sophos buys Secureworks for $859 mln to beef up cybersecurity portfolio</li>
<li>(24:20) - Story # 3: USDoD hacker behind National Public Data breach arrested in Brazil</li>
<li>(27:11) - Story # 4: Debunking Hype: China Hasn't Broken Military Encryption With Quantum</li>
<li>(32:13) - Story # 5: Microsoft said it lost weeks of security logs for its customers’ cloud products</li>
<li>(35:02) - Story # 6: Should We Chat, Too? FAQ</li>
<li>(40:05) - Story # 7: More than two dozen countries have used internet outages to sway elections</li>
<li>(43:49) - Story # 8: Pokemon dev Game Freak confirms breach after stolen data leaks online</li>
<li>(46:32) - Story # 9: Hackers made robot vacuums randomly yell racial slurs</li>
<li>(49:18) - Story # 9b: We hacked a robot vacuum — and could watch live through its camera</li>
<li>(50:19) - Story # 10: The government is getting fed up with ransomware payments fueling endless cycle of cyberattacks</li>
<li>(54:54) - Story # 11: Google's Chrome Browser Starts Disabling uBlock Origin</li>
<li>(01:01:00) - WWHF Recorvery</li>
</ul>]]>
      </description>
      <content:encoded>
        <![CDATA[<p>00:00:00 - PreShow Banter™ — Log Con</p><p>00:11:41 - BHIS - Talkin’ Bout [infosec] News 2024-10-21</p><p>00:12:51 - Story # 1: Internet Archive exposed again – this time through Zendesk</p><p>00:14:57 - Story # 1b: Hackers steal information from 31 million Internet Archive users</p><p>00:20:42 - Story # 2: Sophos buys Secureworks for $859 mln to beef up cybersecurity portfolio</p><p>00:24:21 - Story # 3: USDoD hacker behind National Public Data breach arrested in Brazil</p><p>00:27:12 - Story # 4: Debunking Hype: China Hasn’t Broken Military Encryption With Quantum</p><p>00:32:14 - Story # 5: Microsoft said it lost weeks of security logs for its customers’ cloud products</p><p>00:35:03 - Story # 6: Should We Chat, Too? FAQ</p><p>00:40:05 - Story # 7: More than two dozen countries have used internet outages to sway elections</p><p>00:43:50 - Story # 8: Pokemon dev Game Freak confirms breach after stolen data leaks online</p><p>00:46:32 - Story # 9: Hackers made robot vacuums randomly yell racial slurs</p><p>00:49:19 - Story # 9b: We hacked a robot vacuum — and could watch live through its camera</p><p>00:50:19 - Story # 10: The government is getting fed up with ransomware payments fueling endless cycle of cyberattacks</p><p>00:54:55 - Story # 11: Google’s Chrome Browser Starts Disabling uBlock Origin</p><p>01:01:00 - WWHF Recorvery</p>
<ul><li>(00:00) - PreShow Banter™ — Log Con</li>
<li>(11:41) - BHIS - Talkin' Bout [infosec] News 2024-10-21</li>
<li>(12:50) - Story # 1: Internet Archive exposed again – this time through Zendesk</li>
<li>(14:56) - Story # 1b: Hackers steal information from 31 million Internet Archive users</li>
<li>(20:42) - Story # 2: Sophos buys Secureworks for $859 mln to beef up cybersecurity portfolio</li>
<li>(24:20) - Story # 3: USDoD hacker behind National Public Data breach arrested in Brazil</li>
<li>(27:11) - Story # 4: Debunking Hype: China Hasn't Broken Military Encryption With Quantum</li>
<li>(32:13) - Story # 5: Microsoft said it lost weeks of security logs for its customers’ cloud products</li>
<li>(35:02) - Story # 6: Should We Chat, Too? FAQ</li>
<li>(40:05) - Story # 7: More than two dozen countries have used internet outages to sway elections</li>
<li>(43:49) - Story # 8: Pokemon dev Game Freak confirms breach after stolen data leaks online</li>
<li>(46:32) - Story # 9: Hackers made robot vacuums randomly yell racial slurs</li>
<li>(49:18) - Story # 9b: We hacked a robot vacuum — and could watch live through its camera</li>
<li>(50:19) - Story # 10: The government is getting fed up with ransomware payments fueling endless cycle of cyberattacks</li>
<li>(54:54) - Story # 11: Google's Chrome Browser Starts Disabling uBlock Origin</li>
<li>(01:01:00) - WWHF Recorvery</li>
</ul>]]>
      </content:encoded>
      <pubDate>Fri, 25 Oct 2024 12:04:43 -0400</pubDate>
      <author>Black Hills Information Security</author>
      <enclosure url="https://media.transistor.fm/7b1255cf/185563fb.mp3" length="73645927" type="audio/mpeg"/>
      <itunes:author>Black Hills Information Security</itunes:author>
      <itunes:image href="https://img.transistorcdn.com/VYsCEmqF5zPFQHm7xU6ram5Z7VJdZZl82Y9Vokh8hWo/rs:fill:0:0:1/w:1400/h:1400/q:60/mb:500000/aHR0cHM6Ly9pbWct/dXBsb2FkLXByb2R1/Y3Rpb24udHJhbnNp/c3Rvci5mbS9jZTQ4/MjkwYmU1Y2EwY2E2/YzhmMTA2MzU4ZGI3/OWIxZS5qcGc.jpg"/>
      <itunes:duration>4451</itunes:duration>
      <itunes:summary>00:00:00 - PreShow Banter™ — Log Con00:11:41 - BHIS - Talkin’ Bout [infosec] News 2024-10-2100:12:51 - Story # 1: Internet Archive exposed again – this time through Zendesk00:14:57 - Story # 1b: Hackers steal information from 31 million Internet Archive users00:20:42 - Story # 2: Sophos buys Secureworks for $859 mln to beef up cybersecurity portfolio00:24:21 - Story # 3: USDoD hacker behind National Public Data breach arrested in Brazil00:27:12 - Story # 4: Debunking Hype: China Hasn’t Broken Military Encryption With Quantum00:32:14 - Story # 5: Microsoft said it lost weeks of security logs for its customers’ cloud products00:35:03 - Story # 6: Should We Chat, Too? FAQ00:40:05 - Story # 7: More than two dozen countries have used internet outages to sway elections00:43:50 - Story # 8: Pokemon dev Game Freak confirms breach after stolen data leaks online00:46:32 - Story # 9: Hackers made robot vacuums randomly yell racial slurs00:49:19 - Story # 9b: We hacked a robot vacuum — and could watch live through its camera00:50:19 - Story # 10: The government is getting fed up with ransomware payments fueling endless cycle of cyberattacks00:54:55 - Story # 11: Google’s Chrome Browser Starts Disabling uBlock Origin01:01:00 - WWHF Recorvery</itunes:summary>
      <itunes:subtitle>00:00:00 - PreShow Banter™ — Log Con00:11:41 - BHIS - Talkin’ Bout [infosec] News 2024-10-2100:12:51 - Story # 1: Internet Archive exposed again – this time through Zendesk00:14:57 - Story # 1b: Hackers steal information from 31 million Internet Archive u</itunes:subtitle>
      <itunes:keywords>Infosec,Cybersecurity,news</itunes:keywords>
      <itunes:explicit>No</itunes:explicit>
      <podcast:chapters url="https://share.transistor.fm/s/7b1255cf/chapters.json" type="application/json+chapters"/>
    </item>
    <item>
      <title>2024-09-30 — Cast of Special Characters</title>
      <itunes:episode>1</itunes:episode>
      <podcast:episode>1</podcast:episode>
      <itunes:title>2024-09-30 — Cast of Special Characters</itunes:title>
      <itunes:episodeType>full</itunes:episodeType>
      <guid isPermaLink="false">https://blubrry.com/bhis/136953930/2024-09-30-cast-of-special-characters/</guid>
      <link>https://share.transistor.fm/s/6863a6d2</link>
      <description>
        <![CDATA[<p>00:00:00 - PreShow Banter™ — Cast of Special Characters</p><p>00:06:37 - BHIS - Talkin’ Bout [infosec] News 2024-09-30</p><p>00:08:06 - Story # 1: CUPS flaws enable Linux remote code execution, but there’s a catch</p><p>00:23:40 - Story # 2: US Capitol Hit by Massive Dark Web Cyber Attack - Newsweek</p><p>00:27:40 - Story # 2b: ‘I’m a black NAZI!’: NC GOP nominee for governor made dozens of disturbing comments on porn forum</p><p>00:35:57 - Story # 3: NIST proposes barring some of the most nonsensical password rules</p><p>00:47:01 - Story # 3b: Why Two-Factor Authentication Is So Important - Teen Vogue</p><p>00:54:04 - Story # 4: Hacker plants false memories in ChatGPT to steal user data in perpetuity</p><p>01:00:42 - Story # 5: Millions of Vehicles Could Be Hacked and Tracked Thanks to a Simple Website Bug</p><p>01:02:54 - Story # 6: Massive E-Learning Platform Udemy Gave Teachers a Gen AI ‘Opt-Out Window’. It’s Already Over.</p>
<ul><li>(00:00) - PreShow Banter™ — Cast of Special Characters</li>
<li>(06:37) - BHIS - Talkin' Bout [infosec] News 2024-09-30</li>
<li>(08:06) - Story # 1: CUPS flaws enable Linux remote code execution, but there’s a catch</li>
<li>(23:39) - Story # 2: US Capitol Hit by Massive Dark Web Cyber Attack - Newsweek</li>
<li>(27:40) - Story # 2b: ‘I’m a black NAZI!’: NC GOP nominee for governor made dozens of disturbing comments on porn forum</li>
<li>(35:56) - Story # 3: NIST proposes barring some of the most nonsensical password rules</li>
<li>(47:00) - Story # 3b: Why Two-Factor Authentication Is So Important - Teen Vogue</li>
<li>(54:03) - Story # 4: Hacker plants false memories in ChatGPT to steal user data in perpetuity</li>
<li>(01:00:42) - Story # 5: Millions of Vehicles Could Be Hacked and Tracked Thanks to a Simple Website Bug</li>
<li>(01:02:53) - Story # 6: Massive E-Learning Platform Udemy Gave Teachers a Gen AI 'Opt-Out Window'. It's Already Over.</li>
</ul>]]>
      </description>
      <content:encoded>
        <![CDATA[<p>00:00:00 - PreShow Banter™ — Cast of Special Characters</p><p>00:06:37 - BHIS - Talkin’ Bout [infosec] News 2024-09-30</p><p>00:08:06 - Story # 1: CUPS flaws enable Linux remote code execution, but there’s a catch</p><p>00:23:40 - Story # 2: US Capitol Hit by Massive Dark Web Cyber Attack - Newsweek</p><p>00:27:40 - Story # 2b: ‘I’m a black NAZI!’: NC GOP nominee for governor made dozens of disturbing comments on porn forum</p><p>00:35:57 - Story # 3: NIST proposes barring some of the most nonsensical password rules</p><p>00:47:01 - Story # 3b: Why Two-Factor Authentication Is So Important - Teen Vogue</p><p>00:54:04 - Story # 4: Hacker plants false memories in ChatGPT to steal user data in perpetuity</p><p>01:00:42 - Story # 5: Millions of Vehicles Could Be Hacked and Tracked Thanks to a Simple Website Bug</p><p>01:02:54 - Story # 6: Massive E-Learning Platform Udemy Gave Teachers a Gen AI ‘Opt-Out Window’. It’s Already Over.</p>
<ul><li>(00:00) - PreShow Banter™ — Cast of Special Characters</li>
<li>(06:37) - BHIS - Talkin' Bout [infosec] News 2024-09-30</li>
<li>(08:06) - Story # 1: CUPS flaws enable Linux remote code execution, but there’s a catch</li>
<li>(23:39) - Story # 2: US Capitol Hit by Massive Dark Web Cyber Attack - Newsweek</li>
<li>(27:40) - Story # 2b: ‘I’m a black NAZI!’: NC GOP nominee for governor made dozens of disturbing comments on porn forum</li>
<li>(35:56) - Story # 3: NIST proposes barring some of the most nonsensical password rules</li>
<li>(47:00) - Story # 3b: Why Two-Factor Authentication Is So Important - Teen Vogue</li>
<li>(54:03) - Story # 4: Hacker plants false memories in ChatGPT to steal user data in perpetuity</li>
<li>(01:00:42) - Story # 5: Millions of Vehicles Could Be Hacked and Tracked Thanks to a Simple Website Bug</li>
<li>(01:02:53) - Story # 6: Massive E-Learning Platform Udemy Gave Teachers a Gen AI 'Opt-Out Window'. It's Already Over.</li>
</ul>]]>
      </content:encoded>
      <pubDate>Wed, 02 Oct 2024 12:00:00 -0400</pubDate>
      <author>Black Hills Information Security</author>
      <enclosure url="https://media.transistor.fm/6863a6d2/13bc3643.mp3" length="71855832" type="audio/mpeg"/>
      <itunes:author>Black Hills Information Security</itunes:author>
      <itunes:image href="https://img.transistorcdn.com/EI9O9V2GFS7GCjLCI5nDUK1OSo0-dz2UsZhcz0o70gM/rs:fill:0:0:1/w:1400/h:1400/q:60/mb:500000/aHR0cHM6Ly9pbWct/dXBsb2FkLXByb2R1/Y3Rpb24udHJhbnNp/c3Rvci5mbS8xZmIx/OTk2ODFmNWNkNjli/NTZkNTM5YTFkZGE2/OTkwMS5qcGc.jpg"/>
      <itunes:duration>4372</itunes:duration>
      <itunes:summary>00:00:00 - PreShow Banter™ — Cast of Special Characters00:06:37 - BHIS - Talkin’ Bout [infosec] News 2024-09-3000:08:06 - Story # 1: CUPS flaws enable Linux remote code execution, but there’s a catch00:23:40 - Story # 2: US Capitol Hit by Massive Dark Web Cyber Attack - Newsweek00:27:40 - Story # 2b: ‘I’m a black NAZI!’: NC GOP nominee for governor made dozens of disturbing comments on porn forum00:35:57 - Story # 3: NIST proposes barring some of the most nonsensical password rules00:47:01 - Story # 3b: Why Two-Factor Authentication Is So Important - Teen Vogue00:54:04 - Story # 4: Hacker plants false memories in ChatGPT to steal user data in perpetuity01:00:42 - Story # 5: Millions of Vehicles Could Be Hacked and Tracked Thanks to a Simple Website Bug01:02:54 - Story # 6: Massive E-Learning Platform Udemy Gave Teachers a Gen AI ‘Opt-Out Window’. It’s Already Over.</itunes:summary>
      <itunes:subtitle>00:00:00 - PreShow Banter™ — Cast of Special Characters00:06:37 - BHIS - Talkin’ Bout [infosec] News 2024-09-3000:08:06 - Story # 1: CUPS flaws enable Linux remote code execution, but there’s a catch00:23:40 - Story # 2: US Capitol Hit by Massive Dark Web</itunes:subtitle>
      <itunes:keywords>Infosec,Cybersecurity,news</itunes:keywords>
      <itunes:explicit>No</itunes:explicit>
      <podcast:chapters url="https://share.transistor.fm/s/6863a6d2/chapters.json" type="application/json+chapters"/>
    </item>
    <item>
      <title>2024-09-23 - Plane Talk</title>
      <itunes:episode>1</itunes:episode>
      <podcast:episode>1</podcast:episode>
      <itunes:title>2024-09-23 - Plane Talk</itunes:title>
      <itunes:episodeType>full</itunes:episodeType>
      <guid isPermaLink="false">https://blubrry.com/bhis/136683464/2024-09-23-plane-talk/</guid>
      <link>https://share.transistor.fm/s/55359adc</link>
      <description>
        <![CDATA[<p>00:00 - PreShow Banter™ — Plane Talk</p><p>05:50 - BHIS - Talkin’ Bout [infosec] News 2024-09-23</p><p>06:16 - A SANS Difference Maker Award Finalist</p><p>09:47 - Story # 1: Pagers attack brings to life long-feared supply chain threat</p><p>24:08 - Story # 2: Recaptcha Phish - John Hammond</p><p>25:49 - Story # 2b: Clever ‘GitHub Scanner’ campaign abusing repos to push malware</p><p>30:05 - Story # 3: Lazarus Group Targets Developers in Fresh VMConnect Campaign</p><p>35:22 - Story # 4: LinkedIn Addresses User Data Collection for AI Training</p><p>37:40 - Story # 5: Disney ditching Slack after massive July data breach</p><p>41:42 - Story # 6: FTC exposes massive surveillance of kids, teens by social media giants</p><p>51:35 - Story # 7: Kaspersky deletes itself, installs UltraAV antivirus without warning</p>
<ul><li>(00:00) - PreShow Banter™ — Plane Talk</li>
<li>(05:49) - BHIS - Talkin' Bout [infosec] News 2024-09-23</li>
<li>(06:15) - A SANS Difference Maker Award Finalist</li>
<li>(09:46) - Story # 1: Pagers attack brings to life long-feared supply chain threat</li>
<li>(24:08) - Story # 2: Recaptcha Phish - John Hammond</li>
<li>(25:49) - Story # 2b: Clever 'GitHub Scanner' campaign abusing repos to push malware</li>
<li>(30:05) - Story # 3: Lazarus Group Targets Developers in Fresh VMConnect Campaign</li>
<li>(35:22) - Story # 4: LinkedIn Addresses User Data Collection for AI Training</li>
<li>(37:39) - Story # 5: Disney ditching Slack after massive July data breach</li>
<li>(41:42) - Story # 6: FTC exposes massive surveillance of kids, teens by social media giants</li>
<li>(51:35) - Story # 7: Kaspersky deletes itself, installs UltraAV antivirus without warning</li>
</ul>]]>
      </description>
      <content:encoded>
        <![CDATA[<p>00:00 - PreShow Banter™ — Plane Talk</p><p>05:50 - BHIS - Talkin’ Bout [infosec] News 2024-09-23</p><p>06:16 - A SANS Difference Maker Award Finalist</p><p>09:47 - Story # 1: Pagers attack brings to life long-feared supply chain threat</p><p>24:08 - Story # 2: Recaptcha Phish - John Hammond</p><p>25:49 - Story # 2b: Clever ‘GitHub Scanner’ campaign abusing repos to push malware</p><p>30:05 - Story # 3: Lazarus Group Targets Developers in Fresh VMConnect Campaign</p><p>35:22 - Story # 4: LinkedIn Addresses User Data Collection for AI Training</p><p>37:40 - Story # 5: Disney ditching Slack after massive July data breach</p><p>41:42 - Story # 6: FTC exposes massive surveillance of kids, teens by social media giants</p><p>51:35 - Story # 7: Kaspersky deletes itself, installs UltraAV antivirus without warning</p>
<ul><li>(00:00) - PreShow Banter™ — Plane Talk</li>
<li>(05:49) - BHIS - Talkin' Bout [infosec] News 2024-09-23</li>
<li>(06:15) - A SANS Difference Maker Award Finalist</li>
<li>(09:46) - Story # 1: Pagers attack brings to life long-feared supply chain threat</li>
<li>(24:08) - Story # 2: Recaptcha Phish - John Hammond</li>
<li>(25:49) - Story # 2b: Clever 'GitHub Scanner' campaign abusing repos to push malware</li>
<li>(30:05) - Story # 3: Lazarus Group Targets Developers in Fresh VMConnect Campaign</li>
<li>(35:22) - Story # 4: LinkedIn Addresses User Data Collection for AI Training</li>
<li>(37:39) - Story # 5: Disney ditching Slack after massive July data breach</li>
<li>(41:42) - Story # 6: FTC exposes massive surveillance of kids, teens by social media giants</li>
<li>(51:35) - Story # 7: Kaspersky deletes itself, installs UltraAV antivirus without warning</li>
</ul>]]>
      </content:encoded>
      <pubDate>Thu, 26 Sep 2024 12:00:00 -0400</pubDate>
      <author>Black Hills Information Security</author>
      <enclosure url="https://media.transistor.fm/55359adc/abeb3014.mp3" length="61298168" type="audio/mpeg"/>
      <itunes:author>Black Hills Information Security</itunes:author>
      <itunes:image href="https://img.transistorcdn.com/vm0LaVHDtaaPPY7OHMiwhOSkovHSGMajfNcSuaFgHUg/rs:fill:0:0:1/w:1400/h:1400/q:60/mb:500000/aHR0cHM6Ly9pbWct/dXBsb2FkLXByb2R1/Y3Rpb24udHJhbnNp/c3Rvci5mbS8xNGZj/ODhiZTNmYjc3MDBh/YmFjYmU0NjEyZjgw/MDNkNS5qcGc.jpg"/>
      <itunes:duration>3689</itunes:duration>
      <itunes:summary>00:00 - PreShow Banter™ — Plane Talk05:50 - BHIS - Talkin’ Bout [infosec] News 2024-09-2306:16 - A SANS Difference Maker Award Finalist09:47 - Story # 1: Pagers attack brings to life long-feared supply chain threat24:08 - Story # 2: Recaptcha Phish - John Hammond25:49 - Story # 2b: Clever ‘GitHub Scanner’ campaign abusing repos to push malware30:05 - Story # 3: Lazarus Group Targets Developers in Fresh VMConnect Campaign35:22 - Story # 4: LinkedIn Addresses User Data Collection for AI Training37:40 - Story # 5: Disney ditching Slack after massive July data breach41:42 - Story # 6: FTC exposes massive surveillance of kids, teens by social media giants51:35 - Story # 7: Kaspersky deletes itself, installs UltraAV antivirus without warning</itunes:summary>
      <itunes:subtitle>00:00 - PreShow Banter™ — Plane Talk05:50 - BHIS - Talkin’ Bout [infosec] News 2024-09-2306:16 - A SANS Difference Maker Award Finalist09:47 - Story # 1: Pagers attack brings to life long-feared supply chain threat24:08 - Story # 2: Recaptcha Phish - John</itunes:subtitle>
      <itunes:keywords>Infosec,Cybersecurity,news</itunes:keywords>
      <itunes:explicit>No</itunes:explicit>
      <podcast:chapters url="https://share.transistor.fm/s/55359adc/chapters.json" type="application/json+chapters"/>
    </item>
    <item>
      <title>2024-09-16 - Pour Over News</title>
      <itunes:episode>1</itunes:episode>
      <podcast:episode>1</podcast:episode>
      <itunes:title>2024-09-16 - Pour Over News</itunes:title>
      <itunes:episodeType>full</itunes:episodeType>
      <guid isPermaLink="false">https://blubrry.com/bhis/136271475/2024-09-16-pour-over-news/</guid>
      <link>https://share.transistor.fm/s/96ef7066</link>
      <description>
        <![CDATA[<p>00:00 - PreShow Banter™ — Pour Over News</p><p>06:01 - BHIS - Talkin’ Bout [infosec] News 2024-09-16</p><p>07:14 - Story # 1: Fortinet confirms data breach after hacker claims to steal 440GB of files</p><p>15:37 - Story # 2: Snowflake slams ‘more MFA’ button again – months after Ticketmaster, Santander breaches</p><p>21:30 - Story # 3: Omnipresent AI cameras will ensure good behavior, says Larry Ellison</p><p>28:11 - Story # 4: Mastercard bolsters threat intelligence capabilities with $2.65 billion deal for Recorded Future</p><p>34:27 - Story # 5: Cyber insurance set for explosive growth</p><p>40:20 - Story # 6: 23andMe will pay $30 million to settle 2023 data breach lawsuit</p><p>45:25 - Story # 7: Google faces EU investigation over AI data compliance</p><p>50:35 - Story # 8: Rogue WHOIS server gives researcher superpowers no one should ever have</p>
<ul><li>(00:00) - PreShow Banter™ — Pour Over News</li>
<li>(06:01) - BHIS - Talkin' Bout [infosec] News 2024-09-16</li>
<li>(07:14) - Story # 1: Fortinet confirms data breach after hacker claims to steal 440GB of files</li>
<li>(15:36) - Story # 2: Snowflake slams 'more MFA' button again – months after Ticketmaster, Santander breaches</li>
<li>(21:29) - Story # 3: Omnipresent AI cameras will ensure good behavior, says Larry Ellison</li>
<li>(28:11) - Story # 4: Mastercard bolsters threat intelligence capabilities with $2.65 billion deal for Recorded Future</li>
<li>(34:27) - Story # 5: Cyber insurance set for explosive growth</li>
<li>(40:19) - Story # 6: 23andMe will pay $30 million to settle 2023 data breach lawsuit</li>
<li>(45:24) - Story # 7: Google faces EU investigation over AI data compliance</li>
<li>(50:35) - Story # 8: Rogue WHOIS server gives researcher superpowers no one should ever have</li>
</ul>]]>
      </description>
      <content:encoded>
        <![CDATA[<p>00:00 - PreShow Banter™ — Pour Over News</p><p>06:01 - BHIS - Talkin’ Bout [infosec] News 2024-09-16</p><p>07:14 - Story # 1: Fortinet confirms data breach after hacker claims to steal 440GB of files</p><p>15:37 - Story # 2: Snowflake slams ‘more MFA’ button again – months after Ticketmaster, Santander breaches</p><p>21:30 - Story # 3: Omnipresent AI cameras will ensure good behavior, says Larry Ellison</p><p>28:11 - Story # 4: Mastercard bolsters threat intelligence capabilities with $2.65 billion deal for Recorded Future</p><p>34:27 - Story # 5: Cyber insurance set for explosive growth</p><p>40:20 - Story # 6: 23andMe will pay $30 million to settle 2023 data breach lawsuit</p><p>45:25 - Story # 7: Google faces EU investigation over AI data compliance</p><p>50:35 - Story # 8: Rogue WHOIS server gives researcher superpowers no one should ever have</p>
<ul><li>(00:00) - PreShow Banter™ — Pour Over News</li>
<li>(06:01) - BHIS - Talkin' Bout [infosec] News 2024-09-16</li>
<li>(07:14) - Story # 1: Fortinet confirms data breach after hacker claims to steal 440GB of files</li>
<li>(15:36) - Story # 2: Snowflake slams 'more MFA' button again – months after Ticketmaster, Santander breaches</li>
<li>(21:29) - Story # 3: Omnipresent AI cameras will ensure good behavior, says Larry Ellison</li>
<li>(28:11) - Story # 4: Mastercard bolsters threat intelligence capabilities with $2.65 billion deal for Recorded Future</li>
<li>(34:27) - Story # 5: Cyber insurance set for explosive growth</li>
<li>(40:19) - Story # 6: 23andMe will pay $30 million to settle 2023 data breach lawsuit</li>
<li>(45:24) - Story # 7: Google faces EU investigation over AI data compliance</li>
<li>(50:35) - Story # 8: Rogue WHOIS server gives researcher superpowers no one should ever have</li>
</ul>]]>
      </content:encoded>
      <pubDate>Wed, 18 Sep 2024 12:00:00 -0400</pubDate>
      <author>Black Hills Information Security</author>
      <enclosure url="https://media.transistor.fm/96ef7066/b6f2eeb9.mp3" length="59655889" type="audio/mpeg"/>
      <itunes:author>Black Hills Information Security</itunes:author>
      <itunes:image href="https://img.transistorcdn.com/9l7l4dj39Q3ctqAKp4IZBmHFoFhDu9VzYTpwKbn2h2M/rs:fill:0:0:1/w:1400/h:1400/q:60/mb:500000/aHR0cHM6Ly9pbWct/dXBsb2FkLXByb2R1/Y3Rpb24udHJhbnNp/c3Rvci5mbS8zYzYz/ZGYwMmJhNTdhMmQz/MzkxOThmZjA3YjNm/ODg1MS5qcGc.jpg"/>
      <itunes:duration>3601</itunes:duration>
      <itunes:summary>00:00 - PreShow Banter™ — Pour Over News06:01 - BHIS - Talkin’ Bout [infosec] News 2024-09-1607:14 - Story # 1: Fortinet confirms data breach after hacker claims to steal 440GB of files15:37 - Story # 2: Snowflake slams ‘more MFA’ button again – months after Ticketmaster, Santander breaches21:30 - Story # 3: Omnipresent AI cameras will ensure good behavior, says Larry Ellison28:11 - Story # 4: Mastercard bolsters threat intelligence capabilities with $2.65 billion deal for Recorded Future34:27 - Story # 5: Cyber insurance set for explosive growth40:20 - Story # 6: 23andMe will pay $30 million to settle 2023 data breach lawsuit45:25 - Story # 7: Google faces EU investigation over AI data compliance50:35 - Story # 8: Rogue WHOIS server gives researcher superpowers no one should ever have</itunes:summary>
      <itunes:subtitle>00:00 - PreShow Banter™ — Pour Over News06:01 - BHIS - Talkin’ Bout [infosec] News 2024-09-1607:14 - Story # 1: Fortinet confirms data breach after hacker claims to steal 440GB of files15:37 - Story # 2: Snowflake slams ‘more MFA’ button again – months af</itunes:subtitle>
      <itunes:keywords>Infosec,Cybersecurity,news</itunes:keywords>
      <itunes:explicit>No</itunes:explicit>
      <podcast:chapters url="https://share.transistor.fm/s/96ef7066/chapters.json" type="application/json+chapters"/>
    </item>
    <item>
      <title>SPECIAL PRESENTATION: Backdoors &amp; Breaches Live</title>
      <itunes:episode>1</itunes:episode>
      <podcast:episode>1</podcast:episode>
      <itunes:title>SPECIAL PRESENTATION: Backdoors &amp; Breaches Live</itunes:title>
      <itunes:episodeType>full</itunes:episodeType>
      <guid isPermaLink="false">https://blubrry.com/bhis/136231565/special-presentation-backdoors-breaches-live/</guid>
      <link>https://share.transistor.fm/s/c01a86e1</link>
      <description>
        <![CDATA[<p>00:00 - Introduction</p><p>01:22 - The Scenario</p><p>02:50 - First Steps</p><p>03:48 - Endpoint Analysis Roll</p><p>04:22 - Logon Scripts Were installed</p><p>05:09 - I.R. Team Introductions</p><p>07:17 - Second Step</p><p>10:32 - Network Threat Hunting Roll</p><p>11:36 - Third Step</p><p>15:12 - Anyway Here’s Firewall Roll</p><p>15:43 - Fourth Step</p><p>18:26 - SIEM Roll</p><p>19:41 - Fifth Step</p><p>20:47 - UEBA Roll</p><p>21:19 - Senario Recap</p><p>22:20 - Senario Plausibility?</p><p>25:51 - Wrap-up Takeaways</p>
<ul><li>(00:00) - Introduction</li>
<li>(01:21) - The Scenario</li>
<li>(02:50) - First Steps</li>
<li>(03:47) - Endpoint Analysis Roll</li>
<li>(04:21) - Logon Scripts Were installed</li>
<li>(05:09) - I.R. Team Introductions</li>
<li>(07:16) - Second Step</li>
<li>(10:32) - Network Threat Hunting Roll</li>
<li>(11:36) - Third Step</li>
<li>(15:12) - Anyway Here's Firewall Roll</li>
<li>(15:42) - Fourth Step</li>
<li>(18:26) - SIEM Roll</li>
<li>(19:41) - Fifth Step</li>
<li>(20:47) - UEBA Roll</li>
<li>(21:18) - Senario Recap</li>
<li>(22:19) - Senario Plausibility?</li>
<li>(25:50) - Wrap-up Takeaways</li>
</ul>]]>
      </description>
      <content:encoded>
        <![CDATA[<p>00:00 - Introduction</p><p>01:22 - The Scenario</p><p>02:50 - First Steps</p><p>03:48 - Endpoint Analysis Roll</p><p>04:22 - Logon Scripts Were installed</p><p>05:09 - I.R. Team Introductions</p><p>07:17 - Second Step</p><p>10:32 - Network Threat Hunting Roll</p><p>11:36 - Third Step</p><p>15:12 - Anyway Here’s Firewall Roll</p><p>15:43 - Fourth Step</p><p>18:26 - SIEM Roll</p><p>19:41 - Fifth Step</p><p>20:47 - UEBA Roll</p><p>21:19 - Senario Recap</p><p>22:20 - Senario Plausibility?</p><p>25:51 - Wrap-up Takeaways</p>
<ul><li>(00:00) - Introduction</li>
<li>(01:21) - The Scenario</li>
<li>(02:50) - First Steps</li>
<li>(03:47) - Endpoint Analysis Roll</li>
<li>(04:21) - Logon Scripts Were installed</li>
<li>(05:09) - I.R. Team Introductions</li>
<li>(07:16) - Second Step</li>
<li>(10:32) - Network Threat Hunting Roll</li>
<li>(11:36) - Third Step</li>
<li>(15:12) - Anyway Here's Firewall Roll</li>
<li>(15:42) - Fourth Step</li>
<li>(18:26) - SIEM Roll</li>
<li>(19:41) - Fifth Step</li>
<li>(20:47) - UEBA Roll</li>
<li>(21:18) - Senario Recap</li>
<li>(22:19) - Senario Plausibility?</li>
<li>(25:50) - Wrap-up Takeaways</li>
</ul>]]>
      </content:encoded>
      <pubDate>Mon, 16 Sep 2024 01:00:00 -0400</pubDate>
      <author>Black Hills Information Security</author>
      <enclosure url="https://media.transistor.fm/c01a86e1/70ee05ea.mp3" length="33732348" type="audio/mpeg"/>
      <itunes:author>Black Hills Information Security</itunes:author>
      <itunes:image href="https://img.transistorcdn.com/ZzOp5ai4DuBIM_scT3h88lMKoqUIpynEJRnzzLIgR94/rs:fill:0:0:1/w:1400/h:1400/q:60/mb:500000/aHR0cHM6Ly9pbWct/dXBsb2FkLXByb2R1/Y3Rpb24udHJhbnNp/c3Rvci5mbS8wN2Ix/YzQ0Y2I0NTNkMzNm/N2VmNmM0ZGM1MTlm/NWQ0YS5qcGc.jpg"/>
      <itunes:duration>1883</itunes:duration>
      <itunes:summary>00:00 - Introduction01:22 - The Scenario02:50 - First Steps03:48 - Endpoint Analysis Roll04:22 - Logon Scripts Were installed05:09 - I.R. Team Introductions07:17 - Second Step10:32 - Network Threat Hunting Roll11:36 - Third Step15:12 - Anyway Here’s Firewall Roll15:43 - Fourth Step18:26 - SIEM Roll19:41 - Fifth Step20:47 - UEBA Roll21:19 - Senario Recap22:20 - Senario Plausibility?25:51 - Wrap-up Takeaways</itunes:summary>
      <itunes:subtitle>00:00 - Introduction01:22 - The Scenario02:50 - First Steps03:48 - Endpoint Analysis Roll04:22 - Logon Scripts Were installed05:09 - I.R. Team Introductions07:17 - Second Step10:32 - Network Threat Hunting Roll11:36 - Third Step15:12 - Anyway Here’s Firew</itunes:subtitle>
      <itunes:keywords>Infosec,Cybersecurity,news</itunes:keywords>
      <itunes:explicit>No</itunes:explicit>
      <podcast:chapters url="https://share.transistor.fm/s/c01a86e1/chapters.json" type="application/json+chapters"/>
    </item>
    <item>
      <title>2024-09-09 - More Chicken Related Crimes</title>
      <itunes:episode>1</itunes:episode>
      <podcast:episode>1</podcast:episode>
      <itunes:title>2024-09-09 - More Chicken Related Crimes</itunes:title>
      <itunes:episodeType>full</itunes:episodeType>
      <guid isPermaLink="false">https://blubrry.com/bhis/136070747/2024-09-09-more-chicken-related-crimes/</guid>
      <link>https://share.transistor.fm/s/7bffc121</link>
      <description>
        <![CDATA[<p>00:00 - PreShow Banter™ — Revenge of the Nerds / More Chicken Related Crimes</p><p>05:19 - N.Y. Official Charged With Taking Money, Travel and Poultry to Aid China</p><p>09:23 - BHIS - Talkin’ Bout [infosec] News 2024-09-09</p><p>09:50 - Story # 1: YubiKeys are vulnerable to cloning attacks thanks to newly discovered side channel</p><p>20:35 - Story # 2: Therapy Sessions Exposed by Mental Health Care Firm’s Unsecured Database</p><p>25:24 - Story # 3: California legislature passes sweeping AI safety bill</p><p>38:02 - Story # 4: Brain Cipher claims attack on Olympic venue, promises 300 GB data leak</p><p>41:59 - Story # 5: How Navy chiefs conspired to get themselves illegal warship Wi-Fi</p><p>42:45 - Story # 5b: After seeing Wi-Fi network named “STINKY,” Navy found hidden Starlink dish on US warship</p><p>49:18 - Story # 6: Researchers say a bug let them add fake pilots to rosters used for TSA checks</p><p>51:32 - Story # 7: Durex India spilled customers’ private order data</p><p>54:53 - Story # 8: City of Columbus Sues Researcher Who Disclosed Impact of Ransomware Attack</p>
<ul><li>(00:00) - PreShow Banter™ — Revenge of the Nerds /  More Chicken Related Crimes</li>
<li>(05:19) - N.Y. Official Charged With Taking Money, Travel and Poultry to Aid China</li>
<li>(09:23) - BHIS - Talkin' Bout [infosec] News 2024-09-09</li>
<li>(09:50) - Story # 1: YubiKeys are vulnerable to cloning attacks thanks to newly discovered side channel</li>
<li>(20:34) - Story # 2: Therapy Sessions Exposed by Mental Health Care Firm’s Unsecured Database</li>
<li>(25:23) - Story # 3: California legislature passes sweeping AI safety bill</li>
<li>(38:02) - Story # 4: Brain Cipher claims attack on Olympic venue, promises 300 GB data leak</li>
<li>(41:59) - Story # 5: How Navy chiefs conspired to get themselves illegal warship Wi-Fi</li>
<li>(42:44) - Story # 5b: After seeing Wi-Fi network named “STINKY,” Navy found hidden Starlink dish on US warship</li>
<li>(49:18) - Story # 6: Researchers say a bug let them add fake pilots to rosters used for TSA checks</li>
<li>(51:32) - Story # 7: Durex India spilled customers’ private order data</li>
<li>(54:53) - Story # 8: City of Columbus Sues Researcher Who Disclosed Impact of Ransomware Attack</li>
</ul>]]>
      </description>
      <content:encoded>
        <![CDATA[<p>00:00 - PreShow Banter™ — Revenge of the Nerds / More Chicken Related Crimes</p><p>05:19 - N.Y. Official Charged With Taking Money, Travel and Poultry to Aid China</p><p>09:23 - BHIS - Talkin’ Bout [infosec] News 2024-09-09</p><p>09:50 - Story # 1: YubiKeys are vulnerable to cloning attacks thanks to newly discovered side channel</p><p>20:35 - Story # 2: Therapy Sessions Exposed by Mental Health Care Firm’s Unsecured Database</p><p>25:24 - Story # 3: California legislature passes sweeping AI safety bill</p><p>38:02 - Story # 4: Brain Cipher claims attack on Olympic venue, promises 300 GB data leak</p><p>41:59 - Story # 5: How Navy chiefs conspired to get themselves illegal warship Wi-Fi</p><p>42:45 - Story # 5b: After seeing Wi-Fi network named “STINKY,” Navy found hidden Starlink dish on US warship</p><p>49:18 - Story # 6: Researchers say a bug let them add fake pilots to rosters used for TSA checks</p><p>51:32 - Story # 7: Durex India spilled customers’ private order data</p><p>54:53 - Story # 8: City of Columbus Sues Researcher Who Disclosed Impact of Ransomware Attack</p>
<ul><li>(00:00) - PreShow Banter™ — Revenge of the Nerds /  More Chicken Related Crimes</li>
<li>(05:19) - N.Y. Official Charged With Taking Money, Travel and Poultry to Aid China</li>
<li>(09:23) - BHIS - Talkin' Bout [infosec] News 2024-09-09</li>
<li>(09:50) - Story # 1: YubiKeys are vulnerable to cloning attacks thanks to newly discovered side channel</li>
<li>(20:34) - Story # 2: Therapy Sessions Exposed by Mental Health Care Firm’s Unsecured Database</li>
<li>(25:23) - Story # 3: California legislature passes sweeping AI safety bill</li>
<li>(38:02) - Story # 4: Brain Cipher claims attack on Olympic venue, promises 300 GB data leak</li>
<li>(41:59) - Story # 5: How Navy chiefs conspired to get themselves illegal warship Wi-Fi</li>
<li>(42:44) - Story # 5b: After seeing Wi-Fi network named “STINKY,” Navy found hidden Starlink dish on US warship</li>
<li>(49:18) - Story # 6: Researchers say a bug let them add fake pilots to rosters used for TSA checks</li>
<li>(51:32) - Story # 7: Durex India spilled customers’ private order data</li>
<li>(54:53) - Story # 8: City of Columbus Sues Researcher Who Disclosed Impact of Ransomware Attack</li>
</ul>]]>
      </content:encoded>
      <pubDate>Wed, 11 Sep 2024 12:00:00 -0400</pubDate>
      <author>Black Hills Information Security</author>
      <enclosure url="https://media.transistor.fm/7bffc121/851fa854.mp3" length="62266558" type="audio/mpeg"/>
      <itunes:author>Black Hills Information Security</itunes:author>
      <itunes:image href="https://img.transistorcdn.com/37m205BqfycoOPT6C_mQmO6UE0xTdjVP6xE3cgNP7lg/rs:fill:0:0:1/w:1400/h:1400/q:60/mb:500000/aHR0cHM6Ly9pbWct/dXBsb2FkLXByb2R1/Y3Rpb24udHJhbnNp/c3Rvci5mbS8yNjgw/YTYzMTE5YTg0YWY4/Y2MzYWZlZGJlZWNj/NGM1YS5qcGc.jpg"/>
      <itunes:duration>3748</itunes:duration>
      <itunes:summary>00:00 - PreShow Banter™ — Revenge of the Nerds / More Chicken Related Crimes05:19 - N.Y. Official Charged With Taking Money, Travel and Poultry to Aid China09:23 - BHIS - Talkin’ Bout [infosec] News 2024-09-0909:50 - Story # 1: YubiKeys are vulnerable to cloning attacks thanks to newly discovered side channel20:35 - Story # 2: Therapy Sessions Exposed by Mental Health Care Firm’s Unsecured Database25:24 - Story # 3: California legislature passes sweeping AI safety bill38:02 - Story # 4: Brain Cipher claims attack on Olympic venue, promises 300 GB data leak41:59 - Story # 5: How Navy chiefs conspired to get themselves illegal warship Wi-Fi42:45 - Story # 5b: After seeing Wi-Fi network named “STINKY,” Navy found hidden Starlink dish on US warship49:18 - Story # 6: Researchers say a bug let them add fake pilots to rosters used for TSA checks51:32 - Story # 7: Durex India spilled customers’ private order data54:53 - Story # 8: City of Columbus Sues Researcher Who Disclosed Impact of Ransomware Attack</itunes:summary>
      <itunes:subtitle>00:00 - PreShow Banter™ — Revenge of the Nerds / More Chicken Related Crimes05:19 - N.Y. Official Charged With Taking Money, Travel and Poultry to Aid China09:23 - BHIS - Talkin’ Bout [infosec] News 2024-09-0909:50 - Story # 1: YubiKeys are vulnerable to </itunes:subtitle>
      <itunes:keywords>Infosec,Cybersecurity,news</itunes:keywords>
      <itunes:explicit>No</itunes:explicit>
      <podcast:chapters url="https://share.transistor.fm/s/7bffc121/chapters.json" type="application/json+chapters"/>
    </item>
    <item>
      <title>2024-08-26 - Move to Signal</title>
      <itunes:episode>1</itunes:episode>
      <podcast:episode>1</podcast:episode>
      <itunes:title>2024-08-26 - Move to Signal</itunes:title>
      <itunes:episodeType>full</itunes:episodeType>
      <guid isPermaLink="false">https://blubrry.com/bhis/135618761/2024-08-26-move-to-signal/</guid>
      <link>https://share.transistor.fm/s/b15cdfb7</link>
      <description>
        <![CDATA[<p>00:00 - PreShow Banter™ — Move to Signal</p><p>03:47 - BHIS - Talkin’ Bout [infosec] News 2024-08-26</p><p>04:37 - Story # 1: Pavel Durov’s Arrest Leaves Telegram Hanging in the Balance</p><p>11:03 - Story # 1b: Moxie on X.com</p><p>23:17 - Story # 2: Unveiling “sedexp”: A Stealthy Linux Malware Exploiting udev Rules</p><p>29:39 - Story # 3: Seattle airport ‘possible cyberattack’ snarls travel yet again</p><p>32:42 - Story # 4: Iran named as source of Trump campaign phish, leaks</p><p>38:53 - Story # 5: Man who hacked Hawaii state registry to forge his own death certificate sentenced to 81 months</p><p>44:11 - Story # 6: Hardware Backdoor Discovered in RFID Cards Used in Hotels and Offices Worldwide</p><p>47:26 - Story # 7: New ‘ALBeast’ Misconfiguration Exposes Weakness in AWS Application Load Balancer</p><p>48:52 - Story # 8: “We will hold them accountable”: General Motors sued for selling customer driving data to third parties</p>
<ul><li>(00:00) - PreShow Banter™ — Move to Signal</li>
<li>(03:47) - BHIS - Talkin' Bout [infosec] News 2024-08-26</li>
<li>(04:37) - Story # 1: Pavel Durov’s Arrest Leaves Telegram Hanging in the Balance</li>
<li>(11:03) - Story # 1b: Moxie on X.com</li>
<li>(23:17) - Story # 2: Unveiling "sedexp": A Stealthy Linux Malware Exploiting udev Rules</li>
<li>(29:39) - Story # 3: Seattle airport 'possible cyberattack' snarls travel yet again</li>
<li>(32:42) - Story # 4: Iran named as source of Trump campaign phish, leaks</li>
<li>(38:52) - Story # 5: Man who hacked Hawaii state registry to forge his own death certificate sentenced to 81 months</li>
<li>(44:10) - Story # 6: Hardware Backdoor Discovered in RFID Cards Used in Hotels and Offices Worldwide</li>
<li>(47:25) - Story # 7: New 'ALBeast' Misconfiguration Exposes Weakness in AWS Application Load Balancer</li>
<li>(48:51) - Story # 8: “We will hold them accountable”: General Motors sued for selling customer driving data to third parties</li>
</ul>]]>
      </description>
      <content:encoded>
        <![CDATA[<p>00:00 - PreShow Banter™ — Move to Signal</p><p>03:47 - BHIS - Talkin’ Bout [infosec] News 2024-08-26</p><p>04:37 - Story # 1: Pavel Durov’s Arrest Leaves Telegram Hanging in the Balance</p><p>11:03 - Story # 1b: Moxie on X.com</p><p>23:17 - Story # 2: Unveiling “sedexp”: A Stealthy Linux Malware Exploiting udev Rules</p><p>29:39 - Story # 3: Seattle airport ‘possible cyberattack’ snarls travel yet again</p><p>32:42 - Story # 4: Iran named as source of Trump campaign phish, leaks</p><p>38:53 - Story # 5: Man who hacked Hawaii state registry to forge his own death certificate sentenced to 81 months</p><p>44:11 - Story # 6: Hardware Backdoor Discovered in RFID Cards Used in Hotels and Offices Worldwide</p><p>47:26 - Story # 7: New ‘ALBeast’ Misconfiguration Exposes Weakness in AWS Application Load Balancer</p><p>48:52 - Story # 8: “We will hold them accountable”: General Motors sued for selling customer driving data to third parties</p>
<ul><li>(00:00) - PreShow Banter™ — Move to Signal</li>
<li>(03:47) - BHIS - Talkin' Bout [infosec] News 2024-08-26</li>
<li>(04:37) - Story # 1: Pavel Durov’s Arrest Leaves Telegram Hanging in the Balance</li>
<li>(11:03) - Story # 1b: Moxie on X.com</li>
<li>(23:17) - Story # 2: Unveiling "sedexp": A Stealthy Linux Malware Exploiting udev Rules</li>
<li>(29:39) - Story # 3: Seattle airport 'possible cyberattack' snarls travel yet again</li>
<li>(32:42) - Story # 4: Iran named as source of Trump campaign phish, leaks</li>
<li>(38:52) - Story # 5: Man who hacked Hawaii state registry to forge his own death certificate sentenced to 81 months</li>
<li>(44:10) - Story # 6: Hardware Backdoor Discovered in RFID Cards Used in Hotels and Offices Worldwide</li>
<li>(47:25) - Story # 7: New 'ALBeast' Misconfiguration Exposes Weakness in AWS Application Load Balancer</li>
<li>(48:51) - Story # 8: “We will hold them accountable”: General Motors sued for selling customer driving data to third parties</li>
</ul>]]>
      </content:encoded>
      <pubDate>Thu, 29 Aug 2024 10:58:20 -0400</pubDate>
      <author>Black Hills Information Security</author>
      <enclosure url="https://media.transistor.fm/b15cdfb7/ba477433.mp3" length="52850867" type="audio/mpeg"/>
      <itunes:author>Black Hills Information Security</itunes:author>
      <itunes:image href="https://img.transistorcdn.com/oS__NIhAnT81ZFJeLxqNQEgKy0ii5eFYQDljyu3qwCc/rs:fill:0:0:1/w:1400/h:1400/q:60/mb:500000/aHR0cHM6Ly9pbWct/dXBsb2FkLXByb2R1/Y3Rpb24udHJhbnNp/c3Rvci5mbS8yYmI2/Yjc3ZTVmOTE5NDFj/ZThhNzEzN2NmNTU5/OTk2Yy5qcGc.jpg"/>
      <itunes:duration>3175</itunes:duration>
      <itunes:summary>00:00 - PreShow Banter™ — Move to Signal03:47 - BHIS - Talkin’ Bout [infosec] News 2024-08-2604:37 - Story # 1: Pavel Durov’s Arrest Leaves Telegram Hanging in the Balance11:03 - Story # 1b: Moxie on X.com23:17 - Story # 2: Unveiling “sedexp”: A Stealthy Linux Malware Exploiting udev Rules29:39 - Story # 3: Seattle airport ‘possible cyberattack’ snarls travel yet again32:42 - Story # 4: Iran named as source of Trump campaign phish, leaks38:53 - Story # 5: Man who hacked Hawaii state registry to forge his own death certificate sentenced to 81 months44:11 - Story # 6: Hardware Backdoor Discovered in RFID Cards Used in Hotels and Offices Worldwide47:26 - Story # 7: New ‘ALBeast’ Misconfiguration Exposes Weakness in AWS Application Load Balancer48:52 - Story # 8: “We will hold them accountable”: General Motors sued for selling customer driving data to third parties</itunes:summary>
      <itunes:subtitle>00:00 - PreShow Banter™ — Move to Signal03:47 - BHIS - Talkin’ Bout [infosec] News 2024-08-2604:37 - Story # 1: Pavel Durov’s Arrest Leaves Telegram Hanging in the Balance11:03 - Story # 1b: Moxie on X.com23:17 - Story # 2: Unveiling “sedexp”: A Stealthy </itunes:subtitle>
      <itunes:keywords>Infosec,Cybersecurity,news</itunes:keywords>
      <itunes:explicit>No</itunes:explicit>
      <podcast:chapters url="https://share.transistor.fm/s/b15cdfb7/chapters.json" type="application/json+chapters"/>
    </item>
    <item>
      <title>2024-08-19 Nine Years for Chicken Wings</title>
      <itunes:episode>1</itunes:episode>
      <podcast:episode>1</podcast:episode>
      <itunes:title>2024-08-19 Nine Years for Chicken Wings</itunes:title>
      <itunes:episodeType>full</itunes:episodeType>
      <guid isPermaLink="false">https://blubrry.com/bhis/135221706/2024-08-19-nine-years-for-chicken-wings/</guid>
      <link>https://share.transistor.fm/s/02f62a42</link>
      <description>
        <![CDATA[<p>00:00:00 - PreShow Banter™ — Nine Years for Chicken Wings</p><p>00:08:19 - BHIS - Talkin’ Bout [infosec] News 2024-08-19</p><p>00:09:03 - Story # 1: NationalPublicData.com Hack Exposes a Nation’s Data</p><p>00:18:17 - Story # 1b: National Public Data Published Its Own Passwords</p><p>00:25:01 - Story # 2: RansomHub Group Deploys New EDR-Killing Tool in Latest Cyber Attacks</p><p>00:26:52 - Story # 3: T-Mobile fined $60 million for failing to stop data breaches</p><p>00:34:03 - Story # 4: Massive Cyber Attack On AWS Targets 230 Million Unique Cloud Environments</p><p>00:45:43 - Story # 5: The US wants to use facial recognition to identify migrant children as they age</p><p>00:54:16 - Story # 6: Six ransomware gangs behind over 50% of 2024 attacks</p><p>00:59:56 - Story # 7: US accuses man of being ‘elite’ ransomware pioneer they’ve hunted for years</p><p>01:01:57 - Rinsed: From Cartels to Crypto: How the Tech Industry Washes Money for the World’s Deadliest Crooks</p>
<ul><li>(00:00) - PreShow Banter™ — Nine Years for Chicken Wings</li>
<li>(08:19) - BHIS - Talkin' Bout [infosec] News 2024-08-19</li>
<li>(09:02) - Story # 1: NationalPublicData.com Hack Exposes a Nation’s Data</li>
<li>(18:17) - Story # 1b: National Public Data Published Its Own Passwords</li>
<li>(25:01) - Story # 2: RansomHub Group Deploys New EDR-Killing Tool in Latest Cyber Attacks</li>
<li>(26:52) - Story # 3: T-Mobile fined $60 million for failing to stop data breaches</li>
<li>(34:02) - Story # 4: Massive Cyber Attack On AWS Targets 230 Million Unique Cloud Environments</li>
<li>(45:42) - Story # 5: The US wants to use facial recognition to identify migrant children as they age</li>
<li>(54:16) - Story # 6: Six ransomware gangs behind over 50% of 2024 attacks</li>
<li>(59:55) - Story # 7: US accuses man of being 'elite' ransomware pioneer they've hunted for years</li>
<li>(01:01:56) - Rinsed: From Cartels to Crypto: How the Tech Industry Washes Money for the World's Deadliest Crooks</li>
</ul>]]>
      </description>
      <content:encoded>
        <![CDATA[<p>00:00:00 - PreShow Banter™ — Nine Years for Chicken Wings</p><p>00:08:19 - BHIS - Talkin’ Bout [infosec] News 2024-08-19</p><p>00:09:03 - Story # 1: NationalPublicData.com Hack Exposes a Nation’s Data</p><p>00:18:17 - Story # 1b: National Public Data Published Its Own Passwords</p><p>00:25:01 - Story # 2: RansomHub Group Deploys New EDR-Killing Tool in Latest Cyber Attacks</p><p>00:26:52 - Story # 3: T-Mobile fined $60 million for failing to stop data breaches</p><p>00:34:03 - Story # 4: Massive Cyber Attack On AWS Targets 230 Million Unique Cloud Environments</p><p>00:45:43 - Story # 5: The US wants to use facial recognition to identify migrant children as they age</p><p>00:54:16 - Story # 6: Six ransomware gangs behind over 50% of 2024 attacks</p><p>00:59:56 - Story # 7: US accuses man of being ‘elite’ ransomware pioneer they’ve hunted for years</p><p>01:01:57 - Rinsed: From Cartels to Crypto: How the Tech Industry Washes Money for the World’s Deadliest Crooks</p>
<ul><li>(00:00) - PreShow Banter™ — Nine Years for Chicken Wings</li>
<li>(08:19) - BHIS - Talkin' Bout [infosec] News 2024-08-19</li>
<li>(09:02) - Story # 1: NationalPublicData.com Hack Exposes a Nation’s Data</li>
<li>(18:17) - Story # 1b: National Public Data Published Its Own Passwords</li>
<li>(25:01) - Story # 2: RansomHub Group Deploys New EDR-Killing Tool in Latest Cyber Attacks</li>
<li>(26:52) - Story # 3: T-Mobile fined $60 million for failing to stop data breaches</li>
<li>(34:02) - Story # 4: Massive Cyber Attack On AWS Targets 230 Million Unique Cloud Environments</li>
<li>(45:42) - Story # 5: The US wants to use facial recognition to identify migrant children as they age</li>
<li>(54:16) - Story # 6: Six ransomware gangs behind over 50% of 2024 attacks</li>
<li>(59:55) - Story # 7: US accuses man of being 'elite' ransomware pioneer they've hunted for years</li>
<li>(01:01:56) - Rinsed: From Cartels to Crypto: How the Tech Industry Washes Money for the World's Deadliest Crooks</li>
</ul>]]>
      </content:encoded>
      <pubDate>Wed, 21 Aug 2024 12:00:00 -0400</pubDate>
      <author>Black Hills Information Security</author>
      <enclosure url="https://media.transistor.fm/02f62a42/ab3aa1ae.mp3" length="64069968" type="audio/mpeg"/>
      <itunes:author>Black Hills Information Security</itunes:author>
      <itunes:image href="https://img.transistorcdn.com/ikoxyugG3dMdpB1QIhNij2C6ZsuQKSpssbrX9dOnt7g/rs:fill:0:0:1/w:1400/h:1400/q:60/mb:500000/aHR0cHM6Ly9pbWct/dXBsb2FkLXByb2R1/Y3Rpb24udHJhbnNp/c3Rvci5mbS8yZDIz/ZmUyNGRkZGQyM2Fk/OWQ4YmI2OTY0ODYy/ZDA4Ny5qcGc.jpg"/>
      <itunes:duration>3875</itunes:duration>
      <itunes:summary>00:00:00 - PreShow Banter™ — Nine Years for Chicken Wings00:08:19 - BHIS - Talkin’ Bout [infosec] News 2024-08-1900:09:03 - Story # 1: NationalPublicData.com Hack Exposes a Nation’s Data00:18:17 - Story # 1b: National Public Data Published Its Own Passwords00:25:01 - Story # 2: RansomHub Group Deploys New EDR-Killing Tool in Latest Cyber Attacks00:26:52 - Story # 3: T-Mobile fined $60 million for failing to stop data breaches00:34:03 - Story # 4: Massive Cyber Attack On AWS Targets 230 Million Unique Cloud Environments00:45:43 - Story # 5: The US wants to use facial recognition to identify migrant children as they age00:54:16 - Story # 6: Six ransomware gangs behind over 50% of 2024 attacks00:59:56 - Story # 7: US accuses man of being ‘elite’ ransomware pioneer they’ve hunted for years01:01:57 - Rinsed: From Cartels to Crypto: How the Tech Industry Washes Money for the World’s Deadliest Crooks</itunes:summary>
      <itunes:subtitle>00:00:00 - PreShow Banter™ — Nine Years for Chicken Wings00:08:19 - BHIS - Talkin’ Bout [infosec] News 2024-08-1900:09:03 - Story # 1: NationalPublicData.com Hack Exposes a Nation’s Data00:18:17 - Story # 1b: National Public Data Published Its Own Passwor</itunes:subtitle>
      <itunes:keywords>Infosec,Cybersecurity,news</itunes:keywords>
      <itunes:explicit>No</itunes:explicit>
      <podcast:chapters url="https://share.transistor.fm/s/02f62a42/chapters.json" type="application/json+chapters"/>
    </item>
    <item>
      <title>2024-08-12 — Scotty's Pizza (Not Sponsored)</title>
      <itunes:episode>1</itunes:episode>
      <podcast:episode>1</podcast:episode>
      <itunes:title>2024-08-12 — Scotty's Pizza (Not Sponsored)</itunes:title>
      <itunes:episodeType>full</itunes:episodeType>
      <guid isPermaLink="false">https://blubrry.com/bhis/134830779/2024-08-12-scottys-pizza-not-sponsored/</guid>
      <link>https://share.transistor.fm/s/fd54386b</link>
      <description>
        <![CDATA[<p>00:00 - PreShow Banter™ — Scotty’s Pizza (Not Sponsored)</p><p>03:38 - BHIS - Talkin’ Bout [infosec] News 2024-08-12</p><p>03:59 - Hacker Summer Camp Report 2024</p><p>08:56 - Story # 1: ‘Sinkclose’ Flaw in Hundreds of Millions of AMD Chips Allows Deep, Virtually Unfixable Infections</p><p>14:26 - Story # 2: Black Hat USA 2024, DEF CON 32 attendees treated like children – or criminals – with invasive hotel room checks</p><p>29:49 - Story # 3: DEF CON Badge Maker Pulled Off Stage Amid Claims of Non-Payment and Failed Work</p><p>30:06 - New raspberry pi chip in badge</p><p>33:31 - Story # 4: Exploit released for Cisco SSM bug allowing admin password changes</p><p>34:12 - Story # 5: 0.0.0.0 Day: Exploiting Localhost APIs From the Browser</p><p>38:02 - Story # 6: Intelligence bill would elevate ransomware to a terrorist threat</p><p>44:36 - Story # 6b: Proposed bill would block large ransomware payments by financial institutions</p><p>46:26 - Story # 6c: Report shows decreased ransomware payments</p><p>54:26 - Story # 7: After global IT meltdown, CrowdStrike courts hackers with action figures and gratitude</p><p>55:12 - Story # 8: CrowdStrike pursuing deal to buy patch management specialist Action1</p><p>57:24 - Story # 9: Microsoft punches back at Delta Air Lines and its legal threats</p>
<ul><li>(00:00) - PreShow Banter™ — Scotty's Pizza (Not Sponsored)</li>
<li>(03:38) - BHIS - Talkin' Bout [infosec] News 2024-08-12</li>
<li>(03:59) - Hacker Summer Camp Report 2024</li>
<li>(08:55) - Story # 1: ‘Sinkclose’ Flaw in Hundreds of Millions of AMD Chips Allows Deep, Virtually Unfixable Infections</li>
<li>(14:25) - Story # 2: Black Hat USA 2024, DEF CON 32 attendees treated like children – or criminals – with invasive hotel room checks</li>
<li>(29:49) - Story # 3: DEF CON Badge Maker Pulled Off Stage Amid Claims of Non-Payment and Failed Work</li>
<li>(30:05) - New raspberry pi chip in badge</li>
<li>(33:31) - Story # 4: Exploit released for Cisco SSM bug allowing admin password changes</li>
<li>(34:11) - Story # 5: 0.0.0.0 Day: Exploiting Localhost APIs From the Browser</li>
<li>(38:02) - Story # 6: Intelligence bill would elevate ransomware to a terrorist threat</li>
<li>(44:35) - Story # 6b: Proposed bill would block large ransomware payments by financial institutions</li>
<li>(46:26) - Story # 6c: Report shows decreased ransomware payments</li>
<li>(54:26) - Story # 7: After global IT meltdown, CrowdStrike courts hackers with action figures and gratitude</li>
<li>(55:11) - Story # 8: CrowdStrike pursuing deal to buy patch management specialist Action1</li>
<li>(57:24) - Story # 9: Microsoft punches back at Delta Air Lines and its legal threats</li>
</ul>]]>
      </description>
      <content:encoded>
        <![CDATA[<p>00:00 - PreShow Banter™ — Scotty’s Pizza (Not Sponsored)</p><p>03:38 - BHIS - Talkin’ Bout [infosec] News 2024-08-12</p><p>03:59 - Hacker Summer Camp Report 2024</p><p>08:56 - Story # 1: ‘Sinkclose’ Flaw in Hundreds of Millions of AMD Chips Allows Deep, Virtually Unfixable Infections</p><p>14:26 - Story # 2: Black Hat USA 2024, DEF CON 32 attendees treated like children – or criminals – with invasive hotel room checks</p><p>29:49 - Story # 3: DEF CON Badge Maker Pulled Off Stage Amid Claims of Non-Payment and Failed Work</p><p>30:06 - New raspberry pi chip in badge</p><p>33:31 - Story # 4: Exploit released for Cisco SSM bug allowing admin password changes</p><p>34:12 - Story # 5: 0.0.0.0 Day: Exploiting Localhost APIs From the Browser</p><p>38:02 - Story # 6: Intelligence bill would elevate ransomware to a terrorist threat</p><p>44:36 - Story # 6b: Proposed bill would block large ransomware payments by financial institutions</p><p>46:26 - Story # 6c: Report shows decreased ransomware payments</p><p>54:26 - Story # 7: After global IT meltdown, CrowdStrike courts hackers with action figures and gratitude</p><p>55:12 - Story # 8: CrowdStrike pursuing deal to buy patch management specialist Action1</p><p>57:24 - Story # 9: Microsoft punches back at Delta Air Lines and its legal threats</p>
<ul><li>(00:00) - PreShow Banter™ — Scotty's Pizza (Not Sponsored)</li>
<li>(03:38) - BHIS - Talkin' Bout [infosec] News 2024-08-12</li>
<li>(03:59) - Hacker Summer Camp Report 2024</li>
<li>(08:55) - Story # 1: ‘Sinkclose’ Flaw in Hundreds of Millions of AMD Chips Allows Deep, Virtually Unfixable Infections</li>
<li>(14:25) - Story # 2: Black Hat USA 2024, DEF CON 32 attendees treated like children – or criminals – with invasive hotel room checks</li>
<li>(29:49) - Story # 3: DEF CON Badge Maker Pulled Off Stage Amid Claims of Non-Payment and Failed Work</li>
<li>(30:05) - New raspberry pi chip in badge</li>
<li>(33:31) - Story # 4: Exploit released for Cisco SSM bug allowing admin password changes</li>
<li>(34:11) - Story # 5: 0.0.0.0 Day: Exploiting Localhost APIs From the Browser</li>
<li>(38:02) - Story # 6: Intelligence bill would elevate ransomware to a terrorist threat</li>
<li>(44:35) - Story # 6b: Proposed bill would block large ransomware payments by financial institutions</li>
<li>(46:26) - Story # 6c: Report shows decreased ransomware payments</li>
<li>(54:26) - Story # 7: After global IT meltdown, CrowdStrike courts hackers with action figures and gratitude</li>
<li>(55:11) - Story # 8: CrowdStrike pursuing deal to buy patch management specialist Action1</li>
<li>(57:24) - Story # 9: Microsoft punches back at Delta Air Lines and its legal threats</li>
</ul>]]>
      </content:encoded>
      <pubDate>Wed, 14 Aug 2024 11:56:42 -0400</pubDate>
      <author>Black Hills Information Security</author>
      <enclosure url="https://media.transistor.fm/fd54386b/f426dec8.mp3" length="62695703" type="audio/mpeg"/>
      <itunes:author>Black Hills Information Security</itunes:author>
      <itunes:image href="https://img.transistorcdn.com/s2Uhk2DRLdwM2LB5tnjjJzhgL7K9Em-mtIATjHd1m1s/rs:fill:0:0:1/w:1400/h:1400/q:60/mb:500000/aHR0cHM6Ly9pbWct/dXBsb2FkLXByb2R1/Y3Rpb24udHJhbnNp/c3Rvci5mbS85NDdi/MzY2MDE0ZWM3Yzlk/OGU0NDA2MGYxZDYz/Y2FlMi5qcGc.jpg"/>
      <itunes:duration>3769</itunes:duration>
      <itunes:summary>00:00 - PreShow Banter™ — Scotty’s Pizza (Not Sponsored)03:38 - BHIS - Talkin’ Bout [infosec] News 2024-08-1203:59 - Hacker Summer Camp Report 202408:56 - Story # 1: ‘Sinkclose’ Flaw in Hundreds of Millions of AMD Chips Allows Deep, Virtually Unfixable Infections14:26 - Story # 2: Black Hat USA 2024, DEF CON 32 attendees treated like children – or criminals – with invasive hotel room checks29:49 - Story # 3: DEF CON Badge Maker Pulled Off Stage Amid Claims of Non-Payment and Failed Work30:06 - New raspberry pi chip in badge33:31 - Story # 4: Exploit released for Cisco SSM bug allowing admin password changes34:12 - Story # 5: 0.0.0.0 Day: Exploiting Localhost APIs From the Browser38:02 - Story # 6: Intelligence bill would elevate ransomware to a terrorist threat44:36 - Story # 6b: Proposed bill would block large ransomware payments by financial institutions46:26 - Story # 6c: Report shows decreased ransomware payments54:26 - Story # 7: After global IT meltdown, CrowdStrike courts hackers with action figures and gratitude55:12 - Story # 8: CrowdStrike pursuing deal to buy patch management specialist Action157:24 - Story # 9: Microsoft punches back at Delta Air Lines and its legal threats</itunes:summary>
      <itunes:subtitle>00:00 - PreShow Banter™ — Scotty’s Pizza (Not Sponsored)03:38 - BHIS - Talkin’ Bout [infosec] News 2024-08-1203:59 - Hacker Summer Camp Report 202408:56 - Story # 1: ‘Sinkclose’ Flaw in Hundreds of Millions of AMD Chips Allows Deep, Virtually Unfixable In</itunes:subtitle>
      <itunes:keywords>Infosec,Cybersecurity,news</itunes:keywords>
      <itunes:explicit>No</itunes:explicit>
      <podcast:chapters url="https://share.transistor.fm/s/fd54386b/chapters.json" type="application/json+chapters"/>
    </item>
    <item>
      <title>2024-08-05 - What's the f_____</title>
      <itunes:episode>1</itunes:episode>
      <podcast:episode>1</podcast:episode>
      <itunes:title>2024-08-05 - What's the f_____</itunes:title>
      <itunes:episodeType>full</itunes:episodeType>
      <guid isPermaLink="false">https://blubrry.com/bhis/134387725/2024-08-05-whats-the-f_____/</guid>
      <link>https://share.transistor.fm/s/585addb9</link>
      <description>
        <![CDATA[<p>00:00 - PreShow Banter™ — What’s the f___</p><p>03:34 - BHIS - Talkin’ Bout [infosec] News 2024-08-05</p><p>06:57 - Story # 1: Proofpoint Email Routing Flaw Exploited to Send Millions of Spoofed Phishing Emails</p><p>23:57 - Story # 2: Bumble and Hinge allowed stalkers to pinpoint users’ locations down to 2 meters, researchers say</p><p>36:47 - Story # 3: Eavesdropping on HDMI cables can reveal computer screen’s content</p><p>37:43 - Story # 3b Hak5 Screen Crab</p><p>39:18 - Story # 4: Microsoft says massive Azure outage was caused by DDoS attack</p><p>43:31 - Story # 5: CrowdStrike says it’s not to blame for Delta’s days-long outage</p><p>55:34 - Story # 6: CrowdStrike sued by investors over massive global IT outage</p>
<ul><li>(00:00) - PreShow Banter™ — What's the f___</li>
<li>(03:34) - BHIS - Talkin' Bout [infosec] News 2024-08-05</li>
<li>(06:57) - Story # 1: Proofpoint Email Routing Flaw Exploited to Send Millions of Spoofed Phishing Emails</li>
<li>(23:57) - Story # 2: Bumble and Hinge allowed stalkers to pinpoint users’ locations down to 2 meters, researchers say</li>
<li>(36:47) - Story # 3: Eavesdropping on HDMI cables can reveal computer screen’s content</li>
<li>(37:43) - Story # 3b Hak5 Screen Crab</li>
<li>(39:18) - Story # 4: Microsoft says massive Azure outage was caused by DDoS attack</li>
<li>(43:31) - Story # 5: CrowdStrike says it’s not to blame for Delta’s days-long outage</li>
<li>(55:34) - Story # 6: CrowdStrike sued by investors over massive global IT outage</li>
</ul>]]>
      </description>
      <content:encoded>
        <![CDATA[<p>00:00 - PreShow Banter™ — What’s the f___</p><p>03:34 - BHIS - Talkin’ Bout [infosec] News 2024-08-05</p><p>06:57 - Story # 1: Proofpoint Email Routing Flaw Exploited to Send Millions of Spoofed Phishing Emails</p><p>23:57 - Story # 2: Bumble and Hinge allowed stalkers to pinpoint users’ locations down to 2 meters, researchers say</p><p>36:47 - Story # 3: Eavesdropping on HDMI cables can reveal computer screen’s content</p><p>37:43 - Story # 3b Hak5 Screen Crab</p><p>39:18 - Story # 4: Microsoft says massive Azure outage was caused by DDoS attack</p><p>43:31 - Story # 5: CrowdStrike says it’s not to blame for Delta’s days-long outage</p><p>55:34 - Story # 6: CrowdStrike sued by investors over massive global IT outage</p>
<ul><li>(00:00) - PreShow Banter™ — What's the f___</li>
<li>(03:34) - BHIS - Talkin' Bout [infosec] News 2024-08-05</li>
<li>(06:57) - Story # 1: Proofpoint Email Routing Flaw Exploited to Send Millions of Spoofed Phishing Emails</li>
<li>(23:57) - Story # 2: Bumble and Hinge allowed stalkers to pinpoint users’ locations down to 2 meters, researchers say</li>
<li>(36:47) - Story # 3: Eavesdropping on HDMI cables can reveal computer screen’s content</li>
<li>(37:43) - Story # 3b Hak5 Screen Crab</li>
<li>(39:18) - Story # 4: Microsoft says massive Azure outage was caused by DDoS attack</li>
<li>(43:31) - Story # 5: CrowdStrike says it’s not to blame for Delta’s days-long outage</li>
<li>(55:34) - Story # 6: CrowdStrike sued by investors over massive global IT outage</li>
</ul>]]>
      </content:encoded>
      <pubDate>Tue, 06 Aug 2024 17:00:00 -0400</pubDate>
      <author>Black Hills Information Security</author>
      <enclosure url="https://media.transistor.fm/585addb9/a373dc9d.mp3" length="62723990" type="audio/mpeg"/>
      <itunes:author>Black Hills Information Security</itunes:author>
      <itunes:image href="https://img.transistorcdn.com/T8rnbuRsWR2JwdorAmJutDinkbOWBY1yk8IKiF1jxqo/rs:fill:0:0:1/w:1400/h:1400/q:60/mb:500000/aHR0cHM6Ly9pbWct/dXBsb2FkLXByb2R1/Y3Rpb24udHJhbnNp/c3Rvci5mbS9mYzdm/MmNhNGE4OTY0Nzgw/NjEwNDFjYTUwNTE5/MzFiYy5qcGc.jpg"/>
      <itunes:duration>3788</itunes:duration>
      <itunes:summary>00:00 - PreShow Banter™ — What’s the f___03:34 - BHIS - Talkin’ Bout [infosec] News 2024-08-0506:57 - Story # 1: Proofpoint Email Routing Flaw Exploited to Send Millions of Spoofed Phishing Emails23:57 - Story # 2: Bumble and Hinge allowed stalkers to pinpoint users’ locations down to 2 meters, researchers say36:47 - Story # 3: Eavesdropping on HDMI cables can reveal computer screen’s content37:43 - Story # 3b Hak5 Screen Crab39:18 - Story # 4: Microsoft says massive Azure outage was caused by DDoS attack43:31 - Story # 5: CrowdStrike says it’s not to blame for Delta’s days-long outage55:34 - Story # 6: CrowdStrike sued by investors over massive global IT outage</itunes:summary>
      <itunes:subtitle>00:00 - PreShow Banter™ — What’s the f___03:34 - BHIS - Talkin’ Bout [infosec] News 2024-08-0506:57 - Story # 1: Proofpoint Email Routing Flaw Exploited to Send Millions of Spoofed Phishing Emails23:57 - Story # 2: Bumble and Hinge allowed stalkers to pin</itunes:subtitle>
      <itunes:keywords>Infosec,Cybersecurity,news</itunes:keywords>
      <itunes:explicit>No</itunes:explicit>
      <podcast:chapters url="https://share.transistor.fm/s/585addb9/chapters.json" type="application/json+chapters"/>
    </item>
    <item>
      <title>2024-07-29 - Microsoft Sad Face</title>
      <itunes:episode>1</itunes:episode>
      <podcast:episode>1</podcast:episode>
      <itunes:title>2024-07-29 - Microsoft Sad Face</itunes:title>
      <itunes:episodeType>full</itunes:episodeType>
      <guid isPermaLink="false">https://blubrry.com/bhis/2024-07-29-microsoft-sad-face/</guid>
      <link>https://share.transistor.fm/s/9e6ae9fa</link>
      <description>
        <![CDATA[<p>00:00 - PreShow Banter™ — Microsoft Sad Face</p><p>02:13 - BHIS - Talkin’ Bout [infosec] News 2024-07-29</p><p>03:08 - Story # 1: Fake CrowdStrike repair manual pushes new infostealer malware</p><p>15:26 - Story # 1b: 83-year-old man found safe a week after going missing when CrowdStrike outage canceled flight</p><p>20:39 - Story # 2: Multifactor Authentication Is Not Enough to Protect Cloud Data</p><p>38:59 - Graphrunner</p><p>47:19 - Story # 3: Data pilfered from Pentagon IT supplier Leidos</p><p>57:57 - Story # 4: How a North Korean Fake IT Worker Tried to Infiltrate Us</p>
<ul><li>(00:00) - PreShow Banter™ — Microsoft Sad Face</li>
<li>(02:13) - BHIS - Talkin' Bout [infosec] News 2024-07-29</li>
<li>(03:08) - Story # 1: Fake CrowdStrike repair manual pushes new infostealer malware</li>
<li>(15:26) - Story # 1b: 83-year-old man found safe a week after going missing when CrowdStrike outage canceled flight</li>
<li>(20:39) - Story # 2: Multifactor Authentication Is Not Enough to Protect Cloud Data</li>
<li>(38:59) - Graphrunner</li>
<li>(47:19) - Story # 3: Data pilfered from Pentagon IT supplier Leidos</li>
<li>(57:57) - Story # 4: How a North Korean Fake IT Worker Tried to Infiltrate Us</li>
</ul>]]>
      </description>
      <content:encoded>
        <![CDATA[<p>00:00 - PreShow Banter™ — Microsoft Sad Face</p><p>02:13 - BHIS - Talkin’ Bout [infosec] News 2024-07-29</p><p>03:08 - Story # 1: Fake CrowdStrike repair manual pushes new infostealer malware</p><p>15:26 - Story # 1b: 83-year-old man found safe a week after going missing when CrowdStrike outage canceled flight</p><p>20:39 - Story # 2: Multifactor Authentication Is Not Enough to Protect Cloud Data</p><p>38:59 - Graphrunner</p><p>47:19 - Story # 3: Data pilfered from Pentagon IT supplier Leidos</p><p>57:57 - Story # 4: How a North Korean Fake IT Worker Tried to Infiltrate Us</p>
<ul><li>(00:00) - PreShow Banter™ — Microsoft Sad Face</li>
<li>(02:13) - BHIS - Talkin' Bout [infosec] News 2024-07-29</li>
<li>(03:08) - Story # 1: Fake CrowdStrike repair manual pushes new infostealer malware</li>
<li>(15:26) - Story # 1b: 83-year-old man found safe a week after going missing when CrowdStrike outage canceled flight</li>
<li>(20:39) - Story # 2: Multifactor Authentication Is Not Enough to Protect Cloud Data</li>
<li>(38:59) - Graphrunner</li>
<li>(47:19) - Story # 3: Data pilfered from Pentagon IT supplier Leidos</li>
<li>(57:57) - Story # 4: How a North Korean Fake IT Worker Tried to Infiltrate Us</li>
</ul>]]>
      </content:encoded>
      <pubDate>Wed, 31 Jul 2024 12:00:00 -0400</pubDate>
      <author>Black Hills Information Security</author>
      <enclosure url="https://media.transistor.fm/9e6ae9fa/42810bb7.mp3" length="59394613" type="audio/mpeg"/>
      <itunes:author>Black Hills Information Security</itunes:author>
      <itunes:image href="https://img.transistorcdn.com/0NNp4vVP_xeVHbXHiJNlYgJvZGgi10xUR4dXcNwiH-8/rs:fill:0:0:1/w:1400/h:1400/q:60/mb:500000/aHR0cHM6Ly9pbWct/dXBsb2FkLXByb2R1/Y3Rpb24udHJhbnNp/c3Rvci5mbS8zN2Jm/ZTM2NDcwMjJhMWEy/YTYxZjc2MzVmNGU4/NTBhMS5qcGc.jpg"/>
      <itunes:duration>3613</itunes:duration>
      <itunes:summary>00:00 - PreShow Banter™ — Microsoft Sad Face02:13 - BHIS - Talkin’ Bout [infosec] News 2024-07-2903:08 - Story # 1: Fake CrowdStrike repair manual pushes new infostealer malware15:26 - Story # 1b: 83-year-old man found safe a week after going missing when CrowdStrike outage canceled flight20:39 - Story # 2: Multifactor Authentication Is Not Enough to Protect Cloud Data38:59 - Graphrunner47:19 - Story # 3: Data pilfered from Pentagon IT supplier Leidos57:57 - Story # 4: How a North Korean Fake IT Worker Tried to Infiltrate Us</itunes:summary>
      <itunes:subtitle>00:00 - PreShow Banter™ — Microsoft Sad Face02:13 - BHIS - Talkin’ Bout [infosec] News 2024-07-2903:08 - Story # 1: Fake CrowdStrike repair manual pushes new infostealer malware15:26 - Story # 1b: 83-year-old man found safe a week after going missing when</itunes:subtitle>
      <itunes:keywords>Infosec,Cybersecurity,news</itunes:keywords>
      <itunes:explicit>No</itunes:explicit>
      <podcast:transcript url="https://share.transistor.fm/s/9e6ae9fa/transcript.srt" type="application/x-subrip" rel="captions"/>
      <podcast:transcript url="https://share.transistor.fm/s/9e6ae9fa/transcript.txt" type="text/plain"/>
      <podcast:chapters url="https://share.transistor.fm/s/9e6ae9fa/chapters.json" type="application/json+chapters"/>
    </item>
    <item>
      <title>2024-07-24 - CrowdStroke Memes</title>
      <itunes:episode>1</itunes:episode>
      <podcast:episode>1</podcast:episode>
      <itunes:title>2024-07-24 - CrowdStroke Memes</itunes:title>
      <itunes:episodeType>full</itunes:episodeType>
      <guid isPermaLink="false">https://blubrry.com/bhis/133447482/2024-07-24-crowdstroke-memes/</guid>
      <link>https://share.transistor.fm/s/5df2cf7b</link>
      <description>
        <![CDATA[<p>00:00 - PreShow Banter™ — CrowdStroke Memes</p><p>05:59 - BHIS - Talkin’ Bout [infosec] News 2024-07-22</p><p>07:01 - Story # 1: A Windows version from 1992 is saving Southwest’s butt right now</p><p>07:36 - Crowdstrike Global Outage - BHIS - Talkin’ Bout [infosec] #News</p><p>09:48 - Story # 1b: CrowdStrike’s faulty update crashed 8.5 million Windows devices, says Microsoft</p><p>12:13 - Story # 1c: Let’s blame the dev who pressed “Deploy”</p><p>17:23 - Figure 1</p><p>22:14 - Story # 2: DHS Has a DoS Robot to Disable Internet of Things ‘Booby Traps’ Inside Homes</p><p>25:58 - Story # 3: Notorious Hacker Kingpin ‘Tank’ Is Finally Going to Prison</p><p>28:08 - Story # 4: UK Police Arrest Suspect in MGM Ransomware Attack</p><p>30:49 - Story # 5: Russians plead guilty to involvement in LockBit ransomware attacks</p><p>33:24 - Story # 6: DHS watchdog rebukes CISA and law enforcement training center for failing to protect data</p><p>38:32 - Story # 7: Yacht giant MarineMax data breach impacts over 123,000 people</p><p>40:38 - Story # 8: Sizable Chunk of SEC Charges Against SolarWinds Tossed Out of Court</p><p>47:14 - Story # 9: The US Supreme Court Kneecapped US Cyber Strategy</p><p>52:12 - Story # 10: War Thunder does it again, this time with classified documents relating to 3 Russian tanks</p>
<ul><li>(00:00) - PreShow Banter™ — CrowdStroke Memes</li>
<li>(05:59) - BHIS - Talkin' Bout [infosec] News 2024-07-22</li>
<li>(07:01) - Story # 1: A Windows version from 1992 is saving Southwest’s butt right now</li>
<li>(07:36) - Crowdstrike Global Outage - BHIS - Talkin' Bout [infosec] #News</li>
<li>(09:48) - Story # 1b: CrowdStrike’s faulty update crashed 8.5 million Windows devices, says Microsoft</li>
<li>(12:13) - Story # 1c: Let's blame the dev who pressed "Deploy"</li>
<li>(17:23) - Figure 1</li>
<li>(22:14) - Story # 2: DHS Has a DoS Robot to Disable Internet of Things ‘Booby Traps’ Inside Homes</li>
<li>(25:58) - Story # 3: Notorious Hacker Kingpin ‘Tank’ Is Finally Going to Prison</li>
<li>(28:08) - Story # 4: UK Police Arrest Suspect in MGM Ransomware Attack</li>
<li>(30:49) - Story # 5: Russians plead guilty to involvement in LockBit ransomware attacks</li>
<li>(33:24) - Story # 6: DHS watchdog rebukes CISA and law enforcement training center for failing to protect data</li>
<li>(38:32) - Story # 7: Yacht giant MarineMax data breach impacts over 123,000 people</li>
<li>(40:38) - Story # 8: Sizable Chunk of SEC Charges Against SolarWinds Tossed Out of Court</li>
<li>(47:14) - Story # 9: The US Supreme Court Kneecapped US Cyber Strategy</li>
<li>(52:12) - Story # 10: War Thunder does it again, this time with classified documents relating to 3 Russian tanks</li>
</ul>]]>
      </description>
      <content:encoded>
        <![CDATA[<p>00:00 - PreShow Banter™ — CrowdStroke Memes</p><p>05:59 - BHIS - Talkin’ Bout [infosec] News 2024-07-22</p><p>07:01 - Story # 1: A Windows version from 1992 is saving Southwest’s butt right now</p><p>07:36 - Crowdstrike Global Outage - BHIS - Talkin’ Bout [infosec] #News</p><p>09:48 - Story # 1b: CrowdStrike’s faulty update crashed 8.5 million Windows devices, says Microsoft</p><p>12:13 - Story # 1c: Let’s blame the dev who pressed “Deploy”</p><p>17:23 - Figure 1</p><p>22:14 - Story # 2: DHS Has a DoS Robot to Disable Internet of Things ‘Booby Traps’ Inside Homes</p><p>25:58 - Story # 3: Notorious Hacker Kingpin ‘Tank’ Is Finally Going to Prison</p><p>28:08 - Story # 4: UK Police Arrest Suspect in MGM Ransomware Attack</p><p>30:49 - Story # 5: Russians plead guilty to involvement in LockBit ransomware attacks</p><p>33:24 - Story # 6: DHS watchdog rebukes CISA and law enforcement training center for failing to protect data</p><p>38:32 - Story # 7: Yacht giant MarineMax data breach impacts over 123,000 people</p><p>40:38 - Story # 8: Sizable Chunk of SEC Charges Against SolarWinds Tossed Out of Court</p><p>47:14 - Story # 9: The US Supreme Court Kneecapped US Cyber Strategy</p><p>52:12 - Story # 10: War Thunder does it again, this time with classified documents relating to 3 Russian tanks</p>
<ul><li>(00:00) - PreShow Banter™ — CrowdStroke Memes</li>
<li>(05:59) - BHIS - Talkin' Bout [infosec] News 2024-07-22</li>
<li>(07:01) - Story # 1: A Windows version from 1992 is saving Southwest’s butt right now</li>
<li>(07:36) - Crowdstrike Global Outage - BHIS - Talkin' Bout [infosec] #News</li>
<li>(09:48) - Story # 1b: CrowdStrike’s faulty update crashed 8.5 million Windows devices, says Microsoft</li>
<li>(12:13) - Story # 1c: Let's blame the dev who pressed "Deploy"</li>
<li>(17:23) - Figure 1</li>
<li>(22:14) - Story # 2: DHS Has a DoS Robot to Disable Internet of Things ‘Booby Traps’ Inside Homes</li>
<li>(25:58) - Story # 3: Notorious Hacker Kingpin ‘Tank’ Is Finally Going to Prison</li>
<li>(28:08) - Story # 4: UK Police Arrest Suspect in MGM Ransomware Attack</li>
<li>(30:49) - Story # 5: Russians plead guilty to involvement in LockBit ransomware attacks</li>
<li>(33:24) - Story # 6: DHS watchdog rebukes CISA and law enforcement training center for failing to protect data</li>
<li>(38:32) - Story # 7: Yacht giant MarineMax data breach impacts over 123,000 people</li>
<li>(40:38) - Story # 8: Sizable Chunk of SEC Charges Against SolarWinds Tossed Out of Court</li>
<li>(47:14) - Story # 9: The US Supreme Court Kneecapped US Cyber Strategy</li>
<li>(52:12) - Story # 10: War Thunder does it again, this time with classified documents relating to 3 Russian tanks</li>
</ul>]]>
      </content:encoded>
      <pubDate>Wed, 24 Jul 2024 12:00:00 -0400</pubDate>
      <author>Black Hills Information Security</author>
      <enclosure url="https://media.transistor.fm/5df2cf7b/e08e6d95.mp3" length="59969570" type="audio/mpeg"/>
      <itunes:author>Black Hills Information Security</itunes:author>
      <itunes:image href="https://img.transistorcdn.com/9kK1AFa9jExdi7Nts7apwlx7GkNB_m5-oCw7T3raQG0/rs:fill:0:0:1/w:1400/h:1400/q:60/mb:500000/aHR0cHM6Ly9pbWct/dXBsb2FkLXByb2R1/Y3Rpb24udHJhbnNp/c3Rvci5mbS9iNmRm/MjU2NjgyZmU0Y2U1/YjU0MzQxYzk1NTI0/YzljNi5qcGc.jpg"/>
      <itunes:duration>3525</itunes:duration>
      <itunes:summary>00:00 - PreShow Banter™ — CrowdStroke Memes05:59 - BHIS - Talkin’ Bout [infosec] News 2024-07-2207:01 - Story # 1: A Windows version from 1992 is saving Southwest’s butt right now07:36 - Crowdstrike Global Outage - BHIS - Talkin’ Bout [infosec] #News09:48 - Story # 1b: CrowdStrike’s faulty update crashed 8.5 million Windows devices, says Microsoft12:13 - Story # 1c: Let’s blame the dev who pressed “Deploy”17:23 - Figure 122:14 - Story # 2: DHS Has a DoS Robot to Disable Internet of Things ‘Booby Traps’ Inside Homes25:58 - Story # 3: Notorious Hacker Kingpin ‘Tank’ Is Finally Going to Prison28:08 - Story # 4: UK Police Arrest Suspect in MGM Ransomware Attack30:49 - Story # 5: Russians plead guilty to involvement in LockBit ransomware attacks33:24 - Story # 6: DHS watchdog rebukes CISA and law enforcement training center for failing to protect data38:32 - Story # 7: Yacht giant MarineMax data breach impacts over 123,000 people40:38 - Story # 8: Sizable Chunk of SEC Charges Against SolarWinds Tossed Out of Court47:14 - Story # 9: The US Supreme Court Kneecapped US Cyber Strategy52:12 - Story # 10: War Thunder does it again, this time with classified documents relating to 3 Russian tanks</itunes:summary>
      <itunes:subtitle>00:00 - PreShow Banter™ — CrowdStroke Memes05:59 - BHIS - Talkin’ Bout [infosec] News 2024-07-2207:01 - Story # 1: A Windows version from 1992 is saving Southwest’s butt right now07:36 - Crowdstrike Global Outage - BHIS - Talkin’ Bout [infosec] #News09:48</itunes:subtitle>
      <itunes:keywords>Infosec,Cybersecurity,news</itunes:keywords>
      <itunes:explicit>No</itunes:explicit>
      <podcast:transcript url="https://share.transistor.fm/s/5df2cf7b/transcript.srt" type="application/x-subrip" rel="captions"/>
      <podcast:transcript url="https://share.transistor.fm/s/5df2cf7b/transcript.txt" type="text/plain"/>
      <podcast:chapters url="https://share.transistor.fm/s/5df2cf7b/chapters.json" type="application/json+chapters"/>
    </item>
    <item>
      <title>2024-07-22 - Crowdstrike Global Outage</title>
      <itunes:episode>1</itunes:episode>
      <podcast:episode>1</podcast:episode>
      <itunes:title>2024-07-22 - Crowdstrike Global Outage</itunes:title>
      <itunes:episodeType>full</itunes:episodeType>
      <guid isPermaLink="false">https://blubrry.com/bhis/133420240/2024-07-22-crowdstrike-global-outage/</guid>
      <link>https://share.transistor.fm/s/bd43fe8e</link>
      <description>
        <![CDATA[<p>The outage of the decade!</p>]]>
      </description>
      <content:encoded>
        <![CDATA[<p>The outage of the decade!</p>]]>
      </content:encoded>
      <pubDate>Mon, 22 Jul 2024 00:00:00 -0400</pubDate>
      <author>Black Hills Information Security</author>
      <enclosure url="https://media.transistor.fm/bd43fe8e/7e7fd238.mp3" length="62268980" type="audio/mpeg"/>
      <itunes:author>Black Hills Information Security</itunes:author>
      <itunes:image href="https://img.transistorcdn.com/b_tQlsd6M3b9PKE6bKsaUqlY4cRRkJkK1Vc6Fgi_hDM/rs:fill:0:0:1/w:1400/h:1400/q:60/mb:500000/aHR0cHM6Ly9pbWct/dXBsb2FkLXByb2R1/Y3Rpb24udHJhbnNp/c3Rvci5mbS8zYTVk/NWEzM2VhYzNhZWQ5/NjM3MTg0NWY1MmEx/Yzk2Zi5qcGc.jpg"/>
      <itunes:duration>3860</itunes:duration>
      <itunes:summary>The outage of the decade!</itunes:summary>
      <itunes:subtitle>The outage of the decade!</itunes:subtitle>
      <itunes:keywords>Infosec,Cybersecurity,news</itunes:keywords>
      <itunes:explicit>No</itunes:explicit>
      <podcast:transcript url="https://share.transistor.fm/s/bd43fe8e/transcript.srt" type="application/x-subrip" rel="captions"/>
      <podcast:transcript url="https://share.transistor.fm/s/bd43fe8e/transcript.txt" type="text/plain"/>
    </item>
    <item>
      <title>2024-07-18 - Absolute Madmen</title>
      <itunes:episode>1</itunes:episode>
      <podcast:episode>1</podcast:episode>
      <itunes:title>2024-07-18 - Absolute Madmen</itunes:title>
      <itunes:episodeType>full</itunes:episodeType>
      <guid isPermaLink="false">https://blubrry.com/bhis/133295939/2024-07-18-absolute-madmen/</guid>
      <link>https://share.transistor.fm/s/9f2778d8</link>
      <description>
        <![CDATA[<p>00:00 - PreShow Banter™ — Absolute Madmen</p><p>02:28 - BHIS - Talkin’ Bout [infosec] News 2024-07-15</p><p>03:18 - Wi-Fi Forge</p><p>07:31 - Story # 1: CISA Red Team’s Operations Against a Federal Civilian Executive Branch Organization Highlights the Necessity of Defense-in-Depth</p><p>22:39 - Story # 2: AT&amp;T says criminals stole phone records of ‘nearly all’ customers in new data breach</p><p>33:35 - Story # 3: FTC study finds ‘dark patterns’ used by a majority of subscription apps and websites</p><p>38:48 - Story # 4: Club Penguin fans breached Disney Confluence server, stole 2.5GB of data</p><p>41:52 - Story # 5: Heritage Foundation Exec Threatens ‘Gay Furry Hackers’ in Unhinged Texts</p><p>47:51 - Story # 6: German Navy to replace aging 8-inch floppy drives with an emulated solution for its anti-submarine frigates</p><p>50:14 - Story # 7: 1.4 GB NSA Data Leaked Online – Email Address, Phone Number &amp; Gov Classified Data Exposed</p><p>53:56 - Story # 8: Hackers Claim to Have Leaked 1.1 TB of Disney Slack Messages</p>
<ul><li>(00:00) - PreShow Banter™ — Absolute Madmen</li>
<li>(02:28) - BHIS - Talkin' Bout [infosec] News 2024-07-15</li>
<li>(03:18) - Wi-Fi Forge</li>
<li>(07:31) - Story # 1: CISA Red Team’s Operations Against a Federal Civilian Executive Branch Organization Highlights the Necessity of Defense-in-Depth</li>
<li>(22:39) - Story # 2: AT&amp;T says criminals stole phone records of ‘nearly all’ customers in new data breach</li>
<li>(33:35) - Story # 3: FTC study finds ‘dark patterns’ used by a majority of subscription apps and websites</li>
<li>(38:48) - Story # 4: Club Penguin fans breached Disney Confluence server, stole 2.5GB of data</li>
<li>(41:52) - Story # 5: Heritage Foundation Exec Threatens ‘Gay Furry Hackers’ in Unhinged Texts</li>
<li>(47:51) - Story # 6: German Navy to replace aging 8-inch floppy drives with an emulated solution for its anti-submarine frigates</li>
<li>(50:14) - Story # 7: 1.4 GB NSA Data Leaked Online – Email Address, Phone Number &amp; Gov Classified Data Exposed</li>
<li>(53:56) - Story # 8: Hackers Claim to Have Leaked 1.1 TB of Disney Slack Messages</li>
</ul>]]>
      </description>
      <content:encoded>
        <![CDATA[<p>00:00 - PreShow Banter™ — Absolute Madmen</p><p>02:28 - BHIS - Talkin’ Bout [infosec] News 2024-07-15</p><p>03:18 - Wi-Fi Forge</p><p>07:31 - Story # 1: CISA Red Team’s Operations Against a Federal Civilian Executive Branch Organization Highlights the Necessity of Defense-in-Depth</p><p>22:39 - Story # 2: AT&amp;T says criminals stole phone records of ‘nearly all’ customers in new data breach</p><p>33:35 - Story # 3: FTC study finds ‘dark patterns’ used by a majority of subscription apps and websites</p><p>38:48 - Story # 4: Club Penguin fans breached Disney Confluence server, stole 2.5GB of data</p><p>41:52 - Story # 5: Heritage Foundation Exec Threatens ‘Gay Furry Hackers’ in Unhinged Texts</p><p>47:51 - Story # 6: German Navy to replace aging 8-inch floppy drives with an emulated solution for its anti-submarine frigates</p><p>50:14 - Story # 7: 1.4 GB NSA Data Leaked Online – Email Address, Phone Number &amp; Gov Classified Data Exposed</p><p>53:56 - Story # 8: Hackers Claim to Have Leaked 1.1 TB of Disney Slack Messages</p>
<ul><li>(00:00) - PreShow Banter™ — Absolute Madmen</li>
<li>(02:28) - BHIS - Talkin' Bout [infosec] News 2024-07-15</li>
<li>(03:18) - Wi-Fi Forge</li>
<li>(07:31) - Story # 1: CISA Red Team’s Operations Against a Federal Civilian Executive Branch Organization Highlights the Necessity of Defense-in-Depth</li>
<li>(22:39) - Story # 2: AT&amp;T says criminals stole phone records of ‘nearly all’ customers in new data breach</li>
<li>(33:35) - Story # 3: FTC study finds ‘dark patterns’ used by a majority of subscription apps and websites</li>
<li>(38:48) - Story # 4: Club Penguin fans breached Disney Confluence server, stole 2.5GB of data</li>
<li>(41:52) - Story # 5: Heritage Foundation Exec Threatens ‘Gay Furry Hackers’ in Unhinged Texts</li>
<li>(47:51) - Story # 6: German Navy to replace aging 8-inch floppy drives with an emulated solution for its anti-submarine frigates</li>
<li>(50:14) - Story # 7: 1.4 GB NSA Data Leaked Online – Email Address, Phone Number &amp; Gov Classified Data Exposed</li>
<li>(53:56) - Story # 8: Hackers Claim to Have Leaked 1.1 TB of Disney Slack Messages</li>
</ul>]]>
      </content:encoded>
      <pubDate>Thu, 18 Jul 2024 15:39:31 -0400</pubDate>
      <author>Black Hills Information Security</author>
      <enclosure url="https://media.transistor.fm/9f2778d8/74d6a5e2.mp3" length="63677213" type="audio/mpeg"/>
      <itunes:author>Black Hills Information Security</itunes:author>
      <itunes:image href="https://img.transistorcdn.com/vNWtDP-gn8FB0FsFy1-2-wvsrdV9k010LfUdg8wb0_g/rs:fill:0:0:1/w:1400/h:1400/q:60/mb:500000/aHR0cHM6Ly9pbWct/dXBsb2FkLXByb2R1/Y3Rpb24udHJhbnNp/c3Rvci5mbS9kNGZm/ZGFkYmYyM2EzN2Zm/ZjQ5YjRjN2FlOTRi/MzhiZi5qcGc.jpg"/>
      <itunes:duration>3825</itunes:duration>
      <itunes:summary>00:00 - PreShow Banter™ — Absolute Madmen02:28 - BHIS - Talkin’ Bout [infosec] News 2024-07-1503:18 - Wi-Fi Forge07:31 - Story # 1: CISA Red Team’s Operations Against a Federal Civilian Executive Branch Organization Highlights the Necessity of Defense-in-Depth22:39 - Story # 2: AT&amp;amp;T says criminals stole phone records of ‘nearly all’ customers in new data breach33:35 - Story # 3: FTC study finds ‘dark patterns’ used by a majority of subscription apps and websites38:48 - Story # 4: Club Penguin fans breached Disney Confluence server, stole 2.5GB of data41:52 - Story # 5: Heritage Foundation Exec Threatens ‘Gay Furry Hackers’ in Unhinged Texts47:51 - Story # 6: German Navy to replace aging 8-inch floppy drives with an emulated solution for its anti-submarine frigates50:14 - Story # 7: 1.4 GB NSA Data Leaked Online – Email Address, Phone Number &amp;amp; Gov Classified Data Exposed53:56 - Story # 8: Hackers Claim to Have Leaked 1.1 TB of Disney Slack Messages</itunes:summary>
      <itunes:subtitle>00:00 - PreShow Banter™ — Absolute Madmen02:28 - BHIS - Talkin’ Bout [infosec] News 2024-07-1503:18 - Wi-Fi Forge07:31 - Story # 1: CISA Red Team’s Operations Against a Federal Civilian Executive Branch Organization Highlights the Necessity of Defense-in-</itunes:subtitle>
      <itunes:keywords>Infosec,Cybersecurity,news</itunes:keywords>
      <itunes:explicit>No</itunes:explicit>
      <podcast:transcript url="https://share.transistor.fm/s/9f2778d8/transcript.srt" type="application/x-subrip" rel="captions"/>
      <podcast:transcript url="https://share.transistor.fm/s/9f2778d8/transcript.txt" type="text/plain"/>
      <podcast:chapters url="https://share.transistor.fm/s/9f2778d8/chapters.json" type="application/json+chapters"/>
    </item>
    <item>
      <title>2024-07-08 – A Bunch of Lunatics</title>
      <itunes:episode>1</itunes:episode>
      <podcast:episode>1</podcast:episode>
      <itunes:title>2024-07-08 – A Bunch of Lunatics</itunes:title>
      <itunes:episodeType>full</itunes:episodeType>
      <guid isPermaLink="false">https://blubrry.com/bhis/132990843/2024-07-08-a-bunch-of-lunatics/</guid>
      <link>https://share.transistor.fm/s/27e11703</link>
      <description>
        <![CDATA[<p>00:00 - PreShow Banter™ — A Bunch of Lunatics</p><p>05:09 - BHIS - Talkin’ Bout [infosec] News 2024-07-08</p><p>08:41 - Story # 1: Europol takes down 593 Cobalt Strike servers used by cybercriminals</p><p>09:54 - Story # 1b: National Crime Agency leads international operation to degrade illegal versions of Cobalt Strike</p><p>15:17 - Story # 2: ‘RockYou2024’: Nearly 10 billion passwords leaked online</p><p>22:12 - Story # 3: Ticketmaster Breach: ShinyHunters Leak 440K Taylor Swift Eras Tour Ticket Data</p><p>24:20 - Story # 3b: Hackers reverse-engineer Ticketmaster’s barcode system to unlock resales on other platforms</p><p>27:41 - Story # 4: US Supreme Court ruling will likely cause cyber regulation chaos</p><p>39:39 - Story # 5: California Advances Unique Safety Regulations for AI Companies Despite Tech Firm opposition</p><p>41:13 - Story # 5b: Senator Scott Wiener</p><p>43:45 - Story # 6: OpenAI Did Not Disclose 2023 Breach to Feds, Public: Report</p><p>53:10 - Story # 7: Microsoft’s Midnight Blizzard source code breach also impacted federal agencies</p><p>55:27 - Story # 8: Japan’s Government Finally Stops Using Floppy Disks</p><p>57:48 - Story # 9: This smart toilet paper monitor tells you when you need a new roll</p><p>58:50 - Story # 10: Twilio says hackers identified cell phone numbers of two-factor app Authy users</p>
<ul><li>(00:00) - PreShow Banter™ — A Bunch of Lunatics </li>
<li>(05:09) - BHIS - Talkin' Bout [infosec] News 2024-07-08</li>
<li>(08:41) - Story # 1: Europol takes down 593 Cobalt Strike servers used by cybercriminals</li>
<li>(09:54) - Story # 1b: National Crime Agency leads international operation to degrade illegal versions of Cobalt Strike</li>
<li>(15:17) - Story # 2: ‘RockYou2024’: Nearly 10 billion passwords leaked online</li>
<li>(22:12) - Story # 3: Ticketmaster Breach: ShinyHunters Leak 440K Taylor Swift Eras Tour Ticket Data</li>
<li>(24:20) - Story # 3b: Hackers reverse-engineer Ticketmaster’s barcode system to unlock resales on other platforms</li>
<li>(27:41) - Story # 4: US Supreme Court ruling will likely cause cyber regulation chaos</li>
<li>(39:39) - Story # 5: California Advances Unique Safety Regulations for AI Companies Despite Tech Firm opposition</li>
<li>(41:13) - Story # 5b: Senator Scott Wiener</li>
<li>(43:45) - Story # 6: OpenAI Did Not Disclose 2023 Breach to Feds, Public: Report</li>
<li>(53:10) - Story # 7: Microsoft’s Midnight Blizzard source code breach also impacted federal agencies</li>
<li>(55:27) - Story # 8: Japan's Government Finally Stops Using Floppy Disks</li>
<li>(57:48) - Story # 9: This smart toilet paper monitor tells you when you need a new roll</li>
<li>(58:50) - Story # 10: Twilio says hackers identified cell phone numbers of two-factor app Authy users</li>
</ul>]]>
      </description>
      <content:encoded>
        <![CDATA[<p>00:00 - PreShow Banter™ — A Bunch of Lunatics</p><p>05:09 - BHIS - Talkin’ Bout [infosec] News 2024-07-08</p><p>08:41 - Story # 1: Europol takes down 593 Cobalt Strike servers used by cybercriminals</p><p>09:54 - Story # 1b: National Crime Agency leads international operation to degrade illegal versions of Cobalt Strike</p><p>15:17 - Story # 2: ‘RockYou2024’: Nearly 10 billion passwords leaked online</p><p>22:12 - Story # 3: Ticketmaster Breach: ShinyHunters Leak 440K Taylor Swift Eras Tour Ticket Data</p><p>24:20 - Story # 3b: Hackers reverse-engineer Ticketmaster’s barcode system to unlock resales on other platforms</p><p>27:41 - Story # 4: US Supreme Court ruling will likely cause cyber regulation chaos</p><p>39:39 - Story # 5: California Advances Unique Safety Regulations for AI Companies Despite Tech Firm opposition</p><p>41:13 - Story # 5b: Senator Scott Wiener</p><p>43:45 - Story # 6: OpenAI Did Not Disclose 2023 Breach to Feds, Public: Report</p><p>53:10 - Story # 7: Microsoft’s Midnight Blizzard source code breach also impacted federal agencies</p><p>55:27 - Story # 8: Japan’s Government Finally Stops Using Floppy Disks</p><p>57:48 - Story # 9: This smart toilet paper monitor tells you when you need a new roll</p><p>58:50 - Story # 10: Twilio says hackers identified cell phone numbers of two-factor app Authy users</p>
<ul><li>(00:00) - PreShow Banter™ — A Bunch of Lunatics </li>
<li>(05:09) - BHIS - Talkin' Bout [infosec] News 2024-07-08</li>
<li>(08:41) - Story # 1: Europol takes down 593 Cobalt Strike servers used by cybercriminals</li>
<li>(09:54) - Story # 1b: National Crime Agency leads international operation to degrade illegal versions of Cobalt Strike</li>
<li>(15:17) - Story # 2: ‘RockYou2024’: Nearly 10 billion passwords leaked online</li>
<li>(22:12) - Story # 3: Ticketmaster Breach: ShinyHunters Leak 440K Taylor Swift Eras Tour Ticket Data</li>
<li>(24:20) - Story # 3b: Hackers reverse-engineer Ticketmaster’s barcode system to unlock resales on other platforms</li>
<li>(27:41) - Story # 4: US Supreme Court ruling will likely cause cyber regulation chaos</li>
<li>(39:39) - Story # 5: California Advances Unique Safety Regulations for AI Companies Despite Tech Firm opposition</li>
<li>(41:13) - Story # 5b: Senator Scott Wiener</li>
<li>(43:45) - Story # 6: OpenAI Did Not Disclose 2023 Breach to Feds, Public: Report</li>
<li>(53:10) - Story # 7: Microsoft’s Midnight Blizzard source code breach also impacted federal agencies</li>
<li>(55:27) - Story # 8: Japan's Government Finally Stops Using Floppy Disks</li>
<li>(57:48) - Story # 9: This smart toilet paper monitor tells you when you need a new roll</li>
<li>(58:50) - Story # 10: Twilio says hackers identified cell phone numbers of two-factor app Authy users</li>
</ul>]]>
      </content:encoded>
      <pubDate>Wed, 10 Jul 2024 00:00:00 -0400</pubDate>
      <author>Black Hills Information Security</author>
      <enclosure url="https://media.transistor.fm/27e11703/cb263780.mp3" length="68472743" type="audio/mpeg"/>
      <itunes:author>Black Hills Information Security</itunes:author>
      <itunes:image href="https://img.transistorcdn.com/DBGG6OKMbEk7cRB0JVBnp1xuRBHnR4wRpOiornRLCYM/rs:fill:0:0:1/w:1400/h:1400/q:60/mb:500000/aHR0cHM6Ly9pbWct/dXBsb2FkLXByb2R1/Y3Rpb24udHJhbnNp/c3Rvci5mbS83ZDRl/OGZhMDQyOGQ0MTgy/YTc4NjRmNDIzYmZh/ODBjZS5qcGc.jpg"/>
      <itunes:duration>4088</itunes:duration>
      <itunes:summary>00:00 - PreShow Banter™ — A Bunch of Lunatics05:09 - BHIS - Talkin’ Bout [infosec] News 2024-07-0808:41 - Story # 1: Europol takes down 593 Cobalt Strike servers used by cybercriminals09:54 - Story # 1b: National Crime Agency leads international operation to degrade illegal versions of Cobalt Strike15:17 - Story # 2: ‘RockYou2024’: Nearly 10 billion passwords leaked online22:12 - Story # 3: Ticketmaster Breach: ShinyHunters Leak 440K Taylor Swift Eras Tour Ticket Data24:20 - Story # 3b: Hackers reverse-engineer Ticketmaster’s barcode system to unlock resales on other platforms27:41 - Story # 4: US Supreme Court ruling will likely cause cyber regulation chaos39:39 - Story # 5: California Advances Unique Safety Regulations for AI Companies Despite Tech Firm opposition41:13 - Story # 5b: Senator Scott Wiener43:45 - Story # 6: OpenAI Did Not Disclose 2023 Breach to Feds, Public: Report53:10 - Story # 7: Microsoft’s Midnight Blizzard source code breach also impacted federal agencies55:27 - Story # 8: Japan’s Government Finally Stops Using Floppy Disks57:48 - Story # 9: This smart toilet paper monitor tells you when you need a new roll58:50 - Story # 10: Twilio says hackers identified cell phone numbers of two-factor app Authy users</itunes:summary>
      <itunes:subtitle>00:00 - PreShow Banter™ — A Bunch of Lunatics05:09 - BHIS - Talkin’ Bout [infosec] News 2024-07-0808:41 - Story # 1: Europol takes down 593 Cobalt Strike servers used by cybercriminals09:54 - Story # 1b: National Crime Agency leads international operation</itunes:subtitle>
      <itunes:keywords>Infosec,Cybersecurity,news</itunes:keywords>
      <itunes:explicit>No</itunes:explicit>
      <podcast:transcript url="https://share.transistor.fm/s/27e11703/transcript.srt" type="application/x-subrip" rel="captions"/>
      <podcast:transcript url="https://share.transistor.fm/s/27e11703/transcript.txt" type="text/plain"/>
      <podcast:chapters url="https://share.transistor.fm/s/27e11703/chapters.json" type="application/json+chapters"/>
    </item>
    <item>
      <title>2024-07-01 - Ice Cream Season</title>
      <itunes:episode>1</itunes:episode>
      <podcast:episode>1</podcast:episode>
      <itunes:title>2024-07-01 - Ice Cream Season</itunes:title>
      <itunes:episodeType>full</itunes:episodeType>
      <guid isPermaLink="false">https://blubrry.com/bhis/132917446/2024-07-01-ice-cream-season/</guid>
      <link>https://share.transistor.fm/s/12ae0921</link>
      <description>
        <![CDATA[<p>00:00 - PreShow Banter™ — Ice Cream Season</p><p>07:22 - BHIS - Talkin’ Bout [infosec] News 2024-07-01</p><p>07:48 - Story # 1: TeamViewer’s corporate network was breached in alleged APT hack</p><p>09:11 - Story # 1b: TeeamViewer Security Update – June 28, 2024, 12:10 PM CEST</p><p>16:33 - Story # 2: Supreme Court orders new look at Texas, Florida social media laws</p><p>21:32 - Story # 3: New OpenSSH Vulnerability Could Lead to RCE as Root on Linux Systems</p><p>24:52 - Story # 4: CISA: Most critical open source projects not using memory safe code</p><p>40:03 - Story # 5: Exploit for critical Fortra FileCatalyst Workflow SQLi flaw released</p><p>42:35 - Story # 6: South Korean telecom company attacks customers with malware — over 600,000 torrent users report missing files, strange folders, and disabled PCs</p><p>49:24 - Story # 7: Drone As First Responder Programs Are Swarming Across the United States</p><p>55:22 - GRC Rapid Fire</p>
<ul><li>(00:00) - PreShow Banter™ — Ice Cream Season</li>
<li>(07:22) - BHIS - Talkin' Bout [infosec] News 2024-07-01</li>
<li>(07:48) - Story # 1: TeamViewer's corporate network was breached in alleged APT hack</li>
<li>(09:11) - Story # 1b: TeeamViewer Security Update – June 28, 2024, 12:10 PM CEST</li>
<li>(16:33) - Story # 2: Supreme Court orders new look at Texas, Florida social media laws</li>
<li>(21:32) - Story # 3: New OpenSSH Vulnerability Could Lead to RCE as Root on Linux Systems</li>
<li>(24:52) - Story # 4: CISA: Most critical open source projects not using memory safe code</li>
<li>(40:03) - Story # 5: Exploit for critical Fortra FileCatalyst Workflow SQLi flaw released</li>
<li>(42:35) - Story # 6: South Korean telecom company attacks customers with malware — over 600,000 torrent users report missing files, strange folders, and disabled PCs</li>
<li>(49:24) - Story # 7: Drone As First Responder Programs Are Swarming Across the United States</li>
<li>(55:22) - GRC Rapid Fire</li>
</ul>]]>
      </description>
      <content:encoded>
        <![CDATA[<p>00:00 - PreShow Banter™ — Ice Cream Season</p><p>07:22 - BHIS - Talkin’ Bout [infosec] News 2024-07-01</p><p>07:48 - Story # 1: TeamViewer’s corporate network was breached in alleged APT hack</p><p>09:11 - Story # 1b: TeeamViewer Security Update – June 28, 2024, 12:10 PM CEST</p><p>16:33 - Story # 2: Supreme Court orders new look at Texas, Florida social media laws</p><p>21:32 - Story # 3: New OpenSSH Vulnerability Could Lead to RCE as Root on Linux Systems</p><p>24:52 - Story # 4: CISA: Most critical open source projects not using memory safe code</p><p>40:03 - Story # 5: Exploit for critical Fortra FileCatalyst Workflow SQLi flaw released</p><p>42:35 - Story # 6: South Korean telecom company attacks customers with malware — over 600,000 torrent users report missing files, strange folders, and disabled PCs</p><p>49:24 - Story # 7: Drone As First Responder Programs Are Swarming Across the United States</p><p>55:22 - GRC Rapid Fire</p>
<ul><li>(00:00) - PreShow Banter™ — Ice Cream Season</li>
<li>(07:22) - BHIS - Talkin' Bout [infosec] News 2024-07-01</li>
<li>(07:48) - Story # 1: TeamViewer's corporate network was breached in alleged APT hack</li>
<li>(09:11) - Story # 1b: TeeamViewer Security Update – June 28, 2024, 12:10 PM CEST</li>
<li>(16:33) - Story # 2: Supreme Court orders new look at Texas, Florida social media laws</li>
<li>(21:32) - Story # 3: New OpenSSH Vulnerability Could Lead to RCE as Root on Linux Systems</li>
<li>(24:52) - Story # 4: CISA: Most critical open source projects not using memory safe code</li>
<li>(40:03) - Story # 5: Exploit for critical Fortra FileCatalyst Workflow SQLi flaw released</li>
<li>(42:35) - Story # 6: South Korean telecom company attacks customers with malware — over 600,000 torrent users report missing files, strange folders, and disabled PCs</li>
<li>(49:24) - Story # 7: Drone As First Responder Programs Are Swarming Across the United States</li>
<li>(55:22) - GRC Rapid Fire</li>
</ul>]]>
      </content:encoded>
      <pubDate>Wed, 03 Jul 2024 12:00:00 -0400</pubDate>
      <author>Black Hills Information Security</author>
      <enclosure url="https://media.transistor.fm/12ae0921/b997b314.mp3" length="60209415" type="audio/mpeg"/>
      <itunes:author>Black Hills Information Security</itunes:author>
      <itunes:image href="https://img.transistorcdn.com/HsNi7EkqWVMo2UdyyQ_7NHASn0mPDnYJzkyYoNXKQo0/rs:fill:0:0:1/w:1400/h:1400/q:60/mb:500000/aHR0cHM6Ly9pbWct/dXBsb2FkLXByb2R1/Y3Rpb24udHJhbnNp/c3Rvci5mbS82YWMx/YTMwMDkzMmI4NGQw/NjI1NGU3MzhhMWQ2/ZjI1Yy5qcGc.jpg"/>
      <itunes:duration>3630</itunes:duration>
      <itunes:summary>00:00 - PreShow Banter™ — Ice Cream Season07:22 - BHIS - Talkin’ Bout [infosec] News 2024-07-0107:48 - Story # 1: TeamViewer’s corporate network was breached in alleged APT hack09:11 - Story # 1b: TeeamViewer Security Update – June 28, 2024, 12:10 PM CEST16:33 - Story # 2: Supreme Court orders new look at Texas, Florida social media laws21:32 - Story # 3: New OpenSSH Vulnerability Could Lead to RCE as Root on Linux Systems24:52 - Story # 4: CISA: Most critical open source projects not using memory safe code40:03 - Story # 5: Exploit for critical Fortra FileCatalyst Workflow SQLi flaw released42:35 - Story # 6: South Korean telecom company attacks customers with malware — over 600,000 torrent users report missing files, strange folders, and disabled PCs49:24 - Story # 7: Drone As First Responder Programs Are Swarming Across the United States55:22 - GRC Rapid Fire</itunes:summary>
      <itunes:subtitle>00:00 - PreShow Banter™ — Ice Cream Season07:22 - BHIS - Talkin’ Bout [infosec] News 2024-07-0107:48 - Story # 1: TeamViewer’s corporate network was breached in alleged APT hack09:11 - Story # 1b: TeeamViewer Security Update – June 28, 2024, 12:10 PM CEST</itunes:subtitle>
      <itunes:keywords>Infosec,Cybersecurity,news</itunes:keywords>
      <itunes:explicit>No</itunes:explicit>
      <podcast:transcript url="https://share.transistor.fm/s/12ae0921/transcript.srt" type="application/x-subrip" rel="captions"/>
      <podcast:transcript url="https://share.transistor.fm/s/12ae0921/transcript.txt" type="text/plain"/>
      <podcast:chapters url="https://share.transistor.fm/s/12ae0921/chapters.json" type="application/json+chapters"/>
    </item>
    <item>
      <title>2024-06-24 - Life is a Highway</title>
      <itunes:episode>1</itunes:episode>
      <podcast:episode>1</podcast:episode>
      <itunes:title>2024-06-24 - Life is a Highway</itunes:title>
      <itunes:episodeType>full</itunes:episodeType>
      <guid isPermaLink="false">https://blubrry.com/bhis/132888837/2024-06-24-life-is-a-highway/</guid>
      <link>https://share.transistor.fm/s/d471c7b5</link>
      <description>
        <![CDATA[<p>00:00 - PreShow Banter™ — Life is a Highway</p><p>04:28 - BHIS - Talkin’ Bout [infosec] News 2024-06-24</p><p>05:30 - Story # 1: Colorado Privacy Act Amended To Include Biometric Data Provisions</p><p>14:18 - Story # 2: Scathing report on Medibank cyberattack highlights unenforced MFA</p><p>24:30 - Story # 3: CDK suffered another data breach as it was attempting to recover</p><p>35:08 - Story # 4: LockBit claims the hack of the US Federal Reserve</p><p>40:00 - Story # 5: Amazon-Powered AI Cameras Used to Detect Emotions of Unwitting UK Train Passengers</p><p>45:36 - Story # 6: That PowerShell ‘fix’ for your root cert ‘problem’ is a malware loader in disguise</p><p> 51:13 - Story # 7: US sanctions Kaspersky Lab executives, board members over ‘cooperation’ with Russia</p><p> 53:23 - Story # 7b: Treasury Sanctions Kaspersky Lab Leadership in Response to Continued Cybersecurity Risks</p>
<ul><li>(00:00) - PreShow Banter™ — Life is a Highway</li>
<li>(04:28) - BHIS - Talkin' Bout [infosec] News 2024-06-24</li>
<li>(05:30) - Story # 1: Colorado Privacy Act Amended To Include Biometric Data Provisions</li>
<li>(14:18) - Story # 2: Scathing report on Medibank cyberattack highlights unenforced MFA</li>
<li>(24:30) - Story # 3: CDK suffered another data breach as it was attempting to recover</li>
<li>(35:08) - Story # 4: LockBit claims the hack of the US Federal Reserve</li>
<li>(40:00) - Story # 5: Amazon-Powered AI Cameras Used to Detect Emotions of Unwitting UK Train Passengers</li>
<li>(45:36) - Story # 6: That PowerShell 'fix' for your root cert 'problem' is a malware loader in disguise</li>
<li>(51:13) - Story # 7: US sanctions Kaspersky Lab executives, board members over ‘cooperation’ with Russia</li>
<li>(53:23) - Story # 7b: Treasury Sanctions Kaspersky Lab Leadership in Response to Continued Cybersecurity Risks</li>
</ul>]]>
      </description>
      <content:encoded>
        <![CDATA[<p>00:00 - PreShow Banter™ — Life is a Highway</p><p>04:28 - BHIS - Talkin’ Bout [infosec] News 2024-06-24</p><p>05:30 - Story # 1: Colorado Privacy Act Amended To Include Biometric Data Provisions</p><p>14:18 - Story # 2: Scathing report on Medibank cyberattack highlights unenforced MFA</p><p>24:30 - Story # 3: CDK suffered another data breach as it was attempting to recover</p><p>35:08 - Story # 4: LockBit claims the hack of the US Federal Reserve</p><p>40:00 - Story # 5: Amazon-Powered AI Cameras Used to Detect Emotions of Unwitting UK Train Passengers</p><p>45:36 - Story # 6: That PowerShell ‘fix’ for your root cert ‘problem’ is a malware loader in disguise</p><p> 51:13 - Story # 7: US sanctions Kaspersky Lab executives, board members over ‘cooperation’ with Russia</p><p> 53:23 - Story # 7b: Treasury Sanctions Kaspersky Lab Leadership in Response to Continued Cybersecurity Risks</p>
<ul><li>(00:00) - PreShow Banter™ — Life is a Highway</li>
<li>(04:28) - BHIS - Talkin' Bout [infosec] News 2024-06-24</li>
<li>(05:30) - Story # 1: Colorado Privacy Act Amended To Include Biometric Data Provisions</li>
<li>(14:18) - Story # 2: Scathing report on Medibank cyberattack highlights unenforced MFA</li>
<li>(24:30) - Story # 3: CDK suffered another data breach as it was attempting to recover</li>
<li>(35:08) - Story # 4: LockBit claims the hack of the US Federal Reserve</li>
<li>(40:00) - Story # 5: Amazon-Powered AI Cameras Used to Detect Emotions of Unwitting UK Train Passengers</li>
<li>(45:36) - Story # 6: That PowerShell 'fix' for your root cert 'problem' is a malware loader in disguise</li>
<li>(51:13) - Story # 7: US sanctions Kaspersky Lab executives, board members over ‘cooperation’ with Russia</li>
<li>(53:23) - Story # 7b: Treasury Sanctions Kaspersky Lab Leadership in Response to Continued Cybersecurity Risks</li>
</ul>]]>
      </content:encoded>
      <pubDate>Wed, 26 Jun 2024 12:00:00 -0400</pubDate>
      <author>Black Hills Information Security</author>
      <enclosure url="https://media.transistor.fm/d471c7b5/01639d1a.mp3" length="62253702" type="audio/mpeg"/>
      <itunes:author>Black Hills Information Security</itunes:author>
      <itunes:image href="https://img.transistorcdn.com/vdRUMx6Y8qVM2DmicQl68sd9-D6fSKRQmNToRl8Pnlw/rs:fill:0:0:1/w:1400/h:1400/q:60/mb:500000/aHR0cHM6Ly9pbWct/dXBsb2FkLXByb2R1/Y3Rpb24udHJhbnNp/c3Rvci5mbS9jYzRm/OWFmNjBiOTYwMmMz/MDQ1YTYxZWU1YTcw/YzgzNS5qcGc.jpg"/>
      <itunes:duration>3773</itunes:duration>
      <itunes:summary>00:00 - PreShow Banter™ — Life is a Highway04:28 - BHIS - Talkin’ Bout [infosec] News 2024-06-2405:30 - Story # 1: Colorado Privacy Act Amended To Include Biometric Data Provisions14:18 - Story # 2: Scathing report on Medibank cyberattack highlights unenforced MFA24:30 - Story # 3: CDK suffered another data breach as it was attempting to recover35:08 - Story # 4: LockBit claims the hack of the US Federal Reserve40:00 - Story # 5: Amazon-Powered AI Cameras Used to Detect Emotions of Unwitting UK Train Passengers45:36 - Story # 6: That PowerShell ‘fix’ for your root cert ‘problem’ is a malware loader in disguise 51:13 - Story # 7: US sanctions Kaspersky Lab executives, board members over ‘cooperation’ with Russia 53:23 - Story # 7b: Treasury Sanctions Kaspersky Lab Leadership in Response to Continued Cybersecurity Risks</itunes:summary>
      <itunes:subtitle>00:00 - PreShow Banter™ — Life is a Highway04:28 - BHIS - Talkin’ Bout [infosec] News 2024-06-2405:30 - Story # 1: Colorado Privacy Act Amended To Include Biometric Data Provisions14:18 - Story # 2: Scathing report on Medibank cyberattack highlights unenf</itunes:subtitle>
      <itunes:keywords>Infosec,Cybersecurity,news</itunes:keywords>
      <itunes:explicit>No</itunes:explicit>
      <podcast:chapters url="https://share.transistor.fm/s/d471c7b5/chapters.json" type="application/json+chapters"/>
    </item>
    <item>
      <title>2024-06-17 - Recall Gets Recalled</title>
      <itunes:episode>1</itunes:episode>
      <podcast:episode>1</podcast:episode>
      <itunes:title>2024-06-17 - Recall Gets Recalled</itunes:title>
      <itunes:episodeType>full</itunes:episodeType>
      <guid isPermaLink="false">https://blubrry.com/bhis/132856012/2024-06-17-recall-gets-recalled/</guid>
      <link>https://share.transistor.fm/s/18d7d82f</link>
      <description>
        <![CDATA[<p>00:00 - PreShow Banter™ — Hungry Hungry Hipaa</p><p>03:39 - BHIS - Talkin’ Bout [infosec] News 2024-06-17 </p><p>05:40 - Story # 1: Windows security hole allows attackers to install malware via Wi-Fi — new patch plugs gaping vulnerability</p><p>16:27 - Story # 2: Microsoft’s all-knowing Recall AI feature is being delayed</p><p>25:34 - Story # 3: Here’s how Apple’s AI model tries to keep your data private</p><p>32:27 - Story # 4: New Linux malware is controlled through emojis sent from Discord</p><p>35:28 - Story # 5: Pure Storage confirms data breach after Snowflake account hack</p><p>38:44 - Story # 6: Microsoft Chose Profit Over Security and Left U.S. Government Vulnerable to Russian Hack, Whistleblower Says</p><p> </p>
<ul><li>(00:00) - PreShow Banter™ — Hungry Hungry Hipaa</li>
<li>(03:39) - BHIS - Talkin' Bout [infosec] News 2024-06-17</li>
<li>(05:40) - Story # 1: Windows security hole allows attackers to install malware via Wi-Fi — new patch plugs gaping vulnerability</li>
<li>(16:27) - Story # 2: Microsoft’s all-knowing Recall AI feature is being delayed</li>
<li>(25:34) - Story # 3: Here’s how Apple’s AI model tries to keep your data private</li>
<li>(32:27) - Story # 4: New Linux malware is controlled through emojis sent from Discord</li>
<li>(35:28) - Story # 5: Pure Storage confirms data breach after Snowflake account hack</li>
<li>(38:44) - Story # 6: Microsoft Chose Profit Over Security and Left U.S. Government Vulnerable to Russian Hack, Whistleblower Says</li>
</ul>]]>
      </description>
      <content:encoded>
        <![CDATA[<p>00:00 - PreShow Banter™ — Hungry Hungry Hipaa</p><p>03:39 - BHIS - Talkin’ Bout [infosec] News 2024-06-17 </p><p>05:40 - Story # 1: Windows security hole allows attackers to install malware via Wi-Fi — new patch plugs gaping vulnerability</p><p>16:27 - Story # 2: Microsoft’s all-knowing Recall AI feature is being delayed</p><p>25:34 - Story # 3: Here’s how Apple’s AI model tries to keep your data private</p><p>32:27 - Story # 4: New Linux malware is controlled through emojis sent from Discord</p><p>35:28 - Story # 5: Pure Storage confirms data breach after Snowflake account hack</p><p>38:44 - Story # 6: Microsoft Chose Profit Over Security and Left U.S. Government Vulnerable to Russian Hack, Whistleblower Says</p><p> </p>
<ul><li>(00:00) - PreShow Banter™ — Hungry Hungry Hipaa</li>
<li>(03:39) - BHIS - Talkin' Bout [infosec] News 2024-06-17</li>
<li>(05:40) - Story # 1: Windows security hole allows attackers to install malware via Wi-Fi — new patch plugs gaping vulnerability</li>
<li>(16:27) - Story # 2: Microsoft’s all-knowing Recall AI feature is being delayed</li>
<li>(25:34) - Story # 3: Here’s how Apple’s AI model tries to keep your data private</li>
<li>(32:27) - Story # 4: New Linux malware is controlled through emojis sent from Discord</li>
<li>(35:28) - Story # 5: Pure Storage confirms data breach after Snowflake account hack</li>
<li>(38:44) - Story # 6: Microsoft Chose Profit Over Security and Left U.S. Government Vulnerable to Russian Hack, Whistleblower Says</li>
</ul>]]>
      </content:encoded>
      <pubDate>Wed, 19 Jun 2024 12:00:00 -0400</pubDate>
      <author>Black Hills Information Security</author>
      <enclosure url="https://media.transistor.fm/18d7d82f/0733b5a7.mp3" length="60921293" type="audio/mpeg"/>
      <itunes:author>Black Hills Information Security</itunes:author>
      <itunes:image href="https://img.transistorcdn.com/J7wW434eDE4A2FvAn7G8MdMBK5QN0I8vIJVBTsOIqUI/rs:fill:0:0:1/w:1400/h:1400/q:60/mb:500000/aHR0cHM6Ly9pbWct/dXBsb2FkLXByb2R1/Y3Rpb24udHJhbnNp/c3Rvci5mbS82NWIw/ZjhiNWMzZmYwNzY3/MTFhYjg4NjVmODcx/NmZjYy5qcGc.jpg"/>
      <itunes:duration>3699</itunes:duration>
      <itunes:summary>00:00 - PreShow Banter™ — Hungry Hungry Hipaa03:39 - BHIS - Talkin’ Bout [infosec] News 2024-06-17 05:40 - Story # 1: Windows security hole allows attackers to install malware via Wi-Fi — new patch plugs gaping vulnerability16:27 - Story # 2: Microsoft’s all-knowing Recall AI feature is being delayed25:34 - Story # 3: Here’s how Apple’s AI model tries to keep your data private32:27 - Story # 4: New Linux malware is controlled through emojis sent from Discord35:28 - Story # 5: Pure Storage confirms data breach after Snowflake account hack38:44 - Story # 6: Microsoft Chose Profit Over Security and Left U.S. Government Vulnerable to Russian Hack, Whistleblower Says </itunes:summary>
      <itunes:subtitle>00:00 - PreShow Banter™ — Hungry Hungry Hipaa03:39 - BHIS - Talkin’ Bout [infosec] News 2024-06-17 05:40 - Story # 1: Windows security hole allows attackers to install malware via Wi-Fi — new patch plugs gaping vulnerability16:27 - Story # 2: Microsoft’s </itunes:subtitle>
      <itunes:keywords>Infosec,Cybersecurity,news</itunes:keywords>
      <itunes:explicit>No</itunes:explicit>
      <podcast:chapters url="https://share.transistor.fm/s/18d7d82f/chapters.json" type="application/json+chapters"/>
    </item>
    <item>
      <title>2024-6-13 - Recall Disaster, Ransomware and Drone Police</title>
      <itunes:episode>1</itunes:episode>
      <podcast:episode>1</podcast:episode>
      <itunes:title>2024-6-13 - Recall Disaster, Ransomware and Drone Police</itunes:title>
      <itunes:episodeType>full</itunes:episodeType>
      <guid isPermaLink="false">https://blubrry.com/bhis/132822617/2024-05-13-recall-disaster-ransomware-and-drone-police/</guid>
      <link>https://share.transistor.fm/s/56c5ac86</link>
      <description>
        <![CDATA[<p>00:00 - PreShow Banter™ — Louie is Live</p><p>04:53 - BHIS - Talkin’ Bout [infosec] News 2024-06-10</p><p>07:09 - Story # 1: UNC5537 Targets Snowflake Customer Instances for Data Theft and Extortion</p><p>18:39 - Story # 2: Stealing everything you’ve ever typed or viewed on your own Windows PC is now possible with two lines of code — inside the Copilot+ Recall disaster.</p><p>39:02 - Story # 3: TikTok fixes zero-day bug used to hijack high-profile accounts</p><p>41:34 - Story # 4: The Age of the Drone Police Is Here</p><p>52:07 - Story # 5: London hospitals declare emergency following ransomware attack</p><p>54:45 - Story # 6: Former Senior Executive and Former Sales Manager Convicted of Selling Data on Millions of U.S. Consumers to Perpetrators of Mail Fraud Schemes</p><p>56:40 - Story # 7: FBI Kicks Hackers In The Teeth With Free 7,000 Ransomware Key Giveaway</p><p>57:32 - Story # 8: FCC OKs pilot to bolster school, library cybersecurity </p>
<ul><li>(00:00) - PreShow Banter™ — Louie is Live</li>
<li>(04:53) - BHIS - Talkin' Bout [infosec] News 2024-06-10</li>
<li>(07:09) - Story # 1: UNC5537 Targets Snowflake Customer Instances for Data Theft and Extortion</li>
<li>(18:39) - Story # 2: Stealing everything you’ve ever typed or viewed on your own Windows PC is now possible with two lines of code — inside the Copilot+ Recall disaster.</li>
<li>(39:02) - Story # 3: TikTok fixes zero-day bug used to hijack high-profile accounts</li>
<li>(41:34) - Story # 4: The Age of the Drone Police Is Here</li>
<li>(52:07) - Story # 5: London hospitals declare emergency following ransomware attack</li>
<li>(54:45) - Story # 6: Former Senior Executive and Former Sales Manager Convicted of Selling Data on Millions of U.S. Consumers to Perpetrators of Mail Fraud Schemes</li>
<li>(56:40) - Story # 7: FBI Kicks Hackers In The Teeth With Free 7,000 Ransomware Key Giveaway</li>
<li>(57:32) - Story # 8: FCC OKs pilot to bolster school, library cybersecurity</li>
</ul>]]>
      </description>
      <content:encoded>
        <![CDATA[<p>00:00 - PreShow Banter™ — Louie is Live</p><p>04:53 - BHIS - Talkin’ Bout [infosec] News 2024-06-10</p><p>07:09 - Story # 1: UNC5537 Targets Snowflake Customer Instances for Data Theft and Extortion</p><p>18:39 - Story # 2: Stealing everything you’ve ever typed or viewed on your own Windows PC is now possible with two lines of code — inside the Copilot+ Recall disaster.</p><p>39:02 - Story # 3: TikTok fixes zero-day bug used to hijack high-profile accounts</p><p>41:34 - Story # 4: The Age of the Drone Police Is Here</p><p>52:07 - Story # 5: London hospitals declare emergency following ransomware attack</p><p>54:45 - Story # 6: Former Senior Executive and Former Sales Manager Convicted of Selling Data on Millions of U.S. Consumers to Perpetrators of Mail Fraud Schemes</p><p>56:40 - Story # 7: FBI Kicks Hackers In The Teeth With Free 7,000 Ransomware Key Giveaway</p><p>57:32 - Story # 8: FCC OKs pilot to bolster school, library cybersecurity </p>
<ul><li>(00:00) - PreShow Banter™ — Louie is Live</li>
<li>(04:53) - BHIS - Talkin' Bout [infosec] News 2024-06-10</li>
<li>(07:09) - Story # 1: UNC5537 Targets Snowflake Customer Instances for Data Theft and Extortion</li>
<li>(18:39) - Story # 2: Stealing everything you’ve ever typed or viewed on your own Windows PC is now possible with two lines of code — inside the Copilot+ Recall disaster.</li>
<li>(39:02) - Story # 3: TikTok fixes zero-day bug used to hijack high-profile accounts</li>
<li>(41:34) - Story # 4: The Age of the Drone Police Is Here</li>
<li>(52:07) - Story # 5: London hospitals declare emergency following ransomware attack</li>
<li>(54:45) - Story # 6: Former Senior Executive and Former Sales Manager Convicted of Selling Data on Millions of U.S. Consumers to Perpetrators of Mail Fraud Schemes</li>
<li>(56:40) - Story # 7: FBI Kicks Hackers In The Teeth With Free 7,000 Ransomware Key Giveaway</li>
<li>(57:32) - Story # 8: FCC OKs pilot to bolster school, library cybersecurity</li>
</ul>]]>
      </content:encoded>
      <pubDate>Thu, 13 Jun 2024 10:38:00 -0400</pubDate>
      <author>Black Hills Information Security</author>
      <enclosure url="https://media.transistor.fm/56c5ac86/f3a39b8f.mp3" length="62487904" type="audio/mpeg"/>
      <itunes:author>Black Hills Information Security</itunes:author>
      <itunes:image href="https://img.transistorcdn.com/IR8SEw2yqLmTqlwH65u8xohq28XfOfrpa_Yn4HVP9Ho/rs:fill:0:0:1/w:1400/h:1400/q:60/mb:500000/aHR0cHM6Ly9pbWct/dXBsb2FkLXByb2R1/Y3Rpb24udHJhbnNp/c3Rvci5mbS81MmY2/NzNlMWQ2YTUyNDY2/ZTZkOTBlMTFkZjkw/NDI5NS5qcGc.jpg"/>
      <itunes:duration>3782</itunes:duration>
      <itunes:summary>00:00 - PreShow Banter™ — Louie is Live04:53 - BHIS - Talkin’ Bout [infosec] News 2024-06-1007:09 - Story # 1: UNC5537 Targets Snowflake Customer Instances for Data Theft and Extortion18:39 - Story # 2: Stealing everything you’ve ever typed or viewed on your own Windows PC is now possible with two lines of code — inside the Copilot+ Recall disaster.39:02 - Story # 3: TikTok fixes zero-day bug used to hijack high-profile accounts41:34 - Story # 4: The Age of the Drone Police Is Here52:07 - Story # 5: London hospitals declare emergency following ransomware attack54:45 - Story # 6: Former Senior Executive and Former Sales Manager Convicted of Selling Data on Millions of U.S. Consumers to Perpetrators of Mail Fraud Schemes56:40 - Story # 7: FBI Kicks Hackers In The Teeth With Free 7,000 Ransomware Key Giveaway57:32 - Story # 8: FCC OKs pilot to bolster school, library cybersecurity </itunes:summary>
      <itunes:subtitle>00:00 - PreShow Banter™ — Louie is Live04:53 - BHIS - Talkin’ Bout [infosec] News 2024-06-1007:09 - Story # 1: UNC5537 Targets Snowflake Customer Instances for Data Theft and Extortion18:39 - Story # 2: Stealing everything you’ve ever typed or viewed on y</itunes:subtitle>
      <itunes:keywords>Infosec,Cybersecurity,news</itunes:keywords>
      <itunes:explicit>No</itunes:explicit>
      <podcast:chapters url="https://share.transistor.fm/s/56c5ac86/chapters.json" type="application/json+chapters"/>
    </item>
    <item>
      <title>2024-06-2024 - RVs, Hackers and Poison.</title>
      <itunes:episode>1</itunes:episode>
      <podcast:episode>1</podcast:episode>
      <itunes:title>2024-06-2024 - RVs, Hackers and Poison.</itunes:title>
      <itunes:episodeType>full</itunes:episodeType>
      <guid isPermaLink="false">https://blubrry.com/bhis/132783007/2024-06-2024-rvs-hackers-and-poison/</guid>
      <link>https://share.transistor.fm/s/196db347</link>
      <description>
        <![CDATA[<p>00:00:00 - PreShow Banter™ — In an RV down by the dumpster</p><p> 00:07:39 - BHIS - Talkin’ Bout [infosec] News 2024-06-03</p><p> 00:09:21 - Story # 1: Ticketmaster confirms massive breach after stolen data for sale online</p><p> 00:10:46 - Story # 1b: Snowflake, Cloud Storage Giant, Suffers Massive Breach: Hacker Confirms to Hudson Rock Access Through Infostealer Infection</p><p> 00:13:03 - Story # 1c: Detecting and Preventing Unauthorized User Access: Instructions</p><p> 00:13:42 - Story # 1d: Snowflake Denies Responsibility for Ticketmaster, Santander Breaches</p><p> 00:21:21 - Story # 2: Chinese hackers hide on military and govt networks for 6 years</p><p> 00:29:17 - Story # 3: Federal agency warns critical Linux vulnerability being actively exploited</p><p> 00:34:19 - Story # 4: US dismantles 911 S5 botnet used for cyberattacks, arrests admin</p><p> 00:39:19 - Story # 4b: How the FBI’s fake cell phone company put criminals into real jail cells</p><p> 00:43:48 - Story # 5: Exploit released for maximum severity Fortinet RCE bug, patch now</p><p> 00:46:09 - Story # 6: Enforcement Alert: Drinking Water Systems to Address Cybersecurity Vulnerabilities</p><p> 00:54:44 - Story # 6b: Hackers attempt to poison Florida city’s water supply near Super Bowl</p><p> 01:03:32 - Story # 7: GPT-4o’s Chinese token-training data is polluted by spam and porn websites</p><p> </p>
<ul><li>(00:00) - PreShow Banter™ — In an RV down by the dumpster</li>
<li>(07:39) - BHIS - Talkin' Bout [infosec] News 2024-06-03</li>
<li>(09:21) - Story # 1: Ticketmaster confirms massive breach after stolen data for sale online</li>
<li>(10:46) - Story # 1b: Snowflake, Cloud Storage Giant, Suffers Massive Breach: Hacker Confirms to Hudson Rock Access Through Infostealer Infection</li>
<li>(13:03) - Story # 1c: Detecting and Preventing Unauthorized User Access: Instructions</li>
<li>(13:42) - Story # 1d: Snowflake Denies Responsibility for Ticketmaster, Santander Breaches</li>
<li>(21:21) - Story # 2: Chinese hackers hide on military and govt networks for 6 years</li>
<li>(29:17) - Story # 3: Federal agency warns critical Linux vulnerability being actively exploited</li>
<li>(34:19) - Story # 4: US dismantles 911 S5 botnet used for cyberattacks, arrests admin</li>
<li>(39:19) - Story # 4b: How the FBI's fake cell phone company put criminals into real jail cells</li>
<li>(43:48) - Story # 5: Exploit released for maximum severity Fortinet RCE bug, patch now</li>
<li>(46:09) - Story # 6: Enforcement Alert: Drinking Water Systems to Address Cybersecurity Vulnerabilities</li>
<li>(54:44) - Story # 6b: Hackers attempt to poison Florida city's water supply near Super Bowl</li>
<li>(01:03:32) - Story # 7: GPT-4o’s Chinese token-training data is polluted by spam and porn websites</li>
</ul>]]>
      </description>
      <content:encoded>
        <![CDATA[<p>00:00:00 - PreShow Banter™ — In an RV down by the dumpster</p><p> 00:07:39 - BHIS - Talkin’ Bout [infosec] News 2024-06-03</p><p> 00:09:21 - Story # 1: Ticketmaster confirms massive breach after stolen data for sale online</p><p> 00:10:46 - Story # 1b: Snowflake, Cloud Storage Giant, Suffers Massive Breach: Hacker Confirms to Hudson Rock Access Through Infostealer Infection</p><p> 00:13:03 - Story # 1c: Detecting and Preventing Unauthorized User Access: Instructions</p><p> 00:13:42 - Story # 1d: Snowflake Denies Responsibility for Ticketmaster, Santander Breaches</p><p> 00:21:21 - Story # 2: Chinese hackers hide on military and govt networks for 6 years</p><p> 00:29:17 - Story # 3: Federal agency warns critical Linux vulnerability being actively exploited</p><p> 00:34:19 - Story # 4: US dismantles 911 S5 botnet used for cyberattacks, arrests admin</p><p> 00:39:19 - Story # 4b: How the FBI’s fake cell phone company put criminals into real jail cells</p><p> 00:43:48 - Story # 5: Exploit released for maximum severity Fortinet RCE bug, patch now</p><p> 00:46:09 - Story # 6: Enforcement Alert: Drinking Water Systems to Address Cybersecurity Vulnerabilities</p><p> 00:54:44 - Story # 6b: Hackers attempt to poison Florida city’s water supply near Super Bowl</p><p> 01:03:32 - Story # 7: GPT-4o’s Chinese token-training data is polluted by spam and porn websites</p><p> </p>
<ul><li>(00:00) - PreShow Banter™ — In an RV down by the dumpster</li>
<li>(07:39) - BHIS - Talkin' Bout [infosec] News 2024-06-03</li>
<li>(09:21) - Story # 1: Ticketmaster confirms massive breach after stolen data for sale online</li>
<li>(10:46) - Story # 1b: Snowflake, Cloud Storage Giant, Suffers Massive Breach: Hacker Confirms to Hudson Rock Access Through Infostealer Infection</li>
<li>(13:03) - Story # 1c: Detecting and Preventing Unauthorized User Access: Instructions</li>
<li>(13:42) - Story # 1d: Snowflake Denies Responsibility for Ticketmaster, Santander Breaches</li>
<li>(21:21) - Story # 2: Chinese hackers hide on military and govt networks for 6 years</li>
<li>(29:17) - Story # 3: Federal agency warns critical Linux vulnerability being actively exploited</li>
<li>(34:19) - Story # 4: US dismantles 911 S5 botnet used for cyberattacks, arrests admin</li>
<li>(39:19) - Story # 4b: How the FBI's fake cell phone company put criminals into real jail cells</li>
<li>(43:48) - Story # 5: Exploit released for maximum severity Fortinet RCE bug, patch now</li>
<li>(46:09) - Story # 6: Enforcement Alert: Drinking Water Systems to Address Cybersecurity Vulnerabilities</li>
<li>(54:44) - Story # 6b: Hackers attempt to poison Florida city's water supply near Super Bowl</li>
<li>(01:03:32) - Story # 7: GPT-4o’s Chinese token-training data is polluted by spam and porn websites</li>
</ul>]]>
      </content:encoded>
      <pubDate>Thu, 06 Jun 2024 14:02:22 -0400</pubDate>
      <author>Black Hills Information Security</author>
      <enclosure url="https://media.transistor.fm/196db347/cf582827.mp3" length="69166305" type="audio/mpeg"/>
      <itunes:author>Black Hills Information Security</itunes:author>
      <itunes:image href="https://img.transistorcdn.com/V8i2tH4lgenfXHTjOCjr9dKBd0asya0wlB8k_oDJ4Wo/rs:fill:0:0:1/w:1400/h:1400/q:60/mb:500000/aHR0cHM6Ly9pbWct/dXBsb2FkLXByb2R1/Y3Rpb24udHJhbnNp/c3Rvci5mbS9jMTkx/Yzk3ZTI2YWE2N2Ez/ZDliY2FhMzc3ZDhm/MTc3OC5qcGc.jpg"/>
      <itunes:duration>4121</itunes:duration>
      <itunes:summary>00:00:00 - PreShow Banter™ — In an RV down by the dumpster 00:07:39 - BHIS - Talkin’ Bout [infosec] News 2024-06-03 00:09:21 - Story # 1: Ticketmaster confirms massive breach after stolen data for sale online 00:10:46 - Story # 1b: Snowflake, Cloud Storage Giant, Suffers Massive Breach: Hacker Confirms to Hudson Rock Access Through Infostealer Infection 00:13:03 - Story # 1c: Detecting and Preventing Unauthorized User Access: Instructions 00:13:42 - Story # 1d: Snowflake Denies Responsibility for Ticketmaster, Santander Breaches 00:21:21 - Story # 2: Chinese hackers hide on military and govt networks for 6 years 00:29:17 - Story # 3: Federal agency warns critical Linux vulnerability being actively exploited 00:34:19 - Story # 4: US dismantles 911 S5 botnet used for cyberattacks, arrests admin 00:39:19 - Story # 4b: How the FBI’s fake cell phone company put criminals into real jail cells 00:43:48 - Story # 5: Exploit released for maximum severity Fortinet RCE bug, patch now 00:46:09 - Story # 6: Enforcement Alert: Drinking Water Systems to Address Cybersecurity Vulnerabilities 00:54:44 - Story # 6b: Hackers attempt to poison Florida city’s water supply near Super Bowl 01:03:32 - Story # 7: GPT-4o’s Chinese token-training data is polluted by spam and porn websites </itunes:summary>
      <itunes:subtitle>00:00:00 - PreShow Banter™ — In an RV down by the dumpster 00:07:39 - BHIS - Talkin’ Bout [infosec] News 2024-06-03 00:09:21 - Story # 1: Ticketmaster confirms massive breach after stolen data for sale online 00:10:46 - Story # 1b: Snowflake, Cloud Storag</itunes:subtitle>
      <itunes:keywords>Infosec,Cybersecurity,news</itunes:keywords>
      <itunes:explicit>No</itunes:explicit>
      <podcast:chapters url="https://share.transistor.fm/s/196db347/chapters.json" type="application/json+chapters"/>
    </item>
    <item>
      <title>2024-05-23 - Sneaky AI Policies, Two Year Linux Backdoor and Good Ol' Fraud!</title>
      <itunes:episode>1</itunes:episode>
      <podcast:episode>1</podcast:episode>
      <itunes:title>2024-05-23 - Sneaky AI Policies, Two Year Linux Backdoor and Good Ol' Fraud!</itunes:title>
      <itunes:episodeType>full</itunes:episodeType>
      <guid isPermaLink="false">https://blubrry.com/bhis/132653140/2024-05-23-sneaky-ai-policies-two-year-linux-backdoor-and-good-ol-fraud/</guid>
      <link>https://share.transistor.fm/s/a746443e</link>
      <description>
        <![CDATA[<p>00:00 - PreShow Banter™ — Antichafing Training.</p><p>04:31 - BHIS - Talkin’ Bout [infosec] News 2024-05-20</p><p>07:12 - Story # 1: Linux maintainers were infected for 2 years by SSH-dwelling backdoor with huge reach</p><p>29:49 - Story # 2: Palo Alto Networks is buying security assets from IBM to expand customer base</p><p>36:50 - Story # 3: Charges and Seizures Brought in Fraud Scheme Aimed at Denying Revenue for Workers Associated with North Korea</p><p>43:55 - Story # 4: FCC might require telecoms to report on securing internet’s BGP technology</p><p>52:45 - Story # 5: Slack under attack over sneaky AI training policy</p>
<ul><li>(00:00) - PreShow Banter™ — Antichafing Training.</li>
<li>(04:31) - BHIS - Talkin' Bout [infosec] News 2024-05-20</li>
<li>(07:12) - Story # 1: Linux maintainers were infected for 2 years by SSH-dwelling backdoor with huge reach</li>
<li>(29:49) - Story # 2: Palo Alto Networks is buying security assets from IBM to expand customer base</li>
<li>(36:50) - Story # 3: Charges and Seizures Brought in Fraud Scheme Aimed at Denying Revenue for Workers Associated with North Korea</li>
<li>(43:55) - Story # 4: FCC might require telecoms to report on securing internet's BGP technology</li>
<li>(52:45) - Story # 5: Slack under attack over sneaky AI training policy</li>
</ul>]]>
      </description>
      <content:encoded>
        <![CDATA[<p>00:00 - PreShow Banter™ — Antichafing Training.</p><p>04:31 - BHIS - Talkin’ Bout [infosec] News 2024-05-20</p><p>07:12 - Story # 1: Linux maintainers were infected for 2 years by SSH-dwelling backdoor with huge reach</p><p>29:49 - Story # 2: Palo Alto Networks is buying security assets from IBM to expand customer base</p><p>36:50 - Story # 3: Charges and Seizures Brought in Fraud Scheme Aimed at Denying Revenue for Workers Associated with North Korea</p><p>43:55 - Story # 4: FCC might require telecoms to report on securing internet’s BGP technology</p><p>52:45 - Story # 5: Slack under attack over sneaky AI training policy</p>
<ul><li>(00:00) - PreShow Banter™ — Antichafing Training.</li>
<li>(04:31) - BHIS - Talkin' Bout [infosec] News 2024-05-20</li>
<li>(07:12) - Story # 1: Linux maintainers were infected for 2 years by SSH-dwelling backdoor with huge reach</li>
<li>(29:49) - Story # 2: Palo Alto Networks is buying security assets from IBM to expand customer base</li>
<li>(36:50) - Story # 3: Charges and Seizures Brought in Fraud Scheme Aimed at Denying Revenue for Workers Associated with North Korea</li>
<li>(43:55) - Story # 4: FCC might require telecoms to report on securing internet's BGP technology</li>
<li>(52:45) - Story # 5: Slack under attack over sneaky AI training policy</li>
</ul>]]>
      </content:encoded>
      <pubDate>Thu, 23 May 2024 13:40:22 -0400</pubDate>
      <author>Black Hills Information Security</author>
      <enclosure url="https://media.transistor.fm/a746443e/43ab51b3.mp3" length="64996450" type="audio/mpeg"/>
      <itunes:author>Black Hills Information Security</itunes:author>
      <itunes:image href="https://img.transistorcdn.com/8pnvM6NrKY-CDE5RlkhqXBp1jAKo-Z4tgKUffs7WH5s/rs:fill:0:0:1/w:1400/h:1400/q:60/mb:500000/aHR0cHM6Ly9pbWct/dXBsb2FkLXByb2R1/Y3Rpb24udHJhbnNp/c3Rvci5mbS8xYzNi/MGM3NzNiZWM5Yzlh/OWEyYjE5MWEzODNm/OWJjNS5qcGc.jpg"/>
      <itunes:duration>3966</itunes:duration>
      <itunes:summary>00:00 - PreShow Banter™ — Antichafing Training.04:31 - BHIS - Talkin’ Bout [infosec] News 2024-05-2007:12 - Story # 1: Linux maintainers were infected for 2 years by SSH-dwelling backdoor with huge reach29:49 - Story # 2: Palo Alto Networks is buying security assets from IBM to expand customer base36:50 - Story # 3: Charges and Seizures Brought in Fraud Scheme Aimed at Denying Revenue for Workers Associated with North Korea43:55 - Story # 4: FCC might require telecoms to report on securing internet’s BGP technology52:45 - Story # 5: Slack under attack over sneaky AI training policy</itunes:summary>
      <itunes:subtitle>00:00 - PreShow Banter™ — Antichafing Training.04:31 - BHIS - Talkin’ Bout [infosec] News 2024-05-2007:12 - Story # 1: Linux maintainers were infected for 2 years by SSH-dwelling backdoor with huge reach29:49 - Story # 2: Palo Alto Networks is buying secu</itunes:subtitle>
      <itunes:keywords>Infosec,Cybersecurity,news</itunes:keywords>
      <itunes:explicit>No</itunes:explicit>
      <podcast:chapters url="https://share.transistor.fm/s/a746443e/chapters.json" type="application/json+chapters"/>
    </item>
    <item>
      <title>2024-05-16 - Hackers Target Children, FBI Surveillance and RSA Cookies?</title>
      <itunes:episode>1</itunes:episode>
      <podcast:episode>1</podcast:episode>
      <itunes:title>2024-05-16 - Hackers Target Children, FBI Surveillance and RSA Cookies?</itunes:title>
      <itunes:episodeType>full</itunes:episodeType>
      <guid isPermaLink="false">https://blubrry.com/bhis/132589862/2024-05-16-hackers-target-children-fbi-surveillance-and-rsa-cookies/</guid>
      <link>https://share.transistor.fm/s/07860596</link>
      <description>
        <![CDATA[<p>00:00 - PreShow Banter™ — World Class RSA Cookies</p><p>04:49 - BHIS - Talkin’ Bout [infosec] News 2024-05-14</p><p>06:33 - Story # 1: Zscaler takes “test environment” offline after rumors of a breach</p><p>18:48 - Story # 2: Okta’s security chief on the company’s own cyberattack and how the ‘battleground’ has shifted</p><p>43:36 - Story # 3: Leaked FBI email stresses need for warrantless surveillance of Americans</p><p>48:46 - Story # 4: Despite big tech lobbying, Maryland passes two internet privacy bills</p><p>52:26 - Story # 4b: The Anxious Generation</p><p>53:46 - Story # 5:Hackers are now targeting the children of corporate executives in elaborate ransomware attacks</p>
<ul><li>(00:00) - PreShow Banter™ — World Class RSA Cookies</li>
<li>(04:49) - BHIS - Talkin' Bout [infosec] News 2024-05-14</li>
<li>(06:33) - Story # 1: Zscaler takes "test environment" offline after rumors of a breach</li>
<li>(18:48) - Story # 2: Okta’s security chief on the company’s own cyberattack and how the ‘battleground’ has shifted</li>
<li>(43:36) - Story # 3: Leaked FBI email stresses need for warrantless surveillance of Americans</li>
<li>(48:46) - Story # 4: Despite big tech lobbying, Maryland passes two internet privacy bills</li>
<li>(52:26) - Story # 4b: The Anxious Generation</li>
<li>(53:46) - Story # 5:Hackers are now targeting the children of corporate executives in elaborate ransomware attacks</li>
</ul>]]>
      </description>
      <content:encoded>
        <![CDATA[<p>00:00 - PreShow Banter™ — World Class RSA Cookies</p><p>04:49 - BHIS - Talkin’ Bout [infosec] News 2024-05-14</p><p>06:33 - Story # 1: Zscaler takes “test environment” offline after rumors of a breach</p><p>18:48 - Story # 2: Okta’s security chief on the company’s own cyberattack and how the ‘battleground’ has shifted</p><p>43:36 - Story # 3: Leaked FBI email stresses need for warrantless surveillance of Americans</p><p>48:46 - Story # 4: Despite big tech lobbying, Maryland passes two internet privacy bills</p><p>52:26 - Story # 4b: The Anxious Generation</p><p>53:46 - Story # 5:Hackers are now targeting the children of corporate executives in elaborate ransomware attacks</p>
<ul><li>(00:00) - PreShow Banter™ — World Class RSA Cookies</li>
<li>(04:49) - BHIS - Talkin' Bout [infosec] News 2024-05-14</li>
<li>(06:33) - Story # 1: Zscaler takes "test environment" offline after rumors of a breach</li>
<li>(18:48) - Story # 2: Okta’s security chief on the company’s own cyberattack and how the ‘battleground’ has shifted</li>
<li>(43:36) - Story # 3: Leaked FBI email stresses need for warrantless surveillance of Americans</li>
<li>(48:46) - Story # 4: Despite big tech lobbying, Maryland passes two internet privacy bills</li>
<li>(52:26) - Story # 4b: The Anxious Generation</li>
<li>(53:46) - Story # 5:Hackers are now targeting the children of corporate executives in elaborate ransomware attacks</li>
</ul>]]>
      </content:encoded>
      <pubDate>Thu, 16 May 2024 12:36:41 -0400</pubDate>
      <author>Black Hills Information Security</author>
      <enclosure url="https://media.transistor.fm/07860596/eb0f6301.mp3" length="58100912" type="audio/mpeg"/>
      <itunes:author>Black Hills Information Security</itunes:author>
      <itunes:image href="https://img.transistorcdn.com/u6bbcS32AIIKOnIFUunLfaDsRKJ27Mmu0_g7HMkUZKk/rs:fill:0:0:1/w:1400/h:1400/q:60/mb:500000/aHR0cHM6Ly9pbWct/dXBsb2FkLXByb2R1/Y3Rpb24udHJhbnNp/c3Rvci5mbS8zOTA3/NDIxNWQzZjA3ZWFk/NDQ5YzQ2NjdlZTYz/YmU3Ny5qcGc.jpg"/>
      <itunes:duration>3476</itunes:duration>
      <itunes:summary>00:00 - PreShow Banter™ — World Class RSA Cookies04:49 - BHIS - Talkin’ Bout [infosec] News 2024-05-1406:33 - Story # 1: Zscaler takes “test environment” offline after rumors of a breach18:48 - Story # 2: Okta’s security chief on the company’s own cyberattack and how the ‘battleground’ has shifted43:36 - Story # 3: Leaked FBI email stresses need for warrantless surveillance of Americans48:46 - Story # 4: Despite big tech lobbying, Maryland passes two internet privacy bills52:26 - Story # 4b: The Anxious Generation53:46 - Story # 5:Hackers are now targeting the children of corporate executives in elaborate ransomware attacks</itunes:summary>
      <itunes:subtitle>00:00 - PreShow Banter™ — World Class RSA Cookies04:49 - BHIS - Talkin’ Bout [infosec] News 2024-05-1406:33 - Story # 1: Zscaler takes “test environment” offline after rumors of a breach18:48 - Story # 2: Okta’s security chief on the company’s own cyberat</itunes:subtitle>
      <itunes:keywords>Infosec,Cybersecurity,news</itunes:keywords>
      <itunes:explicit>No</itunes:explicit>
      <podcast:chapters url="https://share.transistor.fm/s/07860596/chapters.json" type="application/json+chapters"/>
    </item>
    <item>
      <title>2024-05-07 - LastPass Goes Independent, Hacker Sentenced, Vulnerabilities Among us.</title>
      <itunes:episode>1</itunes:episode>
      <podcast:episode>1</podcast:episode>
      <itunes:title>2024-05-07 - LastPass Goes Independent, Hacker Sentenced, Vulnerabilities Among us.</itunes:title>
      <itunes:episodeType>full</itunes:episodeType>
      <guid isPermaLink="false">https://blubrry.com/bhis/132526614/2024-05-07-lastpass-goes-independent-hacker-sentenced-vulnerabilities-among-us/</guid>
      <link>https://share.transistor.fm/s/47581ccb</link>
      <description>
        <![CDATA[<p>00:00 - PreShow Banter™ — RSA Power Moves</p><p>08:14 - BHIS - Talkin’ Bout [infosec] News 2024-05-06</p><p>09:49 - Story # 1: Shortridge Makes Sense of the 2024 Verizon DBIR</p><p>15:04 - Story # 2: A recent security incident involving Dropbox Sign</p><p>20:30 - Story # 3: Sandbox Escape Vulnerabilities in Judge0 Expose Systems to Complete Takeover</p><p>28:40 - Story # 4: Millions of Docker repos found pushing malware, phishing sites</p><p>32:53 - Story # 5: 1,400 GitLab Servers Impacted by Exploited Vulnerability</p><p>42:07 - Story # 6: LastPass goes independent over a year after serious breaches</p><p>50:16 - Cyber Security Basics for Muggles &amp; Minions with Ashley and Chris</p><p>50:40 - Story # 7: Ukrainian REvil Hacker Sentenced to 13 Years and Ordered to Pay $16 Million</p><p>54:12 - Story # 8: Lockbit’s seized site comes alive to tease new police announcements</p><p>56:27 - Story # 9: Systemd v256 Introduces run0: A Safer Alternative to sudo</p>
<ul><li>(00:00) - PreShow Banter™ — RSA Power Moves</li>
<li>(08:14) - BHIS - Talkin' Bout [infosec] News 2024-05-06</li>
<li>(09:49) - Story # 1: Shortridge Makes Sense of the 2024 Verizon DBIR</li>
<li>(15:04) - Story # 2: A recent security incident involving Dropbox Sign</li>
<li>(20:30) - Story # 3: Sandbox Escape Vulnerabilities in Judge0 Expose Systems to Complete Takeover</li>
<li>(28:40) - Story # 4: Millions of Docker repos found pushing malware, phishing sites</li>
<li>(32:53) - Story # 5: 1,400 GitLab Servers Impacted by Exploited Vulnerability</li>
<li>(42:07) - Story # 6: LastPass goes independent over a year after serious breaches</li>
<li>(50:16) - Cyber Security Basics for Muggles &amp; Minions with Ashley and Chris</li>
<li>(50:40) - Story # 7: Ukrainian REvil Hacker Sentenced to 13 Years and Ordered to Pay $16 Million</li>
<li>(54:12) - Story # 8: Lockbit's seized site comes alive to tease new police announcements</li>
<li>(56:27) - Story # 9: Systemd v256 Introduces run0: A Safer Alternative to sudo</li>
</ul>]]>
      </description>
      <content:encoded>
        <![CDATA[<p>00:00 - PreShow Banter™ — RSA Power Moves</p><p>08:14 - BHIS - Talkin’ Bout [infosec] News 2024-05-06</p><p>09:49 - Story # 1: Shortridge Makes Sense of the 2024 Verizon DBIR</p><p>15:04 - Story # 2: A recent security incident involving Dropbox Sign</p><p>20:30 - Story # 3: Sandbox Escape Vulnerabilities in Judge0 Expose Systems to Complete Takeover</p><p>28:40 - Story # 4: Millions of Docker repos found pushing malware, phishing sites</p><p>32:53 - Story # 5: 1,400 GitLab Servers Impacted by Exploited Vulnerability</p><p>42:07 - Story # 6: LastPass goes independent over a year after serious breaches</p><p>50:16 - Cyber Security Basics for Muggles &amp; Minions with Ashley and Chris</p><p>50:40 - Story # 7: Ukrainian REvil Hacker Sentenced to 13 Years and Ordered to Pay $16 Million</p><p>54:12 - Story # 8: Lockbit’s seized site comes alive to tease new police announcements</p><p>56:27 - Story # 9: Systemd v256 Introduces run0: A Safer Alternative to sudo</p>
<ul><li>(00:00) - PreShow Banter™ — RSA Power Moves</li>
<li>(08:14) - BHIS - Talkin' Bout [infosec] News 2024-05-06</li>
<li>(09:49) - Story # 1: Shortridge Makes Sense of the 2024 Verizon DBIR</li>
<li>(15:04) - Story # 2: A recent security incident involving Dropbox Sign</li>
<li>(20:30) - Story # 3: Sandbox Escape Vulnerabilities in Judge0 Expose Systems to Complete Takeover</li>
<li>(28:40) - Story # 4: Millions of Docker repos found pushing malware, phishing sites</li>
<li>(32:53) - Story # 5: 1,400 GitLab Servers Impacted by Exploited Vulnerability</li>
<li>(42:07) - Story # 6: LastPass goes independent over a year after serious breaches</li>
<li>(50:16) - Cyber Security Basics for Muggles &amp; Minions with Ashley and Chris</li>
<li>(50:40) - Story # 7: Ukrainian REvil Hacker Sentenced to 13 Years and Ordered to Pay $16 Million</li>
<li>(54:12) - Story # 8: Lockbit's seized site comes alive to tease new police announcements</li>
<li>(56:27) - Story # 9: Systemd v256 Introduces run0: A Safer Alternative to sudo</li>
</ul>]]>
      </content:encoded>
      <pubDate>Wed, 08 May 2024 12:00:00 -0400</pubDate>
      <author>Black Hills Information Security</author>
      <enclosure url="https://media.transistor.fm/47581ccb/84cdfe9d.mp3" length="62292246" type="audio/mpeg"/>
      <itunes:author>Black Hills Information Security</itunes:author>
      <itunes:image href="https://img.transistorcdn.com/4VVtdzBPreVZ6Qpqwyn2oGg-hfPVQrtYSi-As9yEe_w/rs:fill:0:0:1/w:1400/h:1400/q:60/mb:500000/aHR0cHM6Ly9pbWct/dXBsb2FkLXByb2R1/Y3Rpb24udHJhbnNp/c3Rvci5mbS9kZTY5/NjNkNDdmZmU5NTJj/Y2Y1NDNjZGRlOWU2/NTJmNi5qcGc.jpg"/>
      <itunes:duration>3740</itunes:duration>
      <itunes:summary>00:00 - PreShow Banter™ — RSA Power Moves08:14 - BHIS - Talkin’ Bout [infosec] News 2024-05-0609:49 - Story # 1: Shortridge Makes Sense of the 2024 Verizon DBIR15:04 - Story # 2: A recent security incident involving Dropbox Sign20:30 - Story # 3: Sandbox Escape Vulnerabilities in Judge0 Expose Systems to Complete Takeover28:40 - Story # 4: Millions of Docker repos found pushing malware, phishing sites32:53 - Story # 5: 1,400 GitLab Servers Impacted by Exploited Vulnerability42:07 - Story # 6: LastPass goes independent over a year after serious breaches50:16 - Cyber Security Basics for Muggles &amp;amp; Minions with Ashley and Chris50:40 - Story # 7: Ukrainian REvil Hacker Sentenced to 13 Years and Ordered to Pay $16 Million54:12 - Story # 8: Lockbit’s seized site comes alive to tease new police announcements56:27 - Story # 9: Systemd v256 Introduces run0: A Safer Alternative to sudo</itunes:summary>
      <itunes:subtitle>00:00 - PreShow Banter™ — RSA Power Moves08:14 - BHIS - Talkin’ Bout [infosec] News 2024-05-0609:49 - Story # 1: Shortridge Makes Sense of the 2024 Verizon DBIR15:04 - Story # 2: A recent security incident involving Dropbox Sign20:30 - Story # 3: Sandbox </itunes:subtitle>
      <itunes:keywords>Infosec,Cybersecurity,news</itunes:keywords>
      <itunes:explicit>No</itunes:explicit>
      <podcast:chapters url="https://share.transistor.fm/s/47581ccb/chapters.json" type="application/json+chapters"/>
    </item>
    <item>
      <title>2024-04-29 - Hack All The Things!</title>
      <itunes:episode>1</itunes:episode>
      <podcast:episode>1</podcast:episode>
      <itunes:title>2024-04-29 - Hack All The Things!</itunes:title>
      <itunes:episodeType>full</itunes:episodeType>
      <guid isPermaLink="false">https://blubrry.com/bhis/132469546/2024-04-29-hack-all-the-things/</guid>
      <link>https://share.transistor.fm/s/ab194fff</link>
      <description>
        <![CDATA[<p>00:00 - BHIS - Talkin’ Bout [infosec] News 2024-04-29</p><p> 02:33 - Story # 1: Cyber Hygiene Helps Organizations Mitigate Ransomware-Related Vulnerabilities</p><p> 10:38 - Story # 2: ‘Admin’ and ‘12345’ banned from being used as passwords in UK crackdown on cyber attacks</p><p> 16:34 - Story # 3: Maximum severity Flowmon bug has a public exploit, patch now</p><p> 21:06 - Story # 3b: CVE-2024-2389: Command Injection Vulnerability In Progress Flowmon</p><p> 22:45 - Story # 4:GitHub comments abused to push malware via Microsoft repo URLs</p><p> 30:52 - Story # 5: Security bugs in popular phone-tracking app iSharing exposed users’ precise locations</p><p> 36:47 - Story # 6: Biden signs bill criticized as “major expansion of warrantless surveillance”</p><p> 49:38 - Story # 7: ChatGPT’s hallucinations draw EU privacy complaint</p><p> 57:46 - Story # 8: Sweden’s liquor shelves to run empty this week due to ransomware attack</p>
<ul><li>(00:00) - BHIS - Talkin' Bout [infosec] News 2024-04-29</li>
<li>(02:33) - Story # 1: Cyber Hygiene Helps Organizations Mitigate Ransomware-Related Vulnerabilities</li>
<li>(10:38) - Story # 2: 'Admin' and '12345' banned from being used as passwords in UK crackdown on cyber attacks</li>
<li>(16:34) - Story # 3: Maximum severity Flowmon bug has a public exploit, patch now</li>
<li>(21:06) - Story # 3b: CVE-2024-2389: Command Injection Vulnerability In Progress Flowmon</li>
<li>(22:45) - Story # 4:GitHub comments abused to push malware via Microsoft repo URLs</li>
<li>(30:52) - Story # 5: Security bugs in popular phone-tracking app iSharing exposed users’ precise locations</li>
<li>(36:47) - Story # 6: Biden signs bill criticized as “major expansion of warrantless surveillance”</li>
<li>(49:38) - Story # 7: ChatGPT’s hallucinations draw EU privacy complaint</li>
<li>(57:46) - Story # 8: Sweden's liquor shelves to run empty this week due to ransomware attack</li>
</ul>]]>
      </description>
      <content:encoded>
        <![CDATA[<p>00:00 - BHIS - Talkin’ Bout [infosec] News 2024-04-29</p><p> 02:33 - Story # 1: Cyber Hygiene Helps Organizations Mitigate Ransomware-Related Vulnerabilities</p><p> 10:38 - Story # 2: ‘Admin’ and ‘12345’ banned from being used as passwords in UK crackdown on cyber attacks</p><p> 16:34 - Story # 3: Maximum severity Flowmon bug has a public exploit, patch now</p><p> 21:06 - Story # 3b: CVE-2024-2389: Command Injection Vulnerability In Progress Flowmon</p><p> 22:45 - Story # 4:GitHub comments abused to push malware via Microsoft repo URLs</p><p> 30:52 - Story # 5: Security bugs in popular phone-tracking app iSharing exposed users’ precise locations</p><p> 36:47 - Story # 6: Biden signs bill criticized as “major expansion of warrantless surveillance”</p><p> 49:38 - Story # 7: ChatGPT’s hallucinations draw EU privacy complaint</p><p> 57:46 - Story # 8: Sweden’s liquor shelves to run empty this week due to ransomware attack</p>
<ul><li>(00:00) - BHIS - Talkin' Bout [infosec] News 2024-04-29</li>
<li>(02:33) - Story # 1: Cyber Hygiene Helps Organizations Mitigate Ransomware-Related Vulnerabilities</li>
<li>(10:38) - Story # 2: 'Admin' and '12345' banned from being used as passwords in UK crackdown on cyber attacks</li>
<li>(16:34) - Story # 3: Maximum severity Flowmon bug has a public exploit, patch now</li>
<li>(21:06) - Story # 3b: CVE-2024-2389: Command Injection Vulnerability In Progress Flowmon</li>
<li>(22:45) - Story # 4:GitHub comments abused to push malware via Microsoft repo URLs</li>
<li>(30:52) - Story # 5: Security bugs in popular phone-tracking app iSharing exposed users’ precise locations</li>
<li>(36:47) - Story # 6: Biden signs bill criticized as “major expansion of warrantless surveillance”</li>
<li>(49:38) - Story # 7: ChatGPT’s hallucinations draw EU privacy complaint</li>
<li>(57:46) - Story # 8: Sweden's liquor shelves to run empty this week due to ransomware attack</li>
</ul>]]>
      </content:encoded>
      <pubDate>Wed, 01 May 2024 12:00:00 -0400</pubDate>
      <author>Black Hills Information Security</author>
      <enclosure url="https://media.transistor.fm/ab194fff/fcbd4f02.mp3" length="59569775" type="audio/mpeg"/>
      <itunes:author>Black Hills Information Security</itunes:author>
      <itunes:image href="https://img.transistorcdn.com/VfY2AlSMU7zik9dZLMhFWCE-lH5J15N11TKd2Cu7zHg/rs:fill:0:0:1/w:1400/h:1400/q:60/mb:500000/aHR0cHM6Ly9pbWct/dXBsb2FkLXByb2R1/Y3Rpb24udHJhbnNp/c3Rvci5mbS85NzI0/NzBkOTQ2ZmE5NDU5/ZWNjMTA2MzAzNmFi/NWRhMi5qcGc.jpg"/>
      <itunes:duration>3586</itunes:duration>
      <itunes:summary>00:00 - BHIS - Talkin’ Bout [infosec] News 2024-04-29 02:33 - Story # 1: Cyber Hygiene Helps Organizations Mitigate Ransomware-Related Vulnerabilities 10:38 - Story # 2: ‘Admin’ and ‘12345’ banned from being used as passwords in UK crackdown on cyber attacks 16:34 - Story # 3: Maximum severity Flowmon bug has a public exploit, patch now 21:06 - Story # 3b: CVE-2024-2389: Command Injection Vulnerability In Progress Flowmon 22:45 - Story # 4:GitHub comments abused to push malware via Microsoft repo URLs 30:52 - Story # 5: Security bugs in popular phone-tracking app iSharing exposed users’ precise locations 36:47 - Story # 6: Biden signs bill criticized as “major expansion of warrantless surveillance” 49:38 - Story # 7: ChatGPT’s hallucinations draw EU privacy complaint 57:46 - Story # 8: Sweden’s liquor shelves to run empty this week due to ransomware attack</itunes:summary>
      <itunes:subtitle>00:00 - BHIS - Talkin’ Bout [infosec] News 2024-04-29 02:33 - Story # 1: Cyber Hygiene Helps Organizations Mitigate Ransomware-Related Vulnerabilities 10:38 - Story # 2: ‘Admin’ and ‘12345’ banned from being used as passwords in UK crackdown on cyber atta</itunes:subtitle>
      <itunes:keywords>Infosec,Cybersecurity,news</itunes:keywords>
      <itunes:explicit>No</itunes:explicit>
      <podcast:chapters url="https://share.transistor.fm/s/ab194fff/chapters.json" type="application/json+chapters"/>
    </item>
    <item>
      <title>2024-04-24 - Exploits, Breaches and, Lawsuits!</title>
      <itunes:episode>1</itunes:episode>
      <podcast:episode>1</podcast:episode>
      <itunes:title>2024-04-24 - Exploits, Breaches and, Lawsuits!</itunes:title>
      <itunes:episodeType>full</itunes:episodeType>
      <guid isPermaLink="false">https://blubrry.com/bhis/132317166/2024-04-24-exploits-breaches-and-lawsuits/</guid>
      <link>https://share.transistor.fm/s/e1046d7b</link>
      <description>
        <![CDATA[<p>00:00 - PreShow Banter™ — A Parent Process</p><p> 03:01 - BHIS - Talkin’ Bout [infosec] News 2024-04-22</p><p> 04:13 - Story # 1: Exploit code for Palo Alto Networks zero-day now public</p><p> 07:44 - Story # 1b: (Timeline) Zero-Day Exploitation of Unauthenticated Remote Code Execution Vulnerability in GlobalProtect (CVE-2024-3400)</p><p> 23:22 - Story # 2: MGM says FTC can’t possibly probe its ransomware downfall – watchdog chief Lina Khan was a guest at the time</p><p> 31:37 - Story # 3: MITRE was breached through Ivanti zero-day vulnerabilities</p><p> 32:27 - Story # 4: Cisco Integrated Management Controller CLI Command Injection Vulnerability</p><p> 41:20 - Story # 5: Cisco Duo’s Multifactor Authentication Service Breached</p><p> 46:01 - Story # 6: DevSecOps security practices are doggone disastrous</p><p> 54:57 - Story # 7: FYI: This site claims to have harvested 4B+ Discord chats, today all yours for a price</p>
<ul><li>(00:00) - PreShow Banter™ — A Parent Process</li>
<li>(03:01) - BHIS - Talkin' Bout [infosec] News 2024-04-22</li>
<li>(04:13) - Story # 1: Exploit code for Palo Alto Networks zero-day now public</li>
<li>(07:44) - Story # 1b: (Timeline) Zero-Day Exploitation of Unauthenticated Remote Code Execution Vulnerability in GlobalProtect (CVE-2024-3400)</li>
<li>(23:22) - Story # 2: MGM says FTC can't possibly probe its ransomware downfall – watchdog chief Lina Khan was a guest at the time</li>
<li>(31:37) - Story # 3: MITRE was breached through Ivanti zero-day vulnerabilities</li>
<li>(32:27) - Story # 4: Cisco Integrated Management Controller CLI Command Injection Vulnerability</li>
<li>(41:20) - Story # 5: Cisco Duo's Multifactor Authentication Service Breached</li>
<li>(46:01) - Story # 6: DevSecOps security practices are doggone disastrous</li>
<li>(54:57) - Story # 7: FYI: This site claims to have harvested 4B+ Discord chats, today all yours for a price</li>
</ul>]]>
      </description>
      <content:encoded>
        <![CDATA[<p>00:00 - PreShow Banter™ — A Parent Process</p><p> 03:01 - BHIS - Talkin’ Bout [infosec] News 2024-04-22</p><p> 04:13 - Story # 1: Exploit code for Palo Alto Networks zero-day now public</p><p> 07:44 - Story # 1b: (Timeline) Zero-Day Exploitation of Unauthenticated Remote Code Execution Vulnerability in GlobalProtect (CVE-2024-3400)</p><p> 23:22 - Story # 2: MGM says FTC can’t possibly probe its ransomware downfall – watchdog chief Lina Khan was a guest at the time</p><p> 31:37 - Story # 3: MITRE was breached through Ivanti zero-day vulnerabilities</p><p> 32:27 - Story # 4: Cisco Integrated Management Controller CLI Command Injection Vulnerability</p><p> 41:20 - Story # 5: Cisco Duo’s Multifactor Authentication Service Breached</p><p> 46:01 - Story # 6: DevSecOps security practices are doggone disastrous</p><p> 54:57 - Story # 7: FYI: This site claims to have harvested 4B+ Discord chats, today all yours for a price</p>
<ul><li>(00:00) - PreShow Banter™ — A Parent Process</li>
<li>(03:01) - BHIS - Talkin' Bout [infosec] News 2024-04-22</li>
<li>(04:13) - Story # 1: Exploit code for Palo Alto Networks zero-day now public</li>
<li>(07:44) - Story # 1b: (Timeline) Zero-Day Exploitation of Unauthenticated Remote Code Execution Vulnerability in GlobalProtect (CVE-2024-3400)</li>
<li>(23:22) - Story # 2: MGM says FTC can't possibly probe its ransomware downfall – watchdog chief Lina Khan was a guest at the time</li>
<li>(31:37) - Story # 3: MITRE was breached through Ivanti zero-day vulnerabilities</li>
<li>(32:27) - Story # 4: Cisco Integrated Management Controller CLI Command Injection Vulnerability</li>
<li>(41:20) - Story # 5: Cisco Duo's Multifactor Authentication Service Breached</li>
<li>(46:01) - Story # 6: DevSecOps security practices are doggone disastrous</li>
<li>(54:57) - Story # 7: FYI: This site claims to have harvested 4B+ Discord chats, today all yours for a price</li>
</ul>]]>
      </content:encoded>
      <pubDate>Wed, 24 Apr 2024 11:30:35 -0400</pubDate>
      <author>Black Hills Information Security</author>
      <enclosure url="https://media.transistor.fm/e1046d7b/4e814973.mp3" length="60126580" type="audio/mpeg"/>
      <itunes:author>Black Hills Information Security</itunes:author>
      <itunes:image href="https://img.transistorcdn.com/tqNSwYEpr3brIztNNGkuhE-1ajk7NZeBHq4kuCFC61I/rs:fill:0:0:1/w:1400/h:1400/q:60/mb:500000/aHR0cHM6Ly9pbWct/dXBsb2FkLXByb2R1/Y3Rpb24udHJhbnNp/c3Rvci5mbS85Mzgx/MzNiYTRhMzk5NDYw/MjAxYjE4NDU3YjU3/YjBjZS5qcGc.jpg"/>
      <itunes:duration>3615</itunes:duration>
      <itunes:summary>00:00 - PreShow Banter™ — A Parent Process 03:01 - BHIS - Talkin’ Bout [infosec] News 2024-04-22 04:13 - Story # 1: Exploit code for Palo Alto Networks zero-day now public 07:44 - Story # 1b: (Timeline) Zero-Day Exploitation of Unauthenticated Remote Code Execution Vulnerability in GlobalProtect (CVE-2024-3400) 23:22 - Story # 2: MGM says FTC can’t possibly probe its ransomware downfall – watchdog chief Lina Khan was a guest at the time 31:37 - Story # 3: MITRE was breached through Ivanti zero-day vulnerabilities 32:27 - Story # 4: Cisco Integrated Management Controller CLI Command Injection Vulnerability 41:20 - Story # 5: Cisco Duo’s Multifactor Authentication Service Breached 46:01 - Story # 6: DevSecOps security practices are doggone disastrous 54:57 - Story # 7: FYI: This site claims to have harvested 4B+ Discord chats, today all yours for a price</itunes:summary>
      <itunes:subtitle>00:00 - PreShow Banter™ — A Parent Process 03:01 - BHIS - Talkin’ Bout [infosec] News 2024-04-22 04:13 - Story # 1: Exploit code for Palo Alto Networks zero-day now public 07:44 - Story # 1b: (Timeline) Zero-Day Exploitation of Unauthenticated Remote Code</itunes:subtitle>
      <itunes:keywords>Infosec,Cybersecurity,news</itunes:keywords>
      <itunes:explicit>No</itunes:explicit>
      <podcast:chapters url="https://share.transistor.fm/s/e1046d7b/chapters.json" type="application/json+chapters"/>
    </item>
    <item>
      <title>2024-04-17 - SoCal Man Arrested, EPA Leaks, Net Neutrality returns?</title>
      <itunes:episode>1</itunes:episode>
      <podcast:episode>1</podcast:episode>
      <itunes:title>2024-04-17 - SoCal Man Arrested, EPA Leaks, Net Neutrality returns?</itunes:title>
      <itunes:episodeType>full</itunes:episodeType>
      <guid isPermaLink="false">https://blubrry.com/bhis/132147304/2024-04-17-socal-man-arrested-epa-leaks-net-neutrality-returns/</guid>
      <link>https://share.transistor.fm/s/c678b070</link>
      <description>
        <![CDATA[<p>00:00 - PreShow Banter™ — Retro Actions</p><p> 04:48 - BHIS - Talkin’ Bout [infosec] News 2024-04-15</p><p> 07:05 - Story # 1: FCC to vote on net neutrality rules on April 25</p><p> 18:52 - Story # 2: “All Your Secrets Are Belong To Us” — A Delinea Secret Server AuthN/AuthZ Bypass</p><p> 23:40 - Story # 2b: Delinea has cloud security incident in Thycotic Secret Server gaff</p><p> 28:23 - Story # 3: CISA Releases Malware Next-Gen Analysis System for Public Use</p><p> 40:36 - Story # 4: Hacker Leaks 8.5M U.S. Environmental Protection Agency (EPA) Contact Data</p><p> 45:55 - Story # 5: SoCal Man Arrested on Federal Charges Alleging He Schemed to Advertise and Sell ‘Hive’ Computer Intrusion Malware</p>
<ul><li>(00:00) - PreShow Banter™ — Retro Actions</li>
<li>(04:48) - BHIS - Talkin' Bout [infosec] News 2024-04-15</li>
<li>(07:05) - Story # 1: FCC to vote on net neutrality rules on April 25</li>
<li>(18:52) - Story # 2: “All Your Secrets Are Belong To Us” — A Delinea Secret Server AuthN/AuthZ Bypass</li>
<li>(23:40) - Story # 2b: Delinea has cloud security incident in Thycotic Secret Server gaff</li>
<li>(28:23) - Story # 3: CISA Releases Malware Next-Gen Analysis System for Public Use</li>
<li>(40:36) - Story # 4: Hacker Leaks 8.5M U.S. Environmental Protection Agency (EPA) Contact Data</li>
<li>(45:55) - Story # 5: SoCal Man Arrested on Federal Charges Alleging He Schemed to Advertise and Sell ‘Hive’ Computer Intrusion Malware</li>
</ul>]]>
      </description>
      <content:encoded>
        <![CDATA[<p>00:00 - PreShow Banter™ — Retro Actions</p><p> 04:48 - BHIS - Talkin’ Bout [infosec] News 2024-04-15</p><p> 07:05 - Story # 1: FCC to vote on net neutrality rules on April 25</p><p> 18:52 - Story # 2: “All Your Secrets Are Belong To Us” — A Delinea Secret Server AuthN/AuthZ Bypass</p><p> 23:40 - Story # 2b: Delinea has cloud security incident in Thycotic Secret Server gaff</p><p> 28:23 - Story # 3: CISA Releases Malware Next-Gen Analysis System for Public Use</p><p> 40:36 - Story # 4: Hacker Leaks 8.5M U.S. Environmental Protection Agency (EPA) Contact Data</p><p> 45:55 - Story # 5: SoCal Man Arrested on Federal Charges Alleging He Schemed to Advertise and Sell ‘Hive’ Computer Intrusion Malware</p>
<ul><li>(00:00) - PreShow Banter™ — Retro Actions</li>
<li>(04:48) - BHIS - Talkin' Bout [infosec] News 2024-04-15</li>
<li>(07:05) - Story # 1: FCC to vote on net neutrality rules on April 25</li>
<li>(18:52) - Story # 2: “All Your Secrets Are Belong To Us” — A Delinea Secret Server AuthN/AuthZ Bypass</li>
<li>(23:40) - Story # 2b: Delinea has cloud security incident in Thycotic Secret Server gaff</li>
<li>(28:23) - Story # 3: CISA Releases Malware Next-Gen Analysis System for Public Use</li>
<li>(40:36) - Story # 4: Hacker Leaks 8.5M U.S. Environmental Protection Agency (EPA) Contact Data</li>
<li>(45:55) - Story # 5: SoCal Man Arrested on Federal Charges Alleging He Schemed to Advertise and Sell ‘Hive’ Computer Intrusion Malware</li>
</ul>]]>
      </content:encoded>
      <pubDate>Wed, 17 Apr 2024 11:56:19 -0400</pubDate>
      <author>Black Hills Information Security</author>
      <enclosure url="https://media.transistor.fm/c678b070/e1a70017.mp3" length="59339010" type="audio/mpeg"/>
      <itunes:author>Black Hills Information Security</itunes:author>
      <itunes:image href="https://img.transistorcdn.com/Gc_z-JCSRsIWsDF1bimmUIHnzEgrTS_0YzL_hqZTme0/rs:fill:0:0:1/w:1400/h:1400/q:60/mb:500000/aHR0cHM6Ly9pbWct/dXBsb2FkLXByb2R1/Y3Rpb24udHJhbnNp/c3Rvci5mbS9jODM5/NTJmYmYwZDBhMWMy/ZmVkMzNkZjcxMzhm/OTllYy5qcGc.jpg"/>
      <itunes:duration>3598</itunes:duration>
      <itunes:summary>00:00 - PreShow Banter™ — Retro Actions 04:48 - BHIS - Talkin’ Bout [infosec] News 2024-04-15 07:05 - Story # 1: FCC to vote on net neutrality rules on April 25 18:52 - Story # 2: “All Your Secrets Are Belong To Us” — A Delinea Secret Server AuthN/AuthZ Bypass 23:40 - Story # 2b: Delinea has cloud security incident in Thycotic Secret Server gaff 28:23 - Story # 3: CISA Releases Malware Next-Gen Analysis System for Public Use 40:36 - Story # 4: Hacker Leaks 8.5M U.S. Environmental Protection Agency (EPA) Contact Data 45:55 - Story # 5: SoCal Man Arrested on Federal Charges Alleging He Schemed to Advertise and Sell ‘Hive’ Computer Intrusion Malware</itunes:summary>
      <itunes:subtitle>00:00 - PreShow Banter™ — Retro Actions 04:48 - BHIS - Talkin’ Bout [infosec] News 2024-04-15 07:05 - Story # 1: FCC to vote on net neutrality rules on April 25 18:52 - Story # 2: “All Your Secrets Are Belong To Us” — A Delinea Secret Server AuthN/AuthZ B</itunes:subtitle>
      <itunes:keywords>Infosec,Cybersecurity,news</itunes:keywords>
      <itunes:explicit>No</itunes:explicit>
      <podcast:chapters url="https://share.transistor.fm/s/c678b070/chapters.json" type="application/json+chapters"/>
    </item>
    <item>
      <title>2024-04-10 - Vigilante Hackers,  Data Sharing, Cybersecurity Taken Over by Computers?</title>
      <itunes:episode>1</itunes:episode>
      <podcast:episode>1</podcast:episode>
      <itunes:title>2024-04-10 - Vigilante Hackers,  Data Sharing, Cybersecurity Taken Over by Computers?</itunes:title>
      <itunes:episodeType>full</itunes:episodeType>
      <guid isPermaLink="false">https://blubrry.com/bhis/132023916/2024-04-10-vigilante-hackers-data-sharing-cybersecurity-taken-over-by-computers/</guid>
      <link>https://share.transistor.fm/s/55cb8af7</link>
      <description>
        <![CDATA[<p>00:00 - PreShow Banter™ — BHIS Bees Corp®</p><p> 04:08 - The FUTURE IS…… Kickstarter</p><p> 05:29 - BHIS - Talkin’ Bout [infosec] News 2024-04-08</p><p> 06:03 - Story # 1: New draft bipartisan US federal privacy bill unveiled</p><p> 11:03 - Story # 2: How To Opt Out Of GM Sharing Your Driving Data With Insurance Companies</p><p> 13:04 - Story # 2b: Request a Consumer Disclosure Report</p><p> 14:25 - Story # 3: Hackers Hijacked Notepad++ Plugin To Execute Malicious Code</p><p> 29:19 - Story # 4: A Vigilante Hacker Took Down North Korea’s Internet. Now He’s Taking Off His Mask</p><p> 46:15 - Story # 5: It’s Time to Hand Cybersecurity Over to the Computers</p>
<ul><li>(00:00) - PreShow Banter™ — BHIS Bees Corp®</li>
<li>(04:08) - The FUTURE IS...... Kickstarter</li>
<li>(05:29) - BHIS - Talkin' Bout [infosec] News 2024-04-08</li>
<li>(06:03) - Story # 1: New draft bipartisan US federal privacy bill unveiled</li>
<li>(11:03) - Story # 2: How To Opt Out Of GM Sharing Your Driving Data With Insurance Companies</li>
<li>(13:04) - Story # 2b: Request a Consumer Disclosure Report</li>
<li>(14:25) - Story # 3: Hackers Hijacked Notepad++ Plugin To Execute Malicious Code</li>
<li>(29:19) - Story # 4: A Vigilante Hacker Took Down North Korea’s Internet. Now He’s Taking Off His Mask</li>
<li>(46:15) - Story # 5: It’s Time to Hand Cybersecurity Over to the Computers</li>
</ul>]]>
      </description>
      <content:encoded>
        <![CDATA[<p>00:00 - PreShow Banter™ — BHIS Bees Corp®</p><p> 04:08 - The FUTURE IS…… Kickstarter</p><p> 05:29 - BHIS - Talkin’ Bout [infosec] News 2024-04-08</p><p> 06:03 - Story # 1: New draft bipartisan US federal privacy bill unveiled</p><p> 11:03 - Story # 2: How To Opt Out Of GM Sharing Your Driving Data With Insurance Companies</p><p> 13:04 - Story # 2b: Request a Consumer Disclosure Report</p><p> 14:25 - Story # 3: Hackers Hijacked Notepad++ Plugin To Execute Malicious Code</p><p> 29:19 - Story # 4: A Vigilante Hacker Took Down North Korea’s Internet. Now He’s Taking Off His Mask</p><p> 46:15 - Story # 5: It’s Time to Hand Cybersecurity Over to the Computers</p>
<ul><li>(00:00) - PreShow Banter™ — BHIS Bees Corp®</li>
<li>(04:08) - The FUTURE IS...... Kickstarter</li>
<li>(05:29) - BHIS - Talkin' Bout [infosec] News 2024-04-08</li>
<li>(06:03) - Story # 1: New draft bipartisan US federal privacy bill unveiled</li>
<li>(11:03) - Story # 2: How To Opt Out Of GM Sharing Your Driving Data With Insurance Companies</li>
<li>(13:04) - Story # 2b: Request a Consumer Disclosure Report</li>
<li>(14:25) - Story # 3: Hackers Hijacked Notepad++ Plugin To Execute Malicious Code</li>
<li>(29:19) - Story # 4: A Vigilante Hacker Took Down North Korea’s Internet. Now He’s Taking Off His Mask</li>
<li>(46:15) - Story # 5: It’s Time to Hand Cybersecurity Over to the Computers</li>
</ul>]]>
      </content:encoded>
      <pubDate>Wed, 10 Apr 2024 10:52:58 -0400</pubDate>
      <author>Black Hills Information Security</author>
      <enclosure url="https://media.transistor.fm/55cb8af7/13a9e1f8.mp3" length="62551827" type="audio/mpeg"/>
      <itunes:author>Black Hills Information Security</itunes:author>
      <itunes:image href="https://img.transistorcdn.com/JXLDo4OBZL9u4Ic7OTztqNnT-0pOhKu4D4y8QXWJ_IE/rs:fill:0:0:1/w:1400/h:1400/q:60/mb:500000/aHR0cHM6Ly9pbWct/dXBsb2FkLXByb2R1/Y3Rpb24udHJhbnNp/c3Rvci5mbS9kMzQx/ZWE3NTM5NGUzMmIx/NDFmN2M2MjhiMmMz/ZTZkOC5qcGc.jpg"/>
      <itunes:duration>3795</itunes:duration>
      <itunes:summary>00:00 - PreShow Banter™ — BHIS Bees Corp® 04:08 - The FUTURE IS…… Kickstarter 05:29 - BHIS - Talkin’ Bout [infosec] News 2024-04-08 06:03 - Story # 1: New draft bipartisan US federal privacy bill unveiled 11:03 - Story # 2: How To Opt Out Of GM Sharing Your Driving Data With Insurance Companies 13:04 - Story # 2b: Request a Consumer Disclosure Report 14:25 - Story # 3: Hackers Hijacked Notepad++ Plugin To Execute Malicious Code 29:19 - Story # 4: A Vigilante Hacker Took Down North Korea’s Internet. Now He’s Taking Off His Mask 46:15 - Story # 5: It’s Time to Hand Cybersecurity Over to the Computers</itunes:summary>
      <itunes:subtitle>00:00 - PreShow Banter™ — BHIS Bees Corp® 04:08 - The FUTURE IS…… Kickstarter 05:29 - BHIS - Talkin’ Bout [infosec] News 2024-04-08 06:03 - Story # 1: New draft bipartisan US federal privacy bill unveiled 11:03 - Story # 2: How To Opt Out Of GM Sharing Yo</itunes:subtitle>
      <itunes:keywords>Infosec,Cybersecurity,news</itunes:keywords>
      <itunes:explicit>No</itunes:explicit>
      <podcast:chapters url="https://share.transistor.fm/s/55cb8af7/chapters.json" type="application/json+chapters"/>
    </item>
    <item>
      <title>2024-04-03 - Zippers, Jokes &amp; Data Breaches</title>
      <itunes:episode>1</itunes:episode>
      <podcast:episode>1</podcast:episode>
      <itunes:title>2024-04-03 - Zippers, Jokes &amp; Data Breaches</itunes:title>
      <itunes:episodeType>full</itunes:episodeType>
      <guid isPermaLink="false">https://blubrry.com/bhis/131901769/2024-04-03-zippers-jokes-data-breaches/</guid>
      <link>https://share.transistor.fm/s/1527ddd5</link>
      <description>
        <![CDATA[<p>00:00 - PreShow Banter™ — Zippers, Jokes, &amp; Lawyers (Not to be confused with the song "Lawyers, Guns and Money")</p><p>02:59 - BHIS - Talkin’ Bout [infosec] News 2024-04-01</p><p>03:57 - Story # 1: New Darcula phishing service targets iPhone users via iMessage</p><p>11:57 - Story # 2: Recent ‘MFA Bombing’ Attacks Targeting Apple Users</p><p>17:22 - Story # 3: Thousands of phones and routers swept into proxy service, unbeknownst to users</p><p>22:11 - Story # 4: Digital signs around Brookline are collecting data from your phone as you walk by</p><p>26:57 - Story # 5: Backdoor found in widely used Linux utility targets encrypted SSH connections</p><p>28:22 - Story # 5b: XZ Outbreak diagram</p><p>37:32 - Story # 6: Vans warns customers of data breach</p><p>40:00 - Story # 7: Worldwide Agenda Ransomware Wave Targets VMware ESXi Servers</p><p>50:32 - Story # 8: Criminals Are Weaponizing Child Abuse Imagery to Ban Discord Servers</p><p>56:41 - Story # 9: International car theft tool seized in Australia, sparking police warning</p><p>58:14 - Story # 9b: Investigation into electronic device at Utah high school raises larger concerns for police</p>
<ul><li>(00:00) - PreShow Banter™ — Zippers, Jokes &amp; Lawyers</li>
<li>(02:59) - BHIS - Talkin' Bout [infosec] News 2024-04-01</li>
<li>(03:57) - Story # 1: New Darcula phishing service targets iPhone users via iMessage</li>
<li>(11:57) - Story # 2: Recent ‘MFA Bombing’ Attacks Targeting Apple Users</li>
<li>(17:22) - Story # 3: Thousands of phones and routers swept into proxy service, unbeknownst to users</li>
<li>(22:11) - Story # 4: Digital signs around Brookline are collecting data from your phone as you walk by</li>
<li>(26:57) - Story # 5: Backdoor found in widely used Linux utility targets encrypted SSH connections</li>
<li>(28:22) - Story # 5b: XZ Outbreak diagram</li>
<li>(37:32) - Story # 6: Vans warns customers of data breach</li>
<li>(40:00) - Story # 7: Worldwide Agenda Ransomware Wave Targets VMware ESXi Servers</li>
<li>(50:32) - Story # 8: Criminals Are Weaponizing Child Abuse Imagery to Ban Discord Servers</li>
<li>(56:41) - Story # 9: International car theft tool seized in Australia, sparking police warning</li>
<li>(58:14) - Story # 9b: Investigation into electronic device at Utah high school raises larger concerns for police</li>
</ul>]]>
      </description>
      <content:encoded>
        <![CDATA[<p>00:00 - PreShow Banter™ — Zippers, Jokes, &amp; Lawyers (Not to be confused with the song "Lawyers, Guns and Money")</p><p>02:59 - BHIS - Talkin’ Bout [infosec] News 2024-04-01</p><p>03:57 - Story # 1: New Darcula phishing service targets iPhone users via iMessage</p><p>11:57 - Story # 2: Recent ‘MFA Bombing’ Attacks Targeting Apple Users</p><p>17:22 - Story # 3: Thousands of phones and routers swept into proxy service, unbeknownst to users</p><p>22:11 - Story # 4: Digital signs around Brookline are collecting data from your phone as you walk by</p><p>26:57 - Story # 5: Backdoor found in widely used Linux utility targets encrypted SSH connections</p><p>28:22 - Story # 5b: XZ Outbreak diagram</p><p>37:32 - Story # 6: Vans warns customers of data breach</p><p>40:00 - Story # 7: Worldwide Agenda Ransomware Wave Targets VMware ESXi Servers</p><p>50:32 - Story # 8: Criminals Are Weaponizing Child Abuse Imagery to Ban Discord Servers</p><p>56:41 - Story # 9: International car theft tool seized in Australia, sparking police warning</p><p>58:14 - Story # 9b: Investigation into electronic device at Utah high school raises larger concerns for police</p>
<ul><li>(00:00) - PreShow Banter™ — Zippers, Jokes &amp; Lawyers</li>
<li>(02:59) - BHIS - Talkin' Bout [infosec] News 2024-04-01</li>
<li>(03:57) - Story # 1: New Darcula phishing service targets iPhone users via iMessage</li>
<li>(11:57) - Story # 2: Recent ‘MFA Bombing’ Attacks Targeting Apple Users</li>
<li>(17:22) - Story # 3: Thousands of phones and routers swept into proxy service, unbeknownst to users</li>
<li>(22:11) - Story # 4: Digital signs around Brookline are collecting data from your phone as you walk by</li>
<li>(26:57) - Story # 5: Backdoor found in widely used Linux utility targets encrypted SSH connections</li>
<li>(28:22) - Story # 5b: XZ Outbreak diagram</li>
<li>(37:32) - Story # 6: Vans warns customers of data breach</li>
<li>(40:00) - Story # 7: Worldwide Agenda Ransomware Wave Targets VMware ESXi Servers</li>
<li>(50:32) - Story # 8: Criminals Are Weaponizing Child Abuse Imagery to Ban Discord Servers</li>
<li>(56:41) - Story # 9: International car theft tool seized in Australia, sparking police warning</li>
<li>(58:14) - Story # 9b: Investigation into electronic device at Utah high school raises larger concerns for police</li>
</ul>]]>
      </content:encoded>
      <pubDate>Wed, 03 Apr 2024 12:09:06 -0400</pubDate>
      <author>Black Hills Information Security</author>
      <enclosure url="https://media.transistor.fm/1527ddd5/c70a6b81.mp3" length="66264343" type="audio/mpeg"/>
      <itunes:author>Black Hills Information Security</itunes:author>
      <itunes:image href="https://img.transistorcdn.com/rlIOEtvGmpUhC7kcgWKKAv_q-R2ftQKaOck24YcVm1M/rs:fill:0:0:1/w:1400/h:1400/q:60/mb:500000/aHR0cHM6Ly9pbWct/dXBsb2FkLXByb2R1/Y3Rpb24udHJhbnNp/c3Rvci5mbS8zMWYy/ZWVlZTI0ZmE5YmIy/OGZhYWUzNmM5OWU2/MzBlYS5qcGc.jpg"/>
      <itunes:duration>3975</itunes:duration>
      <itunes:summary>00:00 - PreShow Banter™ — Zippers, Jokes, &amp;amp; Lawyers (Not to be confused with the song "Lawyers, Guns and Money")02:59 - BHIS - Talkin’ Bout [infosec] News 2024-04-0103:57 - Story # 1: New Darcula phishing service targets iPhone users via iMessage11:57 - Story # 2: Recent ‘MFA Bombing’ Attacks Targeting Apple Users17:22 - Story # 3: Thousands of phones and routers swept into proxy service, unbeknownst to users22:11 - Story # 4: Digital signs around Brookline are collecting data from your phone as you walk by26:57 - Story # 5: Backdoor found in widely used Linux utility targets encrypted SSH connections28:22 - Story # 5b: XZ Outbreak diagram37:32 - Story # 6: Vans warns customers of data breach40:00 - Story # 7: Worldwide Agenda Ransomware Wave Targets VMware ESXi Servers50:32 - Story # 8: Criminals Are Weaponizing Child Abuse Imagery to Ban Discord Servers56:41 - Story # 9: International car theft tool seized in Australia, sparking police warning58:14 - Story # 9b: Investigation into electronic device at Utah high school raises larger concerns for police</itunes:summary>
      <itunes:subtitle>00:00 - PreShow Banter™ — Zippers, Jokes, &amp;amp; Lawyers (Not to be confused with the song "Lawyers, Guns and Money")02:59 - BHIS - Talkin’ Bout [infosec] News 2024-04-0103:57 - Story # 1: New Darcula phishing service targets iPhone users via iMessage11:57</itunes:subtitle>
      <itunes:keywords>Infosec,Cybersecurity,news</itunes:keywords>
      <itunes:explicit>No</itunes:explicit>
      <podcast:chapters url="https://share.transistor.fm/s/1527ddd5/chapters.json" type="application/json+chapters"/>
    </item>
    <item>
      <title>2024-5-03-27 - Social Media Ban, Sold Data and Splunk w/ Graham Helton</title>
      <itunes:episode>1</itunes:episode>
      <podcast:episode>1</podcast:episode>
      <itunes:title>2024-5-03-27 - Social Media Ban, Sold Data and Splunk w/ Graham Helton</itunes:title>
      <itunes:episodeType>full</itunes:episodeType>
      <guid isPermaLink="false">https://blubrry.com/bhis/131767946/20245-03-27-social-media-ban-sold-data-and-splunk-w-graham-helton/</guid>
      <link>https://share.transistor.fm/s/eb8b38f6</link>
      <description>
        <![CDATA[<p>00:00 - PreShow Banter™ — “Allegedly”</p><p>03:18 - BHIS - Talkin’ Bout [infosec] News 2024-03-25</p><p>08:00 - Story # 1: Cisco Completes Acquisition of Splunk</p><p>10:47 - Story # 2: General Motors Quits Sharing Driving Behavior With Data Brokers</p><p>15:27 - Story # 3: Ron DeSantis signs bill requiring parental consent for kids under 16 to hold social media accounts</p><p>24:34 - Story # 4: House passes bill to prevent the sale of personal data to foreign adversaries</p><p>28:19 - Story # 5: Unsaflok - vulnerability impacts over 3 million hotel doors</p><p>33:57 - Story # 6: Canada revisits decision to ban Flipper Zero</p><p>36:57 - Story # 7: Truck-to-truck worm could infect – and disrupt – entire US commercial fleet</p><p>42:59 - Story # 8: Cybercriminals Beta Test New Attack to Bypass AI Security</p><p>46:31 - Story # 9: Russians will no longer be able to access Microsoft cloud services, business intelligence tools</p><p>50:36 - Story # 10: New ‘Loop DoS’ Attack Impacts Hundreds of Thousands of Systems</p><p>55:05 - Story # 11: New surveillance video of man catching a flight without ticket</p>
<ul><li>(00:00) - PreShow Banter™ — "Allegedly"</li>
<li>(03:18) - BHIS - Talkin' Bout [infosec] News 2024-03-25</li>
<li>(08:00) - Story # 1: Cisco Completes Acquisition of Splunk</li>
<li>(10:47) - Story # 2: General Motors Quits Sharing Driving Behavior With Data Brokers</li>
<li>(15:27) - Story # 3: Ron DeSantis signs bill requiring parental consent for kids under 16 to hold social media accounts</li>
<li>(24:34) - Story # 4: House passes bill to prevent the sale of personal data to foreign adversaries</li>
<li>(28:19) - Story # 5: Unsaflok - vulnerability impacts over 3 million hotel doors</li>
<li>(33:57) - Story # 6: Canada revisits decision to ban Flipper Zero</li>
<li>(36:57) - Story # 7: Truck-to-truck worm could infect – and disrupt – entire US commercial fleet</li>
<li>(42:59) - Story # 8: Cybercriminals Beta Test New Attack to Bypass AI Security</li>
<li>(46:31) - Story # 9: Russians will no longer be able to access Microsoft cloud services, business intelligence tools</li>
<li>(50:36) - Story # 10: New 'Loop DoS' Attack Impacts Hundreds of Thousands of Systems</li>
<li>(55:05) - Story # 11: New surveillance video of man catching a flight without ticket</li>
</ul>]]>
      </description>
      <content:encoded>
        <![CDATA[<p>00:00 - PreShow Banter™ — “Allegedly”</p><p>03:18 - BHIS - Talkin’ Bout [infosec] News 2024-03-25</p><p>08:00 - Story # 1: Cisco Completes Acquisition of Splunk</p><p>10:47 - Story # 2: General Motors Quits Sharing Driving Behavior With Data Brokers</p><p>15:27 - Story # 3: Ron DeSantis signs bill requiring parental consent for kids under 16 to hold social media accounts</p><p>24:34 - Story # 4: House passes bill to prevent the sale of personal data to foreign adversaries</p><p>28:19 - Story # 5: Unsaflok - vulnerability impacts over 3 million hotel doors</p><p>33:57 - Story # 6: Canada revisits decision to ban Flipper Zero</p><p>36:57 - Story # 7: Truck-to-truck worm could infect – and disrupt – entire US commercial fleet</p><p>42:59 - Story # 8: Cybercriminals Beta Test New Attack to Bypass AI Security</p><p>46:31 - Story # 9: Russians will no longer be able to access Microsoft cloud services, business intelligence tools</p><p>50:36 - Story # 10: New ‘Loop DoS’ Attack Impacts Hundreds of Thousands of Systems</p><p>55:05 - Story # 11: New surveillance video of man catching a flight without ticket</p>
<ul><li>(00:00) - PreShow Banter™ — "Allegedly"</li>
<li>(03:18) - BHIS - Talkin' Bout [infosec] News 2024-03-25</li>
<li>(08:00) - Story # 1: Cisco Completes Acquisition of Splunk</li>
<li>(10:47) - Story # 2: General Motors Quits Sharing Driving Behavior With Data Brokers</li>
<li>(15:27) - Story # 3: Ron DeSantis signs bill requiring parental consent for kids under 16 to hold social media accounts</li>
<li>(24:34) - Story # 4: House passes bill to prevent the sale of personal data to foreign adversaries</li>
<li>(28:19) - Story # 5: Unsaflok - vulnerability impacts over 3 million hotel doors</li>
<li>(33:57) - Story # 6: Canada revisits decision to ban Flipper Zero</li>
<li>(36:57) - Story # 7: Truck-to-truck worm could infect – and disrupt – entire US commercial fleet</li>
<li>(42:59) - Story # 8: Cybercriminals Beta Test New Attack to Bypass AI Security</li>
<li>(46:31) - Story # 9: Russians will no longer be able to access Microsoft cloud services, business intelligence tools</li>
<li>(50:36) - Story # 10: New 'Loop DoS' Attack Impacts Hundreds of Thousands of Systems</li>
<li>(55:05) - Story # 11: New surveillance video of man catching a flight without ticket</li>
</ul>]]>
      </content:encoded>
      <pubDate>Wed, 27 Mar 2024 13:54:00 -0400</pubDate>
      <author>Black Hills Information Security</author>
      <enclosure url="https://media.transistor.fm/eb8b38f6/c3d511a9.mp3" length="59403185" type="audio/mpeg"/>
      <itunes:author>Black Hills Information Security</itunes:author>
      <itunes:image href="https://img.transistorcdn.com/ZK_N5e8lXg1IUS3Fmnz8oJovcWJ4oxlS98CH0j8326I/rs:fill:0:0:1/w:1400/h:1400/q:60/mb:500000/aHR0cHM6Ly9pbWct/dXBsb2FkLXByb2R1/Y3Rpb24udHJhbnNp/c3Rvci5mbS9iOGZh/OGNkNDUxNzNhMmE1/Yzk4NjY1NDllNmI2/NDU4Mi5qcGc.jpg"/>
      <itunes:duration>3551</itunes:duration>
      <itunes:summary>00:00 - PreShow Banter™ — “Allegedly”03:18 - BHIS - Talkin’ Bout [infosec] News 2024-03-2508:00 - Story # 1: Cisco Completes Acquisition of Splunk10:47 - Story # 2: General Motors Quits Sharing Driving Behavior With Data Brokers15:27 - Story # 3: Ron DeSantis signs bill requiring parental consent for kids under 16 to hold social media accounts24:34 - Story # 4: House passes bill to prevent the sale of personal data to foreign adversaries28:19 - Story # 5: Unsaflok - vulnerability impacts over 3 million hotel doors33:57 - Story # 6: Canada revisits decision to ban Flipper Zero36:57 - Story # 7: Truck-to-truck worm could infect – and disrupt – entire US commercial fleet42:59 - Story # 8: Cybercriminals Beta Test New Attack to Bypass AI Security46:31 - Story # 9: Russians will no longer be able to access Microsoft cloud services, business intelligence tools50:36 - Story # 10: New ‘Loop DoS’ Attack Impacts Hundreds of Thousands of Systems55:05 - Story # 11: New surveillance video of man catching a flight without ticket</itunes:summary>
      <itunes:subtitle>00:00 - PreShow Banter™ — “Allegedly”03:18 - BHIS - Talkin’ Bout [infosec] News 2024-03-2508:00 - Story # 1: Cisco Completes Acquisition of Splunk10:47 - Story # 2: General Motors Quits Sharing Driving Behavior With Data Brokers15:27 - Story # 3: Ron DeSa</itunes:subtitle>
      <itunes:keywords>Infosec,Cybersecurity,news</itunes:keywords>
      <itunes:explicit>No</itunes:explicit>
      <podcast:chapters url="https://share.transistor.fm/s/eb8b38f6/chapters.json" type="application/json+chapters"/>
    </item>
    <item>
      <title>2024-03-20 - New Arms Again w/ Jay Beale of InGuardians</title>
      <itunes:episode>1</itunes:episode>
      <podcast:episode>1</podcast:episode>
      <itunes:title>2024-03-20 - New Arms Again w/ Jay Beale of InGuardians</itunes:title>
      <itunes:episodeType>full</itunes:episodeType>
      <guid isPermaLink="false">https://blubrry.com/bhis/131634936/03-20-2024-new-arms-again-w-jay-beale-of-inguardians/</guid>
      <link>https://share.transistor.fm/s/5fd7b285</link>
      <description>
        <![CDATA[<p>Brought to you by Antisyphon Training — <a href="https://www.antisyphontraining.com">https://www.antisyphontraining.com</a></p><p><br></p><p>00:00:00 - PreShow Banter™ — New Arms Again</p><p>00:03:24 - BHIS - Talkin’ Bout [infosec] News 2024-03-18</p><p>00:04:54 - Story # 1: NIST Releases Version 2.0 of Landmark Cybersecurity Framework</p><p>00:10:50 - Story # 2: The FCC has finally decreed that 25Mbps and 3Mbps are not ‘broadband’ speed</p><p>00:14:33 - Story # 3: Welcome to the 2024 Threat Detection Report</p><p>00:33:40 - Story # 4: NSA Releases Top Ten Cloud Security Mitigation Strategies</p><p>00:47:33 - Story # 5: US government agencies demand fixable ice cream machines</p><p>00:53:14 - Story # 6: Homeland Security is testing AI to help with immigration, trafficking investigations, and disaster relief</p><p>01:03:19 - Story # 7: Feds seize $1.4 million of tech support scam proceeds with the help of crypto firm</p>
<ul><li>(00:00) - PreShow Banter™ — New Arms Again</li>
<li>(03:24) - BHIS - Talkin' Bout [infosec] News 2024-03-18</li>
<li>(04:54) - Story # 1: NIST Releases Version 2.0 of Landmark Cybersecurity Framework</li>
<li>(10:50) - Story # 2: The FCC has finally decreed that 25Mbps and 3Mbps are not ‘broadband’ speed</li>
<li>(14:33) - Story # 3: Welcome to the 2024 Threat Detection Report</li>
<li>(33:40) - Story # 4: NSA Releases Top Ten Cloud Security Mitigation Strategies</li>
<li>(47:33) - Story # 5: US government agencies demand fixable ice cream machines</li>
<li>(53:14) - Story # 6: Homeland Security is testing AI to help with immigration, trafficking investigations, and disaster relief</li>
<li>(01:03:19) - Story # 7: Feds seize $1.4 million of tech support scam proceeds with the help of crypto firm</li>
</ul>]]>
      </description>
      <content:encoded>
        <![CDATA[<p>Brought to you by Antisyphon Training — <a href="https://www.antisyphontraining.com">https://www.antisyphontraining.com</a></p><p><br></p><p>00:00:00 - PreShow Banter™ — New Arms Again</p><p>00:03:24 - BHIS - Talkin’ Bout [infosec] News 2024-03-18</p><p>00:04:54 - Story # 1: NIST Releases Version 2.0 of Landmark Cybersecurity Framework</p><p>00:10:50 - Story # 2: The FCC has finally decreed that 25Mbps and 3Mbps are not ‘broadband’ speed</p><p>00:14:33 - Story # 3: Welcome to the 2024 Threat Detection Report</p><p>00:33:40 - Story # 4: NSA Releases Top Ten Cloud Security Mitigation Strategies</p><p>00:47:33 - Story # 5: US government agencies demand fixable ice cream machines</p><p>00:53:14 - Story # 6: Homeland Security is testing AI to help with immigration, trafficking investigations, and disaster relief</p><p>01:03:19 - Story # 7: Feds seize $1.4 million of tech support scam proceeds with the help of crypto firm</p>
<ul><li>(00:00) - PreShow Banter™ — New Arms Again</li>
<li>(03:24) - BHIS - Talkin' Bout [infosec] News 2024-03-18</li>
<li>(04:54) - Story # 1: NIST Releases Version 2.0 of Landmark Cybersecurity Framework</li>
<li>(10:50) - Story # 2: The FCC has finally decreed that 25Mbps and 3Mbps are not ‘broadband’ speed</li>
<li>(14:33) - Story # 3: Welcome to the 2024 Threat Detection Report</li>
<li>(33:40) - Story # 4: NSA Releases Top Ten Cloud Security Mitigation Strategies</li>
<li>(47:33) - Story # 5: US government agencies demand fixable ice cream machines</li>
<li>(53:14) - Story # 6: Homeland Security is testing AI to help with immigration, trafficking investigations, and disaster relief</li>
<li>(01:03:19) - Story # 7: Feds seize $1.4 million of tech support scam proceeds with the help of crypto firm</li>
</ul>]]>
      </content:encoded>
      <pubDate>Wed, 20 Mar 2024 15:16:00 -0400</pubDate>
      <author>Black Hills Information Security</author>
      <enclosure url="https://media.transistor.fm/5fd7b285/4e311983.mp3" length="64872026" type="audio/mpeg"/>
      <itunes:author>Black Hills Information Security</itunes:author>
      <itunes:image href="https://img.transistorcdn.com/82gM0S9M5MB-CHs93GX7dCc3z-iuBLyYS768JTznGFw/rs:fill:0:0:1/w:1400/h:1400/q:60/mb:500000/aHR0cHM6Ly9pbWct/dXBsb2FkLXByb2R1/Y3Rpb24udHJhbnNp/c3Rvci5mbS83MDdm/YTAzNDM3ZDJiOTBj/NGEyNDY4MDU1NWQ5/NWE4MS5qcGc.jpg"/>
      <itunes:duration>3904</itunes:duration>
      <itunes:summary>Brought to you by Antisyphon Training — https://www.antisyphontraining.com (https://www.antisyphontraining.com)00:00:00 - PreShow Banter™ — New Arms Again00:03:24 - BHIS - Talkin’ Bout [infosec] News 2024-03-1800:04:54 - Story # 1: NIST Releases Version 2.0 of Landmark Cybersecurity Framework00:10:50 - Story # 2: The FCC has finally decreed that 25Mbps and 3Mbps are not ‘broadband’ speed00:14:33 - Story # 3: Welcome to the 2024 Threat Detection Report00:33:40 - Story # 4: NSA Releases Top Ten Cloud Security Mitigation Strategies00:47:33 - Story # 5: US government agencies demand fixable ice cream machines00:53:14 - Story # 6: Homeland Security is testing AI to help with immigration, trafficking investigations, and disaster relief01:03:19 - Story # 7: Feds seize $1.4 million of tech support scam proceeds with the help of crypto firm</itunes:summary>
      <itunes:subtitle>Brought to you by Antisyphon Training — https://www.antisyphontraining.com (https://www.antisyphontraining.com)00:00:00 - PreShow Banter™ — New Arms Again00:03:24 - BHIS - Talkin’ Bout [infosec] News 2024-03-1800:04:54 - Story # 1: NIST Releases Version 2</itunes:subtitle>
      <itunes:keywords>Infosec,Cybersecurity,news</itunes:keywords>
      <itunes:explicit>No</itunes:explicit>
      <podcast:person role="Guest" href="https://www.inguardians.com">Jay Beale</podcast:person>
      <podcast:chapters url="https://share.transistor.fm/s/5fd7b285/chapters.json" type="application/json+chapters"/>
    </item>
    <item>
      <title>2024-03-13 -  International Hacking Co. Featuring: Josh Mason</title>
      <itunes:episode>1</itunes:episode>
      <podcast:episode>1</podcast:episode>
      <itunes:title>2024-03-13 -  International Hacking Co. Featuring: Josh Mason</itunes:title>
      <itunes:episodeType>full</itunes:episodeType>
      <guid isPermaLink="false">https://blubrry.com/bhis/131485678/3132024-international-hacking-co-featuring-josh-mason/</guid>
      <link>https://share.transistor.fm/s/ff93ac57</link>
      <description>
        <![CDATA[<p> 00:00 - PreShow Banter™ — Death to Clippy</p><p>05:18 - BHIS - Talkin’ Bout [infosec] News 2024-03-11 – Featuring Josh Mason</p><p>06:58 - Story # 1: Behind the doors of a Chinese hacking company, a sordid culture fueled by influence, alcohol, and sex</p><p>13:43 - Story # 2: Top US cybersecurity agency hacked and forced to take some systems offline</p><p>23:39 - Story # 3: Microsoft admits Russian state hack still not contained. ‘This has tremendous national security implications’</p><p>30:27 - Story # 4: FBI’s 2023 Internet Crime Report</p><p>38:18 - Story # 5: QNAP warns of critical auth bypass flaw in its NAS devices</p><p>50:42 - Story # 6: Automakers Are Sharing Consumers’ Driving Behavior With Insurance Companies</p>
<ul><li>(00:00) - PreShow Banter™ — Death to Clippy</li>
<li>(05:18) - BHIS - Talkin' Bout [infosec] News 2024-03-11 – Featuring Josh Mason</li>
<li>(06:58) - Story # 1: Behind the doors of a Chinese hacking company, a sordid culture fueled by influence, alcohol and sex</li>
<li>(13:43) - Story # 2: Top US cybersecurity agency hacked and forced to take some systems offline</li>
<li>(23:39) - Story # 3: Microsoft admits Russian state hack still not contained. ‘This has tremendous national security implications’</li>
<li>(30:27) - Story # 4: FBI's 2023 Internet Crime Report</li>
<li>(38:18) - Story # 5: QNAP warns of critical auth bypass flaw in its NAS devices</li>
<li>(50:42) - Story # 6: Automakers Are Sharing Consumers’ Driving Behavior With Insurance Companies</li>
</ul>]]>
      </description>
      <content:encoded>
        <![CDATA[<p> 00:00 - PreShow Banter™ — Death to Clippy</p><p>05:18 - BHIS - Talkin’ Bout [infosec] News 2024-03-11 – Featuring Josh Mason</p><p>06:58 - Story # 1: Behind the doors of a Chinese hacking company, a sordid culture fueled by influence, alcohol, and sex</p><p>13:43 - Story # 2: Top US cybersecurity agency hacked and forced to take some systems offline</p><p>23:39 - Story # 3: Microsoft admits Russian state hack still not contained. ‘This has tremendous national security implications’</p><p>30:27 - Story # 4: FBI’s 2023 Internet Crime Report</p><p>38:18 - Story # 5: QNAP warns of critical auth bypass flaw in its NAS devices</p><p>50:42 - Story # 6: Automakers Are Sharing Consumers’ Driving Behavior With Insurance Companies</p>
<ul><li>(00:00) - PreShow Banter™ — Death to Clippy</li>
<li>(05:18) - BHIS - Talkin' Bout [infosec] News 2024-03-11 – Featuring Josh Mason</li>
<li>(06:58) - Story # 1: Behind the doors of a Chinese hacking company, a sordid culture fueled by influence, alcohol and sex</li>
<li>(13:43) - Story # 2: Top US cybersecurity agency hacked and forced to take some systems offline</li>
<li>(23:39) - Story # 3: Microsoft admits Russian state hack still not contained. ‘This has tremendous national security implications’</li>
<li>(30:27) - Story # 4: FBI's 2023 Internet Crime Report</li>
<li>(38:18) - Story # 5: QNAP warns of critical auth bypass flaw in its NAS devices</li>
<li>(50:42) - Story # 6: Automakers Are Sharing Consumers’ Driving Behavior With Insurance Companies</li>
</ul>]]>
      </content:encoded>
      <pubDate>Wed, 13 Mar 2024 12:29:00 -0400</pubDate>
      <author>Black Hills Information Security</author>
      <enclosure url="https://media.transistor.fm/ff93ac57/7ebb778a.mp3" length="59994261" type="audio/mpeg"/>
      <itunes:author>Black Hills Information Security</itunes:author>
      <itunes:image href="https://img.transistorcdn.com/6ocEeN-I91UK75n7FJ-CLoJIWuwMXSw_rWyRxamSFbg/rs:fill:0:0:1/w:1400/h:1400/q:60/mb:500000/aHR0cHM6Ly9pbWct/dXBsb2FkLXByb2R1/Y3Rpb24udHJhbnNp/c3Rvci5mbS9hYzY5/YmM5MjFiNjE1MTgw/OTIyNWUxZjQ3N2M5/ZTQwMi5qcGc.jpg"/>
      <itunes:duration>3621</itunes:duration>
      <itunes:summary> 00:00 - PreShow Banter™ — Death to Clippy05:18 - BHIS - Talkin’ Bout [infosec] News 2024-03-11 – Featuring Josh Mason06:58 - Story # 1: Behind the doors of a Chinese hacking company, a sordid culture fueled by influence, alcohol, and sex13:43 - Story # 2: Top US cybersecurity agency hacked and forced to take some systems offline23:39 - Story # 3: Microsoft admits Russian state hack still not contained. ‘This has tremendous national security implications’30:27 - Story # 4: FBI’s 2023 Internet Crime Report38:18 - Story # 5: QNAP warns of critical auth bypass flaw in its NAS devices50:42 - Story # 6: Automakers Are Sharing Consumers’ Driving Behavior With Insurance Companies</itunes:summary>
      <itunes:subtitle> 00:00 - PreShow Banter™ — Death to Clippy05:18 - BHIS - Talkin’ Bout [infosec] News 2024-03-11 – Featuring Josh Mason06:58 - Story # 1: Behind the doors of a Chinese hacking company, a sordid culture fueled by influence, alcohol, and sex13:43 - Story # 2</itunes:subtitle>
      <itunes:keywords>Infosec,Cybersecurity,news</itunes:keywords>
      <itunes:explicit>No</itunes:explicit>
      <podcast:chapters url="https://share.transistor.fm/s/ff93ac57/chapters.json" type="application/json+chapters"/>
    </item>
    <item>
      <title>2024-03-06 - No Logs No Breach, I'm Good</title>
      <itunes:episode>1</itunes:episode>
      <podcast:episode>1</podcast:episode>
      <itunes:title>2024-03-06 - No Logs No Breach, I'm Good</itunes:title>
      <itunes:episodeType>full</itunes:episodeType>
      <guid isPermaLink="false">https://blubrry.com/bhis/131353829/no-logs-no-breach-im-good-342024/</guid>
      <link>https://share.transistor.fm/s/87c637cf</link>
      <description>
        <![CDATA[<p>A weekly Podcast with BHIS and Friends. stories. We discuss notable Infosec, and infosec-adjacent news stories. </p><p><br></p><p>Brought to you by: </p><p>Black Hills Information Security</p><p>https://www.blackhillsinfosec.com/</p><p><br></p><p>Antisyphon Training</p><p>https://www.antisyphontraining.com/</p><p><br></p><p>Story # 1: Executive Order on Preventing Access to Americans’ Bulk Sensitive Personal Data and United States Government-Related Data by Countries of Concern</p><p>https://www.whitehouse.gov/briefing-r...</p><p><br></p><p>Story # 2: A leaky database spilled 2FA codes for the world’s tech giants</p><p>https://techcrunch.com/2024/02/29/lea...</p><p><br></p><p>Story # 3: eBay, VMware, McAfee Sites Hijacked in Sprawling Phishing Operation</p><p>https://www.darkreading.com/applicati...</p><p><br></p><p>23:36 - LokiHakanin's related Post</p><p> / sean-reilly-techopssec_8000-domains-of-tru...  </p><p><br></p><p>Story # 4: Ivanti Connect Secure hackers hide in plain sight, evading protections</p><p>https://www.cybersecuritydive.com/new...</p><p><br></p><p>Story # 5: Over 100,000 Infected Repos Found on GitHub</p><p>https://apiiro.com/blog/malicious-cod...</p><p><br></p><p>Story # 6: Hackers backed by Russia and China are infecting SOHO routers like yours, FBI warns</p><p>https://arstechnica.com/security/2024...</p>
<ul><li>(00:00) - PreShow Banter™ — Adopting Cats</li>
<li>(00:43) - BHIS - Talkin' Bout [infosec] News 2024-03-04</li>
<li>(01:40) - Story # 1: Executive Order on Preventing Access to Americans’ Bulk Sensitive Personal Data and United States Government-Related Data by Countries of Concern</li>
<li>(08:56) - Story # 2: A leaky database spilled 2FA codes for the world’s tech giants</li>
<li>(20:14) - Story # 3: eBay, VMware, McAfee Sites Hijacked in Sprawling Phishing Operation</li>
<li>(22:37) - LokiHakanin's related Post</li>
<li>(31:37) - Story # 4: Ivanti Connect Secure hackers hide in plain sight, evading protections</li>
<li>(39:44) - Story # 5: Over 100,000 Infected Repos Found on GitHub</li>
<li>(48:44) - Story # 6: Hackers backed by Russia and China are infecting SOHO routers like yours, FBI warns</li>
</ul>]]>
      </description>
      <content:encoded>
        <![CDATA[<p>A weekly Podcast with BHIS and Friends. stories. We discuss notable Infosec, and infosec-adjacent news stories. </p><p><br></p><p>Brought to you by: </p><p>Black Hills Information Security</p><p>https://www.blackhillsinfosec.com/</p><p><br></p><p>Antisyphon Training</p><p>https://www.antisyphontraining.com/</p><p><br></p><p>Story # 1: Executive Order on Preventing Access to Americans’ Bulk Sensitive Personal Data and United States Government-Related Data by Countries of Concern</p><p>https://www.whitehouse.gov/briefing-r...</p><p><br></p><p>Story # 2: A leaky database spilled 2FA codes for the world’s tech giants</p><p>https://techcrunch.com/2024/02/29/lea...</p><p><br></p><p>Story # 3: eBay, VMware, McAfee Sites Hijacked in Sprawling Phishing Operation</p><p>https://www.darkreading.com/applicati...</p><p><br></p><p>23:36 - LokiHakanin's related Post</p><p> / sean-reilly-techopssec_8000-domains-of-tru...  </p><p><br></p><p>Story # 4: Ivanti Connect Secure hackers hide in plain sight, evading protections</p><p>https://www.cybersecuritydive.com/new...</p><p><br></p><p>Story # 5: Over 100,000 Infected Repos Found on GitHub</p><p>https://apiiro.com/blog/malicious-cod...</p><p><br></p><p>Story # 6: Hackers backed by Russia and China are infecting SOHO routers like yours, FBI warns</p><p>https://arstechnica.com/security/2024...</p>
<ul><li>(00:00) - PreShow Banter™ — Adopting Cats</li>
<li>(00:43) - BHIS - Talkin' Bout [infosec] News 2024-03-04</li>
<li>(01:40) - Story # 1: Executive Order on Preventing Access to Americans’ Bulk Sensitive Personal Data and United States Government-Related Data by Countries of Concern</li>
<li>(08:56) - Story # 2: A leaky database spilled 2FA codes for the world’s tech giants</li>
<li>(20:14) - Story # 3: eBay, VMware, McAfee Sites Hijacked in Sprawling Phishing Operation</li>
<li>(22:37) - LokiHakanin's related Post</li>
<li>(31:37) - Story # 4: Ivanti Connect Secure hackers hide in plain sight, evading protections</li>
<li>(39:44) - Story # 5: Over 100,000 Infected Repos Found on GitHub</li>
<li>(48:44) - Story # 6: Hackers backed by Russia and China are infecting SOHO routers like yours, FBI warns</li>
</ul>]]>
      </content:encoded>
      <pubDate>Wed, 06 Mar 2024 11:17:00 -0500</pubDate>
      <author>Black Hills Information Security</author>
      <enclosure url="https://media.transistor.fm/87c637cf/a0622605.mp3" length="57813759" type="audio/mpeg"/>
      <itunes:author>Black Hills Information Security</itunes:author>
      <itunes:image href="https://img.transistorcdn.com/fzUHuwLJu4C35Aqi5RqiK0N-Q0oEkmT1cb6QGNiKhBI/rs:fill:0:0:1/w:1400/h:1400/q:60/mb:500000/aHR0cHM6Ly9pbWct/dXBsb2FkLXByb2R1/Y3Rpb24udHJhbnNp/c3Rvci5mbS80MWM1/MDhmOWVhNTExMzEz/MDkzYThlYTIxY2Yx/ODkzYi5qcGc.jpg"/>
      <itunes:duration>3495</itunes:duration>
      <itunes:summary>A weekly Podcast with BHIS and Friends. stories. We discuss notable Infosec, and infosec-adjacent news stories. Brought to you by: Black Hills Information Securityhttps://www.blackhillsinfosec.com/Antisyphon Traininghttps://www.antisyphontraining.com/Story # 1: Executive Order on Preventing Access to Americans’ Bulk Sensitive Personal Data and United States Government-Related Data by Countries of Concernhttps://www.whitehouse.gov/briefing-r...Story # 2: A leaky database spilled 2FA codes for the world’s tech giantshttps://techcrunch.com/2024/02/29/lea...Story # 3: eBay, VMware, McAfee Sites Hijacked in Sprawling Phishing Operationhttps://www.darkreading.com/applicati...23:36 - LokiHakanin's related Post / sean-reilly-techopssec_8000-domains-of-tru...  Story # 4: Ivanti Connect Secure hackers hide in plain sight, evading protectionshttps://www.cybersecuritydive.com/new...Story # 5: Over 100,000 Infected Repos Found on GitHubhttps://apiiro.com/blog/malicious-cod...Story # 6: Hackers backed by Russia and China are infecting SOHO routers like yours, FBI warnshttps://arstechnica.com/security/2024...</itunes:summary>
      <itunes:subtitle>A weekly Podcast with BHIS and Friends. stories. We discuss notable Infosec, and infosec-adjacent news stories. Brought to you by: Black Hills Information Securityhttps://www.blackhillsinfosec.com/Antisyphon Traininghttps://www.antisyphontraining.com/Stor</itunes:subtitle>
      <itunes:keywords>Infosec,Cybersecurity,news</itunes:keywords>
      <itunes:explicit>No</itunes:explicit>
      <podcast:chapters url="https://share.transistor.fm/s/87c637cf/chapters.json" type="application/json+chapters"/>
    </item>
    <item>
      <title>2024-03-01 - All of our base belong to China w/ Mike Poor</title>
      <itunes:episode>1</itunes:episode>
      <podcast:episode>1</podcast:episode>
      <itunes:title>2024-03-01 - All of our base belong to China w/ Mike Poor</itunes:title>
      <itunes:episodeType>full</itunes:episodeType>
      <guid isPermaLink="false">https://blubrry.com/bhis/131250969/all-of-our-bases-belong-to-china-w-mike-poor/</guid>
      <link>https://share.transistor.fm/s/8b4a36ad</link>
      <description>
        <![CDATA[<p>Story #1: Mr. Cooper leak exposes over two million customers</p><p>Story #2: ConnectWise ScreenConnect attacks deliver malware</p><p>Story #3: LockBit Infrastructure Seized by US, UK Police</p><p>Story #4: US health tech giant Change Healthcare hit by cyberattack</p><p>Story #5: The reported leak of Chinese hacking documents supports experts’ warnings about how compromised the US could be</p>
<ul><li>(00:00) - PreShow Banter™ — It's a Wii Match</li>
<li>(05:22) - BHIS - Talkin' Bout [infosec] News 2024-02-26</li>
<li>(07:10) - Story # 1: Mr. Cooper leak exposes over two million customers</li>
<li>(17:42) - Story # 2: ConnectWise ScreenConnect attacks deliver malware</li>
<li>(27:49) - Story # 3: LockBit Infrastructure Seized by US, UK Police</li>
<li>(34:17) - Story # 4: US health tech giant Change Healthcare hit by cyberattack</li>
<li>(39:43) - Story # 5: The reported leak of Chinese hacking documents supports experts' warnings about how compromised the US could be</li>
<li>(53:24) - Story # 6: Vending machine error reveals secret face image database of college students</li>
</ul>]]>
      </description>
      <content:encoded>
        <![CDATA[<p>Story #1: Mr. Cooper leak exposes over two million customers</p><p>Story #2: ConnectWise ScreenConnect attacks deliver malware</p><p>Story #3: LockBit Infrastructure Seized by US, UK Police</p><p>Story #4: US health tech giant Change Healthcare hit by cyberattack</p><p>Story #5: The reported leak of Chinese hacking documents supports experts’ warnings about how compromised the US could be</p>
<ul><li>(00:00) - PreShow Banter™ — It's a Wii Match</li>
<li>(05:22) - BHIS - Talkin' Bout [infosec] News 2024-02-26</li>
<li>(07:10) - Story # 1: Mr. Cooper leak exposes over two million customers</li>
<li>(17:42) - Story # 2: ConnectWise ScreenConnect attacks deliver malware</li>
<li>(27:49) - Story # 3: LockBit Infrastructure Seized by US, UK Police</li>
<li>(34:17) - Story # 4: US health tech giant Change Healthcare hit by cyberattack</li>
<li>(39:43) - Story # 5: The reported leak of Chinese hacking documents supports experts' warnings about how compromised the US could be</li>
<li>(53:24) - Story # 6: Vending machine error reveals secret face image database of college students</li>
</ul>]]>
      </content:encoded>
      <pubDate>Fri, 01 Mar 2024 13:25:00 -0500</pubDate>
      <author>Black Hills Information Security</author>
      <enclosure url="https://media.transistor.fm/8b4a36ad/70ca2ef0.mp3" length="57237319" type="audio/mpeg"/>
      <itunes:author>Black Hills Information Security</itunes:author>
      <itunes:image href="https://img.transistorcdn.com/oihZEdP0UbEd66WWZV81hZIBml5KbgfY4MQW70kCkbM/rs:fill:0:0:1/w:1400/h:1400/q:60/mb:500000/aHR0cHM6Ly9pbWct/dXBsb2FkLXByb2R1/Y3Rpb24udHJhbnNp/c3Rvci5mbS8wMzQ4/N2NmN2MzOTU4NDEx/M2NhODlhYmZlOTgw/NTIzNi5qcGc.jpg"/>
      <itunes:duration>3460</itunes:duration>
      <itunes:summary>Story #1: Mr. Cooper leak exposes over two million customersStory #2: ConnectWise ScreenConnect attacks deliver malwareStory #3: LockBit Infrastructure Seized by US, UK PoliceStory #4: US health tech giant Change Healthcare hit by cyberattackStory #5: The reported leak of Chinese hacking documents supports experts’ warnings about how compromised the US could be</itunes:summary>
      <itunes:subtitle>Story #1: Mr. Cooper leak exposes over two million customersStory #2: ConnectWise ScreenConnect attacks deliver malwareStory #3: LockBit Infrastructure Seized by US, UK PoliceStory #4: US health tech giant Change Healthcare hit by cyberattackStory #5: The</itunes:subtitle>
      <itunes:keywords>Infosec,Cybersecurity,news</itunes:keywords>
      <itunes:explicit>No</itunes:explicit>
      <podcast:chapters url="https://share.transistor.fm/s/8b4a36ad/chapters.json" type="application/json+chapters"/>
    </item>
    <item>
      <title>Talkin’ About Infosec News – 2/20/24</title>
      <itunes:episode>1</itunes:episode>
      <podcast:episode>1</podcast:episode>
      <itunes:title>Talkin’ About Infosec News – 2/20/24</itunes:title>
      <itunes:episodeType>full</itunes:episodeType>
      <guid isPermaLink="false">https://www.blackhillsinfosec.com/?p=28019</guid>
      <link>https://share.transistor.fm/s/bf4321d9</link>
      <description>
        <![CDATA[<p>The post <a href="https://www.blackhillsinfosec.com/talkin-about-infosec-news-2-20-24/">Talkin’ About Infosec News – 2/20/24</a> appeared first on <a href="https://www.blackhillsinfosec.com">Black Hills Information Security</a>.</p>]]>
      </description>
      <content:encoded>
        <![CDATA[<p>The post <a href="https://www.blackhillsinfosec.com/talkin-about-infosec-news-2-20-24/">Talkin’ About Infosec News – 2/20/24</a> appeared first on <a href="https://www.blackhillsinfosec.com">Black Hills Information Security</a>.</p>]]>
      </content:encoded>
      <pubDate>Tue, 20 Feb 2024 17:57:03 -0500</pubDate>
      <author>Black Hills Information Security</author>
      <enclosure url="https://media.transistor.fm/bf4321d9/e34e9260.mp3" length="53604978" type="audio/mpeg"/>
      <itunes:author>Black Hills Information Security</itunes:author>
      <itunes:image href="https://img.transistorcdn.com/LhNMOkWI962RLW-fcwoRvf0LiV6u5F-XeVRpAavZrZA/rs:fill:0:0:1/w:1400/h:1400/q:60/mb:500000/aHR0cHM6Ly9pbWct/dXBsb2FkLXByb2R1/Y3Rpb24udHJhbnNp/c3Rvci5mbS8wY2Vm/ODk4OWFiMmQ1ODA3/MDBmNGEyNmY5MzUy/ZjU5ZC5qcGc.jpg"/>
      <itunes:duration>3319</itunes:duration>
      <itunes:summary>The post Talkin’ About Infosec News – 2/20/24 appeared first on Black Hills Information Security.</itunes:summary>
      <itunes:subtitle>The post Talkin’ About Infosec News – 2/20/24 appeared first on Black Hills Information Security.</itunes:subtitle>
      <itunes:keywords>Infosec,Cybersecurity,news</itunes:keywords>
      <itunes:explicit>No</itunes:explicit>
    </item>
    <item>
      <title>Talkin’ About Infosec News – 2/14/2024</title>
      <itunes:episode>1</itunes:episode>
      <podcast:episode>1</podcast:episode>
      <itunes:title>Talkin’ About Infosec News – 2/14/2024</itunes:title>
      <itunes:episodeType>full</itunes:episodeType>
      <guid isPermaLink="false">https://www.blackhillsinfosec.com/?p=27976</guid>
      <link>https://share.transistor.fm/s/fa031b3a</link>
      <description>
        <![CDATA[<p>The post <a href="https://www.blackhillsinfosec.com/talkin-about-infosec-news-2-14-2024/">Talkin’ About Infosec News – 2/14/2024</a> appeared first on <a href="https://www.blackhillsinfosec.com">Black Hills Information Security</a>.</p>
<ul><li>(00:00) - PreShow Banter™ — Fashion in Oregon</li>
<li>(01:51) - BHIS - Talkin' Bout [infosec] News 2024-02-12</li>
<li>(08:54) - Story # 1: Ivanti devices hit by wave of exploits for latest security hole</li>
<li>(31:53) - Story # 2: Hackers Exploit Job Boards, Stealing Millions of Resumes and Personal Data</li>
<li>(43:15) - Story # 3: Critical Boot Loader Vulnerability in Shim Impacts Nearly All Linux Distros</li>
<li>(54:13) - Story # 4: Feds Want to Ban the World’s Cutest Hacking Device. Experts Say It's a ‘Scapegoat’</li>
</ul>]]>
      </description>
      <content:encoded>
        <![CDATA[<p>The post <a href="https://www.blackhillsinfosec.com/talkin-about-infosec-news-2-14-2024/">Talkin’ About Infosec News – 2/14/2024</a> appeared first on <a href="https://www.blackhillsinfosec.com">Black Hills Information Security</a>.</p>
<ul><li>(00:00) - PreShow Banter™ — Fashion in Oregon</li>
<li>(01:51) - BHIS - Talkin' Bout [infosec] News 2024-02-12</li>
<li>(08:54) - Story # 1: Ivanti devices hit by wave of exploits for latest security hole</li>
<li>(31:53) - Story # 2: Hackers Exploit Job Boards, Stealing Millions of Resumes and Personal Data</li>
<li>(43:15) - Story # 3: Critical Boot Loader Vulnerability in Shim Impacts Nearly All Linux Distros</li>
<li>(54:13) - Story # 4: Feds Want to Ban the World’s Cutest Hacking Device. Experts Say It's a ‘Scapegoat’</li>
</ul>]]>
      </content:encoded>
      <pubDate>Wed, 14 Feb 2024 12:49:59 -0500</pubDate>
      <author>Black Hills Information Security</author>
      <enclosure url="https://media.transistor.fm/fa031b3a/a40b4473.mp3" length="64114934" type="audio/mpeg"/>
      <itunes:author>Black Hills Information Security</itunes:author>
      <itunes:image href="https://img.transistorcdn.com/hzxJ1O3LdlriwDbf3ks6nuDZb51kDQBvqaBIkY6qK08/rs:fill:0:0:1/w:1400/h:1400/q:60/mb:500000/aHR0cHM6Ly9pbWct/dXBsb2FkLXByb2R1/Y3Rpb24udHJhbnNp/c3Rvci5mbS9mZTRj/MWE2MjhjMWJjYmJj/MjA3YjJhZjdmNDAx/NDM0MC5qcGc.jpg"/>
      <itunes:duration>3911</itunes:duration>
      <itunes:summary>The post Talkin’ About Infosec News – 2/14/2024 appeared first on Black Hills Information Security.</itunes:summary>
      <itunes:subtitle>The post Talkin’ About Infosec News – 2/14/2024 appeared first on Black Hills Information Security.</itunes:subtitle>
      <itunes:keywords>Infosec,Cybersecurity,news</itunes:keywords>
      <itunes:explicit>No</itunes:explicit>
      <podcast:chapters url="https://share.transistor.fm/s/fa031b3a/chapters.json" type="application/json+chapters"/>
    </item>
    <item>
      <title>Talkin’ About Infosec News – 2/6/24</title>
      <itunes:episode>1</itunes:episode>
      <podcast:episode>1</podcast:episode>
      <itunes:title>Talkin’ About Infosec News – 2/6/24</itunes:title>
      <itunes:episodeType>full</itunes:episodeType>
      <guid isPermaLink="false">https://www.blackhillsinfosec.com/?p=27952</guid>
      <link>https://share.transistor.fm/s/ba826e71</link>
      <description>
        <![CDATA[<p>The post <a href="https://www.blackhillsinfosec.com/talkin-about-infosec-news-2-6-24/">Talkin’ About Infosec News – 2/6/24</a> appeared first on <a href="https://www.blackhillsinfosec.com">Black Hills Information Security</a>.</p>
<ul><li>(00:00) - PreShow Banter™ — 5 Min Webcasts</li>
<li>(04:29) - BHIS - Talkin' Bout [infosec] News 2024-02-05</li>
<li>(09:06) - Story # 1: Thanksgiving 2023 security incident</li>
<li>(22:09) - Story # 2: AnyDesk Incident Response 5-2-2024</li>
<li>(34:14) - Story # 3: Finance worker pays out $25 million after video call with deepfake ‘chief financial officer’</li>
<li>(50:13) - Story # 4: All federal civilian agencies ordered to disconnect at-risk Ivanti products by Friday</li>
</ul>]]>
      </description>
      <content:encoded>
        <![CDATA[<p>The post <a href="https://www.blackhillsinfosec.com/talkin-about-infosec-news-2-6-24/">Talkin’ About Infosec News – 2/6/24</a> appeared first on <a href="https://www.blackhillsinfosec.com">Black Hills Information Security</a>.</p>
<ul><li>(00:00) - PreShow Banter™ — 5 Min Webcasts</li>
<li>(04:29) - BHIS - Talkin' Bout [infosec] News 2024-02-05</li>
<li>(09:06) - Story # 1: Thanksgiving 2023 security incident</li>
<li>(22:09) - Story # 2: AnyDesk Incident Response 5-2-2024</li>
<li>(34:14) - Story # 3: Finance worker pays out $25 million after video call with deepfake ‘chief financial officer’</li>
<li>(50:13) - Story # 4: All federal civilian agencies ordered to disconnect at-risk Ivanti products by Friday</li>
</ul>]]>
      </content:encoded>
      <pubDate>Tue, 06 Feb 2024 14:57:52 -0500</pubDate>
      <author>Black Hills Information Security</author>
      <enclosure url="https://media.transistor.fm/ba826e71/fe648abd.mp3" length="61047418" type="audio/mpeg"/>
      <itunes:author>Black Hills Information Security</itunes:author>
      <itunes:image href="https://img.transistorcdn.com/K8DdiNeZxhEnxdkO0z6aqa_5j8OfDCfYWfcrY1eH-Qw/rs:fill:0:0:1/w:1400/h:1400/q:60/mb:500000/aHR0cHM6Ly9pbWct/dXBsb2FkLXByb2R1/Y3Rpb24udHJhbnNp/c3Rvci5mbS9hMTQ4/MDk3NDEyNmZjMjZj/MzY2ZTIxMGI4YjE2/NTdmYS5qcGc.jpg"/>
      <itunes:duration>3724</itunes:duration>
      <itunes:summary>The post Talkin’ About Infosec News – 2/6/24 appeared first on Black Hills Information Security.</itunes:summary>
      <itunes:subtitle>The post Talkin’ About Infosec News – 2/6/24 appeared first on Black Hills Information Security.</itunes:subtitle>
      <itunes:keywords>Infosec,Cybersecurity,news</itunes:keywords>
      <itunes:explicit>No</itunes:explicit>
      <podcast:chapters url="https://share.transistor.fm/s/ba826e71/chapters.json" type="application/json+chapters"/>
    </item>
    <item>
      <title>Talkin’ About Infosec News – 1/31/2024</title>
      <itunes:episode>1</itunes:episode>
      <podcast:episode>1</podcast:episode>
      <itunes:title>Talkin’ About Infosec News – 1/31/2024</itunes:title>
      <itunes:episodeType>full</itunes:episodeType>
      <guid isPermaLink="false">https://www.blackhillsinfosec.com/?p=27916</guid>
      <link>https://share.transistor.fm/s/caf75dfd</link>
      <description>
        <![CDATA[<p>The post <a href="https://www.blackhillsinfosec.com/talkin-about-infosec-news-1-31-2024/">Talkin’ About Infosec News – 1/31/2024</a> appeared first on <a href="https://www.blackhillsinfosec.com">Black Hills Information Security</a>.</p>
<ul><li>(00:00) - PreShow Banter™ — No Hacking on Fridays</li>
<li>(04:33) - BHIS - Talkin' Bout [infosec] News 2024-01-29</li>
<li>(09:48) - Story # 1: SEC confirms X account was hacked in SIM swapping attack</li>
<li>(17:45) - Story # 2: MavenGate Attack Could Let Hackers Hijack Java and Android via Abandoned Libraries</li>
<li>(23:03) - Story # 3: Fortra warns of new critical GoAnywhere MFT auth bypass, patch now</li>
<li>(26:35) - Story # 4: Tesla hacked, 24 zero-days demoed at Pwn2Own Automotive 2024</li>
<li>(35:38) - Story # 5: Election cybersecurity director was a victim of a ‘swatting’ attack in her home</li>
<li>(39:44) - Story # 6: Ring will no longer allow police to request users' doorbell camera footage</li>
<li>(44:25) - Story # 7: Group permission misconfiguration exposes Google Kubernetes Engine clusters</li>
<li>(47:03) - REPRISE STORY: Mega-Breach Database Exposes 26 Billion Records</li>
<li>(47:50) - Story # 8: The NSA buys Americans’ internet data, newly released documents show</li>
<li>(56:03) - Story # 9: Privacy predictions for 2024</li>
</ul>]]>
      </description>
      <content:encoded>
        <![CDATA[<p>The post <a href="https://www.blackhillsinfosec.com/talkin-about-infosec-news-1-31-2024/">Talkin’ About Infosec News – 1/31/2024</a> appeared first on <a href="https://www.blackhillsinfosec.com">Black Hills Information Security</a>.</p>
<ul><li>(00:00) - PreShow Banter™ — No Hacking on Fridays</li>
<li>(04:33) - BHIS - Talkin' Bout [infosec] News 2024-01-29</li>
<li>(09:48) - Story # 1: SEC confirms X account was hacked in SIM swapping attack</li>
<li>(17:45) - Story # 2: MavenGate Attack Could Let Hackers Hijack Java and Android via Abandoned Libraries</li>
<li>(23:03) - Story # 3: Fortra warns of new critical GoAnywhere MFT auth bypass, patch now</li>
<li>(26:35) - Story # 4: Tesla hacked, 24 zero-days demoed at Pwn2Own Automotive 2024</li>
<li>(35:38) - Story # 5: Election cybersecurity director was a victim of a ‘swatting’ attack in her home</li>
<li>(39:44) - Story # 6: Ring will no longer allow police to request users' doorbell camera footage</li>
<li>(44:25) - Story # 7: Group permission misconfiguration exposes Google Kubernetes Engine clusters</li>
<li>(47:03) - REPRISE STORY: Mega-Breach Database Exposes 26 Billion Records</li>
<li>(47:50) - Story # 8: The NSA buys Americans’ internet data, newly released documents show</li>
<li>(56:03) - Story # 9: Privacy predictions for 2024</li>
</ul>]]>
      </content:encoded>
      <pubDate>Wed, 31 Jan 2024 13:37:11 -0500</pubDate>
      <author>Black Hills Information Security</author>
      <enclosure url="https://media.transistor.fm/caf75dfd/59fc6fc2.mp3" length="69349448" type="audio/mpeg"/>
      <itunes:author>Black Hills Information Security</itunes:author>
      <itunes:image href="https://img.transistorcdn.com/tA7tB13ttLv_TK_3LpxKibI7_MGPcLuVh8hRrS90IZs/rs:fill:0:0:1/w:1400/h:1400/q:60/mb:500000/aHR0cHM6Ly9pbWct/dXBsb2FkLXByb2R1/Y3Rpb24udHJhbnNp/c3Rvci5mbS83ZTJl/MWE5ODQ2ZWNmYzc3/ZDJiY2JlZmFjNjY0/NDk1OS5qcGc.jpg"/>
      <itunes:duration>4138</itunes:duration>
      <itunes:summary>The post Talkin’ About Infosec News – 1/31/2024 appeared first on Black Hills Information Security.</itunes:summary>
      <itunes:subtitle>The post Talkin’ About Infosec News – 1/31/2024 appeared first on Black Hills Information Security.</itunes:subtitle>
      <itunes:keywords>Infosec,Cybersecurity,news</itunes:keywords>
      <itunes:explicit>No</itunes:explicit>
      <podcast:chapters url="https://share.transistor.fm/s/caf75dfd/chapters.json" type="application/json+chapters"/>
    </item>
    <item>
      <title>Talkin’ About Infosec News – 1/24/2024</title>
      <itunes:episode>1</itunes:episode>
      <podcast:episode>1</podcast:episode>
      <itunes:title>Talkin’ About Infosec News – 1/24/2024</itunes:title>
      <itunes:episodeType>full</itunes:episodeType>
      <guid isPermaLink="false">https://www.blackhillsinfosec.com/?p=27859</guid>
      <link>https://share.transistor.fm/s/27ba53f7</link>
      <description>
        <![CDATA[<p>The post <a href="https://www.blackhillsinfosec.com/talkin-about-infosec-news-1-24-2024/">Talkin’ About Infosec News – 1/24/2024</a> appeared first on <a href="https://www.blackhillsinfosec.com">Black Hills Information Security</a>.</p>
<ul><li>(00:00) - PreShow Banter™ — There's More Than Swim Meets </li>
<li>(01:21) - BHIS - Talkin' Bout [infosec] News 2024-01-22</li>
<li>(05:21) - Story # 1 : Florida bill banning youth from social media moves forward</li>
<li>(14:19) - Story # 2 : Microsoft network breached through password-spraying by Russia-state hackers</li>
<li>(21:38) - Story # 3 : This new data poisoning tool lets artists fight back against generative AI</li>
<li>(28:50) - Story # 4: Top 3 Priorities for CISOs in 2024</li>
<li>(41:37) - Story # 5 : Inside the Massive Naz.API Credential Stuffing List</li>
<li>(48:09) - Story # 6 : Jamf discovers new malware disguised as popular macOS apps</li>
</ul>]]>
      </description>
      <content:encoded>
        <![CDATA[<p>The post <a href="https://www.blackhillsinfosec.com/talkin-about-infosec-news-1-24-2024/">Talkin’ About Infosec News – 1/24/2024</a> appeared first on <a href="https://www.blackhillsinfosec.com">Black Hills Information Security</a>.</p>
<ul><li>(00:00) - PreShow Banter™ — There's More Than Swim Meets </li>
<li>(01:21) - BHIS - Talkin' Bout [infosec] News 2024-01-22</li>
<li>(05:21) - Story # 1 : Florida bill banning youth from social media moves forward</li>
<li>(14:19) - Story # 2 : Microsoft network breached through password-spraying by Russia-state hackers</li>
<li>(21:38) - Story # 3 : This new data poisoning tool lets artists fight back against generative AI</li>
<li>(28:50) - Story # 4: Top 3 Priorities for CISOs in 2024</li>
<li>(41:37) - Story # 5 : Inside the Massive Naz.API Credential Stuffing List</li>
<li>(48:09) - Story # 6 : Jamf discovers new malware disguised as popular macOS apps</li>
</ul>]]>
      </content:encoded>
      <pubDate>Wed, 24 Jan 2024 10:10:03 -0500</pubDate>
      <author>Black Hills Information Security</author>
      <enclosure url="https://media.transistor.fm/27ba53f7/f928ddc3.mp3" length="61094381" type="audio/mpeg"/>
      <itunes:author>Black Hills Information Security</itunes:author>
      <itunes:image href="https://img.transistorcdn.com/H9ZQ6LgxM-VtLrHIDhWhcGvdZoXvGC5Mchwms9s8S3I/rs:fill:0:0:1/w:1400/h:1400/q:60/mb:500000/aHR0cHM6Ly9pbWct/dXBsb2FkLXByb2R1/Y3Rpb24udHJhbnNp/c3Rvci5mbS82YTdj/MTY2ZWMxNjZiMjc4/YjI2ODllYzM4YTYz/NDdmYy5qcGc.jpg"/>
      <itunes:duration>3712</itunes:duration>
      <itunes:summary>The post Talkin’ About Infosec News – 1/24/2024 appeared first on Black Hills Information Security.</itunes:summary>
      <itunes:subtitle>The post Talkin’ About Infosec News – 1/24/2024 appeared first on Black Hills Information Security.</itunes:subtitle>
      <itunes:keywords>Infosec,Cybersecurity,news</itunes:keywords>
      <itunes:explicit>No</itunes:explicit>
      <podcast:chapters url="https://share.transistor.fm/s/27ba53f7/chapters.json" type="application/json+chapters"/>
    </item>
    <item>
      <title>Talkin’ About Infosec News – 1/16/2024</title>
      <itunes:episode>1</itunes:episode>
      <podcast:episode>1</podcast:episode>
      <itunes:title>Talkin’ About Infosec News – 1/16/2024</itunes:title>
      <itunes:episodeType>full</itunes:episodeType>
      <guid isPermaLink="false">https://www.blackhillsinfosec.com/?p=27775</guid>
      <link>https://share.transistor.fm/s/0ddc4810</link>
      <description>
        <![CDATA[<p>The post <a href="https://www.blackhillsinfosec.com/talkin-about-infosec-news-1-16-2024/">Talkin’ About Infosec News – 1/16/2024</a> appeared first on <a href="https://www.blackhillsinfosec.com">Black Hills Information Security</a>.</p>
<ul><li>(00:00) - PreShow Banter™ — Book-It Steak Dinners</li>
<li>(05:25) - BHIS - Talkin' Bout [infosec] News 2024-01-15</li>
<li>(08:01) - Most Offensive Con -</li>
<li>(08:16) - Story # 1: Linux devices are under attack by a never-before-seen worm</li>
<li>(21:09) - Story # 2: Hacker spins up 1 million virtual servers to illegally mine crypto</li>
<li>(25:47) - Story # 3: Actively exploited 0-days in Ivanti VPN are letting hackers backdoor networks</li>
<li>(29:33) - Podcast Self-Awareness</li>
<li>(32:14) - Story # 4: Hospital IT help desks targeted by sophisticated social engineering schemes</li>
</ul>]]>
      </description>
      <content:encoded>
        <![CDATA[<p>The post <a href="https://www.blackhillsinfosec.com/talkin-about-infosec-news-1-16-2024/">Talkin’ About Infosec News – 1/16/2024</a> appeared first on <a href="https://www.blackhillsinfosec.com">Black Hills Information Security</a>.</p>
<ul><li>(00:00) - PreShow Banter™ — Book-It Steak Dinners</li>
<li>(05:25) - BHIS - Talkin' Bout [infosec] News 2024-01-15</li>
<li>(08:01) - Most Offensive Con -</li>
<li>(08:16) - Story # 1: Linux devices are under attack by a never-before-seen worm</li>
<li>(21:09) - Story # 2: Hacker spins up 1 million virtual servers to illegally mine crypto</li>
<li>(25:47) - Story # 3: Actively exploited 0-days in Ivanti VPN are letting hackers backdoor networks</li>
<li>(29:33) - Podcast Self-Awareness</li>
<li>(32:14) - Story # 4: Hospital IT help desks targeted by sophisticated social engineering schemes</li>
</ul>]]>
      </content:encoded>
      <pubDate>Tue, 16 Jan 2024 14:48:40 -0500</pubDate>
      <author>Black Hills Information Security</author>
      <enclosure url="https://media.transistor.fm/0ddc4810/1e1d5b29.mp3" length="56677492" type="audio/mpeg"/>
      <itunes:author>Black Hills Information Security</itunes:author>
      <itunes:image href="https://img.transistorcdn.com/K_1gmFwEaNkWUtU0hH9sJR1En0vhqOUOevvo8CPWa_k/rs:fill:0:0:1/w:1400/h:1400/q:60/mb:500000/aHR0cHM6Ly9pbWct/dXBsb2FkLXByb2R1/Y3Rpb24udHJhbnNp/c3Rvci5mbS9kNDU2/MThhYjM0NGI1NWU3/MzRmMThjY2ZlNzAx/Y2IzMi5qcGc.jpg"/>
      <itunes:duration>3440</itunes:duration>
      <itunes:summary>The post Talkin’ About Infosec News – 1/16/2024 appeared first on Black Hills Information Security.</itunes:summary>
      <itunes:subtitle>The post Talkin’ About Infosec News – 1/16/2024 appeared first on Black Hills Information Security.</itunes:subtitle>
      <itunes:keywords>Infosec,Cybersecurity,news</itunes:keywords>
      <itunes:explicit>No</itunes:explicit>
      <podcast:chapters url="https://share.transistor.fm/s/0ddc4810/chapters.json" type="application/json+chapters"/>
    </item>
    <item>
      <title>Talkin’ About Infosec News – 1/10/24</title>
      <itunes:episode>1</itunes:episode>
      <podcast:episode>1</podcast:episode>
      <itunes:title>Talkin’ About Infosec News – 1/10/24</itunes:title>
      <itunes:episodeType>full</itunes:episodeType>
      <guid isPermaLink="false">https://www.blackhillsinfosec.com/?p=27729</guid>
      <link>https://share.transistor.fm/s/267fdc18</link>
      <description>
        <![CDATA[<p>The post <a href="https://www.blackhillsinfosec.com/talkin-about-infosec-news-1-10-24/">Talkin’ About Infosec News – 1/10/24</a> appeared first on <a href="https://www.blackhillsinfosec.com">Black Hills Information Security</a>.</p>
<ul><li>(00:00) - PreShow Banter™ — Welcome to 2025</li>
<li>(03:36) - BHIS - Talkin' Bout [infosec] News 2024-01-08</li>
<li>(05:30) - Story # 1: Law firm that handles data breaches was hit by data breach</li>
<li>(10:36) - Story # 2: Fred Hutch patients get blackmail emails after cyberattack</li>
<li>(17:55) - Story # 3: Bitwarden Heist - How to Break Into Password Vaults Without Using Passwords</li>
<li>(19:56) - Story # 3b: Privacy Harms – Daniel Solove</li>
<li>(21:20) - Story # 4: 23andMe tells victims it’s their fault that their data was breached</li>
<li>(33:12) - Story # 5: Hacked Mandiant X Account Abused for Cryptocurrency Theft</li>
<li>(37:38) - Story # 6: Merck $1.4 Billion Cyberhack Settlement Ends ‘Warlike’ Act Claim</li>
<li>(45:27) - Story # 7: Volkswagen is adding ChatGPT to its infotainment system</li>
<li>(51:02) - Story # 8: US nuke reactor lab hit by 'gay furry hackers' demanding cat-human mutants</li>
</ul>]]>
      </description>
      <content:encoded>
        <![CDATA[<p>The post <a href="https://www.blackhillsinfosec.com/talkin-about-infosec-news-1-10-24/">Talkin’ About Infosec News – 1/10/24</a> appeared first on <a href="https://www.blackhillsinfosec.com">Black Hills Information Security</a>.</p>
<ul><li>(00:00) - PreShow Banter™ — Welcome to 2025</li>
<li>(03:36) - BHIS - Talkin' Bout [infosec] News 2024-01-08</li>
<li>(05:30) - Story # 1: Law firm that handles data breaches was hit by data breach</li>
<li>(10:36) - Story # 2: Fred Hutch patients get blackmail emails after cyberattack</li>
<li>(17:55) - Story # 3: Bitwarden Heist - How to Break Into Password Vaults Without Using Passwords</li>
<li>(19:56) - Story # 3b: Privacy Harms – Daniel Solove</li>
<li>(21:20) - Story # 4: 23andMe tells victims it’s their fault that their data was breached</li>
<li>(33:12) - Story # 5: Hacked Mandiant X Account Abused for Cryptocurrency Theft</li>
<li>(37:38) - Story # 6: Merck $1.4 Billion Cyberhack Settlement Ends ‘Warlike’ Act Claim</li>
<li>(45:27) - Story # 7: Volkswagen is adding ChatGPT to its infotainment system</li>
<li>(51:02) - Story # 8: US nuke reactor lab hit by 'gay furry hackers' demanding cat-human mutants</li>
</ul>]]>
      </content:encoded>
      <pubDate>Wed, 10 Jan 2024 16:23:54 -0500</pubDate>
      <author>Black Hills Information Security</author>
      <enclosure url="https://media.transistor.fm/267fdc18/2488c381.mp3" length="56877435" type="audio/mpeg"/>
      <itunes:author>Black Hills Information Security</itunes:author>
      <itunes:image href="https://img.transistorcdn.com/Z8PJEXGy8alCGIyYJcipQ_otxes8s-0xJPmIWyTbErs/rs:fill:0:0:1/w:1400/h:1400/q:60/mb:500000/aHR0cHM6Ly9pbWct/dXBsb2FkLXByb2R1/Y3Rpb24udHJhbnNp/c3Rvci5mbS8wZDg2/ZjBkOGFhMDA0NTdi/MTZkN2JmMjhlYmJh/ZmNiZS5qcGc.jpg"/>
      <itunes:duration>3358</itunes:duration>
      <itunes:summary>The post Talkin’ About Infosec News – 1/10/24 appeared first on Black Hills Information Security.</itunes:summary>
      <itunes:subtitle>The post Talkin’ About Infosec News – 1/10/24 appeared first on Black Hills Information Security.</itunes:subtitle>
      <itunes:keywords>Infosec,Cybersecurity,news</itunes:keywords>
      <itunes:explicit>No</itunes:explicit>
      <podcast:chapters url="https://share.transistor.fm/s/267fdc18/chapters.json" type="application/json+chapters"/>
    </item>
    <item>
      <title>Talkin’ About Infosec News – 12/21/2023</title>
      <itunes:episode>1</itunes:episode>
      <podcast:episode>1</podcast:episode>
      <itunes:title>Talkin’ About Infosec News – 12/21/2023</itunes:title>
      <itunes:episodeType>full</itunes:episodeType>
      <guid isPermaLink="false">https://www.blackhillsinfosec.com/?p=27522</guid>
      <link>https://share.transistor.fm/s/ddc6daa5</link>
      <description>
        <![CDATA[<p>The post <a href="https://www.blackhillsinfosec.com/talkin-about-infosec-news-12-21-2023/">Talkin’ About Infosec News – 12/21/2023</a> appeared first on <a href="https://www.blackhillsinfosec.com">Black Hills Information Security</a>.</p>
<ul><li>(00:00) - PreShow Banter™ — Talking Bout Fabric</li>
<li>(07:16) - BHIS - Talkin' Bout [infosec] News 2023-12-18</li>
<li>(10:06) - Story # 1: Cartels Are Using a Police Database to Track and Target Their Enemies</li>
<li>(23:15) - Story # 2: CVS, Rite Aid, Walgreens hand out medical records to cops without warrants</li>
<li>(37:18) - Story # 3: Cloud engineer gets 2 years for wiping ex-employer’s code repos</li>
<li>(45:11) - Story # 4: Ukraine’s intelligence claims cyberattack on Russia’s state tax service</li>
<li>(49:06) - Story # 5: A suspected cyberattack paralyzes the majority of gas stations across Iran</li>
<li>(51:18) - Story # 6: Discord adds Security Key support for all users to enhance security</li>
<li>(54:32) - Story # 7: Kraft Heinz reviewing claims of cyberattack but internal systems ‘operating normally’</li>
<li>(56:49) - Breach Season Speed Run</li>
<li>(58:19) - Story # 8: Ten Years Later, New Clues in the Target Breach</li>
<li>(01:00:38) - Story # 9: Oops, wrong number! The real story behind NORAD's Santa tracker</li>
<li>(01:02:59) - Story # 9b: NORAD Santa Tracker</li>
</ul>]]>
      </description>
      <content:encoded>
        <![CDATA[<p>The post <a href="https://www.blackhillsinfosec.com/talkin-about-infosec-news-12-21-2023/">Talkin’ About Infosec News – 12/21/2023</a> appeared first on <a href="https://www.blackhillsinfosec.com">Black Hills Information Security</a>.</p>
<ul><li>(00:00) - PreShow Banter™ — Talking Bout Fabric</li>
<li>(07:16) - BHIS - Talkin' Bout [infosec] News 2023-12-18</li>
<li>(10:06) - Story # 1: Cartels Are Using a Police Database to Track and Target Their Enemies</li>
<li>(23:15) - Story # 2: CVS, Rite Aid, Walgreens hand out medical records to cops without warrants</li>
<li>(37:18) - Story # 3: Cloud engineer gets 2 years for wiping ex-employer’s code repos</li>
<li>(45:11) - Story # 4: Ukraine’s intelligence claims cyberattack on Russia’s state tax service</li>
<li>(49:06) - Story # 5: A suspected cyberattack paralyzes the majority of gas stations across Iran</li>
<li>(51:18) - Story # 6: Discord adds Security Key support for all users to enhance security</li>
<li>(54:32) - Story # 7: Kraft Heinz reviewing claims of cyberattack but internal systems ‘operating normally’</li>
<li>(56:49) - Breach Season Speed Run</li>
<li>(58:19) - Story # 8: Ten Years Later, New Clues in the Target Breach</li>
<li>(01:00:38) - Story # 9: Oops, wrong number! The real story behind NORAD's Santa tracker</li>
<li>(01:02:59) - Story # 9b: NORAD Santa Tracker</li>
</ul>]]>
      </content:encoded>
      <pubDate>Thu, 21 Dec 2023 15:14:34 -0500</pubDate>
      <author>Black Hills Information Security</author>
      <enclosure url="https://media.transistor.fm/ddc6daa5/fb51b1db.mp3" length="66437286" type="audio/mpeg"/>
      <itunes:author>Black Hills Information Security</itunes:author>
      <itunes:image href="https://img.transistorcdn.com/AqzSsLWoN6N-9ocDlU7BVuQqde6y-c0lSJRClgrPu3o/rs:fill:0:0:1/w:1400/h:1400/q:60/mb:500000/aHR0cHM6Ly9pbWct/dXBsb2FkLXByb2R1/Y3Rpb24udHJhbnNp/c3Rvci5mbS8wY2Nm/MjY3ZTAzOGNhOWQ0/ZDliMzEwZTIzMzYy/ZDgyZS5qcGc.jpg"/>
      <itunes:duration>4004</itunes:duration>
      <itunes:summary>The post Talkin’ About Infosec News – 12/21/2023 appeared first on Black Hills Information Security.</itunes:summary>
      <itunes:subtitle>The post Talkin’ About Infosec News – 12/21/2023 appeared first on Black Hills Information Security.</itunes:subtitle>
      <itunes:keywords>Infosec,Cybersecurity,news</itunes:keywords>
      <itunes:explicit>No</itunes:explicit>
      <podcast:chapters url="https://share.transistor.fm/s/ddc6daa5/chapters.json" type="application/json+chapters"/>
    </item>
    <item>
      <title>Talkin’ About Infosec News – 12/15/2023</title>
      <itunes:episode>1</itunes:episode>
      <podcast:episode>1</podcast:episode>
      <itunes:title>Talkin’ About Infosec News – 12/15/2023</itunes:title>
      <itunes:episodeType>full</itunes:episodeType>
      <guid isPermaLink="false">https://www.blackhillsinfosec.com/?p=27517</guid>
      <link>https://share.transistor.fm/s/02b368c8</link>
      <description>
        <![CDATA[https://youtu.be/MaThvw_VWJ8 Brought to you by Antisyphon Training  https://www.antisyphontraining.com
<ul><li>(00:00) - PreShow Banter™ — Fine McDonalds Drinkware</li>
<li>(04:36) - BHIS - Talkin' Bout [infosec] News 2023-12-11</li>
<li>(07:04) - Story # 1: America’s Water Infrastructure Act of 2018 (AWIA)</li>
<li>(08:55) - Story # 1b: Dragos Launches Program to Provide Water, Electric Utilities With Free Cybersecurity Tools</li>
<li>(09:42) - Story # 1c: Dragos Community Defense Program</li>
<li>(11:38) - Story # 2: BlackCat ransomware crims threaten to directly extort victim's customers</li>
<li>(20:17) - Story # 3: Fancy Bear goes phishing in US, European high-value networks</li>
<li>(21:06) - Story # 3b: Guidance for investigating attacks using CVE-2023-23397</li>
<li>(24:16) - Story # 4: New AeroBlade hackers target aerospace sector in the U.S.</li>
<li>(26:27) - Story # 5: Reuters Takes Down Blockbuster Hacker-for-Hire Investigation After Indian Court Order</li>
<li>(27:51) - Story # 5b: How an Indian startup hacked the world</li>
<li>(32:28) - Story # 6: Just about every Windows and Linux device vulnerable to new LogoFAIL firmware attack</li>
<li>(39:28) - Story # 7: 23andMe confirms hackers stole ancestry data on 6.9 million users</li>
<li>(51:02) - Story # 7b: 23andMe updates user agreement to prevent data breach lawsuits</li>
<li>(55:12) - Story # 8: Facebook Messenger Rolls Out End-to-End Encryption by Default</li>
<li>(57:31) - Story # 9: Police Arrest Hundreds of Human Traffickers Linked to Cyber Fraud</li>
<li>(01:06:57) - Signal For Help</li>
</ul>]]>
      </description>
      <content:encoded>
        <![CDATA[https://youtu.be/MaThvw_VWJ8 Brought to you by Antisyphon Training  https://www.antisyphontraining.com
<ul><li>(00:00) - PreShow Banter™ — Fine McDonalds Drinkware</li>
<li>(04:36) - BHIS - Talkin' Bout [infosec] News 2023-12-11</li>
<li>(07:04) - Story # 1: America’s Water Infrastructure Act of 2018 (AWIA)</li>
<li>(08:55) - Story # 1b: Dragos Launches Program to Provide Water, Electric Utilities With Free Cybersecurity Tools</li>
<li>(09:42) - Story # 1c: Dragos Community Defense Program</li>
<li>(11:38) - Story # 2: BlackCat ransomware crims threaten to directly extort victim's customers</li>
<li>(20:17) - Story # 3: Fancy Bear goes phishing in US, European high-value networks</li>
<li>(21:06) - Story # 3b: Guidance for investigating attacks using CVE-2023-23397</li>
<li>(24:16) - Story # 4: New AeroBlade hackers target aerospace sector in the U.S.</li>
<li>(26:27) - Story # 5: Reuters Takes Down Blockbuster Hacker-for-Hire Investigation After Indian Court Order</li>
<li>(27:51) - Story # 5b: How an Indian startup hacked the world</li>
<li>(32:28) - Story # 6: Just about every Windows and Linux device vulnerable to new LogoFAIL firmware attack</li>
<li>(39:28) - Story # 7: 23andMe confirms hackers stole ancestry data on 6.9 million users</li>
<li>(51:02) - Story # 7b: 23andMe updates user agreement to prevent data breach lawsuits</li>
<li>(55:12) - Story # 8: Facebook Messenger Rolls Out End-to-End Encryption by Default</li>
<li>(57:31) - Story # 9: Police Arrest Hundreds of Human Traffickers Linked to Cyber Fraud</li>
<li>(01:06:57) - Signal For Help</li>
</ul>]]>
      </content:encoded>
      <pubDate>Fri, 15 Dec 2023 13:41:40 -0500</pubDate>
      <author>Black Hills Information Security</author>
      <enclosure url="https://media.transistor.fm/02b368c8/5da861c7.mp3" length="68147414" type="audio/mpeg"/>
      <itunes:author>Black Hills Information Security</itunes:author>
      <itunes:image href="https://img.transistorcdn.com/RndHc-ZDMEHZTNhMY_vuD6KDuSq_dgEi9jNL7Adm92U/rs:fill:0:0:1/w:1400/h:1400/q:60/mb:500000/aHR0cHM6Ly9pbWct/dXBsb2FkLXByb2R1/Y3Rpb24udHJhbnNp/c3Rvci5mbS8xYjFl/MWExYWM1ODZhNjg1/Y2I2NWNlNjkxYjc1/NjgwYS5qcGc.jpg"/>
      <itunes:duration>4064</itunes:duration>
      <itunes:summary>https://youtu.be/MaThvw_VWJ8 Brought to you by Antisyphon Training  https://www.antisyphontraining.com</itunes:summary>
      <itunes:subtitle>https://youtu.be/MaThvw_VWJ8 Brought to you by Antisyphon Training  https://www.antisyphontraining.com</itunes:subtitle>
      <itunes:keywords>Infosec,Cybersecurity,news</itunes:keywords>
      <itunes:explicit>No</itunes:explicit>
      <podcast:chapters url="https://share.transistor.fm/s/02b368c8/chapters.json" type="application/json+chapters"/>
    </item>
    <item>
      <title>Talkin’ About Infosec News – 12/06/2023</title>
      <itunes:episode>1</itunes:episode>
      <podcast:episode>1</podcast:episode>
      <itunes:title>Talkin’ About Infosec News – 12/06/2023</itunes:title>
      <itunes:episodeType>full</itunes:episodeType>
      <guid isPermaLink="false">https://www.blackhillsinfosec.com/?p=27443</guid>
      <link>https://share.transistor.fm/s/83295eeb</link>
      <description>
        <![CDATA[<p>The post <a href="https://www.blackhillsinfosec.com/talkin-about-infosec-news-12-06-2023/">Talkin’ About Infosec News – 12/06/2023</a> appeared first on <a href="https://www.blackhillsinfosec.com">Black Hills Information Security</a>.</p>
<ul><li>(00:00) - PreShow Banter™ — Chaos Agency</li>
<li>(08:16) - BHIS - Talkin' Bout [infosec] News 2023-12-04</li>
<li>(11:03) - Story # 1: 2 municipal water facilities report falling to hackers in separate breaches</li>
<li>(30:49) - Story # 2: PoC for Splunk Enterprise RCE flaw released (CVE-2023-46214)</li>
<li>(37:16) - Story # 3: ownCloud vulnerability with maximum 10 severity score comes under “mass” exploitation</li>
<li>(39:44) - Story # 4: Zyxel warns of multiple critical vulnerabilities in NAS devices</li>
<li>(43:09) - Story # 5: Russian developer of Trickbot malware pleads guilty, faces 35-year sentence</li>
<li>(46:55) - Story # 6: Hackers spent 2+ years looting secrets of chipmaker NXP before being detected</li>
<li>(52:24) - Story # 7: Okta hackers stole data on all customer support users in major breach</li>
<li>(53:30) - Story # 7b: November 29, 2023 - October Customer Support Security Incident - Update and Recommended Actions</li>
<li>(01:01:55) - Story # 8: Dollar Tree hit by third-party data breach impacting 2 million people</li>
<li>(01:04:07) - Hal's 20,000 - Over 20,000 vulnerable Microsoft Exchange servers exposed to attacks</li>
</ul>]]>
      </description>
      <content:encoded>
        <![CDATA[<p>The post <a href="https://www.blackhillsinfosec.com/talkin-about-infosec-news-12-06-2023/">Talkin’ About Infosec News – 12/06/2023</a> appeared first on <a href="https://www.blackhillsinfosec.com">Black Hills Information Security</a>.</p>
<ul><li>(00:00) - PreShow Banter™ — Chaos Agency</li>
<li>(08:16) - BHIS - Talkin' Bout [infosec] News 2023-12-04</li>
<li>(11:03) - Story # 1: 2 municipal water facilities report falling to hackers in separate breaches</li>
<li>(30:49) - Story # 2: PoC for Splunk Enterprise RCE flaw released (CVE-2023-46214)</li>
<li>(37:16) - Story # 3: ownCloud vulnerability with maximum 10 severity score comes under “mass” exploitation</li>
<li>(39:44) - Story # 4: Zyxel warns of multiple critical vulnerabilities in NAS devices</li>
<li>(43:09) - Story # 5: Russian developer of Trickbot malware pleads guilty, faces 35-year sentence</li>
<li>(46:55) - Story # 6: Hackers spent 2+ years looting secrets of chipmaker NXP before being detected</li>
<li>(52:24) - Story # 7: Okta hackers stole data on all customer support users in major breach</li>
<li>(53:30) - Story # 7b: November 29, 2023 - October Customer Support Security Incident - Update and Recommended Actions</li>
<li>(01:01:55) - Story # 8: Dollar Tree hit by third-party data breach impacting 2 million people</li>
<li>(01:04:07) - Hal's 20,000 - Over 20,000 vulnerable Microsoft Exchange servers exposed to attacks</li>
</ul>]]>
      </content:encoded>
      <pubDate>Wed, 06 Dec 2023 12:23:56 -0500</pubDate>
      <author>Black Hills Information Security</author>
      <enclosure url="https://media.transistor.fm/83295eeb/f0c8f69e.mp3" length="70327610" type="audio/mpeg"/>
      <itunes:author>Black Hills Information Security</itunes:author>
      <itunes:image href="https://img.transistorcdn.com/x2gwvurNJ8FhpNS1MSahyn5FqRhEN4BduVA8vt3bPqM/rs:fill:0:0:1/w:1400/h:1400/q:60/mb:500000/aHR0cHM6Ly9pbWct/dXBsb2FkLXByb2R1/Y3Rpb24udHJhbnNp/c3Rvci5mbS9lNzdh/MDk0MmI3YjRjN2Iz/ZjUxMzRmNjhjMzZk/NGJlMy5qcGc.jpg"/>
      <itunes:duration>4214</itunes:duration>
      <itunes:summary>
        <![CDATA[<p>The post <a href="https://www.blackhillsinfosec.com/talkin-about-infosec-news-12-06-2023/">Talkin’ About Infosec News – 12/06/2023</a> appeared first on <a href="https://www.blackhillsinfosec.com">Black Hills Information Security</a>.</p>
<ul><li>(00:00) - PreShow Banter™ — Chaos Agency</li>
<li>(08:16) - BHIS - Talkin' Bout [infosec] News 2023-12-04</li>
<li>(11:03) - Story # 1: 2 municipal water facilities report falling to hackers in separate breaches</li>
<li>(30:49) - Story # 2: PoC for Splunk Enterprise RCE flaw released (CVE-2023-46214)</li>
<li>(37:16) - Story # 3: ownCloud vulnerability with maximum 10 severity score comes under “mass” exploitation</li>
<li>(39:44) - Story # 4: Zyxel warns of multiple critical vulnerabilities in NAS devices</li>
<li>(43:09) - Story # 5: Russian developer of Trickbot malware pleads guilty, faces 35-year sentence</li>
<li>(46:55) - Story # 6: Hackers spent 2+ years looting secrets of chipmaker NXP before being detected</li>
<li>(52:24) - Story # 7: Okta hackers stole data on all customer support users in major breach</li>
<li>(53:30) - Story # 7b: November 29, 2023 - October Customer Support Security Incident - Update and Recommended Actions</li>
<li>(01:01:55) - Story # 8: Dollar Tree hit by third-party data breach impacting 2 million people</li>
<li>(01:04:07) - Hal's 20,000 - Over 20,000 vulnerable Microsoft Exchange servers exposed to attacks</li>
</ul>]]>
      </itunes:summary>
      <itunes:keywords>Infosec,Cybersecurity,news</itunes:keywords>
      <itunes:explicit>No</itunes:explicit>
      <podcast:chapters url="https://share.transistor.fm/s/83295eeb/chapters.json" type="application/json+chapters"/>
    </item>
    <item>
      <title>Talkin’ About Infosec News – 11/30/2023</title>
      <itunes:episode>1</itunes:episode>
      <podcast:episode>1</podcast:episode>
      <itunes:title>Talkin’ About Infosec News – 11/30/2023</itunes:title>
      <itunes:episodeType>full</itunes:episodeType>
      <guid isPermaLink="false">https://www.blackhillsinfosec.com/?p=27419</guid>
      <link>https://share.transistor.fm/s/b6016d3c</link>
      <description>
        <![CDATA[<p>The post <a href="https://www.blackhillsinfosec.com/talkin-about-infosec-news-11-30-2023/">Talkin’ About Infosec News – 11/30/2023</a> appeared first on <a href="https://www.blackhillsinfosec.com">Black Hills Information Security</a>.</p>
<ul><li>(00:00) - PreShow Banter™ — Glitch, Please</li>
<li>(01:54) - BHIS - Talkin' Bout [infosec] News 2023-11-27</li>
<li>(04:55) - Story # 1: General Electric investigates claims of cyber attack, data theft</li>
<li>(10:01) - Story # 2: CISA orders federal agencies to patch Looney Tunables Linux bug</li>
<li>(16:26) - Story # 3: Phishing attacks spike attributed to generative AI adoption</li>
<li>(18:49) - Story # 3b: SlashNext report uncovers 1,265% increase in phishing emails in a year</li>
<li>(19:09) - Story # 3c: Complete Generative AI  Security for Email, Mobile, and Browser</li>
<li>(24:39) - Story # 4: Fidelity National Financial shuts down network in wake of cybersecurity incident</li>
<li>(25:56) - Story # 4b: BlackCat claims it is behind Fidelity National Financial ransomware shakedown</li>
<li>(38:08) - Story # 5: Chief Operating Officer of Network Security Company Charged with Cyberattack on Medical Center</li>
<li>(01:01:52) - Snake Oil? Summit 2023</li>
</ul>]]>
      </description>
      <content:encoded>
        <![CDATA[<p>The post <a href="https://www.blackhillsinfosec.com/talkin-about-infosec-news-11-30-2023/">Talkin’ About Infosec News – 11/30/2023</a> appeared first on <a href="https://www.blackhillsinfosec.com">Black Hills Information Security</a>.</p>
<ul><li>(00:00) - PreShow Banter™ — Glitch, Please</li>
<li>(01:54) - BHIS - Talkin' Bout [infosec] News 2023-11-27</li>
<li>(04:55) - Story # 1: General Electric investigates claims of cyber attack, data theft</li>
<li>(10:01) - Story # 2: CISA orders federal agencies to patch Looney Tunables Linux bug</li>
<li>(16:26) - Story # 3: Phishing attacks spike attributed to generative AI adoption</li>
<li>(18:49) - Story # 3b: SlashNext report uncovers 1,265% increase in phishing emails in a year</li>
<li>(19:09) - Story # 3c: Complete Generative AI  Security for Email, Mobile, and Browser</li>
<li>(24:39) - Story # 4: Fidelity National Financial shuts down network in wake of cybersecurity incident</li>
<li>(25:56) - Story # 4b: BlackCat claims it is behind Fidelity National Financial ransomware shakedown</li>
<li>(38:08) - Story # 5: Chief Operating Officer of Network Security Company Charged with Cyberattack on Medical Center</li>
<li>(01:01:52) - Snake Oil? Summit 2023</li>
</ul>]]>
      </content:encoded>
      <pubDate>Wed, 29 Nov 2023 08:53:15 -0500</pubDate>
      <author>Black Hills Information Security</author>
      <enclosure url="https://media.transistor.fm/b6016d3c/9791b5a4.mp3" length="63903542" type="audio/mpeg"/>
      <itunes:author>Black Hills Information Security</itunes:author>
      <itunes:image href="https://img.transistorcdn.com/Z0UIBCjG6MMZ14lr0D74lwG62AQT2_VJ2EfdWs8gikg/rs:fill:0:0:1/w:1400/h:1400/q:60/mb:500000/aHR0cHM6Ly9pbWct/dXBsb2FkLXByb2R1/Y3Rpb24udHJhbnNp/c3Rvci5mbS84YWI4/MWY3OWE3NzRhZDE5/ODI2MGE2OGI3N2Nl/YWQ2My5qcGc.jpg"/>
      <itunes:duration>3764</itunes:duration>
      <itunes:summary>
        <![CDATA[<p>The post <a href="https://www.blackhillsinfosec.com/talkin-about-infosec-news-11-30-2023/">Talkin’ About Infosec News – 11/30/2023</a> appeared first on <a href="https://www.blackhillsinfosec.com">Black Hills Information Security</a>.</p>
<ul><li>(00:00) - PreShow Banter™ — Glitch, Please</li>
<li>(01:54) - BHIS - Talkin' Bout [infosec] News 2023-11-27</li>
<li>(04:55) - Story # 1: General Electric investigates claims of cyber attack, data theft</li>
<li>(10:01) - Story # 2: CISA orders federal agencies to patch Looney Tunables Linux bug</li>
<li>(16:26) - Story # 3: Phishing attacks spike attributed to generative AI adoption</li>
<li>(18:49) - Story # 3b: SlashNext report uncovers 1,265% increase in phishing emails in a year</li>
<li>(19:09) - Story # 3c: Complete Generative AI  Security for Email, Mobile, and Browser</li>
<li>(24:39) - Story # 4: Fidelity National Financial shuts down network in wake of cybersecurity incident</li>
<li>(25:56) - Story # 4b: BlackCat claims it is behind Fidelity National Financial ransomware shakedown</li>
<li>(38:08) - Story # 5: Chief Operating Officer of Network Security Company Charged with Cyberattack on Medical Center</li>
<li>(01:01:52) - Snake Oil? Summit 2023</li>
</ul>]]>
      </itunes:summary>
      <itunes:keywords>Infosec,Cybersecurity,news</itunes:keywords>
      <itunes:explicit>No</itunes:explicit>
      <podcast:chapters url="https://share.transistor.fm/s/b6016d3c/chapters.json" type="application/json+chapters"/>
    </item>
    <item>
      <title>Talkin’ About Infosec News – 11/22/2023</title>
      <itunes:episode>1</itunes:episode>
      <podcast:episode>1</podcast:episode>
      <itunes:title>Talkin’ About Infosec News – 11/22/2023</itunes:title>
      <itunes:episodeType>full</itunes:episodeType>
      <guid isPermaLink="false">https://www.blackhillsinfosec.com/?p=27336</guid>
      <link>https://share.transistor.fm/s/cfde9784</link>
      <description>
        <![CDATA[<p>The post <a href="https://www.blackhillsinfosec.com/talkin-about-infosec-news-11-22-2023/">Talkin’ About Infosec News – 11/22/2023</a> appeared first on <a href="https://www.blackhillsinfosec.com">Black Hills Information Security</a>.</p>
<ul><li>(00:00) - PreShow Banter™ — A clean-shaven galaxy, a long time away.</li>
<li>(07:50) - BHIS - Talkin' Bout [infosec] News 2023-11-20</li>
<li>(09:53) - Story # 1: Ransomware gang files complaint with SEC complaining victim didn’t promptly announce breach</li>
<li>(12:36) - Story # 1b: AlphV files an SEC complaint against MeridianLink for not disclosing a breach to the SEC (2)</li>
<li>(17:04) - Story # 1c : Services in North Carolina town unavailable after ransomware attack</li>
<li>(18:13) - Story # 1d: WHISTLEBLOWER AWARD PROCEEDING</li>
<li>(20:32) - Story # 2: Taylor Swift Fans Spring Into Action After Singer’s Hotel Location Leaks</li>
<li>(26:01) - Story # 3: Recognizing fake news now a required subject in California schools</li>
<li>(35:34) - Story # 4: Hackers breach healthcare orgs via ScreenConnect remote access</li>
<li>(37:07) - Story # 4b: Bitter Pill: Third-Party Pharmaceutical Vendor Linked to Pharmacy and Health Clinic Cyberattack</li>
<li>(42:59) - Story # 5: Russian hackers use Ngrok feature and WinRAR exploit to attack embassies</li>
<li>(47:19) - Story # 6: US Announces IPStorm Botnet Takedown and Its Creator’s Guilty Plea</li>
<li>(50:32) - Story # 7: Ignite News: Augment your EDR with deception tactics to catch adversaries early</li>
<li>(59:54) - Snake Oil? Summit 2023</li>
</ul>]]>
      </description>
      <content:encoded>
        <![CDATA[<p>The post <a href="https://www.blackhillsinfosec.com/talkin-about-infosec-news-11-22-2023/">Talkin’ About Infosec News – 11/22/2023</a> appeared first on <a href="https://www.blackhillsinfosec.com">Black Hills Information Security</a>.</p>
<ul><li>(00:00) - PreShow Banter™ — A clean-shaven galaxy, a long time away.</li>
<li>(07:50) - BHIS - Talkin' Bout [infosec] News 2023-11-20</li>
<li>(09:53) - Story # 1: Ransomware gang files complaint with SEC complaining victim didn’t promptly announce breach</li>
<li>(12:36) - Story # 1b: AlphV files an SEC complaint against MeridianLink for not disclosing a breach to the SEC (2)</li>
<li>(17:04) - Story # 1c : Services in North Carolina town unavailable after ransomware attack</li>
<li>(18:13) - Story # 1d: WHISTLEBLOWER AWARD PROCEEDING</li>
<li>(20:32) - Story # 2: Taylor Swift Fans Spring Into Action After Singer’s Hotel Location Leaks</li>
<li>(26:01) - Story # 3: Recognizing fake news now a required subject in California schools</li>
<li>(35:34) - Story # 4: Hackers breach healthcare orgs via ScreenConnect remote access</li>
<li>(37:07) - Story # 4b: Bitter Pill: Third-Party Pharmaceutical Vendor Linked to Pharmacy and Health Clinic Cyberattack</li>
<li>(42:59) - Story # 5: Russian hackers use Ngrok feature and WinRAR exploit to attack embassies</li>
<li>(47:19) - Story # 6: US Announces IPStorm Botnet Takedown and Its Creator’s Guilty Plea</li>
<li>(50:32) - Story # 7: Ignite News: Augment your EDR with deception tactics to catch adversaries early</li>
<li>(59:54) - Snake Oil? Summit 2023</li>
</ul>]]>
      </content:encoded>
      <pubDate>Wed, 22 Nov 2023 10:35:41 -0500</pubDate>
      <author>Black Hills Information Security</author>
      <enclosure url="https://media.transistor.fm/cfde9784/88f2db29.mp3" length="64311690" type="audio/mpeg"/>
      <itunes:author>Black Hills Information Security</itunes:author>
      <itunes:image href="https://img.transistorcdn.com/lbk77o61py9M3S4Z6YUW5Lmb4FAhH0-e5p-1yMFzj9Y/rs:fill:0:0:1/w:1400/h:1400/q:60/mb:500000/aHR0cHM6Ly9pbWct/dXBsb2FkLXByb2R1/Y3Rpb24udHJhbnNp/c3Rvci5mbS84Y2Q3/MzFhYWUzYWJhNmJk/NTY3YmI3MWExNzRk/NmJiNy5qcGc.jpg"/>
      <itunes:duration>3808</itunes:duration>
      <itunes:summary>
        <![CDATA[<p>The post <a href="https://www.blackhillsinfosec.com/talkin-about-infosec-news-11-22-2023/">Talkin’ About Infosec News – 11/22/2023</a> appeared first on <a href="https://www.blackhillsinfosec.com">Black Hills Information Security</a>.</p>
<ul><li>(00:00) - PreShow Banter™ — A clean-shaven galaxy, a long time away.</li>
<li>(07:50) - BHIS - Talkin' Bout [infosec] News 2023-11-20</li>
<li>(09:53) - Story # 1: Ransomware gang files complaint with SEC complaining victim didn’t promptly announce breach</li>
<li>(12:36) - Story # 1b: AlphV files an SEC complaint against MeridianLink for not disclosing a breach to the SEC (2)</li>
<li>(17:04) - Story # 1c : Services in North Carolina town unavailable after ransomware attack</li>
<li>(18:13) - Story # 1d: WHISTLEBLOWER AWARD PROCEEDING</li>
<li>(20:32) - Story # 2: Taylor Swift Fans Spring Into Action After Singer’s Hotel Location Leaks</li>
<li>(26:01) - Story # 3: Recognizing fake news now a required subject in California schools</li>
<li>(35:34) - Story # 4: Hackers breach healthcare orgs via ScreenConnect remote access</li>
<li>(37:07) - Story # 4b: Bitter Pill: Third-Party Pharmaceutical Vendor Linked to Pharmacy and Health Clinic Cyberattack</li>
<li>(42:59) - Story # 5: Russian hackers use Ngrok feature and WinRAR exploit to attack embassies</li>
<li>(47:19) - Story # 6: US Announces IPStorm Botnet Takedown and Its Creator’s Guilty Plea</li>
<li>(50:32) - Story # 7: Ignite News: Augment your EDR with deception tactics to catch adversaries early</li>
<li>(59:54) - Snake Oil? Summit 2023</li>
</ul>]]>
      </itunes:summary>
      <itunes:keywords>Infosec,Cybersecurity,news</itunes:keywords>
      <itunes:explicit>No</itunes:explicit>
      <podcast:chapters url="https://share.transistor.fm/s/cfde9784/chapters.json" type="application/json+chapters"/>
    </item>
    <item>
      <title>Talkin’ About Infosec News – 11/13/2023</title>
      <itunes:episode>1</itunes:episode>
      <podcast:episode>1</podcast:episode>
      <itunes:title>Talkin’ About Infosec News – 11/13/2023</itunes:title>
      <itunes:episodeType>full</itunes:episodeType>
      <guid isPermaLink="false">https://www.blackhillsinfosec.com/?p=27332</guid>
      <link>https://share.transistor.fm/s/d8e98645</link>
      <description>
        <![CDATA[<p>The post <a href="https://www.blackhillsinfosec.com/talkin-about-infosec-news-11-13-2023/">Talkin’ About Infosec News – 11/13/2023</a> appeared first on <a href="https://www.blackhillsinfosec.com">Black Hills Information Security</a>.</p>
<ul><li>(00:00) - PreShow Banter™ — Tinder Skills Endorsements</li>
<li>(01:38) - BHIS - Talkin' Bout [infosec] News 2023-11-13</li>
<li>(02:42) - Story # 1: Boeing data published by Lockbit hacking gang</li>
<li>(03:57) - Story # 2: Google, Meta, Discord, and more team up to fight child abuse online</li>
<li>(28:06) - Story # 3: Data broker’s “staggering” sale of sensitive info exposed in unsealed FTC filing</li>
<li>(39:37) - Story # 4: Maine government says data breach affects 1.3 million people</li>
<li>(44:40) - Story # 1 REPRISE: Boeing data published by Lockbit hacking gang</li>
<li>(50:52) - Story # 5: Inside Denmark’s hell week as critical infrastructure orgs faced cyberattacks</li>
</ul>]]>
      </description>
      <content:encoded>
        <![CDATA[<p>The post <a href="https://www.blackhillsinfosec.com/talkin-about-infosec-news-11-13-2023/">Talkin’ About Infosec News – 11/13/2023</a> appeared first on <a href="https://www.blackhillsinfosec.com">Black Hills Information Security</a>.</p>
<ul><li>(00:00) - PreShow Banter™ — Tinder Skills Endorsements</li>
<li>(01:38) - BHIS - Talkin' Bout [infosec] News 2023-11-13</li>
<li>(02:42) - Story # 1: Boeing data published by Lockbit hacking gang</li>
<li>(03:57) - Story # 2: Google, Meta, Discord, and more team up to fight child abuse online</li>
<li>(28:06) - Story # 3: Data broker’s “staggering” sale of sensitive info exposed in unsealed FTC filing</li>
<li>(39:37) - Story # 4: Maine government says data breach affects 1.3 million people</li>
<li>(44:40) - Story # 1 REPRISE: Boeing data published by Lockbit hacking gang</li>
<li>(50:52) - Story # 5: Inside Denmark’s hell week as critical infrastructure orgs faced cyberattacks</li>
</ul>]]>
      </content:encoded>
      <pubDate>Thu, 16 Nov 2023 16:50:27 -0500</pubDate>
      <author>Black Hills Information Security</author>
      <enclosure url="https://media.transistor.fm/d8e98645/e3bdcd0c.mp3" length="55645152" type="audio/mpeg"/>
      <itunes:author>Black Hills Information Security</itunes:author>
      <itunes:image href="https://img.transistorcdn.com/NLow-V94gbLbmBoV_pCYPqBWFwoMJOgT0EZ9tmYLs_k/rs:fill:0:0:1/w:1400/h:1400/q:60/mb:500000/aHR0cHM6Ly9pbWct/dXBsb2FkLXByb2R1/Y3Rpb24udHJhbnNp/c3Rvci5mbS80ZDRj/MTUyNjBmN2FiNzMx/NTcxNWU2OGQ0NDVm/MTZlYi5qcGc.jpg"/>
      <itunes:duration>3324</itunes:duration>
      <itunes:summary>Brought to you by Antisyphon Training — https://www.antisyphontraining.com</itunes:summary>
      <itunes:subtitle>Brought to you by Antisyphon Training — https://www.antisyphontraining.com</itunes:subtitle>
      <itunes:keywords>Infosec,Cybersecurity,news</itunes:keywords>
      <itunes:explicit>No</itunes:explicit>
      <podcast:chapters url="https://share.transistor.fm/s/d8e98645/chapters.json" type="application/json+chapters"/>
    </item>
    <item>
      <title>Talkin’ About Infosec News – 11/10/2023</title>
      <itunes:episode>1</itunes:episode>
      <podcast:episode>1</podcast:episode>
      <itunes:title>Talkin’ About Infosec News – 11/10/2023</itunes:title>
      <itunes:episodeType>full</itunes:episodeType>
      <guid isPermaLink="false">https://www.blackhillsinfosec.com/?p=27291</guid>
      <link>https://share.transistor.fm/s/baad31fe</link>
      <description>
        <![CDATA[<p>The post <a href="https://www.blackhillsinfosec.com/talkin-about-infosec-news-11-10-2023/">Talkin’ About Infosec News – 11/10/2023</a> appeared first on <a href="https://www.blackhillsinfosec.com">Black Hills Information Security</a>.</p>
<ul><li>(00:00) - PreShow Banter™ — The Jerky Experience</li>
<li>(03:40) - BHIS - Talkin' Bout [infosec] News 2023-11-06</li>
<li>(04:34) - Story # 1: Okta hit by third-party data breach exposing employee information</li>
<li>(07:03) - Story # 1b: Okta Hack Blamed on Employee Using Personal Google Account on Company Laptop</li>
<li>(13:13) - Story # 2: Boeing confirms cyberattack, global services disrupted</li>
<li>(14:34) - Story # 3: Four dozen countries declare they won’t pay ransomware ransoms</li>
<li>(15:26) - Story # 4: https://www.healthcareinfosecurity.com/feds-levy-first-ever-hipaa-fine-for-ransomware-data-breach-a-23448</li>
<li>(27:08) - Story # 5: “This vulnerability is now under mass exploitation.” Citrix Bleed bug bites hard</li>
<li>(30:52) - Story # 6: 3,000 Apache ActiveMQ servers vulnerable to RCE attacks exposed online</li>
<li>(32:03) - Story # 7: Exploit released for critical Cisco IOS XE flaw, many hosts still hacked</li>
<li>(33:28) - Story # 7b: Cisco IOS XE CVE-2023-20198: Deep Dive and POC</li>
<li>(42:38) - Story # 8: SEC charges SolarWinds CISO with fraud for misleading investors before major cyberattack</li>
</ul>]]>
      </description>
      <content:encoded>
        <![CDATA[<p>The post <a href="https://www.blackhillsinfosec.com/talkin-about-infosec-news-11-10-2023/">Talkin’ About Infosec News – 11/10/2023</a> appeared first on <a href="https://www.blackhillsinfosec.com">Black Hills Information Security</a>.</p>
<ul><li>(00:00) - PreShow Banter™ — The Jerky Experience</li>
<li>(03:40) - BHIS - Talkin' Bout [infosec] News 2023-11-06</li>
<li>(04:34) - Story # 1: Okta hit by third-party data breach exposing employee information</li>
<li>(07:03) - Story # 1b: Okta Hack Blamed on Employee Using Personal Google Account on Company Laptop</li>
<li>(13:13) - Story # 2: Boeing confirms cyberattack, global services disrupted</li>
<li>(14:34) - Story # 3: Four dozen countries declare they won’t pay ransomware ransoms</li>
<li>(15:26) - Story # 4: https://www.healthcareinfosecurity.com/feds-levy-first-ever-hipaa-fine-for-ransomware-data-breach-a-23448</li>
<li>(27:08) - Story # 5: “This vulnerability is now under mass exploitation.” Citrix Bleed bug bites hard</li>
<li>(30:52) - Story # 6: 3,000 Apache ActiveMQ servers vulnerable to RCE attacks exposed online</li>
<li>(32:03) - Story # 7: Exploit released for critical Cisco IOS XE flaw, many hosts still hacked</li>
<li>(33:28) - Story # 7b: Cisco IOS XE CVE-2023-20198: Deep Dive and POC</li>
<li>(42:38) - Story # 8: SEC charges SolarWinds CISO with fraud for misleading investors before major cyberattack</li>
</ul>]]>
      </content:encoded>
      <pubDate>Fri, 10 Nov 2023 14:40:20 -0500</pubDate>
      <author>Black Hills Information Security</author>
      <enclosure url="https://media.transistor.fm/baad31fe/62670f72.mp3" length="60462589" type="audio/mpeg"/>
      <itunes:author>Black Hills Information Security</itunes:author>
      <itunes:image href="https://img.transistorcdn.com/4AiZWpQiDwJXOw64DoyVl4-5K9SE847fgmoHb52IW3k/rs:fill:0:0:1/w:1400/h:1400/q:60/mb:500000/aHR0cHM6Ly9pbWct/dXBsb2FkLXByb2R1/Y3Rpb24udHJhbnNp/c3Rvci5mbS9kNWFm/NGM3NzRmYmRlMzU1/YmE2N2E3ZWMwZjE0/NTc3MS5qcGc.jpg"/>
      <itunes:duration>3582</itunes:duration>
      <itunes:summary>Brought to you by Antisyphon Training — https://www.antisyphontraining.com</itunes:summary>
      <itunes:subtitle>Brought to you by Antisyphon Training — https://www.antisyphontraining.com</itunes:subtitle>
      <itunes:keywords>Infosec,Cybersecurity,news</itunes:keywords>
      <itunes:explicit>No</itunes:explicit>
      <podcast:chapters url="https://share.transistor.fm/s/baad31fe/chapters.json" type="application/json+chapters"/>
    </item>
    <item>
      <title>Talkin’ About Infosec News – 11/09/2023</title>
      <itunes:episode>1</itunes:episode>
      <podcast:episode>1</podcast:episode>
      <itunes:title>Talkin’ About Infosec News – 11/09/2023</itunes:title>
      <itunes:episodeType>full</itunes:episodeType>
      <guid isPermaLink="false">https://www.blackhillsinfosec.com/?p=27289</guid>
      <link>https://share.transistor.fm/s/73b41ab1</link>
      <description>
        <![CDATA[<p>The post <a href="https://www.blackhillsinfosec.com/talkin-about-infosec-news-11-09-2023/">Talkin’ About Infosec News – 11/09/2023</a> appeared first on <a href="https://www.blackhillsinfosec.com">Black Hills Information Security</a>.</p>
<ul><li>(00:00) - PreShow Banter™ — Costume Party</li>
<li>(02:04) - BHIS - Talkin' Bout [infosec] News 2023-10-30</li>
<li>(03:24) - Story # 1: Okta cybersecurity breach wipes out more than $2 billion in market cap</li>
<li>(18:43) - Story # 2: Boeing assessing Lockbit hacking gang threat of sensitive data leak</li>
<li>(26:09) - Story # 3: The AI-Generated Child Abuse Nightmare Is Here</li>
<li>(41:37) - Story # 4: MGM Resorts hackers 'one of the most dangerous financial criminal groups’</li>
</ul>]]>
      </description>
      <content:encoded>
        <![CDATA[<p>The post <a href="https://www.blackhillsinfosec.com/talkin-about-infosec-news-11-09-2023/">Talkin’ About Infosec News – 11/09/2023</a> appeared first on <a href="https://www.blackhillsinfosec.com">Black Hills Information Security</a>.</p>
<ul><li>(00:00) - PreShow Banter™ — Costume Party</li>
<li>(02:04) - BHIS - Talkin' Bout [infosec] News 2023-10-30</li>
<li>(03:24) - Story # 1: Okta cybersecurity breach wipes out more than $2 billion in market cap</li>
<li>(18:43) - Story # 2: Boeing assessing Lockbit hacking gang threat of sensitive data leak</li>
<li>(26:09) - Story # 3: The AI-Generated Child Abuse Nightmare Is Here</li>
<li>(41:37) - Story # 4: MGM Resorts hackers 'one of the most dangerous financial criminal groups’</li>
</ul>]]>
      </content:encoded>
      <pubDate>Thu, 09 Nov 2023 15:33:28 -0500</pubDate>
      <author>Black Hills Information Security</author>
      <enclosure url="https://media.transistor.fm/73b41ab1/3e15cd0c.mp3" length="58803203" type="audio/mpeg"/>
      <itunes:author>Black Hills Information Security</itunes:author>
      <itunes:image href="https://img.transistorcdn.com/Dsz5q2-hDKXXNyDCtAR2f6PybnWxd6W_m6lyyOhUeik/rs:fill:0:0:1/w:1400/h:1400/q:60/mb:500000/aHR0cHM6Ly9pbWct/dXBsb2FkLXByb2R1/Y3Rpb24udHJhbnNp/c3Rvci5mbS9mZjVh/NDJjMTQ3OWQ0ZjNl/MzJhZDEwMTc4Mzk3/MzcxMy5qcGc.jpg"/>
      <itunes:duration>3555</itunes:duration>
      <itunes:summary>Brought to you by Antisyphon Training — https://www.antisyphontraining.com</itunes:summary>
      <itunes:subtitle>Brought to you by Antisyphon Training — https://www.antisyphontraining.com</itunes:subtitle>
      <itunes:keywords>Infosec,Cybersecurity,news</itunes:keywords>
      <itunes:explicit>No</itunes:explicit>
      <podcast:chapters url="https://share.transistor.fm/s/73b41ab1/chapters.json" type="application/json+chapters"/>
    </item>
    <item>
      <title>Talkin’ About Infosec News – 11/4/2023</title>
      <itunes:episode>1</itunes:episode>
      <podcast:episode>1</podcast:episode>
      <itunes:title>Talkin’ About Infosec News – 11/4/2023</itunes:title>
      <itunes:episodeType>full</itunes:episodeType>
      <guid isPermaLink="false">https://www.blackhillsinfosec.com/?p=27217</guid>
      <link>https://share.transistor.fm/s/c06b64bc</link>
      <description>
        <![CDATA[<p>The post <a href="https://www.blackhillsinfosec.com/talkin-about-infosec-news-11-4-2023/">Talkin’ About Infosec News – 11/4/2023</a> appeared first on <a href="https://www.blackhillsinfosec.com">Black Hills Information Security</a>.</p>
<ul><li>(00:00) - PreShow Banter™ — Pre-Con-Crud</li>
<li>(01:49) - BHIS - Talkin' Bout [infosec] News 2023-10-23</li>
<li>(04:33) - WWHF 2023 recap</li>
<li>(12:20) - Story # 1: Mysterious APT compromises Asian government's secure USBs</li>
<li>(16:13) - Story # 2: CIA exposed to potential intelligence interception due to X's URL bug</li>
<li>(20:02) - Story # 3: EPA withdraws cyber audit requirement for water systems</li>
<li>(22:54) - Story # 3b: Florida Water Treatment Plant Hit With Cyber Attack</li>
<li>(27:00) - Story # 4: Thousands of remote IT workers sent wages to North Korea to help fund weapons program, FBI says</li>
<li>(33:10) - Story # 5: Okta says its support system was breached using stolen credentials</li>
<li>(37:13) - Story # 6: Casio discloses data breach impacting customers in 149 countries</li>
<li>(41:44) - Story # 7: Ragnar Locker ransomware’s dark web extortion sites seized by police</li>
<li>(44:02) - Story # 7b: Ragnar Locker ransomware developer arrested in France</li>
<li>(46:54) - Story # 8: Flipper Zero can be used to crash iPhones running iOS 17, but there's a way to foil the attack</li>
<li>(50:42) - Story # 9: U.S. Government Releases Popular Phishing Technique Used by Hackers</li>
<li>(53:39) - Story # 10: Selfie-scraper, Clearview AI, wins appeal against UK privacy sanction</li>
</ul>]]>
      </description>
      <content:encoded>
        <![CDATA[<p>The post <a href="https://www.blackhillsinfosec.com/talkin-about-infosec-news-11-4-2023/">Talkin’ About Infosec News – 11/4/2023</a> appeared first on <a href="https://www.blackhillsinfosec.com">Black Hills Information Security</a>.</p>
<ul><li>(00:00) - PreShow Banter™ — Pre-Con-Crud</li>
<li>(01:49) - BHIS - Talkin' Bout [infosec] News 2023-10-23</li>
<li>(04:33) - WWHF 2023 recap</li>
<li>(12:20) - Story # 1: Mysterious APT compromises Asian government's secure USBs</li>
<li>(16:13) - Story # 2: CIA exposed to potential intelligence interception due to X's URL bug</li>
<li>(20:02) - Story # 3: EPA withdraws cyber audit requirement for water systems</li>
<li>(22:54) - Story # 3b: Florida Water Treatment Plant Hit With Cyber Attack</li>
<li>(27:00) - Story # 4: Thousands of remote IT workers sent wages to North Korea to help fund weapons program, FBI says</li>
<li>(33:10) - Story # 5: Okta says its support system was breached using stolen credentials</li>
<li>(37:13) - Story # 6: Casio discloses data breach impacting customers in 149 countries</li>
<li>(41:44) - Story # 7: Ragnar Locker ransomware’s dark web extortion sites seized by police</li>
<li>(44:02) - Story # 7b: Ragnar Locker ransomware developer arrested in France</li>
<li>(46:54) - Story # 8: Flipper Zero can be used to crash iPhones running iOS 17, but there's a way to foil the attack</li>
<li>(50:42) - Story # 9: U.S. Government Releases Popular Phishing Technique Used by Hackers</li>
<li>(53:39) - Story # 10: Selfie-scraper, Clearview AI, wins appeal against UK privacy sanction</li>
</ul>]]>
      </content:encoded>
      <pubDate>Sat, 04 Nov 2023 16:09:04 -0400</pubDate>
      <author>Black Hills Information Security</author>
      <enclosure url="https://media.transistor.fm/c06b64bc/ff021b3a.mp3" length="59788370" type="audio/mpeg"/>
      <itunes:author>Black Hills Information Security</itunes:author>
      <itunes:image href="https://img.transistorcdn.com/59CqEOzsJcYcOkviNIOF5Z4tLCBcMY78ny2F7NkcAnI/rs:fill:0:0:1/w:1400/h:1400/q:60/mb:500000/aHR0cHM6Ly9pbWct/dXBsb2FkLXByb2R1/Y3Rpb24udHJhbnNp/c3Rvci5mbS9kYjhj/ZmFkNjQ3ZWY0ODQz/M2Y4ZGZkMzhiNDk2/MjUxZC5qcGc.jpg"/>
      <itunes:duration>3509</itunes:duration>
      <itunes:summary>Brought to you by Antisyphon Training — https://www.antisyphontraining.com</itunes:summary>
      <itunes:subtitle>Brought to you by Antisyphon Training — https://www.antisyphontraining.com</itunes:subtitle>
      <itunes:keywords>Infosec,Cybersecurity,news</itunes:keywords>
      <itunes:explicit>No</itunes:explicit>
      <podcast:chapters url="https://share.transistor.fm/s/c06b64bc/chapters.json" type="application/json+chapters"/>
    </item>
    <item>
      <title>Talkin’ About Infosec News – 10/10/23</title>
      <itunes:episode>1</itunes:episode>
      <podcast:episode>1</podcast:episode>
      <itunes:title>Talkin’ About Infosec News – 10/10/23</itunes:title>
      <itunes:episodeType>full</itunes:episodeType>
      <guid isPermaLink="false">https://www.blackhillsinfosec.com/?p=27035</guid>
      <link>https://share.transistor.fm/s/d7b5b451</link>
      <description>
        <![CDATA[<p>The post <a href="https://www.blackhillsinfosec.com/talkin-about-infosec-news-10-10-23/">Talkin’ About Infosec News – 10/10/23</a> appeared first on <a href="https://www.blackhillsinfosec.com">Black Hills Information Security</a>.</p>
<ul><li>(00:00) - PreShow Banter™ — Canadian Bacon Day</li>
<li>(04:35) - BHIS - Talkin' Bout [infosec] News 2023-10-09</li>
<li>(06:19) - Story # 1: NSA and CISA reveal top 10 cybersecurity misconfigurations</li>
<li>(13:35) - Story # 1b: NSA and CISA Red and Blue Teams Share Top Ten Cybersecurity Misconfigurations</li>
<li>(21:21) - Story # 2: QR codes in emails? Watch out - it could be part of a 'Quishing' scam</li>
<li>(25:07) - Story # 2b: https://github.com/jocephus/QuellR</li>
<li>(28:16) - Story # 2c: https://twitter.com/vmyths/status/1212201412068818944</li>
<li>(30:47) - Story # 3: New Marvin attack revives 25-year-old decryption flaw in RSA</li>
<li>(35:59) - Story # 4: Bounty offered for secret NSA seeds behind NIST elliptic curves algo</li>
<li>(38:01) - Story # 5: Rules of engagement issued to hacktivists after chaos</li>
<li>(01:02:55) - PROGRAMMING NOTE – WWHF2023</li>
</ul>]]>
      </description>
      <content:encoded>
        <![CDATA[<p>The post <a href="https://www.blackhillsinfosec.com/talkin-about-infosec-news-10-10-23/">Talkin’ About Infosec News – 10/10/23</a> appeared first on <a href="https://www.blackhillsinfosec.com">Black Hills Information Security</a>.</p>
<ul><li>(00:00) - PreShow Banter™ — Canadian Bacon Day</li>
<li>(04:35) - BHIS - Talkin' Bout [infosec] News 2023-10-09</li>
<li>(06:19) - Story # 1: NSA and CISA reveal top 10 cybersecurity misconfigurations</li>
<li>(13:35) - Story # 1b: NSA and CISA Red and Blue Teams Share Top Ten Cybersecurity Misconfigurations</li>
<li>(21:21) - Story # 2: QR codes in emails? Watch out - it could be part of a 'Quishing' scam</li>
<li>(25:07) - Story # 2b: https://github.com/jocephus/QuellR</li>
<li>(28:16) - Story # 2c: https://twitter.com/vmyths/status/1212201412068818944</li>
<li>(30:47) - Story # 3: New Marvin attack revives 25-year-old decryption flaw in RSA</li>
<li>(35:59) - Story # 4: Bounty offered for secret NSA seeds behind NIST elliptic curves algo</li>
<li>(38:01) - Story # 5: Rules of engagement issued to hacktivists after chaos</li>
<li>(01:02:55) - PROGRAMMING NOTE – WWHF2023</li>
</ul>]]>
      </content:encoded>
      <pubDate>Tue, 10 Oct 2023 13:11:21 -0400</pubDate>
      <author>Black Hills Information Security</author>
      <enclosure url="https://media.transistor.fm/d7b5b451/127419d4.mp3" length="64119857" type="audio/mpeg"/>
      <itunes:author>Black Hills Information Security</itunes:author>
      <itunes:image href="https://img.transistorcdn.com/a7QacobwhIvgdIJqyRovNJ3ChiI1qFLjh6vTemHhbiw/rs:fill:0:0:1/w:1400/h:1400/q:60/mb:500000/aHR0cHM6Ly9pbWct/dXBsb2FkLXByb2R1/Y3Rpb24udHJhbnNp/c3Rvci5mbS8xZTJi/Y2VkNGM2OTE1YzQz/NmI4Y2QzZjU2ZmI0/ODMyNi5qcGc.jpg"/>
      <itunes:duration>3827</itunes:duration>
      <itunes:summary>Brought to you by Antisyphon Training — https://www.antisyphontraining.com</itunes:summary>
      <itunes:subtitle>Brought to you by Antisyphon Training — https://www.antisyphontraining.com</itunes:subtitle>
      <itunes:keywords>Infosec,Cybersecurity,news</itunes:keywords>
      <itunes:explicit>No</itunes:explicit>
      <podcast:chapters url="https://share.transistor.fm/s/d7b5b451/chapters.json" type="application/json+chapters"/>
    </item>
    <item>
      <title>Talkin’ About Infosec News – 10/9/2023</title>
      <itunes:episode>1</itunes:episode>
      <podcast:episode>1</podcast:episode>
      <itunes:title>Talkin’ About Infosec News – 10/9/2023</itunes:title>
      <itunes:episodeType>full</itunes:episodeType>
      <guid isPermaLink="false">https://www.blackhillsinfosec.com/?p=27032</guid>
      <link>https://share.transistor.fm/s/b4421da8</link>
      <description>
        <![CDATA[<p>The post <a href="https://www.blackhillsinfosec.com/talkin-about-infosec-news-10-9-2023/">Talkin’ About Infosec News – 10/9/2023</a> appeared first on <a href="https://www.blackhillsinfosec.com">Black Hills Information Security</a>.</p>
<ul><li>(00:00) - PreShow Banter™ — The Scented Podcast</li>
<li>(04:42) - BHIS - Talkin' Bout [infosec] News 2023-10-02</li>
<li>(07:24) - Story # 1: Google assigns new maximum rated CVE to libwebp bug exploited in attacks</li>
<li>(24:13) - Story # 2: Progress warns of maximum severity WS_FTP Server vulnerability</li>
<li>(31:16) - Story # 3: Sony PlayStation Hack: What We Know So Far About the LAPSUS$ Cyberattack</li>
<li>(36:10) - Story # 4: City of Fort Lauderdale loses $1.2 million in phishing scam, police in Florida say</li>
<li>(41:42) - Story # 5: FCC announces plans to reinstate net neutrality</li>
<li>(52:32) - Story # 6: [New research] Do longer passwords protect you from compromise?</li>
</ul>]]>
      </description>
      <content:encoded>
        <![CDATA[<p>The post <a href="https://www.blackhillsinfosec.com/talkin-about-infosec-news-10-9-2023/">Talkin’ About Infosec News – 10/9/2023</a> appeared first on <a href="https://www.blackhillsinfosec.com">Black Hills Information Security</a>.</p>
<ul><li>(00:00) - PreShow Banter™ — The Scented Podcast</li>
<li>(04:42) - BHIS - Talkin' Bout [infosec] News 2023-10-02</li>
<li>(07:24) - Story # 1: Google assigns new maximum rated CVE to libwebp bug exploited in attacks</li>
<li>(24:13) - Story # 2: Progress warns of maximum severity WS_FTP Server vulnerability</li>
<li>(31:16) - Story # 3: Sony PlayStation Hack: What We Know So Far About the LAPSUS$ Cyberattack</li>
<li>(36:10) - Story # 4: City of Fort Lauderdale loses $1.2 million in phishing scam, police in Florida say</li>
<li>(41:42) - Story # 5: FCC announces plans to reinstate net neutrality</li>
<li>(52:32) - Story # 6: [New research] Do longer passwords protect you from compromise?</li>
</ul>]]>
      </content:encoded>
      <pubDate>Mon, 09 Oct 2023 15:40:58 -0400</pubDate>
      <author>Black Hills Information Security</author>
      <enclosure url="https://media.transistor.fm/b4421da8/fb8f9ea4.mp3" length="67111390" type="audio/mpeg"/>
      <itunes:author>Black Hills Information Security</itunes:author>
      <itunes:image href="https://img.transistorcdn.com/WsHW9EOX4RBuyQgCfnO1juITWd31XRRet8VIHbiRMMU/rs:fill:0:0:1/w:1400/h:1400/q:60/mb:500000/aHR0cHM6Ly9pbWct/dXBsb2FkLXByb2R1/Y3Rpb24udHJhbnNp/c3Rvci5mbS82N2M1/MmYxMTA3NWVkYmNi/ODYxODMxZDU1MGQ4/MGUxNi5qcGc.jpg"/>
      <itunes:duration>4062</itunes:duration>
      <itunes:summary>Brought to you by Antisyphon Training — https://www.antisyphontraining.com</itunes:summary>
      <itunes:subtitle>Brought to you by Antisyphon Training — https://www.antisyphontraining.com</itunes:subtitle>
      <itunes:keywords>Infosec,Cybersecurity,news</itunes:keywords>
      <itunes:explicit>No</itunes:explicit>
      <podcast:chapters url="https://share.transistor.fm/s/b4421da8/chapters.json" type="application/json+chapters"/>
    </item>
    <item>
      <title>Special Segment – Cyber Security Career Advice – 9/28/2023</title>
      <itunes:episode>1</itunes:episode>
      <podcast:episode>1</podcast:episode>
      <itunes:title>Special Segment – Cyber Security Career Advice – 9/28/2023</itunes:title>
      <itunes:episodeType>full</itunes:episodeType>
      <guid isPermaLink="false">https://www.blackhillsinfosec.com/?p=26999</guid>
      <link>https://share.transistor.fm/s/e1be7781</link>
      <description>
        <![CDATA[<p>The post <a href="https://www.blackhillsinfosec.com/special-segment-cyber-security-career-advice-9-28-2023/">Special Segment – Cyber Security Career Advice – 9/28/2023</a> appeared first on <a href="https://www.blackhillsinfosec.com">Black Hills Information Security</a>.</p>
<ul><li>(00:00) - PreShow Banter™ Segment Special – Cyber Security Career Advice</li>
<li>(00:26) - Q :Entry Level Cybersecurity equals Mid-Level I.T. ?</li>
<li>(08:05) - Q: How do I get started, I'm new in the Cyber Security Industry?</li>
<li>(09:37) - Q: What Degree(s) do you recommend for Cyber Security / Infosec? </li>
<li>(16:07) - Q: How did Chris Traynor join Black Hills Information Security? </li>
<li>(18:58) - LINK– Pancake Con Chris Traynor Talk - https://youtube.com/watch?v=tMgDSb5_mKs</li>
<li>(20:13) - LINK - BHIS Discord - https://discord.gg/bhis</li>
<li>(23:35) - LINK - Chicago meetups : https://burbsec.com</li>
<li>(25:53) - LINK: YouTube– Acess Granted Webcast – https://youtube.com/live/oaTEK9Feo5s</li>
</ul>]]>
      </description>
      <content:encoded>
        <![CDATA[<p>The post <a href="https://www.blackhillsinfosec.com/special-segment-cyber-security-career-advice-9-28-2023/">Special Segment – Cyber Security Career Advice – 9/28/2023</a> appeared first on <a href="https://www.blackhillsinfosec.com">Black Hills Information Security</a>.</p>
<ul><li>(00:00) - PreShow Banter™ Segment Special – Cyber Security Career Advice</li>
<li>(00:26) - Q :Entry Level Cybersecurity equals Mid-Level I.T. ?</li>
<li>(08:05) - Q: How do I get started, I'm new in the Cyber Security Industry?</li>
<li>(09:37) - Q: What Degree(s) do you recommend for Cyber Security / Infosec? </li>
<li>(16:07) - Q: How did Chris Traynor join Black Hills Information Security? </li>
<li>(18:58) - LINK– Pancake Con Chris Traynor Talk - https://youtube.com/watch?v=tMgDSb5_mKs</li>
<li>(20:13) - LINK - BHIS Discord - https://discord.gg/bhis</li>
<li>(23:35) - LINK - Chicago meetups : https://burbsec.com</li>
<li>(25:53) - LINK: YouTube– Acess Granted Webcast – https://youtube.com/live/oaTEK9Feo5s</li>
</ul>]]>
      </content:encoded>
      <pubDate>Thu, 28 Sep 2023 16:25:12 -0400</pubDate>
      <author>Black Hills Information Security</author>
      <enclosure url="https://media.transistor.fm/e1be7781/252359a8.mp3" length="21275062" type="audio/mpeg"/>
      <itunes:author>Black Hills Information Security</itunes:author>
      <itunes:image href="https://img.transistorcdn.com/PlgcCX_KF_gCYsPqy8Ppb5LV79S956-2CQigA7kOkXg/rs:fill:0:0:1/w:1400/h:1400/q:60/mb:500000/aHR0cHM6Ly9pbWct/dXBsb2FkLXByb2R1/Y3Rpb24udHJhbnNp/c3Rvci5mbS80NzVm/YWFkYWFmNTA4OWFl/Y2E2ZmUzYTg0ZTE5/MTc5NS5qcGc.jpg"/>
      <itunes:duration>1598</itunes:duration>
      <itunes:summary>Segment from Access Granted: Practical Physical Exploitation – Ralph May &amp;amp; Travis Weathers –https://youtube.com/live/oaTEK9Feo5s </itunes:summary>
      <itunes:subtitle>Segment from Access Granted: Practical Physical Exploitation – Ralph May &amp;amp; Travis Weathers –https://youtube.com/live/oaTEK9Feo5s </itunes:subtitle>
      <itunes:keywords>Infosec,Cybersecurity,news</itunes:keywords>
      <itunes:explicit>No</itunes:explicit>
      <podcast:chapters url="https://share.transistor.fm/s/e1be7781/chapters.json" type="application/json+chapters"/>
    </item>
    <item>
      <title>Talkin’ About Infosec News – 9/25/2023</title>
      <itunes:episode>1</itunes:episode>
      <podcast:episode>1</podcast:episode>
      <itunes:title>Talkin’ About Infosec News – 9/25/2023</itunes:title>
      <itunes:episodeType>full</itunes:episodeType>
      <guid isPermaLink="false">https://www.blackhillsinfosec.com/?p=26994</guid>
      <link>https://share.transistor.fm/s/99d4c9ca</link>
      <description>
        <![CDATA[<p>The post <a href="https://www.blackhillsinfosec.com/talkin-about-infosec-news-9-25-2023/">Talkin’ About Infosec News – 9/25/2023</a> appeared first on <a href="https://www.blackhillsinfosec.com">Black Hills Information Security</a>.</p>
<ul><li>(00:00) - PreShow Banter™ — Poop Shoots and Chocolate Bunnies</li>
<li>(02:33) - BHIS - Talkin' Bout [infosec] News 2023-09-25</li>
<li>(07:15) - Story # 1: Cisco to Acquire Splunk</li>
<li>(08:15) - CISCO RSA Plane https://assets-cdn.workingnotworking.com/a1w71r9as47v5iap49d6u2md0dfr</li>
<li>(09:21) - Jack Rhysider on Splunk https://twitter.com/JackRhysider/status/1704986407415038213</li>
<li>(18:09) - Story # 2: Youth hacking ring at the center of cybercrime spree</li>
<li>(26:45) - Story # 3: T-Mobile users say other people’s account information is appearing in their app</li>
<li>(30:11) - Story # 4: Okta: Caesars, MGM hacked in social engineering campaign</li>
<li>(35:40) - Story # 5: Data breach reveals distressing info: People who order pineapple on pizza</li>
<li>(39:28) - Story # 6: National Student Clearinghouse data breach impacts 890 schools</li>
<li>(46:16) - Story # 7: Kroll Suffers Data Breach: Employee Falls Victim to SIM Swapping Attack</li>
</ul>]]>
      </description>
      <content:encoded>
        <![CDATA[<p>The post <a href="https://www.blackhillsinfosec.com/talkin-about-infosec-news-9-25-2023/">Talkin’ About Infosec News – 9/25/2023</a> appeared first on <a href="https://www.blackhillsinfosec.com">Black Hills Information Security</a>.</p>
<ul><li>(00:00) - PreShow Banter™ — Poop Shoots and Chocolate Bunnies</li>
<li>(02:33) - BHIS - Talkin' Bout [infosec] News 2023-09-25</li>
<li>(07:15) - Story # 1: Cisco to Acquire Splunk</li>
<li>(08:15) - CISCO RSA Plane https://assets-cdn.workingnotworking.com/a1w71r9as47v5iap49d6u2md0dfr</li>
<li>(09:21) - Jack Rhysider on Splunk https://twitter.com/JackRhysider/status/1704986407415038213</li>
<li>(18:09) - Story # 2: Youth hacking ring at the center of cybercrime spree</li>
<li>(26:45) - Story # 3: T-Mobile users say other people’s account information is appearing in their app</li>
<li>(30:11) - Story # 4: Okta: Caesars, MGM hacked in social engineering campaign</li>
<li>(35:40) - Story # 5: Data breach reveals distressing info: People who order pineapple on pizza</li>
<li>(39:28) - Story # 6: National Student Clearinghouse data breach impacts 890 schools</li>
<li>(46:16) - Story # 7: Kroll Suffers Data Breach: Employee Falls Victim to SIM Swapping Attack</li>
</ul>]]>
      </content:encoded>
      <pubDate>Wed, 27 Sep 2023 08:27:31 -0400</pubDate>
      <author>Black Hills Information Security</author>
      <enclosure url="https://media.transistor.fm/99d4c9ca/4e347af6.mp3" length="65106700" type="audio/mpeg"/>
      <itunes:author>Black Hills Information Security</itunes:author>
      <itunes:image href="https://img.transistorcdn.com/pGY6jwptQDPmO_U9TD0OzkI5OR3PeEEP5_OpcOFUVkY/rs:fill:0:0:1/w:1400/h:1400/q:60/mb:500000/aHR0cHM6Ly9pbWct/dXBsb2FkLXByb2R1/Y3Rpb24udHJhbnNp/c3Rvci5mbS82MjFi/NTg2NzY5NjMwZDhi/MzU0YWM4M2M2Yzk3/ZDg4Ny5qcGc.jpg"/>
      <itunes:duration>3866</itunes:duration>
      <itunes:summary>Brought to you by Antisyphon Training — https://www.antisyphontraining.com</itunes:summary>
      <itunes:subtitle>Brought to you by Antisyphon Training — https://www.antisyphontraining.com</itunes:subtitle>
      <itunes:keywords>Infosec,Cybersecurity,news</itunes:keywords>
      <itunes:explicit>No</itunes:explicit>
      <podcast:chapters url="https://share.transistor.fm/s/99d4c9ca/chapters.json" type="application/json+chapters"/>
    </item>
    <item>
      <title>Talkin’ About Infosec News – 9/18/2023</title>
      <itunes:episode>1</itunes:episode>
      <podcast:episode>1</podcast:episode>
      <itunes:title>Talkin’ About Infosec News – 9/18/2023</itunes:title>
      <itunes:episodeType>full</itunes:episodeType>
      <guid isPermaLink="false">https://www.blackhillsinfosec.com/?p=26988</guid>
      <link>https://share.transistor.fm/s/7d48418c</link>
      <description>
        <![CDATA[<p>The post <a href="https://www.blackhillsinfosec.com/talkin-about-infosec-news-9-18-2023/">Talkin’ About Infosec News – 9/18/2023</a> appeared first on <a href="https://www.blackhillsinfosec.com">Black Hills Information Security</a>.</p>
<ul><li>(00:00) - PreShow Banter™ — Billionare Traps &amp; Dump Lists</li>
<li>(05:11) - BHIS - Talkin' Bout [infosec] News 2023-09-18</li>
<li>(07:28) - Story # 1: Statement on MGM Resorts International</li>
<li>(12:06) - Story # 1b: Okta &amp; MGM sitting in a tree</li>
<li>(14:53) - Story # 1c: Okta Agent Involved in MGM Resorts Breach, Attackers Claim</li>
<li>(20:26) - Story # 1d: Social Engineering: How It Works, Examples &amp; Prevention</li>
<li>(26:49) - Story # 1e: Lina Khan Got Stuck in the Fallout of the MGM Hack at Las Vegas</li>
<li>(44:09) - Story # 2: F-35 goes missing near North Charleston; pilot hospitalized after ejecting</li>
<li>(48:38) - Story # 3: Pirated Software Likely Cause of Airbus Breach</li>
<li>(53:48) - (K)night (I)ndustries (T)esla (T)hree opens parking garage gate </li>
</ul>]]>
      </description>
      <content:encoded>
        <![CDATA[<p>The post <a href="https://www.blackhillsinfosec.com/talkin-about-infosec-news-9-18-2023/">Talkin’ About Infosec News – 9/18/2023</a> appeared first on <a href="https://www.blackhillsinfosec.com">Black Hills Information Security</a>.</p>
<ul><li>(00:00) - PreShow Banter™ — Billionare Traps &amp; Dump Lists</li>
<li>(05:11) - BHIS - Talkin' Bout [infosec] News 2023-09-18</li>
<li>(07:28) - Story # 1: Statement on MGM Resorts International</li>
<li>(12:06) - Story # 1b: Okta &amp; MGM sitting in a tree</li>
<li>(14:53) - Story # 1c: Okta Agent Involved in MGM Resorts Breach, Attackers Claim</li>
<li>(20:26) - Story # 1d: Social Engineering: How It Works, Examples &amp; Prevention</li>
<li>(26:49) - Story # 1e: Lina Khan Got Stuck in the Fallout of the MGM Hack at Las Vegas</li>
<li>(44:09) - Story # 2: F-35 goes missing near North Charleston; pilot hospitalized after ejecting</li>
<li>(48:38) - Story # 3: Pirated Software Likely Cause of Airbus Breach</li>
<li>(53:48) - (K)night (I)ndustries (T)esla (T)hree opens parking garage gate </li>
</ul>]]>
      </content:encoded>
      <pubDate>Fri, 22 Sep 2023 16:40:39 -0400</pubDate>
      <author>Black Hills Information Security</author>
      <enclosure url="https://media.transistor.fm/7d48418c/b07fa7c2.mp3" length="61618135" type="audio/mpeg"/>
      <itunes:author>Black Hills Information Security</itunes:author>
      <itunes:image href="https://img.transistorcdn.com/4gI4MW4FPuMbUB-nHMZDwJoWUoSdCxbrqBGBtAbbgVA/rs:fill:0:0:1/w:1400/h:1400/q:60/mb:500000/aHR0cHM6Ly9pbWct/dXBsb2FkLXByb2R1/Y3Rpb24udHJhbnNp/c3Rvci5mbS82ZjVi/NGY1ODhkOWIzZGQ3/MWNkZGEyOGJmODM4/ZDkyNS5qcGc.jpg"/>
      <itunes:duration>3736</itunes:duration>
      <itunes:summary>Brought to you by Antisyphon Training — https://www.antisyphontraining.com</itunes:summary>
      <itunes:subtitle>Brought to you by Antisyphon Training — https://www.antisyphontraining.com</itunes:subtitle>
      <itunes:keywords>Infosec,Cybersecurity,news</itunes:keywords>
      <itunes:explicit>No</itunes:explicit>
      <podcast:chapters url="https://share.transistor.fm/s/7d48418c/chapters.json" type="application/json+chapters"/>
    </item>
    <item>
      <title>Talkin’ About Infosec News – 9/11/2023</title>
      <itunes:episode>1</itunes:episode>
      <podcast:episode>1</podcast:episode>
      <itunes:title>Talkin’ About Infosec News – 9/11/2023</itunes:title>
      <itunes:episodeType>full</itunes:episodeType>
      <guid isPermaLink="false">https://www.blackhillsinfosec.com/?p=26945</guid>
      <link>https://share.transistor.fm/s/f369be3c</link>
      <description>
        <![CDATA[<p>The post <a href="https://www.blackhillsinfosec.com/talkin-about-infosec-news-9-11-2023/">Talkin’ About Infosec News – 9/11/2023</a> appeared first on <a href="https://www.blackhillsinfosec.com">Black Hills Information Security</a>.</p>
<ul><li>(00:00) - PreShow Banter™ — Felling Trees 504</li>
<li>(02:03) - Talkin' Bout [infosec] News 2023-09-11</li>
<li>(05:51) - 22nd Anniversary of the 9-11 Tragedy</li>
<li>(10:35) - Story # 1: AT&amp;T Customers Doxed Themselves En Masse In Reply-All Nightmare</li>
<li>(15:47) - Story # 1b: Senate email system crashes amid avalanche of reply-alls to security test</li>
<li>(18:09) - Story # 2: Millions Infected by Spyware Hidden in Fake Telegram Apps on Google Play</li>
<li>(23:47) - Story # 2b: BLASTPASS NSO Group iPhone Zero-Click, Zero-Day Exploit Captured in the Wild</li>
<li>(29:16) - Story # 3: Apple finally admits the CSAM scanning flaw we all pointed out</li>
<li>(33:32) - Story # 4: Outlook Hack: Microsoft Reveals How a Crash Dump Led to a Major Security Breach</li>
<li>(38:57) - Story # 4b: Microsoft finally explains cause of Azure breach: An engineer’s account was hacked</li>
<li>(51:16) - Story # 5: FBI, Partners Dismantle Qakbot Infrastructure in Multinational Cyber Takedown — FBI</li>
<li>(52:24) - Story # 5b: Data From The Qakbot Malware is Now Searchable in Have I Been Pwned, Courtesy of the FBI</li>
<li>(57:49) - https://github.com/alephdata/aleph</li>
</ul>]]>
      </description>
      <content:encoded>
        <![CDATA[<p>The post <a href="https://www.blackhillsinfosec.com/talkin-about-infosec-news-9-11-2023/">Talkin’ About Infosec News – 9/11/2023</a> appeared first on <a href="https://www.blackhillsinfosec.com">Black Hills Information Security</a>.</p>
<ul><li>(00:00) - PreShow Banter™ — Felling Trees 504</li>
<li>(02:03) - Talkin' Bout [infosec] News 2023-09-11</li>
<li>(05:51) - 22nd Anniversary of the 9-11 Tragedy</li>
<li>(10:35) - Story # 1: AT&amp;T Customers Doxed Themselves En Masse In Reply-All Nightmare</li>
<li>(15:47) - Story # 1b: Senate email system crashes amid avalanche of reply-alls to security test</li>
<li>(18:09) - Story # 2: Millions Infected by Spyware Hidden in Fake Telegram Apps on Google Play</li>
<li>(23:47) - Story # 2b: BLASTPASS NSO Group iPhone Zero-Click, Zero-Day Exploit Captured in the Wild</li>
<li>(29:16) - Story # 3: Apple finally admits the CSAM scanning flaw we all pointed out</li>
<li>(33:32) - Story # 4: Outlook Hack: Microsoft Reveals How a Crash Dump Led to a Major Security Breach</li>
<li>(38:57) - Story # 4b: Microsoft finally explains cause of Azure breach: An engineer’s account was hacked</li>
<li>(51:16) - Story # 5: FBI, Partners Dismantle Qakbot Infrastructure in Multinational Cyber Takedown — FBI</li>
<li>(52:24) - Story # 5b: Data From The Qakbot Malware is Now Searchable in Have I Been Pwned, Courtesy of the FBI</li>
<li>(57:49) - https://github.com/alephdata/aleph</li>
</ul>]]>
      </content:encoded>
      <pubDate>Wed, 13 Sep 2023 10:19:12 -0400</pubDate>
      <author>Black Hills Information Security</author>
      <enclosure url="https://media.transistor.fm/f369be3c/2ec9c567.mp3" length="63292667" type="audio/mpeg"/>
      <itunes:author>Black Hills Information Security</itunes:author>
      <itunes:image href="https://img.transistorcdn.com/kjzPkwNrpsQz0_zQG6fTK3nRmwCCvkfGSiD1Y1OTqK4/rs:fill:0:0:1/w:1400/h:1400/q:60/mb:500000/aHR0cHM6Ly9pbWct/dXBsb2FkLXByb2R1/Y3Rpb24udHJhbnNp/c3Rvci5mbS9jZjA3/ODU3MGYyMzFlODEy/MWFhNmYxODc0ZWE4/N2JlNy5qcGc.jpg"/>
      <itunes:duration>3783</itunes:duration>
      <itunes:summary>Brought to you by Antisyphon Training — https://www.antisyphontraining.com</itunes:summary>
      <itunes:subtitle>Brought to you by Antisyphon Training — https://www.antisyphontraining.com</itunes:subtitle>
      <itunes:keywords>Infosec,Cybersecurity,news</itunes:keywords>
      <itunes:explicit>No</itunes:explicit>
      <podcast:chapters url="https://share.transistor.fm/s/f369be3c/chapters.json" type="application/json+chapters"/>
    </item>
    <item>
      <title>Talkin’ About Infosec News – 8/28/2023</title>
      <itunes:episode>1</itunes:episode>
      <podcast:episode>1</podcast:episode>
      <itunes:title>Talkin’ About Infosec News – 8/28/2023</itunes:title>
      <itunes:episodeType>full</itunes:episodeType>
      <guid isPermaLink="false">https://www.blackhillsinfosec.com/?p=26779</guid>
      <link>https://share.transistor.fm/s/affeab54</link>
      <description>
        <![CDATA[Brought to you by Antisyphon Training — https://www.antisyphontraining.com
<ul><li>(00:00) - PreShow Banter™ — Deep Disruptions </li>
<li>(04:01) - BHIS - Talkin' Bout [infosec] News 2023-08-28</li>
<li>(05:43) - Story # 1: Exclusive: Cybersecurity firm SentinelOne explores sale -sources</li>
<li>(13:28) - Story # 2: WinRAR 0-day that uses poisoned JPG and TXT files under exploit since April</li>
<li>(20:17) - Story # 3: NIST Publishes Draft Post-Quantum Cryptography Standards</li>
<li>(23:29) - Story # 4: Mysterious Cyberattack Shuts Down Yet More Telescopes For Weeks</li>
<li>(29:31) - Story # 5: Danish cloud host says customers ‘lost all data’ after ransomware attack</li>
<li>(35:04) - Story # 6: Lapsus$: Court finds teenagers carried out hacking spree</li>
<li>(35:45) - Story # 6b: GTA 6 Hacker Found To Be Teen With Amazon Fire Stick In Small Town Hotel Room</li>
<li>(44:36) - Story # 7: New Juniper Junos OS Flaws Expose Devices to Remote Attacks - Patch Now</li>
</ul>]]>
      </description>
      <content:encoded>
        <![CDATA[Brought to you by Antisyphon Training — https://www.antisyphontraining.com
<ul><li>(00:00) - PreShow Banter™ — Deep Disruptions </li>
<li>(04:01) - BHIS - Talkin' Bout [infosec] News 2023-08-28</li>
<li>(05:43) - Story # 1: Exclusive: Cybersecurity firm SentinelOne explores sale -sources</li>
<li>(13:28) - Story # 2: WinRAR 0-day that uses poisoned JPG and TXT files under exploit since April</li>
<li>(20:17) - Story # 3: NIST Publishes Draft Post-Quantum Cryptography Standards</li>
<li>(23:29) - Story # 4: Mysterious Cyberattack Shuts Down Yet More Telescopes For Weeks</li>
<li>(29:31) - Story # 5: Danish cloud host says customers ‘lost all data’ after ransomware attack</li>
<li>(35:04) - Story # 6: Lapsus$: Court finds teenagers carried out hacking spree</li>
<li>(35:45) - Story # 6b: GTA 6 Hacker Found To Be Teen With Amazon Fire Stick In Small Town Hotel Room</li>
<li>(44:36) - Story # 7: New Juniper Junos OS Flaws Expose Devices to Remote Attacks - Patch Now</li>
</ul>]]>
      </content:encoded>
      <pubDate>Tue, 29 Aug 2023 20:53:27 -0400</pubDate>
      <author>Black Hills Information Security</author>
      <enclosure url="https://media.transistor.fm/affeab54/1ccf6010.mp3" length="57578322" type="audio/mpeg"/>
      <itunes:author>Black Hills Information Security</itunes:author>
      <itunes:image href="https://img.transistorcdn.com/LX8PEwjx9BTkWu1C-FM0qhsdHOvqTdO1knv0M_BkOBk/rs:fill:0:0:1/w:1400/h:1400/q:60/mb:500000/aHR0cHM6Ly9pbWct/dXBsb2FkLXByb2R1/Y3Rpb24udHJhbnNp/c3Rvci5mbS8xNjU4/M2NmZWI1N2NmN2Nk/ZDg4ZjE5ZWQ5NTNm/NDA4OC5qcGc.jpg"/>
      <itunes:duration>3442</itunes:duration>
      <itunes:summary>Brought to you by Antisyphon Training — https://www.antisyphontraining.com</itunes:summary>
      <itunes:subtitle>Brought to you by Antisyphon Training — https://www.antisyphontraining.com</itunes:subtitle>
      <itunes:keywords>Infosec,Cybersecurity,news</itunes:keywords>
      <itunes:explicit>No</itunes:explicit>
      <podcast:chapters url="https://share.transistor.fm/s/affeab54/chapters.json" type="application/json+chapters"/>
    </item>
    <item>
      <title>Talkin’ About Infosec News – 8/21/2023</title>
      <itunes:episode>1</itunes:episode>
      <podcast:episode>1</podcast:episode>
      <itunes:title>Talkin’ About Infosec News – 8/21/2023</itunes:title>
      <itunes:episodeType>full</itunes:episodeType>
      <guid isPermaLink="false">https://www.blackhillsinfosec.com/?p=26752</guid>
      <link>https://share.transistor.fm/s/50bf6394</link>
      <description>
        <![CDATA[Brought to you by Antisyphon Training — https://www.antisyphontraining.com
<ul><li>(00:00) - PreShow Banter™ — Overarching Hot Takes</li>
<li>(01:27) - BHIS - Talkin' Bout [infosec] News 2023-08-21</li>
<li>(04:30) - Story # 1: Hackers red-teaming A.I. are ‘breaking stuff left and right,’ but don’t expect quick fixes from DefCon: ‘There are no good guardrails’</li>
<li>(06:18) - Story # 1b: What happens when thousands of hackers try to break AI chatbots</li>
<li>(08:46) - Story # 2: US lawmaker says FBI notified him of email breach linked to Microsoft cloud hack</li>
<li>(11:18) - Story # 3: Elon Musk's army of inactive followers paints a bleak picture of X as a whole</li>
<li>(12:42) - Story # 3b: Elon Musk’s Shadow Rule</li>
<li>(18:45) - Story # 4: Haggling With Hackers: Surprising Lessons From 50 Negotiations With Ransomware Gangs</li>
<li>(23:42) - Story # 5: WinRAR flaw lets hackers run programs when you open RAR archives</li>
<li>(27:55) - Story # 6: CISA, experts warn of Citrix vulnerabilities being exploited by hackers</li>
<li>(29:44) - Story # 7: Ongoing Duo outage causes Azure Auth authentication errors</li>
<li>(30:38) - Story # 8: Phishing campaign steals accounts for Zimbra email servers worlwide</li>
<li>(35:48) - Story # 9: WD refused to answer our questions about its self-wiping SanDisk SSDs</li>
<li>(38:35) - Story # 9b: Backblaze Drive Stats for Q2 2023</li>
<li>(42:07) - Story # 10: NYC Bans TikTok on City Devices</li>
<li>(55:38) - Story # 11: IMAX Still Runs on PalmPilot Operating System</li>
<li>(57:25) - Story # 12: Major LinkedIn Account Takeover Campaign Underway</li>
</ul>]]>
      </description>
      <content:encoded>
        <![CDATA[Brought to you by Antisyphon Training — https://www.antisyphontraining.com
<ul><li>(00:00) - PreShow Banter™ — Overarching Hot Takes</li>
<li>(01:27) - BHIS - Talkin' Bout [infosec] News 2023-08-21</li>
<li>(04:30) - Story # 1: Hackers red-teaming A.I. are ‘breaking stuff left and right,’ but don’t expect quick fixes from DefCon: ‘There are no good guardrails’</li>
<li>(06:18) - Story # 1b: What happens when thousands of hackers try to break AI chatbots</li>
<li>(08:46) - Story # 2: US lawmaker says FBI notified him of email breach linked to Microsoft cloud hack</li>
<li>(11:18) - Story # 3: Elon Musk's army of inactive followers paints a bleak picture of X as a whole</li>
<li>(12:42) - Story # 3b: Elon Musk’s Shadow Rule</li>
<li>(18:45) - Story # 4: Haggling With Hackers: Surprising Lessons From 50 Negotiations With Ransomware Gangs</li>
<li>(23:42) - Story # 5: WinRAR flaw lets hackers run programs when you open RAR archives</li>
<li>(27:55) - Story # 6: CISA, experts warn of Citrix vulnerabilities being exploited by hackers</li>
<li>(29:44) - Story # 7: Ongoing Duo outage causes Azure Auth authentication errors</li>
<li>(30:38) - Story # 8: Phishing campaign steals accounts for Zimbra email servers worlwide</li>
<li>(35:48) - Story # 9: WD refused to answer our questions about its self-wiping SanDisk SSDs</li>
<li>(38:35) - Story # 9b: Backblaze Drive Stats for Q2 2023</li>
<li>(42:07) - Story # 10: NYC Bans TikTok on City Devices</li>
<li>(55:38) - Story # 11: IMAX Still Runs on PalmPilot Operating System</li>
<li>(57:25) - Story # 12: Major LinkedIn Account Takeover Campaign Underway</li>
</ul>]]>
      </content:encoded>
      <pubDate>Mon, 28 Aug 2023 10:57:15 -0400</pubDate>
      <author>Black Hills Information Security</author>
      <enclosure url="https://media.transistor.fm/50bf6394/8aa90229.mp3" length="60937893" type="audio/mpeg"/>
      <itunes:author>Black Hills Information Security</itunes:author>
      <itunes:image href="https://img.transistorcdn.com/9qpLwm6EOJVhgPK5iPQ1svIbA7SJsSQ8KEBpAt0yBpA/rs:fill:0:0:1/w:1400/h:1400/q:60/mb:500000/aHR0cHM6Ly9pbWct/dXBsb2FkLXByb2R1/Y3Rpb24udHJhbnNp/c3Rvci5mbS9jYTg1/MDhmN2QwNjQ2MDJi/NjY3NmIzMWY4NTYz/ZTQ1Yi5qcGc.jpg"/>
      <itunes:duration>3583</itunes:duration>
      <itunes:summary>Brought to you by Antisyphon Training — https://www.antisyphontraining.com</itunes:summary>
      <itunes:subtitle>Brought to you by Antisyphon Training — https://www.antisyphontraining.com</itunes:subtitle>
      <itunes:keywords>Infosec,Cybersecurity,news</itunes:keywords>
      <itunes:explicit>No</itunes:explicit>
      <podcast:chapters url="https://share.transistor.fm/s/50bf6394/chapters.json" type="application/json+chapters"/>
    </item>
    <item>
      <title>Talkin’ About Infosec News – 8/14/2023</title>
      <itunes:episode>1</itunes:episode>
      <podcast:episode>1</podcast:episode>
      <itunes:title>Talkin’ About Infosec News – 8/14/2023</itunes:title>
      <itunes:episodeType>full</itunes:episodeType>
      <guid isPermaLink="false">https://www.blackhillsinfosec.com/?p=26709</guid>
      <link>https://share.transistor.fm/s/1a098a18</link>
      <description>
        <![CDATA[]]>
      </description>
      <content:encoded>
        <![CDATA[]]>
      </content:encoded>
      <pubDate>Mon, 21 Aug 2023 14:43:08 -0400</pubDate>
      <author>Black Hills Information Security</author>
      <enclosure url="https://media.transistor.fm/1a098a18/44f81977.mp3" length="61857639" type="audio/mpeg"/>
      <itunes:author>Black Hills Information Security</itunes:author>
      <itunes:image href="https://img.transistorcdn.com/WgqXoWAQlWVwBNalxFzigreaIFpXEV0crVUcp7K0ulM/rs:fill:0:0:1/w:1400/h:1400/q:60/mb:500000/aHR0cHM6Ly9pbWct/dXBsb2FkLXByb2R1/Y3Rpb24udHJhbnNp/c3Rvci5mbS9iYjdh/MDVhZDA0NDFkZDgx/MzkxNzE4NTExZTYx/Y2VkZC5qcGc.jpg"/>
      <itunes:duration>3701</itunes:duration>
      <itunes:summary>
        <![CDATA[]]>
      </itunes:summary>
      <itunes:keywords>Infosec,Cybersecurity,news</itunes:keywords>
      <itunes:explicit>No</itunes:explicit>
      <podcast:chapters url="https://share.transistor.fm/s/1a098a18/chapters.json" type="application/json+chapters"/>
    </item>
    <item>
      <title>Talkin’ About Infosec News – 8/7/2023</title>
      <itunes:episode>1</itunes:episode>
      <podcast:episode>1</podcast:episode>
      <itunes:title>Talkin’ About Infosec News – 8/7/2023</itunes:title>
      <itunes:episodeType>full</itunes:episodeType>
      <guid isPermaLink="false">https://www.blackhillsinfosec.com/?p=26675</guid>
      <link>https://share.transistor.fm/s/57dae745</link>
      <description>
        <![CDATA[]]>
      </description>
      <content:encoded>
        <![CDATA[]]>
      </content:encoded>
      <pubDate>Tue, 15 Aug 2023 15:20:17 -0400</pubDate>
      <author>Black Hills Information Security</author>
      <enclosure url="https://media.transistor.fm/57dae745/4cd596ab.mp3" length="60413681" type="audio/mpeg"/>
      <itunes:author>Black Hills Information Security</itunes:author>
      <itunes:image href="https://img.transistorcdn.com/pItSHSP19pEFakEnCfzDlM16ibSmY4-9HHh906C91NM/rs:fill:0:0:1/w:1400/h:1400/q:60/mb:500000/aHR0cHM6Ly9pbWct/dXBsb2FkLXByb2R1/Y3Rpb24udHJhbnNp/c3Rvci5mbS85ZWY5/YmY1ZDFmZjI1Y2Zi/MTYxODNiZTFlMDQ3/MGFkNi5qcGc.jpg"/>
      <itunes:duration>3575</itunes:duration>
      <itunes:summary>
        <![CDATA[]]>
      </itunes:summary>
      <itunes:keywords>Infosec,Cybersecurity,news</itunes:keywords>
      <itunes:explicit>No</itunes:explicit>
      <podcast:chapters url="https://share.transistor.fm/s/57dae745/chapters.json" type="application/json+chapters"/>
    </item>
    <item>
      <title>Talkin’ About Infosec News – 7/31/2023</title>
      <itunes:episode>1</itunes:episode>
      <podcast:episode>1</podcast:episode>
      <itunes:title>Talkin’ About Infosec News – 7/31/2023</itunes:title>
      <itunes:episodeType>full</itunes:episodeType>
      <guid isPermaLink="false">https://www.blackhillsinfosec.com/?p=26589</guid>
      <link>https://share.transistor.fm/s/dc7cd15f</link>
      <description>
        <![CDATA[A weekly Podcast with BHIS and Friends. We discuss notable Infosec, and infosec-adjacent news stories. Brought to you by: ///
<ul><li>(00:00) - PreShow Banter™ — Messed With Your Head</li>
<li>(05:25) - Story # 1: Chinese Malware Could Cut Power To U.S. Military Bases, Businesses And Homes, Report Claims</li>
<li>(18:14) - Story # 2: US Senator Wyden Accuses Microsoft of ‘Cybersecurity Negligence’</li>
<li>(18:39) - Story # 2b: US senator victim-blames Microsoft for Chinese hack</li>
<li>(19:08) - Story # 2c: https://www.wyden.senate.gov/imo/media/doc/</li>
<li>(27:27) - Story # 3: Russian court jails cyber security executive for 14 years in treason case</li>
<li>(33:47) - Story # 4: Almost 40% of Ubuntu users vulnerable to new privilege elevation flaws</li>
<li>(47:29) - Story # 5: SEC now requires companies to disclose cyberattacks in 4 days</li>
<li>(48:19) - Story # 5b: SEC Adopts Rules on Cybersecurity Risk Management, Strategy, Governance, and Incident Disclosure by Public Companies</li>
<li>(57:55) - Take Joe's Class https://www.theosintion.com/courses/</li>
</ul>]]>
      </description>
      <content:encoded>
        <![CDATA[A weekly Podcast with BHIS and Friends. We discuss notable Infosec, and infosec-adjacent news stories. Brought to you by: ///
<ul><li>(00:00) - PreShow Banter™ — Messed With Your Head</li>
<li>(05:25) - Story # 1: Chinese Malware Could Cut Power To U.S. Military Bases, Businesses And Homes, Report Claims</li>
<li>(18:14) - Story # 2: US Senator Wyden Accuses Microsoft of ‘Cybersecurity Negligence’</li>
<li>(18:39) - Story # 2b: US senator victim-blames Microsoft for Chinese hack</li>
<li>(19:08) - Story # 2c: https://www.wyden.senate.gov/imo/media/doc/</li>
<li>(27:27) - Story # 3: Russian court jails cyber security executive for 14 years in treason case</li>
<li>(33:47) - Story # 4: Almost 40% of Ubuntu users vulnerable to new privilege elevation flaws</li>
<li>(47:29) - Story # 5: SEC now requires companies to disclose cyberattacks in 4 days</li>
<li>(48:19) - Story # 5b: SEC Adopts Rules on Cybersecurity Risk Management, Strategy, Governance, and Incident Disclosure by Public Companies</li>
<li>(57:55) - Take Joe's Class https://www.theosintion.com/courses/</li>
</ul>]]>
      </content:encoded>
      <pubDate>Wed, 02 Aug 2023 09:22:37 -0400</pubDate>
      <author>Black Hills Information Security</author>
      <enclosure url="https://media.transistor.fm/dc7cd15f/a6811af4.mp3" length="58275922" type="audio/mpeg"/>
      <itunes:author>Black Hills Information Security</itunes:author>
      <itunes:image href="https://img.transistorcdn.com/D7BpSzh7JG4DlEPWdncXvDAsGKoS-xm5TergQ17w-Vo/rs:fill:0:0:1/w:1400/h:1400/q:60/mb:500000/aHR0cHM6Ly9pbWct/dXBsb2FkLXByb2R1/Y3Rpb24udHJhbnNp/c3Rvci5mbS83ZWJl/YTliZjVkZDJmNWZk/MTYyNWFiOTZmOTY3/ZjJiNy5qcGc.jpg"/>
      <itunes:duration>3501</itunes:duration>
      <itunes:summary>A weekly Podcast with BHIS and Friends. We discuss notable Infosec, and infosec-adjacent news stories.



Brought to you by:



///</itunes:summary>
      <itunes:subtitle>A weekly Podcast with BHIS and Friends. We discuss notable Infosec, and infosec-adjacent news stories.



Brought to you by:



///</itunes:subtitle>
      <itunes:keywords>Infosec,Cybersecurity,news</itunes:keywords>
      <itunes:explicit>No</itunes:explicit>
      <podcast:chapters url="https://share.transistor.fm/s/dc7cd15f/chapters.json" type="application/json+chapters"/>
    </item>
    <item>
      <title>Talkin’ About Infosec News – 7/26/2023</title>
      <itunes:episode>1</itunes:episode>
      <podcast:episode>1</podcast:episode>
      <itunes:title>Talkin’ About Infosec News – 7/26/2023</itunes:title>
      <itunes:episodeType>full</itunes:episodeType>
      <guid isPermaLink="false">https://www.blackhillsinfosec.com/?p=26549</guid>
      <link>https://share.transistor.fm/s/5851b20d</link>
      <description>
        <![CDATA[]]>
      </description>
      <content:encoded>
        <![CDATA[]]>
      </content:encoded>
      <pubDate>Wed, 26 Jul 2023 16:30:52 -0400</pubDate>
      <author>Black Hills Information Security</author>
      <enclosure url="https://media.transistor.fm/5851b20d/3a381fac.mp3" length="55453071" type="audio/mpeg"/>
      <itunes:author>Black Hills Information Security</itunes:author>
      <itunes:image href="https://img.transistorcdn.com/Mo9DsEc-Tocy8S2oPG9kgGjIfYwiOykKAorAwgC6TPo/rs:fill:0:0:1/w:1400/h:1400/q:60/mb:500000/aHR0cHM6Ly9pbWct/dXBsb2FkLXByb2R1/Y3Rpb24udHJhbnNp/c3Rvci5mbS9iNDBh/ZjRhMzAzMzlmY2Q0/ODY4OTA1YjMwZjQ1/ZGFjNy5qcGc.jpg"/>
      <itunes:duration>3257</itunes:duration>
      <itunes:summary>
        <![CDATA[]]>
      </itunes:summary>
      <itunes:keywords>Infosec,Cybersecurity,news</itunes:keywords>
      <itunes:explicit>No</itunes:explicit>
      <podcast:chapters url="https://share.transistor.fm/s/5851b20d/chapters.json" type="application/json+chapters"/>
    </item>
    <item>
      <title>Talkin’ About Infosec News – 7/25/2023</title>
      <itunes:episode>1</itunes:episode>
      <podcast:episode>1</podcast:episode>
      <itunes:title>Talkin’ About Infosec News – 7/25/2023</itunes:title>
      <itunes:episodeType>full</itunes:episodeType>
      <guid isPermaLink="false">https://www.blackhillsinfosec.com/?p=26508</guid>
      <link>https://share.transistor.fm/s/1899243c</link>
      <description>
        <![CDATA[]]>
      </description>
      <content:encoded>
        <![CDATA[]]>
      </content:encoded>
      <pubDate>Tue, 25 Jul 2023 07:57:46 -0400</pubDate>
      <author>Black Hills Information Security</author>
      <enclosure url="https://media.transistor.fm/1899243c/71db32ca.mp3" length="55772934" type="audio/mpeg"/>
      <itunes:author>Black Hills Information Security</itunes:author>
      <itunes:image href="https://img.transistorcdn.com/HqwFtCy9uZbdD1WjEGF3sJSJBOlLxowY57aRtM3ifKQ/rs:fill:0:0:1/w:1400/h:1400/q:60/mb:500000/aHR0cHM6Ly9pbWct/dXBsb2FkLXByb2R1/Y3Rpb24udHJhbnNp/c3Rvci5mbS8xYzNj/ODUwY2FmNzliM2Uy/MzQwYzNjYzU1MmMw/OWJiZS5qcGc.jpg"/>
      <itunes:duration>3390</itunes:duration>
      <itunes:summary>
        <![CDATA[]]>
      </itunes:summary>
      <itunes:keywords>Infosec,Cybersecurity,news</itunes:keywords>
      <itunes:explicit>No</itunes:explicit>
      <podcast:chapters url="https://share.transistor.fm/s/1899243c/chapters.json" type="application/json+chapters"/>
    </item>
    <item>
      <title>Talkin’ About Infosec News – 7/21/2023</title>
      <itunes:episode>1</itunes:episode>
      <podcast:episode>1</podcast:episode>
      <itunes:title>Talkin’ About Infosec News – 7/21/2023</itunes:title>
      <itunes:episodeType>full</itunes:episodeType>
      <guid isPermaLink="false">https://www.blackhillsinfosec.com/?p=26504</guid>
      <link>https://share.transistor.fm/s/41b166b2</link>
      <description>
        <![CDATA[]]>
      </description>
      <content:encoded>
        <![CDATA[]]>
      </content:encoded>
      <pubDate>Fri, 21 Jul 2023 11:08:55 -0400</pubDate>
      <author>Black Hills Information Security</author>
      <enclosure url="https://media.transistor.fm/41b166b2/b74945a6.mp3" length="64124896" type="audio/mpeg"/>
      <itunes:author>Black Hills Information Security</itunes:author>
      <itunes:image href="https://img.transistorcdn.com/Ot_jVGbk0N8DYCv9LbWxkdCnq6ET5UxANt8SQdy1AgY/rs:fill:0:0:1/w:1400/h:1400/q:60/mb:500000/aHR0cHM6Ly9pbWct/dXBsb2FkLXByb2R1/Y3Rpb24udHJhbnNp/c3Rvci5mbS8yM2M0/MTBhZWZiNDIwNzYw/NGZkNTQzOTE0OWRj/NjJhZi5qcGc.jpg"/>
      <itunes:duration>3881</itunes:duration>
      <itunes:summary>
        <![CDATA[]]>
      </itunes:summary>
      <itunes:keywords>Infosec,Cybersecurity,news</itunes:keywords>
      <itunes:explicit>No</itunes:explicit>
      <podcast:chapters url="https://share.transistor.fm/s/41b166b2/chapters.json" type="application/json+chapters"/>
    </item>
    <item>
      <title>Talkin’ About Infosec News – 6/27/2023</title>
      <itunes:episode>1</itunes:episode>
      <podcast:episode>1</podcast:episode>
      <itunes:title>Talkin’ About Infosec News – 6/27/2023</itunes:title>
      <itunes:episodeType>full</itunes:episodeType>
      <guid isPermaLink="false">https://www.blackhillsinfosec.com/?p=26474</guid>
      <link>https://share.transistor.fm/s/e066c769</link>
      <description>
        <![CDATA[]]>
      </description>
      <content:encoded>
        <![CDATA[]]>
      </content:encoded>
      <pubDate>Tue, 27 Jun 2023 16:17:43 -0400</pubDate>
      <author>Black Hills Information Security</author>
      <enclosure url="https://media.transistor.fm/e066c769/667bf826.mp3" length="57783795" type="audio/mpeg"/>
      <itunes:author>Black Hills Information Security</itunes:author>
      <itunes:image href="https://img.transistorcdn.com/FiKnFe1R30JxAJu3QR3p2X5Dl5nAVVjkQWMZ153vQbk/rs:fill:0:0:1/w:1400/h:1400/q:60/mb:500000/aHR0cHM6Ly9pbWct/dXBsb2FkLXByb2R1/Y3Rpb24udHJhbnNp/c3Rvci5mbS9mYTVm/YTM4MDQ5YWYwYzE5/ZGE4NjMwYTAxY2I2/NWU0Yy5qcGc.jpg"/>
      <itunes:duration>3432</itunes:duration>
      <itunes:summary>
        <![CDATA[]]>
      </itunes:summary>
      <itunes:keywords>Infosec,Cybersecurity,news</itunes:keywords>
      <itunes:explicit>No</itunes:explicit>
      <podcast:chapters url="https://share.transistor.fm/s/e066c769/chapters.json" type="application/json+chapters"/>
    </item>
    <item>
      <title>Talkin’ About Infosec News – 6/21/2023</title>
      <itunes:episode>1</itunes:episode>
      <podcast:episode>1</podcast:episode>
      <itunes:title>Talkin’ About Infosec News – 6/21/2023</itunes:title>
      <itunes:episodeType>full</itunes:episodeType>
      <guid isPermaLink="false">https://www.blackhillsinfosec.com/?p=26450</guid>
      <link>https://share.transistor.fm/s/8d02e521</link>
      <description>
        <![CDATA[]]>
      </description>
      <content:encoded>
        <![CDATA[]]>
      </content:encoded>
      <pubDate>Wed, 21 Jun 2023 18:26:38 -0400</pubDate>
      <author>Black Hills Information Security</author>
      <enclosure url="https://media.transistor.fm/8d02e521/a417137a.mp3" length="55655647" type="audio/mpeg"/>
      <itunes:author>Black Hills Information Security</itunes:author>
      <itunes:image href="https://img.transistorcdn.com/UAhpjUNHpNuybv4SblS0r2QDlIgiJh1YYqyW2ffruGg/rs:fill:0:0:1/w:1400/h:1400/q:60/mb:500000/aHR0cHM6Ly9pbWct/dXBsb2FkLXByb2R1/Y3Rpb24udHJhbnNp/c3Rvci5mbS8yMzEy/ZTE3ZDNlNjI5YTcw/ZjAzNzNmOWQ4OGRm/MWRiZS5qcGc.jpg"/>
      <itunes:duration>3366</itunes:duration>
      <itunes:summary>
        <![CDATA[]]>
      </itunes:summary>
      <itunes:keywords>Infosec,Cybersecurity,news</itunes:keywords>
      <itunes:explicit>No</itunes:explicit>
      <podcast:chapters url="https://share.transistor.fm/s/8d02e521/chapters.json" type="application/json+chapters"/>
    </item>
    <item>
      <title>Talkin’ About Infosec News – 6/15/2023</title>
      <itunes:episode>1</itunes:episode>
      <podcast:episode>1</podcast:episode>
      <itunes:title>Talkin’ About Infosec News – 6/15/2023</itunes:title>
      <itunes:episodeType>full</itunes:episodeType>
      <guid isPermaLink="false">https://www.blackhillsinfosec.com/?p=26419</guid>
      <link>https://share.transistor.fm/s/e20ce20e</link>
      <description>
        <![CDATA[]]>
      </description>
      <content:encoded>
        <![CDATA[]]>
      </content:encoded>
      <pubDate>Thu, 15 Jun 2023 11:32:35 -0400</pubDate>
      <author>Black Hills Information Security</author>
      <enclosure url="https://media.transistor.fm/e20ce20e/cdc5e77e.mp3" length="64130298" type="audio/mpeg"/>
      <itunes:author>Black Hills Information Security</itunes:author>
      <itunes:image href="https://img.transistorcdn.com/iDxgDAYEa2c6iJJAcBtoRk1UrFUxGvLBk_HqtxKRHD0/rs:fill:0:0:1/w:1400/h:1400/q:60/mb:500000/aHR0cHM6Ly9pbWct/dXBsb2FkLXByb2R1/Y3Rpb24udHJhbnNp/c3Rvci5mbS83MDc2/YjVjY2QxNjVjZWZj/ZDg4OGM1OTUyYmQw/NzU0Ni5qcGc.jpg"/>
      <itunes:duration>3893</itunes:duration>
      <itunes:summary>
        <![CDATA[]]>
      </itunes:summary>
      <itunes:keywords>Infosec,Cybersecurity,news</itunes:keywords>
      <itunes:explicit>No</itunes:explicit>
      <podcast:chapters url="https://share.transistor.fm/s/e20ce20e/chapters.json" type="application/json+chapters"/>
    </item>
    <item>
      <title>Talkin’ About Infosec News – 6/9/2023</title>
      <itunes:episode>1</itunes:episode>
      <podcast:episode>1</podcast:episode>
      <itunes:title>Talkin’ About Infosec News – 6/9/2023</itunes:title>
      <itunes:episodeType>full</itunes:episodeType>
      <guid isPermaLink="false">https://www.blackhillsinfosec.com/?p=26318</guid>
      <link>https://share.transistor.fm/s/6c551958</link>
      <description>
        <![CDATA[<p>The post <a href="https://www.blackhillsinfosec.com/talkin-about-infosec-news-6-9-2023/">Talkin’ About Infosec News – 6/9/2023</a> appeared first on <a href="https://www.blackhillsinfosec.com">Black Hills Information Security</a>.</p>
<ul><li>(00:00) - PreShow Banter™ — Pick Your Crap</li>
<li>(02:01) - BHIS - Talkin' Bout [infosec] News 2023-06-05</li>
<li>(02:35) - Story # 1: International Underwear Model and Insurrectionist Was Just Sentenced to 32 Months in Prison</li>
<li>(05:39) - Story # 2: Mass exploitation of critical MOVEit flaw is ransacking orgs big and small</li>
<li>(07:46) - Story # 2b: https://github.com/AhmetPayaslioglu/YaraRules</li>
<li>(14:11) - Story # 2c: Critical Vulnerability in Progress MOVEit Transfer: Technical Analysis and Recommendations</li>
<li>(42:31) - Story # 3: Millions of PC Motherboards Were Sold With a Firmware Backdoor</li>
<li>(44:01) - Story # 3b: Gigabyte Rolls Out BIOS Updates to Remove Backdoor From Motherboards</li>
<li>(46:31) - Story # 4: Cyberweapon manufacturers plot to stay on the right side of US</li>
<li>(54:16) - Story # 5: Hackers steal around $170,000 after compromising Steve Aoki's Twitter account</li>
</ul>]]>
      </description>
      <content:encoded>
        <![CDATA[<p>The post <a href="https://www.blackhillsinfosec.com/talkin-about-infosec-news-6-9-2023/">Talkin’ About Infosec News – 6/9/2023</a> appeared first on <a href="https://www.blackhillsinfosec.com">Black Hills Information Security</a>.</p>
<ul><li>(00:00) - PreShow Banter™ — Pick Your Crap</li>
<li>(02:01) - BHIS - Talkin' Bout [infosec] News 2023-06-05</li>
<li>(02:35) - Story # 1: International Underwear Model and Insurrectionist Was Just Sentenced to 32 Months in Prison</li>
<li>(05:39) - Story # 2: Mass exploitation of critical MOVEit flaw is ransacking orgs big and small</li>
<li>(07:46) - Story # 2b: https://github.com/AhmetPayaslioglu/YaraRules</li>
<li>(14:11) - Story # 2c: Critical Vulnerability in Progress MOVEit Transfer: Technical Analysis and Recommendations</li>
<li>(42:31) - Story # 3: Millions of PC Motherboards Were Sold With a Firmware Backdoor</li>
<li>(44:01) - Story # 3b: Gigabyte Rolls Out BIOS Updates to Remove Backdoor From Motherboards</li>
<li>(46:31) - Story # 4: Cyberweapon manufacturers plot to stay on the right side of US</li>
<li>(54:16) - Story # 5: Hackers steal around $170,000 after compromising Steve Aoki's Twitter account</li>
</ul>]]>
      </content:encoded>
      <pubDate>Thu, 08 Jun 2023 15:22:42 -0400</pubDate>
      <author>Black Hills Information Security</author>
      <enclosure url="https://media.transistor.fm/6c551958/9b4a19cc.mp3" length="57648588" type="audio/mpeg"/>
      <itunes:author>Black Hills Information Security</itunes:author>
      <itunes:image href="https://img.transistorcdn.com/6ZrF_WEM7Hmk2ne6mekLRfINttiUUWj3oOOWHzHnwhs/rs:fill:0:0:1/w:1400/h:1400/q:60/mb:500000/aHR0cHM6Ly9pbWct/dXBsb2FkLXByb2R1/Y3Rpb24udHJhbnNp/c3Rvci5mbS8wOWJi/MTRiZjExMmYxYzAw/OWZiZGYyMDQzYWRj/MTBiOC5qcGc.jpg"/>
      <itunes:duration>3479</itunes:duration>
      <itunes:summary>
        <![CDATA[<p>The post <a href="https://www.blackhillsinfosec.com/talkin-about-infosec-news-6-9-2023/">Talkin’ About Infosec News – 6/9/2023</a> appeared first on <a href="https://www.blackhillsinfosec.com">Black Hills Information Security</a>.</p>
<ul><li>(00:00) - PreShow Banter™ — Pick Your Crap</li>
<li>(02:01) - BHIS - Talkin' Bout [infosec] News 2023-06-05</li>
<li>(02:35) - Story # 1: International Underwear Model and Insurrectionist Was Just Sentenced to 32 Months in Prison</li>
<li>(05:39) - Story # 2: Mass exploitation of critical MOVEit flaw is ransacking orgs big and small</li>
<li>(07:46) - Story # 2b: https://github.com/AhmetPayaslioglu/YaraRules</li>
<li>(14:11) - Story # 2c: Critical Vulnerability in Progress MOVEit Transfer: Technical Analysis and Recommendations</li>
<li>(42:31) - Story # 3: Millions of PC Motherboards Were Sold With a Firmware Backdoor</li>
<li>(44:01) - Story # 3b: Gigabyte Rolls Out BIOS Updates to Remove Backdoor From Motherboards</li>
<li>(46:31) - Story # 4: Cyberweapon manufacturers plot to stay on the right side of US</li>
<li>(54:16) - Story # 5: Hackers steal around $170,000 after compromising Steve Aoki's Twitter account</li>
</ul>]]>
      </itunes:summary>
      <itunes:keywords>Infosec,Cybersecurity,news</itunes:keywords>
      <itunes:explicit>No</itunes:explicit>
      <podcast:chapters url="https://share.transistor.fm/s/6c551958/chapters.json" type="application/json+chapters"/>
    </item>
    <item>
      <title>Talkin’ About Infosec News – 5/26/2023</title>
      <itunes:episode>1</itunes:episode>
      <podcast:episode>1</podcast:episode>
      <itunes:title>Talkin’ About Infosec News – 5/26/2023</itunes:title>
      <itunes:episodeType>full</itunes:episodeType>
      <guid isPermaLink="false">https://www.blackhillsinfosec.com/?p=26218</guid>
      <link>https://share.transistor.fm/s/b0fa571e</link>
      <description>
        <![CDATA[<p>The post <a href="https://www.blackhillsinfosec.com/talkin-about-infosec-news-5-26-2023/">Talkin’ About Infosec News – 5/26/2023</a> appeared first on <a href="https://www.blackhillsinfosec.com">Black Hills Information Security</a>.</p>
<ul><li>(00:00) - PreShow Banter™ — The Power of PreShow Banter™</li>
<li>(02:19) - BHIS - Talkin' Bout [infosec] News 2023-05-22</li>
<li>(04:40) - Story # 1: Meta slapped with record $1.3 billion EU fine over data privacy</li>
<li>(09:23) - Story # 2: Toyota Discloses Decade-Long Data Leak Exposing 2.15M Customers' Data</li>
<li>(11:58) - Story # 3: Microsoft is scanning the inside of password-protected zip files for malware</li>
<li>(21:53) - Story # 4: ChatGPT chief says artificial intelligence should be regulated by a US or global agency</li>
<li>(28:38) - Story # 5: 15million Bug Bounty - LayerZero Labs</li>
<li>(33:38) - Story # 6: Dish Network likely paid ransom after recent ransomware attack</li>
<li>(38:13) - Story # 7: New ZIP domains spark debate among cybersecurity experts</li>
<li>(41:09) - Story # 7b: https://twitter.com/_JohnHammond/status/1657427727425626113</li>
<li>(43:56) - Story # 8: Apple Bans Employees From Using ChatGPT Amid Its Own AI Efforts</li>
<li>(52:21) - Story # 9: TikTok sues Montana over controversial state ban</li>
</ul>]]>
      </description>
      <content:encoded>
        <![CDATA[<p>The post <a href="https://www.blackhillsinfosec.com/talkin-about-infosec-news-5-26-2023/">Talkin’ About Infosec News – 5/26/2023</a> appeared first on <a href="https://www.blackhillsinfosec.com">Black Hills Information Security</a>.</p>
<ul><li>(00:00) - PreShow Banter™ — The Power of PreShow Banter™</li>
<li>(02:19) - BHIS - Talkin' Bout [infosec] News 2023-05-22</li>
<li>(04:40) - Story # 1: Meta slapped with record $1.3 billion EU fine over data privacy</li>
<li>(09:23) - Story # 2: Toyota Discloses Decade-Long Data Leak Exposing 2.15M Customers' Data</li>
<li>(11:58) - Story # 3: Microsoft is scanning the inside of password-protected zip files for malware</li>
<li>(21:53) - Story # 4: ChatGPT chief says artificial intelligence should be regulated by a US or global agency</li>
<li>(28:38) - Story # 5: 15million Bug Bounty - LayerZero Labs</li>
<li>(33:38) - Story # 6: Dish Network likely paid ransom after recent ransomware attack</li>
<li>(38:13) - Story # 7: New ZIP domains spark debate among cybersecurity experts</li>
<li>(41:09) - Story # 7b: https://twitter.com/_JohnHammond/status/1657427727425626113</li>
<li>(43:56) - Story # 8: Apple Bans Employees From Using ChatGPT Amid Its Own AI Efforts</li>
<li>(52:21) - Story # 9: TikTok sues Montana over controversial state ban</li>
</ul>]]>
      </content:encoded>
      <pubDate>Fri, 26 May 2023 15:13:04 -0400</pubDate>
      <author>Black Hills Information Security</author>
      <enclosure url="https://media.transistor.fm/b0fa571e/e7695907.mp3" length="64846984" type="audio/mpeg"/>
      <itunes:author>Black Hills Information Security</itunes:author>
      <itunes:image href="https://img.transistorcdn.com/muCeWimpnKcoRsWB2XVXXu7fY5E1VGsNIOhLa7Sgrqc/rs:fill:0:0:1/w:1400/h:1400/q:60/mb:500000/aHR0cHM6Ly9pbWct/dXBsb2FkLXByb2R1/Y3Rpb24udHJhbnNp/c3Rvci5mbS9hZTUw/YmMwYWYzNTliYjJm/MzlmMTRlYmM0Y2U3/ZDc0YS5qcGc.jpg"/>
      <itunes:duration>3873</itunes:duration>
      <itunes:summary>
        <![CDATA[<p>The post <a href="https://www.blackhillsinfosec.com/talkin-about-infosec-news-5-26-2023/">Talkin’ About Infosec News – 5/26/2023</a> appeared first on <a href="https://www.blackhillsinfosec.com">Black Hills Information Security</a>.</p>
<ul><li>(00:00) - PreShow Banter™ — The Power of PreShow Banter™</li>
<li>(02:19) - BHIS - Talkin' Bout [infosec] News 2023-05-22</li>
<li>(04:40) - Story # 1: Meta slapped with record $1.3 billion EU fine over data privacy</li>
<li>(09:23) - Story # 2: Toyota Discloses Decade-Long Data Leak Exposing 2.15M Customers' Data</li>
<li>(11:58) - Story # 3: Microsoft is scanning the inside of password-protected zip files for malware</li>
<li>(21:53) - Story # 4: ChatGPT chief says artificial intelligence should be regulated by a US or global agency</li>
<li>(28:38) - Story # 5: 15million Bug Bounty - LayerZero Labs</li>
<li>(33:38) - Story # 6: Dish Network likely paid ransom after recent ransomware attack</li>
<li>(38:13) - Story # 7: New ZIP domains spark debate among cybersecurity experts</li>
<li>(41:09) - Story # 7b: https://twitter.com/_JohnHammond/status/1657427727425626113</li>
<li>(43:56) - Story # 8: Apple Bans Employees From Using ChatGPT Amid Its Own AI Efforts</li>
<li>(52:21) - Story # 9: TikTok sues Montana over controversial state ban</li>
</ul>]]>
      </itunes:summary>
      <itunes:keywords>Infosec,Cybersecurity,news</itunes:keywords>
      <itunes:explicit>No</itunes:explicit>
      <podcast:chapters url="https://share.transistor.fm/s/b0fa571e/chapters.json" type="application/json+chapters"/>
    </item>
    <item>
      <title>Talkin’ About Infosec News – 5/17/2023</title>
      <itunes:episode>1</itunes:episode>
      <podcast:episode>1</podcast:episode>
      <itunes:title>Talkin’ About Infosec News – 5/17/2023</itunes:title>
      <itunes:episodeType>full</itunes:episodeType>
      <guid isPermaLink="false">https://www.blackhillsinfosec.com/?p=26165</guid>
      <link>https://share.transistor.fm/s/8ff0cf25</link>
      <description>
        <![CDATA[<p>The post <a href="https://www.blackhillsinfosec.com/talkin-about-infosec-news-5-17-2023/">Talkin’ About Infosec News – 5/17/2023</a> appeared first on <a href="https://www.blackhillsinfosec.com">Black Hills Information Security</a>.</p>
<ul><li>(00:00) - PreShow Banter™ — Hardcore Mountain J-Biking</li>
<li>(02:37) - BHIS - Talkin' Bout [infosec] News 2023-05-15</li>
<li>(03:37) - Story # 1: Discord discloses data breach after support agent got hacked</li>
<li>(12:12) - Story # 2: Cybersecurity firm Dragos discloses cybersecurity incident, extortion attempt</li>
<li>(13:02) - Story # 2b: Deconstructing a Cybersecurity Event</li>
<li>(29:02) - Story # 3: How Apple catches leakers: From color changes to comma placement</li>
<li>(31:32) - Story # 3b: The ingenious way ‘Star Trek Beyond’ is making sure its script doesn’t leak online</li>
<li>(34:34) - Story # 3c: Genius hid a Morse code message in song lyrics to prove Google was copying them</li>
<li>(40:17) - Story # 4: How one of Vladimir Putin’s most prized hacking units got pwned by the FBI</li>
<li>(43:03) - Story # 4b: Hunting Russian Intelligence “Snake” Malware</li>
<li>(51:26) - Story # 4c: Microsoft recommended driver block rules</li>
<li>(55:50) - Story # 4d: Bypassing PatchGuard 3</li>
<li>(58:15) - Story # 5: The Team of Sleuths Quietly Hunting Cyberattack-for-Hire Services</li>
</ul>]]>
      </description>
      <content:encoded>
        <![CDATA[<p>The post <a href="https://www.blackhillsinfosec.com/talkin-about-infosec-news-5-17-2023/">Talkin’ About Infosec News – 5/17/2023</a> appeared first on <a href="https://www.blackhillsinfosec.com">Black Hills Information Security</a>.</p>
<ul><li>(00:00) - PreShow Banter™ — Hardcore Mountain J-Biking</li>
<li>(02:37) - BHIS - Talkin' Bout [infosec] News 2023-05-15</li>
<li>(03:37) - Story # 1: Discord discloses data breach after support agent got hacked</li>
<li>(12:12) - Story # 2: Cybersecurity firm Dragos discloses cybersecurity incident, extortion attempt</li>
<li>(13:02) - Story # 2b: Deconstructing a Cybersecurity Event</li>
<li>(29:02) - Story # 3: How Apple catches leakers: From color changes to comma placement</li>
<li>(31:32) - Story # 3b: The ingenious way ‘Star Trek Beyond’ is making sure its script doesn’t leak online</li>
<li>(34:34) - Story # 3c: Genius hid a Morse code message in song lyrics to prove Google was copying them</li>
<li>(40:17) - Story # 4: How one of Vladimir Putin’s most prized hacking units got pwned by the FBI</li>
<li>(43:03) - Story # 4b: Hunting Russian Intelligence “Snake” Malware</li>
<li>(51:26) - Story # 4c: Microsoft recommended driver block rules</li>
<li>(55:50) - Story # 4d: Bypassing PatchGuard 3</li>
<li>(58:15) - Story # 5: The Team of Sleuths Quietly Hunting Cyberattack-for-Hire Services</li>
</ul>]]>
      </content:encoded>
      <pubDate>Wed, 17 May 2023 15:25:42 -0400</pubDate>
      <author>Black Hills Information Security</author>
      <enclosure url="https://media.transistor.fm/8ff0cf25/301a3937.mp3" length="60073896" type="audio/mpeg"/>
      <itunes:author>Black Hills Information Security</itunes:author>
      <itunes:image href="https://img.transistorcdn.com/S3UeBsnU9fvbJmawgPr9VAE7jVS9xVx9sfmnVJqbO3o/rs:fill:0:0:1/w:1400/h:1400/q:60/mb:500000/aHR0cHM6Ly9pbWct/dXBsb2FkLXByb2R1/Y3Rpb24udHJhbnNp/c3Rvci5mbS9mYTM5/YzVjY2FlZjM5ZmJm/N2VkMGYxNzgxZjky/MDE2OS5qcGc.jpg"/>
      <itunes:duration>3585</itunes:duration>
      <itunes:summary>
        <![CDATA[<p>The post <a href="https://www.blackhillsinfosec.com/talkin-about-infosec-news-5-17-2023/">Talkin’ About Infosec News – 5/17/2023</a> appeared first on <a href="https://www.blackhillsinfosec.com">Black Hills Information Security</a>.</p>
<ul><li>(00:00) - PreShow Banter™ — Hardcore Mountain J-Biking</li>
<li>(02:37) - BHIS - Talkin' Bout [infosec] News 2023-05-15</li>
<li>(03:37) - Story # 1: Discord discloses data breach after support agent got hacked</li>
<li>(12:12) - Story # 2: Cybersecurity firm Dragos discloses cybersecurity incident, extortion attempt</li>
<li>(13:02) - Story # 2b: Deconstructing a Cybersecurity Event</li>
<li>(29:02) - Story # 3: How Apple catches leakers: From color changes to comma placement</li>
<li>(31:32) - Story # 3b: The ingenious way ‘Star Trek Beyond’ is making sure its script doesn’t leak online</li>
<li>(34:34) - Story # 3c: Genius hid a Morse code message in song lyrics to prove Google was copying them</li>
<li>(40:17) - Story # 4: How one of Vladimir Putin’s most prized hacking units got pwned by the FBI</li>
<li>(43:03) - Story # 4b: Hunting Russian Intelligence “Snake” Malware</li>
<li>(51:26) - Story # 4c: Microsoft recommended driver block rules</li>
<li>(55:50) - Story # 4d: Bypassing PatchGuard 3</li>
<li>(58:15) - Story # 5: The Team of Sleuths Quietly Hunting Cyberattack-for-Hire Services</li>
</ul>]]>
      </itunes:summary>
      <itunes:keywords>Infosec,Cybersecurity,news</itunes:keywords>
      <itunes:explicit>No</itunes:explicit>
      <podcast:chapters url="https://share.transistor.fm/s/8ff0cf25/chapters.json" type="application/json+chapters"/>
    </item>
    <item>
      <title>Talkin’ About Infosec News – 5/11/2023</title>
      <itunes:episode>1</itunes:episode>
      <podcast:episode>1</podcast:episode>
      <itunes:title>Talkin’ About Infosec News – 5/11/2023</itunes:title>
      <itunes:episodeType>full</itunes:episodeType>
      <guid isPermaLink="false">https://www.blackhillsinfosec.com/?p=26012</guid>
      <link>https://share.transistor.fm/s/674df595</link>
      <description>
        <![CDATA[<p>The post <a href="https://www.blackhillsinfosec.com/talkin-about-infosec-news-5-11-2023/">Talkin’ About Infosec News – 5/11/2023</a> appeared first on <a href="https://www.blackhillsinfosec.com">Black Hills Information Security</a>.</p>
<ul><li>(00:00) - PreShow Banter™ — Notes about Music</li>
<li>(01:19) - BHIS - Talkin' Bout [infosec] News 2023-05-08</li>
<li>(01:59) - Story # 1: China’s hackers outnumber FBI cyber staff ‘at least 50 to 1,’ Wray tells Congress</li>
<li>(06:57) - Story # 2: Drone goggles maker claims firmware sabotaged to ‘brick’ devices</li>
<li>(12:27) - Story # 3: Twitter says a 'security incident' led to private Circle tweets becoming public</li>
<li>(13:46) - Story # 4: Billy Corgan Paid Off Hacker to Prevent ATUM Leak</li>
<li>(21:15) - Story # 5: New Atomic macOS info-stealing malware targets 50 crypto wallets</li>
<li>(39:35) - Story # 5b ChatGPT maker OpenAI lost about $540 million last year</li>
<li>(47:51) - Story # 6: QR codes used in fake parking tickets, surveys to steal your money</li>
</ul>]]>
      </description>
      <content:encoded>
        <![CDATA[<p>The post <a href="https://www.blackhillsinfosec.com/talkin-about-infosec-news-5-11-2023/">Talkin’ About Infosec News – 5/11/2023</a> appeared first on <a href="https://www.blackhillsinfosec.com">Black Hills Information Security</a>.</p>
<ul><li>(00:00) - PreShow Banter™ — Notes about Music</li>
<li>(01:19) - BHIS - Talkin' Bout [infosec] News 2023-05-08</li>
<li>(01:59) - Story # 1: China’s hackers outnumber FBI cyber staff ‘at least 50 to 1,’ Wray tells Congress</li>
<li>(06:57) - Story # 2: Drone goggles maker claims firmware sabotaged to ‘brick’ devices</li>
<li>(12:27) - Story # 3: Twitter says a 'security incident' led to private Circle tweets becoming public</li>
<li>(13:46) - Story # 4: Billy Corgan Paid Off Hacker to Prevent ATUM Leak</li>
<li>(21:15) - Story # 5: New Atomic macOS info-stealing malware targets 50 crypto wallets</li>
<li>(39:35) - Story # 5b ChatGPT maker OpenAI lost about $540 million last year</li>
<li>(47:51) - Story # 6: QR codes used in fake parking tickets, surveys to steal your money</li>
</ul>]]>
      </content:encoded>
      <pubDate>Thu, 11 May 2023 10:50:02 -0400</pubDate>
      <author>Black Hills Information Security</author>
      <enclosure url="https://media.transistor.fm/674df595/9b96cd26.mp3" length="54162080" type="audio/mpeg"/>
      <itunes:author>Black Hills Information Security</itunes:author>
      <itunes:image href="https://img.transistorcdn.com/djRdM5QoqQ1_5uWSb1w31U99ljoxL7vAsvMnZQBCg0E/rs:fill:0:0:1/w:1400/h:1400/q:60/mb:500000/aHR0cHM6Ly9pbWct/dXBsb2FkLXByb2R1/Y3Rpb24udHJhbnNp/c3Rvci5mbS8wOGVi/M2Q2ZTNkMWQ2YTFi/YmFhOTI5YmEyOGE1/N2JiMi5qcGc.jpg"/>
      <itunes:duration>3253</itunes:duration>
      <itunes:summary>
        <![CDATA[<p>The post <a href="https://www.blackhillsinfosec.com/talkin-about-infosec-news-5-11-2023/">Talkin’ About Infosec News – 5/11/2023</a> appeared first on <a href="https://www.blackhillsinfosec.com">Black Hills Information Security</a>.</p>
<ul><li>(00:00) - PreShow Banter™ — Notes about Music</li>
<li>(01:19) - BHIS - Talkin' Bout [infosec] News 2023-05-08</li>
<li>(01:59) - Story # 1: China’s hackers outnumber FBI cyber staff ‘at least 50 to 1,’ Wray tells Congress</li>
<li>(06:57) - Story # 2: Drone goggles maker claims firmware sabotaged to ‘brick’ devices</li>
<li>(12:27) - Story # 3: Twitter says a 'security incident' led to private Circle tweets becoming public</li>
<li>(13:46) - Story # 4: Billy Corgan Paid Off Hacker to Prevent ATUM Leak</li>
<li>(21:15) - Story # 5: New Atomic macOS info-stealing malware targets 50 crypto wallets</li>
<li>(39:35) - Story # 5b ChatGPT maker OpenAI lost about $540 million last year</li>
<li>(47:51) - Story # 6: QR codes used in fake parking tickets, surveys to steal your money</li>
</ul>]]>
      </itunes:summary>
      <itunes:keywords>Infosec,Cybersecurity,news</itunes:keywords>
      <itunes:explicit>No</itunes:explicit>
      <podcast:chapters url="https://share.transistor.fm/s/674df595/chapters.json" type="application/json+chapters"/>
    </item>
    <item>
      <title>Talkin’ About Infosec News – 5/5/2023</title>
      <itunes:episode>1</itunes:episode>
      <podcast:episode>1</podcast:episode>
      <itunes:title>Talkin’ About Infosec News – 5/5/2023</itunes:title>
      <itunes:episodeType>full</itunes:episodeType>
      <guid isPermaLink="false">https://www.blackhillsinfosec.com/?p=25888</guid>
      <link>https://share.transistor.fm/s/8fc8cbcc</link>
      <description>
        <![CDATA[<p>The post <a href="https://www.blackhillsinfosec.com/talkin-about-infosec-news-5-5-2023/">Talkin’ About Infosec News – 5/5/2023</a> appeared first on <a href="https://www.blackhillsinfosec.com">Black Hills Information Security</a>.</p>
<ul><li>(00:00) - PreShow Banter™ — Swords in San Francisco</li>
<li>(01:32) - BHIS - Talkin' Bout [infosec] News 2023- 04-24</li>
<li>(04:00) - Story # 1: Pentagon Leaks: What's the Damage?</li>
<li>(13:09) - Story # 2: Hacker Group Names Are Now Absurdly Out of Control</li>
<li>(21:15) - Story # 3: 3CX Breach Was a Double Supply Chain Compromise</li>
<li>(38:31) - Story # 4: What’s more prevalent than juice jacking? Fake public WiFi networks, says researcher</li>
<li>(45:23) - Story # 5: Hundreds of Southwest Airlines flights are delayed after FAA lifts nationwide ground stop</li>
<li>(49:06) - Story # 6: European air traffic control confirms website 'under attack' by pro-Russia hackers</li>
<li>(50:56) - Story # 7: APC warns of critical unauthenticated RCE flaws in UPS software</li>
<li>(53:16) - Story # 8: ‘AuKill’ EDR killer malware abuses Process Explorer driver</li>
</ul>]]>
      </description>
      <content:encoded>
        <![CDATA[<p>The post <a href="https://www.blackhillsinfosec.com/talkin-about-infosec-news-5-5-2023/">Talkin’ About Infosec News – 5/5/2023</a> appeared first on <a href="https://www.blackhillsinfosec.com">Black Hills Information Security</a>.</p>
<ul><li>(00:00) - PreShow Banter™ — Swords in San Francisco</li>
<li>(01:32) - BHIS - Talkin' Bout [infosec] News 2023- 04-24</li>
<li>(04:00) - Story # 1: Pentagon Leaks: What's the Damage?</li>
<li>(13:09) - Story # 2: Hacker Group Names Are Now Absurdly Out of Control</li>
<li>(21:15) - Story # 3: 3CX Breach Was a Double Supply Chain Compromise</li>
<li>(38:31) - Story # 4: What’s more prevalent than juice jacking? Fake public WiFi networks, says researcher</li>
<li>(45:23) - Story # 5: Hundreds of Southwest Airlines flights are delayed after FAA lifts nationwide ground stop</li>
<li>(49:06) - Story # 6: European air traffic control confirms website 'under attack' by pro-Russia hackers</li>
<li>(50:56) - Story # 7: APC warns of critical unauthenticated RCE flaws in UPS software</li>
<li>(53:16) - Story # 8: ‘AuKill’ EDR killer malware abuses Process Explorer driver</li>
</ul>]]>
      </content:encoded>
      <pubDate>Fri, 05 May 2023 18:09:22 -0400</pubDate>
      <author>Black Hills Information Security</author>
      <enclosure url="https://media.transistor.fm/8fc8cbcc/f32be53d.mp3" length="61556557" type="audio/mpeg"/>
      <itunes:author>Black Hills Information Security</itunes:author>
      <itunes:image href="https://img.transistorcdn.com/mCC7uzHC8-Go1fIWYEMRhnDpqKKAOIJNgrBaiqik9es/rs:fill:0:0:1/w:1400/h:1400/q:60/mb:500000/aHR0cHM6Ly9pbWct/dXBsb2FkLXByb2R1/Y3Rpb24udHJhbnNp/c3Rvci5mbS80NWM4/Zjg1NDZjZDBmYzY4/NmZkOGEwMWI3NDQ1/YTY0NC5qcGc.jpg"/>
      <itunes:duration>3710</itunes:duration>
      <itunes:summary>
        <![CDATA[<p>The post <a href="https://www.blackhillsinfosec.com/talkin-about-infosec-news-5-5-2023/">Talkin’ About Infosec News – 5/5/2023</a> appeared first on <a href="https://www.blackhillsinfosec.com">Black Hills Information Security</a>.</p>
<ul><li>(00:00) - PreShow Banter™ — Swords in San Francisco</li>
<li>(01:32) - BHIS - Talkin' Bout [infosec] News 2023- 04-24</li>
<li>(04:00) - Story # 1: Pentagon Leaks: What's the Damage?</li>
<li>(13:09) - Story # 2: Hacker Group Names Are Now Absurdly Out of Control</li>
<li>(21:15) - Story # 3: 3CX Breach Was a Double Supply Chain Compromise</li>
<li>(38:31) - Story # 4: What’s more prevalent than juice jacking? Fake public WiFi networks, says researcher</li>
<li>(45:23) - Story # 5: Hundreds of Southwest Airlines flights are delayed after FAA lifts nationwide ground stop</li>
<li>(49:06) - Story # 6: European air traffic control confirms website 'under attack' by pro-Russia hackers</li>
<li>(50:56) - Story # 7: APC warns of critical unauthenticated RCE flaws in UPS software</li>
<li>(53:16) - Story # 8: ‘AuKill’ EDR killer malware abuses Process Explorer driver</li>
</ul>]]>
      </itunes:summary>
      <itunes:keywords>Infosec,Cybersecurity,news</itunes:keywords>
      <itunes:explicit>No</itunes:explicit>
      <podcast:chapters url="https://share.transistor.fm/s/8fc8cbcc/chapters.json" type="application/json+chapters"/>
    </item>
    <item>
      <title>Talkin’ About Infosec News – 4/18/2023</title>
      <itunes:episode>1</itunes:episode>
      <podcast:episode>1</podcast:episode>
      <itunes:title>Talkin’ About Infosec News – 4/18/2023</itunes:title>
      <itunes:episodeType>full</itunes:episodeType>
      <guid isPermaLink="false">https://www.blackhillsinfosec.com/?p=25809</guid>
      <link>https://share.transistor.fm/s/af3544b4</link>
      <description>
        <![CDATA[<p>The post <a href="https://www.blackhillsinfosec.com/talkin-about-infosec-news-4-18-2023/">Talkin’ About Infosec News – 4/18/2023</a> appeared first on <a href="https://www.blackhillsinfosec.com">Black Hills Information Security</a>.</p>
<ul><li>(00:00) - PreShow Banter™ — Hardest to Handle</li>
<li>(02:41) - BHIS - Talkin' Bout [infosec] News 2023-04-17</li>
<li>(04:22) - Story # 1: Actually, Charging Your Phone in a Public USB Port Is Fine</li>
<li>(16:04) - Story # 2: Israeli Irrigation Water Controllers &amp; Postal Service Breached</li>
<li>(16:48) - Story # 2b: Did someone really hack into the Oldsmar, Florida, water treatment plant? New details suggest maybe not.</li>
<li>(27:30) - Story # 2c: Ridley turns a horrific true story involving Hurricane Katrina into a scripted drama</li>
<li>(29:13) - Story # 3: 3CX blames North Korea for supply chain mass-hack</li>
<li>(35:09) - Story # 4: FBI arrests 21-year-old Air National Guardsman suspected of leaking classified documents</li>
<li>(53:59) - Story # 5: Montana lawmakers vote to completely ban TikTok in the state</li>
</ul>]]>
      </description>
      <content:encoded>
        <![CDATA[<p>The post <a href="https://www.blackhillsinfosec.com/talkin-about-infosec-news-4-18-2023/">Talkin’ About Infosec News – 4/18/2023</a> appeared first on <a href="https://www.blackhillsinfosec.com">Black Hills Information Security</a>.</p>
<ul><li>(00:00) - PreShow Banter™ — Hardest to Handle</li>
<li>(02:41) - BHIS - Talkin' Bout [infosec] News 2023-04-17</li>
<li>(04:22) - Story # 1: Actually, Charging Your Phone in a Public USB Port Is Fine</li>
<li>(16:04) - Story # 2: Israeli Irrigation Water Controllers &amp; Postal Service Breached</li>
<li>(16:48) - Story # 2b: Did someone really hack into the Oldsmar, Florida, water treatment plant? New details suggest maybe not.</li>
<li>(27:30) - Story # 2c: Ridley turns a horrific true story involving Hurricane Katrina into a scripted drama</li>
<li>(29:13) - Story # 3: 3CX blames North Korea for supply chain mass-hack</li>
<li>(35:09) - Story # 4: FBI arrests 21-year-old Air National Guardsman suspected of leaking classified documents</li>
<li>(53:59) - Story # 5: Montana lawmakers vote to completely ban TikTok in the state</li>
</ul>]]>
      </content:encoded>
      <pubDate>Wed, 19 Apr 2023 14:11:10 -0400</pubDate>
      <author>Black Hills Information Security</author>
      <enclosure url="https://media.transistor.fm/af3544b4/21fc1229.mp3" length="59515475" type="audio/mpeg"/>
      <itunes:author>Black Hills Information Security</itunes:author>
      <itunes:image href="https://img.transistorcdn.com/mJu2jMHpl-ZBrNoU3RRGhdtb3wzVzrt1GRcDV4mHNk8/rs:fill:0:0:1/w:1400/h:1400/q:60/mb:500000/aHR0cHM6Ly9pbWct/dXBsb2FkLXByb2R1/Y3Rpb24udHJhbnNp/c3Rvci5mbS8yZjEw/ZTM3NzE0ZTQxNGM1/NjNjMGE1MmU3OWMw/MzY0ZC5qcGc.jpg"/>
      <itunes:duration>3586</itunes:duration>
      <itunes:summary>
        <![CDATA[<p>The post <a href="https://www.blackhillsinfosec.com/talkin-about-infosec-news-4-18-2023/">Talkin’ About Infosec News – 4/18/2023</a> appeared first on <a href="https://www.blackhillsinfosec.com">Black Hills Information Security</a>.</p>
<ul><li>(00:00) - PreShow Banter™ — Hardest to Handle</li>
<li>(02:41) - BHIS - Talkin' Bout [infosec] News 2023-04-17</li>
<li>(04:22) - Story # 1: Actually, Charging Your Phone in a Public USB Port Is Fine</li>
<li>(16:04) - Story # 2: Israeli Irrigation Water Controllers &amp; Postal Service Breached</li>
<li>(16:48) - Story # 2b: Did someone really hack into the Oldsmar, Florida, water treatment plant? New details suggest maybe not.</li>
<li>(27:30) - Story # 2c: Ridley turns a horrific true story involving Hurricane Katrina into a scripted drama</li>
<li>(29:13) - Story # 3: 3CX blames North Korea for supply chain mass-hack</li>
<li>(35:09) - Story # 4: FBI arrests 21-year-old Air National Guardsman suspected of leaking classified documents</li>
<li>(53:59) - Story # 5: Montana lawmakers vote to completely ban TikTok in the state</li>
</ul>]]>
      </itunes:summary>
      <itunes:keywords>Infosec,Cybersecurity,news</itunes:keywords>
      <itunes:explicit>No</itunes:explicit>
      <podcast:chapters url="https://share.transistor.fm/s/af3544b4/chapters.json" type="application/json+chapters"/>
    </item>
    <item>
      <title>Talkin’ About Infosec News – 4/11/2023</title>
      <itunes:episode>1</itunes:episode>
      <podcast:episode>1</podcast:episode>
      <itunes:title>Talkin’ About Infosec News – 4/11/2023</itunes:title>
      <itunes:episodeType>full</itunes:episodeType>
      <guid isPermaLink="false">https://www.blackhillsinfosec.com/?p=25734</guid>
      <link>https://share.transistor.fm/s/fb8e0a51</link>
      <description>
        <![CDATA[<p>The post <a href="https://www.blackhillsinfosec.com/talkin-about-infosec-news-4-11-2023/">Talkin’ About Infosec News – 4/11/2023</a> appeared first on <a href="https://www.blackhillsinfosec.com">Black Hills Information Security</a>.</p>
<ul><li>(00:00) - PreShow Banter™ — Canada Man</li>
<li>(03:49) - BHIS - Talkin' Bout [infosec] News 2023-04-10</li>
<li>(05:10) - Story # 1: IRS-authorized eFile.com tax return software caught serving JS malware</li>
<li>(11:52) - Story # 2: Hackers using Log4j bug to profit from victim IP addresses through ‘proxyjacking’ scheme</li>
<li>(19:45) - Story # 3: Two-Fifths of IT Pros Told to Keep Breaches Quiet</li>
<li>(27:27) - Story # 4: Samsung reportedly leaked its own secrets through ChatGPT</li>
<li>(30:16) - Story # 4b: Introducing Microsoft Security Copilot: Empowering defenders at the speed of AI</li>
<li>(32:07) - Story # 5: Tesla workers shared images from car cameras, including “scenes of intimacy”</li>
<li>(47:37) - HBS News Hour</li>
<li>(52:01) - Story # 6: KFC, Pizza Hut owner discloses data breach after ransomware attack</li>
</ul>]]>
      </description>
      <content:encoded>
        <![CDATA[<p>The post <a href="https://www.blackhillsinfosec.com/talkin-about-infosec-news-4-11-2023/">Talkin’ About Infosec News – 4/11/2023</a> appeared first on <a href="https://www.blackhillsinfosec.com">Black Hills Information Security</a>.</p>
<ul><li>(00:00) - PreShow Banter™ — Canada Man</li>
<li>(03:49) - BHIS - Talkin' Bout [infosec] News 2023-04-10</li>
<li>(05:10) - Story # 1: IRS-authorized eFile.com tax return software caught serving JS malware</li>
<li>(11:52) - Story # 2: Hackers using Log4j bug to profit from victim IP addresses through ‘proxyjacking’ scheme</li>
<li>(19:45) - Story # 3: Two-Fifths of IT Pros Told to Keep Breaches Quiet</li>
<li>(27:27) - Story # 4: Samsung reportedly leaked its own secrets through ChatGPT</li>
<li>(30:16) - Story # 4b: Introducing Microsoft Security Copilot: Empowering defenders at the speed of AI</li>
<li>(32:07) - Story # 5: Tesla workers shared images from car cameras, including “scenes of intimacy”</li>
<li>(47:37) - HBS News Hour</li>
<li>(52:01) - Story # 6: KFC, Pizza Hut owner discloses data breach after ransomware attack</li>
</ul>]]>
      </content:encoded>
      <pubDate>Tue, 11 Apr 2023 17:15:21 -0400</pubDate>
      <author>Black Hills Information Security</author>
      <enclosure url="https://media.transistor.fm/fb8e0a51/35653e83.mp3" length="57369278" type="audio/mpeg"/>
      <itunes:author>Black Hills Information Security</itunes:author>
      <itunes:image href="https://img.transistorcdn.com/FJE02GXV70MQaxT4iAH0K9Ll8-1RFr42_9LlZATE_ig/rs:fill:0:0:1/w:1400/h:1400/q:60/mb:500000/aHR0cHM6Ly9pbWct/dXBsb2FkLXByb2R1/Y3Rpb24udHJhbnNp/c3Rvci5mbS9hMDVk/NTcyMzZmMjlkMTk2/ZTk3NjM3ZjUxZWUz/ZmMzOC5qcGc.jpg"/>
      <itunes:duration>3420</itunes:duration>
      <itunes:summary>
        <![CDATA[<p>The post <a href="https://www.blackhillsinfosec.com/talkin-about-infosec-news-4-11-2023/">Talkin’ About Infosec News – 4/11/2023</a> appeared first on <a href="https://www.blackhillsinfosec.com">Black Hills Information Security</a>.</p>
<ul><li>(00:00) - PreShow Banter™ — Canada Man</li>
<li>(03:49) - BHIS - Talkin' Bout [infosec] News 2023-04-10</li>
<li>(05:10) - Story # 1: IRS-authorized eFile.com tax return software caught serving JS malware</li>
<li>(11:52) - Story # 2: Hackers using Log4j bug to profit from victim IP addresses through ‘proxyjacking’ scheme</li>
<li>(19:45) - Story # 3: Two-Fifths of IT Pros Told to Keep Breaches Quiet</li>
<li>(27:27) - Story # 4: Samsung reportedly leaked its own secrets through ChatGPT</li>
<li>(30:16) - Story # 4b: Introducing Microsoft Security Copilot: Empowering defenders at the speed of AI</li>
<li>(32:07) - Story # 5: Tesla workers shared images from car cameras, including “scenes of intimacy”</li>
<li>(47:37) - HBS News Hour</li>
<li>(52:01) - Story # 6: KFC, Pizza Hut owner discloses data breach after ransomware attack</li>
</ul>]]>
      </itunes:summary>
      <itunes:keywords>Infosec,Cybersecurity,news</itunes:keywords>
      <itunes:explicit>No</itunes:explicit>
      <podcast:chapters url="https://share.transistor.fm/s/fb8e0a51/chapters.json" type="application/json+chapters"/>
    </item>
    <item>
      <title>Talkin’ About Infosec News – 4/5/2023</title>
      <itunes:episode>1</itunes:episode>
      <podcast:episode>1</podcast:episode>
      <itunes:title>Talkin’ About Infosec News – 4/5/2023</itunes:title>
      <itunes:episodeType>full</itunes:episodeType>
      <guid isPermaLink="false">https://www.blackhillsinfosec.com/?p=25677</guid>
      <link>https://share.transistor.fm/s/025d4722</link>
      <description>
        <![CDATA[<p>The post <a href="https://www.blackhillsinfosec.com/talkin-about-infosec-news-4-5-2023/">Talkin’ About Infosec News – 4/5/2023</a> appeared first on <a href="https://www.blackhillsinfosec.com">Black Hills Information Security</a>.</p>
<ul><li>(00:00) - PreShow Banter™ — Jazzy Saxophone</li>
<li>(01:13) - BHIS - Talkin' Bout [infosec] News 2023-04-03</li>
<li>(02:40) - Story # 1: He Would Still Be Here': Man Dies by Suicide After Talking with AI Chatbot, Widow Says</li>
<li>(08:45) - Story # 1b: Elon Musk, Steve Wozniak Join AI Experts In Pushing To 'Pause Giant AI Experiments'</li>
<li>(14:51) - Story # 2: S.686 - RESTRICT Act</li>
<li>(26:01) - Story # 3: Leaked IT contractor files detail Kremlin's stockpile of cyber-weapons</li>
<li>(29:27) - Story # 4: 3CX thought supply chain attack was a false positive</li>
<li>(35:46) - Story # 5: Twitter takes its algorithm ‘open-source,’ as Elon Musk promised</li>
<li>(39:40) - Story # 6: 20-Year-Old BreachForums Founder Faces Up to 5 Years in Prison</li>
<li>(44:16) - Story # 7: Hacker Agrees to Return $197 Million Stolen from Euler Finance</li>
<li>(47:46) - Story # 8: India-based cybergang busted for selling fake KFC franchises</li>
<li>(51:50) - Story # 8b: https://twitter.com/cyberabadpolice</li>
<li>(52:42) - Story # 8c: https://www.cyberabadpolice.gov.in</li>
<li>(56:07) - Story # 9: Meta wants EU users to apply for permission to opt out of data collection</li>
</ul>]]>
      </description>
      <content:encoded>
        <![CDATA[<p>The post <a href="https://www.blackhillsinfosec.com/talkin-about-infosec-news-4-5-2023/">Talkin’ About Infosec News – 4/5/2023</a> appeared first on <a href="https://www.blackhillsinfosec.com">Black Hills Information Security</a>.</p>
<ul><li>(00:00) - PreShow Banter™ — Jazzy Saxophone</li>
<li>(01:13) - BHIS - Talkin' Bout [infosec] News 2023-04-03</li>
<li>(02:40) - Story # 1: He Would Still Be Here': Man Dies by Suicide After Talking with AI Chatbot, Widow Says</li>
<li>(08:45) - Story # 1b: Elon Musk, Steve Wozniak Join AI Experts In Pushing To 'Pause Giant AI Experiments'</li>
<li>(14:51) - Story # 2: S.686 - RESTRICT Act</li>
<li>(26:01) - Story # 3: Leaked IT contractor files detail Kremlin's stockpile of cyber-weapons</li>
<li>(29:27) - Story # 4: 3CX thought supply chain attack was a false positive</li>
<li>(35:46) - Story # 5: Twitter takes its algorithm ‘open-source,’ as Elon Musk promised</li>
<li>(39:40) - Story # 6: 20-Year-Old BreachForums Founder Faces Up to 5 Years in Prison</li>
<li>(44:16) - Story # 7: Hacker Agrees to Return $197 Million Stolen from Euler Finance</li>
<li>(47:46) - Story # 8: India-based cybergang busted for selling fake KFC franchises</li>
<li>(51:50) - Story # 8b: https://twitter.com/cyberabadpolice</li>
<li>(52:42) - Story # 8c: https://www.cyberabadpolice.gov.in</li>
<li>(56:07) - Story # 9: Meta wants EU users to apply for permission to opt out of data collection</li>
</ul>]]>
      </content:encoded>
      <pubDate>Wed, 05 Apr 2023 10:22:03 -0400</pubDate>
      <author>Black Hills Information Security</author>
      <enclosure url="https://media.transistor.fm/025d4722/e42af74a.mp3" length="61766690" type="audio/mpeg"/>
      <itunes:author>Black Hills Information Security</itunes:author>
      <itunes:image href="https://img.transistorcdn.com/ZYD2hwxXOgUnqwiESwgHmH20XxPisAo6LiehCCnc0lc/rs:fill:0:0:1/w:1400/h:1400/q:60/mb:500000/aHR0cHM6Ly9pbWct/dXBsb2FkLXByb2R1/Y3Rpb24udHJhbnNp/c3Rvci5mbS85YzM1/MWY3MTFjOWRkY2U5/YjhhMDkxNTEwNjc1/NGE1NC5qcGc.jpg"/>
      <itunes:duration>3662</itunes:duration>
      <itunes:summary>
        <![CDATA[<p>The post <a href="https://www.blackhillsinfosec.com/talkin-about-infosec-news-4-5-2023/">Talkin’ About Infosec News – 4/5/2023</a> appeared first on <a href="https://www.blackhillsinfosec.com">Black Hills Information Security</a>.</p>
<ul><li>(00:00) - PreShow Banter™ — Jazzy Saxophone</li>
<li>(01:13) - BHIS - Talkin' Bout [infosec] News 2023-04-03</li>
<li>(02:40) - Story # 1: He Would Still Be Here': Man Dies by Suicide After Talking with AI Chatbot, Widow Says</li>
<li>(08:45) - Story # 1b: Elon Musk, Steve Wozniak Join AI Experts In Pushing To 'Pause Giant AI Experiments'</li>
<li>(14:51) - Story # 2: S.686 - RESTRICT Act</li>
<li>(26:01) - Story # 3: Leaked IT contractor files detail Kremlin's stockpile of cyber-weapons</li>
<li>(29:27) - Story # 4: 3CX thought supply chain attack was a false positive</li>
<li>(35:46) - Story # 5: Twitter takes its algorithm ‘open-source,’ as Elon Musk promised</li>
<li>(39:40) - Story # 6: 20-Year-Old BreachForums Founder Faces Up to 5 Years in Prison</li>
<li>(44:16) - Story # 7: Hacker Agrees to Return $197 Million Stolen from Euler Finance</li>
<li>(47:46) - Story # 8: India-based cybergang busted for selling fake KFC franchises</li>
<li>(51:50) - Story # 8b: https://twitter.com/cyberabadpolice</li>
<li>(52:42) - Story # 8c: https://www.cyberabadpolice.gov.in</li>
<li>(56:07) - Story # 9: Meta wants EU users to apply for permission to opt out of data collection</li>
</ul>]]>
      </itunes:summary>
      <itunes:keywords>Infosec,Cybersecurity,news</itunes:keywords>
      <itunes:explicit>No</itunes:explicit>
      <podcast:chapters url="https://share.transistor.fm/s/025d4722/chapters.json" type="application/json+chapters"/>
    </item>
    <item>
      <title>Talkin’ About Infosec News – 4/3/2023</title>
      <itunes:episode>1</itunes:episode>
      <podcast:episode>1</podcast:episode>
      <itunes:title>Talkin’ About Infosec News – 4/3/2023</itunes:title>
      <itunes:episodeType>full</itunes:episodeType>
      <guid isPermaLink="false">https://www.blackhillsinfosec.com/?p=25667</guid>
      <link>https://share.transistor.fm/s/0df331e7</link>
      <description>
        <![CDATA[<p>The post <a href="https://www.blackhillsinfosec.com/talkin-about-infosec-news-4-3-2023/">Talkin’ About Infosec News – 4/3/2023</a> appeared first on <a href="https://www.blackhillsinfosec.com">Black Hills Information Security</a>.</p>
<ul><li>(00:00) - PreShow Banter™ — Always Checking For Leaks</li>
<li>(02:56) - BHIS - Talkin' Bout [infosec] News 2023-03-27</li>
<li>(04:31) - Story # 1: Data breach leak site BreachForums shuts down</li>
<li>(12:06) - Story # 2: Ralph's personal cybercrime story</li>
<li>(21:43) - Story # 3: North Korean hackers using Chrome extensions to steal Gmail emails</li>
<li>(31:13) - Story # 4: Gordon Moore, Intel Co-Founder, Dies at 94</li>
<li>(32:37) - Story # 4b: Beloved hacking veteran Kelly ‘Aloria’ Lum passes away at 41</li>
<li>(32:59) - Story # 5: Twitter Says Parts of Its Source Code Were Leaked Online</li>
<li>(37:00) - Story # 6: AI image of Pope Francis in a puffer jacket fooled the internet and experts fear there’s worse to come</li>
<li>(41:07) - Story # 6b: Samsung’s Moon Shots Force Us to Ask How Much AI Is Too Much</li>
<li>(44:00) - Story # 7:New MacStealer macOS malware steals passwords from iCloud Keychain</li>
<li>(45:22) - Story # 8: Windows 11, Tesla, Ubuntu, and macOS hacked at Pwn2Own 2023</li>
<li>(49:39) - Story # 9: Ferrari discloses data breach after receiving ransom demand</li>
<li>(52:03) - Story # 10: How hackers took over Linus Tech Tips</li>
</ul>]]>
      </description>
      <content:encoded>
        <![CDATA[<p>The post <a href="https://www.blackhillsinfosec.com/talkin-about-infosec-news-4-3-2023/">Talkin’ About Infosec News – 4/3/2023</a> appeared first on <a href="https://www.blackhillsinfosec.com">Black Hills Information Security</a>.</p>
<ul><li>(00:00) - PreShow Banter™ — Always Checking For Leaks</li>
<li>(02:56) - BHIS - Talkin' Bout [infosec] News 2023-03-27</li>
<li>(04:31) - Story # 1: Data breach leak site BreachForums shuts down</li>
<li>(12:06) - Story # 2: Ralph's personal cybercrime story</li>
<li>(21:43) - Story # 3: North Korean hackers using Chrome extensions to steal Gmail emails</li>
<li>(31:13) - Story # 4: Gordon Moore, Intel Co-Founder, Dies at 94</li>
<li>(32:37) - Story # 4b: Beloved hacking veteran Kelly ‘Aloria’ Lum passes away at 41</li>
<li>(32:59) - Story # 5: Twitter Says Parts of Its Source Code Were Leaked Online</li>
<li>(37:00) - Story # 6: AI image of Pope Francis in a puffer jacket fooled the internet and experts fear there’s worse to come</li>
<li>(41:07) - Story # 6b: Samsung’s Moon Shots Force Us to Ask How Much AI Is Too Much</li>
<li>(44:00) - Story # 7:New MacStealer macOS malware steals passwords from iCloud Keychain</li>
<li>(45:22) - Story # 8: Windows 11, Tesla, Ubuntu, and macOS hacked at Pwn2Own 2023</li>
<li>(49:39) - Story # 9: Ferrari discloses data breach after receiving ransom demand</li>
<li>(52:03) - Story # 10: How hackers took over Linus Tech Tips</li>
</ul>]]>
      </content:encoded>
      <pubDate>Mon, 03 Apr 2023 10:02:09 -0400</pubDate>
      <author>Black Hills Information Security</author>
      <enclosure url="https://media.transistor.fm/0df331e7/8f18d01a.mp3" length="63696271" type="audio/mpeg"/>
      <itunes:author>Black Hills Information Security</itunes:author>
      <itunes:image href="https://img.transistorcdn.com/3EvC1OY2kNMkwk3fEnm3jGzPS_rbrFinkP1FM0sPK1A/rs:fill:0:0:1/w:1400/h:1400/q:60/mb:500000/aHR0cHM6Ly9pbWct/dXBsb2FkLXByb2R1/Y3Rpb24udHJhbnNp/c3Rvci5mbS8yZTcz/OWUwMGFjY2JlYjdj/MTk4ODgxMDY2OWE5/NzI3OS5qcGc.jpg"/>
      <itunes:duration>3772</itunes:duration>
      <itunes:summary>
        <![CDATA[<p>The post <a href="https://www.blackhillsinfosec.com/talkin-about-infosec-news-4-3-2023/">Talkin’ About Infosec News – 4/3/2023</a> appeared first on <a href="https://www.blackhillsinfosec.com">Black Hills Information Security</a>.</p>
<ul><li>(00:00) - PreShow Banter™ — Always Checking For Leaks</li>
<li>(02:56) - BHIS - Talkin' Bout [infosec] News 2023-03-27</li>
<li>(04:31) - Story # 1: Data breach leak site BreachForums shuts down</li>
<li>(12:06) - Story # 2: Ralph's personal cybercrime story</li>
<li>(21:43) - Story # 3: North Korean hackers using Chrome extensions to steal Gmail emails</li>
<li>(31:13) - Story # 4: Gordon Moore, Intel Co-Founder, Dies at 94</li>
<li>(32:37) - Story # 4b: Beloved hacking veteran Kelly ‘Aloria’ Lum passes away at 41</li>
<li>(32:59) - Story # 5: Twitter Says Parts of Its Source Code Were Leaked Online</li>
<li>(37:00) - Story # 6: AI image of Pope Francis in a puffer jacket fooled the internet and experts fear there’s worse to come</li>
<li>(41:07) - Story # 6b: Samsung’s Moon Shots Force Us to Ask How Much AI Is Too Much</li>
<li>(44:00) - Story # 7:New MacStealer macOS malware steals passwords from iCloud Keychain</li>
<li>(45:22) - Story # 8: Windows 11, Tesla, Ubuntu, and macOS hacked at Pwn2Own 2023</li>
<li>(49:39) - Story # 9: Ferrari discloses data breach after receiving ransom demand</li>
<li>(52:03) - Story # 10: How hackers took over Linus Tech Tips</li>
</ul>]]>
      </itunes:summary>
      <itunes:keywords>Infosec,Cybersecurity,news</itunes:keywords>
      <itunes:explicit>No</itunes:explicit>
      <podcast:chapters url="https://share.transistor.fm/s/0df331e7/chapters.json" type="application/json+chapters"/>
    </item>
    <item>
      <title>Talkin’ About Infosec News – 3/16/2023</title>
      <itunes:episode>1</itunes:episode>
      <podcast:episode>1</podcast:episode>
      <itunes:title>Talkin’ About Infosec News – 3/16/2023</itunes:title>
      <itunes:episodeType>full</itunes:episodeType>
      <guid isPermaLink="false">https://www.blackhillsinfosec.com/?p=25597</guid>
      <link>https://share.transistor.fm/s/a2211422</link>
      <description>
        <![CDATA[<p>00:00 – PreShow Banter™ — Tossing Money at Problems00:58 – BHIS – Talkin’ Bout [infosec] News 2023-03-1301:41 – Story # 1: Silicon Valley Bank collapse: Treasury, Fed, and FDIC announce […]</p>
<p>The post <a href="https://www.blackhillsinfosec.com/talkin-about-infosec-news-3-16-2023/">Talkin’ About Infosec News – 3/16/2023</a> appeared first on <a href="https://www.blackhillsinfosec.com">Black Hills Information Security</a>.</p>
<ul><li>(00:00) - PreShow Banter™ — Tossing Money at Problems</li>
<li>(00:58) - BHIS - Talkin' Bout [infosec] News 2023-03-13</li>
<li>(01:41) - Story # 1: Silicon Valley Bank collapse: Treasury, Fed and FDIC announce steps to ensure deposits will be paid in full</li>
<li>(17:23) - Story # 1b: Silicon Valley Bank exec was Lehman Brothers CFO prior to 2008 collapse</li>
<li>(21:21) - Story # 2: FBI investigates data breach impacting U.S. House members and staff</li>
<li>(30:33) - Story # 3: Acronis downplays intrusion after 12GB trove leaks online</li>
<li>(34:40) - Story # 4: Acer confirms breach after 160GB of data for sale on hacking forum</li>
<li>(51:26) - Story # 5: The privacy loophole in your doorbell</li>
<li>(57:28) - Spearfish General Store</li>
</ul>]]>
      </description>
      <content:encoded>
        <![CDATA[<p>00:00 – PreShow Banter™ — Tossing Money at Problems00:58 – BHIS – Talkin’ Bout [infosec] News 2023-03-1301:41 – Story # 1: Silicon Valley Bank collapse: Treasury, Fed, and FDIC announce […]</p>
<p>The post <a href="https://www.blackhillsinfosec.com/talkin-about-infosec-news-3-16-2023/">Talkin’ About Infosec News – 3/16/2023</a> appeared first on <a href="https://www.blackhillsinfosec.com">Black Hills Information Security</a>.</p>
<ul><li>(00:00) - PreShow Banter™ — Tossing Money at Problems</li>
<li>(00:58) - BHIS - Talkin' Bout [infosec] News 2023-03-13</li>
<li>(01:41) - Story # 1: Silicon Valley Bank collapse: Treasury, Fed and FDIC announce steps to ensure deposits will be paid in full</li>
<li>(17:23) - Story # 1b: Silicon Valley Bank exec was Lehman Brothers CFO prior to 2008 collapse</li>
<li>(21:21) - Story # 2: FBI investigates data breach impacting U.S. House members and staff</li>
<li>(30:33) - Story # 3: Acronis downplays intrusion after 12GB trove leaks online</li>
<li>(34:40) - Story # 4: Acer confirms breach after 160GB of data for sale on hacking forum</li>
<li>(51:26) - Story # 5: The privacy loophole in your doorbell</li>
<li>(57:28) - Spearfish General Store</li>
</ul>]]>
      </content:encoded>
      <pubDate>Thu, 16 Mar 2023 14:21:11 -0400</pubDate>
      <author>Black Hills Information Security</author>
      <enclosure url="https://media.transistor.fm/a2211422/0e2650b9.mp3" length="60795607" type="audio/mpeg"/>
      <itunes:author>Black Hills Information Security</itunes:author>
      <itunes:image href="https://img.transistorcdn.com/xa794_U_Q6xP-D6XvYnwk1NzRvvEwq0HQAmYMWPI8Pg/rs:fill:0:0:1/w:1400/h:1400/q:60/mb:500000/aHR0cHM6Ly9pbWct/dXBsb2FkLXByb2R1/Y3Rpb24udHJhbnNp/c3Rvci5mbS9jNjk3/Y2Q1NzMzM2U4NTg1/ZTkyZjNhYjQ3Mjk5/YWM1NS5qcGc.jpg"/>
      <itunes:duration>3636</itunes:duration>
      <itunes:summary>00:00 – PreShow Banter™ — Tossing Money at Problems00:58 – BHIS – Talkin’ Bout [infosec] News 2023-03-1301:41 – Story # 1: Silicon Valley Bank collapse: Treasury, Fed, and FDIC announce steps to ensure deposits will be paid in fullhttps://abcnews.go.com/Business/silicon-valley-bank-collapse-treasury-fed-fdic-announce/story?id=9780726817:23 – Story # 1b: Silicon Valley Bank exec was Lehman Brothers CFO prior to the 2008 collapsehttps://www.foxbusiness.com/economy/silicon-valley-bank-exec-was-lehman-brothers-cfo-prior-to-2008-collapse21:21 – Story # 2: FBI investigates data breach impacting U.S. House members and staffhttps://www.bleepingcomputer.com/news/security/fbi-investigates-data-breach-impacting-us-house-members-and-staff/30:33 – Story # 3: Acronis downplays intrusion after 12GB trove leaks onlinehttps://www.theregister.com/2023/03/10/acronis_data_breach_details/34:40 – Story # 4: Acer confirms breach after 160GB of data for sale on hacking forumhttps://www.bleepingcomputer.com/news/security/acer-confirms-breach-after-160gb-of-data-for-sale-on-hacking-forum/51:26 – Story # 5: The privacy loophole in your doorbellhttps://www.politico.com/news/2023/03/07/privacy-loophole-ring-doorbell-0008497957:28 – Spearfish General Store: https://spearphish-general-store.myshopify.com
















We are self-publishing free Infosec Zines called PROMPT#.  



PROMPT# will contain: 

Infosec articles 
Challenging puzzles 
Comic book based on real-life hacking adventures 
Coloring contests 
Bonus Backdoors &amp;amp; Breaches Consultant Cards (print version only) 
Other stuffs 

You can check out current and upcoming issues here: https://www.blackhillsinfosec.com/prompt-zine/ </itunes:summary>
      <itunes:subtitle>00:00 – PreShow Banter™ — Tossing Money at Problems00:58 – BHIS – Talkin’ Bout [infosec] News 2023-03-1301:41 – Story # 1: Silicon Valley Bank collapse: Treasury, Fed, and FDIC announce steps to ensure deposits will be paid in fullhttps://abcnews.go.com/B</itunes:subtitle>
      <itunes:keywords>Infosec,Cybersecurity,news</itunes:keywords>
      <itunes:explicit>No</itunes:explicit>
      <podcast:chapters url="https://share.transistor.fm/s/a2211422/chapters.json" type="application/json+chapters"/>
    </item>
    <item>
      <title>Talkin’ About Infosec News – 3/8/2023 (v2)</title>
      <itunes:episode>1</itunes:episode>
      <podcast:episode>1</podcast:episode>
      <itunes:title>Talkin’ About Infosec News – 3/8/2023 (v2)</itunes:title>
      <itunes:episodeType>full</itunes:episodeType>
      <guid isPermaLink="false">https://www.blackhillsinfosec.com/?p=25577</guid>
      <link>https://share.transistor.fm/s/62064911</link>
      <description>
        <![CDATA[<p>THIS IS A TEST</p>
<p>The post <a href="https://www.blackhillsinfosec.com/talkin-about-infosec-news-3-8-2023-v2/">Talkin’ About Infosec News – 3/8/2023 (v2)</a> appeared first on <a href="https://www.blackhillsinfosec.com">Black Hills Information Security</a>.</p>
<ul><li>(00:00) - PreShow Banter™ — Lil NAS</li>
<li>(06:52) - BHIS - Talkin' Bout [infosec] News 2023-03-06</li>
<li>(08:13) - Story # 1: LastPass says employee’s home computer was hacked and corporate vault taken</li>
<li>(28:32) - Story # 2: An Uncomfortable Reality: Occupational Hazards Associated with Thought Leadership in CTI</li>
<li>(35:18) - Story # 3: FACT SHEET: Biden-⁠Harris Administration Announces National Cybersecurity Strategy</li>
<li>(45:17) - Story # 4: Roku Doesn’t Support IPv6 and It Might Be a Big Deal</li>
<li>(51:05) - Story # 5: Secret crawlspace cryptomine discovered in routine inspection of MA high school</li>
<li>(57:18) - Story # 6: ATM thieves use glue and 'tap' function to drain accounts at Chase Bank</li>
</ul>]]>
      </description>
      <content:encoded>
        <![CDATA[<p>THIS IS A TEST</p>
<p>The post <a href="https://www.blackhillsinfosec.com/talkin-about-infosec-news-3-8-2023-v2/">Talkin’ About Infosec News – 3/8/2023 (v2)</a> appeared first on <a href="https://www.blackhillsinfosec.com">Black Hills Information Security</a>.</p>
<ul><li>(00:00) - PreShow Banter™ — Lil NAS</li>
<li>(06:52) - BHIS - Talkin' Bout [infosec] News 2023-03-06</li>
<li>(08:13) - Story # 1: LastPass says employee’s home computer was hacked and corporate vault taken</li>
<li>(28:32) - Story # 2: An Uncomfortable Reality: Occupational Hazards Associated with Thought Leadership in CTI</li>
<li>(35:18) - Story # 3: FACT SHEET: Biden-⁠Harris Administration Announces National Cybersecurity Strategy</li>
<li>(45:17) - Story # 4: Roku Doesn’t Support IPv6 and It Might Be a Big Deal</li>
<li>(51:05) - Story # 5: Secret crawlspace cryptomine discovered in routine inspection of MA high school</li>
<li>(57:18) - Story # 6: ATM thieves use glue and 'tap' function to drain accounts at Chase Bank</li>
</ul>]]>
      </content:encoded>
      <pubDate>Wed, 08 Mar 2023 17:18:55 -0500</pubDate>
      <author>Black Hills Information Security</author>
      <enclosure url="https://media.transistor.fm/62064911/0087c338.mp3" length="66720692" type="audio/mpeg"/>
      <itunes:author>Black Hills Information Security</itunes:author>
      <itunes:image href="https://img.transistorcdn.com/ONEguayewcsYTQ7foxWGXUB1YKEnPargz5ZQ36Hmji4/rs:fill:0:0:1/w:1400/h:1400/q:60/mb:500000/aHR0cHM6Ly9pbWct/dXBsb2FkLXByb2R1/Y3Rpb24udHJhbnNp/c3Rvci5mbS8wODhj/NWRiMzUzYTM2MGJj/ZjgxYjE2Yjg3MGVk/MmM2Ni5qcGc.jpg"/>
      <itunes:duration>4046</itunes:duration>
      <itunes:summary>THIS IS A TEST</itunes:summary>
      <itunes:subtitle>THIS IS A TEST</itunes:subtitle>
      <itunes:keywords>Infosec,Cybersecurity,news</itunes:keywords>
      <itunes:explicit>No</itunes:explicit>
      <podcast:chapters url="https://share.transistor.fm/s/62064911/chapters.json" type="application/json+chapters"/>
    </item>
    <item>
      <title>Talkin’ About Infosec News – 3/8/2023</title>
      <itunes:episode>1</itunes:episode>
      <podcast:episode>1</podcast:episode>
      <itunes:title>Talkin’ About Infosec News – 3/8/2023</itunes:title>
      <itunes:episodeType>full</itunes:episodeType>
      <guid isPermaLink="false">https://www.blackhillsinfosec.com/?p=25575</guid>
      <link>https://share.transistor.fm/s/ea8d140f</link>
      <description>
        <![CDATA[<p>00:00 – PreShow Banter™ — Lil NAS06:52 – BHIS – Talkin’ Bout [infosec] News 2023-03-0608:13 – Story # 1: LastPass says employee’s home computer was hacked and corporate vault takenhttps://arstechnica.com/information-technology/2023/02/lastpass-hackers-infected-employees-home-computer-and-stole-corporate-vault/28:32 […]</p>
<p>The post <a href="https://www.blackhillsinfosec.com/talkin-about-infosec-news-3-8-2023/">Talkin’ About Infosec News – 3/8/2023</a> appeared first on <a href="https://www.blackhillsinfosec.com">Black Hills Information Security</a>.</p>
<ul><li>(00:00) - PreShow Banter™ — Lil NAS</li>
<li>(06:52) - BHIS - Talkin' Bout [infosec] News 2023-03-06</li>
<li>(08:13) - Story # 1: LastPass says employee’s home computer was hacked and corporate vault taken</li>
<li>(28:32) - Story # 2: An Uncomfortable Reality: Occupational Hazards Associated with Thought Leadership in CTI</li>
<li>(35:18) - Story # 3: FACT SHEET: Biden-⁠Harris Administration Announces National Cybersecurity Strategy</li>
<li>(45:17) - Story # 4: Roku Doesn’t Support IPv6 and It Might Be a Big Deal</li>
<li>(51:05) - Story # 5: Secret crawlspace cryptomine discovered in routine inspection of MA high school</li>
<li>(57:18) - Story # 6: ATM thieves use glue and 'tap' function to drain accounts at Chase Bank</li>
</ul>]]>
      </description>
      <content:encoded>
        <![CDATA[<p>00:00 – PreShow Banter™ — Lil NAS06:52 – BHIS – Talkin’ Bout [infosec] News 2023-03-0608:13 – Story # 1: LastPass says employee’s home computer was hacked and corporate vault takenhttps://arstechnica.com/information-technology/2023/02/lastpass-hackers-infected-employees-home-computer-and-stole-corporate-vault/28:32 […]</p>
<p>The post <a href="https://www.blackhillsinfosec.com/talkin-about-infosec-news-3-8-2023/">Talkin’ About Infosec News – 3/8/2023</a> appeared first on <a href="https://www.blackhillsinfosec.com">Black Hills Information Security</a>.</p>
<ul><li>(00:00) - PreShow Banter™ — Lil NAS</li>
<li>(06:52) - BHIS - Talkin' Bout [infosec] News 2023-03-06</li>
<li>(08:13) - Story # 1: LastPass says employee’s home computer was hacked and corporate vault taken</li>
<li>(28:32) - Story # 2: An Uncomfortable Reality: Occupational Hazards Associated with Thought Leadership in CTI</li>
<li>(35:18) - Story # 3: FACT SHEET: Biden-⁠Harris Administration Announces National Cybersecurity Strategy</li>
<li>(45:17) - Story # 4: Roku Doesn’t Support IPv6 and It Might Be a Big Deal</li>
<li>(51:05) - Story # 5: Secret crawlspace cryptomine discovered in routine inspection of MA high school</li>
<li>(57:18) - Story # 6: ATM thieves use glue and 'tap' function to drain accounts at Chase Bank</li>
</ul>]]>
      </content:encoded>
      <pubDate>Wed, 08 Mar 2023 17:13:03 -0500</pubDate>
      <author>Black Hills Information Security</author>
      <enclosure url="https://media.transistor.fm/ea8d140f/2982c8b4.mp3" length="66726026" type="audio/mpeg"/>
      <itunes:author>Black Hills Information Security</itunes:author>
      <itunes:image href="https://img.transistorcdn.com/OmLC-WzqLPBT7P6Ox_oMfEtsfMxuNzYhQteZBDuosZg/rs:fill:0:0:1/w:1400/h:1400/q:60/mb:500000/aHR0cHM6Ly9pbWct/dXBsb2FkLXByb2R1/Y3Rpb24udHJhbnNp/c3Rvci5mbS8wMDYx/YTI0OGUzZWVkYTM0/ZGMyNjA2ZTBiNDNl/ZTFkYi5qcGc.jpg"/>
      <itunes:duration>4046</itunes:duration>
      <itunes:summary>00:00 – PreShow Banter™ — Lil NAS06:52 – BHIS – Talkin’ Bout [infosec] News 2023-03-0608:13 – Story # 1: LastPass says employee’s home computer was hacked and corporate vault takenhttps://arstechnica.com/information-technology/2023/02/lastpass-hackers-infected-employees-home-computer-and-stole-corporate-vault/28:32 – Story # 2: An Uncomfortable Reality: Occupational Hazards Associated with Thought Leadership in CTIhttps://medium.com/@Shinigami42/an-uncomfortable-reality-occupational-hazards-associated-with-thought-leadership-in-cti-7c5a1505636535:18 – Story # 3: FACT SHEET: Biden-Harris Administration Announces National Cybersecurity Strategyhttps://www.whitehouse.gov/briefing-room/statements-releases/2023/03/02/fact-sheet-biden-harris-administration-announces-national-cybersecurity-strategy/45:17 – Story # 4: Roku Doesn’t Support IPv6 and It Might Be a Big Dealhttps://daringfireball.net/linked/2023/03/06/roku-apple-tv51:05 – Story # 5: Secret crawlspace cryptomine discovered in routine inspection of MA high schoolhttps://arstechnica.com/tech-policy/2023/02/secret-crawlspace-cryptomine-discovered-in-routine-inspection-of-ma-high-school/57:18 – Story # 6: ATM thieves use glue and ‘tap’ function to drain accounts at Chase Bankhttps://abc7news.com/atm-scam-tap-card-chase-bank-function/12905397/</itunes:summary>
      <itunes:subtitle>00:00 – PreShow Banter™ — Lil NAS06:52 – BHIS – Talkin’ Bout [infosec] News 2023-03-0608:13 – Story # 1: LastPass says employee’s home computer was hacked and corporate vault takenhttps://arstechnica.com/information-technology/2023/02/lastpass-hackers-inf</itunes:subtitle>
      <itunes:keywords>Infosec,Cybersecurity,news</itunes:keywords>
      <itunes:explicit>No</itunes:explicit>
      <podcast:chapters url="https://share.transistor.fm/s/ea8d140f/chapters.json" type="application/json+chapters"/>
    </item>
    <item>
      <title>Talkin’ About Infosec News – 3/3/2023</title>
      <itunes:episode>1</itunes:episode>
      <podcast:episode>1</podcast:episode>
      <itunes:title>Talkin’ About Infosec News – 3/3/2023</itunes:title>
      <itunes:episodeType>full</itunes:episodeType>
      <guid isPermaLink="false">https://www.blackhillsinfosec.com/?p=25519</guid>
      <link>https://share.transistor.fm/s/1505784b</link>
      <description>
        <![CDATA[<p>Story # 1: A Basic iPhone Feature Helps Criminals Steal Your Entire Digital Lifehttps://www.wsj.com/articles/apple-iphone-security-theft-passcode-data-privacya-basic-iphone-feature-helps-criminals-steal-your-digital-life-cbf14b1a Story # 1b: Apple’s iPhone Passcode Problem: Thieves Can Ruin Your Entire Digital Life in Minutes […]</p>
<p>The post <a href="https://www.blackhillsinfosec.com/talkin-about-infosec-news-3-3-2023/">Talkin’ About Infosec News – 3/3/2023</a> appeared first on <a href="https://www.blackhillsinfosec.com">Black Hills Information Security</a>.</p>
<ul><li>(00:00) - PreShow Banter™ — Farm Raised Artificial Intelligence</li>
<li>(04:01) - BHIS - Talkin' Bout [infosec] News 2023-02-27</li>
<li>(05:09) - Story # 1: A Basic iPhone Feature Helps Criminals Steal Your Entire Digital Life</li>
<li>(18:52) - Story # 2: Sensitive US military emails spill online</li>
<li>(27:55) - Story # 3: Fruit giant Dole suffers ransomware attack impacting operations</li>
<li>(33:01) - Story # 4: Well-hidden Mac cryptomining malware found in pirate copies of Final Cut Pro; expect more</li>
<li>(37:30) - Story # 5: AI Helps Crack NIST-Recommended Post-Quantum Encryption Algorithm</li>
<li>(40:38) - Story # 6: Snapchat launches ChatGPT integration, warns to not share your secrets</li>
<li>(43:28) - Story # 7: How I Broke Into a Bank Account With an AI-Generated Voice</li>
<li>(47:55) - Story # 8: Firms Who Pay Ransom Subsidise 10 New Attacks: Report</li>
<li>(53:51) - Story # 9: Valve set a trap to catch and ban 40,000 Dota 2 cheaters</li>
</ul>]]>
      </description>
      <content:encoded>
        <![CDATA[<p>Story # 1: A Basic iPhone Feature Helps Criminals Steal Your Entire Digital Lifehttps://www.wsj.com/articles/apple-iphone-security-theft-passcode-data-privacya-basic-iphone-feature-helps-criminals-steal-your-digital-life-cbf14b1a Story # 1b: Apple’s iPhone Passcode Problem: Thieves Can Ruin Your Entire Digital Life in Minutes […]</p>
<p>The post <a href="https://www.blackhillsinfosec.com/talkin-about-infosec-news-3-3-2023/">Talkin’ About Infosec News – 3/3/2023</a> appeared first on <a href="https://www.blackhillsinfosec.com">Black Hills Information Security</a>.</p>
<ul><li>(00:00) - PreShow Banter™ — Farm Raised Artificial Intelligence</li>
<li>(04:01) - BHIS - Talkin' Bout [infosec] News 2023-02-27</li>
<li>(05:09) - Story # 1: A Basic iPhone Feature Helps Criminals Steal Your Entire Digital Life</li>
<li>(18:52) - Story # 2: Sensitive US military emails spill online</li>
<li>(27:55) - Story # 3: Fruit giant Dole suffers ransomware attack impacting operations</li>
<li>(33:01) - Story # 4: Well-hidden Mac cryptomining malware found in pirate copies of Final Cut Pro; expect more</li>
<li>(37:30) - Story # 5: AI Helps Crack NIST-Recommended Post-Quantum Encryption Algorithm</li>
<li>(40:38) - Story # 6: Snapchat launches ChatGPT integration, warns to not share your secrets</li>
<li>(43:28) - Story # 7: How I Broke Into a Bank Account With an AI-Generated Voice</li>
<li>(47:55) - Story # 8: Firms Who Pay Ransom Subsidise 10 New Attacks: Report</li>
<li>(53:51) - Story # 9: Valve set a trap to catch and ban 40,000 Dota 2 cheaters</li>
</ul>]]>
      </content:encoded>
      <pubDate>Fri, 03 Mar 2023 14:01:37 -0500</pubDate>
      <author>Black Hills Information Security</author>
      <enclosure url="https://media.transistor.fm/1505784b/48d45ed8.mp3" length="59018941" type="audio/mpeg"/>
      <itunes:author>Black Hills Information Security</itunes:author>
      <itunes:image href="https://img.transistorcdn.com/MIpcNFZHdNpfV0y-d0fiBV4Qs6U4LwGiWIQLCftYgis/rs:fill:0:0:1/w:1400/h:1400/q:60/mb:500000/aHR0cHM6Ly9pbWct/dXBsb2FkLXByb2R1/Y3Rpb24udHJhbnNp/c3Rvci5mbS8yNWY5/YWNlMDFlMDQ3ODA3/MjIzZjQ4MDhjNTc3/ZWY5ZS5qcGc.jpg"/>
      <itunes:duration>3516</itunes:duration>
      <itunes:summary>Story # 1: A Basic iPhone Feature Helps Criminals Steal Your Entire Digital Lifehttps://www.wsj.com/articles/apple-iphone-security-theft-passcode-data-privacya-basic-iphone-feature-helps-criminals-steal-your-digital-life-cbf14b1a



Story # 1b: Apple’s iPhone Passcode Problem: Thieves Can Ruin Your Entire Digital Life in Minutes | WSJhttps://youtu.be/QUYODQB_2wQ



Story # 2: Sensitive US military emails spill onlinehttps://techcrunch.com/2023/02/21/sensitive-united-states-military-emails-spill-online/?guccounter=1



Story # 3: Fruit giant Dole suffers ransomware attack impacting operationshttps://www.bleepingcomputer.com/news/security/fruit-giant-dole-suffers-ransomware-attack-impacting-operations/



Story # 4: Well-hidden Mac cryptomining malware found in pirate copies of Final Cut Pro; expect morehttps://9to5mac.com/2023/02/23/mac-cryptomining-malware/



Story # 5: AI Helps Crack NIST-Recommended Post-Quantum Encryption Algorithmhttps://www.securityweek.com/ai-helps-crack-a-nist-recommended-post-quantum-encryption-algorithm/



Story # 6: Snapchat launches ChatGPT integration, warns to not share your secretshttps://9to5mac.com/2023/02/27/snapchat-launches-chatgpt-ai/



Story # 7: How I Broke Into a Bank Account With an AI-Generated Voicehttps://www.vice.com/en/article/dy7axa/how-i-broke-into-a-bank-account-with-an-ai-generated-voice



Story # 8: Firms Who Pay Ransom Subsidise 10 New Attacks: Reporthttps://www.infosecurity-magazine.com/news/firms-pay-ransom-subsidise-10/



Story # 9: Valve set a trap to catch and ban 40,000 Dota 2 cheatershttps://www.polygon.com/23610095/valve-dota-2-huge-ban-trap
















We are self-publishing free Infosec Zines called PROMPT#.  



PROMPT# will contain: 

Infosec articles 
Challenging puzzles 
Comic book based on real-life hacking adventures 
Coloring contests 
Bonus Backdoors &amp;amp; Breaches Consultant Cards (print version only) 
Other stuffs 

You can check out current and upcoming issues here: </itunes:summary>
      <itunes:subtitle>Story # 1: A Basic iPhone Feature Helps Criminals Steal Your Entire Digital Lifehttps://www.wsj.com/articles/apple-iphone-security-theft-passcode-data-privacya-basic-iphone-feature-helps-criminals-steal-your-digital-life-cbf14b1a



Story # 1b: Apple’s iP</itunes:subtitle>
      <itunes:keywords>Infosec,Cybersecurity,news</itunes:keywords>
      <itunes:explicit>No</itunes:explicit>
      <podcast:chapters url="https://share.transistor.fm/s/1505784b/chapters.json" type="application/json+chapters"/>
    </item>
    <item>
      <title>Talkin’ About Infosec News – 2/22/2023</title>
      <itunes:episode>1</itunes:episode>
      <podcast:episode>1</podcast:episode>
      <itunes:title>Talkin’ About Infosec News – 2/22/2023</itunes:title>
      <itunes:episodeType>full</itunes:episodeType>
      <guid isPermaLink="false">https://www.blackhillsinfosec.com/?p=25404</guid>
      <link>https://share.transistor.fm/s/3b38f2ec</link>
      <description>
        <![CDATA[<p>00:00 – PreShow Banter™ — Pop Tart Pizza04:15 – BHIS – Talkin’ Bout [infosec] News 2023-02-2005:39 – Story # 1: Employee data from a major cybersecurity firm posted for sale […]</p>
<p>The post <a href="https://www.blackhillsinfosec.com/talkin-about-infosec-news-2-22-2023/">Talkin’ About Infosec News – 2/22/2023</a> appeared first on <a href="https://www.blackhillsinfosec.com">Black Hills Information Security</a>.</p>
<ul><li>(00:00) - PreShow Banter™ — Pop Tart Pizza</li>
<li>(04:15) - BHIS - Talkin' Bout [infosec] News 2023-02-20</li>
<li>(05:39) - Story # 1: Employee data from a major cybersecurity firm posted for sale on a hacker forum</li>
<li>(13:43) - Story # 2: FBI is investigating a cybersecurity incident on its network</li>
<li>(16:44) - Story # 3: GoDaddy: Hackers stole source code, installed malware in multi-year breach</li>
<li>(21:44) - Story # 4: Hyundai, Kia pushing updates so you can’t just steal their cars with USB cables</li>
<li>(30:21) - Story # 5: Eurostar forces 'password resets' — then fails and locks users out</li>
<li>(33:37) - Story # 6: Hacker Uncovers How to Turn Traffic Lights Green With Flipper Zero</li>
<li>(39:30) - Story # 7: Namecheap denies system breach after email service used to spread phishing scams</li>
<li>(43:11) - Story # 8: Official: Twitter will now charge for SMS two-factor authentication</li>
<li>(48:24) - Story # 9: Software suite of Israeli security firm Cellebrite leaks online</li>
<li>(51:22) - Story # 10: The US Air Force may have shot down an Amateur Radio Pico Balloon over Canada</li>
<li>(55:48) - Story # 11: ChatGPT Is Ingesting Corporate Secrets</li>
</ul>]]>
      </description>
      <content:encoded>
        <![CDATA[<p>00:00 – PreShow Banter™ — Pop Tart Pizza04:15 – BHIS – Talkin’ Bout [infosec] News 2023-02-2005:39 – Story # 1: Employee data from a major cybersecurity firm posted for sale […]</p>
<p>The post <a href="https://www.blackhillsinfosec.com/talkin-about-infosec-news-2-22-2023/">Talkin’ About Infosec News – 2/22/2023</a> appeared first on <a href="https://www.blackhillsinfosec.com">Black Hills Information Security</a>.</p>
<ul><li>(00:00) - PreShow Banter™ — Pop Tart Pizza</li>
<li>(04:15) - BHIS - Talkin' Bout [infosec] News 2023-02-20</li>
<li>(05:39) - Story # 1: Employee data from a major cybersecurity firm posted for sale on a hacker forum</li>
<li>(13:43) - Story # 2: FBI is investigating a cybersecurity incident on its network</li>
<li>(16:44) - Story # 3: GoDaddy: Hackers stole source code, installed malware in multi-year breach</li>
<li>(21:44) - Story # 4: Hyundai, Kia pushing updates so you can’t just steal their cars with USB cables</li>
<li>(30:21) - Story # 5: Eurostar forces 'password resets' — then fails and locks users out</li>
<li>(33:37) - Story # 6: Hacker Uncovers How to Turn Traffic Lights Green With Flipper Zero</li>
<li>(39:30) - Story # 7: Namecheap denies system breach after email service used to spread phishing scams</li>
<li>(43:11) - Story # 8: Official: Twitter will now charge for SMS two-factor authentication</li>
<li>(48:24) - Story # 9: Software suite of Israeli security firm Cellebrite leaks online</li>
<li>(51:22) - Story # 10: The US Air Force may have shot down an Amateur Radio Pico Balloon over Canada</li>
<li>(55:48) - Story # 11: ChatGPT Is Ingesting Corporate Secrets</li>
</ul>]]>
      </content:encoded>
      <pubDate>Wed, 22 Feb 2023 12:38:53 -0500</pubDate>
      <author>Black Hills Information Security</author>
      <enclosure url="https://media.transistor.fm/3b38f2ec/301f01c0.mp3" length="66352495" type="audio/mpeg"/>
      <itunes:author>Black Hills Information Security</itunes:author>
      <itunes:image href="https://img.transistorcdn.com/gq7na_VE-L0m1V4bLXRxiW4MD3R9U2CZD9_Td_jhNr8/rs:fill:0:0:1/w:1400/h:1400/q:60/mb:500000/aHR0cHM6Ly9pbWct/dXBsb2FkLXByb2R1/Y3Rpb24udHJhbnNp/c3Rvci5mbS85ODY4/MDk3ZThhZTFhZThh/NDU1MjA0OWZmZjcx/MmQwNi5qcGc.jpg"/>
      <itunes:duration>4017</itunes:duration>
      <itunes:summary>00:00 – PreShow Banter™ — Pop Tart Pizza04:15 – BHIS – Talkin’ Bout [infosec] News 2023-02-2005:39 – Story # 1: Employee data from a major cybersecurity firm posted for sale on a hacker forumhttps://twitter.com/FalconFeedsio/status/162686144278689382413:43 – Story # 2: FBI is investigating a cybersecurity incident on its networkhttps://www.bleepingcomputer.com/news/security/godaddy-hackers-stole-source-code-installed-malware-in-multi-year-breach/16:44 – Story # 3: GoDaddy: Hackers stole source code, installed malware in multi-year breachhttps://www.bleepingcomputer.com/news/security/godaddy-hackers-stole-source-code-installed-malware-in-multi-year-breach/21:44 – Story # 4: Hyundai, Kia pushing updates so you can’t just steal their cars with USB cableshttps://arstechnica.com/cars/2023/02/hyundai-kia-pushing-updates-so-you-cant-just-steal-their-cars-with-usb-cables/30:21 – Story # 5: Eurostar forces ‘password resets’ — then fails and locks users outhttps://www.bleepingcomputer.com/news/security/eurostar-forces-password-resets-then-fails-and-locks-users-out/33:37 – Story # 6: Hacker Uncovers How to Turn Traffic Lights Green With Flipper Zerohttps://www.thedrive.com/news/hacker-uncovers-how-to-turn-traffic-lights-green-with-flipper-zero39:30 – Story # 7: Namecheap denies system breach after email service used to spread phishing scamshttps://therecord.media/namecheap-denies-system-breach-after-email-service-used-to-spread-phishing-scams/43:11 – Story # 8: Official: Twitter will now charge for SMS two-factor authenticationhttps://www.theverge.com/2023/2/17/23605073/twitter-blue-charge-sms-2fa48:24 – Story # 9: Software suite of Israeli security firm Cellebrite leaks onlinehttps://www.cybersecurityconnect.com.au/commercial/8607-entire-software-suite-of-israeli-security-firm-cellebrite-leaks-online51:22 – Story # 10: The US Air Force may have shot down an Amateur Radio Pico Balloon over Canadahttps://www.rtl-sdr.com/the-us-airforce-may-have-shot-down-an-amateur-radio-pico-balloon-over-canada/55:48 – Story # 11: ChatGPT Is Ingesting Corporate Secretshttps://www.schneier.</itunes:summary>
      <itunes:subtitle>00:00 – PreShow Banter™ — Pop Tart Pizza04:15 – BHIS – Talkin’ Bout [infosec] News 2023-02-2005:39 – Story # 1: Employee data from a major cybersecurity firm posted for sale on a hacker forumhttps://twitter.com/FalconFeedsio/status/162686144278689382413:4</itunes:subtitle>
      <itunes:keywords>Infosec,Cybersecurity,news</itunes:keywords>
      <itunes:explicit>No</itunes:explicit>
      <podcast:chapters url="https://share.transistor.fm/s/3b38f2ec/chapters.json" type="application/json+chapters"/>
    </item>
    <item>
      <title>Talkin’ About Infosec News – 2/17/2023</title>
      <itunes:episode>1</itunes:episode>
      <podcast:episode>1</podcast:episode>
      <itunes:title>Talkin’ About Infosec News – 2/17/2023</itunes:title>
      <itunes:episodeType>full</itunes:episodeType>
      <guid isPermaLink="false">https://www.blackhillsinfosec.com/?p=25362</guid>
      <link>https://share.transistor.fm/s/6850663a</link>
      <description>
        <![CDATA[<p>00:00 – PreShow Banter™ — Scalping Valentine’s Day Reservations04:13 – BHIS – Talkin’ Bout [infosec] News 2023-06-2305:52 – Story # 1: 5 Chinese companies and a research institute blacklisted by […]</p>
<p>The post <a href="https://www.blackhillsinfosec.com/talkin-about-infosec-news-2-17-2023/">Talkin’ About Infosec News – 2/17/2023</a> appeared first on <a href="https://www.blackhillsinfosec.com">Black Hills Information Security</a>.</p>
<ul><li>(00:00) - PreShow Banter™ — Scalping Valentine's Day Reservations</li>
<li>(04:13) - BHIS - Talkin' Bout [infosec] News 2023-06-23</li>
<li>(05:52) - Story # 1: 5 Chinese companies and a research institute blacklisted by U.S. over spy balloon program</li>
<li>(12:00) - Story # 2: We had a security incident. Here’s what we know.</li>
<li>(15:19) - Ean Reports Live!</li>
<li>(21:44) - Story # 3: NameCheap's email hacked to send Metamask, DHL phishing emails</li>
<li>(26:49) - Story # 4: Top mobile finance app Money Lover has some worrying security flaws</li>
<li>(31:24) - Story # 5: Ukraine war: Elon Musk's SpaceX firm bars Kyiv from using Starlink tech for drone control</li>
<li>(36:58) - Story # 6: NATO websites hacked, including that of the Headquarters of Special Operations Forces</li>
<li>(38:58) - Story # 7: Khinshtein said that hackers acting in the interests of the Russian Federation should be released from liability</li>
<li>(40:52) - Story # 8 NIST Standardizes Ascon Cryptographic Algorithm for IoT and Other Lightweight Devices</li>
<li>(43:29) - Story # 9: Americans don't understand what companies can do with their personal data—and that's a problem</li>
<li>(45:15) - Story # 9b: AMERICANS CAN’T CONSENT TO COMPANIES’ USE OF THEIR DATA</li>
<li>(54:33) - Story # 10: Pentagon Staffers Found Installing Dating Apps, Games on Government Phones</li>
<li>(57:34) - Story # 10b: Management Advisory: The DoD’s Use of Mobile Applications (Report No. DODIG-2023-041)</li>
<li>(58:14) - Story # 11: When Facebook came for your battery, feudal security failed</li>
</ul>]]>
      </description>
      <content:encoded>
        <![CDATA[<p>00:00 – PreShow Banter™ — Scalping Valentine’s Day Reservations04:13 – BHIS – Talkin’ Bout [infosec] News 2023-06-2305:52 – Story # 1: 5 Chinese companies and a research institute blacklisted by […]</p>
<p>The post <a href="https://www.blackhillsinfosec.com/talkin-about-infosec-news-2-17-2023/">Talkin’ About Infosec News – 2/17/2023</a> appeared first on <a href="https://www.blackhillsinfosec.com">Black Hills Information Security</a>.</p>
<ul><li>(00:00) - PreShow Banter™ — Scalping Valentine's Day Reservations</li>
<li>(04:13) - BHIS - Talkin' Bout [infosec] News 2023-06-23</li>
<li>(05:52) - Story # 1: 5 Chinese companies and a research institute blacklisted by U.S. over spy balloon program</li>
<li>(12:00) - Story # 2: We had a security incident. Here’s what we know.</li>
<li>(15:19) - Ean Reports Live!</li>
<li>(21:44) - Story # 3: NameCheap's email hacked to send Metamask, DHL phishing emails</li>
<li>(26:49) - Story # 4: Top mobile finance app Money Lover has some worrying security flaws</li>
<li>(31:24) - Story # 5: Ukraine war: Elon Musk's SpaceX firm bars Kyiv from using Starlink tech for drone control</li>
<li>(36:58) - Story # 6: NATO websites hacked, including that of the Headquarters of Special Operations Forces</li>
<li>(38:58) - Story # 7: Khinshtein said that hackers acting in the interests of the Russian Federation should be released from liability</li>
<li>(40:52) - Story # 8 NIST Standardizes Ascon Cryptographic Algorithm for IoT and Other Lightweight Devices</li>
<li>(43:29) - Story # 9: Americans don't understand what companies can do with their personal data—and that's a problem</li>
<li>(45:15) - Story # 9b: AMERICANS CAN’T CONSENT TO COMPANIES’ USE OF THEIR DATA</li>
<li>(54:33) - Story # 10: Pentagon Staffers Found Installing Dating Apps, Games on Government Phones</li>
<li>(57:34) - Story # 10b: Management Advisory: The DoD’s Use of Mobile Applications (Report No. DODIG-2023-041)</li>
<li>(58:14) - Story # 11: When Facebook came for your battery, feudal security failed</li>
</ul>]]>
      </content:encoded>
      <pubDate>Fri, 17 Feb 2023 14:05:08 -0500</pubDate>
      <author>Black Hills Information Security</author>
      <enclosure url="https://media.transistor.fm/6850663a/89e63357.mp3" length="64437365" type="audio/mpeg"/>
      <itunes:author>Black Hills Information Security</itunes:author>
      <itunes:image href="https://img.transistorcdn.com/M-XP-b96fLrVrZ89y3H0iXd-9QAoSH-hr1GNO8qAIsc/rs:fill:0:0:1/w:1400/h:1400/q:60/mb:500000/aHR0cHM6Ly9pbWct/dXBsb2FkLXByb2R1/Y3Rpb24udHJhbnNp/c3Rvci5mbS8wNWYy/YjU4MjQ5OTg2YTk1/NzQ5ZDIzZmM3ZjUz/MDIyNS5qcGc.jpg"/>
      <itunes:duration>3835</itunes:duration>
      <itunes:summary>00:00 – PreShow Banter™ — Scalping Valentine’s Day Reservations04:13 – BHIS – Talkin’ Bout [infosec] News 2023-06-2305:52 – Story # 1: 5 Chinese companies and a research institute blacklisted by U.S. over spy balloon programhttps://www.cbsnews.com/news/us-blacklists-6-chinese-entities-over-spy-balloon-program/12:00 – Story # 2: We had a security incident. Here’s what we know.https://www.reddit.com/r/reddit/comments/10y427y/we_had_a_security_incident_heres_what_we_know/15:19 – Ean Reports Live!21:44 – Story # 3: NameCheap’s email hacked to send Metamask, DHL phishing emailshttps://www.bleepingcomputer.com/news/security/namecheaps-email-hacked-to-send-metamask-dhl-phishing-emails/26:49 – Story # 4: Top mobile finance app Money Lover has some worrying security flawshttps://www.techradar.com/news/top-mobile-finance-app-money-lover-has-some-worrying-security-flaws31:24 – Story # 5: Ukraine war: Elon Musk’s SpaceX firm bars Kyiv from using Starlink tech for drone controlhttps://www.bbc.com/news/world-europe-6457926736:58 – Story # 6: NATO websites hacked, including that of the Headquarters of Special Operations Forceshttps://euroweeklynews.com/2023/02/13/nato-websites-hacked-including-that-of-the-headquarters-of-special-operations-forces/38:58 – Story # 7: Khinshtein said that hackers acting in the interests of the Russian Federation should be released from liabilityhttps://tass-ru.translate.goog/obschestvo/17021313?_x_tr_sl=auto&amp;amp;_x_tr_tl=en&amp;amp;_x_tr_hl=en&amp;amp;_x_tr_pto=wapp40:52 – Story # 8 NIST Standardizes Ascon Cryptographic Algorithm for IoT and Other Lightweight Deviceshttps://thehackernews.com/2023/02/nist-standardizes-ascon-cryptographic.html43:29 – Story # 9: Americans don’t understand what companies can do with their personal data—and that’s a problemhttps://techxplore.com/news/2023-02-americans-dont-companies-personal-dataand.html45:15 – Story # 9b: AMERICANS CAN’T CONSENT TO COMPANIES’ USE OF THEIR DATAhttps://www.asc.upenn.edu/sites/default/files/2023-02/Americans_Can%27t_Consent.pdf54:33 – Story # 10: Pentagon Staffers Found Installing Dating Apps, Games on Government Phoneshttps://www.pcmag.com/news/pentagon-staffers-found-installing-dating-apps-games-on-government-phones5...</itunes:summary>
      <itunes:subtitle>00:00 – PreShow Banter™ — Scalping Valentine’s Day Reservations04:13 – BHIS – Talkin’ Bout [infosec] News 2023-06-2305:52 – Story # 1: 5 Chinese companies and a research institute blacklisted by U.S. over spy balloon programhttps://www.cbsnews.com/news/us</itunes:subtitle>
      <itunes:keywords>Infosec,Cybersecurity,news</itunes:keywords>
      <itunes:explicit>No</itunes:explicit>
      <podcast:chapters url="https://share.transistor.fm/s/6850663a/chapters.json" type="application/json+chapters"/>
    </item>
    <item>
      <title>Talkin’ About Infosec News – 2/13/2023</title>
      <itunes:episode>1</itunes:episode>
      <podcast:episode>1</podcast:episode>
      <itunes:title>Talkin’ About Infosec News – 2/13/2023</itunes:title>
      <itunes:episodeType>full</itunes:episodeType>
      <guid isPermaLink="false">https://www.blackhillsinfosec.com/?p=25311</guid>
      <link>https://share.transistor.fm/s/96030b22</link>
      <description>
        <![CDATA[<p>00:00 – PreShow Banter™ — We’ve got nothing to say03:07 – BHIS – Talkin’ Bout [infosec] News 2023-06-2305:56 – Story # 1: Cybercrime job ads on the dark web pay […]</p>
<p>The post <a href="https://www.blackhillsinfosec.com/talkin-about-infosec-news-2-13-2023/">Talkin’ About Infosec News – 2/13/2023</a> appeared first on <a href="https://www.blackhillsinfosec.com">Black Hills Information Security</a>.</p>
<ul><li>(00:00) - PreShow Banter™ — We've got nothing to say</li>
<li>(03:07) - BHIS - Talkin' Bout [infosec] News 2023-06-23</li>
<li>(05:56) - Story # 1: Cybercrime job ads on the dark web pay up to $20k per month</li>
<li>(10:52) - Story # 2: Discrepancies Discovered in Vulnerability Severity Ratings</li>
<li>(25:27) - Story # 3: GitHub Breach: Hackers Stole Code-Signing Certificates for GitHub Desktop and Atom</li>
<li>(28:48) - Story # 4: Ex-Ubiquiti worker pleads guilty to data theft, extortion, and smear plot</li>
<li>(34:47) - Story # 5: North Korean hackers stole research data in two-month-long breach</li>
<li>(42:19) - Story # 6: Hacker Group Releases 128GB Of Data Showing Russia's 'Wide-Ranging' Illegal Surveillance Of Citizens</li>
</ul>]]>
      </description>
      <content:encoded>
        <![CDATA[<p>00:00 – PreShow Banter™ — We’ve got nothing to say03:07 – BHIS – Talkin’ Bout [infosec] News 2023-06-2305:56 – Story # 1: Cybercrime job ads on the dark web pay […]</p>
<p>The post <a href="https://www.blackhillsinfosec.com/talkin-about-infosec-news-2-13-2023/">Talkin’ About Infosec News – 2/13/2023</a> appeared first on <a href="https://www.blackhillsinfosec.com">Black Hills Information Security</a>.</p>
<ul><li>(00:00) - PreShow Banter™ — We've got nothing to say</li>
<li>(03:07) - BHIS - Talkin' Bout [infosec] News 2023-06-23</li>
<li>(05:56) - Story # 1: Cybercrime job ads on the dark web pay up to $20k per month</li>
<li>(10:52) - Story # 2: Discrepancies Discovered in Vulnerability Severity Ratings</li>
<li>(25:27) - Story # 3: GitHub Breach: Hackers Stole Code-Signing Certificates for GitHub Desktop and Atom</li>
<li>(28:48) - Story # 4: Ex-Ubiquiti worker pleads guilty to data theft, extortion, and smear plot</li>
<li>(34:47) - Story # 5: North Korean hackers stole research data in two-month-long breach</li>
<li>(42:19) - Story # 6: Hacker Group Releases 128GB Of Data Showing Russia's 'Wide-Ranging' Illegal Surveillance Of Citizens</li>
</ul>]]>
      </content:encoded>
      <pubDate>Mon, 13 Feb 2023 12:09:01 -0500</pubDate>
      <author>Black Hills Information Security</author>
      <enclosure url="https://media.transistor.fm/96030b22/2dda0f44.mp3" length="60855156" type="audio/mpeg"/>
      <itunes:author>Black Hills Information Security</itunes:author>
      <itunes:image href="https://img.transistorcdn.com/k2V1DVX3xtWLNZ3lsxFKMqTwb0zLv1hNlO1jgXE6AR0/rs:fill:0:0:1/w:1400/h:1400/q:60/mb:500000/aHR0cHM6Ly9pbWct/dXBsb2FkLXByb2R1/Y3Rpb24udHJhbnNp/c3Rvci5mbS8zODhm/YTMwOTdhMWQ4MzMw/OWIwMDI5NDg4NWVm/YmExNS5qcGc.jpg"/>
      <itunes:duration>3675</itunes:duration>
      <itunes:summary>00:00 – PreShow Banter™ — We’ve got nothing to say03:07 – BHIS – Talkin’ Bout [infosec] News 2023-06-2305:56 – Story # 1: Cybercrime job ads on the dark web pay up to $20k per monthhttps://www.bleepingcomputer.com/news/security/cybercrime-job-ads-on-the-dark-web-pay-up-to-20k-per-month/10:52 – Story # 2: Discrepancies Discovered in Vulnerability Severity Ratingshttps://www.darkreading.com/application-security/discrepancies-discovered-in-vulnerability-severity-ratings25:27 – Story # 3: GitHub Breach: Hackers Stole Code-Signing Certificates for GitHub Desktop and Atomhttps://thehackernews.com/2023/01/github-breach-hackers-stole-code.html28:48 – Story # 4: Ex-Ubiquiti worker pleads guilty to data theft, extortion, and smear plothttps://www.bitdefender.com/blog/hotforsecurity/ex-ubiquiti-worker-pleads-guilty-to-data-theft-extortion-and-smear-plot/34:47 – Story # 5: North Korean hackers stole research data in two-month-long breachhttps://www.bleepingcomputer.com/news/security/north-korean-hackers-stole-research-data-in-two-month-long-breach/42:19 – Story # 6: Hacker Group Releases 128GB Of Data Showing Russia’s ‘Wide-Ranging’ Illegal Surveillance Of Citizenshttps://www.ibtimes.com/hacker-group-releases-128gb-data-showing-russias-wide-ranging-illegal-surveillance-citizens-3663530
















We are self-publishing free Infosec Zines called PROMPT#.  



PROMPT# will contain: 

Infosec articles 
Challenging puzzles 
Comic book based on real-life hacking adventures 
Coloring contests 
Bonus Backdoors &amp;amp; Breaches Consultant Cards (print version only) 
Other stuffs 

You can check out current and upcoming issues here: https://www.blackhillsinfosec.com/prompt-zine/ </itunes:summary>
      <itunes:subtitle>00:00 – PreShow Banter™ — We’ve got nothing to say03:07 – BHIS – Talkin’ Bout [infosec] News 2023-06-2305:56 – Story # 1: Cybercrime job ads on the dark web pay up to $20k per monthhttps://www.bleepingcomputer.com/news/security/cybercrime-job-ads-on-the-d</itunes:subtitle>
      <itunes:keywords>Infosec,Cybersecurity,news</itunes:keywords>
      <itunes:explicit>No</itunes:explicit>
      <podcast:chapters url="https://share.transistor.fm/s/96030b22/chapters.json" type="application/json+chapters"/>
    </item>
    <item>
      <title>Talkin’ About Infosec News – 2/3/2023</title>
      <itunes:episode>1</itunes:episode>
      <podcast:episode>1</podcast:episode>
      <itunes:title>Talkin’ About Infosec News – 2/3/2023</itunes:title>
      <itunes:episodeType>full</itunes:episodeType>
      <guid isPermaLink="false">https://www.blackhillsinfosec.com/?p=25095</guid>
      <link>https://share.transistor.fm/s/cbee79a8</link>
      <description>
        <![CDATA[<p>00:00 – PreShow Banter™ — Woke Up Like This03:20 – BHIS – Talkin’ Bout [infosec] News 2023-01-3005:04 – Story # 1: GoTo says hackers stole customers’ backups and encryption keyhttps://www.bleepingcomputer.com/news/security/goto-says-hackers-stole-customers-backups-and-encryption-key/09:48 […]</p>
<p>The post <a href="https://www.blackhillsinfosec.com/talkin-about-infosec-news-2-3-2023/">Talkin’ About Infosec News – 2/3/2023</a> appeared first on <a href="https://www.blackhillsinfosec.com">Black Hills Information Security</a>.</p>
<ul><li>(00:00) - PreShow Banter™ — Woke Up Like This</li>
<li>(03:20) - BHIS - Talkin' Bout [infosec] News 2023-01-30</li>
<li>(05:04) - Story # 1: GoTo says hackers stole customers' backups and encryption key</li>
<li>(09:48) - Story # 2: T-Mobile hacked to steal data of 37 million accounts in API data breach</li>
<li>(11:29) - Story # 3: Appliance makers sad that 50% of customers won’t connect smart appliances</li>
<li>(23:11) - Story # 4: More Ransomware Victims Are Refusing to Pay Hackers</li>
<li>(25:34) - Story # 5: DOJ, FBI hack Hive Network, save US$130 mln from crypto ransomware attacks</li>
<li>(27:27) - Story # 6: Ransomware gang steals data from KFC, Taco Bell, and Pizza Hut brand owner</li>
<li>(29:35) - Story # 7: Pet fish commits credit card fraud on owner using a Nintendo Switch</li>
<li>(34:15) - Story # 8: how to completely own an airline in 3 easy steps</li>
<li>(38:43) - Story # 9: Nearly 35,000 PayPal users had SSNs, tax info leaked during December cyberattack</li>
<li>(46:43) - Story # 10: The semiconductor monopoly: How one Dutch company has a stranglehold over the global chip industry</li>
<li>(55:59) - Story # 11: Swipe right on our new credit card tokens!</li>
</ul>]]>
      </description>
      <content:encoded>
        <![CDATA[<p>00:00 – PreShow Banter™ — Woke Up Like This03:20 – BHIS – Talkin’ Bout [infosec] News 2023-01-3005:04 – Story # 1: GoTo says hackers stole customers’ backups and encryption keyhttps://www.bleepingcomputer.com/news/security/goto-says-hackers-stole-customers-backups-and-encryption-key/09:48 […]</p>
<p>The post <a href="https://www.blackhillsinfosec.com/talkin-about-infosec-news-2-3-2023/">Talkin’ About Infosec News – 2/3/2023</a> appeared first on <a href="https://www.blackhillsinfosec.com">Black Hills Information Security</a>.</p>
<ul><li>(00:00) - PreShow Banter™ — Woke Up Like This</li>
<li>(03:20) - BHIS - Talkin' Bout [infosec] News 2023-01-30</li>
<li>(05:04) - Story # 1: GoTo says hackers stole customers' backups and encryption key</li>
<li>(09:48) - Story # 2: T-Mobile hacked to steal data of 37 million accounts in API data breach</li>
<li>(11:29) - Story # 3: Appliance makers sad that 50% of customers won’t connect smart appliances</li>
<li>(23:11) - Story # 4: More Ransomware Victims Are Refusing to Pay Hackers</li>
<li>(25:34) - Story # 5: DOJ, FBI hack Hive Network, save US$130 mln from crypto ransomware attacks</li>
<li>(27:27) - Story # 6: Ransomware gang steals data from KFC, Taco Bell, and Pizza Hut brand owner</li>
<li>(29:35) - Story # 7: Pet fish commits credit card fraud on owner using a Nintendo Switch</li>
<li>(34:15) - Story # 8: how to completely own an airline in 3 easy steps</li>
<li>(38:43) - Story # 9: Nearly 35,000 PayPal users had SSNs, tax info leaked during December cyberattack</li>
<li>(46:43) - Story # 10: The semiconductor monopoly: How one Dutch company has a stranglehold over the global chip industry</li>
<li>(55:59) - Story # 11: Swipe right on our new credit card tokens!</li>
</ul>]]>
      </content:encoded>
      <pubDate>Fri, 03 Feb 2023 17:09:20 -0500</pubDate>
      <author>Black Hills Information Security</author>
      <enclosure url="https://media.transistor.fm/cbee79a8/ea865fd7.mp3" length="61391299" type="audio/mpeg"/>
      <itunes:author>Black Hills Information Security</itunes:author>
      <itunes:image href="https://img.transistorcdn.com/wt28yT2sH47DXQoXtV_pbNcweABDgPnayveFmEvAOVU/rs:fill:0:0:1/w:1400/h:1400/q:60/mb:500000/aHR0cHM6Ly9pbWct/dXBsb2FkLXByb2R1/Y3Rpb24udHJhbnNp/c3Rvci5mbS9hNjIy/N2NlNDY2NGQyYTVi/OGI2MmFiMjc2Mzk4/ZWU4NS5qcGc.jpg"/>
      <itunes:duration>3655</itunes:duration>
      <itunes:summary>00:00 – PreShow Banter™ — Woke Up Like This03:20 – BHIS – Talkin’ Bout [infosec] News 2023-01-3005:04 – Story # 1: GoTo says hackers stole customers’ backups and encryption keyhttps://www.bleepingcomputer.com/news/security/goto-says-hackers-stole-customers-backups-and-encryption-key/09:48 – Story # 2: T-Mobile hacked to steal data of 37 million accounts in API data breachhttps://www.bleepingcomputer.com/news/security/t-mobile-hacked-to-steal-data-of-37-million-accounts-in-api-data-breach/11:29 – Story # 3: Appliance makers sad that 50% of customers won’t connect smart applianceshttps://arstechnica.com/gadgets/2023/01/half-of-smart-appliances-remain-disconnected-from-internet-makers-lament/23:11 – Story # 4: More Ransomware Victims Are Refusing to Pay Hackershttps://gizmodo.com/ransomware-hackers-blockchain-chainalysis-185000576425:34 – Story # 5: DOJ, FBI hack Hive Network, save US$130 mln from crypto ransomware attackshttps://forkast.news/headlines/doj-fbi-hack-hive-network-save-us130-mln-from-crypto-ransomware-attacks/27:27 – Story # 6: Ransomware gang steals data from KFC, Taco Bell, and Pizza Hut brand ownerhttps://www.bleepingcomputer.com/news/security/ransomware-gang-steals-data-from-kfc-taco-bell-and-pizza-hut-brand-owner/29:35 – Story # 7: Pet fish commits credit card fraud on owner using a Nintendo Switchhttps://www.techspot.com/news/97334-pet-fish-commits-credit-card-fraud-owner-using.html34:15 – Story # 8: How to completely own an airline in 3 easy stepshttps://maia.crimew.gay/posts/how-to-hack-an-airline/38:43 – Story # 9: Nearly 35,000 PayPal users had SSNs, tax info leaked during December cyberattackhttps://therecord.media/nearly-35000-paypal-users-had-ssns-tax-info-leaked-during-december-cyberattack/46:43 – Story # 10: The semiconductor monopoly: How one Dutch company has a stranglehold over the global chip industryhttps://www.firstpost.com/world/asml-holdings-dutch-company-that-has-monopoly-over-global-semiconductor-industry-12030422.html55:59 – Story # 11: Swipe right on our new credit card tokens!https://blog.thinkst.com/2023/01/swipe-right-on-our-new-credit-card-tokens.html</itunes:summary>
      <itunes:subtitle>00:00 – PreShow Banter™ — Woke Up Like This03:20 – BHIS – Talkin’ Bout [infosec] News 2023-01-3005:04 – Story # 1: GoTo says hackers stole customers’ backups and encryption keyhttps://www.bleepingcomputer.com/news/security/goto-says-hackers-stole-customer</itunes:subtitle>
      <itunes:keywords>Infosec,Cybersecurity,news</itunes:keywords>
      <itunes:explicit>No</itunes:explicit>
      <podcast:chapters url="https://share.transistor.fm/s/cbee79a8/chapters.json" type="application/json+chapters"/>
    </item>
    <item>
      <title>Talkin’ About Infosec News – 1/25/2023</title>
      <itunes:episode>1</itunes:episode>
      <podcast:episode>1</podcast:episode>
      <itunes:title>Talkin’ About Infosec News – 1/25/2023</itunes:title>
      <itunes:episodeType>full</itunes:episodeType>
      <guid isPermaLink="false">https://www.blackhillsinfosec.com/?p=25022</guid>
      <link>https://share.transistor.fm/s/f6f1f6f5</link>
      <description>
        <![CDATA[<p>00:00 – PreShow Banter™ — Wade’s Googly Eyes00:41 – BHIS – Talkin’ Bout [infosec] News 2023-01-2301:26 – Story # 1: BIG TECH LAYOFFS. LAYOFFS! DOOM! RECESSION!</p>
<p>The post <a href="https://www.blackhillsinfosec.com/talkin-about-infosec-news-1-25-2023/">Talkin’ About Infosec News – 1/25/2023</a> appeared first on <a href="https://www.blackhillsinfosec.com">Black Hills Information Security</a>.</p>
<ul><li>(00:00) - PreShow Banter™ — Wade's Googly Eyes</li>
<li>(00:41) - BHIS - Talkin' Bout [infosec] News 2023-01-23</li>
<li>(01:26) - Story # 1: BIG TECH LAYOFFS. LAYOFFS! DOOM! RECESSION!</li>
</ul>]]>
      </description>
      <content:encoded>
        <![CDATA[<p>00:00 – PreShow Banter™ — Wade’s Googly Eyes00:41 – BHIS – Talkin’ Bout [infosec] News 2023-01-2301:26 – Story # 1: BIG TECH LAYOFFS. LAYOFFS! DOOM! RECESSION!</p>
<p>The post <a href="https://www.blackhillsinfosec.com/talkin-about-infosec-news-1-25-2023/">Talkin’ About Infosec News – 1/25/2023</a> appeared first on <a href="https://www.blackhillsinfosec.com">Black Hills Information Security</a>.</p>
<ul><li>(00:00) - PreShow Banter™ — Wade's Googly Eyes</li>
<li>(00:41) - BHIS - Talkin' Bout [infosec] News 2023-01-23</li>
<li>(01:26) - Story # 1: BIG TECH LAYOFFS. LAYOFFS! DOOM! RECESSION!</li>
</ul>]]>
      </content:encoded>
      <pubDate>Wed, 25 Jan 2023 14:16:41 -0500</pubDate>
      <author>Black Hills Information Security</author>
      <enclosure url="https://media.transistor.fm/f6f1f6f5/3295869e.mp3" length="63925894" type="audio/mpeg"/>
      <itunes:author>Black Hills Information Security</itunes:author>
      <itunes:image href="https://img.transistorcdn.com/oEFqeQwOfDzwKTtvscKBz8-Jt_DMvoIh6hDp1-GTRz4/rs:fill:0:0:1/w:1400/h:1400/q:60/mb:500000/aHR0cHM6Ly9pbWct/dXBsb2FkLXByb2R1/Y3Rpb24udHJhbnNp/c3Rvci5mbS81MjI3/MjUwOTdkYjcwMWRi/NjU3N2E4Mzg2OTk1/NmFiNC5qcGc.jpg"/>
      <itunes:duration>3912</itunes:duration>
      <itunes:summary>00:00 – PreShow Banter™ — Wade’s Googly Eyes00:41 – BHIS – Talkin’ Bout [infosec] News 2023-01-2301:26 – Story # 1: BIG TECH LAYOFFS. LAYOFFS! DOOM! RECESSION!
















We are self-publishing free Infosec Zines called PROMPT#.  



PROMPT# will contain: 

Infosec articles 
Challenging puzzles 
Comic book based on real-life hacking adventures 
Coloring contests 
Bonus Backdoors &amp;amp; Breaches Consultant Cards (print version only) 
Other stuffs 

You can check out current and upcoming issues here: https://www.blackhillsinfosec.com/prompt-zine/ </itunes:summary>
      <itunes:subtitle>00:00 – PreShow Banter™ — Wade’s Googly Eyes00:41 – BHIS – Talkin’ Bout [infosec] News 2023-01-2301:26 – Story # 1: BIG TECH LAYOFFS. LAYOFFS! DOOM! RECESSION!
















We are self-publishing free Infosec Zines called PROMPT#.  



PROMPT# will con</itunes:subtitle>
      <itunes:keywords>Infosec,Cybersecurity,news</itunes:keywords>
      <itunes:explicit>No</itunes:explicit>
      <podcast:chapters url="https://share.transistor.fm/s/f6f1f6f5/chapters.json" type="application/json+chapters"/>
    </item>
    <item>
      <title>Talkin’ About Infosec News – 1/17/2023</title>
      <itunes:episode>1</itunes:episode>
      <podcast:episode>1</podcast:episode>
      <itunes:title>Talkin’ About Infosec News – 1/17/2023</itunes:title>
      <itunes:episodeType>full</itunes:episodeType>
      <guid isPermaLink="false">https://www.blackhillsinfosec.com/?p=24858</guid>
      <link>https://share.transistor.fm/s/8cc5027b</link>
      <description>
        <![CDATA[<p>00:00 – PreShow Banter™ — Ralph’s Guide to Satellite Bands 04:33 – BHIS – Talkin’ Bout [infosec] News 2023-01-16 05:25 – Story # 1: Microsoft’s new AI can simulate anyone’s […]</p>
<p>The post <a href="https://www.blackhillsinfosec.com/talkin-about-infosec-news-1-17-2023/">Talkin’ About Infosec News – 1/17/2023</a> appeared first on <a href="https://www.blackhillsinfosec.com">Black Hills Information Security</a>.</p>
<ul><li>(00:00) - PreShow Banter™ — Ralph’s Guide to Satellite Bands</li>
<li>(04:33) - BHIS - Talkin' Bout [infosec] News 2023-01-16</li>
<li>(05:25) - Story # 1: Microsoft’s new AI can simulate anyone’s voice with 3 seconds of audio</li>
<li>(13:29) - Story # 2: Russian Hackers Tried to Break Into the U.S.'s Top Nuclear Labs: Report</li>
<li>(16:42) - Story # 3: CircleCI breach post-mortem: Attackers got in by stealing engineer’s session cookie</li>
<li>(26:59) - Story # 4: How a single developer dropped AWS costs by 90%, then disappeared</li>
<li>(36:46) - Story # 5: A Widespread Logic Controller Flaw Raises the Specter of Stuxnet</li>
<li>(48:38) - Story # 6: Meta sues “scraping-for-hire” service that sells user data to law enforcement</li>
</ul>]]>
      </description>
      <content:encoded>
        <![CDATA[<p>00:00 – PreShow Banter™ — Ralph’s Guide to Satellite Bands 04:33 – BHIS – Talkin’ Bout [infosec] News 2023-01-16 05:25 – Story # 1: Microsoft’s new AI can simulate anyone’s […]</p>
<p>The post <a href="https://www.blackhillsinfosec.com/talkin-about-infosec-news-1-17-2023/">Talkin’ About Infosec News – 1/17/2023</a> appeared first on <a href="https://www.blackhillsinfosec.com">Black Hills Information Security</a>.</p>
<ul><li>(00:00) - PreShow Banter™ — Ralph’s Guide to Satellite Bands</li>
<li>(04:33) - BHIS - Talkin' Bout [infosec] News 2023-01-16</li>
<li>(05:25) - Story # 1: Microsoft’s new AI can simulate anyone’s voice with 3 seconds of audio</li>
<li>(13:29) - Story # 2: Russian Hackers Tried to Break Into the U.S.'s Top Nuclear Labs: Report</li>
<li>(16:42) - Story # 3: CircleCI breach post-mortem: Attackers got in by stealing engineer’s session cookie</li>
<li>(26:59) - Story # 4: How a single developer dropped AWS costs by 90%, then disappeared</li>
<li>(36:46) - Story # 5: A Widespread Logic Controller Flaw Raises the Specter of Stuxnet</li>
<li>(48:38) - Story # 6: Meta sues “scraping-for-hire” service that sells user data to law enforcement</li>
</ul>]]>
      </content:encoded>
      <pubDate>Tue, 17 Jan 2023 16:41:18 -0500</pubDate>
      <author>Black Hills Information Security</author>
      <enclosure url="https://media.transistor.fm/8cc5027b/fcbb1ae1.mp3" length="58071564" type="audio/mpeg"/>
      <itunes:author>Black Hills Information Security</itunes:author>
      <itunes:image href="https://img.transistorcdn.com/44MvVIhpgX9M2GIyTkl99z8vsqmAP_RYk0Fd4Hg-k90/rs:fill:0:0:1/w:1400/h:1400/q:60/mb:500000/aHR0cHM6Ly9pbWct/dXBsb2FkLXByb2R1/Y3Rpb24udHJhbnNp/c3Rvci5mbS8zYjkx/NzExZGM4MWYxODg3/ZDE3YmI3MGZmZTYz/YTM3Yy5qcGc.jpg"/>
      <itunes:duration>3494</itunes:duration>
      <itunes:summary>00:00 – PreShow Banter™ — Ralph’s Guide to Satellite Bands



04:33 – BHIS – Talkin’ Bout [infosec] News 2023-01-16



05:25 – Story # 1: Microsoft’s new AI can simulate anyone’s voice with 3 seconds of audio



https://arstechnica.com/information-technology/2023/01/microsofts-new-ai-can-simulate-anyones-voice-with-3-seconds-of-audio/



13:29 – Story # 2: Russian Hackers Tried to Break Into the U.S.’s Top Nuclear Labs: Report



https://www.vice.com/en/article/jgpz88/russian-hackers-tried-to-break-into-the-uss-top-nuclear-labs-report



16:42 – Story # 3: CircleCI breach post-mortem: Attackers got in by stealing engineer’s session cookie https://www.helpnetsecurity.com/2023/01/16/circleci-breach/



26:59 – Story # 4: How a single developer dropped AWS costs by 90%, then disappeared



https://bootcamp.uxdesign.cc/how-a-single-developer-dropped-aws-costs-by-90-then-disappeared-2b46a115103a



36:46 – Story # 5: A Widespread Logic Controller Flaw Raises the Specter of Stuxnet



https://www.wired.com/story/siemens-s7-1500-logic-controller-flaw/



48:38 – Story # 6: Meta sues “scraping-for-hire” service that sells user data to law enforcement



https://arstechnica.com/information-technology/2023/01/meta-sues-scraping-for-hire-service-that-sells-user-data-to-law-enforcement/</itunes:summary>
      <itunes:subtitle>00:00 – PreShow Banter™ — Ralph’s Guide to Satellite Bands



04:33 – BHIS – Talkin’ Bout [infosec] News 2023-01-16



05:25 – Story # 1: Microsoft’s new AI can simulate anyone’s voice with 3 seconds of audio



https://arstechnica.com/information-technol</itunes:subtitle>
      <itunes:keywords>Infosec,Cybersecurity,news</itunes:keywords>
      <itunes:explicit>No</itunes:explicit>
      <podcast:chapters url="https://share.transistor.fm/s/8cc5027b/chapters.json" type="application/json+chapters"/>
    </item>
    <item>
      <title>Talkin’ About Infosec News – 1/12/2023</title>
      <itunes:episode>1</itunes:episode>
      <podcast:episode>1</podcast:episode>
      <itunes:title>Talkin’ About Infosec News – 1/12/2023</itunes:title>
      <itunes:episodeType>full</itunes:episodeType>
      <guid isPermaLink="false">https://www.blackhillsinfosec.com/?p=24817</guid>
      <link>https://share.transistor.fm/s/a8e195a4</link>
      <description>
        <![CDATA[<p>00:00 – PreShow Banter™ — Twitch Airways International00:59 – BHIS – Talkin’ Bout [infosec] News 2023-01-1003:56 – Story # 1: How ChatGPT could become a hacker’s friendhttps://betanews.com/2023/01/05/how-chatgpt-could-become-a-hackers-friend/14:05 – Story # […]</p>
<p>The post <a href="https://www.blackhillsinfosec.com/talkin-about-infosec-news-1-12-2023/">Talkin’ About Infosec News – 1/12/2023</a> appeared first on <a href="https://www.blackhillsinfosec.com">Black Hills Information Security</a>.</p>
<ul><li>(00:00) - PreShow Banter™ — Twitch Airways International</li>
<li>(00:59) - BHIS - Talkin' Bout [infosec] News 2023-01-10</li>
<li>(03:56) - Story # 1: How ChatGPT could become a hacker's friend</li>
<li>(14:05) - Story # 2: Cybersecurity experts gaze into the 2023 crystal ball and see good, bad, ugly</li>
<li>(16:40) - Story # 3: Chick-Fil-A and other Breaches to snack on</li>
<li>(31:01) - Story # 4: Identity Thieves Bypassed Experian Security to View Credit Reports</li>
<li>(36:29) - Story # 5: CircleCI security alert: Rotate any secrets stored in CircleCI (Updated Jan 7)</li>
<li>(40:45) - Story # 6: Air France and KLM notify customers of account hacks</li>
<li>(43:27) - Story # 7: Guardian offices closed until 23 January due to ongoing fallout from suspected ransomware attack</li>
</ul>]]>
      </description>
      <content:encoded>
        <![CDATA[<p>00:00 – PreShow Banter™ — Twitch Airways International00:59 – BHIS – Talkin’ Bout [infosec] News 2023-01-1003:56 – Story # 1: How ChatGPT could become a hacker’s friendhttps://betanews.com/2023/01/05/how-chatgpt-could-become-a-hackers-friend/14:05 – Story # […]</p>
<p>The post <a href="https://www.blackhillsinfosec.com/talkin-about-infosec-news-1-12-2023/">Talkin’ About Infosec News – 1/12/2023</a> appeared first on <a href="https://www.blackhillsinfosec.com">Black Hills Information Security</a>.</p>
<ul><li>(00:00) - PreShow Banter™ — Twitch Airways International</li>
<li>(00:59) - BHIS - Talkin' Bout [infosec] News 2023-01-10</li>
<li>(03:56) - Story # 1: How ChatGPT could become a hacker's friend</li>
<li>(14:05) - Story # 2: Cybersecurity experts gaze into the 2023 crystal ball and see good, bad, ugly</li>
<li>(16:40) - Story # 3: Chick-Fil-A and other Breaches to snack on</li>
<li>(31:01) - Story # 4: Identity Thieves Bypassed Experian Security to View Credit Reports</li>
<li>(36:29) - Story # 5: CircleCI security alert: Rotate any secrets stored in CircleCI (Updated Jan 7)</li>
<li>(40:45) - Story # 6: Air France and KLM notify customers of account hacks</li>
<li>(43:27) - Story # 7: Guardian offices closed until 23 January due to ongoing fallout from suspected ransomware attack</li>
</ul>]]>
      </content:encoded>
      <pubDate>Thu, 12 Jan 2023 08:17:23 -0500</pubDate>
      <author>Black Hills Information Security</author>
      <enclosure url="https://media.transistor.fm/a8e195a4/b9722dae.mp3" length="52623023" type="audio/mpeg"/>
      <itunes:author>Black Hills Information Security</itunes:author>
      <itunes:image href="https://img.transistorcdn.com/M-FatJUOSYa5oAI6NOiZgnrVgtXEk9mWRksCcV0GLLU/rs:fill:0:0:1/w:1400/h:1400/q:60/mb:500000/aHR0cHM6Ly9pbWct/dXBsb2FkLXByb2R1/Y3Rpb24udHJhbnNp/c3Rvci5mbS84NjNi/NTliYjk0YWFhNDBk/MTU5MmFmYjNjMzQ4/MWM4ZC5qcGc.jpg"/>
      <itunes:duration>3144</itunes:duration>
      <itunes:summary>00:00 – PreShow Banter™ — Twitch Airways International00:59 – BHIS – Talkin’ Bout [infosec] News 2023-01-1003:56 – Story # 1: How ChatGPT could become a hacker’s friendhttps://betanews.com/2023/01/05/how-chatgpt-could-become-a-hackers-friend/14:05 – Story # 2: Cybersecurity experts gaze into the 2023 crystal ball and see good, bad, uglyhttps://armerding.medium.com/cybersecurity-experts-gaze-into-the-2023-crystal-ball-and-see-good-bad-ugly-b5f958b89b3116:40 – Story # 3: Chick-Fil-A and other Breaches to snack onhttps://www.bleepingcomputer.com/news/security/chick-fil-a-investigates-reports-of-hacked-customer-accounts/31:01 – Story # 4: Identity Thieves Bypassed Experian Security to View Credit Reportshttps://krebsonsecurity.com/2023/01/identity-thieves-bypassed-experian-security-to-view-credit-reports/36:29 – Story # 5: CircleCI security alert: Rotate any secrets stored in CircleCI (Updated Jan 7)https://circleci.com/blog/january-4-2023-security-alert/40:45 – Story # 6: Air France and KLM notify customers of account hackshttps://www.bleepingcomputer.com/news/security/air-france-and-klm-notify-customers-of-account-hacks/43:27 – Story # 7: Guardian offices closed until 23 January due to ongoing fallout from suspected ransomware attackhttps://pressgazette.co.uk/publishers/guardian-ransomware-attack/</itunes:summary>
      <itunes:subtitle>00:00 – PreShow Banter™ — Twitch Airways International00:59 – BHIS – Talkin’ Bout [infosec] News 2023-01-1003:56 – Story # 1: How ChatGPT could become a hacker’s friendhttps://betanews.com/2023/01/05/how-chatgpt-could-become-a-hackers-friend/14:05 – Story</itunes:subtitle>
      <itunes:keywords>Infosec,Cybersecurity,news</itunes:keywords>
      <itunes:explicit>No</itunes:explicit>
      <podcast:chapters url="https://share.transistor.fm/s/a8e195a4/chapters.json" type="application/json+chapters"/>
    </item>
    <item>
      <title>Talkin’ About Infosec News – 1/3/2023</title>
      <itunes:episode>1</itunes:episode>
      <podcast:episode>1</podcast:episode>
      <itunes:title>Talkin’ About Infosec News – 1/3/2023</itunes:title>
      <itunes:episodeType>full</itunes:episodeType>
      <guid isPermaLink="false">https://www.blackhillsinfosec.com/?p=24742</guid>
      <link>https://share.transistor.fm/s/acaaeb9a</link>
      <description>
        <![CDATA[<p>00:00 – PreShow Banter™ — Seven People00:51 – BHIS – Talkin’ Bout [infosec] News 2023-01-0201:37 – Story # 1: LastPass Admits to Severe Data Breach, Encrypted Password Vaults Stolenhttps://www.theverge.com/2022/12/28/23529547/lastpass-vault-breach-disclosure-encryption-cybersecurity-rebuttal32:22 – […]</p>
<p>The post <a href="https://www.blackhillsinfosec.com/talkin-about-infosec-news-1-3-2023/">Talkin’ About Infosec News – 1/3/2023</a> appeared first on <a href="https://www.blackhillsinfosec.com">Black Hills Information Security</a>.</p>
<ul><li>(00:00) - PreShow Banter™ — Seven People</li>
<li>(00:51) - BHIS - Talkin' Bout [infosec] News 2023-01-02</li>
<li>(01:37) - Story # 1: LastPass Admits to Severe Data Breach, Encrypted Password Vaults Stolen</li>
<li>(32:22) - Story # 2: Southwest Airlines’ post-Christmas meltdown thanks to ‘outdated IT’ systems, poor scheduling</li>
<li>(42:18) - Story # 3: McGraw Hill's S3 buckets exposed 100,000 students' grades</li>
<li>(47:59) - Story # 4: Okta confirms another breach after hackers steal source code</li>
</ul>]]>
      </description>
      <content:encoded>
        <![CDATA[<p>00:00 – PreShow Banter™ — Seven People00:51 – BHIS – Talkin’ Bout [infosec] News 2023-01-0201:37 – Story # 1: LastPass Admits to Severe Data Breach, Encrypted Password Vaults Stolenhttps://www.theverge.com/2022/12/28/23529547/lastpass-vault-breach-disclosure-encryption-cybersecurity-rebuttal32:22 – […]</p>
<p>The post <a href="https://www.blackhillsinfosec.com/talkin-about-infosec-news-1-3-2023/">Talkin’ About Infosec News – 1/3/2023</a> appeared first on <a href="https://www.blackhillsinfosec.com">Black Hills Information Security</a>.</p>
<ul><li>(00:00) - PreShow Banter™ — Seven People</li>
<li>(00:51) - BHIS - Talkin' Bout [infosec] News 2023-01-02</li>
<li>(01:37) - Story # 1: LastPass Admits to Severe Data Breach, Encrypted Password Vaults Stolen</li>
<li>(32:22) - Story # 2: Southwest Airlines’ post-Christmas meltdown thanks to ‘outdated IT’ systems, poor scheduling</li>
<li>(42:18) - Story # 3: McGraw Hill's S3 buckets exposed 100,000 students' grades</li>
<li>(47:59) - Story # 4: Okta confirms another breach after hackers steal source code</li>
</ul>]]>
      </content:encoded>
      <pubDate>Tue, 03 Jan 2023 15:17:06 -0500</pubDate>
      <author>Black Hills Information Security</author>
      <enclosure url="https://media.transistor.fm/acaaeb9a/3335699b.mp3" length="54945264" type="audio/mpeg"/>
      <itunes:author>Black Hills Information Security</itunes:author>
      <itunes:image href="https://img.transistorcdn.com/U2k1JK6sijjUb6kEQnUuPzEfdE8a5aM_03kO-lGakFA/rs:fill:0:0:1/w:1400/h:1400/q:60/mb:500000/aHR0cHM6Ly9pbWct/dXBsb2FkLXByb2R1/Y3Rpb24udHJhbnNp/c3Rvci5mbS80MDBl/NzkxZWEyYTUzNTcx/NGIyZDU1ZGIzNzBh/OWZlNy5qcGc.jpg"/>
      <itunes:duration>3300</itunes:duration>
      <itunes:summary>00:00 – PreShow Banter™ — Seven People00:51 – BHIS – Talkin’ Bout [infosec] News 2023-01-0201:37 – Story # 1: LastPass Admits to Severe Data Breach, Encrypted Password Vaults Stolenhttps://www.theverge.com/2022/12/28/23529547/lastpass-vault-breach-disclosure-encryption-cybersecurity-rebuttal32:22 – Story # 2: Southwest Airlines’ post-Christmas meltdown thanks to ‘outdated IT’ systems, poor schedulinghttps://www.nytimes.com/2022/12/31/opinion/southwest-airlines-computers.html42:18 – Story # 3: McGraw Hill’s S3 buckets exposed 100,000 students’ gradeshttps://www.theregister.com/2022/12/20/mcgraw_hills_s3_buckets_exposed/47:59 – Story # 4: Okta confirms another breach after hackers steal source codehttps://techcrunch.com/2022/12/22/okta-breach-source-code-github/
















We are self-publishing free Infosec Zines called PROMPT#.  



PROMPT# will contain: 

Infosec articles 
Challenging puzzles 
Comic book based on real-life hacking adventures 
Coloring contests 
Bonus Backdoors &amp;amp; Breaches Consultant Cards (print version only) 
Other stuffs 

You can check out current and upcoming issues here: https://www.blackhillsinfosec.com/prompt-zine/ </itunes:summary>
      <itunes:subtitle>00:00 – PreShow Banter™ — Seven People00:51 – BHIS – Talkin’ Bout [infosec] News 2023-01-0201:37 – Story # 1: LastPass Admits to Severe Data Breach, Encrypted Password Vaults Stolenhttps://www.theverge.com/2022/12/28/23529547/lastpass-vault-breach-disclos</itunes:subtitle>
      <itunes:keywords>Infosec,Cybersecurity,news</itunes:keywords>
      <itunes:explicit>No</itunes:explicit>
      <podcast:chapters url="https://share.transistor.fm/s/acaaeb9a/chapters.json" type="application/json+chapters"/>
    </item>
    <item>
      <title>Talkin’ About Infosec News – 12/21/2022</title>
      <itunes:episode>1</itunes:episode>
      <podcast:episode>1</podcast:episode>
      <itunes:title>Talkin’ About Infosec News – 12/21/2022</itunes:title>
      <itunes:episodeType>full</itunes:episodeType>
      <guid isPermaLink="false">https://www.blackhillsinfosec.com/?p=24544</guid>
      <link>https://share.transistor.fm/s/767cb93e</link>
      <description>
        <![CDATA[<p>00:00 – PreShow Banter™ — Talkin’ Bout [Elon] News00:51 – BHIS – Talkin’ Bout [infosec] News 2022-12-1902:46 – Story # 1: Antivirus and EDR solutions tricked into acting as data […]</p>
<p>The post <a href="https://www.blackhillsinfosec.com/talkin-about-infosec-news-12-21-2022/">Talkin’ About Infosec News – 12/21/2022</a> appeared first on <a href="https://www.blackhillsinfosec.com">Black Hills Information Security</a>.</p>
<ul><li>(00:00) - PreShow Banter™ — Talkin' Bout [Elon] News</li>
<li>(00:51) - BHIS - Talkin' Bout [infosec] News 2022-12-19</li>
<li>(02:46) - Story # 1 : Antivirus and EDR solutions tricked into acting as data wipers</li>
<li>(12:11) - Story # 2: Twitter suspends @ElonJet after Musk promises not to ban it</li>
<li>(12:48) - Story # 2b: Elon Musk starts banning critical journalists from Twitter</li>
<li>(14:37) - Story # 2c: Twitter abruptly bans all links to Instagram, Mastodon, and other competitors</li>
<li>(15:08) - Story # 2d: Elon Musk should step down as head of Twitter, says poll</li>
<li>(16:18) - Story # 2e: Your Car is Trackable by Law</li>
<li>(22:41) - Story # 2f: AirNav RadarBox FlightStick - ADS-B USB Receiver with Integrated Filter, Amplifier and ESD Protection</li>
<li>(26:41) - Story # 3: FBI’s Vetted Info Sharing Network ‘InfraGard’ Hacked</li>
<li>(32:24) - Story # 4: Reno mayor sues after finding tracking device on vehicle</li>
<li>(36:43) - Story # 5: Email hijackers scam food out of businesses, not just money</li>
<li>(42:46) - Story # 6: Bugs in LEGO Resale Site Allowed Hackers to Hijack Accounts</li>
<li>(45:41) - Story # 7: CISA Alert: Veeam Backup and Replication Vulnerabilities Being Exploited in Attacks</li>
<li>(50:05) - Story # 8: CISA researchers: Russia's Fancy Bear infiltrated US satellite network</li>
</ul>]]>
      </description>
      <content:encoded>
        <![CDATA[<p>00:00 – PreShow Banter™ — Talkin’ Bout [Elon] News00:51 – BHIS – Talkin’ Bout [infosec] News 2022-12-1902:46 – Story # 1: Antivirus and EDR solutions tricked into acting as data […]</p>
<p>The post <a href="https://www.blackhillsinfosec.com/talkin-about-infosec-news-12-21-2022/">Talkin’ About Infosec News – 12/21/2022</a> appeared first on <a href="https://www.blackhillsinfosec.com">Black Hills Information Security</a>.</p>
<ul><li>(00:00) - PreShow Banter™ — Talkin' Bout [Elon] News</li>
<li>(00:51) - BHIS - Talkin' Bout [infosec] News 2022-12-19</li>
<li>(02:46) - Story # 1 : Antivirus and EDR solutions tricked into acting as data wipers</li>
<li>(12:11) - Story # 2: Twitter suspends @ElonJet after Musk promises not to ban it</li>
<li>(12:48) - Story # 2b: Elon Musk starts banning critical journalists from Twitter</li>
<li>(14:37) - Story # 2c: Twitter abruptly bans all links to Instagram, Mastodon, and other competitors</li>
<li>(15:08) - Story # 2d: Elon Musk should step down as head of Twitter, says poll</li>
<li>(16:18) - Story # 2e: Your Car is Trackable by Law</li>
<li>(22:41) - Story # 2f: AirNav RadarBox FlightStick - ADS-B USB Receiver with Integrated Filter, Amplifier and ESD Protection</li>
<li>(26:41) - Story # 3: FBI’s Vetted Info Sharing Network ‘InfraGard’ Hacked</li>
<li>(32:24) - Story # 4: Reno mayor sues after finding tracking device on vehicle</li>
<li>(36:43) - Story # 5: Email hijackers scam food out of businesses, not just money</li>
<li>(42:46) - Story # 6: Bugs in LEGO Resale Site Allowed Hackers to Hijack Accounts</li>
<li>(45:41) - Story # 7: CISA Alert: Veeam Backup and Replication Vulnerabilities Being Exploited in Attacks</li>
<li>(50:05) - Story # 8: CISA researchers: Russia's Fancy Bear infiltrated US satellite network</li>
</ul>]]>
      </content:encoded>
      <pubDate>Wed, 21 Dec 2022 13:29:44 -0500</pubDate>
      <author>Black Hills Information Security</author>
      <enclosure url="https://media.transistor.fm/767cb93e/0b124e7e.mp3" length="59768418" type="audio/mpeg"/>
      <itunes:author>Black Hills Information Security</itunes:author>
      <itunes:image href="https://img.transistorcdn.com/A372VasLBIr9mHtDvW9IUFW-TsnCZhQ1sTmAHu_5_NA/rs:fill:0:0:1/w:1400/h:1400/q:60/mb:500000/aHR0cHM6Ly9pbWct/dXBsb2FkLXByb2R1/Y3Rpb24udHJhbnNp/c3Rvci5mbS80ZDAy/ZmM5YTgyMTUzYjc5/ZDk1NTMwYmYzYzQ3/NDczZC5qcGc.jpg"/>
      <itunes:duration>3539</itunes:duration>
      <itunes:summary>00:00 – PreShow Banter™ — Talkin’ Bout [Elon] News00:51 – BHIS – Talkin’ Bout [infosec] News 2022-12-1902:46 – Story # 1: Antivirus and EDR solutions tricked into acting as data wipershttps://www.bleepingcomputer.com/news/security/antivirus-and-edr-solutions-tricked-into-acting-as-data-wipers/12:11 – Story # 2: Twitter suspends @ElonJet after Musk promises not to ban ithttps://www.theverge.com/2022/12/14/23508898/elonjet-twitter-ban-elon-musk-jet-tracker12:48 – Story # 2b: Elon Musk starts banning critical journalists from Twitterhttps://www.theverge.com/2022/12/15/23512004/elon-musk-starts-banning-critical-journalists-from-twitter14:37 – Story # 2c: Twitter abruptly bans all links to Instagram, Mastodon, and other competitorshttps://www.theverge.com/2022/12/18/23515221/twitter-bans-links-instagram-mastodon-competitors15:08 – Story # 2d: Elon Musk should step down as head of Twitter, says pollhttps://www.theverge.com/2022/12/18/23515764/elon-musk-head-twit-poll-tesla-doxxing-moderation16:18 – Story # 2e: Your Car is Trackable by Lawhttps://medium.com/@doctoreww/day-2-your-car-is-trackable-by-law-1d5f7438885022:41 – Story # 2f: AirNav RadarBox FlightStick – ADS-B USB Receiver with Integrated Filter, Amplifier and ESD Protectionhttps://www.amazon.com/AirNav-RadarBox-FlightStick-Advanced-Receiver/dp/B07K47P7XD/26:41 – Story # 3: FBI’s Vetted Info-Sharing Network ‘InfraGard’ Hackedhttps://krebsonsecurity.com/2022/12/fbis-vetted-info-sharing-network-infragard-hacked/32:24 – Story # 4: Reno mayor sues after finding tracking device on vehiclehttps://apnews.com/article/lawsuits-reno-34940c636465c050f2e0ebd2d9d119af36:43 – Story # 5: Email hijackers scam food out of businesses, not just moneyhttps://www.theregister.com/2022/12/17/in_brief_security/42:46 – Story # 6: Bugs in LEGO Resale Site Allowed Hackers to Hijack Accountshttps://www.pcmag.com/news/bugs-in-lego-resale-site-allowed-hackers-to-hijack-accounts45:41 – Story # 7: CISA Alert: Veeam Backup and Replication Vulnerabilities Being Exploited in Attackshttps://www.cyberscoop.com/apt28-fancy-bear-satellite/50:05 – Story # 8: CISA researchers: Russia’s Fancy Bear infiltrated US satellite networkhttps://thehackernews.com/2022/12/cisa-alert-veeam-backup-and-replication.html
















We are self-publishing free Infosec Zines called PROMPT#.  



PROMPT# will contain: 

Infosec articles 
Challenging puzzles 
Comic book based on real-life hacking adventures 
Coloring contests 
Bonus Backdoors &amp;amp; Breaches Consultant Cards (print version only) 
Other stuffs 

You can check out current and upcoming issues here: https://www.blackhillsinfosec.com/prompt-zine/ </itunes:summary>
      <itunes:subtitle>00:00 – PreShow Banter™ — Talkin’ Bout [Elon] News00:51 – BHIS – Talkin’ Bout [infosec] News 2022-12-1902:46 – Story # 1: Antivirus and EDR solutions tricked into acting as data wipershttps://www.bleepingcomputer.com/news/security/antivirus-and-edr-soluti</itunes:subtitle>
      <itunes:keywords>Infosec,Cybersecurity,news</itunes:keywords>
      <itunes:explicit>No</itunes:explicit>
      <podcast:chapters url="https://share.transistor.fm/s/767cb93e/chapters.json" type="application/json+chapters"/>
    </item>
    <item>
      <title>Talkin’ About Infosec News – 12/15/2022</title>
      <itunes:episode>1</itunes:episode>
      <podcast:episode>1</podcast:episode>
      <itunes:title>Talkin’ About Infosec News – 12/15/2022</itunes:title>
      <itunes:episodeType>full</itunes:episodeType>
      <guid isPermaLink="false">https://www.blackhillsinfosec.com/?p=24477</guid>
      <link>https://share.transistor.fm/s/3e960316</link>
      <description>
        <![CDATA[<p>00:00 – PreShow Banter™ — Scissors Vs Paper00:15 – BHIS – Talkin’ Bout [infosec] News 2022-12-1202:12 – Story # 1: Rackspace confirms ransomware attack behind days-long email meltdownhttps://www.theregister.com/2022/12/06/rackspace_confirms_ransomware/07:56 – Story […]</p>
<p>The post <a href="https://www.blackhillsinfosec.com/talkin-about-infosec-news-12-15-2022/">Talkin’ About Infosec News – 12/15/2022</a> appeared first on <a href="https://www.blackhillsinfosec.com">Black Hills Information Security</a>.</p>
<ul><li>(00:00) - PreShow Banter™ — Scissors Vs Paper</li>
<li>(00:15) - BHIS - Talkin' Bout [infosec] News 2022-12-12</li>
<li>(02:12) - Story # 1: Rackspace confirms ransomware attack behind days-long email meltdown</li>
<li>(07:56) - Story # 1b: Rackspace Hit With Lawsuits Over Ransomware Attack</li>
<li>(09:13) - Story # 2: Uber suffers new data breach after attack on vendor, info leaked online</li>
<li>(13:18) - Story # 3: Apple Plans New Encryption System to Ward Off Hackers and Protect iCloud Data</li>
<li>(14:20) - Story # 3b: Apple Newsroom: Apple advances user security with powerful new data protections</li>
<li>(16:46) - Story # 3c: FBI Calls End-to-End Encryption 'Deeply Concerning' as Privacy Groups Hail Apple's Advanced Data Protection as a Victory for Users</li>
<li>(21:17) - Story # 3d: Learn more about iCloud in China mainland</li>
<li>(22:53) - Story # 3e: Apple Kills Its Plan to Scan Your Photos for CSAM. Here’s What’s Next</li>
<li>(25:02) - Story # 4: Pet Dog Unmasks Drug Trafficker on Encrypted Chat</li>
<li>(28:34) - Story # 4b: Operation Venetic: Pet dog and accidental selfies help convict international drugs traffickers</li>
<li>(30:06) - Story # 5: ChatGPT</li>
<li>(45:43) - Story # 6: San Francisco decides killer police robots aren’t such a great idea</li>
</ul>]]>
      </description>
      <content:encoded>
        <![CDATA[<p>00:00 – PreShow Banter™ — Scissors Vs Paper00:15 – BHIS – Talkin’ Bout [infosec] News 2022-12-1202:12 – Story # 1: Rackspace confirms ransomware attack behind days-long email meltdownhttps://www.theregister.com/2022/12/06/rackspace_confirms_ransomware/07:56 – Story […]</p>
<p>The post <a href="https://www.blackhillsinfosec.com/talkin-about-infosec-news-12-15-2022/">Talkin’ About Infosec News – 12/15/2022</a> appeared first on <a href="https://www.blackhillsinfosec.com">Black Hills Information Security</a>.</p>
<ul><li>(00:00) - PreShow Banter™ — Scissors Vs Paper</li>
<li>(00:15) - BHIS - Talkin' Bout [infosec] News 2022-12-12</li>
<li>(02:12) - Story # 1: Rackspace confirms ransomware attack behind days-long email meltdown</li>
<li>(07:56) - Story # 1b: Rackspace Hit With Lawsuits Over Ransomware Attack</li>
<li>(09:13) - Story # 2: Uber suffers new data breach after attack on vendor, info leaked online</li>
<li>(13:18) - Story # 3: Apple Plans New Encryption System to Ward Off Hackers and Protect iCloud Data</li>
<li>(14:20) - Story # 3b: Apple Newsroom: Apple advances user security with powerful new data protections</li>
<li>(16:46) - Story # 3c: FBI Calls End-to-End Encryption 'Deeply Concerning' as Privacy Groups Hail Apple's Advanced Data Protection as a Victory for Users</li>
<li>(21:17) - Story # 3d: Learn more about iCloud in China mainland</li>
<li>(22:53) - Story # 3e: Apple Kills Its Plan to Scan Your Photos for CSAM. Here’s What’s Next</li>
<li>(25:02) - Story # 4: Pet Dog Unmasks Drug Trafficker on Encrypted Chat</li>
<li>(28:34) - Story # 4b: Operation Venetic: Pet dog and accidental selfies help convict international drugs traffickers</li>
<li>(30:06) - Story # 5: ChatGPT</li>
<li>(45:43) - Story # 6: San Francisco decides killer police robots aren’t such a great idea</li>
</ul>]]>
      </content:encoded>
      <pubDate>Thu, 15 Dec 2022 10:49:39 -0500</pubDate>
      <author>Black Hills Information Security</author>
      <enclosure url="https://media.transistor.fm/3e960316/3d32ce5b.mp3" length="53283411" type="audio/mpeg"/>
      <itunes:author>Black Hills Information Security</itunes:author>
      <itunes:image href="https://img.transistorcdn.com/wKjtS-iKx_vdrTpHDU0o-_JpDe_ZF56WIFzs-AlzrLk/rs:fill:0:0:1/w:1400/h:1400/q:60/mb:500000/aHR0cHM6Ly9pbWct/dXBsb2FkLXByb2R1/Y3Rpb24udHJhbnNp/c3Rvci5mbS8xNWFk/ZDgxNTk1ZjU5NGRh/MWY3NzBhYTE1MTJm/ZGQxNC5qcGc.jpg"/>
      <itunes:duration>3147</itunes:duration>
      <itunes:summary>00:00 – PreShow Banter™ — Scissors Vs Paper00:15 – BHIS – Talkin’ Bout [infosec] News 2022-12-1202:12 – Story # 1: Rackspace confirms ransomware attack behind days-long email meltdownhttps://www.theregister.com/2022/12/06/rackspace_confirms_ransomware/07:56 – Story # 1b: Rackspace Hit With Lawsuits Over Ransomware Attackhttps://www.securityweek.com/rackspace-hit-lawsuits-over-ransomware-attack09:13 – Story # 2: Uber suffers new data breach after attack on vendor, info leaked onlinehttps://www.bleepingcomputer.com/news/security/uber-suffers-new-data-breach-after-attack-on-vendor-info-leaked-online/13:18 – Story # 3: Apple Plans New Encryption System to Ward Off Hackers and Protect iCloud Datahttps://www.wsj.com/articles/apple-plans-new-encryption-system-to-ward-off-hackers-and-protect-icloud-data-1167043563514:20 – Story # 3b: Apple Newsroom: Apple advances user security with powerful new data protectionshttps://www.apple.com/newsroom/2022/12/apple-advances-user-security-with-powerful-new-data-protections/16:46 – Story # 3c: FBI Calls End-to-End Encryption ‘Deeply Concerning’ as Privacy Groups Hail Apple’s Advanced Data Protection as a Victory for Usershttps://www.macrumors.com/2022/12/08/fbi-privacy-groups-icloud-encryption/21:17 – Story # 3d: Learn more about iCloud in China mainlandhttps://support.apple.com/en-us/HT20835122:53 – Story # 3e: Apple Kills Its Plan to Scan Your Photos for CSAM. Here’s What’s Nexthttps://www.wired.com/story/apple-photo-scanning-csam-communication-safety-messages/25:02 – Story # 4: Pet Dog Unmasks Drug Trafficker on Encrypted Chathttps://www.infosecurity-magazine.com/news/pet-dog-unmasks-drug-trafficker/28:34 – Story # 4b: Operation Venetic: Pet dog and accidental selfies help convict international drugs traffickershttps://www.nationalcrimeagency.gov.uk/news/operation-venetic-pet-dog-and-accidental-selfies-help-convict-international-drugs-traffickers30:06 – Story # 5: ChatGPT (No specific link)45:43 – Story # 6: San Francisco decides killer police robots aren’t such a great ideahttps://arstechnica.com/gadgets/2022/12/san-francisco-decides-killer-police-robots-arent-such-a-great-idea/</itunes:summary>
      <itunes:subtitle>00:00 – PreShow Banter™ — Scissors Vs Paper00:15 – BHIS – Talkin’ Bout [infosec] News 2022-12-1202:12 – Story # 1: Rackspace confirms ransomware attack behind days-long email meltdownhttps://www.theregister.com/2022/12/06/rackspace_confirms_ransomware/07:</itunes:subtitle>
      <itunes:keywords>Infosec,Cybersecurity,news</itunes:keywords>
      <itunes:explicit>No</itunes:explicit>
      <podcast:chapters url="https://share.transistor.fm/s/3e960316/chapters.json" type="application/json+chapters"/>
    </item>
    <item>
      <title>Talkin’ About Infosec News – 12/6/2022</title>
      <itunes:episode>1</itunes:episode>
      <podcast:episode>1</podcast:episode>
      <itunes:title>Talkin’ About Infosec News – 12/6/2022</itunes:title>
      <itunes:episodeType>full</itunes:episodeType>
      <guid isPermaLink="false">https://www.blackhillsinfosec.com/?p=24165</guid>
      <link>https://share.transistor.fm/s/88c3e8b4</link>
      <description>
        <![CDATA[<p>00:00 – PreShow Banter™ — Florida Bobsledding Team01:29 – PreShow Banter™ — Open AI Phishing Campaign05:17 – BHIS – Talkin’ Bout [infosec] News 2022-12-0507:53 – Story # 1: There are […]</p>
<p>The post <a href="https://www.blackhillsinfosec.com/talkin-about-infosec-news-12-6-2022/">Talkin’ About Infosec News – 12/6/2022</a> appeared first on <a href="https://www.blackhillsinfosec.com">Black Hills Information Security</a>.</p>
<ul><li>(00:00) - PreShow Banter™ — Florida Bobsleding Team</li>
<li>(01:29) - PreShow Banter™ — Open AI Phishing Campaign</li>
<li>(05:17) - BHIS - Talkin' Bout [infosec] News 2022-12-05</li>
<li>(07:53) - Story # 1: There are no episodes of Darknet Diaries scheduled Q1</li>
<li>(09:45) - Story # 2: Elon Musk Meets With Apple CEO Tim Cook Amid Claims of Twitter App Store Dispute</li>
<li>(14:46) - Story # 3: Anker's Eufy Cameras Caught Uploading Content to the Cloud Without User Consent</li>
<li>(23:20) - Story # 3b: Eufy caught lying about local-only security cameras with footage sent to cloud, accessible in unencrypted streams</li>
<li>(26:54) - Story # 4: FCC faces long road in stripping Chinese tech from US telecom networks</li>
<li>(34:19) - Story # 5: TikTok NSFW if you work for the South Dakota government</li>
<li>(37:40) - Story # 6: Never-before-seen malware is nuking data in Russia’s courts and mayors’ offices</li>
<li>(41:56) - Story # 7: Lessons from Russia’s cyber-war in Ukraine</li>
<li>(44:15) - Story # 8: DHS Cyber Safety Review Board to focus on Lapsus$ hackers</li>
<li>(49:49) - Story # 8b: Cyber Safety Review Board to Conduct Second Review on Lapsus$</li>
<li>(50:42) - Story # 9: Rackspace rocked by ‘security incident’ that has taken out hosted Exchange services</li>
<li>(57:05) - Story # 10: Red Alert: The SFPD Want the Power to Kill with Robots</li>
</ul>]]>
      </description>
      <content:encoded>
        <![CDATA[<p>00:00 – PreShow Banter™ — Florida Bobsledding Team01:29 – PreShow Banter™ — Open AI Phishing Campaign05:17 – BHIS – Talkin’ Bout [infosec] News 2022-12-0507:53 – Story # 1: There are […]</p>
<p>The post <a href="https://www.blackhillsinfosec.com/talkin-about-infosec-news-12-6-2022/">Talkin’ About Infosec News – 12/6/2022</a> appeared first on <a href="https://www.blackhillsinfosec.com">Black Hills Information Security</a>.</p>
<ul><li>(00:00) - PreShow Banter™ — Florida Bobsleding Team</li>
<li>(01:29) - PreShow Banter™ — Open AI Phishing Campaign</li>
<li>(05:17) - BHIS - Talkin' Bout [infosec] News 2022-12-05</li>
<li>(07:53) - Story # 1: There are no episodes of Darknet Diaries scheduled Q1</li>
<li>(09:45) - Story # 2: Elon Musk Meets With Apple CEO Tim Cook Amid Claims of Twitter App Store Dispute</li>
<li>(14:46) - Story # 3: Anker's Eufy Cameras Caught Uploading Content to the Cloud Without User Consent</li>
<li>(23:20) - Story # 3b: Eufy caught lying about local-only security cameras with footage sent to cloud, accessible in unencrypted streams</li>
<li>(26:54) - Story # 4: FCC faces long road in stripping Chinese tech from US telecom networks</li>
<li>(34:19) - Story # 5: TikTok NSFW if you work for the South Dakota government</li>
<li>(37:40) - Story # 6: Never-before-seen malware is nuking data in Russia’s courts and mayors’ offices</li>
<li>(41:56) - Story # 7: Lessons from Russia’s cyber-war in Ukraine</li>
<li>(44:15) - Story # 8: DHS Cyber Safety Review Board to focus on Lapsus$ hackers</li>
<li>(49:49) - Story # 8b: Cyber Safety Review Board to Conduct Second Review on Lapsus$</li>
<li>(50:42) - Story # 9: Rackspace rocked by ‘security incident’ that has taken out hosted Exchange services</li>
<li>(57:05) - Story # 10: Red Alert: The SFPD Want the Power to Kill with Robots</li>
</ul>]]>
      </content:encoded>
      <pubDate>Tue, 06 Dec 2022 15:48:33 -0500</pubDate>
      <author>Black Hills Information Security</author>
      <enclosure url="https://media.transistor.fm/88c3e8b4/e6bb0427.mp3" length="64073041" type="audio/mpeg"/>
      <itunes:author>Black Hills Information Security</itunes:author>
      <itunes:image href="https://img.transistorcdn.com/6rgY4jZF87UQ9RZsqujx1UbHs8IXWp2J5I0evkQIz1A/rs:fill:0:0:1/w:1400/h:1400/q:60/mb:500000/aHR0cHM6Ly9pbWct/dXBsb2FkLXByb2R1/Y3Rpb24udHJhbnNp/c3Rvci5mbS80ZDNl/ZWQ0MDViNGZjYjQ1/NjM5MzlhZWEzNDMy/YTRjYS5qcGc.jpg"/>
      <itunes:duration>3820</itunes:duration>
      <itunes:summary>00:00 – PreShow Banter™ — Florida Bobsledding Team01:29 – PreShow Banter™ — Open AI Phishing Campaign05:17 – BHIS – Talkin’ Bout [infosec] News 2022-12-0507:53 – Story # 1: There are no episodes of Darknet Diaries scheduled Q1https://twitter.com/JackRhysider/status/159911598426227097709:45 – Story # 2: Elon Musk Meets With Apple CEO Tim Cook Amid Claims of Twitter App Store Disputehttps://www.macrumors.com/2022/11/30/elon-musk-tim-cook-meeting-apple-park/14:46 – Story # 3: Anker’s Eufy Cameras Caught Uploading Content to the Cloud Without User Consenthttps://www.macrumors.com/2022/11/29/eufy-camera-cloud-uploads-no-user-consent/23:20 – Story # 3b: Eufy caught lying about local-only security cameras with footage sent to cloud, accessible in unencrypted streamshttps://9to5google.com/2022/12/01/eufy-camera-cloud-security-leak/26:54 – Story # 4: FCC faces long road in stripping Chinese tech from US telecom networkshttps://www.cyberscoop.com/fcc-huawei-zte-security-risks/34:19 – Story # 5: TikTok NSFW if you work for the South Dakota governmenthttps://www.theregister.com/2022/11/30/tiktok_nsfw_if_you_work/37:40 – Story # 6: Never-before-seen malware is nuking data in Russia’s courts and mayors’ officeshttps://arstechnica.com/information-technology/2022/12/never-before-seen-malware-is-nuking-data-in-russias-courts-and-mayors-offices/41:56 – Story # 7: Lessons from Russia’s cyber-war in Ukrainehttps://www.economist.com/science-and-technology/2022/11/30/lessons-from-russias-cyber-war-in-ukraine44:15 – Story # 8: DHS Cyber Safety Review Board to focus on Lapsus$ hackershttps://www.cyberscoop.com/cybersecurity-review-board-lapsus/49:49 – Story # 8b: Cyber Safety Review Board to Conduct Second Review on Lapsus$https://www.dhs.gov/news/2022/12/02/cyber-safety-review-board-conduct-second-review-lapsus50:42 – Story # 9: Rackspace rocked by ‘security incident’ that has taken out hosted Exchange serviceshttps://www.theregister.com/2022/12/03/rackspace_security_incident_hosted_exchange/57:05 – Story # 10: Red Alert: The SFPD Want the Power to Kill with Robotshttps://www.eff.org/deeplinks/2022/11/red-alert-sfpd-want-power-kill-robots</itunes:summary>
      <itunes:subtitle>00:00 – PreShow Banter™ — Florida Bobsledding Team01:29 – PreShow Banter™ — Open AI Phishing Campaign05:17 – BHIS – Talkin’ Bout [infosec] News 2022-12-0507:53 – Story # 1: There are no episodes of Darknet Diaries scheduled Q1https://twitter.com/JackRhysi</itunes:subtitle>
      <itunes:keywords>Infosec,Cybersecurity,news</itunes:keywords>
      <itunes:explicit>No</itunes:explicit>
      <podcast:chapters url="https://share.transistor.fm/s/88c3e8b4/chapters.json" type="application/json+chapters"/>
    </item>
    <item>
      <title>Talkin’ About Infosec News – 11/30/2022</title>
      <itunes:episode>1</itunes:episode>
      <podcast:episode>1</podcast:episode>
      <itunes:title>Talkin’ About Infosec News – 11/30/2022</itunes:title>
      <itunes:episodeType>full</itunes:episodeType>
      <guid isPermaLink="false">https://www.blackhillsinfosec.com/?p=23997</guid>
      <link>https://share.transistor.fm/s/b9592bb8</link>
      <description>
        <![CDATA[<p>00:00 – PreShow Banter™ — Inflatable Turkey00:15 – BHIS – Talkin’ Bout [infosec] News 2022-11-2802:34 – Story # 1: Musk recruits engineers for “Twitter 2.0”https://arstechnica.com/tech-policy/2022/11/musk-recruits-engineers-for-twitter-2-0-after-mass-layoffs-and-resignations/06:28 – Story # 2: Security […]</p>
<p>The post <a href="https://www.blackhillsinfosec.com/talkin-about-infosec-news-11-30-2022/">Talkin’ About Infosec News – 11/30/2022</a> appeared first on <a href="https://www.blackhillsinfosec.com">Black Hills Information Security</a>.</p>
<ul><li>(00:00) - PreShow Banter™ — Inflatable Turkey</li>
<li>(00:15) - BHIS - Talkin' Bout [infosec] News 2022-11-28</li>
<li>(02:34) - Story # 1: Musk recruits engineers for “Twitter 2.0”</li>
<li>(06:28) - Story # 2: Security experts are laying Mastodon's flaws bare</li>
<li>(15:01) - Story # 3: 5.4 million Twitter users' stolen data leaked online — more shared privately</li>
<li>(18:23) - Story # 4: 34 Russian Cybercrime Groups Stole Over 50 Million Passwords with Stealer Malware</li>
<li>(19:48) - Story # 5: Sonder confirms data breach, documents and other PII potentially compromised</li>
<li>(27:49) - Story # 6: Why Medibank should have paid the hackers</li>
<li>(30:43) - Story # 7: Hackers are locking out Mars Stealer operators from their own servers</li>
<li>(33:42) - Story # 8: Ransomware gang says it won’t attack AirAsia again due to the “chaotic organisation” and sloppy security of hacked airline’s network</li>
<li>(40:09) - Story # 9: Over 1,600 Docker Hub Repositories Were Found to Hide Malware</li>
<li>(46:25) - Story # 10: New Windows Server updates cause domain controller freezes, restarts</li>
<li>(53:39) - Story # 11: Making Cobalt Strike harder for threat actors to abuse</li>
</ul>]]>
      </description>
      <content:encoded>
        <![CDATA[<p>00:00 – PreShow Banter™ — Inflatable Turkey00:15 – BHIS – Talkin’ Bout [infosec] News 2022-11-2802:34 – Story # 1: Musk recruits engineers for “Twitter 2.0”https://arstechnica.com/tech-policy/2022/11/musk-recruits-engineers-for-twitter-2-0-after-mass-layoffs-and-resignations/06:28 – Story # 2: Security […]</p>
<p>The post <a href="https://www.blackhillsinfosec.com/talkin-about-infosec-news-11-30-2022/">Talkin’ About Infosec News – 11/30/2022</a> appeared first on <a href="https://www.blackhillsinfosec.com">Black Hills Information Security</a>.</p>
<ul><li>(00:00) - PreShow Banter™ — Inflatable Turkey</li>
<li>(00:15) - BHIS - Talkin' Bout [infosec] News 2022-11-28</li>
<li>(02:34) - Story # 1: Musk recruits engineers for “Twitter 2.0”</li>
<li>(06:28) - Story # 2: Security experts are laying Mastodon's flaws bare</li>
<li>(15:01) - Story # 3: 5.4 million Twitter users' stolen data leaked online — more shared privately</li>
<li>(18:23) - Story # 4: 34 Russian Cybercrime Groups Stole Over 50 Million Passwords with Stealer Malware</li>
<li>(19:48) - Story # 5: Sonder confirms data breach, documents and other PII potentially compromised</li>
<li>(27:49) - Story # 6: Why Medibank should have paid the hackers</li>
<li>(30:43) - Story # 7: Hackers are locking out Mars Stealer operators from their own servers</li>
<li>(33:42) - Story # 8: Ransomware gang says it won’t attack AirAsia again due to the “chaotic organisation” and sloppy security of hacked airline’s network</li>
<li>(40:09) - Story # 9: Over 1,600 Docker Hub Repositories Were Found to Hide Malware</li>
<li>(46:25) - Story # 10: New Windows Server updates cause domain controller freezes, restarts</li>
<li>(53:39) - Story # 11: Making Cobalt Strike harder for threat actors to abuse</li>
</ul>]]>
      </content:encoded>
      <pubDate>Wed, 30 Nov 2022 18:07:53 -0500</pubDate>
      <author>Black Hills Information Security</author>
      <enclosure url="https://media.transistor.fm/b9592bb8/86499734.mp3" length="61213584" type="audio/mpeg"/>
      <itunes:author>Black Hills Information Security</itunes:author>
      <itunes:image href="https://img.transistorcdn.com/klslWuvow4vZRh7RXrYLIhiTFqxSffANDmCnpWZeQME/rs:fill:0:0:1/w:1400/h:1400/q:60/mb:500000/aHR0cHM6Ly9pbWct/dXBsb2FkLXByb2R1/Y3Rpb24udHJhbnNp/c3Rvci5mbS8yZjAx/ZTRmNDM4YmQ0MzVl/ODk4MTM0OWIxNjZm/NDMyMC5qcGc.jpg"/>
      <itunes:duration>3665</itunes:duration>
      <itunes:summary>00:00 – PreShow Banter™ — Inflatable Turkey00:15 – BHIS – Talkin’ Bout [infosec] News 2022-11-2802:34 – Story # 1: Musk recruits engineers for “Twitter 2.0”https://arstechnica.com/tech-policy/2022/11/musk-recruits-engineers-for-twitter-2-0-after-mass-layoffs-and-resignations/06:28 – Story # 2: Security experts are laying Mastodon’s flaws barehttps://www.techradar.com/news/security-experts-are-laying-mastodons-flaws-bare15:01 – Story # 3: 5.4 million Twitter users’ stolen data leaked online — more shared privatelyhttps://www.bleepingcomputer.com/news/security/54-million-twitter-users-stolen-data-leaked-online-more-shared-privately/18:23 – Story # 4: 34 Russian Cybercrime Groups Stole Over 50 Million Passwords with Stealer Malwarehttps://thehackernews.com/2022/11/34-russian-hacker-groups-stole-over-50.html19:48 – Story # 5: Sonder confirms data breach, documents and other PII potentially compromisedhttps://www.infosecurity-magazine.com/news/sonder-confirms-data-breach/27:49 – Story # 6: Why Medibank should have paid the hackershttps://www.smh.com.au/business/consumer-affairs/this-is-a-business-for-them-why-medibank-should-have-paid-the-hackers-20221121-p5bzzn.html30:43 – Story # 7: Hackers are locking out Mars Stealer operators from their own servershttps://techcrunch.com/2022/11/22/mars-stealers-flaw-lock-out/33:42 – Story # 8: Ransomware gang says it won’t attack AirAsia again due to the “chaotic organisation” and sloppy security of hacked airline’s networkhttps://grahamcluley.com/ouch-ransomware-gang-says-it-wont-attack-airasia-again-due-to-the-chaotic-organisation-and-sloppy-security-of-hacked-companys-network/40:09 – Story # 9: Over 1,600 Docker Hub Repositories Were Found to Hide Malwarehttps://heimdalsecurity.com/blog/over-1600-docker-hub-repositories-were-found-to-hide-malware/46:25 – Story # 10: New Windows Server updates cause domain controller freezes, restartshttps://www.bleepingcomputer.com/news/microsoft/new-windows-server-updates-cause-domain-controller-freezes-restarts/53:39 – Story # 11: Making Cobalt Strike harder for threat actors to abusehttps://...</itunes:summary>
      <itunes:subtitle>00:00 – PreShow Banter™ — Inflatable Turkey00:15 – BHIS – Talkin’ Bout [infosec] News 2022-11-2802:34 – Story # 1: Musk recruits engineers for “Twitter 2.0”https://arstechnica.com/tech-policy/2022/11/musk-recruits-engineers-for-twitter-2-0-after-mass-layo</itunes:subtitle>
      <itunes:keywords>Infosec,Cybersecurity,news</itunes:keywords>
      <itunes:explicit>No</itunes:explicit>
      <podcast:chapters url="https://share.transistor.fm/s/b9592bb8/chapters.json" type="application/json+chapters"/>
    </item>
    <item>
      <title>Talkin’ About Infosec News – 11/16/2022</title>
      <itunes:episode>1</itunes:episode>
      <podcast:episode>1</podcast:episode>
      <itunes:title>Talkin’ About Infosec News – 11/16/2022</itunes:title>
      <itunes:episodeType>full</itunes:episodeType>
      <guid isPermaLink="false">https://www.blackhillsinfosec.com/?p=23565</guid>
      <link>https://share.transistor.fm/s/13298083</link>
      <description>
        <![CDATA[<p>00:00 – BHIS – Talkin’ Bout [infosec] News 2022-11-1402:26 – Story # 1: Hackers Dump Australian Health Records Online After Insurer Refuses to Pay Ransom– https://gizmodo.com/hackers-health-info-online-medibank-pay-onion-dark-web-184976074210:04 – Story # 2: TransUnion […]</p>
<p>The post <a href="https://www.blackhillsinfosec.com/talkin-about-infosec-news-11-16-2022/">Talkin’ About Infosec News – 11/16/2022</a> appeared first on <a href="https://www.blackhillsinfosec.com">Black Hills Information Security</a>.</p>
<ul><li>(00:00) - BHIS - Talkin' Bout [infosec] News 2022-11-14</li>
<li>(02:26) - Story # 1: Hackers Dump Australian Health Records Online After Insurer Refuses to Pay Ransom</li>
<li>(10:04) - Story # 2: TransUnion LLC Confirms Recent Data Breach with State Attorney General’s Office</li>
<li>(18:08) - Story # 3: Russian LockBit ransomware operator arrested in Canada</li>
<li>(22:58) - Story # 4: The downfall of FTX's Sam Bankman-Fried sends shockwaves through the crypto world</li>
<li>(32:10) - Story # 4b: Coinsec Podcast. coinsecpodcast.com</li>
<li>(40:23) - Story # 5: Install Latest Windows Update ASAP! Patches Issued for 6 Actively Exploited Zero-Days</li>
<li>(42:12) - Story # 6: Elon Musk is putting Twitter at risk of billions in fines, warns company lawyer</li>
<li>(51:12) - Story # 7: https://infosec.exchange/explore</li>
<li>(55:04) - Story # 8: Microsoft Windows Sysmon Elevation of Privilege Vulnerability</li>
<li>(55:30) - Story # 8b: https://twitter.com/filip_dragovic/status/1590104354727436290</li>
</ul>]]>
      </description>
      <content:encoded>
        <![CDATA[<p>00:00 – BHIS – Talkin’ Bout [infosec] News 2022-11-1402:26 – Story # 1: Hackers Dump Australian Health Records Online After Insurer Refuses to Pay Ransom– https://gizmodo.com/hackers-health-info-online-medibank-pay-onion-dark-web-184976074210:04 – Story # 2: TransUnion […]</p>
<p>The post <a href="https://www.blackhillsinfosec.com/talkin-about-infosec-news-11-16-2022/">Talkin’ About Infosec News – 11/16/2022</a> appeared first on <a href="https://www.blackhillsinfosec.com">Black Hills Information Security</a>.</p>
<ul><li>(00:00) - BHIS - Talkin' Bout [infosec] News 2022-11-14</li>
<li>(02:26) - Story # 1: Hackers Dump Australian Health Records Online After Insurer Refuses to Pay Ransom</li>
<li>(10:04) - Story # 2: TransUnion LLC Confirms Recent Data Breach with State Attorney General’s Office</li>
<li>(18:08) - Story # 3: Russian LockBit ransomware operator arrested in Canada</li>
<li>(22:58) - Story # 4: The downfall of FTX's Sam Bankman-Fried sends shockwaves through the crypto world</li>
<li>(32:10) - Story # 4b: Coinsec Podcast. coinsecpodcast.com</li>
<li>(40:23) - Story # 5: Install Latest Windows Update ASAP! Patches Issued for 6 Actively Exploited Zero-Days</li>
<li>(42:12) - Story # 6: Elon Musk is putting Twitter at risk of billions in fines, warns company lawyer</li>
<li>(51:12) - Story # 7: https://infosec.exchange/explore</li>
<li>(55:04) - Story # 8: Microsoft Windows Sysmon Elevation of Privilege Vulnerability</li>
<li>(55:30) - Story # 8b: https://twitter.com/filip_dragovic/status/1590104354727436290</li>
</ul>]]>
      </content:encoded>
      <pubDate>Wed, 16 Nov 2022 10:19:28 -0500</pubDate>
      <author>Black Hills Information Security</author>
      <enclosure url="https://media.transistor.fm/13298083/d12c0e0d.mp3" length="58073066" type="audio/mpeg"/>
      <itunes:author>Black Hills Information Security</itunes:author>
      <itunes:image href="https://img.transistorcdn.com/P8mHv1JJ-tRH76T6imZ61l3zdn0_mclO_yuK30_gN00/rs:fill:0:0:1/w:1400/h:1400/q:60/mb:500000/aHR0cHM6Ly9pbWct/dXBsb2FkLXByb2R1/Y3Rpb24udHJhbnNp/c3Rvci5mbS8zY2U0/ZmMzNGE2ZjA0OWYx/YmUyMjc4ZTZkOGYw/YTlmYS5qcGc.jpg"/>
      <itunes:duration>3474</itunes:duration>
      <itunes:summary>00:00 – BHIS – Talkin’ Bout [infosec] News 2022-11-1402:26 – Story # 1: Hackers Dump Australian Health Records Online After Insurer Refuses to Pay Ransom– https://gizmodo.com/hackers-health-info-online-medibank-pay-onion-dark-web-184976074210:04 – Story # 2: TransUnion LLC Confirms Recent Data Breach with State Attorney General’s Office– https://www.jdsupra.com/legalnews/transunion-llc-confirms-recent-data-6828319/18:08 – Story # 3: Russian LockBit ransomware operator arrested in Canada– https://www.bleepingcomputer.com/news/security/russian-lockbit-ransomware-operator-arrested-in-canada/22:58 – Story # 4: The downfall of FTX’s Sam Bankman-Fried sends shockwaves through the crypto world– https://www.npr.org/2022/11/14/1136482889/ftx-sam-bankman-fried-shockwaves-crypto32:10 – Story # 4b: Coinsec Podcast.– https://coinsecpodcast.com40:23 – Story # 5: Install Latest Windows Update ASAP! Patches Issued for 6 Actively Exploited Zero-Days– https://thehackernews.com/2022/11/install-latest-windows-update-asap.html42:12 – Story # 6: Elon Musk is putting Twitter at risk of billions in fines, warns company lawyer– https://www.theverge.com/2022/11/10/23451198/twitter-ftc-elon-musk-lawyer-changes-fine-warning51:12 – Story # 7: https://infosec.exchange/explore– https://infosec.exchange/explore55:04 – Story # 8: Microsoft Windows Sysmon Elevation of Privilege Vulnerability– https://msrc.microsoft.com/update-guide/vulnerability/CVE-2022-4112055:30 – Story # 8b: https://twitter.com/filip_dragovic/status/1590104354727436290https://twitter.com/filip_dragovic/status/1590104354727436290</itunes:summary>
      <itunes:subtitle>00:00 – BHIS – Talkin’ Bout [infosec] News 2022-11-1402:26 – Story # 1: Hackers Dump Australian Health Records Online After Insurer Refuses to Pay Ransom– https://gizmodo.com/hackers-health-info-online-medibank-pay-onion-dark-web-184976074210:04 – Story #</itunes:subtitle>
      <itunes:keywords>Infosec,Cybersecurity,news</itunes:keywords>
      <itunes:explicit>No</itunes:explicit>
      <podcast:chapters url="https://share.transistor.fm/s/13298083/chapters.json" type="application/json+chapters"/>
    </item>
    <item>
      <title>Talkin’ About Infosec News – 11/11/2022</title>
      <itunes:episode>1</itunes:episode>
      <podcast:episode>1</podcast:episode>
      <itunes:title>Talkin’ About Infosec News – 11/11/2022</itunes:title>
      <itunes:episodeType>full</itunes:episodeType>
      <guid isPermaLink="false">https://www.blackhillsinfosec.com/?p=23561</guid>
      <link>https://share.transistor.fm/s/97acd915</link>
      <description>
        <![CDATA[<p>00:00 – PreShow Banter™ — A is for All Team00:33 – BHIS – Talkin’ Bout [infosec] News 2022-11-0703:56 – Story # 1: Musk to cut half of Twitter jobs and […]</p>
<p>The post <a href="https://www.blackhillsinfosec.com/talkin-about-infosec-news-11-11-2022/">Talkin’ About Infosec News – 11/11/2022</a> appeared first on <a href="https://www.blackhillsinfosec.com">Black Hills Information Security</a>.</p>
<ul><li>(00:00) - PreShow Banter™ — A is for All Team</li>
<li>(00:33) - BHIS - Talkin' Bout [infosec] News 2022-11-07</li>
<li>(03:56) - Story # 1: Musk to cut half of Twitter jobs and end remote work for the rest, report says</li>
<li>(18:56) - Story # 2: Dropbox Data Breach Another Multifactor Fail</li>
<li>(19:43) - Story # 2b: Dropbox Breach: Hackers Unauthorizedly Accessed 130 GitHub Source Code Repositories</li>
<li>(24:24) - Story # 3: Hundreds of U.S. news sites push malware in supply-chain attack</li>
<li>(28:38) - Story # 4: New TikTok Privacy Policy Confirms Chinese Staff Can Access European Users' Data</li>
<li>(32:23) - Story # 5: A cyberattack blocked the trains in DenmarkSecurity Affairs</li>
<li>(40:52) - Story # 6: Facebook probably has your phone number, even if you never shared it. Now it has a secret tool to let you delete it.</li>
<li>(45:19) - Story # 7: China is likely stockpiling and deploying vulnerabilities, says Microsoft</li>
<li>(48:44) - Story # 8: Hackers selling access to 576 corporate networks for $4 million</li>
</ul>]]>
      </description>
      <content:encoded>
        <![CDATA[<p>00:00 – PreShow Banter™ — A is for All Team00:33 – BHIS – Talkin’ Bout [infosec] News 2022-11-0703:56 – Story # 1: Musk to cut half of Twitter jobs and […]</p>
<p>The post <a href="https://www.blackhillsinfosec.com/talkin-about-infosec-news-11-11-2022/">Talkin’ About Infosec News – 11/11/2022</a> appeared first on <a href="https://www.blackhillsinfosec.com">Black Hills Information Security</a>.</p>
<ul><li>(00:00) - PreShow Banter™ — A is for All Team</li>
<li>(00:33) - BHIS - Talkin' Bout [infosec] News 2022-11-07</li>
<li>(03:56) - Story # 1: Musk to cut half of Twitter jobs and end remote work for the rest, report says</li>
<li>(18:56) - Story # 2: Dropbox Data Breach Another Multifactor Fail</li>
<li>(19:43) - Story # 2b: Dropbox Breach: Hackers Unauthorizedly Accessed 130 GitHub Source Code Repositories</li>
<li>(24:24) - Story # 3: Hundreds of U.S. news sites push malware in supply-chain attack</li>
<li>(28:38) - Story # 4: New TikTok Privacy Policy Confirms Chinese Staff Can Access European Users' Data</li>
<li>(32:23) - Story # 5: A cyberattack blocked the trains in DenmarkSecurity Affairs</li>
<li>(40:52) - Story # 6: Facebook probably has your phone number, even if you never shared it. Now it has a secret tool to let you delete it.</li>
<li>(45:19) - Story # 7: China is likely stockpiling and deploying vulnerabilities, says Microsoft</li>
<li>(48:44) - Story # 8: Hackers selling access to 576 corporate networks for $4 million</li>
</ul>]]>
      </content:encoded>
      <pubDate>Fri, 11 Nov 2022 14:36:09 -0500</pubDate>
      <author>Black Hills Information Security</author>
      <enclosure url="https://media.transistor.fm/97acd915/feed9a94.mp3" length="55063399" type="audio/mpeg"/>
      <itunes:author>Black Hills Information Security</itunes:author>
      <itunes:image href="https://img.transistorcdn.com/E3ZgXy-j-Sun8_Az4wVOeCwTqh094hfGAIKvPVY0eRQ/rs:fill:0:0:1/w:1400/h:1400/q:60/mb:500000/aHR0cHM6Ly9pbWct/dXBsb2FkLXByb2R1/Y3Rpb24udHJhbnNp/c3Rvci5mbS9lYjc4/OTdkYTkzNGVjM2Qw/OTEzMjliYTEyZDk1/ZDc1Yi5qcGc.jpg"/>
      <itunes:duration>3290</itunes:duration>
      <itunes:summary>00:00 – PreShow Banter™ — A is for All Team00:33 – BHIS – Talkin’ Bout [infosec] News 2022-11-0703:56 – Story # 1: Musk to cut half of Twitter jobs and end remote work for the rest, report sayshttps://fortune.com/2022/11/06/twitter-trying-to-rehire-workers-elon-musk-fired-days-ago-sources-say/18:56 – Story # 2: Dropbox Data Breach Another Multifactor Failhttps://www.databreachtoday.com/dropbox-data-breach-another-multifactor-fail-a-2040619:43 – Story # 2b: Dropbox Breach: Hackers Unauthorizedly Accessed 130 GitHub Source Code Repositorieshttps://thehackernews.com/2022/11/dropbox-breach-hackers-unauthorizedly.html24:24 – Story # 3: Hundreds of U.S. news sites push malware in supply-chain attackhttps://www.bleepingcomputer.com/news/security/hundreds-of-us-news-sites-push-malware-in-supply-chain-attack/28:38 – Story # 4: New TikTok Privacy Policy Confirms Chinese Staff Can Access European Users’ Datahttps://thehackernews.com/2022/11/new-tiktok-privacy-policy-confirms.html32:23 – Story # 5: A cyberattack blocked the trains in DenmarkSecurity Affairshttps://securityaffairs.co/wordpress/138127/cyber-crime/cyberattack-blocked-trains-denmark.html40:52 – Story # 6: Facebook probably has your phone number, even if you never shared it. Now it has a secret tool to let you delete it.https://www.businessinsider.com/facebook-has-hidden-tool-to-delete-your-phone-number-email-2022-1045:19 – Story # 7: China is likely stockpiling and deploying vulnerabilities, says Microsofthttps://www.theregister.com/2022/11/07/china_stockpiles_vulnerabilities_microsoft_asserts/48:44 – Story # 8: Hackers selling access to 576 corporate networks for $4 millionhttps://www.bleepingcomputer.com/news/security/hackers-selling-access-to-576-corporate-networks-for-4-million/</itunes:summary>
      <itunes:subtitle>00:00 – PreShow Banter™ — A is for All Team00:33 – BHIS – Talkin’ Bout [infosec] News 2022-11-0703:56 – Story # 1: Musk to cut half of Twitter jobs and end remote work for the rest, report sayshttps://fortune.com/2022/11/06/twitter-trying-to-rehire-worker</itunes:subtitle>
      <itunes:keywords>Infosec,Cybersecurity,news</itunes:keywords>
      <itunes:explicit>No</itunes:explicit>
      <podcast:chapters url="https://share.transistor.fm/s/97acd915/chapters.json" type="application/json+chapters"/>
    </item>
    <item>
      <title>Talkin’ About Infosec News – 11/1/2022</title>
      <itunes:episode>1</itunes:episode>
      <podcast:episode>1</podcast:episode>
      <itunes:title>Talkin’ About Infosec News – 11/1/2022</itunes:title>
      <itunes:episodeType>full</itunes:episodeType>
      <guid isPermaLink="false">https://www.blackhillsinfosec.com/?p=23381</guid>
      <link>https://share.transistor.fm/s/f309f0f3</link>
      <description>
        <![CDATA[<p>00:00 – PreShow Banter™ — Spook Show00:58 – BHIS – Talkin’ Bout [infosec] News 2022-10-3104:00 – Story # 1: OpenSSL warns of critical security vulnerability with upcoming patch– https://www.zdnet.com/article/openssl-warns-of-critical-security-vulnerability-with-upcoming-patch/04:42 – Story […]</p>
<p>The post <a href="https://www.blackhillsinfosec.com/talkin-about-infosec-news-11-1-2022/">Talkin’ About Infosec News – 11/1/2022</a> appeared first on <a href="https://www.blackhillsinfosec.com">Black Hills Information Security</a>.</p>
<ul><li>(00:00) - PreShow Banter™ — Spook Show</li>
<li>(00:58) - BHIS - Talkin' Bout [infosec] News 2022-10-31</li>
<li>(04:00) - Story # 1: OpenSSL warns of critical security vulnerability with upcoming patch</li>
<li>(04:42) - Story # 1b: Notes on OpenSSL remote memory corruption</li>
<li>(12:28) - Story # 2: GitHub Bug Exposed Repositories to Hijacking</li>
<li>(16:20) - Story # 3: Gartner Identifies the Top 10 Strategic Technology Trends for 2023</li>
<li>(25:54) - Story # 4: Former U.K. Prime Minister Liz Truss’ Phone Allegedly Hacked By Kremlin Spies: Report</li>
<li>(34:45) - Story # 5: New Azov data wiper tries to frame researchers and BleepingComputer</li>
</ul>]]>
      </description>
      <content:encoded>
        <![CDATA[<p>00:00 – PreShow Banter™ — Spook Show00:58 – BHIS – Talkin’ Bout [infosec] News 2022-10-3104:00 – Story # 1: OpenSSL warns of critical security vulnerability with upcoming patch– https://www.zdnet.com/article/openssl-warns-of-critical-security-vulnerability-with-upcoming-patch/04:42 – Story […]</p>
<p>The post <a href="https://www.blackhillsinfosec.com/talkin-about-infosec-news-11-1-2022/">Talkin’ About Infosec News – 11/1/2022</a> appeared first on <a href="https://www.blackhillsinfosec.com">Black Hills Information Security</a>.</p>
<ul><li>(00:00) - PreShow Banter™ — Spook Show</li>
<li>(00:58) - BHIS - Talkin' Bout [infosec] News 2022-10-31</li>
<li>(04:00) - Story # 1: OpenSSL warns of critical security vulnerability with upcoming patch</li>
<li>(04:42) - Story # 1b: Notes on OpenSSL remote memory corruption</li>
<li>(12:28) - Story # 2: GitHub Bug Exposed Repositories to Hijacking</li>
<li>(16:20) - Story # 3: Gartner Identifies the Top 10 Strategic Technology Trends for 2023</li>
<li>(25:54) - Story # 4: Former U.K. Prime Minister Liz Truss’ Phone Allegedly Hacked By Kremlin Spies: Report</li>
<li>(34:45) - Story # 5: New Azov data wiper tries to frame researchers and BleepingComputer</li>
</ul>]]>
      </content:encoded>
      <pubDate>Tue, 01 Nov 2022 15:52:01 -0400</pubDate>
      <author>Black Hills Information Security</author>
      <enclosure url="https://media.transistor.fm/f309f0f3/ecf6a908.mp3" length="45310918" type="audio/mpeg"/>
      <itunes:author>Black Hills Information Security</itunes:author>
      <itunes:image href="https://img.transistorcdn.com/U6HE4WEAPs68a7Sc0Sx1wk80Dl4jE8dzTjp8wDNcPLo/rs:fill:0:0:1/w:1400/h:1400/q:60/mb:500000/aHR0cHM6Ly9pbWct/dXBsb2FkLXByb2R1/Y3Rpb24udHJhbnNp/c3Rvci5mbS80MjA1/ZjNkOGEwMGE3YWFj/ODBhOWFhMzA0Y2Ji/YTNkNy5qcGc.jpg"/>
      <itunes:duration>2703</itunes:duration>
      <itunes:summary>00:00 – PreShow Banter™ — Spook Show00:58 – BHIS – Talkin’ Bout [infosec] News 2022-10-3104:00 – Story # 1: OpenSSL warns of critical security vulnerability with upcoming patch– https://www.zdnet.com/article/openssl-warns-of-critical-security-vulnerability-with-upcoming-patch/04:42 – Story # 1b: Notes on OpenSSL remote memory corruption– https://guidovranken.com/2022/06/27/notes-on-openssl-remote-memory-corruption/12:28 – Story # 2: GitHub Bug Exposed Repositories to Hijacking– https://www.infosecurity-magazine.com/news/github-bug-hackers-hijack/16:20 – Story # 3: Gartner Identifies the Top 10 Strategic Technology Trends for 2023– https://www.gartner.com/en/newsroom/press-releases/2022-10-17-gartner-identifies-the-top-10-strategic-technology-trends-for-202325:54 – Story # 4: Former U.K. Prime Minister Liz Truss’ Phone Allegedly Hacked By Kremlin Spies: Report– https://www.forbes.com/sites/daveywinder/2022/10/30/former-uk-prime-minister-liz-trusss-phone-allegedly-hacked-by-kremlin-spies-report/34:45 – Story # 5: New Azov data wiper tries to frame researchers and BleepingComputer– https://www.bleepingcomputer.com/news/security/new-azov-data-wiper-tries-to-frame-researchers-and-bleepingcomputer/
















We are self-publishing free Infosec Zines called PROMPT#.  



PROMPT# will contain: 

Infosec articles 
Challenging puzzles 
Comic book based on real-life hacking adventures 
Coloring contests 
Bonus Backdoors &amp;amp; Breaches Consultant Cards (print version only) 
Other stuffs 

You can check out current and upcoming issues here: https://www.blackhillsinfosec.com/prompt-zine/ </itunes:summary>
      <itunes:subtitle>00:00 – PreShow Banter™ — Spook Show00:58 – BHIS – Talkin’ Bout [infosec] News 2022-10-3104:00 – Story # 1: OpenSSL warns of critical security vulnerability with upcoming patch– https://www.zdnet.com/article/openssl-warns-of-critical-security-vulnerabilit</itunes:subtitle>
      <itunes:keywords>Infosec,Cybersecurity,news</itunes:keywords>
      <itunes:explicit>No</itunes:explicit>
      <podcast:chapters url="https://share.transistor.fm/s/f309f0f3/chapters.json" type="application/json+chapters"/>
    </item>
    <item>
      <title>Talkin’ About Infosec News – 10/17/2022</title>
      <itunes:episode>1</itunes:episode>
      <podcast:episode>1</podcast:episode>
      <itunes:title>Talkin’ About Infosec News – 10/17/2022</itunes:title>
      <itunes:episodeType>full</itunes:episodeType>
      <guid isPermaLink="false">https://www.blackhillsinfosec.com/?p=23122</guid>
      <link>https://share.transistor.fm/s/5105f605</link>
      <description>
        <![CDATA[<p>00:00 – PreShow Banter™ — Best WWHF Ever!00:31 – BHIS – Talkin’ Bout [infosec] News 2022-10-1704:55 – Story # 1: The Verge: Cybersecurity Week 2022– https://www.theverge.com/23365380/cybersecurity-week-series-phishing-encryption-device-security07:02 – Story # 2: Google […]</p>
<p>The post <a href="https://www.blackhillsinfosec.com/talkin-about-infosec-news-10-17-2022-2/">Talkin’ About Infosec News – 10/17/2022</a> appeared first on <a href="https://www.blackhillsinfosec.com">Black Hills Information Security</a>.</p>
<ul><li>(00:00) - PreShow Banter™ — Best WWHF Ever!</li>
<li>(00:31) - BHIS - Talkin' Bout [infosec] News 2022-10-17</li>
<li>(04:55) - Story # 1: The Verge: Cybersecurity Week 2022</li>
<li>(07:02) - Story # 2: Google Cybersecurity Action Team Threat Horizons Report #4 Is Out!</li>
<li>(23:34) - Story # 3: Caffeine service lets anyone launch Microsoft 365 phishing attacks</li>
<li>(28:05) - Story # 4: AirTags in Checked Baggage</li>
<li>(31:55) - Story # 5: International crackdown on West-African financial crime rings</li>
<li>(36:50) - Story # 6: Indian Energy Company Tata Power's IT Infrastructure Hit By Cyber Attack</li>
<li>(38:17) - Story # 6b: This Is How They Tell Me the World Ends: The Cyberweapons Arms Race</li>
<li>(56:08) - Story # 6c: Brave New War: The Next Stage of Terrorism and the End of Globalization </li>
<li>(58:18) - Bear Vs Bear Breaking News</li>
</ul>]]>
      </description>
      <content:encoded>
        <![CDATA[<p>00:00 – PreShow Banter™ — Best WWHF Ever!00:31 – BHIS – Talkin’ Bout [infosec] News 2022-10-1704:55 – Story # 1: The Verge: Cybersecurity Week 2022– https://www.theverge.com/23365380/cybersecurity-week-series-phishing-encryption-device-security07:02 – Story # 2: Google […]</p>
<p>The post <a href="https://www.blackhillsinfosec.com/talkin-about-infosec-news-10-17-2022-2/">Talkin’ About Infosec News – 10/17/2022</a> appeared first on <a href="https://www.blackhillsinfosec.com">Black Hills Information Security</a>.</p>
<ul><li>(00:00) - PreShow Banter™ — Best WWHF Ever!</li>
<li>(00:31) - BHIS - Talkin' Bout [infosec] News 2022-10-17</li>
<li>(04:55) - Story # 1: The Verge: Cybersecurity Week 2022</li>
<li>(07:02) - Story # 2: Google Cybersecurity Action Team Threat Horizons Report #4 Is Out!</li>
<li>(23:34) - Story # 3: Caffeine service lets anyone launch Microsoft 365 phishing attacks</li>
<li>(28:05) - Story # 4: AirTags in Checked Baggage</li>
<li>(31:55) - Story # 5: International crackdown on West-African financial crime rings</li>
<li>(36:50) - Story # 6: Indian Energy Company Tata Power's IT Infrastructure Hit By Cyber Attack</li>
<li>(38:17) - Story # 6b: This Is How They Tell Me the World Ends: The Cyberweapons Arms Race</li>
<li>(56:08) - Story # 6c: Brave New War: The Next Stage of Terrorism and the End of Globalization </li>
<li>(58:18) - Bear Vs Bear Breaking News</li>
</ul>]]>
      </content:encoded>
      <pubDate>Thu, 20 Oct 2022 14:11:16 -0400</pubDate>
      <author>Black Hills Information Security</author>
      <enclosure url="https://media.transistor.fm/5105f605/9b6fe169.mp3" length="60828957" type="audio/mpeg"/>
      <itunes:author>Black Hills Information Security</itunes:author>
      <itunes:image href="https://img.transistorcdn.com/Dd_OaaDcUMs4tMcajasFvDd8Do7QX8EqjjaO8Ag7F6g/rs:fill:0:0:1/w:1400/h:1400/q:60/mb:500000/aHR0cHM6Ly9pbWct/dXBsb2FkLXByb2R1/Y3Rpb24udHJhbnNp/c3Rvci5mbS8yMmI1/ZDQzODY5M2EzODUz/Y2ZkMmExYmY0OGYy/MmI5Zi5qcGc.jpg"/>
      <itunes:duration>3646</itunes:duration>
      <itunes:summary>00:00 – PreShow Banter™ — Best WWHF Ever!00:31 – BHIS – Talkin’ Bout [infosec] News 2022-10-1704:55 – Story # 1: The Verge: Cybersecurity Week 2022– https://www.theverge.com/23365380/cybersecurity-week-series-phishing-encryption-device-security07:02 – Story # 2: Google Cybersecurity Action Team Threat Horizons Report #4 Is Out!– https://medium.com/anton-on-security/google-cybersecurity-action-team-threat-horizons-report-4-is-out-c221342004c323:34 – Story # 3: Caffeine service lets anyone launch Microsoft 365 phishing attacks– https://www.bleepingcomputer.com/news/security/caffeine-service-lets-anyone-launch-microsoft-365-phishing-attacks/28:05 – Story # 4: AirTags in Checked Baggage– https://daringfireball.net/linked/2022/10/10/airtags-checked-baggage31:55 – Story # 5: International crackdown on West-African financial crime rings– https://www.interpol.int/en/News-and-Events/News/2022/International-crackdown-on-West-African-financial-crime-rings36:50 – Story # 6: Indian Energy Company Tata Power’s IT Infrastructure Hit By Cyber Attack– https://thehackernews.com/2022/10/indian-energy-company-tata-powers-it.html38:17 – Story # 6b: This Is How They Tell Me the World Ends: The Cyberweapons Arms Race– https://www.amazon.com/This-They-Tell-World-Ends/dp/163557605956:08 – Story # 6c: Brave New War: The Next Stage of Terrorism and the End of Globalization– https://www.amazon.com/Brave-New-War-Terrorism-Globalization/dp/0471780790/58:18 – Bear Vs Bear Breaking News– https://www.blackhillsinfosec.com/rekcah/bear-vs-bear/
















We are self-publishing free Infosec Zines called PROMPT#.  



PROMPT# will contain: 

Infosec articles 
Challenging puzzles 
Comic book based on real-life hacking adventures 
Coloring contests 
Bonus Backdoors &amp;amp; Breaches Consultant Cards (print version only) 
Other stuffs 

You can check out current and upcoming issues here: https://www.blackhillsinfosec.com/prompt-zine/ </itunes:summary>
      <itunes:subtitle>00:00 – PreShow Banter™ — Best WWHF Ever!00:31 – BHIS – Talkin’ Bout [infosec] News 2022-10-1704:55 – Story # 1: The Verge: Cybersecurity Week 2022– https://www.theverge.com/23365380/cybersecurity-week-series-phishing-encryption-device-security07:02 – Sto</itunes:subtitle>
      <itunes:keywords>Infosec,Cybersecurity,news</itunes:keywords>
      <itunes:explicit>No</itunes:explicit>
      <podcast:chapters url="https://share.transistor.fm/s/5105f605/chapters.json" type="application/json+chapters"/>
    </item>
    <item>
      <title>Talkin’ About Infosec News – 10/17/2022</title>
      <itunes:episode>1</itunes:episode>
      <podcast:episode>1</podcast:episode>
      <itunes:title>Talkin’ About Infosec News – 10/17/2022</itunes:title>
      <itunes:episodeType>full</itunes:episodeType>
      <guid isPermaLink="false">https://www.blackhillsinfosec.com/?p=23119</guid>
      <link>https://share.transistor.fm/s/c99031c4</link>
      <description>
        <![CDATA[<p>00:00 – PreShow Banter™ — Dumpster Fire Friends03:07 – PreShow Banter™ — WHHF Deadwood – https://wildwesthackinfest.com/deadwood/ 03:48 – BHIS – Talkin’ Bout [infosec] News 2022-10-0307:37 – Story # 1: High-severity […]</p>
<p>The post <a href="https://www.blackhillsinfosec.com/talkin-about-infosec-news-10-17-2022/">Talkin’ About Infosec News – 10/17/2022</a> appeared first on <a href="https://www.blackhillsinfosec.com">Black Hills Information Security</a>.</p>
<ul><li>(00:00) - PreShow Banter™ — Dumpster Fire Friends</li>
<li>(03:07) - PreShow Banter™ — WHHF Deadwood</li>
<li>(03:48) - BHIS - Talkin’ Bout [infosec] News 2022-10-03</li>
<li>(07:37) - Story # 1: High-severity Microsoft Exchange 0-day under attack threatens 220,000 servers</li>
<li>(19:30) - Story # 2: Stealthy hackers target military and weapons contractors in recent attack</li>
<li>(25:52) - Story # 3: Putin grants Russian citizenship to Edward Snowden</li>
<li>(29:09) - Story # 4: What the Securing Open Source Software Act does and what it misses</li>
<li>(38:17) - Story # 4b: SecBSD Team</li>
<li>(40:43) - Story # 5: New Malware Campaign Targeting Job Seekers with Cobalt Strike Beacons</li>
</ul>]]>
      </description>
      <content:encoded>
        <![CDATA[<p>00:00 – PreShow Banter™ — Dumpster Fire Friends03:07 – PreShow Banter™ — WHHF Deadwood – https://wildwesthackinfest.com/deadwood/ 03:48 – BHIS – Talkin’ Bout [infosec] News 2022-10-0307:37 – Story # 1: High-severity […]</p>
<p>The post <a href="https://www.blackhillsinfosec.com/talkin-about-infosec-news-10-17-2022/">Talkin’ About Infosec News – 10/17/2022</a> appeared first on <a href="https://www.blackhillsinfosec.com">Black Hills Information Security</a>.</p>
<ul><li>(00:00) - PreShow Banter™ — Dumpster Fire Friends</li>
<li>(03:07) - PreShow Banter™ — WHHF Deadwood</li>
<li>(03:48) - BHIS - Talkin’ Bout [infosec] News 2022-10-03</li>
<li>(07:37) - Story # 1: High-severity Microsoft Exchange 0-day under attack threatens 220,000 servers</li>
<li>(19:30) - Story # 2: Stealthy hackers target military and weapons contractors in recent attack</li>
<li>(25:52) - Story # 3: Putin grants Russian citizenship to Edward Snowden</li>
<li>(29:09) - Story # 4: What the Securing Open Source Software Act does and what it misses</li>
<li>(38:17) - Story # 4b: SecBSD Team</li>
<li>(40:43) - Story # 5: New Malware Campaign Targeting Job Seekers with Cobalt Strike Beacons</li>
</ul>]]>
      </content:encoded>
      <pubDate>Tue, 18 Oct 2022 14:37:09 -0400</pubDate>
      <author>Black Hills Information Security</author>
      <enclosure url="https://media.transistor.fm/c99031c4/92aae899.mp3" length="56368043" type="audio/mpeg"/>
      <itunes:author>Black Hills Information Security</itunes:author>
      <itunes:image href="https://img.transistorcdn.com/8KlD5NP426qU123awMBctuNXY8EEYhyYca1zvbHTi5s/rs:fill:0:0:1/w:1400/h:1400/q:60/mb:500000/aHR0cHM6Ly9pbWct/dXBsb2FkLXByb2R1/Y3Rpb24udHJhbnNp/c3Rvci5mbS8zMWM0/MDg0YjI3Y2IwMzc0/N2Q0Njc0ZDZmOTE4/OTMxOC5qcGc.jpg"/>
      <itunes:duration>3399</itunes:duration>
      <itunes:summary>00:00 – PreShow Banter™ — Dumpster Fire Friends03:07 – PreShow Banter™ — WHHF Deadwood – https://wildwesthackinfest.com/deadwood/



03:48 – BHIS – Talkin’ Bout [infosec] News 2022-10-0307:37 – Story # 1: High-severity Microsoft Exchange 0-day under attack threatens 220,000 servershttps://arstechnica.com/information-technology/2022/09/high-severity-microsoft-exchange-0-day-under-attack-threatens-220000-servers/19:30 – Story # 2: Stealthy hackers target military and weapons contractors in recent attackhttps://www.bleepingcomputer.com/news/security/stealthy-hackers-target-military-and-weapons-contractors-in-recent-attack/25:52 – Story # 3: Putin grants Russian citizenship to Edward Snowdenhttps://www.npr.org/2022/09/26/1125109303/putin-edward-snowden-russian-citizenship29:09 – Story # 4: What the Securing Open Source Software Act does and what it misseshttps://www.zdnet.com/article/whats-what-in-the-united-states-securing-open-source-software-act/38:17 – Story # 4b: SecBSD Teamhttps://secbsd.org/team.html40:43 – Story # 5: New Malware Campaign Targeting Job Seekers with Cobalt Strike Beaconshttps://thehackernews.com/2022/09/new-malware-campaign-targeting-job.html
















We are self-publishing free Infosec Zines called PROMPT#.  



PROMPT# will contain: 

Infosec articles 
Challenging puzzles 
Comic book based on real-life hacking adventures 
Coloring contests 
Bonus Backdoors &amp;amp; Breaches Consultant Cards (print version only) 
Other stuffs 

You can check out current and upcoming issues here: https://www.blackhillsinfosec.com/prompt-zine/ </itunes:summary>
      <itunes:subtitle>00:00 – PreShow Banter™ — Dumpster Fire Friends03:07 – PreShow Banter™ — WHHF Deadwood – https://wildwesthackinfest.com/deadwood/



03:48 – BHIS – Talkin’ Bout [infosec] News 2022-10-0307:37 – Story # 1: High-severity Microsoft Exchange 0-day under attac</itunes:subtitle>
      <itunes:keywords>Infosec,Cybersecurity,news</itunes:keywords>
      <itunes:explicit>No</itunes:explicit>
      <podcast:chapters url="https://share.transistor.fm/s/c99031c4/chapters.json" type="application/json+chapters"/>
    </item>
    <item>
      <title>Talkin’ About Infosec News – 10/5/2022</title>
      <itunes:episode>1</itunes:episode>
      <podcast:episode>1</podcast:episode>
      <itunes:title>Talkin’ About Infosec News – 10/5/2022</itunes:title>
      <itunes:episodeType>full</itunes:episodeType>
      <guid isPermaLink="false">https://www.blackhillsinfosec.com/?p=23008</guid>
      <link>https://share.transistor.fm/s/f9d043cd</link>
      <description>
        <![CDATA[<p>02:28 – Story # 1: American Airlines Breach Exposes Customer and Staff Information– https://www.infosecurity-magazine.com/news/american-airlines-breach-customer/18:59 – Story # 2: London police arrest, charge teen hacking suspect but won’t confirm GTA 6, Uber […]</p>
<p>The post <a href="https://www.blackhillsinfosec.com/talkin-about-infosec-news-10-5-2022/">Talkin’ About Infosec News – 10/5/2022</a> appeared first on <a href="https://www.blackhillsinfosec.com">Black Hills Information Security</a>.</p>
<ul><li>(00:00) - BHIS - Talkin' Bout [infosec] News 2022-09-26</li>
<li>(02:28) - Story # 1: American Airlines Breach Exposes Customer and Staff Information</li>
<li>(18:59) - Story # 2: London police arrest, charge teen hacking suspect but won’t confirm GTA 6, Uber links</li>
<li>(25:32) - Story # 3: LockBit ransomware builder leaked online by “angry developer”</li>
<li>(30:11) - Story # 4: Malwarebytes blocks Google, YouTube as malware</li>
<li>(32:14) - Story # 5: AdGuard’s new ad blocker struggles with Google’s Manifest v3 rules</li>
<li>(37:29) - Story # 6: Adware on Google Play and Apple Store installed 13 million times</li>
<li>(41:18) - Story # 7: Revealed: US Military Bought Mass Monitoring Tool That Includes Internet Browsing, Email Data</li>
<li>(50:55) - Story # 8: SIM Swapper Abducted, Beaten, Held for $200k Ransom</li>
</ul>]]>
      </description>
      <content:encoded>
        <![CDATA[<p>02:28 – Story # 1: American Airlines Breach Exposes Customer and Staff Information– https://www.infosecurity-magazine.com/news/american-airlines-breach-customer/18:59 – Story # 2: London police arrest, charge teen hacking suspect but won’t confirm GTA 6, Uber […]</p>
<p>The post <a href="https://www.blackhillsinfosec.com/talkin-about-infosec-news-10-5-2022/">Talkin’ About Infosec News – 10/5/2022</a> appeared first on <a href="https://www.blackhillsinfosec.com">Black Hills Information Security</a>.</p>
<ul><li>(00:00) - BHIS - Talkin' Bout [infosec] News 2022-09-26</li>
<li>(02:28) - Story # 1: American Airlines Breach Exposes Customer and Staff Information</li>
<li>(18:59) - Story # 2: London police arrest, charge teen hacking suspect but won’t confirm GTA 6, Uber links</li>
<li>(25:32) - Story # 3: LockBit ransomware builder leaked online by “angry developer”</li>
<li>(30:11) - Story # 4: Malwarebytes blocks Google, YouTube as malware</li>
<li>(32:14) - Story # 5: AdGuard’s new ad blocker struggles with Google’s Manifest v3 rules</li>
<li>(37:29) - Story # 6: Adware on Google Play and Apple Store installed 13 million times</li>
<li>(41:18) - Story # 7: Revealed: US Military Bought Mass Monitoring Tool That Includes Internet Browsing, Email Data</li>
<li>(50:55) - Story # 8: SIM Swapper Abducted, Beaten, Held for $200k Ransom</li>
</ul>]]>
      </content:encoded>
      <pubDate>Wed, 05 Oct 2022 17:21:14 -0400</pubDate>
      <author>Black Hills Information Security</author>
      <enclosure url="https://media.transistor.fm/f9d043cd/8395b73a.mp3" length="58045914" type="audio/mpeg"/>
      <itunes:author>Black Hills Information Security</itunes:author>
      <itunes:image href="https://img.transistorcdn.com/GWAIJKttPu1h1uGma33OZSz2vw-Vbz3mdDgPIhLTYWw/rs:fill:0:0:1/w:1400/h:1400/q:60/mb:500000/aHR0cHM6Ly9pbWct/dXBsb2FkLXByb2R1/Y3Rpb24udHJhbnNp/c3Rvci5mbS8wZDFm/MTNhMzRlM2NjZmQy/NjBjMDlhNmFkNTE1/MzkxZi5qcGc.jpg"/>
      <itunes:duration>3494</itunes:duration>
      <itunes:summary>02:28 – Story # 1: American Airlines Breach Exposes Customer and Staff Information– https://www.infosecurity-magazine.com/news/american-airlines-breach-customer/18:59 – Story # 2: London police arrest, charge teen hacking suspect but won’t confirm GTA 6, Uber links– https://www.theverge.com/2022/9/23/23368340/hacking-suspect-arrested-city-of-london-lapsus-gta-6-uber25:32 – Story # 3: LockBit ransomware builder leaked online by “angry developer”– https://www.bleepingcomputer.com/news/security/lockbit-ransomware-builder-leaked-online-by-angry-developer-/30:11 – Story # 4: Malwarebytes blocks Google, YouTube as malware– https://www.theregister.com/2022/09/21/malwarebytes_blocks_google_domains/32:14 – Story # 5: AdGuard’s new ad blocker struggles with Google’s Manifest v3 rules– https://www.bleepingcomputer.com/news/security/adguard-s-new-ad-blocker-struggles-with-google-s-manifest-v3-rules/37:29 – Story # 6: Adware on Google Play and Apple Store installed 13 million times– https://www.bleepingcomputer.com/news/security/adware-on-google-play-and-apple-store-installed-13-million-times/41:18 – Story # 7: Revealed: US Military Bought Mass Monitoring Tool That Includes Internet Browsing, Email Data– https://www.vice.com/en/article/y3pnkw/us-military-bought-mass-monitoring-augury-team-cymru-browsing-email-data50:55 – Story # 8: SIM Swapper Abducted, Beaten, Held for $200k Ransom– https://krebsonsecurity.com/2022/09/sim-swapper-abducted-beaten-held-for-200k-ransom/
















We are self-publishing free Infosec Zines called PROMPT#.  



PROMPT# will contain: 

Infosec articles 
Challenging puzzles 
Comic book based on real-life hacking adventures 
Coloring contests 
Bonus Backdoors &amp;amp; Breaches Consultant Cards (print version only) 
Other stuffs 

You can check out current and upcoming issues here: https://www.blackhillsinfosec.com/prompt-zine/ </itunes:summary>
      <itunes:subtitle>02:28 – Story # 1: American Airlines Breach Exposes Customer and Staff Information– https://www.infosecurity-magazine.com/news/american-airlines-breach-customer/18:59 – Story # 2: London police arrest, charge teen hacking suspect but won’t confirm GTA 6, </itunes:subtitle>
      <itunes:keywords>Infosec,Cybersecurity,news</itunes:keywords>
      <itunes:explicit>No</itunes:explicit>
      <podcast:chapters url="https://share.transistor.fm/s/f9d043cd/chapters.json" type="application/json+chapters"/>
    </item>
    <item>
      <title>Talkin’ About Infosec News – 9/22/2022</title>
      <itunes:episode>1</itunes:episode>
      <podcast:episode>1</podcast:episode>
      <itunes:title>Talkin’ About Infosec News – 9/22/2022</itunes:title>
      <itunes:episodeType>full</itunes:episodeType>
      <guid isPermaLink="false">https://www.blackhillsinfosec.com/?p=22899</guid>
      <link>https://share.transistor.fm/s/8312dd78</link>
      <description>
        <![CDATA[<p>The post <a href="https://www.blackhillsinfosec.com/talkin-about-infosec-news-9-22-2022/">Talkin’ About Infosec News – 9/22/2022</a> appeared first on <a href="https://www.blackhillsinfosec.com">Black Hills Information Security</a>.</p>
<ul><li>(00:00) - PreShow Banter™ — Special Operations Gig</li>
<li>(00:28) - BHIS - Talkin' Bout [infosec] News 2022-09-19</li>
<li>(02:45) - Story # 1: Uber Security Update</li>
<li>(04:26) - Story # 1b: A teen hacked Uber and announced it in the company Slack. Employees thought it was a joke</li>
<li>(30:01) - Story # 2: White House Releases First-Ever Comprehensive Framework for Responsible Development of Digital Assets</li>
<li>(35:34) - Story # 3: GTA 6 source code and videos leaked after Rockstar Games hack</li>
<li>(44:40) - Story # 4: Microsoft Teams stores auth tokens as cleartext in Windows, Linux, Macs</li>
<li>(47:47) - Story # 5: LockBit 3.0 Ransomware Victim: First bounty payout $50,000</li>
</ul>]]>
      </description>
      <content:encoded>
        <![CDATA[<p>The post <a href="https://www.blackhillsinfosec.com/talkin-about-infosec-news-9-22-2022/">Talkin’ About Infosec News – 9/22/2022</a> appeared first on <a href="https://www.blackhillsinfosec.com">Black Hills Information Security</a>.</p>
<ul><li>(00:00) - PreShow Banter™ — Special Operations Gig</li>
<li>(00:28) - BHIS - Talkin' Bout [infosec] News 2022-09-19</li>
<li>(02:45) - Story # 1: Uber Security Update</li>
<li>(04:26) - Story # 1b: A teen hacked Uber and announced it in the company Slack. Employees thought it was a joke</li>
<li>(30:01) - Story # 2: White House Releases First-Ever Comprehensive Framework for Responsible Development of Digital Assets</li>
<li>(35:34) - Story # 3: GTA 6 source code and videos leaked after Rockstar Games hack</li>
<li>(44:40) - Story # 4: Microsoft Teams stores auth tokens as cleartext in Windows, Linux, Macs</li>
<li>(47:47) - Story # 5: LockBit 3.0 Ransomware Victim: First bounty payout $50,000</li>
</ul>]]>
      </content:encoded>
      <pubDate>Thu, 22 Sep 2022 16:08:40 -0400</pubDate>
      <author>Black Hills Information Security</author>
      <enclosure url="https://media.transistor.fm/8312dd78/afa2eeaf.mp3" length="50952605" type="audio/mpeg"/>
      <itunes:author>Black Hills Information Security</itunes:author>
      <itunes:image href="https://img.transistorcdn.com/zYDQygrYy7eOA1t9FGTO1Am2B3FzsveRQJbbOj5W-TI/rs:fill:0:0:1/w:1400/h:1400/q:60/mb:500000/aHR0cHM6Ly9pbWct/dXBsb2FkLXByb2R1/Y3Rpb24udHJhbnNp/c3Rvci5mbS8wNTdl/M2EyODg4Mzg0YmEw/YTZjZjdlMzM3MGNl/YzY5Ni5qcGc.jpg"/>
      <itunes:duration>3089</itunes:duration>
      <itunes:summary>
        <![CDATA[<p>The post <a href="https://www.blackhillsinfosec.com/talkin-about-infosec-news-9-22-2022/">Talkin’ About Infosec News – 9/22/2022</a> appeared first on <a href="https://www.blackhillsinfosec.com">Black Hills Information Security</a>.</p>
<ul><li>(00:00) - PreShow Banter™ — Special Operations Gig</li>
<li>(00:28) - BHIS - Talkin' Bout [infosec] News 2022-09-19</li>
<li>(02:45) - Story # 1: Uber Security Update</li>
<li>(04:26) - Story # 1b: A teen hacked Uber and announced it in the company Slack. Employees thought it was a joke</li>
<li>(30:01) - Story # 2: White House Releases First-Ever Comprehensive Framework for Responsible Development of Digital Assets</li>
<li>(35:34) - Story # 3: GTA 6 source code and videos leaked after Rockstar Games hack</li>
<li>(44:40) - Story # 4: Microsoft Teams stores auth tokens as cleartext in Windows, Linux, Macs</li>
<li>(47:47) - Story # 5: LockBit 3.0 Ransomware Victim: First bounty payout $50,000</li>
</ul>]]>
      </itunes:summary>
      <itunes:keywords>Infosec,Cybersecurity,news</itunes:keywords>
      <itunes:explicit>No</itunes:explicit>
      <podcast:chapters url="https://share.transistor.fm/s/8312dd78/chapters.json" type="application/json+chapters"/>
    </item>
    <item>
      <title>Talkin’ About Infosec News – 9/13/2022</title>
      <itunes:episode>1</itunes:episode>
      <podcast:episode>1</podcast:episode>
      <itunes:title>Talkin’ About Infosec News – 9/13/2022</itunes:title>
      <itunes:episodeType>full</itunes:episodeType>
      <guid isPermaLink="false">https://www.blackhillsinfosec.com/?p=22592</guid>
      <link>https://share.transistor.fm/s/f756e745</link>
      <description>
        <![CDATA[<p>The post <a href="https://www.blackhillsinfosec.com/talkin-about-infosec-news-9-13-2022/">Talkin’ About Infosec News – 9/13/2022</a> appeared first on <a href="https://www.blackhillsinfosec.com">Black Hills Information Security</a>.</p>
<ul><li>(00:00) - PreShow Banter™ — Forbidden Snacks</li>
<li>(02:41) - BHIS - Talkin' Bout [infosec] News 2022-09-12</li>
<li>(04:54) - Story # 1: China Accuses US of 'Tens of Thousands' of Cyberattacks</li>
<li>(12:13) - Story # 2: Hackers Honeytrap Russian Troops Into Sharing Location, Base Bombed: Report</li>
<li>(18:33) - Story # 3: Inside Fog Data Science, the Secretive Company Selling Mass Surveillance to Local Police</li>
<li>(44:13) - Story # 4: Ireland fines Instagram a record $400 mln over children's data</li>
<li>(46:29) - Story # 5: FBI, Secret Service join Kentucky investigation into $4 million cybercrime theft</li>
<li>(50:12) - Story # 6: New Ransomware Group BianLian Activity Exploding</li>
<li>(51:41) - Story # 6b: https://canarytokens.org/generate#</li>
</ul>]]>
      </description>
      <content:encoded>
        <![CDATA[<p>The post <a href="https://www.blackhillsinfosec.com/talkin-about-infosec-news-9-13-2022/">Talkin’ About Infosec News – 9/13/2022</a> appeared first on <a href="https://www.blackhillsinfosec.com">Black Hills Information Security</a>.</p>
<ul><li>(00:00) - PreShow Banter™ — Forbidden Snacks</li>
<li>(02:41) - BHIS - Talkin' Bout [infosec] News 2022-09-12</li>
<li>(04:54) - Story # 1: China Accuses US of 'Tens of Thousands' of Cyberattacks</li>
<li>(12:13) - Story # 2: Hackers Honeytrap Russian Troops Into Sharing Location, Base Bombed: Report</li>
<li>(18:33) - Story # 3: Inside Fog Data Science, the Secretive Company Selling Mass Surveillance to Local Police</li>
<li>(44:13) - Story # 4: Ireland fines Instagram a record $400 mln over children's data</li>
<li>(46:29) - Story # 5: FBI, Secret Service join Kentucky investigation into $4 million cybercrime theft</li>
<li>(50:12) - Story # 6: New Ransomware Group BianLian Activity Exploding</li>
<li>(51:41) - Story # 6b: https://canarytokens.org/generate#</li>
</ul>]]>
      </content:encoded>
      <pubDate>Tue, 13 Sep 2022 14:51:32 -0400</pubDate>
      <author>Black Hills Information Security</author>
      <enclosure url="https://media.transistor.fm/f756e745/ad2c197c.mp3" length="56033626" type="audio/mpeg"/>
      <itunes:author>Black Hills Information Security</itunes:author>
      <itunes:image href="https://img.transistorcdn.com/QfhObXAFQefVkzE_VcAApFHNGvbhOT1CHQwuFHDLSD4/rs:fill:0:0:1/w:1400/h:1400/q:60/mb:500000/aHR0cHM6Ly9pbWct/dXBsb2FkLXByb2R1/Y3Rpb24udHJhbnNp/c3Rvci5mbS84Nzkz/NTI2NjI3ODM5YWZj/MjFhMTBmZWUzZWQ0/ZGY0OS5qcGc.jpg"/>
      <itunes:duration>3357</itunes:duration>
      <itunes:summary>
        <![CDATA[<p>The post <a href="https://www.blackhillsinfosec.com/talkin-about-infosec-news-9-13-2022/">Talkin’ About Infosec News – 9/13/2022</a> appeared first on <a href="https://www.blackhillsinfosec.com">Black Hills Information Security</a>.</p>
<ul><li>(00:00) - PreShow Banter™ — Forbidden Snacks</li>
<li>(02:41) - BHIS - Talkin' Bout [infosec] News 2022-09-12</li>
<li>(04:54) - Story # 1: China Accuses US of 'Tens of Thousands' of Cyberattacks</li>
<li>(12:13) - Story # 2: Hackers Honeytrap Russian Troops Into Sharing Location, Base Bombed: Report</li>
<li>(18:33) - Story # 3: Inside Fog Data Science, the Secretive Company Selling Mass Surveillance to Local Police</li>
<li>(44:13) - Story # 4: Ireland fines Instagram a record $400 mln over children's data</li>
<li>(46:29) - Story # 5: FBI, Secret Service join Kentucky investigation into $4 million cybercrime theft</li>
<li>(50:12) - Story # 6: New Ransomware Group BianLian Activity Exploding</li>
<li>(51:41) - Story # 6b: https://canarytokens.org/generate#</li>
</ul>]]>
      </itunes:summary>
      <itunes:keywords>Infosec,Cybersecurity,news</itunes:keywords>
      <itunes:explicit>No</itunes:explicit>
      <podcast:chapters url="https://share.transistor.fm/s/f756e745/chapters.json" type="application/json+chapters"/>
    </item>
    <item>
      <title>Talkin’ About Infosec News – 9/9/2022</title>
      <itunes:episode>1</itunes:episode>
      <podcast:episode>1</podcast:episode>
      <itunes:title>Talkin’ About Infosec News – 9/9/2022</itunes:title>
      <itunes:episodeType>full</itunes:episodeType>
      <guid isPermaLink="false">https://www.blackhillsinfosec.com/?p=22566</guid>
      <link>https://share.transistor.fm/s/ee434ac7</link>
      <description>
        <![CDATA[<p>The post <a href="https://www.blackhillsinfosec.com/talkin-about-infosec-news-9-9-2022/">Talkin’ About Infosec News – 9/9/2022</a> appeared first on <a href="https://www.blackhillsinfosec.com">Black Hills Information Security</a>.</p>
<ul><li>(00:00) - PreShow Banter™ — Accidental Furry Hoodies</li>
<li>(02:19) - BHIS - Talkin' Bout [infosec] News 2022-08-29</li>
<li>(04:37) - Story # 1: Plex breach exposes usernames, emails, and encrypted passwords</li>
<li>(09:06) - Story # 2: LastPass Breach</li>
<li>(18:33) - Story # 3: DoorDash data breach exposes customer details</li>
<li>(22:47) - Story # 4: Greek gas operator refuses to negotiate with ransomware group after attack</li>
<li>(25:01) - Story # 5: Ex-Twitter exec blows the whistle, alleging reckless and negligent cybersecurity policies</li>
<li>(35:46) - Story # 6: Microsoft Uncovers New Post-Compromise Malware Used by Nobelium Hackers</li>
<li>(42:16) - Story # 7: Google opens up its experimental AI chatbot for public testing</li>
<li>(45:22) - Story # 8: Microsoft finds critical hole in operating system that for once isn't Windows</li>
<li>(46:56) - Story # 9: VMware confirms Carbon Black causes BSODs, boot loops on Windows</li>
<li>(56:01) - Story # 10: Nato investigates hacker sale of missile firm data</li>
</ul>]]>
      </description>
      <content:encoded>
        <![CDATA[<p>The post <a href="https://www.blackhillsinfosec.com/talkin-about-infosec-news-9-9-2022/">Talkin’ About Infosec News – 9/9/2022</a> appeared first on <a href="https://www.blackhillsinfosec.com">Black Hills Information Security</a>.</p>
<ul><li>(00:00) - PreShow Banter™ — Accidental Furry Hoodies</li>
<li>(02:19) - BHIS - Talkin' Bout [infosec] News 2022-08-29</li>
<li>(04:37) - Story # 1: Plex breach exposes usernames, emails, and encrypted passwords</li>
<li>(09:06) - Story # 2: LastPass Breach</li>
<li>(18:33) - Story # 3: DoorDash data breach exposes customer details</li>
<li>(22:47) - Story # 4: Greek gas operator refuses to negotiate with ransomware group after attack</li>
<li>(25:01) - Story # 5: Ex-Twitter exec blows the whistle, alleging reckless and negligent cybersecurity policies</li>
<li>(35:46) - Story # 6: Microsoft Uncovers New Post-Compromise Malware Used by Nobelium Hackers</li>
<li>(42:16) - Story # 7: Google opens up its experimental AI chatbot for public testing</li>
<li>(45:22) - Story # 8: Microsoft finds critical hole in operating system that for once isn't Windows</li>
<li>(46:56) - Story # 9: VMware confirms Carbon Black causes BSODs, boot loops on Windows</li>
<li>(56:01) - Story # 10: Nato investigates hacker sale of missile firm data</li>
</ul>]]>
      </content:encoded>
      <pubDate>Fri, 09 Sep 2022 10:55:04 -0400</pubDate>
      <author>Black Hills Information Security</author>
      <enclosure url="https://media.transistor.fm/ee434ac7/4cf6635a.mp3" length="61482988" type="audio/mpeg"/>
      <itunes:author>Black Hills Information Security</itunes:author>
      <itunes:image href="https://img.transistorcdn.com/p8EQydC15iRqgE2FxvLs3rb1cL87KbziXi2l3YyXsI4/rs:fill:0:0:1/w:1400/h:1400/q:60/mb:500000/aHR0cHM6Ly9pbWct/dXBsb2FkLXByb2R1/Y3Rpb24udHJhbnNp/c3Rvci5mbS82ZjY3/ZjMzMmFmMjg5ODA0/NzJmNGFlM2I5NDNj/MmY0Zi5qcGc.jpg"/>
      <itunes:duration>3674</itunes:duration>
      <itunes:summary>
        <![CDATA[<p>The post <a href="https://www.blackhillsinfosec.com/talkin-about-infosec-news-9-9-2022/">Talkin’ About Infosec News – 9/9/2022</a> appeared first on <a href="https://www.blackhillsinfosec.com">Black Hills Information Security</a>.</p>
<ul><li>(00:00) - PreShow Banter™ — Accidental Furry Hoodies</li>
<li>(02:19) - BHIS - Talkin' Bout [infosec] News 2022-08-29</li>
<li>(04:37) - Story # 1: Plex breach exposes usernames, emails, and encrypted passwords</li>
<li>(09:06) - Story # 2: LastPass Breach</li>
<li>(18:33) - Story # 3: DoorDash data breach exposes customer details</li>
<li>(22:47) - Story # 4: Greek gas operator refuses to negotiate with ransomware group after attack</li>
<li>(25:01) - Story # 5: Ex-Twitter exec blows the whistle, alleging reckless and negligent cybersecurity policies</li>
<li>(35:46) - Story # 6: Microsoft Uncovers New Post-Compromise Malware Used by Nobelium Hackers</li>
<li>(42:16) - Story # 7: Google opens up its experimental AI chatbot for public testing</li>
<li>(45:22) - Story # 8: Microsoft finds critical hole in operating system that for once isn't Windows</li>
<li>(46:56) - Story # 9: VMware confirms Carbon Black causes BSODs, boot loops on Windows</li>
<li>(56:01) - Story # 10: Nato investigates hacker sale of missile firm data</li>
</ul>]]>
      </itunes:summary>
      <itunes:keywords>Infosec,Cybersecurity,news</itunes:keywords>
      <itunes:explicit>No</itunes:explicit>
      <podcast:chapters url="https://share.transistor.fm/s/ee434ac7/chapters.json" type="application/json+chapters"/>
    </item>
    <item>
      <title>Talkin’ About Infosec News – 8/26/2022</title>
      <itunes:episode>1</itunes:episode>
      <podcast:episode>1</podcast:episode>
      <itunes:title>Talkin’ About Infosec News – 8/26/2022</itunes:title>
      <itunes:episodeType>full</itunes:episodeType>
      <guid isPermaLink="false">https://www.blackhillsinfosec.com/?p=22518</guid>
      <link>https://share.transistor.fm/s/1c7d0871</link>
      <description>
        <![CDATA[<p>ORIGINALLY AIRED ON AUGUST 22, 2022 00:00 – PreShow Banter™ — Ralph’s Birthday00:53 – BHIS – Talkin’ Bout [infosec] News 2022-08-2203:27 – Story # 1: PC store told it can’t […]</p>
<p>The post <a href="https://www.blackhillsinfosec.com/talkin-about-infosec-news-8-26-2022/">Talkin’ About Infosec News – 8/26/2022</a> appeared first on <a href="https://www.blackhillsinfosec.com">Black Hills Information Security</a>.</p>
<ul><li>(00:00) - PreShow Banter™ — Ralph's Birthday</li>
<li>(00:53) - BHIS - Talkin' Bout [infosec] News 2022-08-22</li>
<li>(03:27) - Story # 1: PC store told it can't claim full cyber-crime insurance after social-engineering attack</li>
<li>(13:48) - Story # 2: Lloyd’s to Exclude Catastrophic Nation-Backed Cyberattacks From Insurance Coverage</li>
<li>(15:33) - Story # 2b: LLOYD'S Market Bulletin</li>
<li>(24:53) - Story # 3: AirTag leads to arrest of airline worker accused of stealing at least $15,000 worth of items from luggage</li>
<li>(30:12) - Story # 4: Apple security updates fix 2 zero-days used to hack iPhones, Macs</li>
<li>(37:58) - Story # 5: Microsoft Sysmon can now block malicious EXEs from being created</li>
<li>(43:37) - Story # 6: Def Con hacker shows John Deere’s tractors can run Doom</li>
<li>(53:44) - Story # 7: Janet Jackson’s ‘Rhythm Nation’ apparently vibed too hard for some laptops</li>
</ul>]]>
      </description>
      <content:encoded>
        <![CDATA[<p>ORIGINALLY AIRED ON AUGUST 22, 2022 00:00 – PreShow Banter™ — Ralph’s Birthday00:53 – BHIS – Talkin’ Bout [infosec] News 2022-08-2203:27 – Story # 1: PC store told it can’t […]</p>
<p>The post <a href="https://www.blackhillsinfosec.com/talkin-about-infosec-news-8-26-2022/">Talkin’ About Infosec News – 8/26/2022</a> appeared first on <a href="https://www.blackhillsinfosec.com">Black Hills Information Security</a>.</p>
<ul><li>(00:00) - PreShow Banter™ — Ralph's Birthday</li>
<li>(00:53) - BHIS - Talkin' Bout [infosec] News 2022-08-22</li>
<li>(03:27) - Story # 1: PC store told it can't claim full cyber-crime insurance after social-engineering attack</li>
<li>(13:48) - Story # 2: Lloyd’s to Exclude Catastrophic Nation-Backed Cyberattacks From Insurance Coverage</li>
<li>(15:33) - Story # 2b: LLOYD'S Market Bulletin</li>
<li>(24:53) - Story # 3: AirTag leads to arrest of airline worker accused of stealing at least $15,000 worth of items from luggage</li>
<li>(30:12) - Story # 4: Apple security updates fix 2 zero-days used to hack iPhones, Macs</li>
<li>(37:58) - Story # 5: Microsoft Sysmon can now block malicious EXEs from being created</li>
<li>(43:37) - Story # 6: Def Con hacker shows John Deere’s tractors can run Doom</li>
<li>(53:44) - Story # 7: Janet Jackson’s ‘Rhythm Nation’ apparently vibed too hard for some laptops</li>
</ul>]]>
      </content:encoded>
      <pubDate>Fri, 26 Aug 2022 13:35:14 -0400</pubDate>
      <author>Black Hills Information Security</author>
      <enclosure url="https://media.transistor.fm/1c7d0871/f33091be.mp3" length="62178561" type="audio/mpeg"/>
      <itunes:author>Black Hills Information Security</itunes:author>
      <itunes:image href="https://img.transistorcdn.com/Ym42bv_48BEkXhxLNRcE27N2N1W3YQxm6V2fNQUr7f8/rs:fill:0:0:1/w:1400/h:1400/q:60/mb:500000/aHR0cHM6Ly9pbWct/dXBsb2FkLXByb2R1/Y3Rpb24udHJhbnNp/c3Rvci5mbS8zYjNk/YjY3NjVjMGY2NjU2/MWIxYzQzMTdiMTlk/ZjY5NS5qcGc.jpg"/>
      <itunes:duration>3737</itunes:duration>
      <itunes:summary>ORIGINALLY AIRED ON AUGUST 22, 2022



00:00 – PreShow Banter™ — Ralph’s Birthday00:53 – BHIS – Talkin’ Bout [infosec] News 2022-08-2203:27 – Story # 1: PC store told it can’t claim full cyber-crime insurance after social-engineering attack – https://www.theregister.com/2022/08/16/social_engineering_cyber_crime_insurance/13:48 – Story # 2: Lloyd’s to Exclude Catastrophic Nation-Backed Cyberattacks From Insurance Coverage – https://www.wsj.com/articles/lloyds-to-exclude-catastrophic-nation-backed-cyberattacks-from-insurance-coverage-1166086158615:33 – Story # 2b: LLOYD’S Market Bulletin – https://assets.lloyds.com/media/35926dc8-c885-497b-aed8-6d2f87c1415d/Y5381%20Market%20Bulletin%20-%20Cyber-attack%20exclusions.pdf24:53 – Story # 3: AirTag leads to arrest of airline worker accused of stealing at least $15,000 worth of items from luggage – https://www.nbcnews.com/news/us-news/airtag-leads-arrest-airline-worker-accused-stealing-least-15000-items-rcna43547/30:12 – Story # 4: Apple security updates fix 2 zero-days used to hack iPhones, Macs – https://www.bleepingcomputer.com/news/security/apple-security-updates-fix-2-zero-days-used-to-hack-iphones-macs/37:58 – Story # 5: Microsoft Sysmon can now block malicious EXEs from being created – https://www.bleepingcomputer.com/news/microsoft/microsoft-sysmon-can-now-block-malicious-exes-from-being-created/43:37 – Story # 6: Def Con hacker shows John Deere’s tractors can run Doom – https://www.theverge.com/2022/8/15/23306650/def-con-hacker-john-deere-tractors-run-doom-right-to-repair53:44 – Story # 7: Janet Jackson’s ‘Rhythm Nation’ apparently vibed too hard for some laptops – https://www.theverge.com/2022/8/17/23310033/janet-jackson-rhythm-nation-laptop-crash-windows-xp-hard-drives
















We are self-publishing free Infosec Zines called PROMPT#.  



PROMPT# will contain: 

Infosec articles 
Challenging puzzles 
Comic book based on real-life hacking adventures 
Coloring contests 
Bonus Backdoors &amp;amp; Breaches Consultant Cards (print version only) 
Other stuffs 

You can check out current and upcoming issues here: </itunes:summary>
      <itunes:subtitle>ORIGINALLY AIRED ON AUGUST 22, 2022



00:00 – PreShow Banter™ — Ralph’s Birthday00:53 – BHIS – Talkin’ Bout [infosec] News 2022-08-2203:27 – Story # 1: PC store told it can’t claim full cyber-crime insurance after social-engineering attack – https://www.</itunes:subtitle>
      <itunes:keywords>Infosec,Cybersecurity,news</itunes:keywords>
      <itunes:explicit>No</itunes:explicit>
      <podcast:chapters url="https://share.transistor.fm/s/1c7d0871/chapters.json" type="application/json+chapters"/>
    </item>
    <item>
      <title>Talkin’ About Infosec News – 8/18/2022</title>
      <itunes:episode>1</itunes:episode>
      <podcast:episode>1</podcast:episode>
      <itunes:title>Talkin’ About Infosec News – 8/18/2022</itunes:title>
      <itunes:episodeType>full</itunes:episodeType>
      <guid isPermaLink="false">https://www.blackhillsinfosec.com/?p=22378</guid>
      <link>https://share.transistor.fm/s/38bf8965</link>
      <description>
        <![CDATA[<p>ORIGINALLY AIRED ON AUGUST 15, 2022 Articles discussed in this episode: 00:00 – PreShow Banter™ — Sneaking Candy03:32 – BHIS – Talkin’ Bout [infosec] News 2022-08-1507:06 – Story # 1: […]</p>
<p>The post <a href="https://www.blackhillsinfosec.com/talkin-about-infosec-news-8-18-2022/">Talkin’ About Infosec News – 8/18/2022</a> appeared first on <a href="https://www.blackhillsinfosec.com">Black Hills Information Security</a>.</p>
<ul><li>(00:00) - PreShow Banter™ — Sneaking Candy</li>
<li>(03:32) - BHIS - Talkin' Bout [infosec] News 2022-08-15</li>
<li>(07:06) - Story # 1: Blackhat 2022 recap – Trends and highlights</li>
<li>(09:52) - Story # 2: The Zoom installer let a researcher hack his way to root access on macOS</li>
<li>(14:15) - Story # 3: Researchers Find Vulnerabilities in Software Underlying Discord, Microsoft Teams, and Other Apps</li>
<li>(16:18) - Story # 4: Starlink Successfully Hacked Using $25 Modchip</li>
<li>(21:47) - Story # 5: Anonymous poop gifting site hacked, customers exposed</li>
<li>(28:58) - Story # 6: Automotive supplier breached by 3 ransomware gangs in 2 weeks</li>
<li>(33:49) - Story # 7: Man who built ISP instead of paying Comcast $50K expands to hundreds of homes</li>
<li>(38:09) - Story # 8: Slack leaked hashed passwords from its servers for years</li>
<li>(40:33) - Story # 9: Cisco Talos shares insights related to recent cyber attack on Cisco</li>
<li>(48:07) - Story # 10: Incident Report: Employee and Customer Account Compromise</li>
<li>(50:54) - Story # 11: Hackers Behind Twilio Breach Also Targeted Cloudflare Employees</li>
</ul>]]>
      </description>
      <content:encoded>
        <![CDATA[<p>ORIGINALLY AIRED ON AUGUST 15, 2022 Articles discussed in this episode: 00:00 – PreShow Banter™ — Sneaking Candy03:32 – BHIS – Talkin’ Bout [infosec] News 2022-08-1507:06 – Story # 1: […]</p>
<p>The post <a href="https://www.blackhillsinfosec.com/talkin-about-infosec-news-8-18-2022/">Talkin’ About Infosec News – 8/18/2022</a> appeared first on <a href="https://www.blackhillsinfosec.com">Black Hills Information Security</a>.</p>
<ul><li>(00:00) - PreShow Banter™ — Sneaking Candy</li>
<li>(03:32) - BHIS - Talkin' Bout [infosec] News 2022-08-15</li>
<li>(07:06) - Story # 1: Blackhat 2022 recap – Trends and highlights</li>
<li>(09:52) - Story # 2: The Zoom installer let a researcher hack his way to root access on macOS</li>
<li>(14:15) - Story # 3: Researchers Find Vulnerabilities in Software Underlying Discord, Microsoft Teams, and Other Apps</li>
<li>(16:18) - Story # 4: Starlink Successfully Hacked Using $25 Modchip</li>
<li>(21:47) - Story # 5: Anonymous poop gifting site hacked, customers exposed</li>
<li>(28:58) - Story # 6: Automotive supplier breached by 3 ransomware gangs in 2 weeks</li>
<li>(33:49) - Story # 7: Man who built ISP instead of paying Comcast $50K expands to hundreds of homes</li>
<li>(38:09) - Story # 8: Slack leaked hashed passwords from its servers for years</li>
<li>(40:33) - Story # 9: Cisco Talos shares insights related to recent cyber attack on Cisco</li>
<li>(48:07) - Story # 10: Incident Report: Employee and Customer Account Compromise</li>
<li>(50:54) - Story # 11: Hackers Behind Twilio Breach Also Targeted Cloudflare Employees</li>
</ul>]]>
      </content:encoded>
      <pubDate>Thu, 18 Aug 2022 15:17:30 -0400</pubDate>
      <author>Black Hills Information Security</author>
      <enclosure url="https://media.transistor.fm/38bf8965/dea86c9c.mp3" length="60876690" type="audio/mpeg"/>
      <itunes:author>Black Hills Information Security</itunes:author>
      <itunes:image href="https://img.transistorcdn.com/diYqM-PaaVyyaOmKWmpyVhlYqeIkNVufhWwxL51PYlM/rs:fill:0:0:1/w:1400/h:1400/q:60/mb:500000/aHR0cHM6Ly9pbWct/dXBsb2FkLXByb2R1/Y3Rpb24udHJhbnNp/c3Rvci5mbS8xN2M1/MjljMzY2ODE2OTdm/NThjODgzY2Y2MTlh/ODQxZS5qcGc.jpg"/>
      <itunes:duration>3624</itunes:duration>
      <itunes:summary>ORIGINALLY AIRED ON AUGUST 15, 2022



Articles discussed in this episode:



00:00 – PreShow Banter™ — Sneaking Candy03:32 – BHIS – Talkin’ Bout [infosec] News 2022-08-1507:06 – Story # 1: Blackhat 2022 recap – Trends and highlights – https://sysdig.com/blog/blackhat-2022-recap/09:52 – Story # 2: The Zoom installer let a researcher hack his way to root access on macOS – https://www.theverge.com/2022/8/12/23303411/zoom-defcon-root-access-privilege-escalation-hack-patrick-wardle14:14 – Story # 3: Researchers Find Vulnerabilities in Software Underlying Discord, Microsoft Teams, and Other Apps – https://www.vice.com/en/article/m7gb7y/researchers-find-vulnerability-in-software-underlying-discord-microsoft-teams-and-other-apps16:17 – Story # 4: Starlink Successfully Hacked Using $25 Modchip – https://threatpost.com/starlink-hack/180389/21:46 – Story # 5: Anonymous poop gifting site hacked, customers exposed – https://www.bleepingcomputer.com/news/security/anonymous-poop-gifting-site-hacked-customers-exposed/28:56 – Story # 6: Automotive supplier breached by 3 ransomware gangs in 2 weeks – https://www.bleepingcomputer.com/news/security/automotive-supplier-breached-by-3-ransomware-gangs-in-2-weeks/33:47 – Story # 7: Man who built ISP instead of paying Comcast $50K expands to hundreds of homes – https://arstechnica.com/tech-policy/2022/08/man-who-built-isp-instead-of-paying-comcast-50k-expands-to-hundreds-of-homes/38:07 – Story # 8: Slack leaked hashed passwords from its servers for years – https://www.theregister.com/2022/08/08/slack_passwords/40:31 – Story # 9: Cisco Talos shares insights related to recent cyber attack on Cisco – https://blog.talosintelligence.com/2022/08/recent-cyber-attack.html48:04 – Story # 10: Incident Report: Employee and Customer Account Compromise – https://www.twilio.com/blog/august-2022-social-engineering-attack50:51 – Story # 11: Hackers Behind Twilio Breach Also Targeted Cloudflare Employees – https://thehackernews.com/2022/08/hackers-behind-twilio-breach-also_10.html</itunes:summary>
      <itunes:subtitle>ORIGINALLY AIRED ON AUGUST 15, 2022



Articles discussed in this episode:



00:00 – PreShow Banter™ — Sneaking Candy03:32 – BHIS – Talkin’ Bout [infosec] News 2022-08-1507:06 – Story # 1: Blackhat 2022 recap – Trends and highlights – https://sysdig.com/</itunes:subtitle>
      <itunes:keywords>Infosec,Cybersecurity,news</itunes:keywords>
      <itunes:explicit>No</itunes:explicit>
      <podcast:chapters url="https://share.transistor.fm/s/38bf8965/chapters.json" type="application/json+chapters"/>
    </item>
    <item>
      <title>Talkin’ About Infosec News – 7/25/2022</title>
      <itunes:episode>1</itunes:episode>
      <podcast:episode>1</podcast:episode>
      <itunes:title>Talkin’ About Infosec News – 7/25/2022</itunes:title>
      <itunes:episodeType>full</itunes:episodeType>
      <guid isPermaLink="false">https://www.blackhillsinfosec.com/?p=22285</guid>
      <link>https://share.transistor.fm/s/95cd21ba</link>
      <description>
        <![CDATA[<p>ORIGINALLY AIRED ON JULY 25, 2022 Articles discussed in this episode: 00:00 – BHIS – Talkin’ Bout [infosec] News 2022-07-25 03:59 – Story # 1: DOJ seized ransoms paid by […]</p>
<p>The post <a href="https://www.blackhillsinfosec.com/talkin-about-infosec-news-8-1-2022/">Talkin’ About Infosec News – 7/25/2022</a> appeared first on <a href="https://www.blackhillsinfosec.com">Black Hills Information Security</a>.</p>
<ul><li>(00:00) - BHIS - Talkin' Bout [infosec] News 2022-07-25</li>
<li>(03:59) - Story # 1: DOJ seized ransoms paid by health centers in Kansas, Colorado after 2021 attacks</li>
<li>(08:38) - Story # 1b: twitter.com/cryptowhale</li>
<li>(17:34) - Story # 2: How Conti ransomware hacked and encrypted the Costa Rican government</li>
<li>(22:29) - Story # 3: Experts Uncover New CloudMensis Spyware Targeting Apple macOS Users</li>
<li>(36:49) - Story # 4: Google Play hides app permissions in favor of developer-written descriptions</li>
<li>(39:09) - Story # 4b: Google is reinstating app permissions list on Play Store</li>
<li>(41:31) - Story # 5: Hack the pump: Rising prices lead to more reports of gas theft</li>
<li>(46:04) - Story # 5b: Gas pump manipulators steal ‘millions of dollars’ in fuel</li>
<li>(50:40) - Story # 5c: Secret Service agents warn fleets about 'fuel skimming'</li>
<li>(53:13) - Story # 6: Atlassian fixes critical Confluence hardcoded credentials flaw</li>
<li>(53:33) - Story # 6b:  Cisco fixes bug that lets attackers execute commands as root</li>
<li>(53:57) - Story # 7: New Air-Gap Attack Uses SATA Cable as an Antenna to Transfer Radio Signals</li>
</ul>]]>
      </description>
      <content:encoded>
        <![CDATA[<p>ORIGINALLY AIRED ON JULY 25, 2022 Articles discussed in this episode: 00:00 – BHIS – Talkin’ Bout [infosec] News 2022-07-25 03:59 – Story # 1: DOJ seized ransoms paid by […]</p>
<p>The post <a href="https://www.blackhillsinfosec.com/talkin-about-infosec-news-8-1-2022/">Talkin’ About Infosec News – 7/25/2022</a> appeared first on <a href="https://www.blackhillsinfosec.com">Black Hills Information Security</a>.</p>
<ul><li>(00:00) - BHIS - Talkin' Bout [infosec] News 2022-07-25</li>
<li>(03:59) - Story # 1: DOJ seized ransoms paid by health centers in Kansas, Colorado after 2021 attacks</li>
<li>(08:38) - Story # 1b: twitter.com/cryptowhale</li>
<li>(17:34) - Story # 2: How Conti ransomware hacked and encrypted the Costa Rican government</li>
<li>(22:29) - Story # 3: Experts Uncover New CloudMensis Spyware Targeting Apple macOS Users</li>
<li>(36:49) - Story # 4: Google Play hides app permissions in favor of developer-written descriptions</li>
<li>(39:09) - Story # 4b: Google is reinstating app permissions list on Play Store</li>
<li>(41:31) - Story # 5: Hack the pump: Rising prices lead to more reports of gas theft</li>
<li>(46:04) - Story # 5b: Gas pump manipulators steal ‘millions of dollars’ in fuel</li>
<li>(50:40) - Story # 5c: Secret Service agents warn fleets about 'fuel skimming'</li>
<li>(53:13) - Story # 6: Atlassian fixes critical Confluence hardcoded credentials flaw</li>
<li>(53:33) - Story # 6b:  Cisco fixes bug that lets attackers execute commands as root</li>
<li>(53:57) - Story # 7: New Air-Gap Attack Uses SATA Cable as an Antenna to Transfer Radio Signals</li>
</ul>]]>
      </content:encoded>
      <pubDate>Tue, 02 Aug 2022 12:17:32 -0400</pubDate>
      <author>Black Hills Information Security</author>
      <enclosure url="https://media.transistor.fm/95cd21ba/dd6b663f.mp3" length="63340927" type="audio/mpeg"/>
      <itunes:author>Black Hills Information Security</itunes:author>
      <itunes:image href="https://img.transistorcdn.com/pmlztkT8hDxN0shXvIVVvaq6yzp5-AFuce22ils1BcE/rs:fill:0:0:1/w:1400/h:1400/q:60/mb:500000/aHR0cHM6Ly9pbWct/dXBsb2FkLXByb2R1/Y3Rpb24udHJhbnNp/c3Rvci5mbS81YTRl/NTQzNDUxNmQ5NWQ1/MDE0YzZmN2JhZDA3/MmFjNy5qcGc.jpg"/>
      <itunes:duration>3800</itunes:duration>
      <itunes:summary>ORIGINALLY AIRED ON JULY 25, 2022



Articles discussed in this episode:



00:00 – BHIS – Talkin’ Bout [infosec] News 2022-07-25 



03:59 – Story # 1: DOJ seized ransoms paid by health centers in Kansas, Colorado after 2021 attacks – https://therecord.media/doj-seized-ransoms-paid-by-health-centers-in-kansas-colorado-after-2021-attacks/ 



08:38 – Story # 1b: twitter.com/cryptowhale – https://twitter.com/cryptowhale 



17:34 – Story # 2: How Conti ransomware hacked and encrypted the Costa Rican government – https://www.bleepingcomputer.com/news/security/how-conti-ransomware-hacked-and-encrypted-the-costa-rican-government/ 



22:29 – Story # 3: Experts Uncover New CloudMensis Spyware Targeting Apple macOS Users – https://thehackernews.com/2022/07/experts-uncover-new-cloudmensis-spyware.html 



36:49 – Story # 4: Google Play hides app permissions in favor of developer-written descriptions – https://arstechnica.com/gadgets/2022/07/google-plays-new-privacy-section-actually-hides-app-permissions/ 



39:09 – Story # 4b: Google is reinstating app permissions list on Play Store – https://techcrunch.com/2022/07/21/google-app-permissions-play-store/ 



41:31 – Story # 5: Hack the pump: Rising prices lead to more reports of gas theft – https://www.nbcnews.com/tech/security/hack-pump-rising-prices-lead-reports-gas-theft-rcna35198 



46:04 – Story # 5b: Gas pump manipulators steal ‘millions of dollars’ in fuel – https://youtu.be/Bcnjp2PESqw 



50:40 – Story # 5c: Secret Service agents warn fleets about ‘fuel skimming’ – https://www.ccjdigital.com/technology/article/15114890/secret-service-agents-warn-fleets-about-fuel-skimming 



53:13 – Story # 6: Atlassian fixes critical Confluence hardcoded credentials flaw – https://www.bleepingcomputer.com/news/security/atlassian-fixes-critical-confluence-hardcoded-credentials-flaw/ 



53:33 – Story # 6b: Cisco fixes bug that lets attackers execute commands as root –</itunes:summary>
      <itunes:subtitle>ORIGINALLY AIRED ON JULY 25, 2022



Articles discussed in this episode:



00:00 – BHIS – Talkin’ Bout [infosec] News 2022-07-25 



03:59 – Story # 1: DOJ seized ransoms paid by health centers in Kansas, Colorado after 2021 attacks – https://therecord.m</itunes:subtitle>
      <itunes:keywords>Infosec,Cybersecurity,news</itunes:keywords>
      <itunes:explicit>No</itunes:explicit>
      <podcast:chapters url="https://share.transistor.fm/s/95cd21ba/chapters.json" type="application/json+chapters"/>
    </item>
    <item>
      <title>Talkin’ About Infosec News – 7/18/2022</title>
      <itunes:episode>1</itunes:episode>
      <podcast:episode>1</podcast:episode>
      <itunes:title>Talkin’ About Infosec News – 7/18/2022</itunes:title>
      <itunes:episodeType>full</itunes:episodeType>
      <guid isPermaLink="false">https://www.blackhillsinfosec.com/?p=22178</guid>
      <link>https://share.transistor.fm/s/e2d69673</link>
      <description>
        <![CDATA[<p>ORIGINALLY AIRED ON JULY 18, 2022 Articles discussed in this episode: 00:00 – PreShow Banter™ — Talkin’ Bout Audio 07:23 – BHIS – Talkin’ Bout [infosec] News 2022-07-18 09:28 – […]</p>
<p>The post <a href="https://www.blackhillsinfosec.com/talkin-about-infosec-news-7-18-2022/">Talkin’ About Infosec News – 7/18/2022</a> appeared first on <a href="https://www.blackhillsinfosec.com">Black Hills Information Security</a>.</p>
<ul><li>(00:00) - PreShow Banter™ — Talkin' Bout Audio</li>
<li>(07:23) - BHIS - Talkin' Bout [infosec] News 2022-07-18</li>
<li>(09:28) - Story # 1: Russian “hacktivists” are causing trouble far beyond Ukraine</li>
<li>(12:19) - Wade Into International Relations</li>
<li>(21:25) - Story # 2: UK Info Commissioner slams use of WhatsApp by health officials during pandemic</li>
<li>(26:11) - Story # 3: Microsoft warns of massive phishing campaign that can bypass MFA</li>
<li>(31:44) - Bud Patches Reporting</li>
<li>(37:08) - Story # 4: Today I learned Amazon has a form so police can get my data without permission or a warrant</li>
<li>(48:35) - Story # 4b: San Francisco cops want real-time access to private security cameras for surveillance</li>
<li>(56:59) - Story # 5: Man Arrested After Impersonating Disney Cast Member, Stealing $10,000 ‘Star Wars’ Droid</li>
<li>(59:06) - Story # 6: Disneyland social media accounts hacked, offensive messages posted</li>
</ul>]]>
      </description>
      <content:encoded>
        <![CDATA[<p>ORIGINALLY AIRED ON JULY 18, 2022 Articles discussed in this episode: 00:00 – PreShow Banter™ — Talkin’ Bout Audio 07:23 – BHIS – Talkin’ Bout [infosec] News 2022-07-18 09:28 – […]</p>
<p>The post <a href="https://www.blackhillsinfosec.com/talkin-about-infosec-news-7-18-2022/">Talkin’ About Infosec News – 7/18/2022</a> appeared first on <a href="https://www.blackhillsinfosec.com">Black Hills Information Security</a>.</p>
<ul><li>(00:00) - PreShow Banter™ — Talkin' Bout Audio</li>
<li>(07:23) - BHIS - Talkin' Bout [infosec] News 2022-07-18</li>
<li>(09:28) - Story # 1: Russian “hacktivists” are causing trouble far beyond Ukraine</li>
<li>(12:19) - Wade Into International Relations</li>
<li>(21:25) - Story # 2: UK Info Commissioner slams use of WhatsApp by health officials during pandemic</li>
<li>(26:11) - Story # 3: Microsoft warns of massive phishing campaign that can bypass MFA</li>
<li>(31:44) - Bud Patches Reporting</li>
<li>(37:08) - Story # 4: Today I learned Amazon has a form so police can get my data without permission or a warrant</li>
<li>(48:35) - Story # 4b: San Francisco cops want real-time access to private security cameras for surveillance</li>
<li>(56:59) - Story # 5: Man Arrested After Impersonating Disney Cast Member, Stealing $10,000 ‘Star Wars’ Droid</li>
<li>(59:06) - Story # 6: Disneyland social media accounts hacked, offensive messages posted</li>
</ul>]]>
      </content:encoded>
      <pubDate>Wed, 20 Jul 2022 10:45:26 -0400</pubDate>
      <author>Black Hills Information Security</author>
      <enclosure url="https://media.transistor.fm/e2d69673/c8de3499.mp3" length="65879889" type="audio/mpeg"/>
      <itunes:author>Black Hills Information Security</itunes:author>
      <itunes:image href="https://img.transistorcdn.com/0wHAEtTYdYQJjqkV71AJBbsjtG4ql02Vge4DZ8Y1gfg/rs:fill:0:0:1/w:1400/h:1400/q:60/mb:500000/aHR0cHM6Ly9pbWct/dXBsb2FkLXByb2R1/Y3Rpb24udHJhbnNp/c3Rvci5mbS9jNmY2/MDhiNzBkZjgzZTRh/ZWI2YWUzOGQ3MTY5/N2M4Zi5qcGc.jpg"/>
      <itunes:duration>3974</itunes:duration>
      <itunes:summary>ORIGINALLY AIRED ON JULY 18, 2022



Articles discussed in this episode:



00:00 – PreShow Banter™ — Talkin’ Bout Audio 



07:23 – BHIS – Talkin’ Bout [infosec] News 2022-07-18 



09:28 – Story # 1: Russian “hacktivists” are causing trouble far beyond Ukraine – https://arstechnica.com/information-technology/2022/07/russian-hacktivists-are-causing-trouble-far-beyond-ukraine/ 



12:19 – Wade Into International Relations – https://www.theregister.com/2022/07/12/uk_department_of_health_and/ 



21:25 – Story # 2: UK Info Commissioner slams use of WhatsApp by health officials during pandemic – https://www.theregister.com/2022/07/12/uk_department_of_health_and/ 



26:11 – Story # 3: Microsoft warns of massive phishing campaign that can bypass MFA – https://www.siliconrepublic.com/enterprise/microsoft-phishing-campaign-mfa 



31:44 – Bud Patches Reporting 



37:08 – Story # 4: Today I learned Amazon has a form so police can get my data without permission or a warrant – https://www.theverge.com/2022/7/14/23219419/amazon-ring-law-enforcement-no-warrant-no-consent 



48:35 – Story # 4b: San Francisco cops want real-time access to private security cameras for surveillance – https://www.theregister.com/2022/07/11/san_francisco_police_private_security_cameras/ 



56:59 – Story # 5: Man Arrested After Impersonating Disney Cast Member, Stealing $10,000 ‘Star Wars’ Droid – https://popcrush.com/man-arreste-impersonated-disney-worker-steals-r2d2-droid/ 



59:06 – Story # 6: Disneyland social media accounts hacked, offensive messages posted – https://www.bitdefender.com/blog/hotforsecurity/disneyland-social-media-accounts-hacked-offensive-messages-posted/
















We are self-publishing free Infosec Zines called PROMPT#.  



PROMPT# will contain: 

Infosec articles 
Challenging puzzles 
Comic book based on real-life hacking adventures 
Coloring contests 
Bonus Backdoors &amp;amp; Breaches Consultant Cards (print version only) 
Other stuffs 

You can check out current and upcoming issues here: </itunes:summary>
      <itunes:subtitle>ORIGINALLY AIRED ON JULY 18, 2022



Articles discussed in this episode:



00:00 – PreShow Banter™ — Talkin’ Bout Audio 



07:23 – BHIS – Talkin’ Bout [infosec] News 2022-07-18 



09:28 – Story # 1: Russian “hacktivists” are causing trouble far beyond </itunes:subtitle>
      <itunes:keywords>Infosec,Cybersecurity,news</itunes:keywords>
      <itunes:explicit>No</itunes:explicit>
      <podcast:chapters url="https://share.transistor.fm/s/e2d69673/chapters.json" type="application/json+chapters"/>
    </item>
    <item>
      <title>Talkin’ About Infosec News – 7/11/2022</title>
      <itunes:episode>1</itunes:episode>
      <podcast:episode>1</podcast:episode>
      <itunes:title>Talkin’ About Infosec News – 7/11/2022</itunes:title>
      <itunes:episodeType>full</itunes:episodeType>
      <guid isPermaLink="false">https://www.blackhillsinfosec.com/?p=22065</guid>
      <link>https://share.transistor.fm/s/3be032ec</link>
      <description>
        <![CDATA[<p>ORIGINALLY AIRED ON JULY 11, 2022 Articles discussed in this episode: 00:00 – PreShow Banter™ — Cons, China, and Florida Man, oh my! 07:03 – Story # 1: North Korean […]</p>
<p>The post <a href="https://www.blackhillsinfosec.com/talkin-about-infosec-news-7-11-2022/">Talkin’ About Infosec News – 7/11/2022</a> appeared first on <a href="https://www.blackhillsinfosec.com">Black Hills Information Security</a>.</p>
<ul><li>(00:00) - PreShow Banter™ — Cons, China, and Florida Man, oh my!</li>
<li>(02:37) - BHIS - Talkin' Bout [infosec] News 2022-07-11</li>
<li>(07:03) - Story # 1: North Korean Hackers Target US Health Providers With 'Maui' Ransomware</li>
<li>(10:29) - Story # 2: Ransomware, hacking groups move from Cobalt Strike to Brute Ratel</li>
<li>(24:24) - Story # 3: DoD issues call for hackers to dig into networks</li>
<li>(29:21) - Story # 3b: Department of Justice Announces New Policy for Charging Cases under the Computer Fraud and Abuse Act</li>
<li>(33:15) - Story # 4: FCC Commissioner urges Google and Apple to ban TikTok</li>
<li>(41:41) - Story # 5: Microsoft rolls back decision to block Office macros by default</li>
<li>(42:01) - Story # 5b: Microsoft says decision to stop blocking Office VBA macros by default is ‘temporary’</li>
</ul>]]>
      </description>
      <content:encoded>
        <![CDATA[<p>ORIGINALLY AIRED ON JULY 11, 2022 Articles discussed in this episode: 00:00 – PreShow Banter™ — Cons, China, and Florida Man, oh my! 07:03 – Story # 1: North Korean […]</p>
<p>The post <a href="https://www.blackhillsinfosec.com/talkin-about-infosec-news-7-11-2022/">Talkin’ About Infosec News – 7/11/2022</a> appeared first on <a href="https://www.blackhillsinfosec.com">Black Hills Information Security</a>.</p>
<ul><li>(00:00) - PreShow Banter™ — Cons, China, and Florida Man, oh my!</li>
<li>(02:37) - BHIS - Talkin' Bout [infosec] News 2022-07-11</li>
<li>(07:03) - Story # 1: North Korean Hackers Target US Health Providers With 'Maui' Ransomware</li>
<li>(10:29) - Story # 2: Ransomware, hacking groups move from Cobalt Strike to Brute Ratel</li>
<li>(24:24) - Story # 3: DoD issues call for hackers to dig into networks</li>
<li>(29:21) - Story # 3b: Department of Justice Announces New Policy for Charging Cases under the Computer Fraud and Abuse Act</li>
<li>(33:15) - Story # 4: FCC Commissioner urges Google and Apple to ban TikTok</li>
<li>(41:41) - Story # 5: Microsoft rolls back decision to block Office macros by default</li>
<li>(42:01) - Story # 5b: Microsoft says decision to stop blocking Office VBA macros by default is ‘temporary’</li>
</ul>]]>
      </content:encoded>
      <pubDate>Fri, 15 Jul 2022 10:14:50 -0400</pubDate>
      <author>Black Hills Information Security</author>
      <enclosure url="https://media.transistor.fm/3be032ec/2c9b4ee1.mp3" length="60558136" type="audio/mpeg"/>
      <itunes:author>Black Hills Information Security</itunes:author>
      <itunes:image href="https://img.transistorcdn.com/iODh30AVsL5XZ6W7a046VudInak9cpXKgzWkG-aK_Uw/rs:fill:0:0:1/w:1400/h:1400/q:60/mb:500000/aHR0cHM6Ly9pbWct/dXBsb2FkLXByb2R1/Y3Rpb24udHJhbnNp/c3Rvci5mbS80ZDYz/YjYwYjc3MGEwZDY0/MTY4YjA2Zjg2OTQx/MDg5Yy5qcGc.jpg"/>
      <itunes:duration>3658</itunes:duration>
      <itunes:summary>ORIGINALLY AIRED ON JULY 11, 2022



Articles discussed in this episode:



00:00 – PreShow Banter™ — Cons, China, and Florida Man, oh my! 



07:03 – Story # 1: North Korean Hackers Target US Health Providers With ‘Maui’ Ransomware – https://www.infosecurity-magazine.com/news/north-korea-us-maui-ransomware/ 



10:29 – Story # 2: Ransomware, hacking groups move from Cobalt Strike to Brute Ratel – https://www.bleepingcomputer.com/news/security/ransomware-hacking-groups-move-from-cobalt-strike-to-brute-ratel/ 



24:24 – Story # 3: DoD issues call for hackers to dig into networks – https://therecord.media/dod-issues-call-for-hackers-to-dig-into-networks/ 



29:21 – Story # 3b: Department of Justice Announces New Policy for Charging Cases under the Computer Fraud and Abuse Act – https://www.justice.gov/opa/pr/department-justice-announces-new-policy-charging-cases-under-computer-fraud-and-abuse-act 



33:15 – Story # 4: FCC Commissioner urges Google and Apple to ban TikTok – https://www.engadget.com/fcc-commissioner-google-facebook-ban-tik-tok-064559992.html 



41:41 – Story # 5: Microsoft rolls back decision to block Office macros by default – https://www.bleepingcomputer.com/news/microsoft/microsoft-rolls-back-decision-to-block-office-macros-by-default/ 



42:01 – Story # 5b: Microsoft says decision to stop blocking Office VBA macros by default is ‘temporary’ – https://therecord.media/microsoft-says-decision-to-stop-blocking-office-vba-macros-by-default-is-temporary/
















We are self-publishing free Infosec Zines called PROMPT#.  



PROMPT# will contain: 

Infosec articles 
Challenging puzzles 
Comic book based on real-life hacking adventures 
Coloring contests 
Bonus Backdoors &amp;amp; Breaches Consultant Cards (print version only) 
Other stuffs 

You can check out current and upcoming issues here: https://www.blackhillsinfosec.com/prompt-zine/ </itunes:summary>
      <itunes:subtitle>ORIGINALLY AIRED ON JULY 11, 2022



Articles discussed in this episode:



00:00 – PreShow Banter™ — Cons, China, and Florida Man, oh my! 



07:03 – Story # 1: North Korean Hackers Target US Health Providers With ‘Maui’ Ransomware – https://www.infosecu</itunes:subtitle>
      <itunes:keywords>Infosec,Cybersecurity,news</itunes:keywords>
      <itunes:explicit>No</itunes:explicit>
      <podcast:chapters url="https://share.transistor.fm/s/3be032ec/chapters.json" type="application/json+chapters"/>
    </item>
    <item>
      <title>Talkin’ About Infosec News – 6/27/2022</title>
      <itunes:episode>1</itunes:episode>
      <podcast:episode>1</podcast:episode>
      <itunes:title>Talkin’ About Infosec News – 6/27/2022</itunes:title>
      <itunes:episodeType>full</itunes:episodeType>
      <guid isPermaLink="false">https://www.blackhillsinfosec.com/?p=21922</guid>
      <link>https://share.transistor.fm/s/5a1dfabe</link>
      <description>
        <![CDATA[<p>ORIGINALLY AIRED ON JUNE 27, 2022 Articles discussed in this episode: 02:13 – Story # 1: The #1 Period Tracker on the App Store Will Hand Over Data Without a […]</p>
<p>The post <a href="https://www.blackhillsinfosec.com/talkin-about-infosec-news-6-27-2022/">Talkin’ About Infosec News – 6/27/2022</a> appeared first on <a href="https://www.blackhillsinfosec.com">Black Hills Information Security</a>.</p>
<ul><li>(00:00) - BHIS - Talkin' Bout [infosec] News 2022-06-27</li>
<li>(02:13) - Story # 1: The #1 Period Tracker on the App Store Will Hand Over Data Without a Warrant</li>
<li>(20:56) - Story # 2: LockBit 3.0 introduces the first ransomware bug bounty program</li>
<li>(25:44) - Story # 3: Former AWS engineer convicted over hack that cost Capital One $270m</li>
<li>(28:52) - Story # 4: CISA experts propose ‘311’ cybersecurity emergency call line for small businesses</li>
<li>(38:25) - Story # 5: Clever phishing method bypasses MFA using Microsoft WebView2 apps</li>
<li>(40:00) - Story # 5b: mrd0x/WebView2-Cookie-Stealer</li>
<li>(43:28) - Story # 6: Game on! The 2022 Google CTF is here</li>
<li>(46:07) - Story # 7: Critical PHP flaw exposes QNAP NAS devices to RCE attacks</li>
<li>(50:03) - Story # 8: Japanese man loses USB stick with entire city's personal details</li>
<li>(54:51) - Story # 9: A Microsoft 365 feature can ransom files on SharePoint and OneDriveCould</li>
</ul>]]>
      </description>
      <content:encoded>
        <![CDATA[<p>ORIGINALLY AIRED ON JUNE 27, 2022 Articles discussed in this episode: 02:13 – Story # 1: The #1 Period Tracker on the App Store Will Hand Over Data Without a […]</p>
<p>The post <a href="https://www.blackhillsinfosec.com/talkin-about-infosec-news-6-27-2022/">Talkin’ About Infosec News – 6/27/2022</a> appeared first on <a href="https://www.blackhillsinfosec.com">Black Hills Information Security</a>.</p>
<ul><li>(00:00) - BHIS - Talkin' Bout [infosec] News 2022-06-27</li>
<li>(02:13) - Story # 1: The #1 Period Tracker on the App Store Will Hand Over Data Without a Warrant</li>
<li>(20:56) - Story # 2: LockBit 3.0 introduces the first ransomware bug bounty program</li>
<li>(25:44) - Story # 3: Former AWS engineer convicted over hack that cost Capital One $270m</li>
<li>(28:52) - Story # 4: CISA experts propose ‘311’ cybersecurity emergency call line for small businesses</li>
<li>(38:25) - Story # 5: Clever phishing method bypasses MFA using Microsoft WebView2 apps</li>
<li>(40:00) - Story # 5b: mrd0x/WebView2-Cookie-Stealer</li>
<li>(43:28) - Story # 6: Game on! The 2022 Google CTF is here</li>
<li>(46:07) - Story # 7: Critical PHP flaw exposes QNAP NAS devices to RCE attacks</li>
<li>(50:03) - Story # 8: Japanese man loses USB stick with entire city's personal details</li>
<li>(54:51) - Story # 9: A Microsoft 365 feature can ransom files on SharePoint and OneDriveCould</li>
</ul>]]>
      </content:encoded>
      <pubDate>Thu, 30 Jun 2022 11:09:24 -0400</pubDate>
      <author>Black Hills Information Security</author>
      <enclosure url="https://media.transistor.fm/5a1dfabe/65c3a02c.mp3" length="45255421" type="audio/mpeg"/>
      <itunes:author>Black Hills Information Security</itunes:author>
      <itunes:image href="https://img.transistorcdn.com/sUvLxIGAurOel_3nMJ0wb1hYQiLzN3WnBeh0gEXbG3k/rs:fill:0:0:1/w:1400/h:1400/q:60/mb:500000/aHR0cHM6Ly9pbWct/dXBsb2FkLXByb2R1/Y3Rpb24udHJhbnNp/c3Rvci5mbS9lNmUy/ZDJlZDUyNjVkMmQ5/NTQ1YWFhOThkMDFl/YTFjNy5qcGc.jpg"/>
      <itunes:duration>3558</itunes:duration>
      <itunes:summary>ORIGINALLY AIRED ON JUNE 27, 2022



Articles discussed in this episode:



02:13 – Story # 1: The #1 Period Tracker on the App Store Will Hand Over Data Without a Warrant – https://www.vice.com/en/article/y3pgvg/the-1-period-tracker-on-the-app-store-will-hand-over-data-without-a-warrant 



20:56 – Story # 2: LockBit 3.0 introduces the first ransomware bug bounty program – https://www.bleepingcomputer.com/news/security/lockbit-30-introduces-the-first-ransomware-bug-bounty-program/ 



25:44 – Story # 3: Former AWS engineer convicted over hack that cost Capital One $270m – https://techmonitor.ai/technology/cybersecurity/capital-one-hack-aws-paige-thompson 



28:52 – Story # 4: CISA experts propose ‘311’ cybersecurity emergency call line for small businesses – https://therecord.media/cisa-experts-propose-311-cybersecurity-emergency-call-line-for-small-businesses/ 



38:25 – Story # 5: Clever phishing method bypasses MFA using Microsoft WebView2 apps – https://www.bleepingcomputer.com/news/security/clever-phishing-method-bypasses-mfa-using-microsoft-webview2-apps/ 



40:00 – Story # 5b: mrd0x/WebView2-Cookie-Stealer – https://github.com/mrd0x/WebView2-Cookie-Stealer 



43:28 – Story # 6: Game on! The 2022 Google CTF is here – https://security.googleblog.com/2022/06/game-on-2022-google-ctf-is-here.html 



46:07 – Story # 7: Critical PHP flaw exposes QNAP NAS devices to RCE attacks – https://www.bleepingcomputer.com/news/security/critical-php-flaw-exposes-qnap-nas-devices-to-rce-attacks/ 



50:03 – Story # 8: Japanese man loses USB stick with entire city’s personal details – https://www.bbc.com/news/world-asia-61921222 



54:51 – Story # 9: A Microsoft 365 feature can ransom files on SharePoint and OneDriveCould – https://securityaffairs.co/wordpress/132353/hacking/microsoft-365-feature-ransomware.html
















We are self-publishing free Infosec Zines called PROMPT#.</itunes:summary>
      <itunes:subtitle>ORIGINALLY AIRED ON JUNE 27, 2022



Articles discussed in this episode:



02:13 – Story # 1: The #1 Period Tracker on the App Store Will Hand Over Data Without a Warrant – https://www.vice.com/en/article/y3pgvg/the-1-period-tracker-on-the-app-store-will</itunes:subtitle>
      <itunes:keywords>Infosec,Cybersecurity,news</itunes:keywords>
      <itunes:explicit>No</itunes:explicit>
      <podcast:chapters url="https://share.transistor.fm/s/5a1dfabe/chapters.json" type="application/json+chapters"/>
    </item>
    <item>
      <title>Talkin’ About Infosec News – 6/20/2022</title>
      <itunes:episode>1</itunes:episode>
      <podcast:episode>1</podcast:episode>
      <itunes:title>Talkin’ About Infosec News – 6/20/2022</itunes:title>
      <itunes:episodeType>full</itunes:episodeType>
      <guid isPermaLink="false">https://www.blackhillsinfosec.com/?p=21667</guid>
      <link>https://share.transistor.fm/s/6c927f2a</link>
      <description>
        <![CDATA[<p>ORIGINALLY AIRED ON JUNE 20, 2022 Articles discussed in this episode: 00:00 – BHIS – Talkin’ Bout [infosec] News 2022-06-20 01:31 – Story # 1: Internal TikTok Meetings Shows That […]</p>
<p>The post <a href="https://www.blackhillsinfosec.com/talkin-about-infosec-news-6-20-2022/">Talkin’ About Infosec News – 6/20/2022</a> appeared first on <a href="https://www.blackhillsinfosec.com">Black Hills Information Security</a>.</p>
<ul><li>(00:00) - BHIS - Talkin' Bout [infosec] News 2022-06-20</li>
<li>(01:31) - Story # 1: Internal TikTok Meetings Shows That US User Data Accessed From China</li>
<li>(05:14) - Story # 2: Mullvad VPN Removes Ability to Create New Subscriptions</li>
<li>(09:23) - Story # 3: Flagstar Bank discloses data breach impacting 1.5 million customers</li>
<li>(13:25) - Story # 4: Russia-linked APT targets Ukraine by exploiting the Follina RCE vulnerability</li>
<li>(17:39) - Story # 5: Tesla cars barred for 2 months in Beidaihe, site of China leadership meet</li>
<li>(20:18) - Story # 6: Microsoft 365 credentials targeted in new fake voicemail campaign</li>
<li>(22:27) - Bud Patches Reporting with Dancing John Strand.</li>
<li>(27:19) - Story # 7: FBI says fraud on LinkedIn a ‘significant threat’ to platform and consumers</li>
<li>(30:04) - Story # 8: Cloudflare Saw Record-Breaking DDoS Attack Peaking at 26 Million Request Per Second</li>
<li>(33:22) - Story # 9: Critical Code Execution Vulnerability Patched in Splunk Enterprise</li>
<li>(35:53) - Story # 10: Google AI Reprise</li>
<li>(37:43) - Story # 11: RSA was a Covid Superspreader event.</li>
<li>(42:03) - Story # 12: Facebook Is Receiving Sensitive Medical Information from Hospital Websites</li>
<li>(43:58) - Story # 12b: 18 HIPAA Identifiers</li>
</ul>]]>
      </description>
      <content:encoded>
        <![CDATA[<p>ORIGINALLY AIRED ON JUNE 20, 2022 Articles discussed in this episode: 00:00 – BHIS – Talkin’ Bout [infosec] News 2022-06-20 01:31 – Story # 1: Internal TikTok Meetings Shows That […]</p>
<p>The post <a href="https://www.blackhillsinfosec.com/talkin-about-infosec-news-6-20-2022/">Talkin’ About Infosec News – 6/20/2022</a> appeared first on <a href="https://www.blackhillsinfosec.com">Black Hills Information Security</a>.</p>
<ul><li>(00:00) - BHIS - Talkin' Bout [infosec] News 2022-06-20</li>
<li>(01:31) - Story # 1: Internal TikTok Meetings Shows That US User Data Accessed From China</li>
<li>(05:14) - Story # 2: Mullvad VPN Removes Ability to Create New Subscriptions</li>
<li>(09:23) - Story # 3: Flagstar Bank discloses data breach impacting 1.5 million customers</li>
<li>(13:25) - Story # 4: Russia-linked APT targets Ukraine by exploiting the Follina RCE vulnerability</li>
<li>(17:39) - Story # 5: Tesla cars barred for 2 months in Beidaihe, site of China leadership meet</li>
<li>(20:18) - Story # 6: Microsoft 365 credentials targeted in new fake voicemail campaign</li>
<li>(22:27) - Bud Patches Reporting with Dancing John Strand.</li>
<li>(27:19) - Story # 7: FBI says fraud on LinkedIn a ‘significant threat’ to platform and consumers</li>
<li>(30:04) - Story # 8: Cloudflare Saw Record-Breaking DDoS Attack Peaking at 26 Million Request Per Second</li>
<li>(33:22) - Story # 9: Critical Code Execution Vulnerability Patched in Splunk Enterprise</li>
<li>(35:53) - Story # 10: Google AI Reprise</li>
<li>(37:43) - Story # 11: RSA was a Covid Superspreader event.</li>
<li>(42:03) - Story # 12: Facebook Is Receiving Sensitive Medical Information from Hospital Websites</li>
<li>(43:58) - Story # 12b: 18 HIPAA Identifiers</li>
</ul>]]>
      </content:encoded>
      <pubDate>Fri, 24 Jun 2022 17:48:38 -0400</pubDate>
      <author>Black Hills Information Security</author>
      <enclosure url="https://media.transistor.fm/6c927f2a/6153f39f.mp3" length="36669589" type="audio/mpeg"/>
      <itunes:author>Black Hills Information Security</itunes:author>
      <itunes:image href="https://img.transistorcdn.com/zHWwaEDhUrYP9_2lLearLyrNrrDSbFCGXk5N1ZlvKHw/rs:fill:0:0:1/w:1400/h:1400/q:60/mb:500000/aHR0cHM6Ly9pbWct/dXBsb2FkLXByb2R1/Y3Rpb24udHJhbnNp/c3Rvci5mbS84NjNk/MTgxNDM5ODRiZTlk/MzRlMjc0MjQyOTVl/ZjA3Ny5qcGc.jpg"/>
      <itunes:duration>2771</itunes:duration>
      <itunes:summary>ORIGINALLY AIRED ON JUNE 20, 2022



Articles discussed in this episode:



00:00 – BHIS – Talkin’ Bout [infosec] News 2022-06-20 



01:31 – Story # 1: Internal TikTok Meetings Shows That US User Data Accessed From China – https://www.buzzfeednews.com/article/emilybakerwhite/tiktok-tapes-us-user-data-china-bytedance-access 



05:14 – Story # 2: Mullvad VPN Removes Ability to Create New Subscriptions – https://www.pcmag.com/news/mullvad-vpn-removes-ability-to-create-new-subscriptions 



09:23 – Story # 3: Flagstar Bank discloses data breach impacting 1.5 million customers – https://www.bleepingcomputer.com/news/security/flagstar-bank-discloses-data-breach-impacting-15-million-customers/ 



13:25 – Story # 4: Russia-linked APT targets Ukraine by exploiting the Follina RCE vulnerability – https://securityaffairs.co/wordpress/132227/apt/cert-ua-sandworm-follina-rce.html 



17:39 – Story # 5: Tesla cars barred for 2 months in Beidaihe, site of China leadership meet – https://www.reuters.com/business/autos-transportation/chinas-beidaihe-district-bar-tesla-cars-driving-july-local-police-2022-06-20/ 



20:18 – Story # 6: Microsoft 365 credentials targeted in new fake voicemail campaign – https://www.bleepingcomputer.com/news/security/microsoft-365-credentials-targeted-in-new-fake-voicemail-campaign/ 



22:27 – Bud Patches Reporting with Dancing John Strand 



27:19 – Story # 7: FBI says fraud on LinkedIn a ‘significant threat’ to platform and consumers – https://www.cnbc.com/2022/06/17/fbi-says-fraud-on-linkedin-a-significant-threat-to-platform-and-consumers.html 



30:04 – Story # 8: Cloudflare Saw Record-Breaking DDoS Attack Peaking at 26 Million Request Per Second – https://thehackernews.com/2022/06/cloudflare-saw-record-breaking-ddos.html 



33:22 – Story # 9: Critical Code Execution Vulnerability Patched in Splunk Enterprise – https://www.securityweek.com/critical-code-execution-vulnerability-patched-splunk-enterprise 



35:53 – Story # 10: Google AI Reprise</itunes:summary>
      <itunes:subtitle>ORIGINALLY AIRED ON JUNE 20, 2022



Articles discussed in this episode:



00:00 – BHIS – Talkin’ Bout [infosec] News 2022-06-20 



01:31 – Story # 1: Internal TikTok Meetings Shows That US User Data Accessed From China – https://www.buzzfeednews.com/ar</itunes:subtitle>
      <itunes:keywords>Infosec,Cybersecurity,news</itunes:keywords>
      <itunes:explicit>No</itunes:explicit>
      <podcast:chapters url="https://share.transistor.fm/s/6c927f2a/chapters.json" type="application/json+chapters"/>
    </item>
    <item>
      <title>Talkin’ About Infosec News – 6/13/2022</title>
      <itunes:episode>1</itunes:episode>
      <podcast:episode>1</podcast:episode>
      <itunes:title>Talkin’ About Infosec News – 6/13/2022</itunes:title>
      <itunes:episodeType>full</itunes:episodeType>
      <guid isPermaLink="false">https://www.blackhillsinfosec.com/?p=21588</guid>
      <link>https://share.transistor.fm/s/3ec8c71c</link>
      <description>
        <![CDATA[<p>ORIGINALLY AIRED ON JUNE 13, 2022 Articles discussed in this episode: 00:00 – BHIS – Talkin’ Bout [infosec] News 2022-06-13 02:26 – Story # 1: Roblox Game Pass store used […]</p>
<p>The post <a href="https://www.blackhillsinfosec.com/talkin-about-infosec-news-6-13-2022/">Talkin’ About Infosec News – 6/13/2022</a> appeared first on <a href="https://www.blackhillsinfosec.com">Black Hills Information Security</a>.</p>
<ul><li>(00:00) - BHIS - Talkin' Bout [infosec] News 2022-06-13</li>
<li>(02:26) - Story # 1: Roblox Game Pass store used to sell ransomware decryptor</li>
<li>(07:35) - Story # 2: New Jersey school district forced to cancel final exams amid ransomware recovery effort</li>
<li>(10:31) - Story # 3: Security Fixes Won't Require Full iOS Update in iOS 16, Will Be Installed Automatically</li>
<li>(15:08) - Story # 4: Gone in 130 seconds: New Tesla hack gives thieves their own personal key</li>
<li>(20:07) - Story # 5: DuckDuckGo browser allows Microsoft trackers due to search agreement</li>
<li>(30:44) - Story # 6: Apple demos Safari’s ‘passkeys’ support in macOS Ventura that will help bring an end to passwords</li>
<li>(38:34) - Story # 6: Mass Account Takeover in the Yunmai smart scale API</li>
<li>(42:27) - Story # 7: Credentials for thousands of open source projects free for the taking—again!</li>
<li>(48:09) - Story # 8: Internet Explorer (almost) breathes its final byte on Wednesday</li>
<li>(55:28) - Story # 9: Google suspends engineer who claims its AI is sentient</li>
</ul>]]>
      </description>
      <content:encoded>
        <![CDATA[<p>ORIGINALLY AIRED ON JUNE 13, 2022 Articles discussed in this episode: 00:00 – BHIS – Talkin’ Bout [infosec] News 2022-06-13 02:26 – Story # 1: Roblox Game Pass store used […]</p>
<p>The post <a href="https://www.blackhillsinfosec.com/talkin-about-infosec-news-6-13-2022/">Talkin’ About Infosec News – 6/13/2022</a> appeared first on <a href="https://www.blackhillsinfosec.com">Black Hills Information Security</a>.</p>
<ul><li>(00:00) - BHIS - Talkin' Bout [infosec] News 2022-06-13</li>
<li>(02:26) - Story # 1: Roblox Game Pass store used to sell ransomware decryptor</li>
<li>(07:35) - Story # 2: New Jersey school district forced to cancel final exams amid ransomware recovery effort</li>
<li>(10:31) - Story # 3: Security Fixes Won't Require Full iOS Update in iOS 16, Will Be Installed Automatically</li>
<li>(15:08) - Story # 4: Gone in 130 seconds: New Tesla hack gives thieves their own personal key</li>
<li>(20:07) - Story # 5: DuckDuckGo browser allows Microsoft trackers due to search agreement</li>
<li>(30:44) - Story # 6: Apple demos Safari’s ‘passkeys’ support in macOS Ventura that will help bring an end to passwords</li>
<li>(38:34) - Story # 6: Mass Account Takeover in the Yunmai smart scale API</li>
<li>(42:27) - Story # 7: Credentials for thousands of open source projects free for the taking—again!</li>
<li>(48:09) - Story # 8: Internet Explorer (almost) breathes its final byte on Wednesday</li>
<li>(55:28) - Story # 9: Google suspends engineer who claims its AI is sentient</li>
</ul>]]>
      </content:encoded>
      <pubDate>Wed, 22 Jun 2022 12:13:00 -0400</pubDate>
      <author>Black Hills Information Security</author>
      <enclosure url="https://media.transistor.fm/3ec8c71c/29179093.mp3" length="60896204" type="audio/mpeg"/>
      <itunes:author>Black Hills Information Security</itunes:author>
      <itunes:image href="https://img.transistorcdn.com/DNHAlg7zG_srGzDfDHvrqFWqo1rO7lauM16u6-D5cks/rs:fill:0:0:1/w:1400/h:1400/q:60/mb:500000/aHR0cHM6Ly9pbWct/dXBsb2FkLXByb2R1/Y3Rpb24udHJhbnNp/c3Rvci5mbS84ODg1/OTA0NTVjNThhYWIz/YTk3ZWEzNDAzYTMx/ZDNhYS5qcGc.jpg"/>
      <itunes:duration>3660</itunes:duration>
      <itunes:summary>ORIGINALLY AIRED ON JUNE 13, 2022



Articles discussed in this episode:



00:00 – BHIS – Talkin’ Bout [infosec] News 2022-06-13 



02:26 – Story # 1: Roblox Game Pass store used to sell ransomware decryptor – https://www.bleepingcomputer.com/news/security/roblox-game-pass-store-used-to-sell-ransomware-decryptor/ 



07:35 – Story # 2: New Jersey school district forced to cancel final exams amid ransomware recovery effort – https://therecord.media/new-jersey-school-district-forced-to-cancel-final-exams-amid-ransomware-recovery-effort/ 



10:31 – Story # 3: Security Fixes Won’t Require Full iOS Update in iOS 16, Will Be Installed Automatically – https://www.macrumors.com/2022/06/06/ios-16-security-fixes-automatic/ 



15:08 – Story # 4: Gone in 130 seconds: New Tesla hack gives thieves their own personal key – https://arstechnica.com/information-technology/2022/06/hackers-out-to-steal-a-tesla-can-create-their-very-own-personal-key/ 



20:07 – Story # 5: DuckDuckGo browser allows Microsoft trackers due to search agreement – https://www.bleepingcomputer.com/news/security/duckduckgo-browser-allows-microsoft-trackers-due-to-search-agreement/ 



30:44 – Story # 6: Apple demos Safari’s ‘passkeys’ support in macOS Ventura that will help bring an end to passwords – https://www.theverge.com/2022/6/6/23156786/apple-passkey-passwordless-sign-in-safari-macos-ventura-wwdc 



38:34 – Story # 7: Mass Account Takeover in the Yunmai smart scale API – https://www.cardiff.ac.uk/news/view/2626497-scientists-create-new-method-to-kill-cyberattacks-in-less-than-a-second 



42:27 – Story # 8: Credentials for thousands of open source projects free for the taking—again! – https://arstechnica.com/information-technology/2022/06/credentials-for-thousands-of-open-source-projects-free-for-the-taking-again/ 



48:09 – Story # 9: Internet Explorer (almost) breathes its final byte on Wednesday – https://www.bleepingcomputer.</itunes:summary>
      <itunes:subtitle>ORIGINALLY AIRED ON JUNE 13, 2022



Articles discussed in this episode:



00:00 – BHIS – Talkin’ Bout [infosec] News 2022-06-13 



02:26 – Story # 1: Roblox Game Pass store used to sell ransomware decryptor – https://www.bleepingcomputer.com/news/secur</itunes:subtitle>
      <itunes:keywords>Infosec,Cybersecurity,news</itunes:keywords>
      <itunes:explicit>No</itunes:explicit>
      <podcast:chapters url="https://share.transistor.fm/s/3ec8c71c/chapters.json" type="application/json+chapters"/>
    </item>
    <item>
      <title>Talkin’ About Infosec News – 6/6/2022</title>
      <itunes:episode>1</itunes:episode>
      <podcast:episode>1</podcast:episode>
      <itunes:title>Talkin’ About Infosec News – 6/6/2022</itunes:title>
      <itunes:episodeType>full</itunes:episodeType>
      <guid isPermaLink="false">https://www.blackhillsinfosec.com/?p=21581</guid>
      <link>https://share.transistor.fm/s/ba123dae</link>
      <description>
        <![CDATA[<p>ORIGINALLY AIRED ON JUNE 6, 2022 Articles discussed in this episode: 00:00 – PreShow Banter™ — Boat Facts 01:38 – BHIS – Talkin’ Bout [infosec] News 2022-06-06 03:51 – Story […]</p>
<p>The post <a href="https://www.blackhillsinfosec.com/talkin-about-infosec-news-6-6-2022/">Talkin’ About Infosec News – 6/6/2022</a> appeared first on <a href="https://www.blackhillsinfosec.com">Black Hills Information Security</a>.</p>
<ul><li>(00:00) - PreShow Banter™ — Boat Facts</li>
<li>(01:38) - BHIS - Talkin' Bout [infosec] News 2022-06-06</li>
<li>(03:51) - Story # 1: Elon Musk threatens to scrap Twitter deal</li>
<li>(07:04) - Story # 2: Confluence Server and Data Center CVE</li>
<li>(13:55) - Story # 3: Mandiant: “No evidence” we were hacked by LockBit ransomware</li>
<li>(18:29) - Story # 4: Fake Windows exploits target infosec community with Cobalt Strike</li>
<li>(27:37) - Story # 5: Hacker Steals Database of Hundreds of Verizon Employees</li>
<li>(36:14) - Story # 6: India Flights grounded after SpiceJet hit with ransomware</li>
<li>(40:40) - Story # 7: Zero-Click Zoom Bug Allows Code Execution Just by Sending a Message</li>
<li>(42:15) - Story # 7b: Zoom's Bug Bounty Programs Soar to $1.8M</li>
<li>(45:29) - Story # 8: Twitter pays $150M fine for using two-factor login details to target ads</li>
<li>(49:27) - Story # 9: Microsoft finds severe bugs in Android apps from large mobile providers</li>
</ul>]]>
      </description>
      <content:encoded>
        <![CDATA[<p>ORIGINALLY AIRED ON JUNE 6, 2022 Articles discussed in this episode: 00:00 – PreShow Banter™ — Boat Facts 01:38 – BHIS – Talkin’ Bout [infosec] News 2022-06-06 03:51 – Story […]</p>
<p>The post <a href="https://www.blackhillsinfosec.com/talkin-about-infosec-news-6-6-2022/">Talkin’ About Infosec News – 6/6/2022</a> appeared first on <a href="https://www.blackhillsinfosec.com">Black Hills Information Security</a>.</p>
<ul><li>(00:00) - PreShow Banter™ — Boat Facts</li>
<li>(01:38) - BHIS - Talkin' Bout [infosec] News 2022-06-06</li>
<li>(03:51) - Story # 1: Elon Musk threatens to scrap Twitter deal</li>
<li>(07:04) - Story # 2: Confluence Server and Data Center CVE</li>
<li>(13:55) - Story # 3: Mandiant: “No evidence” we were hacked by LockBit ransomware</li>
<li>(18:29) - Story # 4: Fake Windows exploits target infosec community with Cobalt Strike</li>
<li>(27:37) - Story # 5: Hacker Steals Database of Hundreds of Verizon Employees</li>
<li>(36:14) - Story # 6: India Flights grounded after SpiceJet hit with ransomware</li>
<li>(40:40) - Story # 7: Zero-Click Zoom Bug Allows Code Execution Just by Sending a Message</li>
<li>(42:15) - Story # 7b: Zoom's Bug Bounty Programs Soar to $1.8M</li>
<li>(45:29) - Story # 8: Twitter pays $150M fine for using two-factor login details to target ads</li>
<li>(49:27) - Story # 9: Microsoft finds severe bugs in Android apps from large mobile providers</li>
</ul>]]>
      </content:encoded>
      <pubDate>Tue, 21 Jun 2022 14:30:00 -0400</pubDate>
      <author>Black Hills Information Security</author>
      <enclosure url="https://media.transistor.fm/ba123dae/bc98d88f.mp3" length="57910987" type="audio/mpeg"/>
      <itunes:author>Black Hills Information Security</itunes:author>
      <itunes:image href="https://img.transistorcdn.com/GGmNBWnMoPL2r08nemBkFrXSWNIxqrRDQgdtdyNnrnc/rs:fill:0:0:1/w:1400/h:1400/q:60/mb:500000/aHR0cHM6Ly9pbWct/dXBsb2FkLXByb2R1/Y3Rpb24udHJhbnNp/c3Rvci5mbS80MGY5/NTliZDNhMjBkZGUy/MDY5YWViMjhkYTFj/ODNmYi5qcGc.jpg"/>
      <itunes:duration>3453</itunes:duration>
      <itunes:summary>ORIGINALLY AIRED ON JUNE 6, 2022



Articles discussed in this episode:



00:00 – PreShow Banter™ — Boat Facts 



01:38 – BHIS – Talkin’ Bout [infosec] News 2022-06-06 



03:51 – Story # 1: Elon Musk threatens to scrap Twitter deal – https://www.theverge.com/2022/6/6/23156233/elon-musk-twitter-bots-merger-agreement-termination-threat 



07:02 – Story # 2: Confluence Server and Data Center CVE – https://github.com/Nwqda/CVE-2022-26134 



13:51 – Story # 3: Mandiant: “No evidence” we were hacked by LockBit ransomware – https://www.bleepingcomputer.com/news/security/mandiant-no-evidence-we-were-hacked-by-lockbit-ransomware/ 



18:24 – Story # 4: Fake Windows exploits target infosec community with Cobalt Strike – https://www.bleepingcomputer.com/news/security/fake-windows-exploits-target-infosec-community-with-cobalt-strike/ 



27:30 – Story # 5: Hacker Steals Database of Hundreds of Verizon Employees – https://www.vice.com/en/article/wxdwxn/hacker-steals-database-of-hundreds-of-verizon-employees 



36:13 – Story # 6: India Flights grounded after SpiceJet hit with ransomware – https://therecord.media/spiceject-ransomware-attack-flights-grounded/ 



40:36 – Story # 7: Zero-Click Zoom Bug Allows Code Execution Just by Sending a Message – https://www.darkreading.com/application-security/zero-click-zoom-bug-allows-remote-code-execution-by-sending-a-message 



42:12 – Story # 7b: Zoom’s Bug Bounty Programs Soar to $1.8M – https://www.darkreading.com/application-security/zoom-s-bug-bounty-programs-soars-to-1-8-million 



45:29 – Story # 8: Twitter pays $150M fine for using two-factor login details to target ads – https://arstechnica.com/tech-policy/2022/05/twitter-pays-150m-fine-for-using-two-factor-login-details-to-target-ads/ 



49:23 – Story # 9: Microsoft finds severe bugs in Android apps from large mobile providers –</itunes:summary>
      <itunes:subtitle>ORIGINALLY AIRED ON JUNE 6, 2022



Articles discussed in this episode:



00:00 – PreShow Banter™ — Boat Facts 



01:38 – BHIS – Talkin’ Bout [infosec] News 2022-06-06 



03:51 – Story # 1: Elon Musk threatens to scrap Twitter deal – https://www.thever</itunes:subtitle>
      <itunes:keywords>Infosec,Cybersecurity,news</itunes:keywords>
      <itunes:explicit>No</itunes:explicit>
      <podcast:chapters url="https://share.transistor.fm/s/ba123dae/chapters.json" type="application/json+chapters"/>
    </item>
    <item>
      <title>Talkin’ About Infosec News – 5/23/2022</title>
      <itunes:episode>1</itunes:episode>
      <podcast:episode>1</podcast:episode>
      <itunes:title>Talkin’ About Infosec News – 5/23/2022</itunes:title>
      <itunes:episodeType>full</itunes:episodeType>
      <guid isPermaLink="false">https://www.blackhillsinfosec.com/?p=21578</guid>
      <link>https://share.transistor.fm/s/517cf9ab</link>
      <description>
        <![CDATA[<p>ORIGINALLY AIRED ON MAY 23, 2022 Articles discussed in this episode: 00:00 – BHIS – Talkin’ Bout [infosec] News 2022-05-23 02:38 – Story # 1 – National bank trolls hackers […]</p>
<p>The post <a href="https://www.blackhillsinfosec.com/talkin-about-infosec-news-5-23-2022/">Talkin’ About Infosec News – 5/23/2022</a> appeared first on <a href="https://www.blackhillsinfosec.com">Black Hills Information Security</a>.</p>
<ul><li>(00:00) - BHIS - Talkin' Bout [infosec] News 2022-05-23</li>
<li>(02:38) - Story # 1 - National bank trolls hackers with dick pics</li>
<li>(06:59) - Story # 2 - Ransomware attack exposes data of 500,000 Chicago students</li>
<li>(14:09) - Story # 3 - Zola seems tight lipped on an unconfirmed breach</li>
<li>(21:57) - Weather With Bud Patches</li>
<li>(28:22) - Story # 4 - Snake Keylogger Spreads Through Malicious PDFs</li>
<li>(34:47) - Story # 5 - Bluetooth Hack - Remotely Unlock Smart Locks &amp; Cars</li>
<li>(43:37) - Story # 6 - DOJ Changes CFAA Policy, Will No Longer Bring Criminal Charges Against Security Researchers</li>
</ul>]]>
      </description>
      <content:encoded>
        <![CDATA[<p>ORIGINALLY AIRED ON MAY 23, 2022 Articles discussed in this episode: 00:00 – BHIS – Talkin’ Bout [infosec] News 2022-05-23 02:38 – Story # 1 – National bank trolls hackers […]</p>
<p>The post <a href="https://www.blackhillsinfosec.com/talkin-about-infosec-news-5-23-2022/">Talkin’ About Infosec News – 5/23/2022</a> appeared first on <a href="https://www.blackhillsinfosec.com">Black Hills Information Security</a>.</p>
<ul><li>(00:00) - BHIS - Talkin' Bout [infosec] News 2022-05-23</li>
<li>(02:38) - Story # 1 - National bank trolls hackers with dick pics</li>
<li>(06:59) - Story # 2 - Ransomware attack exposes data of 500,000 Chicago students</li>
<li>(14:09) - Story # 3 - Zola seems tight lipped on an unconfirmed breach</li>
<li>(21:57) - Weather With Bud Patches</li>
<li>(28:22) - Story # 4 - Snake Keylogger Spreads Through Malicious PDFs</li>
<li>(34:47) - Story # 5 - Bluetooth Hack - Remotely Unlock Smart Locks &amp; Cars</li>
<li>(43:37) - Story # 6 - DOJ Changes CFAA Policy, Will No Longer Bring Criminal Charges Against Security Researchers</li>
</ul>]]>
      </content:encoded>
      <pubDate>Mon, 20 Jun 2022 17:27:53 -0400</pubDate>
      <author>Black Hills Information Security</author>
      <enclosure url="https://media.transistor.fm/517cf9ab/9649a7ef.mp3" length="56175730" type="audio/mpeg"/>
      <itunes:author>Black Hills Information Security</itunes:author>
      <itunes:image href="https://img.transistorcdn.com/vISLMPqefdEfzI1aqaeowcZNU0P8hMJyEOs3DF4U4Jk/rs:fill:0:0:1/w:1400/h:1400/q:60/mb:500000/aHR0cHM6Ly9pbWct/dXBsb2FkLXByb2R1/Y3Rpb24udHJhbnNp/c3Rvci5mbS9kNmRi/MTkzOWZlMDQwMDJh/NGYxN2RiMTAxNGNl/ZTY3My5qcGc.jpg"/>
      <itunes:duration>3371</itunes:duration>
      <itunes:summary>ORIGINALLY AIRED ON MAY 23, 2022



Articles discussed in this episode:



00:00 – BHIS – Talkin’ Bout [infosec] News 2022-05-23 



02:38 – Story # 1 – National bank trolls hackers with dick pics – https://www.bleepingcomputer.com/news/security/national-bank-hit-by-ransomware-trolls-hackers-with-dick-pics/



06:59 – Story # 2 – Ransomware attack exposes data of 500,000 Chicago students – https://www.bleepingcomputer.com/news/security/ransomware-attack-exposes-data-of-500-000-chicago-students/ 



14:09 – Story # 3 – Zola seems tight-lipped on an unconfirmed breach – https://www.reddit.com/r/cybersecurity/comments/uvdsri/zola_seems_tight_lipped_on_an_unconfirmed_breach/ 



21:57 – Weather With Bud Patches – 



28:22 – Story # 4 – Snake Keylogger Spreads Through Malicious PDFs – https://threatpost.com/snake-keylogger-pdfs/179703/ 



34:47 – Story # 5 – Bluetooth Hack – Remotely Unlock Smart Locks &amp;amp; Cars – https://thehackernews.com/2022/05/new-bluetooth-hack-could-let-attackers.html 



43:37 – Story # 6 – DOJ Changes CFAA Policy, Will No Longer Bring Criminal Charges Against Security Researchers – https://www.techdirt.com/2022/05/23/doj-changes-cfaa-policy-will-no-longer-bring-criminal-charges-against-security-researchers/
















We are self-publishing free Infosec Zines called PROMPT#.  



PROMPT# will contain: 

Infosec articles 
Challenging puzzles 
Comic book based on real-life hacking adventures 
Coloring contests 
Bonus Backdoors &amp;amp; Breaches Consultant Cards (print version only) 
Other stuffs 

You can check out current and upcoming issues here: https://www.blackhillsinfosec.com/prompt-zine/ </itunes:summary>
      <itunes:subtitle>ORIGINALLY AIRED ON MAY 23, 2022



Articles discussed in this episode:



00:00 – BHIS – Talkin’ Bout [infosec] News 2022-05-23 



02:38 – Story # 1 – National bank trolls hackers with dick pics – https://www.bleepingcomputer.com/news/security/national-</itunes:subtitle>
      <itunes:keywords>Infosec,Cybersecurity,news</itunes:keywords>
      <itunes:explicit>No</itunes:explicit>
      <podcast:chapters url="https://share.transistor.fm/s/517cf9ab/chapters.json" type="application/json+chapters"/>
    </item>
    <item>
      <title>Talkin’ About Infosec News – 5/16/2022</title>
      <itunes:episode>1</itunes:episode>
      <podcast:episode>1</podcast:episode>
      <itunes:title>Talkin’ About Infosec News – 5/16/2022</itunes:title>
      <itunes:episodeType>full</itunes:episodeType>
      <guid isPermaLink="false">https://www.blackhillsinfosec.com/?p=21536</guid>
      <link>https://share.transistor.fm/s/ccf2cad3</link>
      <description>
        <![CDATA[<p>ORIGINALLY AIRED ON MAY 16, 2022 Articles discussed in this episode: 00:56 – Microsoft’s May Patch Tuesday Updates Cause Windows AD Authentication Errors – https://threatpost.com/microsofts-may-patch-tuesday-updates-cause-windows-ad-authentication-errors/179631/ 08:56 – Update rings for Windows 10 and later policy in Intune – https://docs.microsoft.com/en-us/mem/intune/protect/windows-10-update-rings 09:06 – Infosec Weather Report With Bud Patches – 12:26 – FBI, CISA, and NSA warn […]</p>
<p>The post <a href="https://www.blackhillsinfosec.com/talkin-about-infosec-news-5-16-2022/">Talkin’ About Infosec News – 5/16/2022</a> appeared first on <a href="https://www.blackhillsinfosec.com">Black Hills Information Security</a>.</p>
<ul><li>(00:00) - BHIS - Talkin' Bout [infosec] News 2022-05-16</li>
<li>(01:02) - Microsoft’s May Patch Tuesday Updates Cause Windows AD Authentication Errors</li>
<li>(09:17) - Update rings for Windows 10 and later policy in Intune</li>
<li>(09:31) - Infosec Weather Report With Bud Patches</li>
<li>(12:26) - FBI, CISA, and NSA warn of hackers increasingly targeting MSPs</li>
<li>(17:57) - Ransomware has gone down because sanctions against Russia are making life harder for attackers</li>
<li>(27:55) - Conti Ransomware Attack Spurs State of Emergency in Costa Rica</li>
<li>(31:19) - BPFDoor — an active Chinese global surveillance tool</li>
<li>(38:55) - Lincoln College to Close Permanently After Ransomware Attack</li>
<li>(43:47) - Certifried: Active Directory Domain Privilege Escalation (CVE-2022–26923)</li>
<li>(53:20) - Malware Can Be Loaded Even Onto Phones That Are Turned Off, Researchers Show</li>
</ul>]]>
      </description>
      <content:encoded>
        <![CDATA[<p>ORIGINALLY AIRED ON MAY 16, 2022 Articles discussed in this episode: 00:56 – Microsoft’s May Patch Tuesday Updates Cause Windows AD Authentication Errors – https://threatpost.com/microsofts-may-patch-tuesday-updates-cause-windows-ad-authentication-errors/179631/ 08:56 – Update rings for Windows 10 and later policy in Intune – https://docs.microsoft.com/en-us/mem/intune/protect/windows-10-update-rings 09:06 – Infosec Weather Report With Bud Patches – 12:26 – FBI, CISA, and NSA warn […]</p>
<p>The post <a href="https://www.blackhillsinfosec.com/talkin-about-infosec-news-5-16-2022/">Talkin’ About Infosec News – 5/16/2022</a> appeared first on <a href="https://www.blackhillsinfosec.com">Black Hills Information Security</a>.</p>
<ul><li>(00:00) - BHIS - Talkin' Bout [infosec] News 2022-05-16</li>
<li>(01:02) - Microsoft’s May Patch Tuesday Updates Cause Windows AD Authentication Errors</li>
<li>(09:17) - Update rings for Windows 10 and later policy in Intune</li>
<li>(09:31) - Infosec Weather Report With Bud Patches</li>
<li>(12:26) - FBI, CISA, and NSA warn of hackers increasingly targeting MSPs</li>
<li>(17:57) - Ransomware has gone down because sanctions against Russia are making life harder for attackers</li>
<li>(27:55) - Conti Ransomware Attack Spurs State of Emergency in Costa Rica</li>
<li>(31:19) - BPFDoor — an active Chinese global surveillance tool</li>
<li>(38:55) - Lincoln College to Close Permanently After Ransomware Attack</li>
<li>(43:47) - Certifried: Active Directory Domain Privilege Escalation (CVE-2022–26923)</li>
<li>(53:20) - Malware Can Be Loaded Even Onto Phones That Are Turned Off, Researchers Show</li>
</ul>]]>
      </content:encoded>
      <pubDate>Tue, 07 Jun 2022 11:36:18 -0400</pubDate>
      <author>Black Hills Information Security</author>
      <enclosure url="https://media.transistor.fm/ccf2cad3/499636bf.mp3" length="56934599" type="audio/mpeg"/>
      <itunes:author>Black Hills Information Security</itunes:author>
      <itunes:image href="https://img.transistorcdn.com/2KTnD_7oN7GMeaw86csvMgDRDUKqTZEdKIo1wOARvUg/rs:fill:0:0:1/w:1400/h:1400/q:60/mb:500000/aHR0cHM6Ly9pbWct/dXBsb2FkLXByb2R1/Y3Rpb24udHJhbnNp/c3Rvci5mbS83MDQy/Mzk4YTBiMDNjNjZi/YmU3N2RiODhkOTE2/ODZiZC5qcGc.jpg"/>
      <itunes:duration>3396</itunes:duration>
      <itunes:summary>ORIGINALLY AIRED ON MAY 16, 2022



Articles discussed in this episode:



00:56 – Microsoft’s May Patch Tuesday Updates Cause Windows AD Authentication Errors – https://threatpost.com/microsofts-may-patch-tuesday-updates-cause-windows-ad-authentication-errors/179631/ 



08:56 – Update rings for Windows 10 and later policy in Intune – https://docs.microsoft.com/en-us/mem/intune/protect/windows-10-update-rings 



09:06 – Infosec Weather Report With Bud Patches – 



12:26 – FBI, CISA, and NSA warn of hackers increasingly targeting MSPs – https://www.bleepingcomputer.com/news/security/fbi-cisa-and-nsa-warn-of-hackers-increasingly-targeting-msps/ 



17:55 – Ransomware has gone down because sanctions against Russia are making life harder for attackers – https://www.zdnet.com/article/ransomware-has-gone-down-because-sanctions-against-russia-are-making-life-harder-for-attackers/ 



26:37 – Conti Ransomware Attack Spurs State of Emergency in Costa Rica – https://threatpost.com/conti-ransomware-attack-emergency-costa-rica/179560/ 



31:19 – BPFDoor — an active Chinese global surveillance tool – https://doublepulsar.com/bpfdoor-an-active-chinese-global-surveillance-tool-54b078f1a896 



38:55 – Lincoln College to Close Permanently After Ransomware Attack – https://www.govtech.com/education/higher-ed/lincoln-college-to-close-permanently-after-ransomware-attack 



43:47 – Certifried: Active Directory Domain Privilege Escalation (CVE-2022–26923) – https://research.ifcr.dk/certifried-active-directory-domain-privilege-escalation-cve-2022-26923-9e098fe298f4 



53:20 – Malware Can Be Loaded Even Onto Phones That Are Turned Off, Researchers Show – https://www.vice.com/en/article/g5q4vj/malware-can-be-loaded-even-onto-phones-that-are-turned-off-researchers-show
















We are self-publishing free Infosec Zines called PROMPT#.  



PROMPT# will contain: </itunes:summary>
      <itunes:subtitle>ORIGINALLY AIRED ON MAY 16, 2022



Articles discussed in this episode:



00:56 – Microsoft’s May Patch Tuesday Updates Cause Windows AD Authentication Errors – https://threatpost.com/microsofts-may-patch-tuesday-updates-cause-windows-ad-authentication-e</itunes:subtitle>
      <itunes:keywords>Infosec,Cybersecurity,news</itunes:keywords>
      <itunes:explicit>No</itunes:explicit>
      <podcast:chapters url="https://share.transistor.fm/s/ccf2cad3/chapters.json" type="application/json+chapters"/>
    </item>
    <item>
      <title>Talkin’ About Infosec News – 5/9/2022</title>
      <itunes:episode>1</itunes:episode>
      <podcast:episode>1</podcast:episode>
      <itunes:title>Talkin’ About Infosec News – 5/9/2022</itunes:title>
      <itunes:episodeType>full</itunes:episodeType>
      <guid isPermaLink="false">https://www.blackhillsinfosec.com/?p=21423</guid>
      <link>https://share.transistor.fm/s/98f93bb4</link>
      <description>
        <![CDATA[<p>ORIGINALLY AIRED ON MAY 9, 2022 Articles discussed in this episode: 00:00 – Bud Patches Reporting 02:27 – BHIS – Talkin’ Bout [infosec] News 2022-05-09 03:47 – Story # 1 […]</p>
<p>The post <a href="https://www.blackhillsinfosec.com/talkin-about-infosec-news-5-9-2022/">Talkin’ About Infosec News – 5/9/2022</a> appeared first on <a href="https://www.blackhillsinfosec.com">Black Hills Information Security</a>.</p>
<ul><li>(00:00) - Bud Patches Reporting</li>
<li>(02:27) - BHIS - Talkin' Bout [infosec] News 2022-05-09</li>
<li>(03:47) - Story # 1 - CISA Shields Up</li>
<li>(09:44) - Story # 2 - Critical BIG-IP Remote Code Execution Vulnerability</li>
<li>(29:25) - Story # 3 - Colonial Pipeline faces nearly $1m fine</li>
<li>(38:02) - Story # 4 - Another Set of Joker Trojan-Laced Android Apps Resurfaces on Google Play Store</li>
<li>(45:15) - Story # 5 – FBI: Rise in Business Email-based Attacks is a $43B Headache</li>
</ul>]]>
      </description>
      <content:encoded>
        <![CDATA[<p>ORIGINALLY AIRED ON MAY 9, 2022 Articles discussed in this episode: 00:00 – Bud Patches Reporting 02:27 – BHIS – Talkin’ Bout [infosec] News 2022-05-09 03:47 – Story # 1 […]</p>
<p>The post <a href="https://www.blackhillsinfosec.com/talkin-about-infosec-news-5-9-2022/">Talkin’ About Infosec News – 5/9/2022</a> appeared first on <a href="https://www.blackhillsinfosec.com">Black Hills Information Security</a>.</p>
<ul><li>(00:00) - Bud Patches Reporting</li>
<li>(02:27) - BHIS - Talkin' Bout [infosec] News 2022-05-09</li>
<li>(03:47) - Story # 1 - CISA Shields Up</li>
<li>(09:44) - Story # 2 - Critical BIG-IP Remote Code Execution Vulnerability</li>
<li>(29:25) - Story # 3 - Colonial Pipeline faces nearly $1m fine</li>
<li>(38:02) - Story # 4 - Another Set of Joker Trojan-Laced Android Apps Resurfaces on Google Play Store</li>
<li>(45:15) - Story # 5 – FBI: Rise in Business Email-based Attacks is a $43B Headache</li>
</ul>]]>
      </content:encoded>
      <pubDate>Tue, 31 May 2022 11:49:59 -0400</pubDate>
      <author>Black Hills Information Security</author>
      <enclosure url="https://media.transistor.fm/98f93bb4/821b1709.mp3" length="51736849" type="audio/mpeg"/>
      <itunes:author>Black Hills Information Security</itunes:author>
      <itunes:image href="https://img.transistorcdn.com/9eeWmamB3c7BTjJ0HqV1coq03p_uNsdnfigNPmZmgBw/rs:fill:0:0:1/w:1400/h:1400/q:60/mb:500000/aHR0cHM6Ly9pbWct/dXBsb2FkLXByb2R1/Y3Rpb24udHJhbnNp/c3Rvci5mbS9lMmU0/MDE5NWI2ZTcwNzUz/OTQ1ZWJmMTUzMmEw/MTY1ZS5qcGc.jpg"/>
      <itunes:duration>3122</itunes:duration>
      <itunes:summary>ORIGINALLY AIRED ON MAY 9, 2022



Articles discussed in this episode:



00:00 – Bud Patches Reporting 



02:27 – BHIS – Talkin’ Bout [infosec] News 2022-05-09 



03:47 – Story # 1 – CISA Shields Up – https://www.cisa.gov/shields-up 



09:44 – Story # 2 – Critical BIG-IP Remote Code Execution Vulnerability – https://thehackernews.com/2022/05/f5-warns-of-new-critical-big-ip-remote.html 



29:25 – Story # 3 – Colonial Pipeline faces nearly $1m fine – https://www.theregister.com/2022/05/09/in_brief_security/ 



38:02 – Story # 4 – Another Set of Joker Trojan-Laced Android Apps Resurfaces on Google Play Store – https://thehackernews.com/2022/05/another-set-of-joker-trojan-laced.html 



45:15 – Story # 5 – FBI: Rise in Business Email-based Attacks is a $43B Headache – https://threatpost.com/fbi-bec-43b/179539/
















We are self-publishing free Infosec Zines called PROMPT#.  



PROMPT# will contain: 

Infosec articles 
Challenging puzzles 
Comic book based on real-life hacking adventures 
Coloring contests 
Bonus Backdoors &amp;amp; Breaches Consultant Cards (print version only) 
Other stuffs 

You can check out current and upcoming issues here: https://www.blackhillsinfosec.com/prompt-zine/ </itunes:summary>
      <itunes:subtitle>ORIGINALLY AIRED ON MAY 9, 2022



Articles discussed in this episode:



00:00 – Bud Patches Reporting 



02:27 – BHIS – Talkin’ Bout [infosec] News 2022-05-09 



03:47 – Story # 1 – CISA Shields Up – https://www.cisa.gov/shields-up 



09:44 – Story #</itunes:subtitle>
      <itunes:keywords>Infosec,Cybersecurity,news</itunes:keywords>
      <itunes:explicit>No</itunes:explicit>
      <podcast:chapters url="https://share.transistor.fm/s/98f93bb4/chapters.json" type="application/json+chapters"/>
    </item>
    <item>
      <title>Talkin’ About Infosec News – 4/25/2022</title>
      <itunes:episode>1</itunes:episode>
      <podcast:episode>1</podcast:episode>
      <itunes:title>Talkin’ About Infosec News – 4/25/2022</itunes:title>
      <itunes:episodeType>full</itunes:episodeType>
      <guid isPermaLink="false">https://www.blackhillsinfosec.com/?p=21406</guid>
      <link>https://share.transistor.fm/s/aa016d87</link>
      <description>
        <![CDATA[<p>ORIGINALLY AIRED ON APRIL 25, 2022 Articles discussed in this episode: 00:00 – PreShow Banter™ — Broken Twitter Finger 01:38 – ISO – Talkin’ Bout [infosec] News 2022-04-26 03:08 – […]</p>
<p>The post <a href="https://www.blackhillsinfosec.com/talkin-about-infosec-news-4-25-2022-2/">Talkin’ About Infosec News – 4/25/2022</a> appeared first on <a href="https://www.blackhillsinfosec.com">Black Hills Information Security</a>.</p>
<ul><li>(00:00) - PreShow Banter™ — Broken Twitter Finger</li>
<li>(01:57) - Talkin' Bout [infosec] News 2022-04-26</li>
<li>(03:23) - Elon Buys Twitter</li>
<li>(09:28) - Leaked Chats Show LAPSUS$ Stole T-Mobile Source Code</li>
<li>(16:14) - Threat actors exploited more zero-day vulnerabilities in 2021</li>
<li>(27:12) - FBI Releases IOCs Associated with BlackCat/ALPHV Ransomware</li>
<li>(41:18) - Atlassian Drops Patches for Critical Jira Authentication Bypass Vulnerability</li>
<li>(45:22) - New BotenaGo Malware Variant Targeting Lilin Security Camera DVR Devices</li>
<li>(51:52) - The War in Ukraine – Everyone Could Help. Volunteer centre “Palyanycia”, Zaporizhzhya</li>
<li>(53:24) - Antisyphon Training on Twitch</li>
</ul>]]>
      </description>
      <content:encoded>
        <![CDATA[<p>ORIGINALLY AIRED ON APRIL 25, 2022 Articles discussed in this episode: 00:00 – PreShow Banter™ — Broken Twitter Finger 01:38 – ISO – Talkin’ Bout [infosec] News 2022-04-26 03:08 – […]</p>
<p>The post <a href="https://www.blackhillsinfosec.com/talkin-about-infosec-news-4-25-2022-2/">Talkin’ About Infosec News – 4/25/2022</a> appeared first on <a href="https://www.blackhillsinfosec.com">Black Hills Information Security</a>.</p>
<ul><li>(00:00) - PreShow Banter™ — Broken Twitter Finger</li>
<li>(01:57) - Talkin' Bout [infosec] News 2022-04-26</li>
<li>(03:23) - Elon Buys Twitter</li>
<li>(09:28) - Leaked Chats Show LAPSUS$ Stole T-Mobile Source Code</li>
<li>(16:14) - Threat actors exploited more zero-day vulnerabilities in 2021</li>
<li>(27:12) - FBI Releases IOCs Associated with BlackCat/ALPHV Ransomware</li>
<li>(41:18) - Atlassian Drops Patches for Critical Jira Authentication Bypass Vulnerability</li>
<li>(45:22) - New BotenaGo Malware Variant Targeting Lilin Security Camera DVR Devices</li>
<li>(51:52) - The War in Ukraine – Everyone Could Help. Volunteer centre “Palyanycia”, Zaporizhzhya</li>
<li>(53:24) - Antisyphon Training on Twitch</li>
</ul>]]>
      </content:encoded>
      <pubDate>Wed, 25 May 2022 14:53:51 -0400</pubDate>
      <author>Black Hills Information Security</author>
      <enclosure url="https://media.transistor.fm/aa016d87/90afd21a.mp3" length="55268126" type="audio/mpeg"/>
      <itunes:author>Black Hills Information Security</itunes:author>
      <itunes:image href="https://img.transistorcdn.com/Nb5TM3RuG2wfvZ6yvyu6I6PJ-YfMjpR2_QKJ73qPe5k/rs:fill:0:0:1/w:1400/h:1400/q:60/mb:500000/aHR0cHM6Ly9pbWct/dXBsb2FkLXByb2R1/Y3Rpb24udHJhbnNp/c3Rvci5mbS82MzYy/NjU5MDVmMjU1NGNh/ZjQzZGYwNzY1MjMz/MjBhNC5qcGc.jpg"/>
      <itunes:duration>3326</itunes:duration>
      <itunes:summary>ORIGINALLY AIRED ON APRIL 25, 2022



Articles discussed in this episode:



00:00 – PreShow Banter™ — Broken Twitter Finger 



01:38 – ISO – Talkin’ Bout [infosec] News 2022-04-26 



03:08 – Elon Buys Twitter 



09:27 – Leaked Chats Show LAPSUS$ Stole T-Mobile Source Code – https://krebsonsecurity.com/2022/04/leaked-chats-show-lapsus-stole-t-mobile-source-code/ 



15:48 – Threat actors exploited more zero-day vulnerabilities in 2021 – https://www.securitymagazine.com/articles/97482-threat-actors-exploited-more-zero-day-vulnerabilities-in-2021 



26:18 – FBI Releases IOCs Associated with BlackCat/ALPHV Ransomware – https://www.cisa.gov/uscert/ncas/current-activity/2022/04/22/fbi-releases-iocs-associated-blackcatalphv-ransomware 



41:14 – Atlassian Drops Patches for Critical Jira Authentication Bypass Vulnerability – https://thehackernews.com/2022/04/atlassian-drops-patches-for-critical.html 



45:19 – New BotenaGo Malware Variant Targeting Lilin Security Camera DVR Devices – https://thehackernews.com/2022/04/new-botenago-malware-variant-targeting.html 



51:07 – The War in Ukraine – Everyone Could Help. Volunteer centre “Palyanycia”, Zaporizhzhya – https://palyanycia.com/en/home-page/ 



53:21 – Antisyphon Training on Twitch – https://www.twitch.tv/antisyphon
















We are self-publishing free Infosec Zines called PROMPT#.  



PROMPT# will contain: 

Infosec articles 
Challenging puzzles 
Comic book based on real-life hacking adventures 
Coloring contests 
Bonus Backdoors &amp;amp; Breaches Consultant Cards (print version only) 
Other stuffs 

You can check out current and upcoming issues here: https://www.blackhillsinfosec.com/prompt-zine/ </itunes:summary>
      <itunes:subtitle>ORIGINALLY AIRED ON APRIL 25, 2022



Articles discussed in this episode:



00:00 – PreShow Banter™ — Broken Twitter Finger 



01:38 – ISO – Talkin’ Bout [infosec] News 2022-04-26 



03:08 – Elon Buys Twitter 



09:27 – Leaked Chats Show LAPSUS$ Stole</itunes:subtitle>
      <itunes:keywords>Infosec,Cybersecurity,news</itunes:keywords>
      <itunes:explicit>No</itunes:explicit>
      <podcast:chapters url="https://share.transistor.fm/s/aa016d87/chapters.json" type="application/json+chapters"/>
    </item>
    <item>
      <title>Talkin’ About Infosec News – 4/25/2022</title>
      <itunes:episode>1</itunes:episode>
      <podcast:episode>1</podcast:episode>
      <itunes:title>Talkin’ About Infosec News – 4/25/2022</itunes:title>
      <itunes:episodeType>full</itunes:episodeType>
      <guid isPermaLink="false">https://www.blackhillsinfosec.com/?p=21234</guid>
      <link>https://share.transistor.fm/s/d7ddd908</link>
      <description>
        <![CDATA[<p>ORIGINALLY AIRED ON APRIL 18, 2022 Articles discussed in this episode: 00:00 – BHIS – Talkin’ Bout [infosec] News 2022-04-18 02:05 – Current Activity | CISA | https://www.cisa.gov/uscert/ncas/current-activity 02:58 – CISA orders agencies to fix actively exploited VMware, Chrome bugs | https://www.bleepingcomputer.com/news/security/cisa-orders-agencies-to-fix-actively-exploited-vmware-chrome-bugs/ 08:45 – Russian invasion of Ukraine exposes cybersecurity threat to commercial satellites | […]</p>
<p>The post <a href="https://www.blackhillsinfosec.com/talkin-about-infosec-news-4-25-2022/">Talkin’ About Infosec News – 4/25/2022</a> appeared first on <a href="https://www.blackhillsinfosec.com">Black Hills Information Security</a>.</p>
<ul><li>(00:00) - BHIS - Talkin' Bout [infosec] News 2022-04-18</li>
<li>(02:09) - Current Activity | CISA</li>
<li>(03:04) - CISA orders agencies to fix actively exploited VMware, Chrome bugs</li>
<li>(08:46) - Russian invasion of Ukraine exposes cybersecurity threat to commercial satellites</li>
<li>(11:06) - Leaked documents show notorious ransomware group has an HR department, performance reviews and an ‘employee of the month’</li>
<li>(15:48) - Hacking forum taken offline and UK suspect arrested</li>
<li>(19:35) - GitHub Says Hackers Breached Dozens of Organizations Using Stolen OAuth Access Tokens</li>
<li>(23:55) - AWS API Keys Token - Canary Tokens</li>
<li>(25:36) - First Malware Targeting AWS Lambda Serverless Platform Discovered</li>
<li>(27:05) - Make phishing great again. VSTO office files are the new macro nightmare?</li>
<li>(33:49) - my university financial hardship PHISHING exercise...</li>
<li>(36:01) - 25% Of Workers Lost Their Jobs In The Past 12 Months After Making Cybersecurity Mistakes</li>
<li>(46:49) - Elon Musk Believes Twitter Algorithm Should Be Open-Source</li>
</ul>]]>
      </description>
      <content:encoded>
        <![CDATA[<p>ORIGINALLY AIRED ON APRIL 18, 2022 Articles discussed in this episode: 00:00 – BHIS – Talkin’ Bout [infosec] News 2022-04-18 02:05 – Current Activity | CISA | https://www.cisa.gov/uscert/ncas/current-activity 02:58 – CISA orders agencies to fix actively exploited VMware, Chrome bugs | https://www.bleepingcomputer.com/news/security/cisa-orders-agencies-to-fix-actively-exploited-vmware-chrome-bugs/ 08:45 – Russian invasion of Ukraine exposes cybersecurity threat to commercial satellites | […]</p>
<p>The post <a href="https://www.blackhillsinfosec.com/talkin-about-infosec-news-4-25-2022/">Talkin’ About Infosec News – 4/25/2022</a> appeared first on <a href="https://www.blackhillsinfosec.com">Black Hills Information Security</a>.</p>
<ul><li>(00:00) - BHIS - Talkin' Bout [infosec] News 2022-04-18</li>
<li>(02:09) - Current Activity | CISA</li>
<li>(03:04) - CISA orders agencies to fix actively exploited VMware, Chrome bugs</li>
<li>(08:46) - Russian invasion of Ukraine exposes cybersecurity threat to commercial satellites</li>
<li>(11:06) - Leaked documents show notorious ransomware group has an HR department, performance reviews and an ‘employee of the month’</li>
<li>(15:48) - Hacking forum taken offline and UK suspect arrested</li>
<li>(19:35) - GitHub Says Hackers Breached Dozens of Organizations Using Stolen OAuth Access Tokens</li>
<li>(23:55) - AWS API Keys Token - Canary Tokens</li>
<li>(25:36) - First Malware Targeting AWS Lambda Serverless Platform Discovered</li>
<li>(27:05) - Make phishing great again. VSTO office files are the new macro nightmare?</li>
<li>(33:49) - my university financial hardship PHISHING exercise...</li>
<li>(36:01) - 25% Of Workers Lost Their Jobs In The Past 12 Months After Making Cybersecurity Mistakes</li>
<li>(46:49) - Elon Musk Believes Twitter Algorithm Should Be Open-Source</li>
</ul>]]>
      </content:encoded>
      <pubDate>Mon, 25 Apr 2022 17:15:52 -0400</pubDate>
      <author>Black Hills Information Security</author>
      <enclosure url="https://media.transistor.fm/d7ddd908/ea937f74.mp3" length="56776538" type="audio/mpeg"/>
      <itunes:author>Black Hills Information Security</itunes:author>
      <itunes:image href="https://img.transistorcdn.com/PNkovnbahSXmhYVrO6I2ExzU_DKdmgVJaAVWriwGWC4/rs:fill:0:0:1/w:1400/h:1400/q:60/mb:500000/aHR0cHM6Ly9pbWct/dXBsb2FkLXByb2R1/Y3Rpb24udHJhbnNp/c3Rvci5mbS82NDIz/NDllZDk2M2I3NDA1/NmIzOThiZWEzNDVj/MGEyYy5qcGc.jpg"/>
      <itunes:duration>3385</itunes:duration>
      <itunes:summary>ORIGINALLY AIRED ON APRIL 18, 2022



Articles discussed in this episode:



00:00 – BHIS – Talkin’ Bout [infosec] News 2022-04-18 



02:05 – Current Activity | CISA | https://www.cisa.gov/uscert/ncas/current-activity 



02:58 – CISA orders agencies to fix actively exploited VMware, Chrome bugs | https://www.bleepingcomputer.com/news/security/cisa-orders-agencies-to-fix-actively-exploited-vmware-chrome-bugs/ 



08:45 – Russian invasion of Ukraine exposes cybersecurity threat to commercial satellites | https://spacenews.com/russian-invasion-of-ukraine-exposes-cybersecurity-threat-to-commercial-satellites/ 



10:43 – Leaked documents show notorious ransomware group has an HR department, performance reviews, and an ‘employee of the month’ | https://www.cnbc.com/2022/04/14/conti-ransomware-leak-shows-group-operates-like-normal-tech-company.html 



15:35 – Hacking forum taken offline and UK suspect arrested | https://www.nationalcrimeagency.gov.uk/news/hacking-forum-taken-offline-and-uk-suspect-arrested | https://www.nationalcrimeagency.gov.uk/news/hacking-forum-taken-offline-and-uk-suspect-arrested 



19:35 – GitHub Says Hackers Breached Dozens of Organizations Using Stolen OAuth Access Tokens | https://thehackernews.com/2022/04/github-says-hackers-breach-dozens-of.html 



23:49 – AWS API Keys Token – Canary Tokens 25:36 – First Malware Targeting AWS Lambda Serverless Platform Discovered | https://thehackernews.com/2022/04/first-malware-targeting-aws-lambda.html 



27:01 – Make phishing great again. VSTO office files are the new macro nightmare? | https://medium.com/@airlockdigital/make-phishing-great-again-vsto-office-files-are-the-new-macro-nightmare-e09fcadef010 



33:48 – my university financial hardship PHISHING exercise… | https://twitter.com/nina_luong/status/1513997316134301698 



35:59 – 25% Of Workers Lost Their Jobs In The Past 12 Months After Making Cybersecurity Mistakes |</itunes:summary>
      <itunes:subtitle>ORIGINALLY AIRED ON APRIL 18, 2022



Articles discussed in this episode:



00:00 – BHIS – Talkin’ Bout [infosec] News 2022-04-18 



02:05 – Current Activity | CISA | https://www.cisa.gov/uscert/ncas/current-activity 



02:58 – CISA orders agencies to </itunes:subtitle>
      <itunes:keywords>Infosec,Cybersecurity,news</itunes:keywords>
      <itunes:explicit>No</itunes:explicit>
      <podcast:chapters url="https://share.transistor.fm/s/d7ddd908/chapters.json" type="application/json+chapters"/>
    </item>
    <item>
      <title>Talkin’ About Infosec News – 4/12/2022</title>
      <itunes:episode>1</itunes:episode>
      <podcast:episode>1</podcast:episode>
      <itunes:title>Talkin’ About Infosec News – 4/12/2022</itunes:title>
      <itunes:episodeType>full</itunes:episodeType>
      <guid isPermaLink="false">https://www.blackhillsinfosec.com/?p=21205</guid>
      <link>https://share.transistor.fm/s/19f35651</link>
      <description>
        <![CDATA[<p>ORIGINALLY AIRED ON APRIL 11, 2022 Articles discussed in this episode: The US Navy had cybersecurity wrong. Expect change. – https://www.c4isrnet.com/digital-show-dailies/navy-league/2022/04/05/us-navy-had-cybersecurity-wrong-expect-change/ Hackers have found a clever new way to steal your Microsoft 365 credentials. – https://www.techradar.com/news/hackers-have-found-a-clever-new-way-to-steal-your-microsoft-365-credentials Exclusive: Senior EU officials were targeted with Israeli spyware. – https://www.reuters.com/technology/exclusive-senior-eu-officials-were-targeted-with-israeli-spyware-sources-2022-04-11/ Snap-on discloses data breach claimed by Conti ransomware […]</p>
<p>The post <a href="https://www.blackhillsinfosec.com/talkin-about-infosec-news-4-12-2022/">Talkin’ About Infosec News – 4/12/2022</a> appeared first on <a href="https://www.blackhillsinfosec.com">Black Hills Information Security</a>.</p>
<ul><li>(00:00) - BHIS - Talkin' Bout [infosec] News 2022-02-11</li>
<li>(02:21) - The US Navy had cybersecurity wrong. Expect change.</li>
<li>(17:23) - Hackers have found a clever new way to steal your Microsoft 365 credentials</li>
<li>(21:17) - Exclusive: Senior EU officials were targeted with Israeli spyware</li>
<li>(28:40) - Snap-on discloses data breach claimed by Conti ransomware gang</li>
<li>(37:26) - Bearded Barbie hackers catfish high ranking Israeli officials</li>
<li>(44:02) - Justice Department Announces Court-Authorized Disruption of Botnet Controlled by the Russian Federation’s Main Intelligence Directorate (GRU)</li>
<li>(47:47) - WatchGuard failed to explicitly disclose critical flaw exploited by Russian hackers</li>
<li>(55:09) - Ukrainians use 'Find My iPhone' to see where Russians took their stolen Apple devices</li>
</ul>]]>
      </description>
      <content:encoded>
        <![CDATA[<p>ORIGINALLY AIRED ON APRIL 11, 2022 Articles discussed in this episode: The US Navy had cybersecurity wrong. Expect change. – https://www.c4isrnet.com/digital-show-dailies/navy-league/2022/04/05/us-navy-had-cybersecurity-wrong-expect-change/ Hackers have found a clever new way to steal your Microsoft 365 credentials. – https://www.techradar.com/news/hackers-have-found-a-clever-new-way-to-steal-your-microsoft-365-credentials Exclusive: Senior EU officials were targeted with Israeli spyware. – https://www.reuters.com/technology/exclusive-senior-eu-officials-were-targeted-with-israeli-spyware-sources-2022-04-11/ Snap-on discloses data breach claimed by Conti ransomware […]</p>
<p>The post <a href="https://www.blackhillsinfosec.com/talkin-about-infosec-news-4-12-2022/">Talkin’ About Infosec News – 4/12/2022</a> appeared first on <a href="https://www.blackhillsinfosec.com">Black Hills Information Security</a>.</p>
<ul><li>(00:00) - BHIS - Talkin' Bout [infosec] News 2022-02-11</li>
<li>(02:21) - The US Navy had cybersecurity wrong. Expect change.</li>
<li>(17:23) - Hackers have found a clever new way to steal your Microsoft 365 credentials</li>
<li>(21:17) - Exclusive: Senior EU officials were targeted with Israeli spyware</li>
<li>(28:40) - Snap-on discloses data breach claimed by Conti ransomware gang</li>
<li>(37:26) - Bearded Barbie hackers catfish high ranking Israeli officials</li>
<li>(44:02) - Justice Department Announces Court-Authorized Disruption of Botnet Controlled by the Russian Federation’s Main Intelligence Directorate (GRU)</li>
<li>(47:47) - WatchGuard failed to explicitly disclose critical flaw exploited by Russian hackers</li>
<li>(55:09) - Ukrainians use 'Find My iPhone' to see where Russians took their stolen Apple devices</li>
</ul>]]>
      </content:encoded>
      <pubDate>Tue, 12 Apr 2022 17:39:55 -0400</pubDate>
      <author>Black Hills Information Security</author>
      <enclosure url="https://media.transistor.fm/19f35651/f39b0030.mp3" length="62396341" type="audio/mpeg"/>
      <itunes:author>Black Hills Information Security</itunes:author>
      <itunes:image href="https://img.transistorcdn.com/3xmd7803qRCyVkQAEjl5Ucoey-ZLPigVIVqa1k9nYQc/rs:fill:0:0:1/w:1400/h:1400/q:60/mb:500000/aHR0cHM6Ly9pbWct/dXBsb2FkLXByb2R1/Y3Rpb24udHJhbnNp/c3Rvci5mbS82MzY0/Yjc5ZTA5N2RiNTk2/NmJmZTVmM2IzNzI4/NGI3My5qcGc.jpg"/>
      <itunes:duration>3761</itunes:duration>
      <itunes:summary>ORIGINALLY AIRED ON APRIL 11, 2022



Articles discussed in this episode:



The US Navy had cybersecurity wrong. Expect change. – https://www.c4isrnet.com/digital-show-dailies/navy-league/2022/04/05/us-navy-had-cybersecurity-wrong-expect-change/ 



Hackers have found a clever new way to steal your Microsoft 365 credentials. – https://www.techradar.com/news/hackers-have-found-a-clever-new-way-to-steal-your-microsoft-365-credentials 



Exclusive: Senior EU officials were targeted with Israeli spyware. – https://www.reuters.com/technology/exclusive-senior-eu-officials-were-targeted-with-israeli-spyware-sources-2022-04-11/ 



Snap-on discloses data breach claimed by Conti ransomware gang. – https://www.bleepingcomputer.com/news/security/snap-on-discloses-data-breach-claimed-by-conti-ransomware-gang/ 



Bearded Barbie hackers catfish high-ranking Israeli officials. – https://www.bleepingcomputer.com/news/security/bearded-barbie-hackers-catfish-high-ranking-israeli-officials/ 



Justice Department Announces Court-Authorized Disruption of Botnet Controlled by the Russian Federation’s Main Intelligence Directorate (GRU). – https://www.justice.gov/opa/pr/justice-department-announces-court-authorized-disruption-botnet-controlled-russian-federation 



WatchGuard failed to explicitly disclose critical flaw exploited by Russian hackers. – https://arstechnica.com/information-technology/2022/04/watchguard-failed-to-disclose-critical-flaw-exploited-by-russian-hackers/ 



Ukrainians use ‘Find My iPhone’ to see where Russians took their stolen Apple devices. – https://www.indy100.com/news/ukraine-find-my-iphone-russian 



Mel Brooks Tells ‘Inside Comedy’ About Getting His Revenge On Hitler Through Humor (VIDEO). – https://www.huffpost.com/entry/mel-brooks-inside-comedy-video_n_1334312



00:00 – BHIS – Talkin’ Bout [infosec] News 2022-02-11 



02:05 – The US Navy had cybersecurity wrong. Expect change.</itunes:summary>
      <itunes:subtitle>ORIGINALLY AIRED ON APRIL 11, 2022



Articles discussed in this episode:



The US Navy had cybersecurity wrong. Expect change. – https://www.c4isrnet.com/digital-show-dailies/navy-league/2022/04/05/us-navy-had-cybersecurity-wrong-expect-change/ 



Hack</itunes:subtitle>
      <itunes:keywords>Infosec,Cybersecurity,news</itunes:keywords>
      <itunes:explicit>No</itunes:explicit>
      <podcast:chapters url="https://share.transistor.fm/s/19f35651/chapters.json" type="application/json+chapters"/>
    </item>
    <item>
      <title>Talkin’ About Infosec News – 4/6/2022</title>
      <itunes:episode>1</itunes:episode>
      <podcast:episode>1</podcast:episode>
      <itunes:title>Talkin’ About Infosec News – 4/6/2022</itunes:title>
      <itunes:episodeType>full</itunes:episodeType>
      <guid isPermaLink="false">https://www.blackhillsinfosec.com/?p=21194</guid>
      <link>https://share.transistor.fm/s/57e5ccd0</link>
      <description>
        <![CDATA[<p>ORIGINALLY AIRED ON APRIL 4, 2022 Articles discussed in this episode: 00:00 – PreShow Banter™ — Blame it on the Intern 06:24 – Spring Time for Java – https://www.darkreading.com/application-security/zero-day-vulnerability-discovered-in-java-spring-framework 09:10 – GitLab for Account Access – https://www.bleepingcomputer.com/news/security/critical-gitlab-vulnerability-lets-attackers-take-over-accounts/ 10:33 – No Passwords for Okta – https://www.bleepingcomputer.com/news/security/sitel-on-okta-breach-spreadsheet-did-not-contain-passwords/ 11:11 – Legacy Networks for Okta – https://therecord.media/sitel-blames-okta-breach-on-legacy-network-from-acquisition/ 12:40 – […]</p>
<p>The post <a href="https://www.blackhillsinfosec.com/talkin-about-infosec-news-4-6-2022/">Talkin’ About Infosec News – 4/6/2022</a> appeared first on <a href="https://www.blackhillsinfosec.com">Black Hills Information Security</a>.</p>
<ul><li>(00:00) - PreShow Banter™ — Blame it on the Intern</li>
<li>(06:24) - Spring Time for Java</li>
<li>(09:10) - GitLab for Account Access</li>
<li>(10:33) - No Passwords for Okta</li>
<li>(11:11) - Legacy Networks for OKta - https://therecord.media/sitel-blames-okta-breach-on-legacy-network-from-acquisition/</li>
<li>(12:40) - Lawsuit for Ubiquity</li>
<li>(17:01) - MITRE ATT&amp;CK for EDMs</li>
<li>(21:17) - Breach for Mailchimp</li>
<li>(30:54) - 15 Characters for John</li>
<li>(40:17) - Data Requests for Apple</li>
<li>(46:52) - Drones for Ukraine</li>
</ul>]]>
      </description>
      <content:encoded>
        <![CDATA[<p>ORIGINALLY AIRED ON APRIL 4, 2022 Articles discussed in this episode: 00:00 – PreShow Banter™ — Blame it on the Intern 06:24 – Spring Time for Java – https://www.darkreading.com/application-security/zero-day-vulnerability-discovered-in-java-spring-framework 09:10 – GitLab for Account Access – https://www.bleepingcomputer.com/news/security/critical-gitlab-vulnerability-lets-attackers-take-over-accounts/ 10:33 – No Passwords for Okta – https://www.bleepingcomputer.com/news/security/sitel-on-okta-breach-spreadsheet-did-not-contain-passwords/ 11:11 – Legacy Networks for Okta – https://therecord.media/sitel-blames-okta-breach-on-legacy-network-from-acquisition/ 12:40 – […]</p>
<p>The post <a href="https://www.blackhillsinfosec.com/talkin-about-infosec-news-4-6-2022/">Talkin’ About Infosec News – 4/6/2022</a> appeared first on <a href="https://www.blackhillsinfosec.com">Black Hills Information Security</a>.</p>
<ul><li>(00:00) - PreShow Banter™ — Blame it on the Intern</li>
<li>(06:24) - Spring Time for Java</li>
<li>(09:10) - GitLab for Account Access</li>
<li>(10:33) - No Passwords for Okta</li>
<li>(11:11) - Legacy Networks for OKta - https://therecord.media/sitel-blames-okta-breach-on-legacy-network-from-acquisition/</li>
<li>(12:40) - Lawsuit for Ubiquity</li>
<li>(17:01) - MITRE ATT&amp;CK for EDMs</li>
<li>(21:17) - Breach for Mailchimp</li>
<li>(30:54) - 15 Characters for John</li>
<li>(40:17) - Data Requests for Apple</li>
<li>(46:52) - Drones for Ukraine</li>
</ul>]]>
      </content:encoded>
      <pubDate>Wed, 06 Apr 2022 10:22:14 -0400</pubDate>
      <author>Black Hills Information Security</author>
      <enclosure url="https://media.transistor.fm/57e5ccd0/4c08282e.mp3" length="56241838" type="audio/mpeg"/>
      <itunes:author>Black Hills Information Security</itunes:author>
      <itunes:image href="https://img.transistorcdn.com/3h00y_DTtfK51SIYJDaRLkWA2TO-N5Wu-sZTySlzIhw/rs:fill:0:0:1/w:1400/h:1400/q:60/mb:500000/aHR0cHM6Ly9pbWct/dXBsb2FkLXByb2R1/Y3Rpb24udHJhbnNp/c3Rvci5mbS8yZjUw/NDAyOTA4YTYzOTll/ZmNiMGYyZGE3MjRj/OTMzYi5qcGc.jpg"/>
      <itunes:duration>3371</itunes:duration>
      <itunes:summary>ORIGINALLY AIRED ON APRIL 4, 2022



Articles discussed in this episode:



00:00 – PreShow Banter™ — Blame it on the Intern 



06:24 – Spring Time for Java – https://www.darkreading.com/application-security/zero-day-vulnerability-discovered-in-java-spring-framework 



09:10 – GitLab for Account Access – https://www.bleepingcomputer.com/news/security/critical-gitlab-vulnerability-lets-attackers-take-over-accounts/ 



10:33 – No Passwords for Okta – https://www.bleepingcomputer.com/news/security/sitel-on-okta-breach-spreadsheet-did-not-contain-passwords/ 



11:11 – Legacy Networks for Okta – https://therecord.media/sitel-blames-okta-breach-on-legacy-network-from-acquisition/ 



12:40 – Lawsuit for Ubiquity – https://arstechnica.com/tech-policy/2022/03/ubiquiti-sues-journalist-alleging-defamation-in-coverage-of-data-breach/ 



17:01 – MITRE AT&amp;amp;T&amp;amp;CK for EDMs 



21:17 – Breach for Mailchimp – https://www.bleepingcomputer.com/news/security/hackers-breach-mailchimps-internal-tools-to-target-crypto-customers/ 



30:54 – 15 Characters for John – https://blog.pcisecuritystandards.org/pci-dss-v4-0-a-conversation-with-the-council 



40:17 – Data Requests for Apple – https://www.macrumors.com/2022/03/30/apple-user-data-forged-legal-requests/ 



46:52 – Drones for Ukraine – https://www.forbes.com/sites/davidhambling/2022/03/08/how-small-drones-could-win-the-fight-in-ukraines-cities-and-the-truth-about-that-anti-drone-pickle-jar-story
















We are self-publishing free Infosec Zines called PROMPT#.  



PROMPT# will contain: 

Infosec articles 
Challenging puzzles 
Comic book based on real-life hacking adventures 
Coloring contests 
Bonus Backdoors &amp;amp; Breaches Consultant ...</itunes:summary>
      <itunes:subtitle>ORIGINALLY AIRED ON APRIL 4, 2022



Articles discussed in this episode:



00:00 – PreShow Banter™ — Blame it on the Intern 



06:24 – Spring Time for Java – https://www.darkreading.com/application-security/zero-day-vulnerability-discovered-in-java-spri</itunes:subtitle>
      <itunes:keywords>Infosec,Cybersecurity,news</itunes:keywords>
      <itunes:explicit>No</itunes:explicit>
      <podcast:chapters url="https://share.transistor.fm/s/57e5ccd0/chapters.json" type="application/json+chapters"/>
    </item>
    <item>
      <title>Talkin’ About Infosec News – 3/31/2022</title>
      <itunes:episode>1</itunes:episode>
      <podcast:episode>1</podcast:episode>
      <itunes:title>Talkin’ About Infosec News – 3/31/2022</itunes:title>
      <itunes:episodeType>full</itunes:episodeType>
      <guid isPermaLink="false">https://www.blackhillsinfosec.com/?p=21163</guid>
      <link>https://share.transistor.fm/s/16d83f90</link>
      <description>
        <![CDATA[<p>ORIGINALLY AIRED ON MARCH 28, 2022 Articles discussed in this episode: 01:42 – Suspected Okta hackers arrested by British police – https://www.reuters.com/world/uk/british-police-say-seven-people-arrested-after-okta-hack-2022-03-24/ 11:16 – A Closer Look at the LAPSUS$ Data Extortion Group – https://krebsonsecurity.com/2022/03/a-closer-look-at-the-lapsus-data-extortion-group/ 14:04 – Anonymous Starts ‘Huge’ Data Dump That Will ‘Blow Russia Away,’ Leaks Rostproekt Emails – https://www.ibtimes.com/anonymous-starts-huge-data-dump-will-blow-russia-away-leaks-rostproekt-emails-3452789 22:28 – Most […]</p>
<p>The post <a href="https://www.blackhillsinfosec.com/talkin-about-infosec-news-3-31-2022/">Talkin’ About Infosec News – 3/31/2022</a> appeared first on <a href="https://www.blackhillsinfosec.com">Black Hills Information Security</a>.</p>
<ul><li>(00:00) - BHIS - Talkin' Bout [infosec] News 2022-03-28</li>
<li>(01:42) - Suspected Okta hackers arrested by British police</li>
<li>(11:16) - A Closer Look at the LAPSUS$ Data Extortion Group</li>
<li>(14:04) - Anonymous Starts 'Huge' Data Dump That Will 'Blow Russia Away,' Leaks Rostproekt Emails</li>
<li>(22:28) - Most Severe’ Cyberattack Since Russian Invasion Crashes Ukraine Internet Provider</li>
<li>(27:53) - Man linked to multi-million dollar ransomware attacks gets 66 months in prison for online fraud</li>
<li>(34:17) - Greece’s national postal service restoring systems after ransomware attack</li>
<li>(37:02) - FCC puts Kaspersky on security threat list, says it poses “unacceptable risk”</li>
<li>(42:07) - We blocked North Korea's Chrome exploit, says Google</li>
<li>(43:43) - North Korean hackers unleashed Chrome 0-day exploit on hundreds of US targets</li>
<li>(47:08) - New Variant of Chinese Gimmick Malware Targeting macOS Users</li>
<li>(49:57) - Hackers remotely start, unlock Honda Civics with $300 tech</li>
<li>(55:08) - https://flipperzero.one/</li>
</ul>]]>
      </description>
      <content:encoded>
        <![CDATA[<p>ORIGINALLY AIRED ON MARCH 28, 2022 Articles discussed in this episode: 01:42 – Suspected Okta hackers arrested by British police – https://www.reuters.com/world/uk/british-police-say-seven-people-arrested-after-okta-hack-2022-03-24/ 11:16 – A Closer Look at the LAPSUS$ Data Extortion Group – https://krebsonsecurity.com/2022/03/a-closer-look-at-the-lapsus-data-extortion-group/ 14:04 – Anonymous Starts ‘Huge’ Data Dump That Will ‘Blow Russia Away,’ Leaks Rostproekt Emails – https://www.ibtimes.com/anonymous-starts-huge-data-dump-will-blow-russia-away-leaks-rostproekt-emails-3452789 22:28 – Most […]</p>
<p>The post <a href="https://www.blackhillsinfosec.com/talkin-about-infosec-news-3-31-2022/">Talkin’ About Infosec News – 3/31/2022</a> appeared first on <a href="https://www.blackhillsinfosec.com">Black Hills Information Security</a>.</p>
<ul><li>(00:00) - BHIS - Talkin' Bout [infosec] News 2022-03-28</li>
<li>(01:42) - Suspected Okta hackers arrested by British police</li>
<li>(11:16) - A Closer Look at the LAPSUS$ Data Extortion Group</li>
<li>(14:04) - Anonymous Starts 'Huge' Data Dump That Will 'Blow Russia Away,' Leaks Rostproekt Emails</li>
<li>(22:28) - Most Severe’ Cyberattack Since Russian Invasion Crashes Ukraine Internet Provider</li>
<li>(27:53) - Man linked to multi-million dollar ransomware attacks gets 66 months in prison for online fraud</li>
<li>(34:17) - Greece’s national postal service restoring systems after ransomware attack</li>
<li>(37:02) - FCC puts Kaspersky on security threat list, says it poses “unacceptable risk”</li>
<li>(42:07) - We blocked North Korea's Chrome exploit, says Google</li>
<li>(43:43) - North Korean hackers unleashed Chrome 0-day exploit on hundreds of US targets</li>
<li>(47:08) - New Variant of Chinese Gimmick Malware Targeting macOS Users</li>
<li>(49:57) - Hackers remotely start, unlock Honda Civics with $300 tech</li>
<li>(55:08) - https://flipperzero.one/</li>
</ul>]]>
      </content:encoded>
      <pubDate>Thu, 31 Mar 2022 16:06:37 -0400</pubDate>
      <author>Black Hills Information Security</author>
      <enclosure url="https://media.transistor.fm/16d83f90/1fdf846b.mp3" length="59375397" type="audio/mpeg"/>
      <itunes:author>Black Hills Information Security</itunes:author>
      <itunes:image href="https://img.transistorcdn.com/PNriRCk0TvomYhdvmIQ6XhoRB9gCePZYxNH5KXCUT0M/rs:fill:0:0:1/w:1400/h:1400/q:60/mb:500000/aHR0cHM6Ly9pbWct/dXBsb2FkLXByb2R1/Y3Rpb24udHJhbnNp/c3Rvci5mbS8yZmE5/NzNmMmZiMGEwZDg2/ZDU0NmJlZTBhOTg2/ZWE1MC5qcGc.jpg"/>
      <itunes:duration>3564</itunes:duration>
      <itunes:summary>ORIGINALLY AIRED ON MARCH 28, 2022



Articles discussed in this episode:



01:42 – Suspected Okta hackers arrested by British police – https://www.reuters.com/world/uk/british-police-say-seven-people-arrested-after-okta-hack-2022-03-24/ 



11:16 – A Closer Look at the LAPSUS$ Data Extortion Group – https://krebsonsecurity.com/2022/03/a-closer-look-at-the-lapsus-data-extortion-group/ 



14:04 – Anonymous Starts ‘Huge’ Data Dump That Will ‘Blow Russia Away,’ Leaks Rostproekt Emails – https://www.ibtimes.com/anonymous-starts-huge-data-dump-will-blow-russia-away-leaks-rostproekt-emails-3452789 



22:28 – Most Severe’ Cyberattack Since Russian Invasion Crashes Ukraine Internet Provider – https://www.forbes.com/sites/thomasbrewster/2022/03/28/huge-cyberattack-on-ukrtelecom-biggest-since-russian-invasion-crashes-ukraine-telecom/?sh=72d14c297dc2 



27:53 – Man linked to multi-million dollar ransomware attacks gets 66 months in prison for online fraud – https://www.zdnet.com/article/man-linked-to-multi-million-dollar-ransomware-attacks-gets-66-months-in-prison-for-online-fraud/ 



34:17 – Greece’s national postal service restoring systems after ransomware attack – https://therecord.media/greeces-national-postal-service-restoring-systems-after-ransomware-attack/ 



37:02 – FCC puts Kaspersky on security threat list, says it poses “unacceptable risk” – https://arstechnica.com/information-technology/2022/03/fcc-puts-kaspersky-on-security-threat-list-says-it-poses-unacceptable-risk/ 



42:07 – We blocked North Korea’s Chrome exploit, says Google – https://www.theregister.com/2022/03/25/chrome_exploits_north_korea/ 



43:43 – North Korean hackers unleashed Chrome 0-day exploit on hundreds of US targets – https://arstechnica.com/information-technology/2022/03/north-korean-hackers-unleashed-chrome-0-day-exploit-on-hundreds-of-us-targets/ 



47:08 – New Variant of Chinese Gimmick Malware Targeting macOS Users ...</itunes:summary>
      <itunes:subtitle>ORIGINALLY AIRED ON MARCH 28, 2022



Articles discussed in this episode:



01:42 – Suspected Okta hackers arrested by British police – https://www.reuters.com/world/uk/british-police-say-seven-people-arrested-after-okta-hack-2022-03-24/ 



11:16 – A Cl</itunes:subtitle>
      <itunes:keywords>Infosec,Cybersecurity,news</itunes:keywords>
      <itunes:explicit>No</itunes:explicit>
      <podcast:chapters url="https://share.transistor.fm/s/16d83f90/chapters.json" type="application/json+chapters"/>
    </item>
    <item>
      <title>Talkin’ About Infosec News – 3/30/2022</title>
      <itunes:episode>1</itunes:episode>
      <podcast:episode>1</podcast:episode>
      <itunes:title>Talkin’ About Infosec News – 3/30/2022</itunes:title>
      <itunes:episodeType>full</itunes:episodeType>
      <guid isPermaLink="false">https://www.blackhillsinfosec.com/?p=21157</guid>
      <link>https://share.transistor.fm/s/4e19278e</link>
      <description>
        <![CDATA[<p>ORIGINALLY AIRED ON MARCH 22, 2022 Articles discussed in this episode: 00:00 – BHIS – 2022-03-22 Special Newscast –Okta and Microsoft — Everything’s not burning down 10:27 – https://github.com/SigmaHQ/sigma/tree/master/rules/cloud/okta 13:29 – https://github.com/elastic/detection-rules/tree/main/rules/integrations/okta 18:20 – https://www.dsolutionsgroup.com/pci-dss-password-requirements/ 27:44 – https://twitter.com/BushidoToken/status/1506338850557337603</p>
<p>The post <a href="https://www.blackhillsinfosec.com/talkin-about-infosec-news-3-30-2022/">Talkin’ About Infosec News – 3/30/2022</a> appeared first on <a href="https://www.blackhillsinfosec.com">Black Hills Information Security</a>.</p>
<ul><li>(00:00) - BHIS - 2022-03-22 Special Newscast –Okta and Microsoft — Everything's not burning down</li>
<li>(10:27) - https://github.com/SigmaHQ/sigma/tree/master/rules/cloud/okta</li>
<li>(13:29) - https://github.com/elastic/detection-rules/tree/main/rules/integrations/okta</li>
<li>(18:20) - https://www.dsolutionsgroup.com/pci-dss-password-requirements/#:~:text=According%20to%20PCI%20DSS%2C%20employees,bare%20minimum%20for%20password%20security</li>
<li>(27:44) - https://twitter.com/BushidoToken/status/1506338850557337603</li>
</ul>]]>
      </description>
      <content:encoded>
        <![CDATA[<p>ORIGINALLY AIRED ON MARCH 22, 2022 Articles discussed in this episode: 00:00 – BHIS – 2022-03-22 Special Newscast –Okta and Microsoft — Everything’s not burning down 10:27 – https://github.com/SigmaHQ/sigma/tree/master/rules/cloud/okta 13:29 – https://github.com/elastic/detection-rules/tree/main/rules/integrations/okta 18:20 – https://www.dsolutionsgroup.com/pci-dss-password-requirements/ 27:44 – https://twitter.com/BushidoToken/status/1506338850557337603</p>
<p>The post <a href="https://www.blackhillsinfosec.com/talkin-about-infosec-news-3-30-2022/">Talkin’ About Infosec News – 3/30/2022</a> appeared first on <a href="https://www.blackhillsinfosec.com">Black Hills Information Security</a>.</p>
<ul><li>(00:00) - BHIS - 2022-03-22 Special Newscast –Okta and Microsoft — Everything's not burning down</li>
<li>(10:27) - https://github.com/SigmaHQ/sigma/tree/master/rules/cloud/okta</li>
<li>(13:29) - https://github.com/elastic/detection-rules/tree/main/rules/integrations/okta</li>
<li>(18:20) - https://www.dsolutionsgroup.com/pci-dss-password-requirements/#:~:text=According%20to%20PCI%20DSS%2C%20employees,bare%20minimum%20for%20password%20security</li>
<li>(27:44) - https://twitter.com/BushidoToken/status/1506338850557337603</li>
</ul>]]>
      </content:encoded>
      <pubDate>Wed, 30 Mar 2022 14:31:24 -0400</pubDate>
      <author>Black Hills Information Security</author>
      <enclosure url="https://media.transistor.fm/4e19278e/b5254a1d.mp3" length="48844573" type="audio/mpeg"/>
      <itunes:author>Black Hills Information Security</itunes:author>
      <itunes:image href="https://img.transistorcdn.com/b-Y4sTdghuHXRFbcu4gEQ-uUuYFAe8I6D5e6r6SbhHA/rs:fill:0:0:1/w:1400/h:1400/q:60/mb:500000/aHR0cHM6Ly9pbWct/dXBsb2FkLXByb2R1/Y3Rpb24udHJhbnNp/c3Rvci5mbS9iOGI3/ODc1MGFiMmEyNTgw/ODk4ZTA3NjFlYmQ3/MDRlZS5qcGc.jpg"/>
      <itunes:duration>2964</itunes:duration>
      <itunes:summary>ORIGINALLY AIRED ON MARCH 22, 2022



Articles discussed in this episode:



00:00 – BHIS – 2022-03-22 Special Newscast –Okta and Microsoft — Everything’s not burning down 



10:27 – https://github.com/SigmaHQ/sigma/tree/master/rules/cloud/okta 



13:29 – https://github.com/elastic/detection-rules/tree/main/rules/integrations/okta 



18:20 – https://www.dsolutionsgroup.com/pci-dss-password-requirements/



27:44 – https://twitter.com/BushidoToken/status/1506338850557337603
















We are self-publishing free Infosec Zines called PROMPT#.  



PROMPT# will contain: 

Infosec articles 
Challenging puzzles 
Comic book based on real-life hacking adventures 
Coloring contests 
Bonus Backdoors &amp;amp; Breaches Consultant Cards (print version only) 
Other stuffs 

You can check out current and upcoming issues here: https://www.blackhillsinfosec.com/prompt-zine/ </itunes:summary>
      <itunes:subtitle>ORIGINALLY AIRED ON MARCH 22, 2022



Articles discussed in this episode:



00:00 – BHIS – 2022-03-22 Special Newscast –Okta and Microsoft — Everything’s not burning down 



10:27 – https://github.com/SigmaHQ/sigma/tree/master/rules/cloud/okta 



13:29</itunes:subtitle>
      <itunes:keywords>Infosec,Cybersecurity,news</itunes:keywords>
      <itunes:explicit>No</itunes:explicit>
      <podcast:chapters url="https://share.transistor.fm/s/4e19278e/chapters.json" type="application/json+chapters"/>
    </item>
    <item>
      <title>Talkin’ About Infosec News – 3/29/2022</title>
      <itunes:episode>1</itunes:episode>
      <podcast:episode>1</podcast:episode>
      <itunes:title>Talkin’ About Infosec News – 3/29/2022</itunes:title>
      <itunes:episodeType>full</itunes:episodeType>
      <guid isPermaLink="false">https://www.blackhillsinfosec.com/?p=21149</guid>
      <link>https://share.transistor.fm/s/e2c479ba</link>
      <description>
        <![CDATA[<p>ORIGINALLY AIRED ON MARCH 21, 2022 Articles discussed in this episode: 03:27 – Netflix to clamp down on password sharing – https://about.netflix.com/en/news/paying-to-share-netflix-outside-your-household 10:15 – Ransomeware is still a thing 12:31 – Ransomeware Tell-All – https://www.zdnet.com/article/hit-by-ransomware-or-paid-a-ransom-now-some-companies-will-have-to-tell-the-government/ 24:01 – Microsoft Defender tags Office Updates as ransomware – https://www.bleepingcomputer.com/news/security/microsoft-defender-tags-office-updates-as-ransomware-activity/ 31:01 – Microsft Double Patch Tuesday – https://www.bleepingcomputer.com/news/microsoft/windows-zero-day-flaw-giving-admin-rights-gets-unofficial-patch-again/ 32:28 […]</p>
<p>The post <a href="https://www.blackhillsinfosec.com/talkin-about-infosec-news-3-29-2022/">Talkin’ About Infosec News – 3/29/2022</a> appeared first on <a href="https://www.blackhillsinfosec.com">Black Hills Information Security</a>.</p>
<ul><li>(00:00) - BHIS - Talkin' Bout [infosec] News 2022-03-21</li>
<li>(03:27) - Netflix to clamp down on password sharing</li>
<li>(10:15) - Ransomeware is still a thing</li>
<li>(12:31) - Ransomeware Tell-All</li>
<li>(24:01) - Microsoft Defender tags Office Updates as ransomware</li>
<li>(31:01) - Microsft Double Patch Tuesday</li>
<li>(32:28) - BitB attack</li>
<li>(39:44) - Women make up just 24% of the cyber workforce</li>
</ul>]]>
      </description>
      <content:encoded>
        <![CDATA[<p>ORIGINALLY AIRED ON MARCH 21, 2022 Articles discussed in this episode: 03:27 – Netflix to clamp down on password sharing – https://about.netflix.com/en/news/paying-to-share-netflix-outside-your-household 10:15 – Ransomeware is still a thing 12:31 – Ransomeware Tell-All – https://www.zdnet.com/article/hit-by-ransomware-or-paid-a-ransom-now-some-companies-will-have-to-tell-the-government/ 24:01 – Microsoft Defender tags Office Updates as ransomware – https://www.bleepingcomputer.com/news/security/microsoft-defender-tags-office-updates-as-ransomware-activity/ 31:01 – Microsft Double Patch Tuesday – https://www.bleepingcomputer.com/news/microsoft/windows-zero-day-flaw-giving-admin-rights-gets-unofficial-patch-again/ 32:28 […]</p>
<p>The post <a href="https://www.blackhillsinfosec.com/talkin-about-infosec-news-3-29-2022/">Talkin’ About Infosec News – 3/29/2022</a> appeared first on <a href="https://www.blackhillsinfosec.com">Black Hills Information Security</a>.</p>
<ul><li>(00:00) - BHIS - Talkin' Bout [infosec] News 2022-03-21</li>
<li>(03:27) - Netflix to clamp down on password sharing</li>
<li>(10:15) - Ransomeware is still a thing</li>
<li>(12:31) - Ransomeware Tell-All</li>
<li>(24:01) - Microsoft Defender tags Office Updates as ransomware</li>
<li>(31:01) - Microsft Double Patch Tuesday</li>
<li>(32:28) - BitB attack</li>
<li>(39:44) - Women make up just 24% of the cyber workforce</li>
</ul>]]>
      </content:encoded>
      <pubDate>Tue, 29 Mar 2022 13:36:41 -0400</pubDate>
      <author>Black Hills Information Security</author>
      <enclosure url="https://media.transistor.fm/e2c479ba/eb5dd1e5.mp3" length="46090932" type="audio/mpeg"/>
      <itunes:author>Black Hills Information Security</itunes:author>
      <itunes:image href="https://img.transistorcdn.com/xXTio-Ki9AHTt2a34wxRJd0DTIEZJRaQ6TOWX6UdR3g/rs:fill:0:0:1/w:1400/h:1400/q:60/mb:500000/aHR0cHM6Ly9pbWct/dXBsb2FkLXByb2R1/Y3Rpb24udHJhbnNp/c3Rvci5mbS8wZGQx/ZGZmM2M3OWU3MDA2/Nzk0ZGUzYTIwYzgx/YjgzOC5qcGc.jpg"/>
      <itunes:duration>2781</itunes:duration>
      <itunes:summary>ORIGINALLY AIRED ON MARCH 21, 2022



Articles discussed in this episode:



03:27 – Netflix to clamp down on password sharing – https://about.netflix.com/en/news/paying-to-share-netflix-outside-your-household 



10:15 – Ransomeware is still a thing 



12:31 – Ransomeware Tell-All – https://www.zdnet.com/article/hit-by-ransomware-or-paid-a-ransom-now-some-companies-will-have-to-tell-the-government/ 



24:01 – Microsoft Defender tags Office Updates as ransomware – https://www.bleepingcomputer.com/news/security/microsoft-defender-tags-office-updates-as-ransomware-activity/ 



31:01 – Microsft Double Patch Tuesday – https://www.bleepingcomputer.com/news/microsoft/windows-zero-day-flaw-giving-admin-rights-gets-unofficial-patch-again/ 



32:28 – BitB attack – https://thehackernews.com/2022/03/new-browser-in-browser-bitb-attack.html 



39:44 – Women make up just 24% of the cyber workforce – https://www.cbsnews.com/news/cyber-workforce-cisa-director-jen-easterly/?ftag=CNM-00-10aac3a
















We are self-publishing free Infosec Zines called PROMPT#.  



PROMPT# will contain: 

Infosec articles 
Challenging puzzles 
Comic book based on real-life hacking adventures 
Coloring contests 
Bonus Backdoors &amp;amp; Breaches Consultant Cards (print version only) 
Other stuffs 

You can check out current and upcoming issues here: https://www.blackhillsinfosec.com/prompt-zine/ </itunes:summary>
      <itunes:subtitle>ORIGINALLY AIRED ON MARCH 21, 2022



Articles discussed in this episode:



03:27 – Netflix to clamp down on password sharing – https://about.netflix.com/en/news/paying-to-share-netflix-outside-your-household 



10:15 – Ransomeware is still a thing 



</itunes:subtitle>
      <itunes:keywords>Infosec,Cybersecurity,news</itunes:keywords>
      <itunes:explicit>No</itunes:explicit>
      <podcast:chapters url="https://share.transistor.fm/s/e2c479ba/chapters.json" type="application/json+chapters"/>
    </item>
    <item>
      <title>Talkin’ About Infosec News – Special Ukraine Edition – 3/10/2022</title>
      <itunes:episode>1</itunes:episode>
      <podcast:episode>1</podcast:episode>
      <itunes:title>Talkin’ About Infosec News – Special Ukraine Edition – 3/10/2022</itunes:title>
      <itunes:episodeType>full</itunes:episodeType>
      <guid isPermaLink="false">https://www.blackhillsinfosec.com/?p=21056</guid>
      <link>https://share.transistor.fm/s/322352db</link>
      <description>
        <![CDATA[<p>ORIGINALLY AIRED ON MARCH 7, 2022 Articles discussed in this episode: 00:08:57 – Hacker Group Anonymous and Others Targeting Russian Data – https://www.websiteplanet.com/blog/cyberwarfare-ukraine-anonymous/</p>
<p>The post <a href="https://www.blackhillsinfosec.com/talkin-about-infosec-news-special-ukraine-edition-3-10-2022/">Talkin’ About Infosec News – Special Ukraine Edition – 3/10/2022</a> appeared first on <a href="https://www.blackhillsinfosec.com">Black Hills Information Security</a>.</p>
<ul><li>(00:00) - Start</li>
<li>(08:57) - Hacker Group Anonymous and Others Targeting Russian Data</li>
</ul>]]>
      </description>
      <content:encoded>
        <![CDATA[<p>ORIGINALLY AIRED ON MARCH 7, 2022 Articles discussed in this episode: 00:08:57 – Hacker Group Anonymous and Others Targeting Russian Data – https://www.websiteplanet.com/blog/cyberwarfare-ukraine-anonymous/</p>
<p>The post <a href="https://www.blackhillsinfosec.com/talkin-about-infosec-news-special-ukraine-edition-3-10-2022/">Talkin’ About Infosec News – Special Ukraine Edition – 3/10/2022</a> appeared first on <a href="https://www.blackhillsinfosec.com">Black Hills Information Security</a>.</p>
<ul><li>(00:00) - Start</li>
<li>(08:57) - Hacker Group Anonymous and Others Targeting Russian Data</li>
</ul>]]>
      </content:encoded>
      <pubDate>Thu, 10 Mar 2022 10:45:51 -0500</pubDate>
      <author>Black Hills Information Security</author>
      <enclosure url="https://media.transistor.fm/322352db/73fd77a7.mp3" length="61833390" type="audio/mpeg"/>
      <itunes:author>Black Hills Information Security</itunes:author>
      <itunes:image href="https://img.transistorcdn.com/v8dNbvjiPvPZcVRoScEpMxn-1Er27fhvaC4OiXy6acA/rs:fill:0:0:1/w:1400/h:1400/q:60/mb:500000/aHR0cHM6Ly9pbWct/dXBsb2FkLXByb2R1/Y3Rpb24udHJhbnNp/c3Rvci5mbS82MDA3/ODlhYmM1YTBmMzMz/MjViYzUwYzNjOWYx/M2E5Ny5qcGc.jpg"/>
      <itunes:duration>3815</itunes:duration>
      <itunes:summary>ORIGINALLY AIRED ON MARCH 7, 2022



Articles discussed in this episode:



00:08:57 – Hacker Group Anonymous and Others Targeting Russian Data – https://www.websiteplanet.com/blog/cyberwarfare-ukraine-anonymous/
















We are self-publishing free Infosec Zines called PROMPT#.  



PROMPT# will contain: 

Infosec articles 
Challenging puzzles 
Comic book based on real-life hacking adventures 
Coloring contests 
Bonus Backdoors &amp;amp; Breaches Consultant Cards (print version only) 
Other stuffs 

You can check out current and upcoming issues here: https://www.blackhillsinfosec.com/prompt-zine/ </itunes:summary>
      <itunes:subtitle>ORIGINALLY AIRED ON MARCH 7, 2022



Articles discussed in this episode:



00:08:57 – Hacker Group Anonymous and Others Targeting Russian Data – https://www.websiteplanet.com/blog/cyberwarfare-ukraine-anonymous/
















We are self-publishing fre</itunes:subtitle>
      <itunes:keywords>Infosec,Cybersecurity,news</itunes:keywords>
      <itunes:explicit>No</itunes:explicit>
      <podcast:chapters url="https://share.transistor.fm/s/322352db/chapters.json" type="application/json+chapters"/>
    </item>
    <item>
      <title>Talkin’ About Infosec News – 3/4/2022</title>
      <itunes:episode>1</itunes:episode>
      <podcast:episode>1</podcast:episode>
      <itunes:title>Talkin’ About Infosec News – 3/4/2022</itunes:title>
      <itunes:episodeType>full</itunes:episodeType>
      <guid isPermaLink="false">https://www.blackhillsinfosec.com/?p=21031</guid>
      <link>https://share.transistor.fm/s/ae609cf5</link>
      <description>
        <![CDATA[<p>ORIGINALLY AIRED ON FEBRUARY 28, 2022 Articles discussed in this episode: 00:00 – PreShow Banter™ — Off-Brand Trickx 00:43 – BHIS – Talkin’ Bout [infosec] News 2022-02-28 02:40 – BHIS Anti-Vigilante PSA 04:17 – Biden has been presented with options for massive cyberattacks against Russia – https://www.nbcnews.com/politics/national-security/biden-presented-options-massive-cyberattacks-russia-rcna17558?mc_cid=e57638ad42 09:46 – Russia has been preparing to have […]</p>
<p>The post <a href="https://www.blackhillsinfosec.com/talkin-about-infosec-news-3-4-2022/">Talkin’ About Infosec News – 3/4/2022</a> appeared first on <a href="https://www.blackhillsinfosec.com">Black Hills Information Security</a>.</p>
<ul><li>(00:00) - PreShow Banter™ — Off-Brand Trickx</li>
<li>(00:43) - BHIS - Talkin' Bout [infosec] News 2022-02-28</li>
<li>(02:40) - BHIS Anti-Vigilante PSA</li>
<li>(04:17) - Biden has been presented with options for massive cyberattacks against Russia</li>
<li>(09:46) - Russia has been preparing to have its internet cut off</li>
<li>(12:45) - Conti ransomware gang chats leaked by pro-Ukraine member</li>
<li>(14:43) - 'Hundreds of computers' in Ukraine hit with wiper malware as conflict continues</li>
<li>(18:04) - NVIDIA Hit By Major Cyberattack That May Have ‘Completely Compromised’ Parts of Its Business</li>
<li>(22:28) - A SWIFT discussion ( no article )</li>
<li>(28:59) - Russia started blocking Tor</li>
<li>(32:28) - Elon Musk pledges to send Starlink terminals to Ukraine</li>
<li>(36:10) - Insurance giant AON hit by a cyberattack over the weekend</li>
<li>(46:02) - People &amp; orgs providing FREE cyber services to Ukrainians</li>
<li>(52:39) - Threatbutt Internet Hacking Attack Attribution Map</li>
</ul>]]>
      </description>
      <content:encoded>
        <![CDATA[<p>ORIGINALLY AIRED ON FEBRUARY 28, 2022 Articles discussed in this episode: 00:00 – PreShow Banter™ — Off-Brand Trickx 00:43 – BHIS – Talkin’ Bout [infosec] News 2022-02-28 02:40 – BHIS Anti-Vigilante PSA 04:17 – Biden has been presented with options for massive cyberattacks against Russia – https://www.nbcnews.com/politics/national-security/biden-presented-options-massive-cyberattacks-russia-rcna17558?mc_cid=e57638ad42 09:46 – Russia has been preparing to have […]</p>
<p>The post <a href="https://www.blackhillsinfosec.com/talkin-about-infosec-news-3-4-2022/">Talkin’ About Infosec News – 3/4/2022</a> appeared first on <a href="https://www.blackhillsinfosec.com">Black Hills Information Security</a>.</p>
<ul><li>(00:00) - PreShow Banter™ — Off-Brand Trickx</li>
<li>(00:43) - BHIS - Talkin' Bout [infosec] News 2022-02-28</li>
<li>(02:40) - BHIS Anti-Vigilante PSA</li>
<li>(04:17) - Biden has been presented with options for massive cyberattacks against Russia</li>
<li>(09:46) - Russia has been preparing to have its internet cut off</li>
<li>(12:45) - Conti ransomware gang chats leaked by pro-Ukraine member</li>
<li>(14:43) - 'Hundreds of computers' in Ukraine hit with wiper malware as conflict continues</li>
<li>(18:04) - NVIDIA Hit By Major Cyberattack That May Have ‘Completely Compromised’ Parts of Its Business</li>
<li>(22:28) - A SWIFT discussion ( no article )</li>
<li>(28:59) - Russia started blocking Tor</li>
<li>(32:28) - Elon Musk pledges to send Starlink terminals to Ukraine</li>
<li>(36:10) - Insurance giant AON hit by a cyberattack over the weekend</li>
<li>(46:02) - People &amp; orgs providing FREE cyber services to Ukrainians</li>
<li>(52:39) - Threatbutt Internet Hacking Attack Attribution Map</li>
</ul>]]>
      </content:encoded>
      <pubDate>Fri, 04 Mar 2022 12:49:47 -0500</pubDate>
      <author>Black Hills Information Security</author>
      <enclosure url="https://media.transistor.fm/ae609cf5/69013c51.mp3" length="57168537" type="audio/mpeg"/>
      <itunes:author>Black Hills Information Security</itunes:author>
      <itunes:image href="https://img.transistorcdn.com/ldGyIUoffiLnhozGgYLGt_vrlgy6zy9Sj5WNczCC1do/rs:fill:0:0:1/w:1400/h:1400/q:60/mb:500000/aHR0cHM6Ly9pbWct/dXBsb2FkLXByb2R1/Y3Rpb24udHJhbnNp/c3Rvci5mbS8zM2Yx/OWEwZTg3OGRjZWJi/MzRiMWFhMjA0M2Qy/MWY4OC5qcGc.jpg"/>
      <itunes:duration>3386</itunes:duration>
      <itunes:summary>ORIGINALLY AIRED ON FEBRUARY 28, 2022



Articles discussed in this episode:



00:00 – PreShow Banter™ — Off-Brand Trickx 



00:43 – BHIS – Talkin’ Bout [infosec] News 2022-02-28 



02:40 – BHIS Anti-Vigilante PSA 04:17 – Biden has been presented with options for massive cyberattacks against Russia – https://www.nbcnews.com/politics/national-security/biden-presented-options-massive-cyberattacks-russia-rcna17558?mc_cid=e57638ad42 



09:46 – Russia has been preparing to have its internet cut off – https://qz.com/2133643/russia-has-been-preparing-to-have-its-internet-sanctioned/ 



12:45 – Conti ransomware gang chats leaked by pro-Ukraine member – https://therecord.media/conti-ransomware-gang-chats-leaked-by-pro-ukraine-member/ 



14:43 – ‘Hundreds of computers’ in Ukraine hit with wiper malware as conflict continues – https://www.theregister.com/2022/02/23/ukraine_wiper_malware/ 



18:04 – NVIDIA Hit By Major Cyberattack That May Have ‘Completely Compromised’ Parts of Its Business – https://wccftech.com/nvidia-hit-by-major-cyberattack-that-may-have-completely-compromised-parts-of-its-business/ 



22:28 – A SWIFT discussion ( no article ) 



28:59 – Russia started blocking Tor – https://ooni.org/post/2021-russia-blocks-tor 



32:28 – Elon Musk pledges to send Starlink terminals to Ukraine – https://finance.yahoo.com/news/elon-musk-starlink-ukraine-174449866.html 



36:10 – Insurance giant AON hit by a cyberattack over the weekend – https://www.bleepingcomputer.com/news/security/insurance-giant-aon-hit-by-a-cyberattack-over-the-weekend/ 



46:02 – People &amp;amp; orgs providing FREE cyber services to Ukrainians – https://twitter.com/chrisculling/status/1497023038323404803?s=21 



52:39 – Threatbutt Internet Hacking Attack Attribution Map – https://threatbutt.com/map/
















We are self-publishing free Infosec Zines called PROMPT#.</itunes:summary>
      <itunes:subtitle>ORIGINALLY AIRED ON FEBRUARY 28, 2022



Articles discussed in this episode:



00:00 – PreShow Banter™ — Off-Brand Trickx 



00:43 – BHIS – Talkin’ Bout [infosec] News 2022-02-28 



02:40 – BHIS Anti-Vigilante PSA 04:17 – Biden has been presented with </itunes:subtitle>
      <itunes:keywords>Infosec,Cybersecurity,news</itunes:keywords>
      <itunes:explicit>No</itunes:explicit>
      <podcast:chapters url="https://share.transistor.fm/s/ae609cf5/chapters.json" type="application/json+chapters"/>
    </item>
    <item>
      <title>Talkin’ About Infosec News – 3/1/2022</title>
      <itunes:episode>1</itunes:episode>
      <podcast:episode>1</podcast:episode>
      <itunes:title>Talkin’ About Infosec News – 3/1/2022</itunes:title>
      <itunes:episodeType>full</itunes:episodeType>
      <guid isPermaLink="false">https://www.blackhillsinfosec.com/?p=21024</guid>
      <link>https://share.transistor.fm/s/9e212795</link>
      <description>
        <![CDATA[<p>ORIGINALLY AIRED ON FEBRUARY 21, 2022 Articles discussed in this episode: 02:36 – Story # 1: Massive cyberattack takes Ukraine military, big bank websites offline – https://www.theregister.com/2022/02/15/ukraine_cyberattack/ 04:26 – Story # 2: The Elite Hackers of the FSB – https://interaktiv.br.de/elite-hacker-fsb/en/index.html 07:47 – Story # 3: Exclusive: FBI Braces for Russian Cyber Attacks in US as […]</p>
<p>The post <a href="https://www.blackhillsinfosec.com/talkin-about-infosec-news-3-1-2022/">Talkin’ About Infosec News – 3/1/2022</a> appeared first on <a href="https://www.blackhillsinfosec.com">Black Hills Information Security</a>.</p>
<ul><li>(00:00) - BHIS - Talkin' Bout [infosec] News 2022-02-21</li>
<li>(02:36) - Story # 1: Massive cyberattack takes Ukraine military, big bank websites offline</li>
<li>(04:26) - Story # 2: The Elite Hackers of the FSB</li>
<li>(07:47) - Story # 3: Exclusive: FBI Braces for Russian Cyber Attacks in US as Ukraine Tensions Rise</li>
<li>(18:22) - Story # 4: Microsoft Defender will soon block Windows password theft</li>
<li>(22:28) - Story # 5: Dad takes down town's internet by mistake to get his kids offline</li>
<li>(28:50) - Story # 6: Akamai acquires Linode for $900M</li>
<li>(34:49) - Story # 7: Microsoft eyeing deal to buy cybersecurity firm Mandiant -Bloomberg</li>
<li>(40:00) - Story # 8: If the Cloud Is More Secure, Then Why Is Everything Still Broken?</li>
<li>(44:40) - Story # 9: Never, Ever, Ever Use Pixelation for Redacting Text</li>
</ul>]]>
      </description>
      <content:encoded>
        <![CDATA[<p>ORIGINALLY AIRED ON FEBRUARY 21, 2022 Articles discussed in this episode: 02:36 – Story # 1: Massive cyberattack takes Ukraine military, big bank websites offline – https://www.theregister.com/2022/02/15/ukraine_cyberattack/ 04:26 – Story # 2: The Elite Hackers of the FSB – https://interaktiv.br.de/elite-hacker-fsb/en/index.html 07:47 – Story # 3: Exclusive: FBI Braces for Russian Cyber Attacks in US as […]</p>
<p>The post <a href="https://www.blackhillsinfosec.com/talkin-about-infosec-news-3-1-2022/">Talkin’ About Infosec News – 3/1/2022</a> appeared first on <a href="https://www.blackhillsinfosec.com">Black Hills Information Security</a>.</p>
<ul><li>(00:00) - BHIS - Talkin' Bout [infosec] News 2022-02-21</li>
<li>(02:36) - Story # 1: Massive cyberattack takes Ukraine military, big bank websites offline</li>
<li>(04:26) - Story # 2: The Elite Hackers of the FSB</li>
<li>(07:47) - Story # 3: Exclusive: FBI Braces for Russian Cyber Attacks in US as Ukraine Tensions Rise</li>
<li>(18:22) - Story # 4: Microsoft Defender will soon block Windows password theft</li>
<li>(22:28) - Story # 5: Dad takes down town's internet by mistake to get his kids offline</li>
<li>(28:50) - Story # 6: Akamai acquires Linode for $900M</li>
<li>(34:49) - Story # 7: Microsoft eyeing deal to buy cybersecurity firm Mandiant -Bloomberg</li>
<li>(40:00) - Story # 8: If the Cloud Is More Secure, Then Why Is Everything Still Broken?</li>
<li>(44:40) - Story # 9: Never, Ever, Ever Use Pixelation for Redacting Text</li>
</ul>]]>
      </content:encoded>
      <pubDate>Tue, 01 Mar 2022 15:02:13 -0500</pubDate>
      <author>Black Hills Information Security</author>
      <enclosure url="https://media.transistor.fm/9e212795/ed09fcc0.mp3" length="57024350" type="audio/mpeg"/>
      <itunes:author>Black Hills Information Security</itunes:author>
      <itunes:image href="https://img.transistorcdn.com/F8InkpiMkMYzpNaBwEqfYJJhDx1LRfyddIv0YqalzQ8/rs:fill:0:0:1/w:1400/h:1400/q:60/mb:500000/aHR0cHM6Ly9pbWct/dXBsb2FkLXByb2R1/Y3Rpb24udHJhbnNp/c3Rvci5mbS82NTJj/NTZkZWZmZjliZGJi/YWI4OGRkY2QwNTI4/MmExMC5qcGc.jpg"/>
      <itunes:duration>3410</itunes:duration>
      <itunes:summary>ORIGINALLY AIRED ON FEBRUARY 21, 2022



Articles discussed in this episode:



02:36 – Story # 1: Massive cyberattack takes Ukraine military, big bank websites offline – https://www.theregister.com/2022/02/15/ukraine_cyberattack/ 



04:26 – Story # 2: The Elite Hackers of the FSB – https://interaktiv.br.de/elite-hacker-fsb/en/index.html 



07:47 – Story # 3: Exclusive: FBI Braces for Russian Cyber Attacks in US as Ukraine Tensions Rise – https://www.newsweek.com/exclusive-fbi-warns-russia-may-launch-cyber-attacks-us-ukraine-tensions-rise-1681012 



18:22 – Story # 4: Microsoft Defender will soon block Windows password theft –https://www.bleepingcomputer.com/news/microsoft/microsoft-defender-will-soon-block-windows-password-theft/ 



22:28 – Story # 5: Dad takes down town’s internet by mistake to get his kids offline – https://www.bleepingcomputer.com/news/technology/dad-takes-down-towns-internet-by-mistake-to-get-his-kids-offline/ 



28:50 – Story # 6: Akamai acquires Linode for $900M – https://techcrunch.com/2022/02/15/akamai-acquires-linode-for-900m/ 



34:49 – Story # 7: Microsoft eyeing deal to buy cybersecurity firm Mandiant -Bloomberg – https://www.reuters.com/technology/microsoft-considers-deal-buy-cybersecurity-firm-mandiant-bloomberg-news-2022-02-08/ 



40:00 – Story # 8: If the Cloud Is More Secure, Then Why Is Everything Still Broken? – https://www.darkreading.com/cloud/if-the-cloud-is-more-secure-then-why-is-everything-still-broken- 



44:40 – Story # 9: Never, Ever, Ever Use Pixelation for Redacting Text – https://bishopfox.com/blog/unredacter-tool-never-pixelation
















We are self-publishing free Infosec Zines called PROMPT#.  



PROMPT# will contain: 

Infosec articles 
Challenging puzzles 
Comic book based on real-life hacking adventures 
Coloring contests 
Bonus Backdoors &amp;amp; Breaches Consultant Cards (print version only) 
Other stuffs </itunes:summary>
      <itunes:subtitle>ORIGINALLY AIRED ON FEBRUARY 21, 2022



Articles discussed in this episode:



02:36 – Story # 1: Massive cyberattack takes Ukraine military, big bank websites offline – https://www.theregister.com/2022/02/15/ukraine_cyberattack/ 



04:26 – Story # 2: T</itunes:subtitle>
      <itunes:keywords>Infosec,Cybersecurity,news</itunes:keywords>
      <itunes:explicit>No</itunes:explicit>
      <podcast:chapters url="https://share.transistor.fm/s/9e212795/chapters.json" type="application/json+chapters"/>
    </item>
    <item>
      <title>Talkin’ About Infosec News – 2/11/2022</title>
      <itunes:episode>1</itunes:episode>
      <podcast:episode>1</podcast:episode>
      <itunes:title>Talkin’ About Infosec News – 2/11/2022</itunes:title>
      <itunes:episodeType>full</itunes:episodeType>
      <guid isPermaLink="false">https://www.blackhillsinfosec.com/?p=20843</guid>
      <link>https://share.transistor.fm/s/af0d5b76</link>
      <description>
        <![CDATA[<p>ORIGINALLY AIRED ON FEBRUARY 7, 2022 Articles discussed in this episode: 00:00 – PreShow Banter™ — I’m a Rocket Mail 01:21 – BHIS – Talkin’ Bout [infosec] News 2022-02-07 02:18 – Story # 1: Be Careful When Sharing Data in Photos – https://twitter.com/amateuradam/status/1490394034900197388 03:44 – Story # 2: China-Linked Group Attacked Taiwanese Financial Firms for […]</p>
<p>The post <a href="https://www.blackhillsinfosec.com/talkin-about-infosec-news-2-11-2022/">Talkin’ About Infosec News – 2/11/2022</a> appeared first on <a href="https://www.blackhillsinfosec.com">Black Hills Information Security</a>.</p>
<ul><li>(00:00) - PreShow Banter™ — I'm a Rocket Mail</li>
<li>(01:21) - BHIS - Talkin' Bout [infosec] News 2022-02-07</li>
<li>(02:18) - Story # 1: Be Careful When Sharing Data in Photos</li>
<li>(03:44) - Story # 2: China-Linked Group Attacked Taiwanese Financial Firms for 18 Months</li>
<li>(20:56) - Story # 3: Microsoft to block internet macros by default in five Office applications</li>
<li>(28:11) - Story # 4: Apple's Privacy Measures to Cost Facebook $10 Billion in 2022</li>
<li>(47:27) - Noisy browser plugin</li>
<li>(51:15) - Cool Leather Jackets</li>
</ul>]]>
      </description>
      <content:encoded>
        <![CDATA[<p>ORIGINALLY AIRED ON FEBRUARY 7, 2022 Articles discussed in this episode: 00:00 – PreShow Banter™ — I’m a Rocket Mail 01:21 – BHIS – Talkin’ Bout [infosec] News 2022-02-07 02:18 – Story # 1: Be Careful When Sharing Data in Photos – https://twitter.com/amateuradam/status/1490394034900197388 03:44 – Story # 2: China-Linked Group Attacked Taiwanese Financial Firms for […]</p>
<p>The post <a href="https://www.blackhillsinfosec.com/talkin-about-infosec-news-2-11-2022/">Talkin’ About Infosec News – 2/11/2022</a> appeared first on <a href="https://www.blackhillsinfosec.com">Black Hills Information Security</a>.</p>
<ul><li>(00:00) - PreShow Banter™ — I'm a Rocket Mail</li>
<li>(01:21) - BHIS - Talkin' Bout [infosec] News 2022-02-07</li>
<li>(02:18) - Story # 1: Be Careful When Sharing Data in Photos</li>
<li>(03:44) - Story # 2: China-Linked Group Attacked Taiwanese Financial Firms for 18 Months</li>
<li>(20:56) - Story # 3: Microsoft to block internet macros by default in five Office applications</li>
<li>(28:11) - Story # 4: Apple's Privacy Measures to Cost Facebook $10 Billion in 2022</li>
<li>(47:27) - Noisy browser plugin</li>
<li>(51:15) - Cool Leather Jackets</li>
</ul>]]>
      </content:encoded>
      <pubDate>Fri, 11 Feb 2022 12:57:02 -0500</pubDate>
      <author>Black Hills Information Security</author>
      <enclosure url="https://media.transistor.fm/af0d5b76/d51c5e3e.mp3" length="52276968" type="audio/mpeg"/>
      <itunes:author>Black Hills Information Security</itunes:author>
      <itunes:image href="https://img.transistorcdn.com/v6c8LER9-hesp7Otir1eJDfqdRNFESdYwvkBpnSqWf0/rs:fill:0:0:1/w:1400/h:1400/q:60/mb:500000/aHR0cHM6Ly9pbWct/dXBsb2FkLXByb2R1/Y3Rpb24udHJhbnNp/c3Rvci5mbS9kNjBh/YjViMDRlYWM5M2Vm/YTMzNGQzNjg3OGMy/MGRjYS5qcGc.jpg"/>
      <itunes:duration>3098</itunes:duration>
      <itunes:summary>ORIGINALLY AIRED ON FEBRUARY 7, 2022



Articles discussed in this episode:



00:00 – PreShow Banter™ — I’m a Rocket Mail 



01:21 – BHIS – Talkin’ Bout [infosec] News 2022-02-07 



02:18 – Story # 1: Be Careful When Sharing Data in Photos – https://twitter.com/amateuradam/status/1490394034900197388 



03:44 – Story # 2: China-Linked Group Attacked Taiwanese Financial Firms for 18 Months – https://www.darkreading.com/threat-intelligence/china-linked-group-attacked-taiwanese-financial-firms-for-18-months 



20:56 – Story # 3: Microsoft to block internet macros by default in five Office applications – https://therecord.media/microsoft-blocks-internet-macros-by-default-in-five-office-applications/ 



28:11 – Story # 4: Apple’s Privacy Measures to Cost Facebook $10 Billion in 2022 – https://www.macrumors.com/2022/02/03/facebook-10-billion-in-2022-apple-measures/ 



47:27 – Noisy browser plugin – https://noiszy.com 



51:15 – Cool Leather Jackets
















We are self-publishing free Infosec Zines called PROMPT#.  



PROMPT# will contain: 

Infosec articles 
Challenging puzzles 
Comic book based on real-life hacking adventures 
Coloring contests 
Bonus Backdoors &amp;amp; Breaches Consultant Cards (print version only) 
Other stuffs 

You can check out current and upcoming issues here: https://www.blackhillsinfosec.com/prompt-zine/ </itunes:summary>
      <itunes:subtitle>ORIGINALLY AIRED ON FEBRUARY 7, 2022



Articles discussed in this episode:



00:00 – PreShow Banter™ — I’m a Rocket Mail 



01:21 – BHIS – Talkin’ Bout [infosec] News 2022-02-07 



02:18 – Story # 1: Be Careful When Sharing Data in Photos – https://tw</itunes:subtitle>
      <itunes:keywords>Infosec,Cybersecurity,news</itunes:keywords>
      <itunes:explicit>No</itunes:explicit>
      <podcast:chapters url="https://share.transistor.fm/s/af0d5b76/chapters.json" type="application/json+chapters"/>
    </item>
    <item>
      <title>Talkin’ About Infosec News – 2/4/2022</title>
      <itunes:episode>1</itunes:episode>
      <podcast:episode>1</podcast:episode>
      <itunes:title>Talkin’ About Infosec News – 2/4/2022</itunes:title>
      <itunes:episodeType>full</itunes:episodeType>
      <guid isPermaLink="false">https://www.blackhillsinfosec.com/?p=20587</guid>
      <link>https://share.transistor.fm/s/97ee9249</link>
      <description>
        <![CDATA[<p>ORIGINALLY AIRED ON JANUARY 31, 2022 Articles discussed in this episode: 00:00 – PreShow Banter™ — Legions of the Undead 01:26 – BHIS – Talkin’ Bout [infosec] News 2022-01-31 04:06 – Story # 1: Hacktivists say they hacked Belarus rail system to stop Russian military buildup – https://arstechnica.com/information-technology/2022/01/hactivists-say-they-hacked-belarus-rail-system-to-stop-russian-military-buildup/ 08:46 – Story # 2: Ukrainian government […]</p>
<p>The post <a href="https://www.blackhillsinfosec.com/talkin-about-infosec-news-2-4-2022/">Talkin’ About Infosec News – 2/4/2022</a> appeared first on <a href="https://www.blackhillsinfosec.com">Black Hills Information Security</a>.</p>
<ul><li>(00:00) - PreShow Banter™ — Legions of the Undead</li>
<li>(01:26) - BHIS - Talkin' Bout [infosec] News 2022-01-31</li>
<li>(04:06) - Story # 1: Hactivists say they hacked Belarus rail system to stop Russian military buildup</li>
<li>(08:46) - Story # 2: Ukrainian government calls out false flag operation in recent data wiping attack</li>
<li>(11:18) - Story # 3: Ukrainian cyber defense in need of upgrades as tensions rise</li>
<li>(17:32) - Story # 4: DoD weapons testers to assess cybersecurity of GPS satellites, ground system and user equipment</li>
<li>(24:50) - Story # 5: FBI Reportedly Considered Buying NSO Spyware</li>
<li>(28:02) - Story # 6: Hacking the Apple Webcam (again)</li>
<li>(30:36) - Story # 7: Microsoft Teams users can now chat with any Teams user outside their organization</li>
<li>(34:11) - Story # 7b: https://twitter.com/rucam365/status/1487861808081915906</li>
<li>(38:15) - Story # 8: Lazarus hackers use Windows Update to deploy malware</li>
<li>(41:38) - Story # 9: Elon Musk Tried To Pay A Teen Thousands Of Dollars To Stop Tracking His Plane</li>
<li>(45:36) - Story # 10: 1.5M US bank cards have been hacked: NordVPN</li>
<li>(51:15) - Story # 11: 2FA app with 10,000 Google Play downloads loaded well-known banking trojan</li>
<li>(54:50) - Story # 12: Hackers Exploited MSHTML Flaw to Spy on Government and Defense Targets</li>
</ul>]]>
      </description>
      <content:encoded>
        <![CDATA[<p>ORIGINALLY AIRED ON JANUARY 31, 2022 Articles discussed in this episode: 00:00 – PreShow Banter™ — Legions of the Undead 01:26 – BHIS – Talkin’ Bout [infosec] News 2022-01-31 04:06 – Story # 1: Hacktivists say they hacked Belarus rail system to stop Russian military buildup – https://arstechnica.com/information-technology/2022/01/hactivists-say-they-hacked-belarus-rail-system-to-stop-russian-military-buildup/ 08:46 – Story # 2: Ukrainian government […]</p>
<p>The post <a href="https://www.blackhillsinfosec.com/talkin-about-infosec-news-2-4-2022/">Talkin’ About Infosec News – 2/4/2022</a> appeared first on <a href="https://www.blackhillsinfosec.com">Black Hills Information Security</a>.</p>
<ul><li>(00:00) - PreShow Banter™ — Legions of the Undead</li>
<li>(01:26) - BHIS - Talkin' Bout [infosec] News 2022-01-31</li>
<li>(04:06) - Story # 1: Hactivists say they hacked Belarus rail system to stop Russian military buildup</li>
<li>(08:46) - Story # 2: Ukrainian government calls out false flag operation in recent data wiping attack</li>
<li>(11:18) - Story # 3: Ukrainian cyber defense in need of upgrades as tensions rise</li>
<li>(17:32) - Story # 4: DoD weapons testers to assess cybersecurity of GPS satellites, ground system and user equipment</li>
<li>(24:50) - Story # 5: FBI Reportedly Considered Buying NSO Spyware</li>
<li>(28:02) - Story # 6: Hacking the Apple Webcam (again)</li>
<li>(30:36) - Story # 7: Microsoft Teams users can now chat with any Teams user outside their organization</li>
<li>(34:11) - Story # 7b: https://twitter.com/rucam365/status/1487861808081915906</li>
<li>(38:15) - Story # 8: Lazarus hackers use Windows Update to deploy malware</li>
<li>(41:38) - Story # 9: Elon Musk Tried To Pay A Teen Thousands Of Dollars To Stop Tracking His Plane</li>
<li>(45:36) - Story # 10: 1.5M US bank cards have been hacked: NordVPN</li>
<li>(51:15) - Story # 11: 2FA app with 10,000 Google Play downloads loaded well-known banking trojan</li>
<li>(54:50) - Story # 12: Hackers Exploited MSHTML Flaw to Spy on Government and Defense Targets</li>
</ul>]]>
      </content:encoded>
      <pubDate>Fri, 04 Feb 2022 11:49:59 -0500</pubDate>
      <author>Black Hills Information Security</author>
      <enclosure url="https://media.transistor.fm/97ee9249/191679b4.mp3" length="62510087" type="audio/mpeg"/>
      <itunes:author>Black Hills Information Security</itunes:author>
      <itunes:image href="https://img.transistorcdn.com/BAdlivWVDPOdqQQmvTdzgfyvS0XMGV1c2yaQ-6Sl1Dk/rs:fill:0:0:1/w:1400/h:1400/q:60/mb:500000/aHR0cHM6Ly9pbWct/dXBsb2FkLXByb2R1/Y3Rpb24udHJhbnNp/c3Rvci5mbS8zNTU0/ZGY3OTc3N2YyMGMx/ZGVmNmZhZWY4ZWY2/NzZjOC5qcGc.jpg"/>
      <itunes:duration>3702</itunes:duration>
      <itunes:summary>ORIGINALLY AIRED ON JANUARY 31, 2022



Articles discussed in this episode:



00:00 – PreShow Banter™ — Legions of the Undead 



01:26 – BHIS – Talkin’ Bout [infosec] News 2022-01-31 



04:06 – Story # 1: Hacktivists say they hacked Belarus rail system to stop Russian military buildup – https://arstechnica.com/information-technology/2022/01/hactivists-say-they-hacked-belarus-rail-system-to-stop-russian-military-buildup/ 



08:46 – Story # 2: Ukrainian government calls out false flag operation in recent data wiping attack – https://therecord.media/ukrainian-government-calls-out-false-flag-operation-in-recent-data-wiping-attack/ 



11:18 – Story # 3: Ukrainian cyber defense in need of upgrades as tensions rise – https://therecord.media/ukrainian-cyberdefense-in-need-of-upgrades-as-tensions-rise/ 



17:32 – Story # 4: DoD weapons testers to assess cybersecurity of GPS satellites, ground system, and user equipment – https://spacenews.com/dod-weapons-testers-to-assess-cybersecurity-of-gps-satellites-ground-system-and-user-equipment/ 



24:50 – Story # 5: FBI Reportedly Considered Buying NSO Spyware – https://www.govinfosecurity.com/fbi-reportedly-considered-buying-nso-spyware-a-18407 



28:02 – Story # 6: Hacking the Apple Webcam (again) – https://www.ryanpickren.com/safari-uxss 



30:36 – Story # 7: Microsoft Teams users can now chat with any Teams user outside their organization – https://techcommunity.microsoft.com/t5/microsoft-teams-blog/microsoft-teams-users-can-now-chat-with-any-teams-user-outside/ba-p/3070832 



34:11 – Story # 7b: https://twitter.com/rucam365/status/1487861808081915906 



38:15 – Story # 8: Lazarus hackers use Windows Update to deploy malware – https://www.bleepingcomputer.com/news/security/lazarus-hackers-use-windows-update-to-deploy-malware/ 



41:38 – Story # 9: Elon Musk Tried To Pay A Teen Thousands Of Dollars To Stop Tracking His Plane –</itunes:summary>
      <itunes:subtitle>ORIGINALLY AIRED ON JANUARY 31, 2022



Articles discussed in this episode:



00:00 – PreShow Banter™ — Legions of the Undead 



01:26 – BHIS – Talkin’ Bout [infosec] News 2022-01-31 



04:06 – Story # 1: Hacktivists say they hacked Belarus rail system</itunes:subtitle>
      <itunes:keywords>Infosec,Cybersecurity,news</itunes:keywords>
      <itunes:explicit>No</itunes:explicit>
      <podcast:chapters url="https://share.transistor.fm/s/97ee9249/chapters.json" type="application/json+chapters"/>
    </item>
    <item>
      <title>Talkin’ About Infosec News – 1/27/2022</title>
      <itunes:episode>1</itunes:episode>
      <podcast:episode>1</podcast:episode>
      <itunes:title>Talkin’ About Infosec News – 1/27/2022</itunes:title>
      <itunes:episodeType>full</itunes:episodeType>
      <guid isPermaLink="false">https://www.blackhillsinfosec.com/?p=20561</guid>
      <link>https://share.transistor.fm/s/78e66eac</link>
      <description>
        <![CDATA[<p>ORIGINALLY AIRED ON JANUARY 24, 2022 Articles discussed in this episode: 00:00 – PreShow Banter™ — The Monkey Dance 00:25 – BHIS – Talkin’ Bout [infosec] News 2022-01-24 01:49 – Story # 1: New Log4j attacks target SolarWinds, ZyXEL devices – https://therecord.media/new-log4j-attacks-target-solarwinds-zyxel-devices/ 08:18 – Story # 2: New MoonBounce UEFI bootkit can’t be removed by […]</p>
<p>The post <a href="https://www.blackhillsinfosec.com/talkin-about-infosec-news-1-27-2022/">Talkin’ About Infosec News – 1/27/2022</a> appeared first on <a href="https://www.blackhillsinfosec.com">Black Hills Information Security</a>.</p>
<ul><li>(00:00) - PreShow Banter™ — The Monkey Dance</li>
<li>(00:25) - BHIS - Talkin' Bout [infosec] News 2022-01-24</li>
<li>(01:49) - Story # 1: New Log4j attacks target SolarWinds, ZyXEL devices</li>
<li>(08:18) - Story # 2: New MoonBounce UEFI bootkit can’t be removed by replacing the hard drive</li>
<li>(13:18) - Story # 3: Crypto.com finally confirms major hack, says it lost $34 million</li>
<li>(15:53) - Story # 3b: Coinbase Hack</li>
<li>(21:47) - Story # 4: Hackers From North Korea Stole Millions Of Dollars From Cryptocurrency Startups All Across The World</li>
<li>(26:42) - Story # 5: Mixed Messages: Busting Box’s MFA Methods</li>
<li>(35:06) - Story # 6: School District reports a 334% hike in cybersecurity insurance costs</li>
<li>(38:42) - Story # 7: Europol takes down VPNLab, a service used by ransomware gangs</li>
<li>(42:12) - Story # 8: Why this threat intelligence expert believes cyberattacks aren’t Ukraine’s biggest concern</li>
</ul>]]>
      </description>
      <content:encoded>
        <![CDATA[<p>ORIGINALLY AIRED ON JANUARY 24, 2022 Articles discussed in this episode: 00:00 – PreShow Banter™ — The Monkey Dance 00:25 – BHIS – Talkin’ Bout [infosec] News 2022-01-24 01:49 – Story # 1: New Log4j attacks target SolarWinds, ZyXEL devices – https://therecord.media/new-log4j-attacks-target-solarwinds-zyxel-devices/ 08:18 – Story # 2: New MoonBounce UEFI bootkit can’t be removed by […]</p>
<p>The post <a href="https://www.blackhillsinfosec.com/talkin-about-infosec-news-1-27-2022/">Talkin’ About Infosec News – 1/27/2022</a> appeared first on <a href="https://www.blackhillsinfosec.com">Black Hills Information Security</a>.</p>
<ul><li>(00:00) - PreShow Banter™ — The Monkey Dance</li>
<li>(00:25) - BHIS - Talkin' Bout [infosec] News 2022-01-24</li>
<li>(01:49) - Story # 1: New Log4j attacks target SolarWinds, ZyXEL devices</li>
<li>(08:18) - Story # 2: New MoonBounce UEFI bootkit can’t be removed by replacing the hard drive</li>
<li>(13:18) - Story # 3: Crypto.com finally confirms major hack, says it lost $34 million</li>
<li>(15:53) - Story # 3b: Coinbase Hack</li>
<li>(21:47) - Story # 4: Hackers From North Korea Stole Millions Of Dollars From Cryptocurrency Startups All Across The World</li>
<li>(26:42) - Story # 5: Mixed Messages: Busting Box’s MFA Methods</li>
<li>(35:06) - Story # 6: School District reports a 334% hike in cybersecurity insurance costs</li>
<li>(38:42) - Story # 7: Europol takes down VPNLab, a service used by ransomware gangs</li>
<li>(42:12) - Story # 8: Why this threat intelligence expert believes cyberattacks aren’t Ukraine’s biggest concern</li>
</ul>]]>
      </content:encoded>
      <pubDate>Thu, 27 Jan 2022 13:29:52 -0500</pubDate>
      <author>Black Hills Information Security</author>
      <enclosure url="https://media.transistor.fm/78e66eac/5c05d364.mp3" length="52107204" type="audio/mpeg"/>
      <itunes:author>Black Hills Information Security</itunes:author>
      <itunes:image href="https://img.transistorcdn.com/fa2eTImz7yXrL3Fhz_Rpk9tgp6BTKbwpNwq6VjqgI2w/rs:fill:0:0:1/w:1400/h:1400/q:60/mb:500000/aHR0cHM6Ly9pbWct/dXBsb2FkLXByb2R1/Y3Rpb24udHJhbnNp/c3Rvci5mbS84YjM0/M2MxN2Q4Yzg5MzEy/YzBkMzE3NDdkNmU2/MzA5OS5qcGc.jpg"/>
      <itunes:duration>3083</itunes:duration>
      <itunes:summary>ORIGINALLY AIRED ON JANUARY 24, 2022



Articles discussed in this episode:



00:00 – PreShow Banter™ — The Monkey Dance 



00:25 – BHIS – Talkin’ Bout [infosec] News 2022-01-24 



01:49 – Story # 1: New Log4j attacks target SolarWinds, ZyXEL devices – https://therecord.media/new-log4j-attacks-target-solarwinds-zyxel-devices/ 



08:18 – Story # 2: New MoonBounce UEFI bootkit can’t be removed by replacing the hard drive – https://therecord.media/new-moonbounce-uefi-bootkit-cant-be-removed-by-replacing-the-hard-drive/ 



13:18 – Story # 3: Crypto.com finally confirms major hack, says it lost $34 million – https://therecord.media/crypto-com-finally-confirms-major-hack-says-it-lost-34-million/ 



15:53 – Story # 3b: Coinbase Hack – https://www.bleepingcomputer.com/news/security/hackers-rob-thousands-of-coinbase-customers-using-mfa-flaw/ 



21:47 – Story # 4: Hackers From North Korea Stole Millions Of Dollars From Cryptocurrency Startups All Across The World. – https://cyberworkx.in/2022/01/17/hackers-from-north-korea-stole-millions-of-dollars-from-cryptocurrency-startups-all-across-the-world/ 



26:42 – Story # 5: Mixed Messages: Busting Box’s MFA Methods – https://www.varonis.com/blog/box-mfa-bypass-sms 



35:06 – Story # 6: School District reports a 334% hike in cybersecurity insurance costs – https://www.bleepingcomputer.com/news/security/school-district-reports-a-334-percent-hike-in-cybersecurity-insurance-costs/ 



38:42 – Story # 7: Europol takes down VPNLab, a service used by ransomware gangs – https://therecord.media/europol-takes-down-vpnlab-a-service-used-by-ransomware-gangs/ 



42:12 – Story # 8: Why this threat intelligence expert believes cyberattacks aren’t Ukraine’s biggest concern – https://therecord.media/why-this-threat-intelligence-expert-believes-cyberattacks-arent-ukraines-biggest-concern/ 



Check out the CoinSecPodcast.com</itunes:summary>
      <itunes:subtitle>ORIGINALLY AIRED ON JANUARY 24, 2022



Articles discussed in this episode:



00:00 – PreShow Banter™ — The Monkey Dance 



00:25 – BHIS – Talkin’ Bout [infosec] News 2022-01-24 



01:49 – Story # 1: New Log4j attacks target SolarWinds, ZyXEL devices –</itunes:subtitle>
      <itunes:keywords>Infosec,Cybersecurity,news</itunes:keywords>
      <itunes:explicit>No</itunes:explicit>
      <podcast:chapters url="https://share.transistor.fm/s/78e66eac/chapters.json" type="application/json+chapters"/>
    </item>
    <item>
      <title>Talkin’ About Infosec News – 1/21/2022</title>
      <itunes:episode>1</itunes:episode>
      <podcast:episode>1</podcast:episode>
      <itunes:title>Talkin’ About Infosec News – 1/21/2022</itunes:title>
      <itunes:episodeType>full</itunes:episodeType>
      <guid isPermaLink="false">https://www.blackhillsinfosec.com/?p=20554</guid>
      <link>https://share.transistor.fm/s/50eecae5</link>
      <description>
        <![CDATA[<p>ORIGINALLY AIRED ON JANUARY 17, 2022 Articles discussed in this episode: 0:00:00 – PreShow Banter™ — Whose Ears Are Buring? 0:01:06 – BHIS – Talkin’ Bout [infosec] News 2022-01-17 0:02:27 – Story # 1: Russia takes down REvil hacking group at U.S. request – https://www.reuters.com/technology/russia-arrests-dismantles-revil-hacking-group-us-request-report-2022-01-14/ 0:07:00 – Story # 2: White House: Arrested Russian hacker […]</p>
<p>The post <a href="https://www.blackhillsinfosec.com/talkin-about-infosec-news-1-21-2022/">Talkin’ About Infosec News – 1/21/2022</a> appeared first on <a href="https://www.blackhillsinfosec.com">Black Hills Information Security</a>.</p>
<ul><li>(00:00) - PreShow Banter™ — Who's Ears Are Buring?</li>
<li>(01:06) - BHIS - Talkin' Bout [infosec] News 2022-01-17</li>
<li>(02:27) - Story # 1: Russia takes down REvil hacking group at U.S. request</li>
<li>(07:00) - Story # 2: White House: Arrested Russian hacker was behind Colonial Pipeline attack</li>
<li>(09:29) - Story # 3: Hotel chain switches to Chrome OS to recover from ransomware attack</li>
<li>(15:22) - Story # 4: QNAP issues ransomware warning to users</li>
<li>(19:56) - Story # 5: Backdoor RAT for Windows, macOS, and Linux went undetected until now</li>
<li>(24:50) - Story # 6: Safari Bug Allows Websites to Track Your Recent Browsing Activity in Real Time</li>
<li>(30:02) - Story # 7: New macOS vulnerability, “powerdir,” could lead to unauthorized user data access</li>
<li>(35:26) - Story # 8: Revealed: UK Gov’t Plans Publicity Blitz to Undermine Privacy of Your Chats</li>
<li>(36:52) - Story # 9: Apple under fire for iPhone encryption technology – Telegraph.co.uk</li>
<li>(44:14) - Story # 10: Scammers put fake QR codes on parking meters to intercept parkers’ payments</li>
<li>(50:38) - Story # 11: Chrome will limit access to private networks, citing security reasons</li>
<li>(54:57) - Story # 12: Cyberattack causes Albuquerque Public Schools to cancel classes Thursday</li>
<li>(01:03:15) - Talkin Bout Keyboards</li>
</ul>]]>
      </description>
      <content:encoded>
        <![CDATA[<p>ORIGINALLY AIRED ON JANUARY 17, 2022 Articles discussed in this episode: 0:00:00 – PreShow Banter™ — Whose Ears Are Buring? 0:01:06 – BHIS – Talkin’ Bout [infosec] News 2022-01-17 0:02:27 – Story # 1: Russia takes down REvil hacking group at U.S. request – https://www.reuters.com/technology/russia-arrests-dismantles-revil-hacking-group-us-request-report-2022-01-14/ 0:07:00 – Story # 2: White House: Arrested Russian hacker […]</p>
<p>The post <a href="https://www.blackhillsinfosec.com/talkin-about-infosec-news-1-21-2022/">Talkin’ About Infosec News – 1/21/2022</a> appeared first on <a href="https://www.blackhillsinfosec.com">Black Hills Information Security</a>.</p>
<ul><li>(00:00) - PreShow Banter™ — Who's Ears Are Buring?</li>
<li>(01:06) - BHIS - Talkin' Bout [infosec] News 2022-01-17</li>
<li>(02:27) - Story # 1: Russia takes down REvil hacking group at U.S. request</li>
<li>(07:00) - Story # 2: White House: Arrested Russian hacker was behind Colonial Pipeline attack</li>
<li>(09:29) - Story # 3: Hotel chain switches to Chrome OS to recover from ransomware attack</li>
<li>(15:22) - Story # 4: QNAP issues ransomware warning to users</li>
<li>(19:56) - Story # 5: Backdoor RAT for Windows, macOS, and Linux went undetected until now</li>
<li>(24:50) - Story # 6: Safari Bug Allows Websites to Track Your Recent Browsing Activity in Real Time</li>
<li>(30:02) - Story # 7: New macOS vulnerability, “powerdir,” could lead to unauthorized user data access</li>
<li>(35:26) - Story # 8: Revealed: UK Gov’t Plans Publicity Blitz to Undermine Privacy of Your Chats</li>
<li>(36:52) - Story # 9: Apple under fire for iPhone encryption technology – Telegraph.co.uk</li>
<li>(44:14) - Story # 10: Scammers put fake QR codes on parking meters to intercept parkers’ payments</li>
<li>(50:38) - Story # 11: Chrome will limit access to private networks, citing security reasons</li>
<li>(54:57) - Story # 12: Cyberattack causes Albuquerque Public Schools to cancel classes Thursday</li>
<li>(01:03:15) - Talkin Bout Keyboards</li>
</ul>]]>
      </content:encoded>
      <pubDate>Fri, 21 Jan 2022 10:15:56 -0500</pubDate>
      <author>Black Hills Information Security</author>
      <enclosure url="https://media.transistor.fm/50eecae5/5914370a.mp3" length="65998607" type="audio/mpeg"/>
      <itunes:author>Black Hills Information Security</itunes:author>
      <itunes:image href="https://img.transistorcdn.com/O8A19rnNqlz10wcw3d6dBih--XOyr6bnt96bLR_mbtw/rs:fill:0:0:1/w:1400/h:1400/q:60/mb:500000/aHR0cHM6Ly9pbWct/dXBsb2FkLXByb2R1/Y3Rpb24udHJhbnNp/c3Rvci5mbS8wMmJl/OTc0YmVlNzg3OTI4/OTYyMDExMjkxYTcz/MmJkOS5qcGc.jpg"/>
      <itunes:duration>3896</itunes:duration>
      <itunes:summary>ORIGINALLY AIRED ON JANUARY 17, 2022



Articles discussed in this episode:



0:00:00 – PreShow Banter™ — Whose Ears Are Buring? 



0:01:06 – BHIS – Talkin’ Bout [infosec] News 2022-01-17 



0:02:27 – Story # 1: Russia takes down REvil hacking group at U.S. request – https://www.reuters.com/technology/russia-arrests-dismantles-revil-hacking-group-us-request-report-2022-01-14/ 



0:07:00 – Story # 2: White House: Arrested Russian hacker was behind Colonial Pipeline attack – https://www.reuters.com/technology/russia-arrests-dismantles-revil-hacking-group-us-request-report-2022-01-14/ 



0:09:29 – Story # 3: Hotel chain switches to Chrome OS to recover from ransomware attack – https://therecord.media/hotel-chain-switches-to-chrome-os-to-recover-from-ransomware-attack/ 



0:15:22 – Story # 4: QNAP issues ransomware warning to users – https://www.techspot.com/news/92909-qnap-issues-warning-users-secure-or-disconnect-unprotected.html 



0:19:56 – Story # 5: Backdoor RAT for Windows, macOS, and Linux went undetected until now – https://arstechnica.com/information-technology/2022/01/backdoor-for-windows-macos-and-linux-went-undetected-until-now/ 



0:24:50 – Story # 6: Safari Bug Allows Websites to Track Your Recent Browsing Activity in Real Time – https://www.macrumors.com/2022/01/16/safari-15-webkit-indexeddb-bug/ 



0:30:02 – Story # 7: New macOS vulnerability, “powerdir,” could lead to unauthorized user data access – https://www.microsoft.com/security/blog/2022/01/10/new-macos-vulnerability-powerdir-could-lead-to-unauthorized-user-data-access/ 



0:35:26 – Story # 8: Revealed: UK Gov’t Plans Publicity Blitz to Undermine Privacy of Your Chats – https://www.rollingstone.com/culture/culture-news/revealed-uk-government-publicity-blitz-to-undermine-privacy-encryption-1285453/ 



0:36:52 – Story # 9: Apple under fire for iPhone encryption technology – Telegraph.co.uk – https://oltnews.com/apple-under-fire-for-iphone-encryption-technology-telegrap...</itunes:summary>
      <itunes:subtitle>ORIGINALLY AIRED ON JANUARY 17, 2022



Articles discussed in this episode:



0:00:00 – PreShow Banter™ — Whose Ears Are Buring? 



0:01:06 – BHIS – Talkin’ Bout [infosec] News 2022-01-17 



0:02:27 – Story # 1: Russia takes down REvil hacking group at</itunes:subtitle>
      <itunes:keywords>Infosec,Cybersecurity,news</itunes:keywords>
      <itunes:explicit>No</itunes:explicit>
      <podcast:chapters url="https://share.transistor.fm/s/50eecae5/chapters.json" type="application/json+chapters"/>
    </item>
    <item>
      <title>Talkin’ About Infosec News – 1/14/2022</title>
      <itunes:episode>1</itunes:episode>
      <podcast:episode>1</podcast:episode>
      <itunes:title>Talkin’ About Infosec News – 1/14/2022</itunes:title>
      <itunes:episodeType>full</itunes:episodeType>
      <guid isPermaLink="false">https://www.blackhillsinfosec.com/?p=20547</guid>
      <link>https://share.transistor.fm/s/c9c1e207</link>
      <description>
        <![CDATA[<p>ORIGINALLY AIRED ON JANUARY 10, 2022 Articles discussed in this episode: 01:58 – Story # 1: WordPress Core Vulnerabilities – https://www.searchenginejournal.com/wordpress-core-vulnerabilities/432042/#close 11:32 – Story # 2: Card-stealing code on over 100 Sotheby’s luxury real estate sites – https://therecord.media/card-stealing-code-found-on-more-than-100-sothebys-luxury-real-estate-sites/ 14:55 – Story # 3: France hits Facebook &amp; Google with $210 million in fines – https://www.bleepingcomputer.com/news/legal/france-hits-facebook-and-google-with-210-million-in-fines/ […]</p>
<p>The post <a href="https://www.blackhillsinfosec.com/talkin-about-infosec-news-1-14-2021/">Talkin’ About Infosec News – 1/14/2022</a> appeared first on <a href="https://www.blackhillsinfosec.com">Black Hills Information Security</a>.</p>
<ul><li>(00:00) - BHIS - Talkin' Bout [infosec] News 2022-01-10</li>
<li>(01:58) - Story # 1: WordPress Core Vulnerabilities</li>
<li>(11:32) - Story # 2: Card-stealing code on over 100 Sotheby’s luxury real estate sites</li>
<li>(14:55) - Story # 3: France hits Facebook &amp; Google with $210 million in fines</li>
<li>(22:14) - Story # 4: Pwn2Own, ShmooCon security conferences postponed due to COVID-19 surge</li>
<li>(24:48) - Story # 5: BREAKING! Cyber Threat Map</li>
<li>(27:21) - Story # 6: Open source developer corrupts widely-used libraries</li>
<li>(34:38) - Story # 7: FTC warns companies to remediate Log4j security vulnerability</li>
<li>(39:58) - Story # 8: Trojanized dnSpy app drops malware cocktail</li>
<li>(45:33) - Story # 9: Norton 360 Cryptominer</li>
<li>(55:56) - Hot Takes and Sadness</li>
</ul>]]>
      </description>
      <content:encoded>
        <![CDATA[<p>ORIGINALLY AIRED ON JANUARY 10, 2022 Articles discussed in this episode: 01:58 – Story # 1: WordPress Core Vulnerabilities – https://www.searchenginejournal.com/wordpress-core-vulnerabilities/432042/#close 11:32 – Story # 2: Card-stealing code on over 100 Sotheby’s luxury real estate sites – https://therecord.media/card-stealing-code-found-on-more-than-100-sothebys-luxury-real-estate-sites/ 14:55 – Story # 3: France hits Facebook &amp; Google with $210 million in fines – https://www.bleepingcomputer.com/news/legal/france-hits-facebook-and-google-with-210-million-in-fines/ […]</p>
<p>The post <a href="https://www.blackhillsinfosec.com/talkin-about-infosec-news-1-14-2021/">Talkin’ About Infosec News – 1/14/2022</a> appeared first on <a href="https://www.blackhillsinfosec.com">Black Hills Information Security</a>.</p>
<ul><li>(00:00) - BHIS - Talkin' Bout [infosec] News 2022-01-10</li>
<li>(01:58) - Story # 1: WordPress Core Vulnerabilities</li>
<li>(11:32) - Story # 2: Card-stealing code on over 100 Sotheby’s luxury real estate sites</li>
<li>(14:55) - Story # 3: France hits Facebook &amp; Google with $210 million in fines</li>
<li>(22:14) - Story # 4: Pwn2Own, ShmooCon security conferences postponed due to COVID-19 surge</li>
<li>(24:48) - Story # 5: BREAKING! Cyber Threat Map</li>
<li>(27:21) - Story # 6: Open source developer corrupts widely-used libraries</li>
<li>(34:38) - Story # 7: FTC warns companies to remediate Log4j security vulnerability</li>
<li>(39:58) - Story # 8: Trojanized dnSpy app drops malware cocktail</li>
<li>(45:33) - Story # 9: Norton 360 Cryptominer</li>
<li>(55:56) - Hot Takes and Sadness</li>
</ul>]]>
      </content:encoded>
      <pubDate>Fri, 14 Jan 2022 13:33:51 -0500</pubDate>
      <author>Black Hills Information Security</author>
      <enclosure url="https://media.transistor.fm/c9c1e207/de85c370.mp3" length="43878672" type="audio/mpeg"/>
      <itunes:author>Black Hills Information Security</itunes:author>
      <itunes:image href="https://img.transistorcdn.com/Y7pCawd1dR8KiCGujZR_9cKeNqUHaJ0K8oztZKZIF1Y/rs:fill:0:0:1/w:1400/h:1400/q:60/mb:500000/aHR0cHM6Ly9pbWct/dXBsb2FkLXByb2R1/Y3Rpb24udHJhbnNp/c3Rvci5mbS81NzAy/YjM4YjhlY2E0N2Nl/Yjg0MDk0ODZkYTA5/YTM2NC5qcGc.jpg"/>
      <itunes:duration>3421</itunes:duration>
      <itunes:summary>ORIGINALLY AIRED ON JANUARY 10, 2022



Articles discussed in this episode:



01:58 – Story # 1: WordPress Core Vulnerabilities – https://www.searchenginejournal.com/wordpress-core-vulnerabilities/432042/#close 



11:32 – Story # 2: Card-stealing code on over 100 Sotheby’s luxury real estate sites – https://therecord.media/card-stealing-code-found-on-more-than-100-sothebys-luxury-real-estate-sites/ 



14:55 – Story # 3: France hits Facebook &amp;amp; Google with $210 million in fines – https://www.bleepingcomputer.com/news/legal/france-hits-facebook-and-google-with-210-million-in-fines/ 



22:14 – Story # 4: Pwn2Own, ShmooCon security conferences postponed due to COVID-19 surge – https://therecord.media/pwn2own-shmoocon-security-conferences-postponed-due-to-covid-19-surge/ 



24:48 – Story # 5: BREAKING! Cyber Threat Map – https://www.fireeye.com/cyber-map/threat-map.html 



27:21 – Story # 6: Open source developer corrupts widely-used libraries – https://www.theverge.com/2022/1/9/22874949/developer-corrupts-open-source-libraries-projects-affected 



34:38 – Story # 7: FTC warns companies to remediate Log4j security vulnerability – https://www.ftc.gov/news-events/blogs/techftc/2022/01/ftc-warns-companies-remediate-log4j-security-vulnerability 



39:58 – Story # 8: Trojanized dnSpy app drops malware cocktail – https://www.bleepingcomputer.com/news/security/trojanized-dnspy-app-drops-malware-cocktail-on-researchers-devs/ 



45:33 – Story # 9: Norton 360 Cryptominer – https://krebsonsecurity.com/2022/01/norton-360-now-comes-with-a-cryptominer/ 



55:56 – Hot Takes and Sadness
















We are self-publishing free Infosec Zines called PROMPT#.  



PROMPT# will contain: 

Infosec articles 
Challenging puzzles 
Comic book based on real-life hacking adventures 
Coloring contests 
Bonus Backdoors &amp;amp; Breaches Consultant Cards (print version only) ...</itunes:summary>
      <itunes:subtitle>ORIGINALLY AIRED ON JANUARY 10, 2022



Articles discussed in this episode:



01:58 – Story # 1: WordPress Core Vulnerabilities – https://www.searchenginejournal.com/wordpress-core-vulnerabilities/432042/#close 



11:32 – Story # 2: Card-stealing code o</itunes:subtitle>
      <itunes:keywords>Infosec,Cybersecurity,news</itunes:keywords>
      <itunes:explicit>No</itunes:explicit>
      <podcast:chapters url="https://share.transistor.fm/s/c9c1e207/chapters.json" type="application/json+chapters"/>
    </item>
    <item>
      <title>Talkin’ About Infosec News – 1/7/2022</title>
      <itunes:episode>1</itunes:episode>
      <podcast:episode>1</podcast:episode>
      <itunes:title>Talkin’ About Infosec News – 1/7/2022</itunes:title>
      <itunes:episodeType>full</itunes:episodeType>
      <guid isPermaLink="false">https://www.blackhillsinfosec.com/?p=20531</guid>
      <link>https://share.transistor.fm/s/f36b2f98</link>
      <description>
        <![CDATA[<p>ORIGINALLY AIRED ON JANUARY 4, 2022 Articles discussed in this episode: 00:00 – PreShow Banter™ — Who’s Job Is It Anyway? 00:20 – BHIS – Talkin’ Bout [infosec] News 2022-01-04 01:58 – Story # 1: iLOBleed Rootkit – https://thehackernews.com/2021/12/new-ilobleed-rootkit-targeting-hp.html 08:39 – Story # 2: Firmware attack can drop persistent malware in hidden SSD area – https://www.bleepingcomputer.com/news/security/firmware-attack-can-drop-persistent-malware-in-hidden-ssd-area/ […]</p>
<p>The post <a href="https://www.blackhillsinfosec.com/talkin-about-infosec-news-1-7-2021/">Talkin’ About Infosec News – 1/7/2022</a> appeared first on <a href="https://www.blackhillsinfosec.com">Black Hills Information Security</a>.</p>
<ul><li>(00:00) - PreShow Banter™ — Who's Job Is It Anyway?</li>
<li>(00:20) - BHIS - Talkin' Bout [infosec] News 2022-01-04</li>
<li>(01:58) - Story # 1: iLOBleed Rootkit</li>
<li>(08:39) - Story # 2: Firmware attack can drop persistent malware in hidden SSD area</li>
<li>(17:35) - Story # 3: OverWatch Exposes AQUATIC PANDA</li>
<li>(21:38) - Story # 4: Experts warn against storing passwords in Chrome</li>
<li>(42:16) - –Official Report: Not Responsible for the Information Super Highway</li>
</ul>]]>
      </description>
      <content:encoded>
        <![CDATA[<p>ORIGINALLY AIRED ON JANUARY 4, 2022 Articles discussed in this episode: 00:00 – PreShow Banter™ — Who’s Job Is It Anyway? 00:20 – BHIS – Talkin’ Bout [infosec] News 2022-01-04 01:58 – Story # 1: iLOBleed Rootkit – https://thehackernews.com/2021/12/new-ilobleed-rootkit-targeting-hp.html 08:39 – Story # 2: Firmware attack can drop persistent malware in hidden SSD area – https://www.bleepingcomputer.com/news/security/firmware-attack-can-drop-persistent-malware-in-hidden-ssd-area/ […]</p>
<p>The post <a href="https://www.blackhillsinfosec.com/talkin-about-infosec-news-1-7-2021/">Talkin’ About Infosec News – 1/7/2022</a> appeared first on <a href="https://www.blackhillsinfosec.com">Black Hills Information Security</a>.</p>
<ul><li>(00:00) - PreShow Banter™ — Who's Job Is It Anyway?</li>
<li>(00:20) - BHIS - Talkin' Bout [infosec] News 2022-01-04</li>
<li>(01:58) - Story # 1: iLOBleed Rootkit</li>
<li>(08:39) - Story # 2: Firmware attack can drop persistent malware in hidden SSD area</li>
<li>(17:35) - Story # 3: OverWatch Exposes AQUATIC PANDA</li>
<li>(21:38) - Story # 4: Experts warn against storing passwords in Chrome</li>
<li>(42:16) - –Official Report: Not Responsible for the Information Super Highway</li>
</ul>]]>
      </content:encoded>
      <pubDate>Fri, 07 Jan 2022 13:01:47 -0500</pubDate>
      <author>Black Hills Information Security</author>
      <enclosure url="https://media.transistor.fm/f36b2f98/a8dc62b3.mp3" length="37465646" type="audio/mpeg"/>
      <itunes:author>Black Hills Information Security</itunes:author>
      <itunes:image href="https://img.transistorcdn.com/OOiWFYYUSw49I08Pmiezz7D8qH6lzIx0CpoDqPukOpw/rs:fill:0:0:1/w:1400/h:1400/q:60/mb:500000/aHR0cHM6Ly9pbWct/dXBsb2FkLXByb2R1/Y3Rpb24udHJhbnNp/c3Rvci5mbS9iNmVl/YzRkYjU3Njc3MTE5/N2UyMzUxZDM1MjU4/NTMxMi5qcGc.jpg"/>
      <itunes:duration>3018</itunes:duration>
      <itunes:summary>ORIGINALLY AIRED ON JANUARY 4, 2022



Articles discussed in this episode:



00:00 – PreShow Banter™ — Who’s Job Is It Anyway? 



00:20 – BHIS – Talkin’ Bout [infosec] News 2022-01-04 



01:58 – Story # 1: iLOBleed Rootkit – https://thehackernews.com/2021/12/new-ilobleed-rootkit-targeting-hp.html 



08:39 – Story # 2: Firmware attack can drop persistent malware in hidden SSD area – https://www.bleepingcomputer.com/news/security/firmware-attack-can-drop-persistent-malware-in-hidden-ssd-area/ 



17:35 – Story # 3: OverWatch Exposes AQUATIC PANDA – https://www.crowdstrike.com/blog/overwatch-exposes-aquatic-panda-in-possession-of-log-4-shell-exploit-tools/ 



21:38 – Story # 4: Experts warn against storing passwords in Chrome – https://nypost.com/2022/01/02/experts-warn-against-storing-passwords-in-chrome/ 



42:16 – Official Report: Not Responsible for the Information Super Highway
















We are self-publishing free Infosec Zines called PROMPT#.  



PROMPT# will contain: 

Infosec articles 
Challenging puzzles 
Comic book based on real-life hacking adventures 
Coloring contests 
Bonus Backdoors &amp;amp; Breaches Consultant Cards (print version only) 
Other stuffs 

You can check out current and upcoming issues here: https://www.blackhillsinfosec.com/prompt-zine/ </itunes:summary>
      <itunes:subtitle>ORIGINALLY AIRED ON JANUARY 4, 2022



Articles discussed in this episode:



00:00 – PreShow Banter™ — Who’s Job Is It Anyway? 



00:20 – BHIS – Talkin’ Bout [infosec] News 2022-01-04 



01:58 – Story # 1: iLOBleed Rootkit – https://thehackernews.com/2</itunes:subtitle>
      <itunes:keywords>Infosec,Cybersecurity,news</itunes:keywords>
      <itunes:explicit>No</itunes:explicit>
      <podcast:chapters url="https://share.transistor.fm/s/f36b2f98/chapters.json" type="application/json+chapters"/>
    </item>
    <item>
      <title>Webcast: New Wave of Ransomware Attacks: How did this happen?</title>
      <itunes:episode>1</itunes:episode>
      <podcast:episode>1</podcast:episode>
      <itunes:title>Webcast: New Wave of Ransomware Attacks: How did this happen?</itunes:title>
      <itunes:episodeType>full</itunes:episodeType>
      <guid isPermaLink="false">https://www.blackhillsinfosec.com/?p=20518</guid>
      <link>https://share.transistor.fm/s/d87f6154</link>
      <description>
        <![CDATA[<p>This is a special joint webcast from the teams of Black Hills Information Security, Wild West Hackin’ Fest, and Active Countermeasures, presented by John Strand.  In this webcast, we cover the recent wave of attacks we are seeing, and we cover some of the history that got us to where we are. Consider this to […]</p>
<p>The post <a href="https://www.blackhillsinfosec.com/webcast-new-wave-of-ransomware-attacks-how-did-this-happen/">Webcast: New Wave of Ransomware Attacks: How did this happen?</a> appeared first on <a href="https://www.blackhillsinfosec.com">Black Hills Information Security</a>.</p>]]>
      </description>
      <content:encoded>
        <![CDATA[<p>This is a special joint webcast from the teams of Black Hills Information Security, Wild West Hackin’ Fest, and Active Countermeasures, presented by John Strand.  In this webcast, we cover the recent wave of attacks we are seeing, and we cover some of the history that got us to where we are. Consider this to […]</p>
<p>The post <a href="https://www.blackhillsinfosec.com/webcast-new-wave-of-ransomware-attacks-how-did-this-happen/">Webcast: New Wave of Ransomware Attacks: How did this happen?</a> appeared first on <a href="https://www.blackhillsinfosec.com">Black Hills Information Security</a>.</p>]]>
      </content:encoded>
      <pubDate>Thu, 23 Dec 2021 09:39:54 -0500</pubDate>
      <author>Black Hills Information Security</author>
      <enclosure url="https://media.transistor.fm/d87f6154/9c33d57c.mp3" length="51470734" type="audio/mpeg"/>
      <itunes:author>Black Hills Information Security</itunes:author>
      <itunes:image href="https://img.transistorcdn.com/kXJYkaS2_2lUS-D-QtYZ9cJtmFgpVpqQMQi-O8zSiXA/rs:fill:0:0:1/w:1400/h:1400/q:60/mb:500000/aHR0cHM6Ly9pbWct/dXBsb2FkLXByb2R1/Y3Rpb24udHJhbnNp/c3Rvci5mbS8wMzY2/Y2M4NTE4NGU2YTFm/Yzg2YzQ5ZjAyNzg0/YWEzOC5qcGc.jpg"/>
      <itunes:duration>6415</itunes:duration>
      <itunes:summary>This is a special joint webcast from the teams of Black Hills Information Security, Wild West Hackin’ Fest, and Active Countermeasures, presented by John Strand.  



In this webcast, we cover the recent wave of attacks we are seeing, and we cover some of the history that got us to where we are. 



Consider this to be part 2 of the previous webcast I did on the topic. Available now on YouTube: https://youtu.be/wKAQB4Yp-k4?t=1669 



Yep, we are going to talk about management and how to change their attitude on security. Yes, we will be talking about compliance. Of course, we will be talking about some simple actions companies can take to be better prepared.  



I think it is important for us to talk through the history and see how we got to where we are in the industry. We have done a lot of tests over the years. We have seen technical and political patterns in “hard” and “easy” targets. We will talk about those as well. 



We may even talk about threat intelligence, just a little…
















We are self-publishing free Infosec Zines called PROMPT#.  



PROMPT# will contain: 

Infosec articles 
Challenging puzzles 
Comic book based on real-life hacking adventures 
Coloring contests 
Bonus Backdoors &amp;amp; Breaches Consultant Cards (print version only) 
Other stuffs 

You can check out current and upcoming issues here: https://www.blackhillsinfosec.com/prompt-zine/ </itunes:summary>
      <itunes:subtitle>This is a special joint webcast from the teams of Black Hills Information Security, Wild West Hackin’ Fest, and Active Countermeasures, presented by John Strand.  



In this webcast, we cover the recent wave of attacks we are seeing, and we cover some of</itunes:subtitle>
      <itunes:keywords>Infosec,Cybersecurity,news</itunes:keywords>
      <itunes:explicit>No</itunes:explicit>
    </item>
    <item>
      <title>Talkin’ About Infosec News – 12/22/2021</title>
      <itunes:episode>1</itunes:episode>
      <podcast:episode>1</podcast:episode>
      <itunes:title>Talkin’ About Infosec News – 12/22/2021</itunes:title>
      <itunes:episodeType>full</itunes:episodeType>
      <guid isPermaLink="false">https://www.blackhillsinfosec.com/?p=20511</guid>
      <link>https://share.transistor.fm/s/d43db4a1</link>
      <description>
        <![CDATA[<p>ORIGINALLY AIRED ON DECEMBER 20, 2021 Articles discussed in this episode: 00:00 – PreShow Banter™ — Getting Nerdy With It 04:18 – BHIS – Talkin’ Bout [infosec] News 2021-12-20 – The Final Broadcast … of 2021 05:34 – Story # 1: Apple releases Android app to find rogue AirTags – https://therecord.media/apple-releases-android-app-to-find-malicious-airtags/ 18:24 – Story # […]</p>
<p>The post <a href="https://www.blackhillsinfosec.com/talkin-about-infosec-news-12-22-2021/">Talkin’ About Infosec News – 12/22/2021</a> appeared first on <a href="https://www.blackhillsinfosec.com">Black Hills Information Security</a>.</p>
<ul><li>(00:00) - PreShow Banter™ — Getting Nerdy With It</li>
<li>(04:18) - BHIS - Talkin' Bout [infosec] News 2021-12-20 – The Final Broadcast ... of 2021</li>
<li>(05:34) - Story # 1: Apple releases Android app to find rogue AirTags - https://therecord.media/apple-releases-android-app-to-find-malicious-airtags/</li>
<li>(18:24) - Story # 2: A Summary of Sorts - The Tale of 2021</li>
<li>(21:40) - Story # 3: Kronos hit with ransomware - https://www.zdnet.com/article/hr-platform-kronos-brought-down-by-ransomware-attack-ukg-warns-of-data-breach/</li>
<li>(22:19) - Story # 4: 300,000 MikroTik Devices Found Vulnerable - https://thehackernews.com/2021/12/over-300000-mikrotik-devices-found.html</li>
<li>(26:51) - Story # 5: WordPress Sites Under Cyberattack - https://thehackernews.com/2021/12/16-million-wordpress-sites-under.html</li>
<li>(28:45) - Story # 6: Firefox password leak via Windows Cloud Clipboard - https://therecord.media/firefox-fixes-password-leak-via-windows-cloud-clipboard-feature/</li>
<li>(36:33) - Story # 7: Android Application Testing Using Windows 11 - https://sensepost.com/blog/2021/android-application-testing-using-windows-11-and-windows-subsystem-for-android/</li>
<li>(37:43) - Story # 8: Verizon overrides users’ opt-out - https://arstechnica.com/information-technology/2021/12/verizon-ignored-users-previous-opt-outs-in-latest-push-to-scan-web-browsing/</li>
<li>(43:15) - Story # 9: Volvo cyber security breach - https://www.media.volvocars.com/global/en-gb/media/pressreleases/292817/notice-of-cyber-security-breach-by-third-party-1</li>
</ul>]]>
      </description>
      <content:encoded>
        <![CDATA[<p>ORIGINALLY AIRED ON DECEMBER 20, 2021 Articles discussed in this episode: 00:00 – PreShow Banter™ — Getting Nerdy With It 04:18 – BHIS – Talkin’ Bout [infosec] News 2021-12-20 – The Final Broadcast … of 2021 05:34 – Story # 1: Apple releases Android app to find rogue AirTags – https://therecord.media/apple-releases-android-app-to-find-malicious-airtags/ 18:24 – Story # […]</p>
<p>The post <a href="https://www.blackhillsinfosec.com/talkin-about-infosec-news-12-22-2021/">Talkin’ About Infosec News – 12/22/2021</a> appeared first on <a href="https://www.blackhillsinfosec.com">Black Hills Information Security</a>.</p>
<ul><li>(00:00) - PreShow Banter™ — Getting Nerdy With It</li>
<li>(04:18) - BHIS - Talkin' Bout [infosec] News 2021-12-20 – The Final Broadcast ... of 2021</li>
<li>(05:34) - Story # 1: Apple releases Android app to find rogue AirTags - https://therecord.media/apple-releases-android-app-to-find-malicious-airtags/</li>
<li>(18:24) - Story # 2: A Summary of Sorts - The Tale of 2021</li>
<li>(21:40) - Story # 3: Kronos hit with ransomware - https://www.zdnet.com/article/hr-platform-kronos-brought-down-by-ransomware-attack-ukg-warns-of-data-breach/</li>
<li>(22:19) - Story # 4: 300,000 MikroTik Devices Found Vulnerable - https://thehackernews.com/2021/12/over-300000-mikrotik-devices-found.html</li>
<li>(26:51) - Story # 5: WordPress Sites Under Cyberattack - https://thehackernews.com/2021/12/16-million-wordpress-sites-under.html</li>
<li>(28:45) - Story # 6: Firefox password leak via Windows Cloud Clipboard - https://therecord.media/firefox-fixes-password-leak-via-windows-cloud-clipboard-feature/</li>
<li>(36:33) - Story # 7: Android Application Testing Using Windows 11 - https://sensepost.com/blog/2021/android-application-testing-using-windows-11-and-windows-subsystem-for-android/</li>
<li>(37:43) - Story # 8: Verizon overrides users’ opt-out - https://arstechnica.com/information-technology/2021/12/verizon-ignored-users-previous-opt-outs-in-latest-push-to-scan-web-browsing/</li>
<li>(43:15) - Story # 9: Volvo cyber security breach - https://www.media.volvocars.com/global/en-gb/media/pressreleases/292817/notice-of-cyber-security-breach-by-third-party-1</li>
</ul>]]>
      </content:encoded>
      <pubDate>Wed, 22 Dec 2021 11:21:59 -0500</pubDate>
      <author>Black Hills Information Security</author>
      <enclosure url="https://media.transistor.fm/d43db4a1/888b36c6.mp3" length="43982123" type="audio/mpeg"/>
      <itunes:author>Black Hills Information Security</itunes:author>
      <itunes:image href="https://img.transistorcdn.com/DfXC0QlV0TLcZSqSbN6z2k3T7qXX-PFapnEHf613CYk/rs:fill:0:0:1/w:1400/h:1400/q:60/mb:500000/aHR0cHM6Ly9pbWct/dXBsb2FkLXByb2R1/Y3Rpb24udHJhbnNp/c3Rvci5mbS85YzQ3/MTQ3ZmU1NjNhMGU1/MWU0MmMzNGIyZjAx/ODNmNS5qcGc.jpg"/>
      <itunes:duration>3430</itunes:duration>
      <itunes:summary>ORIGINALLY AIRED ON DECEMBER 20, 2021



Articles discussed in this episode:



00:00 – PreShow Banter™ — Getting Nerdy With It 



04:18 – BHIS – Talkin’ Bout [infosec] News 2021-12-20 – The Final Broadcast … of 2021 



05:34 – Story # 1: Apple releases Android app to find rogue AirTags – https://therecord.media/apple-releases-android-app-to-find-malicious-airtags/ 



18:24 – Story # 2: A Summary of Sorts – The Tale of 2021 



21:40 – Story # 3: Kronos hit with ransomware – https://www.zdnet.com/article/hr-platform-kronos-brought-down-by-ransomware-attack-ukg-warns-of-data-breach/ 



22:19 – Story # 4: 300,000 MikroTik Devices Found Vulnerable – https://thehackernews.com/2021/12/over-300000-mikrotik-devices-found.html 



26:51 – Story # 5: WordPress Sites Under Cyberattack – https://thehackernews.com/2021/12/16-million-wordpress-sites-under.html 



28:45 – Story # 6: Firefox password leak via Windows Cloud Clipboard – https://therecord.media/firefox-fixes-password-leak-via-windows-cloud-clipboard-feature/ 



36:33 – Story # 7: Android Application Testing Using Windows 11 – https://sensepost.com/blog/2021/android-application-testing-using-windows-11-and-windows-subsystem-for-android/ 



37:43 – Story # 8: Verizon overrides users’ opt-out – https://arstechnica.com/information-technology/2021/12/verizon-ignored-users-previous-opt-outs-in-latest-push-to-scan-web-browsing/ 



43:15 – Story # 9: Volvo cyber security breach – https://www.media.volvocars.com/global/en-gb/media/pressreleases/292817/notice-of-cyber-security-breach-by-third-party-1
















We are self-publishing free Infosec Zines called PROMPT#.  



PROMPT# will contain: 

Infosec articles 
Challenging puzzles 
Comic book based on real-life hacking adventures 
Coloring contests 
Bonus Backdoors &amp;amp; Breaches Consultant Cards (print version only) 
Other stuffs </itunes:summary>
      <itunes:subtitle>ORIGINALLY AIRED ON DECEMBER 20, 2021



Articles discussed in this episode:



00:00 – PreShow Banter™ — Getting Nerdy With It 



04:18 – BHIS – Talkin’ Bout [infosec] News 2021-12-20 – The Final Broadcast … of 2021 



05:34 – Story # 1: Apple releases</itunes:subtitle>
      <itunes:keywords>Infosec,Cybersecurity,news</itunes:keywords>
      <itunes:explicit>No</itunes:explicit>
      <podcast:chapters url="https://share.transistor.fm/s/d43db4a1/chapters.json" type="application/json+chapters"/>
    </item>
    <item>
      <title>Webcast: Intro to Ransomware and Industrial Control Systems (ICS)</title>
      <itunes:episode>1</itunes:episode>
      <podcast:episode>1</podcast:episode>
      <itunes:title>Webcast: Intro to Ransomware and Industrial Control Systems (ICS)</itunes:title>
      <itunes:episodeType>full</itunes:episodeType>
      <guid isPermaLink="false">https://www.blackhillsinfosec.com/?p=20508</guid>
      <link>https://share.transistor.fm/s/8fab1922</link>
      <description>
        <![CDATA[<p>Ransomware attacks have been growing in popularity, especially in critical infrastructure. Due to the importance of critical infrastructure, the need to secure the environments is an impending issue. The technology used in ICS environments is sensitive and often based on older protocols. The desire for connectivity has created an opportune target for malicious actors. Join […]</p>
<p>The post <a href="https://www.blackhillsinfosec.com/webcast-intro-to-ransomware-and-industrial-control-systems-ics/">Webcast: Intro to Ransomware and Industrial Control Systems (ICS)</a> appeared first on <a href="https://www.blackhillsinfosec.com">Black Hills Information Security</a>.</p>]]>
      </description>
      <content:encoded>
        <![CDATA[<p>Ransomware attacks have been growing in popularity, especially in critical infrastructure. Due to the importance of critical infrastructure, the need to secure the environments is an impending issue. The technology used in ICS environments is sensitive and often based on older protocols. The desire for connectivity has created an opportune target for malicious actors. Join […]</p>
<p>The post <a href="https://www.blackhillsinfosec.com/webcast-intro-to-ransomware-and-industrial-control-systems-ics/">Webcast: Intro to Ransomware and Industrial Control Systems (ICS)</a> appeared first on <a href="https://www.blackhillsinfosec.com">Black Hills Information Security</a>.</p>]]>
      </content:encoded>
      <pubDate>Tue, 21 Dec 2021 15:42:15 -0500</pubDate>
      <author>Black Hills Information Security</author>
      <enclosure url="https://media.transistor.fm/8fab1922/5fbd6d68.mp3" length="49389490" type="audio/mpeg"/>
      <itunes:author>Black Hills Information Security</itunes:author>
      <itunes:image href="https://img.transistorcdn.com/yJbXsd01lc5gxfvAC-mvXcwT39EzaP6Cq9YhOqIDpZg/rs:fill:0:0:1/w:1400/h:1400/q:60/mb:500000/aHR0cHM6Ly9pbWct/dXBsb2FkLXByb2R1/Y3Rpb24udHJhbnNp/c3Rvci5mbS82NDIw/MGYxZDVkODcyNDgw/ODQ1NzIzOTRmNjhh/ODAwNC5qcGc.jpg"/>
      <itunes:duration>6156</itunes:duration>
      <itunes:summary>Ransomware attacks have been growing in popularity, especially in critical infrastructure. Due to the importance of critical infrastructure, the need to secure the environments is an impending issue. The technology used in ICS environments is sensitive and often based on older protocols. The desire for connectivity has created an opportune target for malicious actors. Join Ashley in this adventure to learn about our critical infrastructure, the threats, and how to secure them. 



At the end of this BHIS webcast, you will have a better understanding of ICS infrastructure, how ransomware affects ICS, and how to protect against threats to ICS.



00:00:00 – PreShow Banter™ 



00:37:38 – FEATURE PRESENTATION 



01:32:04 – Closing Q&amp;amp;A
















We are self-publishing free Infosec Zines called PROMPT#.  



PROMPT# will contain: 

Infosec articles 
Challenging puzzles 
Comic book based on real-life hacking adventures 
Coloring contests 
Bonus Backdoors &amp;amp; Breaches Consultant Cards (print version only) 
Other stuffs 

You can check out current and upcoming issues here: https://www.blackhillsinfosec.com/prompt-zine/ </itunes:summary>
      <itunes:subtitle>Ransomware attacks have been growing in popularity, especially in critical infrastructure. Due to the importance of critical infrastructure, the need to secure the environments is an impending issue. The technology used in ICS environments is sensitive an</itunes:subtitle>
      <itunes:keywords>Infosec,Cybersecurity,news</itunes:keywords>
      <itunes:explicit>No</itunes:explicit>
    </item>
    <item>
      <title>Webcast: Hack for Show, Report For Dough: Part 2</title>
      <itunes:episode>1</itunes:episode>
      <podcast:episode>1</podcast:episode>
      <itunes:title>Webcast: Hack for Show, Report For Dough: Part 2</itunes:title>
      <itunes:episodeType>full</itunes:episodeType>
      <guid isPermaLink="false">https://www.blackhillsinfosec.com/?p=20503</guid>
      <link>https://share.transistor.fm/s/4a306eb1</link>
      <description>
        <![CDATA[<p>At Black Hills Information Security (BHIS), we make our living doing pentesting, but we’ve never once been paid for a pentest. Penetration Testers get paid for their reports. For their explanations. For their story of the environment as it appears to an attacker. The scanning and testing and exploiting (and failing at those things) is […]</p>
<p>The post <a href="https://www.blackhillsinfosec.com/webcast-hack-for-show-report-for-dough-part-2/">Webcast: Hack for Show, Report For Dough: Part 2</a> appeared first on <a href="https://www.blackhillsinfosec.com">Black Hills Information Security</a>.</p>]]>
      </description>
      <content:encoded>
        <![CDATA[<p>At Black Hills Information Security (BHIS), we make our living doing pentesting, but we’ve never once been paid for a pentest. Penetration Testers get paid for their reports. For their explanations. For their story of the environment as it appears to an attacker. The scanning and testing and exploiting (and failing at those things) is […]</p>
<p>The post <a href="https://www.blackhillsinfosec.com/webcast-hack-for-show-report-for-dough-part-2/">Webcast: Hack for Show, Report For Dough: Part 2</a> appeared first on <a href="https://www.blackhillsinfosec.com">Black Hills Information Security</a>.</p>]]>
      </content:encoded>
      <pubDate>Tue, 21 Dec 2021 14:38:38 -0500</pubDate>
      <author>Black Hills Information Security</author>
      <enclosure url="https://media.transistor.fm/4a306eb1/1f47fcbc.mp3" length="57370503" type="audio/mpeg"/>
      <itunes:author>Black Hills Information Security</itunes:author>
      <itunes:image href="https://img.transistorcdn.com/Q_JuavkGYxlCnTOysL_KVfuTVItptBdmMbxIbJEj3bI/rs:fill:0:0:1/w:1400/h:1400/q:60/mb:500000/aHR0cHM6Ly9pbWct/dXBsb2FkLXByb2R1/Y3Rpb24udHJhbnNp/c3Rvci5mbS81ODZm/N2ZhOGRlM2NjOGZl/YjJiMmQ5YzQwYTZh/MGM4MC5qcGc.jpg"/>
      <itunes:duration>7150</itunes:duration>
      <itunes:summary>At Black Hills Information Security (BHIS), we make our living doing pentesting, but we’ve never once been paid for a pentest. 



Penetration Testers get paid for their reports. 



For their explanations. 



For their story of the environment as it appears to an attacker. 



The scanning and testing and exploiting (and failing at those things) is nothing more than input for the report. 



So if the job of pentesting is all about creating a good report, why is it so common to hear how much testers hate reporting? Is there any way to make it all less difficult, or more attractive? 



Yes, there is. 



Come see a better way to think about your report. See examples of common mistakes and missed opportunities in reporting and how you can do better. Consider how a small change in how you think about your report can make it easier to write. 



We’ll wrap up with a demonstration of how a little time exploring MS Word features can pay you back immediately in saved time, reduced frustration, and improved consistency. 



If you want to better understand what makes a pentest valuable and how you can make your own work more sought-after, come join us for this webcast. Join us on the BLACK HILLS INFOSEC Discord server for live interaction with Jason and your fellow attendees: https://discord.gg/bhis



Part 1 at BSides Cleveland: https://youtu.be/NUueNT1svb8



00:00:00 – PreShow Banter™ 



00:48:07 – FEATURE PRESENTATION 



01:44:37 – Closing, Questions &amp;amp; Answers
















We are self-publishing free Infosec Zines called PROMPT#.  



PROMPT# will contain: 

Infosec articles 
Challenging puzzles 
Comic book based on real-life hacking adventures 
Coloring contests 
Bonus Backdoors &amp;amp; Breaches Consultant Cards (print version only) 
Other stuffs 

You can check out current and upcoming issues here: https://www.blackhillsinfosec.com/prompt-zine/ </itunes:summary>
      <itunes:subtitle>At Black Hills Information Security (BHIS), we make our living doing pentesting, but we’ve never once been paid for a pentest. 



Penetration Testers get paid for their reports. 



For their explanations. 



For their story of the environment as it app</itunes:subtitle>
      <itunes:keywords>Infosec,Cybersecurity,news</itunes:keywords>
      <itunes:explicit>No</itunes:explicit>
    </item>
    <item>
      <title>Talkin’ About Infosec News – The Floor is Java – 12/15/2021</title>
      <itunes:episode>1</itunes:episode>
      <podcast:episode>1</podcast:episode>
      <itunes:title>Talkin’ About Infosec News – The Floor is Java – 12/15/2021</itunes:title>
      <itunes:episodeType>full</itunes:episodeType>
      <guid isPermaLink="false">https://www.blackhillsinfosec.com/?p=20486</guid>
      <link>https://share.transistor.fm/s/ee91cd0c</link>
      <description>
        <![CDATA[<p>ORIGINALLY AIRED ON DECEMBER 13, 2021 00:00 – PreShow Banter™ 09:41 – FEATURE PRESENTATION: The Floor is Java – Log4Shell / Log4J 10:26 – Lets Jump In 11:31 – Oh No… 12:28 – None of This is New 15:36 – How Does This Work? 19:48 – Mitigations 21:48 – Find it on Hosts 23:54 – Hal […]</p>
<p>The post <a href="https://www.blackhillsinfosec.com/talkin-about-infosec-news-the-floor-is-java-12-15-2021/">Talkin’ About Infosec News – The Floor is Java – 12/15/2021</a> appeared first on <a href="https://www.blackhillsinfosec.com">Black Hills Information Security</a>.</p>
<ul><li>(00:00) - PreShow Banter™</li>
<li>(09:41) - FEATURE PRESENTATION: The Floor is Java – Log4Shell / Log4J</li>
<li>(10:26) - Lets Jump In</li>
<li>(11:31) - Oh No...</li>
<li>(12:28) - None of This is New</li>
<li>(15:36) - How Does This Work?</li>
<li>(19:48) - Mitigations</li>
<li>(21:48) - Find it on Hosts</li>
<li>(23:54) - Hal Translator</li>
<li>(25:25) - Find it on the Network</li>
<li>(26:53) - Miners Beacon</li>
<li>(28:24) - Great Write-Ups!</li>
<li>(31:47) - Conversation with Q &amp; A</li>
</ul>]]>
      </description>
      <content:encoded>
        <![CDATA[<p>ORIGINALLY AIRED ON DECEMBER 13, 2021 00:00 – PreShow Banter™ 09:41 – FEATURE PRESENTATION: The Floor is Java – Log4Shell / Log4J 10:26 – Lets Jump In 11:31 – Oh No… 12:28 – None of This is New 15:36 – How Does This Work? 19:48 – Mitigations 21:48 – Find it on Hosts 23:54 – Hal […]</p>
<p>The post <a href="https://www.blackhillsinfosec.com/talkin-about-infosec-news-the-floor-is-java-12-15-2021/">Talkin’ About Infosec News – The Floor is Java – 12/15/2021</a> appeared first on <a href="https://www.blackhillsinfosec.com">Black Hills Information Security</a>.</p>
<ul><li>(00:00) - PreShow Banter™</li>
<li>(09:41) - FEATURE PRESENTATION: The Floor is Java – Log4Shell / Log4J</li>
<li>(10:26) - Lets Jump In</li>
<li>(11:31) - Oh No...</li>
<li>(12:28) - None of This is New</li>
<li>(15:36) - How Does This Work?</li>
<li>(19:48) - Mitigations</li>
<li>(21:48) - Find it on Hosts</li>
<li>(23:54) - Hal Translator</li>
<li>(25:25) - Find it on the Network</li>
<li>(26:53) - Miners Beacon</li>
<li>(28:24) - Great Write-Ups!</li>
<li>(31:47) - Conversation with Q &amp; A</li>
</ul>]]>
      </content:encoded>
      <pubDate>Wed, 15 Dec 2021 11:40:22 -0500</pubDate>
      <author>Black Hills Information Security</author>
      <enclosure url="https://media.transistor.fm/ee91cd0c/67f7bb48.mp3" length="48275769" type="audio/mpeg"/>
      <itunes:author>Black Hills Information Security</itunes:author>
      <itunes:image href="https://img.transistorcdn.com/a9QMEYzPsGk9Ho46Sd_MXToeqVy5VHFFHO09R_7ZTWc/rs:fill:0:0:1/w:1400/h:1400/q:60/mb:500000/aHR0cHM6Ly9pbWct/dXBsb2FkLXByb2R1/Y3Rpb24udHJhbnNp/c3Rvci5mbS85NjYz/MDMwZDliYTA5MjFl/YzE2ZDkwZWNhYTQ0/NWQ2Ny5qcGc.jpg"/>
      <itunes:duration>3822</itunes:duration>
      <itunes:summary>ORIGINALLY AIRED ON DECEMBER 13, 2021



00:00 – PreShow Banter™ 



09:41 – FEATURE PRESENTATION: The Floor is Java – Log4Shell / Log4J 



10:26 – Lets Jump In 



11:31 – Oh No… 



12:28 – None of This is New 



15:36 – How Does This Work? 



19:48 – Mitigations 



21:48 – Find it on Hosts 



23:54 – Hal Translator 



25:25 – Find it on the Network 



26:53 – Miners Beacon 



28:24 – Great Write-Ups! 



31:47 – Conversation with Q &amp;amp; A
















We are self-publishing free Infosec Zines called PROMPT#.  



PROMPT# will contain: 

Infosec articles 
Challenging puzzles 
Comic book based on real-life hacking adventures 
Coloring contests 
Bonus Backdoors &amp;amp; Breaches Consultant Cards (print version only) 
Other stuffs 

You can check out current and upcoming issues here: https://www.blackhillsinfosec.com/prompt-zine/ </itunes:summary>
      <itunes:subtitle>ORIGINALLY AIRED ON DECEMBER 13, 2021



00:00 – PreShow Banter™ 



09:41 – FEATURE PRESENTATION: The Floor is Java – Log4Shell / Log4J 



10:26 – Lets Jump In 



11:31 – Oh No… 



12:28 – None of This is New 



15:36 – How Does This Work? 



19:48 </itunes:subtitle>
      <itunes:keywords>Infosec,Cybersecurity,news</itunes:keywords>
      <itunes:explicit>No</itunes:explicit>
      <podcast:chapters url="https://share.transistor.fm/s/ee91cd0c/chapters.json" type="application/json+chapters"/>
    </item>
    <item>
      <title>Talkin’ About Infosec News – 12/09/2021</title>
      <itunes:episode>1</itunes:episode>
      <podcast:episode>1</podcast:episode>
      <itunes:title>Talkin’ About Infosec News – 12/09/2021</itunes:title>
      <itunes:episodeType>full</itunes:episodeType>
      <guid isPermaLink="false">https://www.blackhillsinfosec.com/?p=20449</guid>
      <link>https://share.transistor.fm/s/f2b28ef0</link>
      <description>
        <![CDATA[<p>ORIGINALLY AIRED ON DECEMBER 6, 2021 Articles discussed in this episode: 00:18 – BHIS – Talkin’ Bout [infosec] News 2021-12-06 02:57 – Story # 1: Apple AirTag Car Thefts – https://www.macrumors.com/2021/12/03/airtag-linked-to-car-thefts/ 11:04 – Story # 2: Ubiquiti dev charged for extortion – https://www.bleepingcomputer.com/news/security/former-ubiquiti-dev-charged-for-trying-to-extort-his-employer/ 17:09 – Plug: Pay What You Can SOC Training – https://www.antisyphontraining.com/soc-core-skills-w-john-strand/ 18:24 – […]</p>
<p>The post <a href="https://www.blackhillsinfosec.com/talkin-about-infosec-news-12-09-2021/">Talkin’ About Infosec News – 12/09/2021</a> appeared first on <a href="https://www.blackhillsinfosec.com">Black Hills Information Security</a>.</p>
<ul><li>(00:00) - PreShow Banter™</li>
<li>(00:18) - BHIS - Talkin' Bout [infosec] News 2021-12-06</li>
<li>(02:57) - Story # 1: Apple AirTag Car Thefts - https://www.macrumors.com/2021/12/03/airtag-linked-to-car-thefts/</li>
<li>(11:04) - Story # 2: Ubiquiti dev charged for extortion - https://www.bleepingcomputer.com/news/security/former-ubiquiti-dev-charged-for-trying-to-extort-his-employer/</li>
<li>(17:09) - Plug: Pay What You Can SOC Training – https://www.antisyphontraining.com/soc-core-skills-w-john-strand/</li>
<li>(18:24) - Story # 3: U.S. State Department hacked with NSO spyware - https://www.reuters.com/technology/exclusive-us-state-department-phones-hacked-with-israeli-company-spyware-sources-2021-12-03/</li>
<li>(24:15) - Story # 4: The rise of dark web design - https://theconversation.com/the-rise-of-dark-web-design-how-sites-manipulate-you-into-clicking-168347</li>
<li>(33:46) - Story # 5: Researcher Found Way to Brute Force Verizon Customer PINs Online - https://www.vice.com/en/article/93bbpy/brute-force-verizon-pins-researcher-video</li>
<li>(39:43) - Story # 6: Russia and China attacking US satellites with lasers and jammers - https://www.independent.co.uk/space/russia-china-attack-us-satellites-lasers-b1967516.html?utm_source=reddit.com</li>
<li>(44:25) - Story # 7: Ransomware Takeaways: Q3 2021 - https://www.backblaze.com/blog/ransomware-takeaways-q3-2021/</li>
<li>(49:36) - Story # 8: Microsoft prompts try to stop people downloading Chrome - https://www.theverge.com/2021/12/2/22813733/microsoft-windows-edge-download-chrome-prompts</li>
<li>(50:36) - Story # 8b: Microsoft Edge will warn users about downloading Google Chrome - https://arstechnica.com/gadgets/2021/12/microsoft-edge-will-now-warn-users-about-the-dangers-of-downloading-google-chrome/</li>
</ul>]]>
      </description>
      <content:encoded>
        <![CDATA[<p>ORIGINALLY AIRED ON DECEMBER 6, 2021 Articles discussed in this episode: 00:18 – BHIS – Talkin’ Bout [infosec] News 2021-12-06 02:57 – Story # 1: Apple AirTag Car Thefts – https://www.macrumors.com/2021/12/03/airtag-linked-to-car-thefts/ 11:04 – Story # 2: Ubiquiti dev charged for extortion – https://www.bleepingcomputer.com/news/security/former-ubiquiti-dev-charged-for-trying-to-extort-his-employer/ 17:09 – Plug: Pay What You Can SOC Training – https://www.antisyphontraining.com/soc-core-skills-w-john-strand/ 18:24 – […]</p>
<p>The post <a href="https://www.blackhillsinfosec.com/talkin-about-infosec-news-12-09-2021/">Talkin’ About Infosec News – 12/09/2021</a> appeared first on <a href="https://www.blackhillsinfosec.com">Black Hills Information Security</a>.</p>
<ul><li>(00:00) - PreShow Banter™</li>
<li>(00:18) - BHIS - Talkin' Bout [infosec] News 2021-12-06</li>
<li>(02:57) - Story # 1: Apple AirTag Car Thefts - https://www.macrumors.com/2021/12/03/airtag-linked-to-car-thefts/</li>
<li>(11:04) - Story # 2: Ubiquiti dev charged for extortion - https://www.bleepingcomputer.com/news/security/former-ubiquiti-dev-charged-for-trying-to-extort-his-employer/</li>
<li>(17:09) - Plug: Pay What You Can SOC Training – https://www.antisyphontraining.com/soc-core-skills-w-john-strand/</li>
<li>(18:24) - Story # 3: U.S. State Department hacked with NSO spyware - https://www.reuters.com/technology/exclusive-us-state-department-phones-hacked-with-israeli-company-spyware-sources-2021-12-03/</li>
<li>(24:15) - Story # 4: The rise of dark web design - https://theconversation.com/the-rise-of-dark-web-design-how-sites-manipulate-you-into-clicking-168347</li>
<li>(33:46) - Story # 5: Researcher Found Way to Brute Force Verizon Customer PINs Online - https://www.vice.com/en/article/93bbpy/brute-force-verizon-pins-researcher-video</li>
<li>(39:43) - Story # 6: Russia and China attacking US satellites with lasers and jammers - https://www.independent.co.uk/space/russia-china-attack-us-satellites-lasers-b1967516.html?utm_source=reddit.com</li>
<li>(44:25) - Story # 7: Ransomware Takeaways: Q3 2021 - https://www.backblaze.com/blog/ransomware-takeaways-q3-2021/</li>
<li>(49:36) - Story # 8: Microsoft prompts try to stop people downloading Chrome - https://www.theverge.com/2021/12/2/22813733/microsoft-windows-edge-download-chrome-prompts</li>
<li>(50:36) - Story # 8b: Microsoft Edge will warn users about downloading Google Chrome - https://arstechnica.com/gadgets/2021/12/microsoft-edge-will-now-warn-users-about-the-dangers-of-downloading-google-chrome/</li>
</ul>]]>
      </content:encoded>
      <pubDate>Thu, 09 Dec 2021 13:27:42 -0500</pubDate>
      <author>Black Hills Information Security</author>
      <enclosure url="https://media.transistor.fm/f2b28ef0/1c2096ae.mp3" length="45294934" type="audio/mpeg"/>
      <itunes:author>Black Hills Information Security</itunes:author>
      <itunes:image href="https://img.transistorcdn.com/AtAN_kHczlV_6sd4kgnY_hx8XSiuuP3NvUGr3MNvwaU/rs:fill:0:0:1/w:1400/h:1400/q:60/mb:500000/aHR0cHM6Ly9pbWct/dXBsb2FkLXByb2R1/Y3Rpb24udHJhbnNp/c3Rvci5mbS81NjRm/OTRmYzk5YmQzODMx/NDNmM2ZkYTZkMTRj/ZmNiZC5qcGc.jpg"/>
      <itunes:duration>3536</itunes:duration>
      <itunes:summary>ORIGINALLY AIRED ON DECEMBER 6, 2021



Articles discussed in this episode:



00:18 – BHIS – Talkin’ Bout [infosec] News 2021-12-06 



02:57 – Story # 1: Apple AirTag Car Thefts – https://www.macrumors.com/2021/12/03/airtag-linked-to-car-thefts/ 



11:04 – Story # 2: Ubiquiti dev charged for extortion – https://www.bleepingcomputer.com/news/security/former-ubiquiti-dev-charged-for-trying-to-extort-his-employer/ 



17:09 – Plug: Pay What You Can SOC Training – https://www.antisyphontraining.com/soc-core-skills-w-john-strand/ 



18:24 – Story # 3: U.S. State Department hacked with NSO spyware – https://www.reuters.com/technology/exclusive-us-state-department-phones-hacked-with-israeli-company-spyware-sources-2021-12-03/ 



24:15 – Story # 4: The rise of dark web design – https://theconversation.com/the-rise-of-dark-web-design-how-sites-manipulate-you-into-clicking-168347 



33:46 – Story # 5: Researcher Found Way to Brute Force Verizon Customer PINs Online – https://www.vice.com/en/article/93bbpy/brute-force-verizon-pins-researcher-video 



39:43 – Story # 6: Russia and China attacking US satellites with lasers and jammers – https://www.independent.co.uk/space/russia-china-attack-us-satellites-lasers-b1967516.html?utm_source=reddit.com 



44:25 – Story # 7: Ransomware Takeaways: Q3 2021 – https://www.backblaze.com/blog/ransomware-takeaways-q3-2021/ 



49:36 – Story # 8: Microsoft prompts try to stop people downloading Chrome – https://www.theverge.com/2021/12/2/22813733/microsoft-windows-edge-download-chrome-prompts 



50:36 – Story # 8b: Microsoft Edge will warn users about downloading Google Chrome – https://arstechnica.com/gadgets/2021/12/microsoft-edge-will-now-warn-users-about-the-dangers-of-downloading-google-chrome/</itunes:summary>
      <itunes:subtitle>ORIGINALLY AIRED ON DECEMBER 6, 2021



Articles discussed in this episode:



00:18 – BHIS – Talkin’ Bout [infosec] News 2021-12-06 



02:57 – Story # 1: Apple AirTag Car Thefts – https://www.macrumors.com/2021/12/03/airtag-linked-to-car-thefts/ 



11:</itunes:subtitle>
      <itunes:keywords>Infosec,Cybersecurity,news</itunes:keywords>
      <itunes:explicit>No</itunes:explicit>
      <podcast:chapters url="https://share.transistor.fm/s/f2b28ef0/chapters.json" type="application/json+chapters"/>
    </item>
    <item>
      <title>Fixing Content-Security-Policies with Cloudflare Workers</title>
      <itunes:episode>1</itunes:episode>
      <podcast:episode>1</podcast:episode>
      <itunes:title>Fixing Content-Security-Policies with Cloudflare Workers</itunes:title>
      <itunes:episodeType>full</itunes:episodeType>
      <guid isPermaLink="false">https://www.blackhillsinfosec.com/?p=20351</guid>
      <link>https://share.transistor.fm/s/bd702586</link>
      <description>
        <![CDATA[<p>Kent Ickler // Background Over four years ago now, I wrote a blog post on fixing missing Content-Security-Policy by updating configuration on webservers: https://www.blackhillsinfosec.com/fix-missing-content-security-policy-website/. Content-Security-Policies instruct a user’s web browser how it should behave on certain security considerations. Oh, how times have changed. Here at Black Hills Information Security (BHIS), we’ve actually migrated webservers, hosting […]</p>
<p>The post <a href="https://www.blackhillsinfosec.com/fixing-content-security-policies-with-cloudflare-workers/">Fixing Content-Security-Policies with Cloudflare Workers</a> appeared first on <a href="https://www.blackhillsinfosec.com">Black Hills Information Security</a>.</p>]]>
      </description>
      <content:encoded>
        <![CDATA[<p>Kent Ickler // Background Over four years ago now, I wrote a blog post on fixing missing Content-Security-Policy by updating configuration on webservers: https://www.blackhillsinfosec.com/fix-missing-content-security-policy-website/. Content-Security-Policies instruct a user’s web browser how it should behave on certain security considerations. Oh, how times have changed. Here at Black Hills Information Security (BHIS), we’ve actually migrated webservers, hosting […]</p>
<p>The post <a href="https://www.blackhillsinfosec.com/fixing-content-security-policies-with-cloudflare-workers/">Fixing Content-Security-Policies with Cloudflare Workers</a> appeared first on <a href="https://www.blackhillsinfosec.com">Black Hills Information Security</a>.</p>]]>
      </content:encoded>
      <pubDate>Fri, 03 Dec 2021 13:31:18 -0500</pubDate>
      <author>Black Hills Information Security</author>
      <enclosure url="https://media.transistor.fm/bd702586/54952e39.mp3" length="30040435" type="audio/mpeg"/>
      <itunes:author>Black Hills Information Security</itunes:author>
      <itunes:duration>939</itunes:duration>
      <itunes:summary>Kent Ickler //







Background



Over four years ago now, I wrote a blog post on fixing missing Content-Security-Policy by updating configuration on webservers: https://www.blackhillsinfosec.com/fix-missing-content-security-policy-website/. Content-Security-Policies instruct a user’s web browser how it should behave on certain security considerations.



Oh, how times have changed. Here at Black Hills Information Security (BHIS), we’ve actually migrated webservers, hosting companies, security platforms — that list goes on and on. The “best practices” for Content-Security-Policies have changed in the last four years too. On our new hosting platform, we need to set up appropriate content security headers again. Since we now use Cloudflare for our CDN and WAF provider, we have some new opportunities for fronting our Content-Security-Policies outside of the web server itself.



Initial Testing



Before you go about updating your Content-Security-Policies, it’s good to have a clear picture of how your server currently handles/sends Content-Security-Policies. A good way to test this configuration is to use a third-party tool. We can use SecurityHeaders.io to scan our website’s Content-Security-Policy configuration.



Link: https://www.securityheaders.io



In the case below, we’ve had SecurityHeaders.io scan the WildWestHackinFest.com website.







That looks bad, right? Well, maybe. It is important to note that Content-Security-Policies are used to instruct the browser how to handle security concerns within the browser. This is critical on websites where there is user interaction and sensitive information being disclosed. For example, it would be imperative that a banking website, health records portal, or other user-interaction service have appropriate Content-Security-Policy headers. In the scenario where there is no user interaction or no sensitive information disclosed, it becomes less imperative that Content-Security-Policies be configured in a very secured state.



Here’s a good example of a “not-great” configuration scenario: The US Social Security Administration has a portal where users can login and access sensitive information about their account. The portal login landing page is https://secure.ssa.gov:







Alright, so that’s a picture of what not to do.



If you’re looking to correct some of these issues, you have a couple methods afforded to you. The first is to read the blog from four years ago that demonstrates how to fix the issue by configuring your web server with the appropriate Content-Security-Headers. But there is another way.



Cloudflare Workers



Link: https://workers.cloudflare.com/



Cloudflare Workers are a serverless section of server-side-JavaScript that can perform actions or modify web traffic associated with a Cloudflare CDN/WAF protected site. In the case of our earlier example, https://wildwesthackinfest.com is a website that is served by the Cloudflare network. This allows us to use the Cloudflare Workers service to manipulate web traffic without having to update the backend (“origin...</itunes:summary>
      <itunes:subtitle>Kent Ickler //







Background



Over four years ago now, I wrote a blog post on fixing missing Content-Security-Policy by updating configuration on webservers: https://www.blackhillsinfosec.com/fix-missing-content-security-policy-website/. Content-Sec</itunes:subtitle>
      <itunes:keywords>Infosec,Cybersecurity,news</itunes:keywords>
      <itunes:explicit>No</itunes:explicit>
    </item>
    <item>
      <title>Talkin’ About Infosec News – 11/26/2021</title>
      <itunes:episode>1</itunes:episode>
      <podcast:episode>1</podcast:episode>
      <itunes:title>Talkin’ About Infosec News – 11/26/2021</itunes:title>
      <itunes:episodeType>full</itunes:episodeType>
      <guid isPermaLink="false">https://www.blackhillsinfosec.com/?p=20303</guid>
      <link>https://share.transistor.fm/s/cef8768e</link>
      <description>
        <![CDATA[<p>ORIGINALLY AIRED ON NOVEMBER 22, 2021 Articles discussed in this episode: Story # 1: Chinese Team Up With Russia To Launch US Cybersecurity Assault – https://hothardware.com/news/chinese-hackers-team-up-with-russian-ransomware-gang Story # 2: The FBI Got Hacked Over a Beef With a Guy Named Vinny? – https://www.thedailybeast.com/was-fbi-email-hack-just-an-elaborate-troll-of-a-guy-named-vinny-troia Story # 3: Insurers run from ransomware cover as losses mount – https://www.reuters.com/markets/europe/insurers-run-ransomware-cover-losses-mount-2021-11-19/ Story # […]</p>
<p>The post <a href="https://www.blackhillsinfosec.com/talkin-about-infosec-news-11-26-2021/">Talkin’ About Infosec News – 11/26/2021</a> appeared first on <a href="https://www.blackhillsinfosec.com">Black Hills Information Security</a>.</p>
<ul><li>(00:00) - PreShow Banter™ — Fixing Compressors</li>
<li>(02:13) - BHIS - Talkin' Bout [infosec] News 2021-11-22</li>
<li>(05:31) - Story # 1: Chinese Team Up With Russia To Launch US Cybersecurity Assault – https://hothardware.com/news/chinese-hackers-team-up-with-russian-ransomware-gang</li>
<li>(12:23) - Story # 2: The FBI Got Hacked Over a Beef With a Guy Named Vinny? – https://www.thedailybeast.com/was-fbi-email-hack-just-an-elaborate-troll-of-a-guy-named-vinny-troia</li>
<li>(18:32) - Story # 3: Insurers run from ransomware cover as losses mount – https://www.reuters.com/markets/europe/insurers-run-ransomware-cover-losses-mount-2021-11-19/</li>
<li>(23:27) - Story # 4: Ransomware gangs rich enough to buy zero-days – https://www.zdnet.com/article/ransomware-gangs-are-now-rich-enough-to-buy-zero-day-flaws-say-researchers/</li>
<li>(35:06) - Story # 5: FBI Alert on FatPipe VPN Zero-Day - https://thehackernews.com/2021/11/fbi-issues-flash-alert-on-actively.html</li>
<li>(45:31) - Story # 6: Debunking worthless “security” practices – https://arstechnica.com/information-technology/2021/11/securing-your-digital-life-part-4/</li>
</ul>]]>
      </description>
      <content:encoded>
        <![CDATA[<p>ORIGINALLY AIRED ON NOVEMBER 22, 2021 Articles discussed in this episode: Story # 1: Chinese Team Up With Russia To Launch US Cybersecurity Assault – https://hothardware.com/news/chinese-hackers-team-up-with-russian-ransomware-gang Story # 2: The FBI Got Hacked Over a Beef With a Guy Named Vinny? – https://www.thedailybeast.com/was-fbi-email-hack-just-an-elaborate-troll-of-a-guy-named-vinny-troia Story # 3: Insurers run from ransomware cover as losses mount – https://www.reuters.com/markets/europe/insurers-run-ransomware-cover-losses-mount-2021-11-19/ Story # […]</p>
<p>The post <a href="https://www.blackhillsinfosec.com/talkin-about-infosec-news-11-26-2021/">Talkin’ About Infosec News – 11/26/2021</a> appeared first on <a href="https://www.blackhillsinfosec.com">Black Hills Information Security</a>.</p>
<ul><li>(00:00) - PreShow Banter™ — Fixing Compressors</li>
<li>(02:13) - BHIS - Talkin' Bout [infosec] News 2021-11-22</li>
<li>(05:31) - Story # 1: Chinese Team Up With Russia To Launch US Cybersecurity Assault – https://hothardware.com/news/chinese-hackers-team-up-with-russian-ransomware-gang</li>
<li>(12:23) - Story # 2: The FBI Got Hacked Over a Beef With a Guy Named Vinny? – https://www.thedailybeast.com/was-fbi-email-hack-just-an-elaborate-troll-of-a-guy-named-vinny-troia</li>
<li>(18:32) - Story # 3: Insurers run from ransomware cover as losses mount – https://www.reuters.com/markets/europe/insurers-run-ransomware-cover-losses-mount-2021-11-19/</li>
<li>(23:27) - Story # 4: Ransomware gangs rich enough to buy zero-days – https://www.zdnet.com/article/ransomware-gangs-are-now-rich-enough-to-buy-zero-day-flaws-say-researchers/</li>
<li>(35:06) - Story # 5: FBI Alert on FatPipe VPN Zero-Day - https://thehackernews.com/2021/11/fbi-issues-flash-alert-on-actively.html</li>
<li>(45:31) - Story # 6: Debunking worthless “security” practices – https://arstechnica.com/information-technology/2021/11/securing-your-digital-life-part-4/</li>
</ul>]]>
      </content:encoded>
      <pubDate>Fri, 26 Nov 2021 10:55:08 -0500</pubDate>
      <author>Black Hills Information Security</author>
      <enclosure url="https://media.transistor.fm/cef8768e/cb41fa90.mp3" length="41223822" type="audio/mpeg"/>
      <itunes:author>Black Hills Information Security</itunes:author>
      <itunes:image href="https://img.transistorcdn.com/FiC_X5evbM82pFJf-iIX2KjLb4e9KIOrjELUD5PHhGQ/rs:fill:0:0:1/w:1400/h:1400/q:60/mb:500000/aHR0cHM6Ly9pbWct/dXBsb2FkLXByb2R1/Y3Rpb24udHJhbnNp/c3Rvci5mbS8xOTIw/NmI5Nzg5YjIzYmM1/ZTc2NDk0ODY5MTc4/NmQ1ZS5qcGc.jpg"/>
      <itunes:duration>3204</itunes:duration>
      <itunes:summary>ORIGINALLY AIRED ON NOVEMBER 22, 2021



Articles discussed in this episode:



Story # 1: Chinese Team Up With Russia To Launch US Cybersecurity Assault – https://hothardware.com/news/chinese-hackers-team-up-with-russian-ransomware-gang 



Story # 2: The FBI Got Hacked Over a Beef With a Guy Named Vinny? – https://www.thedailybeast.com/was-fbi-email-hack-just-an-elaborate-troll-of-a-guy-named-vinny-troia 



Story # 3: Insurers run from ransomware cover as losses mount – https://www.reuters.com/markets/europe/insurers-run-ransomware-cover-losses-mount-2021-11-19/ 



Story # 4: Ransomware gangs rich enough to buy zero-days – https://www.zdnet.com/article/ransomware-gangs-are-now-rich-enough-to-buy-zero-day-flaws-say-researchers/ 



Story # 5: FBI Alert on FatPipe VPN Zero-Day – https://thehackernews.com/2021/11/fbi-issues-flash-alert-on-actively.html 



Story # 6: Debunking worthless “security” practices – https://arstechnica.com/information-technology/2021/11/securing-your-digital-life-part-4/
















We are self-publishing free Infosec Zines called PROMPT#.  



PROMPT# will contain: 

Infosec articles 
Challenging puzzles 
Comic book based on real-life hacking adventures 
Coloring contests 
Bonus Backdoors &amp;amp; Breaches Consultant Cards (print version only) 
Other stuffs 

You can check out current and upcoming issues here: https://www.blackhillsinfosec.com/prompt-zine/ </itunes:summary>
      <itunes:subtitle>ORIGINALLY AIRED ON NOVEMBER 22, 2021



Articles discussed in this episode:



Story # 1: Chinese Team Up With Russia To Launch US Cybersecurity Assault – https://hothardware.com/news/chinese-hackers-team-up-with-russian-ransomware-gang 



Story # 2: Th</itunes:subtitle>
      <itunes:keywords>Infosec,Cybersecurity,news</itunes:keywords>
      <itunes:explicit>No</itunes:explicit>
      <podcast:chapters url="https://share.transistor.fm/s/cef8768e/chapters.json" type="application/json+chapters"/>
    </item>
    <item>
      <title>Talkin’ About Infosec News – 11/17/2021</title>
      <itunes:episode>1</itunes:episode>
      <podcast:episode>1</podcast:episode>
      <itunes:title>Talkin’ About Infosec News – 11/17/2021</itunes:title>
      <itunes:episodeType>full</itunes:episodeType>
      <guid isPermaLink="false">https://www.blackhillsinfosec.com/?p=20256</guid>
      <link>https://share.transistor.fm/s/ec8982a8</link>
      <description>
        <![CDATA[<p>ORIGINALLY AIRED ON NOVEMBER 15, 2021 Articles discussed in this episode: 00:00 – BHIS – Talkin’ Bout [infosec] News 2021-11-15 02:22 – Story # 1: Robinhood data breach – https://www.bleepingcomputer.com/news/security/robinhood-discloses-data-breach-impacting-7-million-customers/ 07:27 – Story # 2: Trojanized IDA Pro – https://thehackernews.com/2021/11/north-korean-hackers-target.html 09:48 – Story # 3: stealing data today, quantum computers tomorrow – https://www.technologyreview.com/2021/11/03/1039171/hackers-quantum-computers-us-homeland-security-cryptography/ 18:42 – Story # 4: DDR4 […]</p>
<p>The post <a href="https://www.blackhillsinfosec.com/talkin-about-infosec-news-11-17-2021/">Talkin’ About Infosec News – 11/17/2021</a> appeared first on <a href="https://www.blackhillsinfosec.com">Black Hills Information Security</a>.</p>
<ul><li>(00:00) - BHIS - Talkin' Bout [infosec] News 2021-11-15</li>
<li>(02:22) - Story # 1: Robinhood data breach – https://www.bleepingcomputer.com/news/security/robinhood-discloses-data-breach-impacting-7-million-customers/</li>
<li>(07:27) - Story # 2: Trojanized IDA Pro – https://thehackernews.com/2021/11/north-korean-hackers-target.html</li>
<li>(09:48) - Story # 3: stealing data today, quantum computers tomorrow – https://www.technologyreview.com/2021/11/03/1039171/hackers-quantum-computers-us-homeland-security-cryptography/</li>
<li>(18:42) - Story # 4: DDR4 Rowhammer technique – https://arstechnica.com/gadgets/2021/11/ddr4-memory-is-even-more-susceptible-to-rowhammer-attacks-than-anyone-thought/</li>
<li>(26:58) - Story # 5: Secure software supply chain – https://sysdig.com/blog/software-supply-chain-security/</li>
<li>(33:26) - Story # 6: New Android Spyware – https://threatpost.com/new-android-spyware-poses-pegasus-like-threat/176155/</li>
<li>(43:46) - Story # 7: Hoax Email Abused Coding in FBI Website – https://krebsonsecurity.com/2021/11/hoax-email-blast-abused-poor-coding-in-fbi-website/</li>
<li>(55:23) - Story # 8: DomainTools Acquires Farsight Security – https://www.infosecurity-magazine.com/news/domaintools-acquires-farsight/</li>
</ul>]]>
      </description>
      <content:encoded>
        <![CDATA[<p>ORIGINALLY AIRED ON NOVEMBER 15, 2021 Articles discussed in this episode: 00:00 – BHIS – Talkin’ Bout [infosec] News 2021-11-15 02:22 – Story # 1: Robinhood data breach – https://www.bleepingcomputer.com/news/security/robinhood-discloses-data-breach-impacting-7-million-customers/ 07:27 – Story # 2: Trojanized IDA Pro – https://thehackernews.com/2021/11/north-korean-hackers-target.html 09:48 – Story # 3: stealing data today, quantum computers tomorrow – https://www.technologyreview.com/2021/11/03/1039171/hackers-quantum-computers-us-homeland-security-cryptography/ 18:42 – Story # 4: DDR4 […]</p>
<p>The post <a href="https://www.blackhillsinfosec.com/talkin-about-infosec-news-11-17-2021/">Talkin’ About Infosec News – 11/17/2021</a> appeared first on <a href="https://www.blackhillsinfosec.com">Black Hills Information Security</a>.</p>
<ul><li>(00:00) - BHIS - Talkin' Bout [infosec] News 2021-11-15</li>
<li>(02:22) - Story # 1: Robinhood data breach – https://www.bleepingcomputer.com/news/security/robinhood-discloses-data-breach-impacting-7-million-customers/</li>
<li>(07:27) - Story # 2: Trojanized IDA Pro – https://thehackernews.com/2021/11/north-korean-hackers-target.html</li>
<li>(09:48) - Story # 3: stealing data today, quantum computers tomorrow – https://www.technologyreview.com/2021/11/03/1039171/hackers-quantum-computers-us-homeland-security-cryptography/</li>
<li>(18:42) - Story # 4: DDR4 Rowhammer technique – https://arstechnica.com/gadgets/2021/11/ddr4-memory-is-even-more-susceptible-to-rowhammer-attacks-than-anyone-thought/</li>
<li>(26:58) - Story # 5: Secure software supply chain – https://sysdig.com/blog/software-supply-chain-security/</li>
<li>(33:26) - Story # 6: New Android Spyware – https://threatpost.com/new-android-spyware-poses-pegasus-like-threat/176155/</li>
<li>(43:46) - Story # 7: Hoax Email Abused Coding in FBI Website – https://krebsonsecurity.com/2021/11/hoax-email-blast-abused-poor-coding-in-fbi-website/</li>
<li>(55:23) - Story # 8: DomainTools Acquires Farsight Security – https://www.infosecurity-magazine.com/news/domaintools-acquires-farsight/</li>
</ul>]]>
      </content:encoded>
      <pubDate>Wed, 17 Nov 2021 13:44:18 -0500</pubDate>
      <author>Black Hills Information Security</author>
      <enclosure url="https://media.transistor.fm/ec8982a8/cd235380.mp3" length="43828910" type="audio/mpeg"/>
      <itunes:author>Black Hills Information Security</itunes:author>
      <itunes:image href="https://img.transistorcdn.com/C2Da4oq9ZVhAxz0K_X6VsbpnkGLEMyVCABtSrH1dIcQ/rs:fill:0:0:1/w:1400/h:1400/q:60/mb:500000/aHR0cHM6Ly9pbWct/dXBsb2FkLXByb2R1/Y3Rpb24udHJhbnNp/c3Rvci5mbS8yMzZj/MjBlZTFmNDBmZGVh/MDZiY2M4N2YxZWRk/YzBjYy5qcGc.jpg"/>
      <itunes:duration>3444</itunes:duration>
      <itunes:summary>ORIGINALLY AIRED ON NOVEMBER 15, 2021



Articles discussed in this episode:



00:00 – BHIS – Talkin’ Bout [infosec] News 2021-11-15 



02:22 – Story # 1: Robinhood data breach – https://www.bleepingcomputer.com/news/security/robinhood-discloses-data-breach-impacting-7-million-customers/ 



07:27 – Story # 2: Trojanized IDA Pro – https://thehackernews.com/2021/11/north-korean-hackers-target.html 



09:48 – Story # 3: stealing data today, quantum computers tomorrow – https://www.technologyreview.com/2021/11/03/1039171/hackers-quantum-computers-us-homeland-security-cryptography/ 



18:42 – Story # 4: DDR4 Rowhammer technique – https://arstechnica.com/gadgets/2021/11/ddr4-memory-is-even-more-susceptible-to-rowhammer-attacks-than-anyone-thought/ 



26:58 – Story # 5: Secure software supply chain – https://sysdig.com/blog/software-supply-chain-security/ 



33:26 – Story # 6: New Android Spyware – https://threatpost.com/new-android-spyware-poses-pegasus-like-threat/176155/ 



43:46 – Story # 7: Hoax Email Abused Coding in FBI Website – https://krebsonsecurity.com/2021/11/hoax-email-blast-abused-poor-coding-in-fbi-website/ 



55:23 – Story # 8: DomainTools Acquires Farsight Security – https://www.infosecurity-magazine.com/news/domaintools-acquires-farsight/
















We are self-publishing free Infosec Zines called PROMPT#.  



PROMPT# will contain: 

Infosec articles 
Challenging puzzles 
Comic book based on real-life hacking adventures 
Coloring contests 
Bonus Backdoors &amp;amp; Breaches Consultant Cards (print version only) 
Other stuffs 

You can check out current and upcoming issues here: https://www.blackhillsinfosec.com/prompt-zine/ </itunes:summary>
      <itunes:subtitle>ORIGINALLY AIRED ON NOVEMBER 15, 2021



Articles discussed in this episode:



00:00 – BHIS – Talkin’ Bout [infosec] News 2021-11-15 



02:22 – Story # 1: Robinhood data breach – https://www.bleepingcomputer.com/news/security/robinhood-discloses-data-br</itunes:subtitle>
      <itunes:keywords>Infosec,Cybersecurity,news</itunes:keywords>
      <itunes:explicit>No</itunes:explicit>
      <podcast:chapters url="https://share.transistor.fm/s/ec8982a8/chapters.json" type="application/json+chapters"/>
    </item>
    <item>
      <title>Talkin’ About Infosec News – 11/12/2021</title>
      <itunes:episode>1</itunes:episode>
      <podcast:episode>1</podcast:episode>
      <itunes:title>Talkin’ About Infosec News – 11/12/2021</itunes:title>
      <itunes:episodeType>full</itunes:episodeType>
      <guid isPermaLink="false">https://www.blackhillsinfosec.com/?p=20232</guid>
      <link>https://share.transistor.fm/s/e44caf97</link>
      <description>
        <![CDATA[ORIGINALLY AIRED ON November 08, 2021



Articles discussed in this episode:



00:00 – PreShow Banter™ — God’s Waiting Room 



03:08 – BHIS – Talkin’ Bout [infosec] News 2021-11-08 



04:50 – Story # 1: JavaScript in Excel – https://techcrunch.com/2021/11/02/microsoft-brings-javascript-to-excel/ 



09:12 – Story # 2: Bots That Steal 2FA Codes – https://www.vice.com/en/article/y3vz5k/booming-underground-market-bots-2fa-otp-paypal-amazon-bank-apple-venmo 



13:00 – Story # 3: US bans trade with NSO Group – https://www.engadget.com/us-trade-ban-nso-group-145347522.html 



22:34 – Story # 4: US House Passes Acts to Help SMBs with Cybersecurity – https://www.infosecurity-magazine.com/news/house-helps-smbs-cybersecurity/ 



33:34 – Story # 5: Hackers Apologize to Arab Royal Families – https://www.vice.com/en/article/n7nw8m/conti-ransomware-hackers-apologize-to-arab-royal-families-for-leaking-their-data
















We are self-publishing free Infosec Zines called PROMPT#.  



PROMPT# will contain: 

Infosec articles 
Challenging puzzles 
Comic book based on real-life hacking adventures 
Coloring contests 
Bonus Backdoors &amp; Breaches Consultant Cards (print version only) 
Other stuffs 

You can check out current and upcoming issues here: https://www.blackhillsinfosec.com/prompt-zine/ 
<ul><li>(00:00) - PreShow Banter™ — Gods Waiting Room</li>
<li>(03:08) - BHIS - Talkin' Bout [infosec] News 2021-11-08</li>
<li>(04:50) - Story # 1: JavaScript in Excel - https://techcrunch.com/2021/11/02/microsoft-brings-javascript-to-excel/</li>
<li>(09:12) - Story # 2: Bots That Steal 2FA Codes - https://www.vice.com/en/article/y3vz5k/booming-underground-market-bots-2fa-otp-paypal-amazon-bank-apple-venmo</li>
<li>(13:00) - Story # 3: US bans trade with NSO Group - https://www.engadget.com/us-trade-ban-nso-group-145347522.html</li>
<li>(22:34) - Story # 4: US House Passes Acts to Help SMBs with Cybersecurity - https://www.infosecurity-magazine.com/news/house-helps-smbs-cybersecurity/</li>
<li>(33:34) - Story # 5: Hackers Apologize to Arab Royal Families - https://www.vice.com/en/article/n7nw8m/conti-ransomware-hackers-apologize-to-arab-royal-families-for-leaking-their-data</li>
</ul>]]>
      </description>
      <content:encoded>
        <![CDATA[ORIGINALLY AIRED ON November 08, 2021



Articles discussed in this episode:



00:00 – PreShow Banter™ — God’s Waiting Room 



03:08 – BHIS – Talkin’ Bout [infosec] News 2021-11-08 



04:50 – Story # 1: JavaScript in Excel – https://techcrunch.com/2021/11/02/microsoft-brings-javascript-to-excel/ 



09:12 – Story # 2: Bots That Steal 2FA Codes – https://www.vice.com/en/article/y3vz5k/booming-underground-market-bots-2fa-otp-paypal-amazon-bank-apple-venmo 



13:00 – Story # 3: US bans trade with NSO Group – https://www.engadget.com/us-trade-ban-nso-group-145347522.html 



22:34 – Story # 4: US House Passes Acts to Help SMBs with Cybersecurity – https://www.infosecurity-magazine.com/news/house-helps-smbs-cybersecurity/ 



33:34 – Story # 5: Hackers Apologize to Arab Royal Families – https://www.vice.com/en/article/n7nw8m/conti-ransomware-hackers-apologize-to-arab-royal-families-for-leaking-their-data
















We are self-publishing free Infosec Zines called PROMPT#.  



PROMPT# will contain: 

Infosec articles 
Challenging puzzles 
Comic book based on real-life hacking adventures 
Coloring contests 
Bonus Backdoors &amp; Breaches Consultant Cards (print version only) 
Other stuffs 

You can check out current and upcoming issues here: https://www.blackhillsinfosec.com/prompt-zine/ 
<ul><li>(00:00) - PreShow Banter™ — Gods Waiting Room</li>
<li>(03:08) - BHIS - Talkin' Bout [infosec] News 2021-11-08</li>
<li>(04:50) - Story # 1: JavaScript in Excel - https://techcrunch.com/2021/11/02/microsoft-brings-javascript-to-excel/</li>
<li>(09:12) - Story # 2: Bots That Steal 2FA Codes - https://www.vice.com/en/article/y3vz5k/booming-underground-market-bots-2fa-otp-paypal-amazon-bank-apple-venmo</li>
<li>(13:00) - Story # 3: US bans trade with NSO Group - https://www.engadget.com/us-trade-ban-nso-group-145347522.html</li>
<li>(22:34) - Story # 4: US House Passes Acts to Help SMBs with Cybersecurity - https://www.infosecurity-magazine.com/news/house-helps-smbs-cybersecurity/</li>
<li>(33:34) - Story # 5: Hackers Apologize to Arab Royal Families - https://www.vice.com/en/article/n7nw8m/conti-ransomware-hackers-apologize-to-arab-royal-families-for-leaking-their-data</li>
</ul>]]>
      </content:encoded>
      <pubDate>Fri, 12 Nov 2021 08:38:26 -0500</pubDate>
      <author>Black Hills Information Security</author>
      <enclosure url="https://media.transistor.fm/e44caf97/6096450b.mp3" length="33428558" type="audio/mpeg"/>
      <itunes:author>Black Hills Information Security</itunes:author>
      <itunes:image href="https://img.transistorcdn.com/etbB1kkdbDq55tCRw2oDheboXMRYxqYMnvwu0t4tnnw/rs:fill:0:0:1/w:1400/h:1400/q:60/mb:500000/aHR0cHM6Ly9pbWct/dXBsb2FkLXByb2R1/Y3Rpb24udHJhbnNp/c3Rvci5mbS9mZTA3/ZWZiYzZmZjlmOGJl/MGI3N2Y4ODBkZGIw/NDMwNC5qcGc.jpg"/>
      <itunes:duration>2600</itunes:duration>
      <itunes:summary>ORIGINALLY AIRED ON November 08, 2021



Articles discussed in this episode:



00:00 – PreShow Banter™ — God’s Waiting Room 



03:08 – BHIS – Talkin’ Bout [infosec] News 2021-11-08 



04:50 – Story # 1: JavaScript in Excel – https://techcrunch.com/2021/11/02/microsoft-brings-javascript-to-excel/ 



09:12 – Story # 2: Bots That Steal 2FA Codes – https://www.vice.com/en/article/y3vz5k/booming-underground-market-bots-2fa-otp-paypal-amazon-bank-apple-venmo 



13:00 – Story # 3: US bans trade with NSO Group – https://www.engadget.com/us-trade-ban-nso-group-145347522.html 



22:34 – Story # 4: US House Passes Acts to Help SMBs with Cybersecurity – https://www.infosecurity-magazine.com/news/house-helps-smbs-cybersecurity/ 



33:34 – Story # 5: Hackers Apologize to Arab Royal Families – https://www.vice.com/en/article/n7nw8m/conti-ransomware-hackers-apologize-to-arab-royal-families-for-leaking-their-data
















We are self-publishing free Infosec Zines called PROMPT#.  



PROMPT# will contain: 

Infosec articles 
Challenging puzzles 
Comic book based on real-life hacking adventures 
Coloring contests 
Bonus Backdoors &amp;amp; Breaches Consultant Cards (print version only) 
Other stuffs 

You can check out current and upcoming issues here: https://www.blackhillsinfosec.com/prompt-zine/ </itunes:summary>
      <itunes:subtitle>ORIGINALLY AIRED ON November 08, 2021



Articles discussed in this episode:



00:00 – PreShow Banter™ — God’s Waiting Room 



03:08 – BHIS – Talkin’ Bout [infosec] News 2021-11-08 



04:50 – Story # 1: JavaScript in Excel – https://techcrunch.com/2021</itunes:subtitle>
      <itunes:keywords>Infosec,Cybersecurity,news</itunes:keywords>
      <itunes:explicit>No</itunes:explicit>
      <podcast:chapters url="https://share.transistor.fm/s/e44caf97/chapters.json" type="application/json+chapters"/>
    </item>
    <item>
      <title>Webcast: How to Share Your Knowledge with Others</title>
      <itunes:episode>1</itunes:episode>
      <podcast:episode>1</podcast:episode>
      <itunes:title>Webcast: How to Share Your Knowledge with Others</itunes:title>
      <itunes:episodeType>full</itunes:episodeType>
      <guid isPermaLink="false">https://www.blackhillsinfosec.com/?p=20168</guid>
      <link>https://share.transistor.fm/s/a397129c</link>
      <description>
        <![CDATA[Have you ever seen a call for papers for a conference and thought to yourself that you’d like to submit a talk and then immediately thought, oh never mind? 



Have you ever been asked to present internally at your organization and immediately recommended someone else to do it? 



Was it because you didn’t know how to give a presentation, or because you were afraid of speaking in front of an audience, or because you didn’t know where to start? 



This Black Hills Information Security (BHIS) presentation on giving presentations the way people like to hear presentations is based on Jason’s background as a video editor, storyteller, comedian, and content creator. 



We dive into structure, delivery, and how your audience perceives every single word and image you share. 



By the end of this most meta-presentation on presentations using science and stuff, you’ll be equipped with getting started sharing your knowledge with others in a way they will want to hear it.



Recorded•2021-08-26



Join the BHIS Community Discord: https://discord.gg/bhis 



00:00 – FEATURE PRESENTATION: How to Share Your Knowledge With Others 



55:28 – Q &amp; A
















We are self-publishing free Infosec Zines called PROMPT#.  



PROMPT# will contain: 

Infosec articles 
Challenging puzzles 
Comic book based on real-life hacking adventures 
Coloring contests 
Bonus Backdoors &amp; Breaches Consultant Cards (print version only) 
Other stuffs 

You can check out current and upcoming issues here: https://www.blackhillsinfosec.com/prompt-zine/ 
<ul><li>(00:00) - FEATURE PRESENTATION: How to Share Your Knowledge With Others</li>
<li>(55:28) - Q &amp; A</li>
</ul>]]>
      </description>
      <content:encoded>
        <![CDATA[Have you ever seen a call for papers for a conference and thought to yourself that you’d like to submit a talk and then immediately thought, oh never mind? 



Have you ever been asked to present internally at your organization and immediately recommended someone else to do it? 



Was it because you didn’t know how to give a presentation, or because you were afraid of speaking in front of an audience, or because you didn’t know where to start? 



This Black Hills Information Security (BHIS) presentation on giving presentations the way people like to hear presentations is based on Jason’s background as a video editor, storyteller, comedian, and content creator. 



We dive into structure, delivery, and how your audience perceives every single word and image you share. 



By the end of this most meta-presentation on presentations using science and stuff, you’ll be equipped with getting started sharing your knowledge with others in a way they will want to hear it.



Recorded•2021-08-26



Join the BHIS Community Discord: https://discord.gg/bhis 



00:00 – FEATURE PRESENTATION: How to Share Your Knowledge With Others 



55:28 – Q &amp; A
















We are self-publishing free Infosec Zines called PROMPT#.  



PROMPT# will contain: 

Infosec articles 
Challenging puzzles 
Comic book based on real-life hacking adventures 
Coloring contests 
Bonus Backdoors &amp; Breaches Consultant Cards (print version only) 
Other stuffs 

You can check out current and upcoming issues here: https://www.blackhillsinfosec.com/prompt-zine/ 
<ul><li>(00:00) - FEATURE PRESENTATION: How to Share Your Knowledge With Others</li>
<li>(55:28) - Q &amp; A</li>
</ul>]]>
      </content:encoded>
      <pubDate>Tue, 02 Nov 2021 13:22:16 -0400</pubDate>
      <author>Black Hills Information Security</author>
      <enclosure url="https://media.transistor.fm/a397129c/07e3cf89.mp3" length="36672823" type="audio/mpeg"/>
      <itunes:author>Black Hills Information Security</itunes:author>
      <itunes:image href="https://img.transistorcdn.com/1K4Nx2uWYEZpFa1qjdb8hnaRIrSeZb3eNxKnYKI5B9o/rs:fill:0:0:1/w:1400/h:1400/q:60/mb:500000/aHR0cHM6Ly9pbWct/dXBsb2FkLXByb2R1/Y3Rpb24udHJhbnNp/c3Rvci5mbS8xYWUx/NzYyNThkNDU1ODhl/NDAzZjkwODZmMjky/MzdkNi5qcGc.jpg"/>
      <itunes:duration>4447</itunes:duration>
      <itunes:summary>Have you ever seen a call for papers for a conference and thought to yourself that you’d like to submit a talk and then immediately thought, oh never mind? 



Have you ever been asked to present internally at your organization and immediately recommended someone else to do it? 



Was it because you didn’t know how to give a presentation, or because you were afraid of speaking in front of an audience, or because you didn’t know where to start? 



This Black Hills Information Security (BHIS) presentation on giving presentations the way people like to hear presentations is based on Jason’s background as a video editor, storyteller, comedian, and content creator. 



We dive into structure, delivery, and how your audience perceives every single word and image you share. 



By the end of this most meta-presentation on presentations using science and stuff, you’ll be equipped with getting started sharing your knowledge with others in a way they will want to hear it.



Recorded•2021-08-26



Join the BHIS Community Discord: https://discord.gg/bhis 



00:00 – FEATURE PRESENTATION: How to Share Your Knowledge With Others 



55:28 – Q &amp;amp; A
















We are self-publishing free Infosec Zines called PROMPT#.  



PROMPT# will contain: 

Infosec articles 
Challenging puzzles 
Comic book based on real-life hacking adventures 
Coloring contests 
Bonus Backdoors &amp;amp; Breaches Consultant Cards (print version only) 
Other stuffs 

You can check out current and upcoming issues here: https://www.blackhillsinfosec.com/prompt-zine/ </itunes:summary>
      <itunes:subtitle>Have you ever seen a call for papers for a conference and thought to yourself that you’d like to submit a talk and then immediately thought, oh never mind? 



Have you ever been asked to present internally at your organization and immediately recommended</itunes:subtitle>
      <itunes:keywords>Infosec,Cybersecurity,news</itunes:keywords>
      <itunes:explicit>No</itunes:explicit>
      <podcast:chapters url="https://share.transistor.fm/s/a397129c/chapters.json" type="application/json+chapters"/>
    </item>
    <item>
      <title>Talkin’ About Infosec News – 10/28/2021</title>
      <itunes:episode>1</itunes:episode>
      <podcast:episode>1</podcast:episode>
      <itunes:title>Talkin’ About Infosec News – 10/28/2021</itunes:title>
      <itunes:episodeType>full</itunes:episodeType>
      <guid isPermaLink="false">https://www.blackhillsinfosec.com/?p=20133</guid>
      <link>https://share.transistor.fm/s/3dd14ae6</link>
      <description>
        <![CDATA[ORIGINALLY AIRED ON OCTOBER 25, 2021



Articles discussed in this episode:



01:42 – Story # 1: https://www.bleepingcomputer.com/news/security/fired-it-admin-revenge-hacks-school-by-wiping-data-changing-passwords/ 



06:34 – Story # 2: https://krebsonsecurity.com/2021/10/missouri-governor-vows-to-prosecute-st-louis-post-dispatch-for-reporting-security-vulnerability/ 



11:50 – Story # 3: https://www.pcgamer.com/hackers-drain-cryptocurrency-accounts-of-thousands-of-coinbase-users/ 



23:47 – Story # 4: https://threatpost.com/vmware-esxi-encrypted-python-script-ransomware/175374/ 



35:30 – Story # 5: https://thehackernews.com/2021/10/chinese-hackers-used-new-rootkit-to-spy.html 



45:56 – Story # 6: https://cyberworkx.in/2021/10/08/a-new-uefi-bootkit-that-targets-windows-computers/ 



51:45 – Story # 7: https://www.washingtonpost.com/national-security/rail-cybersecurity-dhs-regulations/2021/10/06/b3db07da-2620-11ec-8831-a31e7b3de188_story.html 



54:14 – Story # 8: https://www.nbcnews.com/tech/security/ransomware-hits-us-candymaker-ahead-halloween-rcna3391
















We are self-publishing free Infosec Zines called PROMPT#.  



PROMPT# will contain: 

Infosec articles 
Challenging puzzles 
Comic book based on real-life hacking adventures 
Coloring contests 
Bonus Backdoors &amp; Breaches Consultant Cards (print version only) 
Other stuffs 

You can check out current and upcoming issues here: https://www.blackhillsinfosec.com/prompt-zine/ 
<ul><li>(00:00) - BHIS - Talkin' Bout [infosec] News 2021-10-25</li>
<li>(01:42) - Story # 1: https://www.bleepingcomputer.com/news/security/fired-it-admin-revenge-hacks-school-by-wiping-data-changing-passwords/</li>
<li>(06:34) - Story # 2: https://krebsonsecurity.com/2021/10/missouri-governor-vows-to-prosecute-st-louis-post-dispatch-for-reporting-security-vulnerability/</li>
<li>(11:50) - Story # 3: https://www.pcgamer.com/hackers-drain-cryptocurrency-accounts-of-thousands-of-coinbase-users/</li>
<li>(23:47) - Story # 4: https://threatpost.com/vmware-esxi-encrypted-python-script-ransomware/175374/</li>
<li>(35:30) - Story # 5: https://thehackernews.com/2021/10/chinese-hackers-used-new-rootkit-to-spy.html</li>
<li>(45:56) - Story # 6: https://cyberworkx.in/2021/10/08/a-new-uefi-bootkit-that-targets-windows-computers/</li>
<li>(51:45) - Story # 7: https://www.washingtonpost.com/national-security/rail-cybersecurity-dhs-regulations/2021/10/06/b3db07da-2620-11ec-8831-a31e7b3de188_story.html</li>
<li>(54:14) - Story # 8: https://www.nbcnews.com/tech/security/ransomware-hits-us-candymaker-ahead-halloween-rcna3391</li>
</ul>]]>
      </description>
      <content:encoded>
        <![CDATA[ORIGINALLY AIRED ON OCTOBER 25, 2021



Articles discussed in this episode:



01:42 – Story # 1: https://www.bleepingcomputer.com/news/security/fired-it-admin-revenge-hacks-school-by-wiping-data-changing-passwords/ 



06:34 – Story # 2: https://krebsonsecurity.com/2021/10/missouri-governor-vows-to-prosecute-st-louis-post-dispatch-for-reporting-security-vulnerability/ 



11:50 – Story # 3: https://www.pcgamer.com/hackers-drain-cryptocurrency-accounts-of-thousands-of-coinbase-users/ 



23:47 – Story # 4: https://threatpost.com/vmware-esxi-encrypted-python-script-ransomware/175374/ 



35:30 – Story # 5: https://thehackernews.com/2021/10/chinese-hackers-used-new-rootkit-to-spy.html 



45:56 – Story # 6: https://cyberworkx.in/2021/10/08/a-new-uefi-bootkit-that-targets-windows-computers/ 



51:45 – Story # 7: https://www.washingtonpost.com/national-security/rail-cybersecurity-dhs-regulations/2021/10/06/b3db07da-2620-11ec-8831-a31e7b3de188_story.html 



54:14 – Story # 8: https://www.nbcnews.com/tech/security/ransomware-hits-us-candymaker-ahead-halloween-rcna3391
















We are self-publishing free Infosec Zines called PROMPT#.  



PROMPT# will contain: 

Infosec articles 
Challenging puzzles 
Comic book based on real-life hacking adventures 
Coloring contests 
Bonus Backdoors &amp; Breaches Consultant Cards (print version only) 
Other stuffs 

You can check out current and upcoming issues here: https://www.blackhillsinfosec.com/prompt-zine/ 
<ul><li>(00:00) - BHIS - Talkin' Bout [infosec] News 2021-10-25</li>
<li>(01:42) - Story # 1: https://www.bleepingcomputer.com/news/security/fired-it-admin-revenge-hacks-school-by-wiping-data-changing-passwords/</li>
<li>(06:34) - Story # 2: https://krebsonsecurity.com/2021/10/missouri-governor-vows-to-prosecute-st-louis-post-dispatch-for-reporting-security-vulnerability/</li>
<li>(11:50) - Story # 3: https://www.pcgamer.com/hackers-drain-cryptocurrency-accounts-of-thousands-of-coinbase-users/</li>
<li>(23:47) - Story # 4: https://threatpost.com/vmware-esxi-encrypted-python-script-ransomware/175374/</li>
<li>(35:30) - Story # 5: https://thehackernews.com/2021/10/chinese-hackers-used-new-rootkit-to-spy.html</li>
<li>(45:56) - Story # 6: https://cyberworkx.in/2021/10/08/a-new-uefi-bootkit-that-targets-windows-computers/</li>
<li>(51:45) - Story # 7: https://www.washingtonpost.com/national-security/rail-cybersecurity-dhs-regulations/2021/10/06/b3db07da-2620-11ec-8831-a31e7b3de188_story.html</li>
<li>(54:14) - Story # 8: https://www.nbcnews.com/tech/security/ransomware-hits-us-candymaker-ahead-halloween-rcna3391</li>
</ul>]]>
      </content:encoded>
      <pubDate>Thu, 28 Oct 2021 13:53:09 -0400</pubDate>
      <author>Black Hills Information Security</author>
      <enclosure url="https://media.transistor.fm/3dd14ae6/769ba797.mp3" length="44095975" type="audio/mpeg"/>
      <itunes:author>Black Hills Information Security</itunes:author>
      <itunes:image href="https://img.transistorcdn.com/xjM8h7Oi4mruprxNnsmxJk7BSi0NEWKn3xVzjHkeAKA/rs:fill:0:0:1/w:1400/h:1400/q:60/mb:500000/aHR0cHM6Ly9pbWct/dXBsb2FkLXByb2R1/Y3Rpb24udHJhbnNp/c3Rvci5mbS83M2U5/OGQzYzQzOTAwZGY3/M2U3ZTM3M2JhMTll/ODRkYy5qcGc.jpg"/>
      <itunes:duration>3532</itunes:duration>
      <itunes:summary>ORIGINALLY AIRED ON OCTOBER 25, 2021



Articles discussed in this episode:



01:42 – Story # 1: https://www.bleepingcomputer.com/news/security/fired-it-admin-revenge-hacks-school-by-wiping-data-changing-passwords/ 



06:34 – Story # 2: https://krebsonsecurity.com/2021/10/missouri-governor-vows-to-prosecute-st-louis-post-dispatch-for-reporting-security-vulnerability/ 



11:50 – Story # 3: https://www.pcgamer.com/hackers-drain-cryptocurrency-accounts-of-thousands-of-coinbase-users/ 



23:47 – Story # 4: https://threatpost.com/vmware-esxi-encrypted-python-script-ransomware/175374/ 



35:30 – Story # 5: https://thehackernews.com/2021/10/chinese-hackers-used-new-rootkit-to-spy.html 



45:56 – Story # 6: https://cyberworkx.in/2021/10/08/a-new-uefi-bootkit-that-targets-windows-computers/ 



51:45 – Story # 7: https://www.washingtonpost.com/national-security/rail-cybersecurity-dhs-regulations/2021/10/06/b3db07da-2620-11ec-8831-a31e7b3de188_story.html 



54:14 – Story # 8: https://www.nbcnews.com/tech/security/ransomware-hits-us-candymaker-ahead-halloween-rcna3391
















We are self-publishing free Infosec Zines called PROMPT#.  



PROMPT# will contain: 

Infosec articles 
Challenging puzzles 
Comic book based on real-life hacking adventures 
Coloring contests 
Bonus Backdoors &amp;amp; Breaches Consultant Cards (print version only) 
Other stuffs 

You can check out current and upcoming issues here: https://www.blackhillsinfosec.com/prompt-zine/ </itunes:summary>
      <itunes:subtitle>ORIGINALLY AIRED ON OCTOBER 25, 2021



Articles discussed in this episode:



01:42 – Story # 1: https://www.bleepingcomputer.com/news/security/fired-it-admin-revenge-hacks-school-by-wiping-data-changing-passwords/ 



06:34 – Story # 2: https://krebsons</itunes:subtitle>
      <itunes:keywords>Infosec,Cybersecurity,news</itunes:keywords>
      <itunes:explicit>No</itunes:explicit>
      <podcast:chapters url="https://share.transistor.fm/s/3dd14ae6/chapters.json" type="application/json+chapters"/>
    </item>
    <item>
      <title>Talkin’ About Infosec News – 10/19/2021</title>
      <itunes:episode>1</itunes:episode>
      <podcast:episode>1</podcast:episode>
      <itunes:title>Talkin’ About Infosec News – 10/19/2021</itunes:title>
      <itunes:episodeType>full</itunes:episodeType>
      <guid isPermaLink="false">https://www.blackhillsinfosec.com/?p=20007</guid>
      <link>https://share.transistor.fm/s/b2903405</link>
      <description>
        <![CDATA[ORIGINALLY AIRED ON OCTOBER 11, 2021



Articles discussed in this episode:



00:21 – Story # 1: Facebook Aftermath | https://engineering.fb.com/2021/10/05/networking-traffic/outage-details/ 



09:17 – Story # 2: Twitch Source Code | https://www.theregister.com/2021/10/06/twitch_data_leak/ 



25:31 – Story # 3: SMS Hacked; 5 Years | https://arstechnica.com/information-technology/2021/10/company-that-routes-sms-for-all-major-us-carriers-was-hacked-for-five-years/ 



31:40 – Story # 4: K-12 Cybersecurity Bill | https://thehill.com/policy/cybersecurity/575957-biden-signs-bill-into-law-to-strengthen-k-12-school-cybersecurity?rl=1 



36:39 – Story # 5: Forced Disclosure? | https://www.newsweek.com/businesses-could-soon-have-disclose-ransomware-payouts-1635838











Check out our Cyber Range, not just a place to work through challenges and play, but also an open direct/hands-on training environment.    



https://www.blackhillsinfosec.com/services/cyber-range/
<ul><li>(00:00) - BHIS - Talkin' Bout [infosec] News 2021-10-11</li>
<li>(00:21) - Story # 1: Facebook Aftermath | https://engineering.fb.com/2021/10/05/networking-traffic/outage-details/</li>
<li>(09:17) - Story # 2: Twitch Source Code | https://www.theregister.com/2021/10/06/twitch_data_leak/</li>
<li>(25:31) - Story # 3: SMS Hacked; 5 Years | https://arstechnica.com/information-technology/2021/10/company-that-routes-sms-for-all-major-us-carriers-was-hacked-for-five-years/</li>
<li>(31:40) - Story # 4: K-12 Cybersecurity Bill | https://thehill.com/policy/cybersecurity/575957-biden-signs-bill-into-law-to-strengthen-k-12-school-cybersecurity?rl=1</li>
<li>(36:39) - Story # 5: Forced Disclosure? | https://www.newsweek.com/businesses-could-soon-have-disclose-ransomware-payouts-1635838</li>
</ul>]]>
      </description>
      <content:encoded>
        <![CDATA[ORIGINALLY AIRED ON OCTOBER 11, 2021



Articles discussed in this episode:



00:21 – Story # 1: Facebook Aftermath | https://engineering.fb.com/2021/10/05/networking-traffic/outage-details/ 



09:17 – Story # 2: Twitch Source Code | https://www.theregister.com/2021/10/06/twitch_data_leak/ 



25:31 – Story # 3: SMS Hacked; 5 Years | https://arstechnica.com/information-technology/2021/10/company-that-routes-sms-for-all-major-us-carriers-was-hacked-for-five-years/ 



31:40 – Story # 4: K-12 Cybersecurity Bill | https://thehill.com/policy/cybersecurity/575957-biden-signs-bill-into-law-to-strengthen-k-12-school-cybersecurity?rl=1 



36:39 – Story # 5: Forced Disclosure? | https://www.newsweek.com/businesses-could-soon-have-disclose-ransomware-payouts-1635838











Check out our Cyber Range, not just a place to work through challenges and play, but also an open direct/hands-on training environment.    



https://www.blackhillsinfosec.com/services/cyber-range/
<ul><li>(00:00) - BHIS - Talkin' Bout [infosec] News 2021-10-11</li>
<li>(00:21) - Story # 1: Facebook Aftermath | https://engineering.fb.com/2021/10/05/networking-traffic/outage-details/</li>
<li>(09:17) - Story # 2: Twitch Source Code | https://www.theregister.com/2021/10/06/twitch_data_leak/</li>
<li>(25:31) - Story # 3: SMS Hacked; 5 Years | https://arstechnica.com/information-technology/2021/10/company-that-routes-sms-for-all-major-us-carriers-was-hacked-for-five-years/</li>
<li>(31:40) - Story # 4: K-12 Cybersecurity Bill | https://thehill.com/policy/cybersecurity/575957-biden-signs-bill-into-law-to-strengthen-k-12-school-cybersecurity?rl=1</li>
<li>(36:39) - Story # 5: Forced Disclosure? | https://www.newsweek.com/businesses-could-soon-have-disclose-ransomware-payouts-1635838</li>
</ul>]]>
      </content:encoded>
      <pubDate>Tue, 19 Oct 2021 14:43:00 -0400</pubDate>
      <author>Black Hills Information Security</author>
      <enclosure url="https://media.transistor.fm/b2903405/e546eebb.mp3" length="25939346" type="audio/mpeg"/>
      <itunes:author>Black Hills Information Security</itunes:author>
      <itunes:image href="https://img.transistorcdn.com/XLXSb05Y6lCsGhmarb0shr75nn0-imeFvQidF-MvDdY/rs:fill:0:0:1/w:1400/h:1400/q:60/mb:500000/aHR0cHM6Ly9pbWct/dXBsb2FkLXByb2R1/Y3Rpb24udHJhbnNp/c3Rvci5mbS8zMjY3/ZjI0MjNkNDUxYjg5/ZDJkNDlmZmQ2Zjcx/N2MzZC5qcGc.jpg"/>
      <itunes:duration>3013</itunes:duration>
      <itunes:summary>ORIGINALLY AIRED ON OCTOBER 11, 2021



Articles discussed in this episode:



00:21 – Story # 1: Facebook Aftermath | https://engineering.fb.com/2021/10/05/networking-traffic/outage-details/ 



09:17 – Story # 2: Twitch Source Code | https://www.theregister.com/2021/10/06/twitch_data_leak/ 



25:31 – Story # 3: SMS Hacked; 5 Years | https://arstechnica.com/information-technology/2021/10/company-that-routes-sms-for-all-major-us-carriers-was-hacked-for-five-years/ 



31:40 – Story # 4: K-12 Cybersecurity Bill | https://thehill.com/policy/cybersecurity/575957-biden-signs-bill-into-law-to-strengthen-k-12-school-cybersecurity?rl=1 



36:39 – Story # 5: Forced Disclosure? | https://www.newsweek.com/businesses-could-soon-have-disclose-ransomware-payouts-1635838











Check out our Cyber Range, not just a place to work through challenges and play, but also an open direct/hands-on training environment.    



https://www.blackhillsinfosec.com/services/cyber-range/</itunes:summary>
      <itunes:subtitle>ORIGINALLY AIRED ON OCTOBER 11, 2021



Articles discussed in this episode:



00:21 – Story # 1: Facebook Aftermath | https://engineering.fb.com/2021/10/05/networking-traffic/outage-details/ 



09:17 – Story # 2: Twitch Source Code | https://www.theregi</itunes:subtitle>
      <itunes:keywords>Infosec,Cybersecurity,news</itunes:keywords>
      <itunes:explicit>No</itunes:explicit>
      <podcast:chapters url="https://share.transistor.fm/s/b2903405/chapters.json" type="application/json+chapters"/>
    </item>
    <item>
      <title>Talkin’ About Infosec News – 10/13/2021</title>
      <itunes:episode>1</itunes:episode>
      <podcast:episode>1</podcast:episode>
      <itunes:title>Talkin’ About Infosec News – 10/13/2021</itunes:title>
      <itunes:episodeType>full</itunes:episodeType>
      <guid isPermaLink="false">https://www.blackhillsinfosec.com/?p=19961</guid>
      <link>https://share.transistor.fm/s/f647c4ba</link>
      <description>
        <![CDATA[ORIGINALLY AIRED ON OCTOBER 4, 2021



Articles discussed in this episode:



00:57 – Story # 1: Facebook is Burning 



22:09 – Story # 2: https://www.bleepingcomputer.com/news/security/voipms-phone-services-disrupted-by-ddos-extortion-attack/ 



25:38 – Story # 3: https://krebsonsecurity.com/2021/10/fcc-proposal-targets-sim-swapping-port-out-fraud/ 



33:02 – Story # 4: https://cyberworkx.in/2021/10/03/hackers-spreading-malware-by-misusing-trust-of-amnesty-international/



36:55 – Story # 5: https://threatpost.com/finspy-surveillance-kit/175068/ 



39:04 – Story # 6: https://thehackernews.com/2021/10/a-new-apt-hacking-group-targeting-fuel.html















https://www.blackhillsinfosec.com/services/cyber-range/
<ul><li>(00:00) - BHIS - Talkin' Bout [infosec] News 2021-10-04</li>
<li>(00:57) - Story # 1: Facebook is Burning</li>
<li>(22:09) - Story # 2: https://www.bleepingcomputer.com/news/security/voipms-phone-services-disrupted-by-ddos-extortion-attack/</li>
<li>(25:38) - Story # 3: https://krebsonsecurity.com/2021/10/fcc-proposal-targets-sim-swapping-port-out-fraud/</li>
<li>(33:02) - Story # 4: https://cyberworkx.in/2021/10/03/hackers-spreading-malware-by-misusing-trust-of-amnesty-international/</li>
<li>(36:55) - Story # 5: https://threatpost.com/finspy-surveillance-kit/175068/</li>
<li>(39:04) - Story # 6: https://thehackernews.com/2021/10/a-new-apt-hacking-group-targeting-fuel.html</li>
</ul>]]>
      </description>
      <content:encoded>
        <![CDATA[ORIGINALLY AIRED ON OCTOBER 4, 2021



Articles discussed in this episode:



00:57 – Story # 1: Facebook is Burning 



22:09 – Story # 2: https://www.bleepingcomputer.com/news/security/voipms-phone-services-disrupted-by-ddos-extortion-attack/ 



25:38 – Story # 3: https://krebsonsecurity.com/2021/10/fcc-proposal-targets-sim-swapping-port-out-fraud/ 



33:02 – Story # 4: https://cyberworkx.in/2021/10/03/hackers-spreading-malware-by-misusing-trust-of-amnesty-international/



36:55 – Story # 5: https://threatpost.com/finspy-surveillance-kit/175068/ 



39:04 – Story # 6: https://thehackernews.com/2021/10/a-new-apt-hacking-group-targeting-fuel.html















https://www.blackhillsinfosec.com/services/cyber-range/
<ul><li>(00:00) - BHIS - Talkin' Bout [infosec] News 2021-10-04</li>
<li>(00:57) - Story # 1: Facebook is Burning</li>
<li>(22:09) - Story # 2: https://www.bleepingcomputer.com/news/security/voipms-phone-services-disrupted-by-ddos-extortion-attack/</li>
<li>(25:38) - Story # 3: https://krebsonsecurity.com/2021/10/fcc-proposal-targets-sim-swapping-port-out-fraud/</li>
<li>(33:02) - Story # 4: https://cyberworkx.in/2021/10/03/hackers-spreading-malware-by-misusing-trust-of-amnesty-international/</li>
<li>(36:55) - Story # 5: https://threatpost.com/finspy-surveillance-kit/175068/</li>
<li>(39:04) - Story # 6: https://thehackernews.com/2021/10/a-new-apt-hacking-group-targeting-fuel.html</li>
</ul>]]>
      </content:encoded>
      <pubDate>Wed, 13 Oct 2021 08:35:28 -0400</pubDate>
      <author>Black Hills Information Security</author>
      <enclosure url="https://media.transistor.fm/f647c4ba/17e3c152.mp3" length="22408014" type="audio/mpeg"/>
      <itunes:author>Black Hills Information Security</itunes:author>
      <itunes:image href="https://img.transistorcdn.com/DUgxlW4AbmTb_FElBK2stV9oy7GtCPU7ZRitVD7kuNE/rs:fill:0:0:1/w:1400/h:1400/q:60/mb:500000/aHR0cHM6Ly9pbWct/dXBsb2FkLXByb2R1/Y3Rpb24udHJhbnNp/c3Rvci5mbS81ZjFk/ZGIyNjdjNzFmNzJl/NDU4ZDg4Nzc5OTM4/Y2M4Ni5qcGc.jpg"/>
      <itunes:duration>2563</itunes:duration>
      <itunes:summary>ORIGINALLY AIRED ON OCTOBER 4, 2021



Articles discussed in this episode:



00:57 – Story # 1: Facebook is Burning 



22:09 – Story # 2: https://www.bleepingcomputer.com/news/security/voipms-phone-services-disrupted-by-ddos-extortion-attack/ 



25:38 – Story # 3: https://krebsonsecurity.com/2021/10/fcc-proposal-targets-sim-swapping-port-out-fraud/ 



33:02 – Story # 4: https://cyberworkx.in/2021/10/03/hackers-spreading-malware-by-misusing-trust-of-amnesty-international/



36:55 – Story # 5: https://threatpost.com/finspy-surveillance-kit/175068/ 



39:04 – Story # 6: https://thehackernews.com/2021/10/a-new-apt-hacking-group-targeting-fuel.html















https://www.blackhillsinfosec.com/services/cyber-range/</itunes:summary>
      <itunes:subtitle>ORIGINALLY AIRED ON OCTOBER 4, 2021



Articles discussed in this episode:



00:57 – Story # 1: Facebook is Burning 



22:09 – Story # 2: https://www.bleepingcomputer.com/news/security/voipms-phone-services-disrupted-by-ddos-extortion-attack/ 



25:38 </itunes:subtitle>
      <itunes:keywords>Infosec,Cybersecurity,news</itunes:keywords>
      <itunes:explicit>No</itunes:explicit>
      <podcast:chapters url="https://share.transistor.fm/s/f647c4ba/chapters.json" type="application/json+chapters"/>
    </item>
    <item>
      <title>Talkin’ About Infosec News – 9/29/2021</title>
      <itunes:episode>1</itunes:episode>
      <podcast:episode>1</podcast:episode>
      <itunes:title>Talkin’ About Infosec News – 9/29/2021</itunes:title>
      <itunes:episodeType>full</itunes:episodeType>
      <guid isPermaLink="false">https://www.blackhillsinfosec.com/?p=19936</guid>
      <link>https://share.transistor.fm/s/6f35bc46</link>
      <description>
        <![CDATA[ORIGINALLY AIRED ON SEPTEMBER 27, 2021



Articles discussed in this episode:



01:20 – Story # 1: https://habr.com/en/post/579714/ 



02:14 – Story # 1b: https://therecord.media/researcher-discloses-iphone-lock-screen-bypass-on-ios-15-launch-day/ 



02:54 – Story # 1c: https://www.bleepingcomputer.com/news/apple/new-macos-zero-day-bug-lets-attackers-run-commands-remotely/ 



04:03 – Story #1d: https://habr.com/en/post/580272/ 



09:42 – A Wild Noah Has Joined the Chat 



13:24 – The Wildest, Grayson &amp; Tenille, Have Joined the Chat 



13:45 – A Wild Jeff Has Joined the Chat 



14:45 – Story #2: https://www.bbc.com/news/technology-58678907 



22:03 – Story #3: https://arstechnica.com/information-technology/2021/09/ransomware-victims-panicked-while-fbi-secretly-held-revil-decryption-key/ 



29:47 – Story #4: https://thehackernews.com/2021/09/new-nagios-software-bugs-could-let.html 



34:34 – Story #5: https://thehackernews.com/2021/09/a-new-bug-in-microsoft-windows-could.html 



37:15 – Story #5b: https://github.com/Jamesits/dropWPBT 



42:29 – Story #5c: https://github.com/chipsec/chipsec



















Check out our Cyber Range, not just a place to work through challenges and play, but also an open direct/hands-on training environment.    



https://www.blackhillsinfosec.com/services/cyber-range/ 











Join the BHIS Blog Mailing List – get notified when we post new blogs, webcasts, and podcasts.



            
									
						
						Join 3,834 other subscribers						
					
					                    
                        
							Email Address
<ul><li>(00:00) - BHIS - Talkin' Bout [infosec] News 2021-09-27</li>
<li>(01:20) - Story # 1: https://habr.com/en/post/579714/</li>
<li>(02:14) - Story # 1b: https://therecord.media/researcher-discloses-iphone-lock-screen-bypass-on-ios-15-launch-day/</li>
<li>(02:54) - Story # 1c: https://www.bleepingcomputer.com/news/apple/new-macos-zero-day-bug-lets-attackers-run-commands-remotely/</li>
<li>(04:03) - Story # 1d: https://habr.com/en/post/580272/</li>
<li>(09:42) - A Wild Noah Has Joined the Chat</li>
<li>(13:24) - The Wildest, Grayson &amp; Tenille, Have Joined the Chat</li>
<li>(13:45) - A Wild Jeff Has Joined the Chat</li>
<li>(14:45) - Story # 2: https://www.bbc.com/news/technology-58678907</li>
<li>(22:03) - Story # 3: https://arstechnica.com/information-technology/2021/09/ransomware-victims-panicked-while-fbi-secretly-held-revil-decryption-key/</li>
<li>(29:47) - Story # 4: https://thehackernews.com/2021/09/new-nagios-software-bugs-could-let.html</li>
<li>(34:34) - Story # 5: https://thehackernews.com/2021/09/a-new-bug-in-microsoft-windows-could.html</li>
<li>(37:15) - Story # 5b: https://github.com/Jamesits/dropWPBT</li>
<li>(42:29) - Story # 5c: https://github.com/chipsec/chipsec</li>
</ul>]]>
      </description>
      <content:encoded>
        <![CDATA[ORIGINALLY AIRED ON SEPTEMBER 27, 2021



Articles discussed in this episode:



01:20 – Story # 1: https://habr.com/en/post/579714/ 



02:14 – Story # 1b: https://therecord.media/researcher-discloses-iphone-lock-screen-bypass-on-ios-15-launch-day/ 



02:54 – Story # 1c: https://www.bleepingcomputer.com/news/apple/new-macos-zero-day-bug-lets-attackers-run-commands-remotely/ 



04:03 – Story #1d: https://habr.com/en/post/580272/ 



09:42 – A Wild Noah Has Joined the Chat 



13:24 – The Wildest, Grayson &amp; Tenille, Have Joined the Chat 



13:45 – A Wild Jeff Has Joined the Chat 



14:45 – Story #2: https://www.bbc.com/news/technology-58678907 



22:03 – Story #3: https://arstechnica.com/information-technology/2021/09/ransomware-victims-panicked-while-fbi-secretly-held-revil-decryption-key/ 



29:47 – Story #4: https://thehackernews.com/2021/09/new-nagios-software-bugs-could-let.html 



34:34 – Story #5: https://thehackernews.com/2021/09/a-new-bug-in-microsoft-windows-could.html 



37:15 – Story #5b: https://github.com/Jamesits/dropWPBT 



42:29 – Story #5c: https://github.com/chipsec/chipsec



















Check out our Cyber Range, not just a place to work through challenges and play, but also an open direct/hands-on training environment.    



https://www.blackhillsinfosec.com/services/cyber-range/ 











Join the BHIS Blog Mailing List – get notified when we post new blogs, webcasts, and podcasts.



            
									
						
						Join 3,834 other subscribers						
					
					                    
                        
							Email Address
<ul><li>(00:00) - BHIS - Talkin' Bout [infosec] News 2021-09-27</li>
<li>(01:20) - Story # 1: https://habr.com/en/post/579714/</li>
<li>(02:14) - Story # 1b: https://therecord.media/researcher-discloses-iphone-lock-screen-bypass-on-ios-15-launch-day/</li>
<li>(02:54) - Story # 1c: https://www.bleepingcomputer.com/news/apple/new-macos-zero-day-bug-lets-attackers-run-commands-remotely/</li>
<li>(04:03) - Story # 1d: https://habr.com/en/post/580272/</li>
<li>(09:42) - A Wild Noah Has Joined the Chat</li>
<li>(13:24) - The Wildest, Grayson &amp; Tenille, Have Joined the Chat</li>
<li>(13:45) - A Wild Jeff Has Joined the Chat</li>
<li>(14:45) - Story # 2: https://www.bbc.com/news/technology-58678907</li>
<li>(22:03) - Story # 3: https://arstechnica.com/information-technology/2021/09/ransomware-victims-panicked-while-fbi-secretly-held-revil-decryption-key/</li>
<li>(29:47) - Story # 4: https://thehackernews.com/2021/09/new-nagios-software-bugs-could-let.html</li>
<li>(34:34) - Story # 5: https://thehackernews.com/2021/09/a-new-bug-in-microsoft-windows-could.html</li>
<li>(37:15) - Story # 5b: https://github.com/Jamesits/dropWPBT</li>
<li>(42:29) - Story # 5c: https://github.com/chipsec/chipsec</li>
</ul>]]>
      </content:encoded>
      <pubDate>Wed, 29 Sep 2021 11:33:22 -0400</pubDate>
      <author>Black Hills Information Security</author>
      <enclosure url="https://media.transistor.fm/6f35bc46/eaad89a0.mp3" length="28201522" type="audio/mpeg"/>
      <itunes:author>Black Hills Information Security</itunes:author>
      <itunes:image href="https://img.transistorcdn.com/2KMB5v2f0BVrudf_LljeXHfGwF1qa7w5CsuGDQFTVtI/rs:fill:0:0:1/w:1400/h:1400/q:60/mb:500000/aHR0cHM6Ly9pbWct/dXBsb2FkLXByb2R1/Y3Rpb24udHJhbnNp/c3Rvci5mbS84ODc1/MmRkYTQ2NDk4YTRj/N2QwYTc1ZmJhZmEy/MzA5Yi5qcGc.jpg"/>
      <itunes:duration>3172</itunes:duration>
      <itunes:summary>ORIGINALLY AIRED ON SEPTEMBER 27, 2021



Articles discussed in this episode:



01:20 – Story # 1: https://habr.com/en/post/579714/ 



02:14 – Story # 1b: https://therecord.media/researcher-discloses-iphone-lock-screen-bypass-on-ios-15-launch-day/ 



02:54 – Story # 1c: https://www.bleepingcomputer.com/news/apple/new-macos-zero-day-bug-lets-attackers-run-commands-remotely/ 



04:03 – Story #1d: https://habr.com/en/post/580272/ 



09:42 – A Wild Noah Has Joined the Chat 



13:24 – The Wildest, Grayson &amp;amp; Tenille, Have Joined the Chat 



13:45 – A Wild Jeff Has Joined the Chat 



14:45 – Story #2: https://www.bbc.com/news/technology-58678907 



22:03 – Story #3: https://arstechnica.com/information-technology/2021/09/ransomware-victims-panicked-while-fbi-secretly-held-revil-decryption-key/ 



29:47 – Story #4: https://thehackernews.com/2021/09/new-nagios-software-bugs-could-let.html 



34:34 – Story #5: https://thehackernews.com/2021/09/a-new-bug-in-microsoft-windows-could.html 



37:15 – Story #5b: https://github.com/Jamesits/dropWPBT 



42:29 – Story #5c: https://github.com/chipsec/chipsec



















Check out our Cyber Range, not just a place to work through challenges and play, but also an open direct/hands-on training environment.    



https://www.blackhillsinfosec.com/services/cyber-range/ 











Join the BHIS Blog Mailing List – get notified when we post new blogs, webcasts, and podcasts.



            
									
						
						Join 3,834 other subscribers						
					
					                    
                        
							Email Address</itunes:summary>
      <itunes:subtitle>ORIGINALLY AIRED ON SEPTEMBER 27, 2021



Articles discussed in this episode:



01:20 – Story # 1: https://habr.com/en/post/579714/ 



02:14 – Story # 1b: https://therecord.media/researcher-discloses-iphone-lock-screen-bypass-on-ios-15-launch-day/ 



0</itunes:subtitle>
      <itunes:keywords>Infosec,Cybersecurity,news</itunes:keywords>
      <itunes:explicit>No</itunes:explicit>
      <podcast:chapters url="https://share.transistor.fm/s/6f35bc46/chapters.json" type="application/json+chapters"/>
    </item>
    <item>
      <title>Webcast: Shellcode Execution with GoLang</title>
      <itunes:episode>1</itunes:episode>
      <podcast:episode>1</podcast:episode>
      <itunes:title>Webcast: Shellcode Execution with GoLang</itunes:title>
      <itunes:episodeType>full</itunes:episodeType>
      <guid isPermaLink="false">https://www.blackhillsinfosec.com/?p=19920</guid>
      <link>https://share.transistor.fm/s/956dd6d5</link>
      <description>
        <![CDATA[In this Black Hills Information Security (BHIS) webcast, we explore using GoLang to author malware with embedded shellcode. 



GoLang is a Google-authored modern successor language to C/C++. It is multi-platform, high performance, multi-threaded, and unlike C/C++ includes garbage collection! It has the advantage of compiling to native machine code, unlike .NET C# which is dependent on the common language runtime, and easily reversible. We explore how to execute Windows shellcode with GoLang in the same process thread space, and then also explore one process injection method. 



If you are a penetration tester looking to expand your malware authoring skills, a little Go(lang) will take you far!



Recorded • 2021-05-20 



Join the BHIS Community Discord: https://discord.gg/bhis 



00:00 – FEATURE PRESENTATION BEGINS: Shellcode Execution with GoLang 



01:39 – Meet Joff Thyer 



02:16 – What is GoLang? 



04:14 – Aspects of GoLang 



07:43 – C# or Go? 



09:24 – Go Command Line 



10:57 – Golang Type Safety 



11:31 – What is Shellcode? 



12:51 – Sources of Shellcode 



14:50 – Executing Shellcode on Windows 



16:08 – GoLang “unsafe” Package 



16:55 – Go “syscall” package is becoming per platform 



17:50 – GoLang “windows” Package 



18:22 – “x/sys/windows” package 



20:29 – Looking deeper into Syscall 



22:26 – Calling Functions out of Kernel32.dll
<ul><li>(00:00) - FEATURE PRESENTATION BEGINS: Shellcode Execution with GoLang</li>
<li>(01:38) - Meet Joff Thyer</li>
<li>(02:15) - What is GoLang?</li>
<li>(04:12) - Aspects of GoLang</li>
<li>(07:40) - C# or Go?</li>
<li>(09:19) - Go Command Line</li>
<li>(10:52) - Golang Type Safety</li>
<li>(11:25) - What is Shellcode?</li>
<li>(12:44) - Sources of Shellcode</li>
<li>(14:43) - Executing Shellcode on Windows</li>
<li>(15:59) - GoLang "unsafe" Package</li>
<li>(16:46) - Go "syscall" package is becoming per platform</li>
<li>(17:42) - GoLang "windows" Package</li>
<li>(18:13) - "x/sys/windows" package</li>
<li>(20:20) - Looking deeper into Syscall</li>
<li>(22:13) - Calling Functions out of Kernel32.dll</li>
<li>(22:59) - GoLang: Byte Array for Shellcode</li>
<li>(24:18) - Method 1: Direct Syscall</li>
<li>(29:07) - Tangent: The A/V and EDR evasion paradox</li>
<li>(32:04) - Single byte XOR function in GoLang</li>
<li>(33:27) - Method 2: Creating Thread in Same Process</li>
<li>(35:13) - GoLang Windows Native DLL</li>
<li>(36:19) - Steps to build a native DLL</li>
<li>(40:38) - Living off the Land with Native DLL</li>
<li>(43:22) - DEMO : Run shell code</li>
<li>(45:55) - Method 3: Process Injection</li>
<li>(48:20) - DEMO - Remote Process Injection</li>
<li>(49:19) - Additional Resources</li>
<li>(49:59) - DEMO - Remote Process Injection cont.</li>
<li>(52:01) - QnA</li>
<li>(53:46) - LINK: Attacker Emulation and C2 - https://www.antisyphontraining.com/enterprise-attacker-emulation-and-c2-implant-development-w-joff-thyer/</li>
</ul>]]>
      </description>
      <content:encoded>
        <![CDATA[In this Black Hills Information Security (BHIS) webcast, we explore using GoLang to author malware with embedded shellcode. 



GoLang is a Google-authored modern successor language to C/C++. It is multi-platform, high performance, multi-threaded, and unlike C/C++ includes garbage collection! It has the advantage of compiling to native machine code, unlike .NET C# which is dependent on the common language runtime, and easily reversible. We explore how to execute Windows shellcode with GoLang in the same process thread space, and then also explore one process injection method. 



If you are a penetration tester looking to expand your malware authoring skills, a little Go(lang) will take you far!



Recorded • 2021-05-20 



Join the BHIS Community Discord: https://discord.gg/bhis 



00:00 – FEATURE PRESENTATION BEGINS: Shellcode Execution with GoLang 



01:39 – Meet Joff Thyer 



02:16 – What is GoLang? 



04:14 – Aspects of GoLang 



07:43 – C# or Go? 



09:24 – Go Command Line 



10:57 – Golang Type Safety 



11:31 – What is Shellcode? 



12:51 – Sources of Shellcode 



14:50 – Executing Shellcode on Windows 



16:08 – GoLang “unsafe” Package 



16:55 – Go “syscall” package is becoming per platform 



17:50 – GoLang “windows” Package 



18:22 – “x/sys/windows” package 



20:29 – Looking deeper into Syscall 



22:26 – Calling Functions out of Kernel32.dll
<ul><li>(00:00) - FEATURE PRESENTATION BEGINS: Shellcode Execution with GoLang</li>
<li>(01:38) - Meet Joff Thyer</li>
<li>(02:15) - What is GoLang?</li>
<li>(04:12) - Aspects of GoLang</li>
<li>(07:40) - C# or Go?</li>
<li>(09:19) - Go Command Line</li>
<li>(10:52) - Golang Type Safety</li>
<li>(11:25) - What is Shellcode?</li>
<li>(12:44) - Sources of Shellcode</li>
<li>(14:43) - Executing Shellcode on Windows</li>
<li>(15:59) - GoLang "unsafe" Package</li>
<li>(16:46) - Go "syscall" package is becoming per platform</li>
<li>(17:42) - GoLang "windows" Package</li>
<li>(18:13) - "x/sys/windows" package</li>
<li>(20:20) - Looking deeper into Syscall</li>
<li>(22:13) - Calling Functions out of Kernel32.dll</li>
<li>(22:59) - GoLang: Byte Array for Shellcode</li>
<li>(24:18) - Method 1: Direct Syscall</li>
<li>(29:07) - Tangent: The A/V and EDR evasion paradox</li>
<li>(32:04) - Single byte XOR function in GoLang</li>
<li>(33:27) - Method 2: Creating Thread in Same Process</li>
<li>(35:13) - GoLang Windows Native DLL</li>
<li>(36:19) - Steps to build a native DLL</li>
<li>(40:38) - Living off the Land with Native DLL</li>
<li>(43:22) - DEMO : Run shell code</li>
<li>(45:55) - Method 3: Process Injection</li>
<li>(48:20) - DEMO - Remote Process Injection</li>
<li>(49:19) - Additional Resources</li>
<li>(49:59) - DEMO - Remote Process Injection cont.</li>
<li>(52:01) - QnA</li>
<li>(53:46) - LINK: Attacker Emulation and C2 - https://www.antisyphontraining.com/enterprise-attacker-emulation-and-c2-implant-development-w-joff-thyer/</li>
</ul>]]>
      </content:encoded>
      <pubDate>Tue, 28 Sep 2021 11:29:42 -0400</pubDate>
      <author>Black Hills Information Security</author>
      <enclosure url="https://media.transistor.fm/956dd6d5/972de6fa.mp3" length="34198236" type="audio/mpeg"/>
      <itunes:author>Black Hills Information Security</itunes:author>
      <itunes:image href="https://img.transistorcdn.com/AkHPIArTGzZl3SlIdnHM-6VVb2a_O7tXS5Klf-m2tzU/rs:fill:0:0:1/w:1400/h:1400/q:60/mb:500000/aHR0cHM6Ly9pbWct/dXBsb2FkLXByb2R1/Y3Rpb24udHJhbnNp/c3Rvci5mbS81YmFi/NzdlNTk4NWUxMDdk/MmUyZjYyNmRmOTg2/NzJkMS5qcGc.jpg"/>
      <itunes:duration>3789</itunes:duration>
      <itunes:summary>In this Black Hills Information Security (BHIS) webcast, we explore using GoLang to author malware with embedded shellcode. 



GoLang is a Google-authored modern successor language to C/C++. It is multi-platform, high performance, multi-threaded, and unlike C/C++ includes garbage collection! It has the advantage of compiling to native machine code, unlike .NET C# which is dependent on the common language runtime, and easily reversible. We explore how to execute Windows shellcode with GoLang in the same process thread space, and then also explore one process injection method. 



If you are a penetration tester looking to expand your malware authoring skills, a little Go(lang) will take you far!



Recorded • 2021-05-20 



Join the BHIS Community Discord: https://discord.gg/bhis 



00:00 – FEATURE PRESENTATION BEGINS: Shellcode Execution with GoLang 



01:39 – Meet Joff Thyer 



02:16 – What is GoLang? 



04:14 – Aspects of GoLang 



07:43 – C# or Go? 



09:24 – Go Command Line 



10:57 – Golang Type Safety 



11:31 – What is Shellcode? 



12:51 – Sources of Shellcode 



14:50 – Executing Shellcode on Windows 



16:08 – GoLang “unsafe” Package 



16:55 – Go “syscall” package is becoming per platform 



17:50 – GoLang “windows” Package 



18:22 – “x/sys/windows” package 



20:29 – Looking deeper into Syscall 



22:26 – Calling Functions out of Kernel32.dll</itunes:summary>
      <itunes:subtitle>In this Black Hills Information Security (BHIS) webcast, we explore using GoLang to author malware with embedded shellcode. 



GoLang is a Google-authored modern successor language to C/C++. It is multi-platform, high performance, multi-threaded, and unl</itunes:subtitle>
      <itunes:keywords>Infosec,Cybersecurity,news</itunes:keywords>
      <itunes:explicit>No</itunes:explicit>
      <podcast:chapters url="https://share.transistor.fm/s/956dd6d5/chapters.json" type="application/json+chapters"/>
    </item>
    <item>
      <title>Talkin’ About Infosec News – 9/23/2021</title>
      <itunes:episode>1</itunes:episode>
      <podcast:episode>1</podcast:episode>
      <itunes:title>Talkin’ About Infosec News – 9/23/2021</itunes:title>
      <itunes:episodeType>full</itunes:episodeType>
      <guid isPermaLink="false">https://www.blackhillsinfosec.com/?p=19902</guid>
      <link>https://share.transistor.fm/s/3f7ed333</link>
      <description>
        <![CDATA[ORIGINALLY AIRED ON SEPTEMBER 20, 2021



Articles discussed in this episode:



00:55 – Story # 1: https://techcrunch.com/2021/09/13/apple-zero-day-nso-pegasus/ 



19:45 – Story # 2: https://www.tomshardware.com/news/researchers-find-windows-subsystem-linux-malware



27:45 – Story # 3: https://www.wsj.com/articles/u-s-to-target-crypto-ransomware-payments-with-sanctions-11631885336 



41:19 – Story # 4: https://apnews.com/article/technology-business-pakistan-seattle-washington-c6122e936e0fcc7c077becdd2559886b 



46:55 – Story # 5: https://therecord.media/us-fines-former-nsa-employees-who-provided-hacker-for-hire-services-to-uae/



Join the BHIS Community Discord: https://discord.gg/bhis



















Check out our Cyber Range, not just a place to work through challenges and play, but also an open direct/hands-on training environment.    



https://www.blackhillsinfosec.com/services/cyber-range/ 











Join the BHIS Blog Mailing List – get notified when we post new blogs, webcasts, and podcasts.



            
									
						
						Join 3,829 other subscribers						
					
					                    
                        
							Email Address                        
                        
                    

					
                        
                        
                        
                        
						                        
	                        Subscribe
<ul><li>(00:00) - BHIS - Talkin' Bout [infosec] News 2021-09-20</li>
<li>(00:55) - Story # 1: https://techcrunch.com/2021/09/13/apple-zero-day-nso-pegasus/</li>
<li>(19:45) - Story # 2: https://www.tomshardware.com/news/researchers-find-windows-subsystem-linux-malware</li>
<li>(27:45) - Story # 3: https://www.wsj.com/articles/u-s-to-target-crypto-ransomware-payments-with-sanctions-11631885336</li>
<li>(41:19) - Story # 4: https://apnews.com/article/technology-business-pakistan-seattle-washington-c6122e936e0fcc7c077becdd2559886b</li>
<li>(46:55) - Story # 5: https://therecord.media/us-fines-former-nsa-employees-who-provided-hacker-for-hire-services-to-uae/</li>
</ul>]]>
      </description>
      <content:encoded>
        <![CDATA[ORIGINALLY AIRED ON SEPTEMBER 20, 2021



Articles discussed in this episode:



00:55 – Story # 1: https://techcrunch.com/2021/09/13/apple-zero-day-nso-pegasus/ 



19:45 – Story # 2: https://www.tomshardware.com/news/researchers-find-windows-subsystem-linux-malware



27:45 – Story # 3: https://www.wsj.com/articles/u-s-to-target-crypto-ransomware-payments-with-sanctions-11631885336 



41:19 – Story # 4: https://apnews.com/article/technology-business-pakistan-seattle-washington-c6122e936e0fcc7c077becdd2559886b 



46:55 – Story # 5: https://therecord.media/us-fines-former-nsa-employees-who-provided-hacker-for-hire-services-to-uae/



Join the BHIS Community Discord: https://discord.gg/bhis



















Check out our Cyber Range, not just a place to work through challenges and play, but also an open direct/hands-on training environment.    



https://www.blackhillsinfosec.com/services/cyber-range/ 











Join the BHIS Blog Mailing List – get notified when we post new blogs, webcasts, and podcasts.



            
									
						
						Join 3,829 other subscribers						
					
					                    
                        
							Email Address                        
                        
                    

					
                        
                        
                        
                        
						                        
	                        Subscribe
<ul><li>(00:00) - BHIS - Talkin' Bout [infosec] News 2021-09-20</li>
<li>(00:55) - Story # 1: https://techcrunch.com/2021/09/13/apple-zero-day-nso-pegasus/</li>
<li>(19:45) - Story # 2: https://www.tomshardware.com/news/researchers-find-windows-subsystem-linux-malware</li>
<li>(27:45) - Story # 3: https://www.wsj.com/articles/u-s-to-target-crypto-ransomware-payments-with-sanctions-11631885336</li>
<li>(41:19) - Story # 4: https://apnews.com/article/technology-business-pakistan-seattle-washington-c6122e936e0fcc7c077becdd2559886b</li>
<li>(46:55) - Story # 5: https://therecord.media/us-fines-former-nsa-employees-who-provided-hacker-for-hire-services-to-uae/</li>
</ul>]]>
      </content:encoded>
      <pubDate>Thu, 23 Sep 2021 11:15:09 -0400</pubDate>
      <author>Black Hills Information Security</author>
      <enclosure url="https://media.transistor.fm/3f7ed333/600a18a0.mp3" length="27714587" type="audio/mpeg"/>
      <itunes:author>Black Hills Information Security</itunes:author>
      <itunes:image href="https://img.transistorcdn.com/lFaq0IHhvDXYxOMzVeSiSat45_eGcsmjZinrFKbaFPg/rs:fill:0:0:1/w:1400/h:1400/q:60/mb:500000/aHR0cHM6Ly9pbWct/dXBsb2FkLXByb2R1/Y3Rpb24udHJhbnNp/c3Rvci5mbS8zN2Ez/NzAyZjc5MzM3YTFh/OGI2ZDA5MjVkOGQ1/MGU5Yy5qcGc.jpg"/>
      <itunes:duration>3181</itunes:duration>
      <itunes:summary>ORIGINALLY AIRED ON SEPTEMBER 20, 2021



Articles discussed in this episode:



00:55 – Story # 1: https://techcrunch.com/2021/09/13/apple-zero-day-nso-pegasus/ 



19:45 – Story # 2: https://www.tomshardware.com/news/researchers-find-windows-subsystem-linux-malware



27:45 – Story # 3: https://www.wsj.com/articles/u-s-to-target-crypto-ransomware-payments-with-sanctions-11631885336 



41:19 – Story # 4: https://apnews.com/article/technology-business-pakistan-seattle-washington-c6122e936e0fcc7c077becdd2559886b 



46:55 – Story # 5: https://therecord.media/us-fines-former-nsa-employees-who-provided-hacker-for-hire-services-to-uae/



Join the BHIS Community Discord: https://discord.gg/bhis



















Check out our Cyber Range, not just a place to work through challenges and play, but also an open direct/hands-on training environment.    



https://www.blackhillsinfosec.com/services/cyber-range/ 











Join the BHIS Blog Mailing List – get notified when we post new blogs, webcasts, and podcasts.



            
									
						
						Join 3,829 other subscribers						
					
					                    
                        
							Email Address                        
                        
                    

					
                        
                        
                        
                        
						                        
	                        Subscribe</itunes:summary>
      <itunes:subtitle>ORIGINALLY AIRED ON SEPTEMBER 20, 2021



Articles discussed in this episode:



00:55 – Story # 1: https://techcrunch.com/2021/09/13/apple-zero-day-nso-pegasus/ 



19:45 – Story # 2: https://www.tomshardware.com/news/researchers-find-windows-subsystem-l</itunes:subtitle>
      <itunes:keywords>Infosec,Cybersecurity,news</itunes:keywords>
      <itunes:explicit>No</itunes:explicit>
      <podcast:chapters url="https://share.transistor.fm/s/3f7ed333/chapters.json" type="application/json+chapters"/>
    </item>
    <item>
      <title>Webcast: The Quest for the Kill Chain Killer Continues</title>
      <itunes:episode>1</itunes:episode>
      <podcast:episode>1</podcast:episode>
      <itunes:title>Webcast: The Quest for the Kill Chain Killer Continues</itunes:title>
      <itunes:episodeType>full</itunes:episodeType>
      <guid isPermaLink="false">https://www.blackhillsinfosec.com/?p=19895</guid>
      <link>https://share.transistor.fm/s/3bcef254</link>
      <description>
        <![CDATA[Jordan and Kent have heard from a lot of people that the past Black Hills Information Security (BHIS) webcasts: “Group Policies That Kill Kill Chains” and “Active Directory Best Practices to Frustrate Attackers” have changed their business models for the better. 



And since they’ve been offered the BHIS soapbox again, they thought it was time to update this material and combine it. 



Security can sometimes move slow and other times blazingly fast. They’ll discuss what they’ve seen in the past year and how it impacts their view on baseline defensive configurations you shouldn’t be operating without. 



At the end of the day, we are in this game to make things difficult for attackers, adversaries, and red teamers. We want to reduce mean time to detection. And we really want to help you make your networks and domains more secure. 



So… why not update our favorite webcasts with everything we’ve learned since giving them? 



Join the BLACK HILLS INFOSEC Discord Server — https://discord.gg/bhis 



The Kill Chains Material: https://www.blackhillsinfosec.com/webcast-group-policies-that-kill-kill-chains/



How to Frustrate Attackers Material: https://www.blackhillsinfosec.com/webcast-group-policies-that-kill-kill-chains/



Recorded•2021-05-13



00:00 – FEATURE PRESENTATION BEGINS – The Quest for the Kill Chain Killer Continues 



02:15 – What Changed in the Last Year? 



06:31 – The Kill Chain 



07:47 – Active Directory Best Practices to Frustrate Attackers 



09:22 – Pre-Reqs 



13:31 – Active Directory
<ul><li>(00:00) - FEATURE PRESENTATION BEGINS - The Quest for the Kill Chain Killer Continues</li>
<li>(02:14) - What Changed in the Last Year?</li>
<li>(06:26) - The Kill Chain</li>
<li>(07:40) - Active Directory Best Practices to Frustrate Attackers</li>
<li>(09:13) - Pre-Reqs</li>
<li>(13:21) - Active Directory</li>
<li>(16:04) - Organizational Units ^^ Policies</li>
<li>(17:35) - Layer Two Protocols</li>
<li>(20:41) - Addressing LLMNR (NBNS and WPAD too)</li>
<li>(22:50) - Unaddressing of LLMNR</li>
<li>(34:12) - Addressing NBNS</li>
<li>(34:55) - Addressing WPAD</li>
<li>(36:41) - File Shares</li>
<li>(39:24) - SMB Signing</li>
<li>(41:02) - IPv6</li>
<li>(41:53) - LDAP Channel Binding</li>
<li>(42:57) - Microsoft Store</li>
<li>(43:55) - Too Many GPOs to Cover</li>
<li>(44:40) - Dealing with Local Admins</li>
<li>(45:24) - Network Logons</li>
<li>(46:50) - Managed Service Accounts</li>
<li>(48:32) - Application Controls</li>
<li>(49:18) - Speaking of Ransomware...</li>
<li>(50:21) - Firewalls</li>
<li>(52:01) - Canary Accounts</li>
<li>(52:51) - Network Analysis</li>
<li>(54:17) - Credentials</li>
<li>(56:40) - Wrap-Up and Questions</li>
</ul>]]>
      </description>
      <content:encoded>
        <![CDATA[Jordan and Kent have heard from a lot of people that the past Black Hills Information Security (BHIS) webcasts: “Group Policies That Kill Kill Chains” and “Active Directory Best Practices to Frustrate Attackers” have changed their business models for the better. 



And since they’ve been offered the BHIS soapbox again, they thought it was time to update this material and combine it. 



Security can sometimes move slow and other times blazingly fast. They’ll discuss what they’ve seen in the past year and how it impacts their view on baseline defensive configurations you shouldn’t be operating without. 



At the end of the day, we are in this game to make things difficult for attackers, adversaries, and red teamers. We want to reduce mean time to detection. And we really want to help you make your networks and domains more secure. 



So… why not update our favorite webcasts with everything we’ve learned since giving them? 



Join the BLACK HILLS INFOSEC Discord Server — https://discord.gg/bhis 



The Kill Chains Material: https://www.blackhillsinfosec.com/webcast-group-policies-that-kill-kill-chains/



How to Frustrate Attackers Material: https://www.blackhillsinfosec.com/webcast-group-policies-that-kill-kill-chains/



Recorded•2021-05-13



00:00 – FEATURE PRESENTATION BEGINS – The Quest for the Kill Chain Killer Continues 



02:15 – What Changed in the Last Year? 



06:31 – The Kill Chain 



07:47 – Active Directory Best Practices to Frustrate Attackers 



09:22 – Pre-Reqs 



13:31 – Active Directory
<ul><li>(00:00) - FEATURE PRESENTATION BEGINS - The Quest for the Kill Chain Killer Continues</li>
<li>(02:14) - What Changed in the Last Year?</li>
<li>(06:26) - The Kill Chain</li>
<li>(07:40) - Active Directory Best Practices to Frustrate Attackers</li>
<li>(09:13) - Pre-Reqs</li>
<li>(13:21) - Active Directory</li>
<li>(16:04) - Organizational Units ^^ Policies</li>
<li>(17:35) - Layer Two Protocols</li>
<li>(20:41) - Addressing LLMNR (NBNS and WPAD too)</li>
<li>(22:50) - Unaddressing of LLMNR</li>
<li>(34:12) - Addressing NBNS</li>
<li>(34:55) - Addressing WPAD</li>
<li>(36:41) - File Shares</li>
<li>(39:24) - SMB Signing</li>
<li>(41:02) - IPv6</li>
<li>(41:53) - LDAP Channel Binding</li>
<li>(42:57) - Microsoft Store</li>
<li>(43:55) - Too Many GPOs to Cover</li>
<li>(44:40) - Dealing with Local Admins</li>
<li>(45:24) - Network Logons</li>
<li>(46:50) - Managed Service Accounts</li>
<li>(48:32) - Application Controls</li>
<li>(49:18) - Speaking of Ransomware...</li>
<li>(50:21) - Firewalls</li>
<li>(52:01) - Canary Accounts</li>
<li>(52:51) - Network Analysis</li>
<li>(54:17) - Credentials</li>
<li>(56:40) - Wrap-Up and Questions</li>
</ul>]]>
      </content:encoded>
      <pubDate>Wed, 22 Sep 2021 14:59:36 -0400</pubDate>
      <author>Black Hills Information Security</author>
      <enclosure url="https://media.transistor.fm/3bcef254/78ccc85a.mp3" length="34206402" type="audio/mpeg"/>
      <itunes:author>Black Hills Information Security</itunes:author>
      <itunes:image href="https://img.transistorcdn.com/zWK_DzxS1ZmEC6E1rMfqrilRJcgPqGwPu9nRuebHA8c/rs:fill:0:0:1/w:1400/h:1400/q:60/mb:500000/aHR0cHM6Ly9pbWct/dXBsb2FkLXByb2R1/Y3Rpb24udHJhbnNp/c3Rvci5mbS81Mjg4/ZGNlZDI2MTI1NjVh/NmE4Zjk4NGRlMTMw/ZjMwYy5qcGc.jpg"/>
      <itunes:duration>3764</itunes:duration>
      <itunes:summary>Jordan and Kent have heard from a lot of people that the past Black Hills Information Security (BHIS) webcasts: “Group Policies That Kill Kill Chains” and “Active Directory Best Practices to Frustrate Attackers” have changed their business models for the better. 



And since they’ve been offered the BHIS soapbox again, they thought it was time to update this material and combine it. 



Security can sometimes move slow and other times blazingly fast. They’ll discuss what they’ve seen in the past year and how it impacts their view on baseline defensive configurations you shouldn’t be operating without. 



At the end of the day, we are in this game to make things difficult for attackers, adversaries, and red teamers. We want to reduce mean time to detection. And we really want to help you make your networks and domains more secure. 



So… why not update our favorite webcasts with everything we’ve learned since giving them? 



Join the BLACK HILLS INFOSEC Discord Server — https://discord.gg/bhis 



The Kill Chains Material: https://www.blackhillsinfosec.com/webcast-group-policies-that-kill-kill-chains/



How to Frustrate Attackers Material: https://www.blackhillsinfosec.com/webcast-group-policies-that-kill-kill-chains/



Recorded•2021-05-13



00:00 – FEATURE PRESENTATION BEGINS – The Quest for the Kill Chain Killer Continues 



02:15 – What Changed in the Last Year? 



06:31 – The Kill Chain 



07:47 – Active Directory Best Practices to Frustrate Attackers 



09:22 – Pre-Reqs 



13:31 – Active Directory</itunes:summary>
      <itunes:subtitle>Jordan and Kent have heard from a lot of people that the past Black Hills Information Security (BHIS) webcasts: “Group Policies That Kill Kill Chains” and “Active Directory Best Practices to Frustrate Attackers” have changed their business models for the </itunes:subtitle>
      <itunes:keywords>Infosec,Cybersecurity,news</itunes:keywords>
      <itunes:explicit>No</itunes:explicit>
      <podcast:chapters url="https://share.transistor.fm/s/3bcef254/chapters.json" type="application/json+chapters"/>
    </item>
    <item>
      <title>Talkin’ About Infosec News – 9/17/2021</title>
      <itunes:episode>1</itunes:episode>
      <podcast:episode>1</podcast:episode>
      <itunes:title>Talkin’ About Infosec News – 9/17/2021</itunes:title>
      <itunes:episodeType>full</itunes:episodeType>
      <guid isPermaLink="false">https://www.blackhillsinfosec.com/?p=19850</guid>
      <link>https://share.transistor.fm/s/7b7efe7f</link>
      <description>
        <![CDATA[ORIGINALLY AIRED ON SEPTEMBER 13, 2021



Articles discussed in this episode:



00:00 – BHIS – Talkin’ Bout [infosec] News 2021-09-13 



02:59 – Story # 1: https://cyberworkx.in/2021/08/31/authentication-bypass-vulnerability-in-exchange-server/



04:43 – Story # 1b: https://techcommunity.microsoft.com/t5/exchange-team-blog/how-to-update-ad-schema-to-address-cve-2021-34470-if-exchange-is/ba-p/2617083 



07:22 – Story # 2: https://cyberworkx.in/2021/09/08/microsoft-warns-of-new-zeroday-vulnerability-hunting-down-windows-users/ 



13:16 – Story # 3: https://therecord.media/ghostscript-zero-day-allows-full-server-compromises/ 



17:28 – Story # 3b: https://xkcd.com/2347/ 



22:03 – Story # 4: https://jfrog.com/blog/critical-vulnerability-in-haproxy-cve-2021-40346-integer-overflow-enables-http-smuggling/ 



30:15 – Story # 5: https://venturebeat.com/2021/09/11/8-orgs-with-web-apps-for-file-uploads-have-adequate-cybersecurity/ 



33:21 – Story # 5b: https://stackoverflow.com/questions/1732348/regex-match-open-tags-except-xhtml-self-contained-tags/1732454#1732454 



34:15 – Story # 6: https://www.bleepingcomputer.com/news/security/hackers-leak-passwords-for-500-000-fortinet-vpn-accounts/ 



39:32 – Story # 7: https://www.bleepingcomputer.com/news/security/revil-ransomwares-servers-mysteriously-come-back-online/



















Check out our Cyber Range, not just a place to work through challenges and play, but also an open direct/hands-on training environment.    



https://www.blackhillsinfosec.com/services/cyber-range/
<ul><li>(00:00) - BHIS - Talkin' Bout [infosec] News 2021-09-13</li>
<li>(02:59) - Story # 1: https://cyberworkx.in/2021/08/31/authentication-bypass-vulnerability-in-exchange-server/</li>
<li>(04:43) - Story # 1b: https://techcommunity.microsoft.com/t5/exchange-team-blog/how-to-update-ad-schema-to-address-cve-2021-34470-if-exchange-is/ba-p/2617083</li>
<li>(07:22) - Story # 2: https://cyberworkx.in/2021/09/08/microsoft-warns-of-new-zeroday-vulnerability-hunting-down-windows-users/</li>
<li>(13:16) - Story # 3: https://therecord.media/ghostscript-zero-day-allows-full-server-compromises/</li>
<li>(17:28) - Story # 3b: https://xkcd.com/2347/</li>
<li>(22:03) - Story # 4: https://jfrog.com/blog/critical-vulnerability-in-haproxy-cve-2021-40346-integer-overflow-enables-http-smuggling/</li>
<li>(30:15) - Story # 5: https://venturebeat.com/2021/09/11/8-orgs-with-web-apps-for-file-uploads-have-adequate-cybersecurity/</li>
<li>(33:21) - Story # 5b: https://stackoverflow.com/questions/1732348/regex-match-open-tags-except-xhtml-self-contained-tags/1732454#1732454</li>
<li>(34:15) - Story # 6: https://www.bleepingcomputer.com/news/security/hackers-leak-passwords-for-500-000-fortinet-vpn-accounts/</li>
<li>(39:32) - Story # 7: https://www.bleepingcomputer.com/news/security/revil-ransomwares-servers-mysteriously-come-back-online/</li>
</ul>]]>
      </description>
      <content:encoded>
        <![CDATA[ORIGINALLY AIRED ON SEPTEMBER 13, 2021



Articles discussed in this episode:



00:00 – BHIS – Talkin’ Bout [infosec] News 2021-09-13 



02:59 – Story # 1: https://cyberworkx.in/2021/08/31/authentication-bypass-vulnerability-in-exchange-server/



04:43 – Story # 1b: https://techcommunity.microsoft.com/t5/exchange-team-blog/how-to-update-ad-schema-to-address-cve-2021-34470-if-exchange-is/ba-p/2617083 



07:22 – Story # 2: https://cyberworkx.in/2021/09/08/microsoft-warns-of-new-zeroday-vulnerability-hunting-down-windows-users/ 



13:16 – Story # 3: https://therecord.media/ghostscript-zero-day-allows-full-server-compromises/ 



17:28 – Story # 3b: https://xkcd.com/2347/ 



22:03 – Story # 4: https://jfrog.com/blog/critical-vulnerability-in-haproxy-cve-2021-40346-integer-overflow-enables-http-smuggling/ 



30:15 – Story # 5: https://venturebeat.com/2021/09/11/8-orgs-with-web-apps-for-file-uploads-have-adequate-cybersecurity/ 



33:21 – Story # 5b: https://stackoverflow.com/questions/1732348/regex-match-open-tags-except-xhtml-self-contained-tags/1732454#1732454 



34:15 – Story # 6: https://www.bleepingcomputer.com/news/security/hackers-leak-passwords-for-500-000-fortinet-vpn-accounts/ 



39:32 – Story # 7: https://www.bleepingcomputer.com/news/security/revil-ransomwares-servers-mysteriously-come-back-online/



















Check out our Cyber Range, not just a place to work through challenges and play, but also an open direct/hands-on training environment.    



https://www.blackhillsinfosec.com/services/cyber-range/
<ul><li>(00:00) - BHIS - Talkin' Bout [infosec] News 2021-09-13</li>
<li>(02:59) - Story # 1: https://cyberworkx.in/2021/08/31/authentication-bypass-vulnerability-in-exchange-server/</li>
<li>(04:43) - Story # 1b: https://techcommunity.microsoft.com/t5/exchange-team-blog/how-to-update-ad-schema-to-address-cve-2021-34470-if-exchange-is/ba-p/2617083</li>
<li>(07:22) - Story # 2: https://cyberworkx.in/2021/09/08/microsoft-warns-of-new-zeroday-vulnerability-hunting-down-windows-users/</li>
<li>(13:16) - Story # 3: https://therecord.media/ghostscript-zero-day-allows-full-server-compromises/</li>
<li>(17:28) - Story # 3b: https://xkcd.com/2347/</li>
<li>(22:03) - Story # 4: https://jfrog.com/blog/critical-vulnerability-in-haproxy-cve-2021-40346-integer-overflow-enables-http-smuggling/</li>
<li>(30:15) - Story # 5: https://venturebeat.com/2021/09/11/8-orgs-with-web-apps-for-file-uploads-have-adequate-cybersecurity/</li>
<li>(33:21) - Story # 5b: https://stackoverflow.com/questions/1732348/regex-match-open-tags-except-xhtml-self-contained-tags/1732454#1732454</li>
<li>(34:15) - Story # 6: https://www.bleepingcomputer.com/news/security/hackers-leak-passwords-for-500-000-fortinet-vpn-accounts/</li>
<li>(39:32) - Story # 7: https://www.bleepingcomputer.com/news/security/revil-ransomwares-servers-mysteriously-come-back-online/</li>
</ul>]]>
      </content:encoded>
      <pubDate>Fri, 17 Sep 2021 14:09:26 -0400</pubDate>
      <author>Black Hills Information Security</author>
      <enclosure url="https://media.transistor.fm/7b7efe7f/22a4b34b.mp3" length="24350350" type="audio/mpeg"/>
      <itunes:author>Black Hills Information Security</itunes:author>
      <itunes:image href="https://img.transistorcdn.com/H1IuAqkmtuXQguEJb4zl2jiR02J6Yx_wedgoGDwatlE/rs:fill:0:0:1/w:1400/h:1400/q:60/mb:500000/aHR0cHM6Ly9pbWct/dXBsb2FkLXByb2R1/Y3Rpb24udHJhbnNp/c3Rvci5mbS8wNzI0/MjBjMTkwYTRiMzE2/YzlhYmY4MjcxZTIz/NzUwMy5qcGc.jpg"/>
      <itunes:duration>2709</itunes:duration>
      <itunes:summary>ORIGINALLY AIRED ON SEPTEMBER 13, 2021



Articles discussed in this episode:



00:00 – BHIS – Talkin’ Bout [infosec] News 2021-09-13 



02:59 – Story # 1: https://cyberworkx.in/2021/08/31/authentication-bypass-vulnerability-in-exchange-server/



04:43 – Story # 1b: https://techcommunity.microsoft.com/t5/exchange-team-blog/how-to-update-ad-schema-to-address-cve-2021-34470-if-exchange-is/ba-p/2617083 



07:22 – Story # 2: https://cyberworkx.in/2021/09/08/microsoft-warns-of-new-zeroday-vulnerability-hunting-down-windows-users/ 



13:16 – Story # 3: https://therecord.media/ghostscript-zero-day-allows-full-server-compromises/ 



17:28 – Story # 3b: https://xkcd.com/2347/ 



22:03 – Story # 4: https://jfrog.com/blog/critical-vulnerability-in-haproxy-cve-2021-40346-integer-overflow-enables-http-smuggling/ 



30:15 – Story # 5: https://venturebeat.com/2021/09/11/8-orgs-with-web-apps-for-file-uploads-have-adequate-cybersecurity/ 



33:21 – Story # 5b: https://stackoverflow.com/questions/1732348/regex-match-open-tags-except-xhtml-self-contained-tags/1732454#1732454 



34:15 – Story # 6: https://www.bleepingcomputer.com/news/security/hackers-leak-passwords-for-500-000-fortinet-vpn-accounts/ 



39:32 – Story # 7: https://www.bleepingcomputer.com/news/security/revil-ransomwares-servers-mysteriously-come-back-online/



















Check out our Cyber Range, not just a place to work through challenges and play, but also an open direct/hands-on training environment.    



https://www.blackhillsinfosec.com/services/cyber-range/</itunes:summary>
      <itunes:subtitle>ORIGINALLY AIRED ON SEPTEMBER 13, 2021



Articles discussed in this episode:



00:00 – BHIS – Talkin’ Bout [infosec] News 2021-09-13 



02:59 – Story # 1: https://cyberworkx.in/2021/08/31/authentication-bypass-vulnerability-in-exchange-server/



04:43</itunes:subtitle>
      <itunes:keywords>Infosec,Cybersecurity,news</itunes:keywords>
      <itunes:explicit>No</itunes:explicit>
      <podcast:chapters url="https://share.transistor.fm/s/7b7efe7f/chapters.json" type="application/json+chapters"/>
    </item>
    <item>
      <title>Webcast: Getting Started in Blockchain Security and Smart Contract Auditing</title>
      <itunes:episode>1</itunes:episode>
      <podcast:episode>1</podcast:episode>
      <itunes:title>Webcast: Getting Started in Blockchain Security and Smart Contract Auditing</itunes:title>
      <itunes:episodeType>full</itunes:episodeType>
      <guid isPermaLink="false">https://www.blackhillsinfosec.com/?p=19802</guid>
      <link>https://share.transistor.fm/s/26074b0a</link>
      <description>
        <![CDATA[Why is blockchain security important?



Blockchain usage has exploded since the Bitcoin whitepaper was first published in 2008. Many applications rely on this technology for increased trust and privacy, where they would otherwise be absent from a centralized system.



The ecosystem surrounding blockchain technology is large, complex, and has many moving pieces. Exchanges exist where users can transact various cryptocurrencies, NFTs, and tokens. Smart contracts can be written to programmatically apply behavior to blockchain transactions. Decentralized Finance (DeFi) markets exist where users can swap tokens without needing to sign up for an account.



All of these pieces are prone to vulnerabilities, and with blockchain being at the forefront of emerging technology, new issues are being found daily.



In this Black Hills Information Security (BHIS) webcast, we’ll use case studies about recent blockchain hacks to introduce the underlying issues that occur in writing/engineering smart contracts that have ultimately lead to the loss of millions of dollars to attackers.



Join us on the BLACK HILLS INFOSEC Discord channel for discussion and interaction with the community — https://discord.gg/bhis



0:00:00 – PreShow Banter™ — Beau Has a Fan Club 



0:32:39 – FEATURE PRESENTATION: Getting Started in Blockchain Security and Smart Contract Auditing 



0:36:39 – Roadmap 



0:37:51 – Why Blockchain Security 



0:39:21 – Growing Use Cases for Blockchain 



0:43:23 – Blockchain Elements That Need Securing 



0:49:00 – What Are Smart Contracts 



0:51:22 – EVM : Ethereum Virtual Machine 



0:54:00 – Solidity 



0:59:55 – Smart Contract Vulns 



1:04:00 – Reentrancy 



1:05:54 – Front-Running 



1:07:41 – Inter Overflow and Underflow
<ul><li>(00:00) - PreShow Banter™ — Beau Has a Fan Club</li>
<li>(32:39) - FEATURE PRESENTATION: Getting Started in Blockchain Security and Smart Contract Auditing</li>
<li>(36:39) - Roadmap</li>
<li>(37:51) - Why Blockchain Security</li>
<li>(39:21) - Growing Use Cases for Blockchain</li>
<li>(43:23) - Blockchain Elements That Need Securing</li>
<li>(49:00) - What Are Smart Contracts</li>
<li>(51:22) - EVM : Ethereum Virtual Machine</li>
<li>(54:00) - Solidity</li>
<li>(59:53) - Smart Contract Vulns</li>
<li>(01:03:59) - – Reentrancy</li>
<li>(01:05:52) - – Front-Running</li>
<li>(01:07:39) - – Inter Overflow and Underflow</li>
<li>(01:09:10) - – Denial-of-Service</li>
<li>(01:10:38) - – Access Control</li>
<li>(01:12:41) - – Timestamp Dependence</li>
<li>(01:15:17) - Case Studies – Uranium Finance Hack</li>
<li>(01:17:21) - – Poly Network Hack</li>
<li>(01:21:02) - – Cream Finance Hack</li>
<li>(01:24:37) - DEMO: Live Exploit</li>
<li>(01:35:10) - Exploit Recap</li>
<li>(01:35:40) - Security Tools – VS Code + Solidity Visual Developer</li>
<li>(01:36:35) - – Slither</li>
<li>(01:36:53) - – Mythril &amp; MythX</li>
<li>(01:37:23) - Get-Started Resources</li>
<li>(01:38:30) - Bug Bounties</li>
<li>(01:38:46) - Key Takeaways</li>
<li>(01:39:56) - This is the End – Q &amp; A</li>
</ul>]]>
      </description>
      <content:encoded>
        <![CDATA[Why is blockchain security important?



Blockchain usage has exploded since the Bitcoin whitepaper was first published in 2008. Many applications rely on this technology for increased trust and privacy, where they would otherwise be absent from a centralized system.



The ecosystem surrounding blockchain technology is large, complex, and has many moving pieces. Exchanges exist where users can transact various cryptocurrencies, NFTs, and tokens. Smart contracts can be written to programmatically apply behavior to blockchain transactions. Decentralized Finance (DeFi) markets exist where users can swap tokens without needing to sign up for an account.



All of these pieces are prone to vulnerabilities, and with blockchain being at the forefront of emerging technology, new issues are being found daily.



In this Black Hills Information Security (BHIS) webcast, we’ll use case studies about recent blockchain hacks to introduce the underlying issues that occur in writing/engineering smart contracts that have ultimately lead to the loss of millions of dollars to attackers.



Join us on the BLACK HILLS INFOSEC Discord channel for discussion and interaction with the community — https://discord.gg/bhis



0:00:00 – PreShow Banter™ — Beau Has a Fan Club 



0:32:39 – FEATURE PRESENTATION: Getting Started in Blockchain Security and Smart Contract Auditing 



0:36:39 – Roadmap 



0:37:51 – Why Blockchain Security 



0:39:21 – Growing Use Cases for Blockchain 



0:43:23 – Blockchain Elements That Need Securing 



0:49:00 – What Are Smart Contracts 



0:51:22 – EVM : Ethereum Virtual Machine 



0:54:00 – Solidity 



0:59:55 – Smart Contract Vulns 



1:04:00 – Reentrancy 



1:05:54 – Front-Running 



1:07:41 – Inter Overflow and Underflow
<ul><li>(00:00) - PreShow Banter™ — Beau Has a Fan Club</li>
<li>(32:39) - FEATURE PRESENTATION: Getting Started in Blockchain Security and Smart Contract Auditing</li>
<li>(36:39) - Roadmap</li>
<li>(37:51) - Why Blockchain Security</li>
<li>(39:21) - Growing Use Cases for Blockchain</li>
<li>(43:23) - Blockchain Elements That Need Securing</li>
<li>(49:00) - What Are Smart Contracts</li>
<li>(51:22) - EVM : Ethereum Virtual Machine</li>
<li>(54:00) - Solidity</li>
<li>(59:53) - Smart Contract Vulns</li>
<li>(01:03:59) - – Reentrancy</li>
<li>(01:05:52) - – Front-Running</li>
<li>(01:07:39) - – Inter Overflow and Underflow</li>
<li>(01:09:10) - – Denial-of-Service</li>
<li>(01:10:38) - – Access Control</li>
<li>(01:12:41) - – Timestamp Dependence</li>
<li>(01:15:17) - Case Studies – Uranium Finance Hack</li>
<li>(01:17:21) - – Poly Network Hack</li>
<li>(01:21:02) - – Cream Finance Hack</li>
<li>(01:24:37) - DEMO: Live Exploit</li>
<li>(01:35:10) - Exploit Recap</li>
<li>(01:35:40) - Security Tools – VS Code + Solidity Visual Developer</li>
<li>(01:36:35) - – Slither</li>
<li>(01:36:53) - – Mythril &amp; MythX</li>
<li>(01:37:23) - Get-Started Resources</li>
<li>(01:38:30) - Bug Bounties</li>
<li>(01:38:46) - Key Takeaways</li>
<li>(01:39:56) - This is the End – Q &amp; A</li>
</ul>]]>
      </content:encoded>
      <pubDate>Thu, 16 Sep 2021 08:37:11 -0400</pubDate>
      <author>Black Hills Information Security</author>
      <enclosure url="https://media.transistor.fm/26074b0a/8763eff6.mp3" length="57558163" type="audio/mpeg"/>
      <itunes:author>Black Hills Information Security</itunes:author>
      <itunes:image href="https://img.transistorcdn.com/rxMW6u_DUVN4zUKAolKFJOOwERuW-Bq5Vc0bn8T2YX8/rs:fill:0:0:1/w:1400/h:1400/q:60/mb:500000/aHR0cHM6Ly9pbWct/dXBsb2FkLXByb2R1/Y3Rpb24udHJhbnNp/c3Rvci5mbS82MDI2/YmFmZjQwZmE3ODll/MWFlN2YxODYyODU2/YzkyNC5qcGc.jpg"/>
      <itunes:duration>6657</itunes:duration>
      <itunes:summary>Why is blockchain security important?



Blockchain usage has exploded since the Bitcoin whitepaper was first published in 2008. Many applications rely on this technology for increased trust and privacy, where they would otherwise be absent from a centralized system.



The ecosystem surrounding blockchain technology is large, complex, and has many moving pieces. Exchanges exist where users can transact various cryptocurrencies, NFTs, and tokens. Smart contracts can be written to programmatically apply behavior to blockchain transactions. Decentralized Finance (DeFi) markets exist where users can swap tokens without needing to sign up for an account.



All of these pieces are prone to vulnerabilities, and with blockchain being at the forefront of emerging technology, new issues are being found daily.



In this Black Hills Information Security (BHIS) webcast, we’ll use case studies about recent blockchain hacks to introduce the underlying issues that occur in writing/engineering smart contracts that have ultimately lead to the loss of millions of dollars to attackers.



Join us on the BLACK HILLS INFOSEC Discord channel for discussion and interaction with the community — https://discord.gg/bhis



0:00:00 – PreShow Banter™ — Beau Has a Fan Club 



0:32:39 – FEATURE PRESENTATION: Getting Started in Blockchain Security and Smart Contract Auditing 



0:36:39 – Roadmap 



0:37:51 – Why Blockchain Security 



0:39:21 – Growing Use Cases for Blockchain 



0:43:23 – Blockchain Elements That Need Securing 



0:49:00 – What Are Smart Contracts 



0:51:22 – EVM : Ethereum Virtual Machine 



0:54:00 – Solidity 



0:59:55 – Smart Contract Vulns 



1:04:00 – Reentrancy 



1:05:54 – Front-Running 



1:07:41 – Inter Overflow and Underflow</itunes:summary>
      <itunes:subtitle>Why is blockchain security important?



Blockchain usage has exploded since the Bitcoin whitepaper was first published in 2008. Many applications rely on this technology for increased trust and privacy, where they would otherwise be absent from a central</itunes:subtitle>
      <itunes:keywords>Infosec,Cybersecurity,news</itunes:keywords>
      <itunes:explicit>No</itunes:explicit>
      <podcast:chapters url="https://share.transistor.fm/s/26074b0a/chapters.json" type="application/json+chapters"/>
    </item>
    <item>
      <title>Talkin’ About Infosec News – 9/9/2021</title>
      <itunes:episode>1</itunes:episode>
      <podcast:episode>1</podcast:episode>
      <itunes:title>Talkin’ About Infosec News – 9/9/2021</itunes:title>
      <itunes:episodeType>full</itunes:episodeType>
      <guid isPermaLink="false">https://www.blackhillsinfosec.com/?p=19654</guid>
      <link>https://share.transistor.fm/s/bf491cce</link>
      <description>
        <![CDATA[ORIGINALLY AIRED ON SEPTEMBER 7, 2021



Articles discussed in this episode:



02:14 – Story # 1: https://therecord.media/chinese-hackers-behind-july-2021-solarwinds-zero-day-attacks



06:17 – Story # 2: https://www.secureworld.io/industry-news/ciso-lawsuit-solarwinds



08:30 – Story # 3: https://taskandpurpose.com/news/air-force-cybersecurity-nicolas-chaillan/



10:29 – Story # 3b: https://www.linkedin.com/pulse/time-say-goodbye-nicolas-m-chaillan/



13:20 – Story # 4: https://venturebeat.com/2021/09/02/the-cybersecurity-industry-is-burning-and-vcs-dont-care/



18:03 – Story # 5: https://www.theregister.com/2021/09/03/how_to_be_a_ransomware/



24:38 – Story # 6: https://www.bleepingcomputer.com/news/security/over-60-000-parked-domains-were-vulnerable-to-aws-hijacking/



28:30 – Story # 7: https://www.zdnet.com/article/fbi-warns-of-ransomware-attacks-targeting-food-and-agriculture-sector-as-white-house-pushes-for-proactive-measures/



33:20 – Story # 7b: https://twitter.com/vxunderground/status/1435306913038745612



34:16 – Story # 7c: https://twitter.com/vxunderground/status/1433758742244478982



37:29 – Story # 8: https://cyberworkx.in/2021/09/06/russian-mobile-comes-with-preinstalled-malware/



38:26 – Story # 9: https://krebsonsecurity.com/2021/09/gift-card-gang-extracts-cash-from-100k-inboxes-daily/



45:31 – Story # 10: https://www.bleepingcomputer.com/news/security/mcdonalds-leaks-password-for-monopoly-vip-database-to-winners/
<ul><li>(00:00) - BHIS - Talkin' Bout [infosec] News 2021-09-07</li>
<li>(02:14) - Story # 1: https://therecord.media/chinese-hackers-behind-july-2021-solarwinds-zero-day-attacks/</li>
<li>(06:17) - Story # 2: https://www.secureworld.io/industry-news/ciso-lawsuit-solarwinds</li>
<li>(08:30) - Story # 3: https://taskandpurpose.com/news/air-force-cybersecurity-nicolas-chaillan/</li>
<li>(10:29) - Story # 3b: https://www.linkedin.com/pulse/time-say-goodbye-nicolas-m-chaillan/</li>
<li>(13:20) - Story # 4: https://venturebeat.com/2021/09/02/the-cybersecurity-industry-is-burning-and-vcs-dont-care/</li>
<li>(18:03) - Story # 5: https://www.theregister.com/2021/09/03/how_to_be_a_ransomware/</li>
<li>(24:38) - Story # 6: https://www.bleepingcomputer.com/news/security/over-60-000-parked-domains-were-vulnerable-to-aws-hijacking/</li>
<li>(28:30) - Story # 7: https://www.zdnet.com/article/fbi-warns-of-ransomware-attacks-targeting-food-and-agriculture-sector-as-white-house-pushes-for-proactive-measures/</li>
<li>(33:20) - Story # 7b: https://twitter.com/vxunderground/status/1435306913038745612</li>
<li>(34:16) - Story # 7c: https://twitter.com/vxunderground/status/1433758742244478982</li>
<li>(37:29) - Story # 8: https://cyberworkx.in/2021/09/06/russian-mobile-comes-with-preinstalled-malware/</li>
<li>(38:26) - Story # 9: https://krebsonsecurity.com/2021/09/gift-card-gang-extracts-cash-from-100k-inboxes-daily/</li>
<li>(45:31) - Story # 10: https://www.bleepingcomputer.com/news/security/mcdonalds-leaks-password-for-monopoly-vip-database-to-winners/</li>
</ul>]]>
      </description>
      <content:encoded>
        <![CDATA[ORIGINALLY AIRED ON SEPTEMBER 7, 2021



Articles discussed in this episode:



02:14 – Story # 1: https://therecord.media/chinese-hackers-behind-july-2021-solarwinds-zero-day-attacks



06:17 – Story # 2: https://www.secureworld.io/industry-news/ciso-lawsuit-solarwinds



08:30 – Story # 3: https://taskandpurpose.com/news/air-force-cybersecurity-nicolas-chaillan/



10:29 – Story # 3b: https://www.linkedin.com/pulse/time-say-goodbye-nicolas-m-chaillan/



13:20 – Story # 4: https://venturebeat.com/2021/09/02/the-cybersecurity-industry-is-burning-and-vcs-dont-care/



18:03 – Story # 5: https://www.theregister.com/2021/09/03/how_to_be_a_ransomware/



24:38 – Story # 6: https://www.bleepingcomputer.com/news/security/over-60-000-parked-domains-were-vulnerable-to-aws-hijacking/



28:30 – Story # 7: https://www.zdnet.com/article/fbi-warns-of-ransomware-attacks-targeting-food-and-agriculture-sector-as-white-house-pushes-for-proactive-measures/



33:20 – Story # 7b: https://twitter.com/vxunderground/status/1435306913038745612



34:16 – Story # 7c: https://twitter.com/vxunderground/status/1433758742244478982



37:29 – Story # 8: https://cyberworkx.in/2021/09/06/russian-mobile-comes-with-preinstalled-malware/



38:26 – Story # 9: https://krebsonsecurity.com/2021/09/gift-card-gang-extracts-cash-from-100k-inboxes-daily/



45:31 – Story # 10: https://www.bleepingcomputer.com/news/security/mcdonalds-leaks-password-for-monopoly-vip-database-to-winners/
<ul><li>(00:00) - BHIS - Talkin' Bout [infosec] News 2021-09-07</li>
<li>(02:14) - Story # 1: https://therecord.media/chinese-hackers-behind-july-2021-solarwinds-zero-day-attacks/</li>
<li>(06:17) - Story # 2: https://www.secureworld.io/industry-news/ciso-lawsuit-solarwinds</li>
<li>(08:30) - Story # 3: https://taskandpurpose.com/news/air-force-cybersecurity-nicolas-chaillan/</li>
<li>(10:29) - Story # 3b: https://www.linkedin.com/pulse/time-say-goodbye-nicolas-m-chaillan/</li>
<li>(13:20) - Story # 4: https://venturebeat.com/2021/09/02/the-cybersecurity-industry-is-burning-and-vcs-dont-care/</li>
<li>(18:03) - Story # 5: https://www.theregister.com/2021/09/03/how_to_be_a_ransomware/</li>
<li>(24:38) - Story # 6: https://www.bleepingcomputer.com/news/security/over-60-000-parked-domains-were-vulnerable-to-aws-hijacking/</li>
<li>(28:30) - Story # 7: https://www.zdnet.com/article/fbi-warns-of-ransomware-attacks-targeting-food-and-agriculture-sector-as-white-house-pushes-for-proactive-measures/</li>
<li>(33:20) - Story # 7b: https://twitter.com/vxunderground/status/1435306913038745612</li>
<li>(34:16) - Story # 7c: https://twitter.com/vxunderground/status/1433758742244478982</li>
<li>(37:29) - Story # 8: https://cyberworkx.in/2021/09/06/russian-mobile-comes-with-preinstalled-malware/</li>
<li>(38:26) - Story # 9: https://krebsonsecurity.com/2021/09/gift-card-gang-extracts-cash-from-100k-inboxes-daily/</li>
<li>(45:31) - Story # 10: https://www.bleepingcomputer.com/news/security/mcdonalds-leaks-password-for-monopoly-vip-database-to-winners/</li>
</ul>]]>
      </content:encoded>
      <pubDate>Thu, 09 Sep 2021 15:04:17 -0400</pubDate>
      <author>Black Hills Information Security</author>
      <enclosure url="https://media.transistor.fm/bf491cce/9872a094.mp3" length="49787948" type="audio/mpeg"/>
      <itunes:author>Black Hills Information Security</itunes:author>
      <itunes:image href="https://img.transistorcdn.com/wj6jvkFg7VSCJZBEsSfomAJQMtFNC80FbN_eWg6meLg/rs:fill:0:0:1/w:1400/h:1400/q:60/mb:500000/aHR0cHM6Ly9pbWct/dXBsb2FkLXByb2R1/Y3Rpb24udHJhbnNp/c3Rvci5mbS8zNzQ3/N2ZkMjExMjVjYjFk/MTQ0NzQyNTcyOWIz/OTA5Yy5qcGc.jpg"/>
      <itunes:duration>2950</itunes:duration>
      <itunes:summary>ORIGINALLY AIRED ON SEPTEMBER 7, 2021



Articles discussed in this episode:



02:14 – Story # 1: https://therecord.media/chinese-hackers-behind-july-2021-solarwinds-zero-day-attacks



06:17 – Story # 2: https://www.secureworld.io/industry-news/ciso-lawsuit-solarwinds



08:30 – Story # 3: https://taskandpurpose.com/news/air-force-cybersecurity-nicolas-chaillan/



10:29 – Story # 3b: https://www.linkedin.com/pulse/time-say-goodbye-nicolas-m-chaillan/



13:20 – Story # 4: https://venturebeat.com/2021/09/02/the-cybersecurity-industry-is-burning-and-vcs-dont-care/



18:03 – Story # 5: https://www.theregister.com/2021/09/03/how_to_be_a_ransomware/



24:38 – Story # 6: https://www.bleepingcomputer.com/news/security/over-60-000-parked-domains-were-vulnerable-to-aws-hijacking/



28:30 – Story # 7: https://www.zdnet.com/article/fbi-warns-of-ransomware-attacks-targeting-food-and-agriculture-sector-as-white-house-pushes-for-proactive-measures/



33:20 – Story # 7b: https://twitter.com/vxunderground/status/1435306913038745612



34:16 – Story # 7c: https://twitter.com/vxunderground/status/1433758742244478982



37:29 – Story # 8: https://cyberworkx.in/2021/09/06/russian-mobile-comes-with-preinstalled-malware/



38:26 – Story # 9: https://krebsonsecurity.com/2021/09/gift-card-gang-extracts-cash-from-100k-inboxes-daily/



45:31 – Story # 10: https://www.bleepingcomputer.com/news/security/mcdonalds-leaks-password-for-monopoly-vip-database-to-winners/</itunes:summary>
      <itunes:subtitle>ORIGINALLY AIRED ON SEPTEMBER 7, 2021



Articles discussed in this episode:



02:14 – Story # 1: https://therecord.media/chinese-hackers-behind-july-2021-solarwinds-zero-day-attacks



06:17 – Story # 2: https://www.secureworld.io/industry-news/ciso-law</itunes:subtitle>
      <itunes:keywords>Infosec,Cybersecurity,news</itunes:keywords>
      <itunes:explicit>No</itunes:explicit>
      <podcast:chapters url="https://share.transistor.fm/s/bf491cce/chapters.json" type="application/json+chapters"/>
    </item>
    <item>
      <title>Talkin’ About Infosec News – 9/3/2021</title>
      <itunes:episode>1</itunes:episode>
      <podcast:episode>1</podcast:episode>
      <itunes:title>Talkin’ About Infosec News – 9/3/2021</itunes:title>
      <itunes:episodeType>full</itunes:episodeType>
      <guid isPermaLink="false">https://www.blackhillsinfosec.com/?p=19649</guid>
      <link>https://share.transistor.fm/s/a68a4f10</link>
      <description>
        <![CDATA[ORIGINALLY AIRED ON AUGUST 30, 2021



Articles discussed in this episode:



01:38 – Story # 1: https://carbuzz.com/news/tom-cruise-couldnt-stop-thieves-stealing-his-bmw-7-series



14:45 – Story # 2: https://www.vice.com/en/article/jg84yy/data-brokers-netflow-data-team-cymru



23:24 – Story # 3: https://www.reuters.com/technology/exclusive-microsoft-warns-thousands-cloud-customers-exposed-databases-emails-2021-08-26/



27:37 – Story # 4: https://cyberworkx.in/2021/08/28/five-different-malware-families-targeting-pulse-secure-devices/



33:08 – Story # 5: https://www.techradar.com/news/microsoft-warns-of-elaborate-new-cybercrime-scheme-to-steal-your-login-details



36:36 – Story # 6: https://twitter.com/EdClowes/status/1430083273015840776?s=19



39:43 – Story # 7: https://www.theregister.com/2021/08/26/qurium_bright_data_philippines_ddos/



46:18 – Story # 8: https://www.foxbusiness.com/technology/florida-woman-fired-rampage-company-computer-system



50:22 – Story # 9: https://www.nextgov.com/cybersecurity/2021/08/white-house-tasks-nist-producing-another-cybersecurity-framework/184868/



















Check out our Cyber Range, not just a place to work through challenges and play, but also an open direct/hands-on training environment.    



https://www.blackhillsinfosec.com/services/cyber-range/ 











Join the BHIS Blog Mailing List – get notified when we post new blogs, webcasts, and podcasts.



            
									
						
						Join 3,809 other subscribers						
					
					                    
                        
							Email Address
<ul><li>(00:00) - BHIS - Talkin' Bout [infosec] News 2021-08-30</li>
<li>(01:38) - Story # 1: https://carbuzz.com/news/tom-cruise-couldnt-stop-thieves-stealing-his-bmw-7-series</li>
<li>(14:45) - Story # 2: https://www.vice.com/en/article/jg84yy/data-brokers-netflow-data-team-cymru</li>
<li>(23:24) - Story # 3: https://www.reuters.com/technology/exclusive-microsoft-warns-thousands-cloud-customers-exposed-databases-emails-2021-08-26/</li>
<li>(27:37) - Story # 4: https://cyberworkx.in/2021/08/28/five-different-malware-families-targeting-pulse-secure-devices/](https://cyberworkx.in/2021/08/28/five-different-malware-families-targeting-pulse-secure-devices/)</li>
<li>(33:08) - Story # 5: https://www.techradar.com/news/microsoft-warns-of-elaborate-new-cybercrime-scheme-to-steal-your-login-details</li>
<li>(36:36) - Story # 6: https://twitter.com/EdClowes/status/1430083273015840776?s=19</li>
<li>(39:43) - Story # 7: https://www.theregister.com/2021/08/26/qurium_bright_data_philippines_ddos/</li>
<li>(46:18) - Story # 8: https://www.foxbusiness.com/technology/florida-woman-fired-rampage-company-computer-system</li>
<li>(50:22) - Story # 9: https://www.nextgov.com/cybersecurity/2021/08/white-house-tasks-nist-producing-another-cybersecurity-framework/184868/</li>
</ul>]]>
      </description>
      <content:encoded>
        <![CDATA[ORIGINALLY AIRED ON AUGUST 30, 2021



Articles discussed in this episode:



01:38 – Story # 1: https://carbuzz.com/news/tom-cruise-couldnt-stop-thieves-stealing-his-bmw-7-series



14:45 – Story # 2: https://www.vice.com/en/article/jg84yy/data-brokers-netflow-data-team-cymru



23:24 – Story # 3: https://www.reuters.com/technology/exclusive-microsoft-warns-thousands-cloud-customers-exposed-databases-emails-2021-08-26/



27:37 – Story # 4: https://cyberworkx.in/2021/08/28/five-different-malware-families-targeting-pulse-secure-devices/



33:08 – Story # 5: https://www.techradar.com/news/microsoft-warns-of-elaborate-new-cybercrime-scheme-to-steal-your-login-details



36:36 – Story # 6: https://twitter.com/EdClowes/status/1430083273015840776?s=19



39:43 – Story # 7: https://www.theregister.com/2021/08/26/qurium_bright_data_philippines_ddos/



46:18 – Story # 8: https://www.foxbusiness.com/technology/florida-woman-fired-rampage-company-computer-system



50:22 – Story # 9: https://www.nextgov.com/cybersecurity/2021/08/white-house-tasks-nist-producing-another-cybersecurity-framework/184868/



















Check out our Cyber Range, not just a place to work through challenges and play, but also an open direct/hands-on training environment.    



https://www.blackhillsinfosec.com/services/cyber-range/ 











Join the BHIS Blog Mailing List – get notified when we post new blogs, webcasts, and podcasts.



            
									
						
						Join 3,809 other subscribers						
					
					                    
                        
							Email Address
<ul><li>(00:00) - BHIS - Talkin' Bout [infosec] News 2021-08-30</li>
<li>(01:38) - Story # 1: https://carbuzz.com/news/tom-cruise-couldnt-stop-thieves-stealing-his-bmw-7-series</li>
<li>(14:45) - Story # 2: https://www.vice.com/en/article/jg84yy/data-brokers-netflow-data-team-cymru</li>
<li>(23:24) - Story # 3: https://www.reuters.com/technology/exclusive-microsoft-warns-thousands-cloud-customers-exposed-databases-emails-2021-08-26/</li>
<li>(27:37) - Story # 4: https://cyberworkx.in/2021/08/28/five-different-malware-families-targeting-pulse-secure-devices/](https://cyberworkx.in/2021/08/28/five-different-malware-families-targeting-pulse-secure-devices/)</li>
<li>(33:08) - Story # 5: https://www.techradar.com/news/microsoft-warns-of-elaborate-new-cybercrime-scheme-to-steal-your-login-details</li>
<li>(36:36) - Story # 6: https://twitter.com/EdClowes/status/1430083273015840776?s=19</li>
<li>(39:43) - Story # 7: https://www.theregister.com/2021/08/26/qurium_bright_data_philippines_ddos/</li>
<li>(46:18) - Story # 8: https://www.foxbusiness.com/technology/florida-woman-fired-rampage-company-computer-system</li>
<li>(50:22) - Story # 9: https://www.nextgov.com/cybersecurity/2021/08/white-house-tasks-nist-producing-another-cybersecurity-framework/184868/</li>
</ul>]]>
      </content:encoded>
      <pubDate>Fri, 03 Sep 2021 13:38:57 -0400</pubDate>
      <author>Black Hills Information Security</author>
      <enclosure url="https://media.transistor.fm/a68a4f10/015b788f.mp3" length="43679432" type="audio/mpeg"/>
      <itunes:author>Black Hills Information Security</itunes:author>
      <itunes:image href="https://img.transistorcdn.com/rKKZkt1pIsrfBk4lZxNwbNEshKX2C2l7JnUf4jGeWA8/rs:fill:0:0:1/w:1400/h:1400/q:60/mb:500000/aHR0cHM6Ly9pbWct/dXBsb2FkLXByb2R1/Y3Rpb24udHJhbnNp/c3Rvci5mbS83ZTg0/YTUwZTE0YWZjNTdm/ODg0ZGMzNjk5MTkz/YTVkYi5qcGc.jpg"/>
      <itunes:duration>3417</itunes:duration>
      <itunes:summary>ORIGINALLY AIRED ON AUGUST 30, 2021



Articles discussed in this episode:



01:38 – Story # 1: https://carbuzz.com/news/tom-cruise-couldnt-stop-thieves-stealing-his-bmw-7-series



14:45 – Story # 2: https://www.vice.com/en/article/jg84yy/data-brokers-netflow-data-team-cymru



23:24 – Story # 3: https://www.reuters.com/technology/exclusive-microsoft-warns-thousands-cloud-customers-exposed-databases-emails-2021-08-26/



27:37 – Story # 4: https://cyberworkx.in/2021/08/28/five-different-malware-families-targeting-pulse-secure-devices/



33:08 – Story # 5: https://www.techradar.com/news/microsoft-warns-of-elaborate-new-cybercrime-scheme-to-steal-your-login-details



36:36 – Story # 6: https://twitter.com/EdClowes/status/1430083273015840776?s=19



39:43 – Story # 7: https://www.theregister.com/2021/08/26/qurium_bright_data_philippines_ddos/



46:18 – Story # 8: https://www.foxbusiness.com/technology/florida-woman-fired-rampage-company-computer-system



50:22 – Story # 9: https://www.nextgov.com/cybersecurity/2021/08/white-house-tasks-nist-producing-another-cybersecurity-framework/184868/



















Check out our Cyber Range, not just a place to work through challenges and play, but also an open direct/hands-on training environment.    



https://www.blackhillsinfosec.com/services/cyber-range/ 











Join the BHIS Blog Mailing List – get notified when we post new blogs, webcasts, and podcasts.



            
									
						
						Join 3,809 other subscribers						
					
					                    
                        
							Email Address</itunes:summary>
      <itunes:subtitle>ORIGINALLY AIRED ON AUGUST 30, 2021



Articles discussed in this episode:



01:38 – Story # 1: https://carbuzz.com/news/tom-cruise-couldnt-stop-thieves-stealing-his-bmw-7-series



14:45 – Story # 2: https://www.vice.com/en/article/jg84yy/data-brokers-n</itunes:subtitle>
      <itunes:keywords>Infosec,Cybersecurity,news</itunes:keywords>
      <itunes:explicit>No</itunes:explicit>
      <podcast:chapters url="https://share.transistor.fm/s/a68a4f10/chapters.json" type="application/json+chapters"/>
    </item>
    <item>
      <title>Talkin’ About Infosec News – 8/25/2021</title>
      <itunes:episode>1</itunes:episode>
      <podcast:episode>1</podcast:episode>
      <itunes:title>Talkin’ About Infosec News – 8/25/2021</itunes:title>
      <itunes:episodeType>full</itunes:episodeType>
      <guid isPermaLink="false">https://www.blackhillsinfosec.com/?p=19580</guid>
      <link>https://share.transistor.fm/s/174688aa</link>
      <description>
        <![CDATA[ORIGINALLY AIRED ON AUGUST 23, 2021



Articles discussed in this episode:



00:00 – PreShow Banter™ — A Case of the Mondays



04:14 – Talkin’ Bout [InfoSec] News 2021-08-23



05:24 – Story # 1: https://www.scmagazine.com/analysis/vulnerability-management/as-fortinet-spars-with-rapid7-what-can-everyone-else-learn-about-disclosure



09:03 – Story # 2: https://www.bleepingcomputer.com/news/security/atandt-denies-data-breach-after-hacker-auctions-70-million-user-database/



14:50 – Story # 3: https://www.nytimes.com/2021/08/20/world/asia/afghanistan-facebook.html



21:01 – Story # 4: https://wgme.com/news/local/rural-sewage-plants-hit-by-ransomware-attacks-in-maine



31:23 – Story # 5: https://thehackernews.com/2021/08/cybercrime-group-asking-insiders-for.html



41:39 – Story # 6: https://cyberworkx.in/2021/08/22/mozi-botnet-uses-web-traffic-for-infecting-victims/



42:10 – Story # 6b: https://www.bleepingcomputer.com/news/security/cisco-won-t-fix-zero-day-rce-vulnerability-in-end-of-life-vpn-routers/



51:27 – Story # 7: https://twitter.com/j0nh4t/status/1429049506021138437



















Check out our Cyber Range, not just a place to work through challenges and play, but also an open direct/hands-on training environment.    



https://www.blackhillsinfosec.com/services/cyber-range/ 











Join the BHIS Blog Mailing List – get notified when we post new blogs, webcasts, and podcasts.



            
									
						
						Join 3,795 other subscribers						
					
					                    
                        
							Email Address
<ul><li>(00:00) - PreShow Banter™ — A Case of the Mondays</li>
<li>(04:14) - Talkin' Bout [InfoSec] News 2021-08-23</li>
<li>(05:24) - Story # 1: https://www.scmagazine.com/analysis/vulnerability-management/as-fortinet-spars-with-rapid7-what-can-everyone-else-learn-about-disclosure</li>
<li>(09:03) - Story # 2: https://www.bleepingcomputer.com/news/security/atandt-denies-data-breach-after-hacker-auctions-70-million-user-database/</li>
<li>(14:50) - Story # 3: https://www.nytimes.com/2021/08/20/world/asia/afghanistan-facebook.html</li>
<li>(21:01) - Story # 4: https://wgme.com/news/local/rural-sewage-plants-hit-by-ransomware-attacks-in-maine</li>
<li>(31:23) - Story # 5: https://thehackernews.com/2021/08/cybercrime-group-asking-insiders-for.html</li>
<li>(41:39) - Story # 6: https://cyberworkx.in/2021/08/22/mozi-botnet-uses-web-traffic-for-infecting-victims/</li>
<li>(42:09) - Story # 6b: https://www.bleepingcomputer.com/news/security/cisco-won-t-fix-zero-day-rce-vulnerability-in-end-of-life-vpn-routers/</li>
<li>(51:27) - Story # 7: https://twitter.com/j0nh4t/status/1429049506021138437</li>
</ul>]]>
      </description>
      <content:encoded>
        <![CDATA[ORIGINALLY AIRED ON AUGUST 23, 2021



Articles discussed in this episode:



00:00 – PreShow Banter™ — A Case of the Mondays



04:14 – Talkin’ Bout [InfoSec] News 2021-08-23



05:24 – Story # 1: https://www.scmagazine.com/analysis/vulnerability-management/as-fortinet-spars-with-rapid7-what-can-everyone-else-learn-about-disclosure



09:03 – Story # 2: https://www.bleepingcomputer.com/news/security/atandt-denies-data-breach-after-hacker-auctions-70-million-user-database/



14:50 – Story # 3: https://www.nytimes.com/2021/08/20/world/asia/afghanistan-facebook.html



21:01 – Story # 4: https://wgme.com/news/local/rural-sewage-plants-hit-by-ransomware-attacks-in-maine



31:23 – Story # 5: https://thehackernews.com/2021/08/cybercrime-group-asking-insiders-for.html



41:39 – Story # 6: https://cyberworkx.in/2021/08/22/mozi-botnet-uses-web-traffic-for-infecting-victims/



42:10 – Story # 6b: https://www.bleepingcomputer.com/news/security/cisco-won-t-fix-zero-day-rce-vulnerability-in-end-of-life-vpn-routers/



51:27 – Story # 7: https://twitter.com/j0nh4t/status/1429049506021138437



















Check out our Cyber Range, not just a place to work through challenges and play, but also an open direct/hands-on training environment.    



https://www.blackhillsinfosec.com/services/cyber-range/ 











Join the BHIS Blog Mailing List – get notified when we post new blogs, webcasts, and podcasts.



            
									
						
						Join 3,795 other subscribers						
					
					                    
                        
							Email Address
<ul><li>(00:00) - PreShow Banter™ — A Case of the Mondays</li>
<li>(04:14) - Talkin' Bout [InfoSec] News 2021-08-23</li>
<li>(05:24) - Story # 1: https://www.scmagazine.com/analysis/vulnerability-management/as-fortinet-spars-with-rapid7-what-can-everyone-else-learn-about-disclosure</li>
<li>(09:03) - Story # 2: https://www.bleepingcomputer.com/news/security/atandt-denies-data-breach-after-hacker-auctions-70-million-user-database/</li>
<li>(14:50) - Story # 3: https://www.nytimes.com/2021/08/20/world/asia/afghanistan-facebook.html</li>
<li>(21:01) - Story # 4: https://wgme.com/news/local/rural-sewage-plants-hit-by-ransomware-attacks-in-maine</li>
<li>(31:23) - Story # 5: https://thehackernews.com/2021/08/cybercrime-group-asking-insiders-for.html</li>
<li>(41:39) - Story # 6: https://cyberworkx.in/2021/08/22/mozi-botnet-uses-web-traffic-for-infecting-victims/</li>
<li>(42:09) - Story # 6b: https://www.bleepingcomputer.com/news/security/cisco-won-t-fix-zero-day-rce-vulnerability-in-end-of-life-vpn-routers/</li>
<li>(51:27) - Story # 7: https://twitter.com/j0nh4t/status/1429049506021138437</li>
</ul>]]>
      </content:encoded>
      <pubDate>Wed, 25 Aug 2021 08:36:00 -0400</pubDate>
      <author>Black Hills Information Security</author>
      <enclosure url="https://media.transistor.fm/174688aa/14551042.mp3" length="43023444" type="audio/mpeg"/>
      <itunes:author>Black Hills Information Security</itunes:author>
      <itunes:image href="https://img.transistorcdn.com/5vVCbO2nMUPHL-Bf1hl0hoMS04HXlMnCnAd3oOUBNio/rs:fill:0:0:1/w:1400/h:1400/q:60/mb:500000/aHR0cHM6Ly9pbWct/dXBsb2FkLXByb2R1/Y3Rpb24udHJhbnNp/c3Rvci5mbS9jNGRl/NmU3ZTdkYTE4MzUx/OWI3ZWIxNjMyNTZm/ZjM5OS5qcGc.jpg"/>
      <itunes:duration>3401</itunes:duration>
      <itunes:summary>ORIGINALLY AIRED ON AUGUST 23, 2021



Articles discussed in this episode:



00:00 – PreShow Banter™ — A Case of the Mondays



04:14 – Talkin’ Bout [InfoSec] News 2021-08-23



05:24 – Story # 1: https://www.scmagazine.com/analysis/vulnerability-management/as-fortinet-spars-with-rapid7-what-can-everyone-else-learn-about-disclosure



09:03 – Story # 2: https://www.bleepingcomputer.com/news/security/atandt-denies-data-breach-after-hacker-auctions-70-million-user-database/



14:50 – Story # 3: https://www.nytimes.com/2021/08/20/world/asia/afghanistan-facebook.html



21:01 – Story # 4: https://wgme.com/news/local/rural-sewage-plants-hit-by-ransomware-attacks-in-maine



31:23 – Story # 5: https://thehackernews.com/2021/08/cybercrime-group-asking-insiders-for.html



41:39 – Story # 6: https://cyberworkx.in/2021/08/22/mozi-botnet-uses-web-traffic-for-infecting-victims/



42:10 – Story # 6b: https://www.bleepingcomputer.com/news/security/cisco-won-t-fix-zero-day-rce-vulnerability-in-end-of-life-vpn-routers/



51:27 – Story # 7: https://twitter.com/j0nh4t/status/1429049506021138437



















Check out our Cyber Range, not just a place to work through challenges and play, but also an open direct/hands-on training environment.    



https://www.blackhillsinfosec.com/services/cyber-range/ 











Join the BHIS Blog Mailing List – get notified when we post new blogs, webcasts, and podcasts.



            
									
						
						Join 3,795 other subscribers						
					
					                    
                        
							Email Address</itunes:summary>
      <itunes:subtitle>ORIGINALLY AIRED ON AUGUST 23, 2021



Articles discussed in this episode:



00:00 – PreShow Banter™ — A Case of the Mondays



04:14 – Talkin’ Bout [InfoSec] News 2021-08-23



05:24 – Story # 1: https://www.scmagazine.com/analysis/vulnerability-managem</itunes:subtitle>
      <itunes:keywords>Infosec,Cybersecurity,news</itunes:keywords>
      <itunes:explicit>No</itunes:explicit>
      <podcast:chapters url="https://share.transistor.fm/s/174688aa/chapters.json" type="application/json+chapters"/>
    </item>
    <item>
      <title>Talkin’ About Infosec News – 8/18/2021</title>
      <itunes:episode>1</itunes:episode>
      <podcast:episode>1</podcast:episode>
      <itunes:title>Talkin’ About Infosec News – 8/18/2021</itunes:title>
      <itunes:episodeType>full</itunes:episodeType>
      <guid isPermaLink="false">https://www.blackhillsinfosec.com/?p=19536</guid>
      <link>https://share.transistor.fm/s/9bfd8dd3</link>
      <description>
        <![CDATA[ORIGINALLY AIRED ON AUGUST 16, 2021



Articles discussed in this episode:



00:00 – BHIS | Talkin’ Bout News 2021-08-16



01:34 – Story # 1: https://youtu.be/WqD-ATqw3js



05:50 – Story # 2: https://cyberworkx.in/2021/08/11/accenture-data-is-on-darkweb-ransomware-group-threatens-to-release-it-for-public/



09:54 – Story # 3: https://www.vice.com/en/article/akg8wg/tmobile-investigating-customer-data-breach-100-million



13:37 – Story # 4: https://techcommunity.microsoft.com/t5/windows-it-pro-blog/announcing-the-general-availability-of-windows-365/ba-p/2595481



17:00 – Story # 4b: https://www.theverge.com/2021/8/4/22609090/microsoft-365-free-trials-cloud-pcs-demand-trials



19:56 – Story # 5: https://cyberworkx.in/2021/08/09/hacker-exploiting-authentication-bypass-bug-on-millions-of-routers/



33:19 – Story # 6: https://techcrunch.com/2021/08/02/amazon-credit-palm-biometrics/



40:52 – Story # 7: https://www.pcgamer.com/discord-malware-persistence-sophos-report/



44:09 – Story # 8: https://www.bleepingcomputer.com/news/microsoft/microsoft-exchange-servers-scanned-for-proxyshell-vulnerability-patch-now/



46:48 – Story # 9: https://portswigger.net/daily-swig/black-hat-usa-http-2-flaws-expose-organizations-to-fresh-wave-of-request-smuggling-attacks



















Check out our Cyber Range, not just a place to work through challenges and play, but also an open direct/hands-on training environment.    



https://www.blackhillsinfosec.com/services/cyber-range/ 











Join the BHIS Blog Mailing List – get notified when we post new blogs, webcasts,
<ul><li>(00:00) - BHIS | Talkin' Bout News 2021-08-16</li>
<li>(01:34) - Story # 1: https://youtu.be/WqD-ATqw3js</li>
<li>(05:50) - Story # 2: https://cyberworkx.in/2021/08/11/accenture-data-is-on-darkweb-ransomware-group-threatens-to-release-it-for-public/</li>
<li>(09:54) - Story # 4 https://www.vice.com/en/article/akg8wg/tmobile-investigating-customer-data-breach-100-million</li>
<li>(13:37) - Story # 5: https://techcommunity.microsoft.com/t5/windows-it-pro-blog/announcing-the-general-availability-of-windows-365/ba-p/2595481</li>
<li>(17:00) - Story # 5b: https://www.theverge.com/2021/8/4/22609090/microsoft-365-free-trials-cloud-pcs-demand-trials</li>
<li>(19:56) - Story # 6: https://cyberworkx.in/2021/08/09/hacker-exploiting-authentication-bypass-bug-on-millions-of-routers/</li>
<li>(33:19) - Story # 7: https://techcrunch.com/2021/08/02/amazon-credit-palm-biometrics/</li>
<li>(40:52) - Story # 8: https://www.pcgamer.com/discord-malware-persistence-sophos-report/</li>
<li>(44:09) - Story # 9: https://www.bleepingcomputer.com/news/microsoft/microsoft-exchange-servers-scanned-for-proxyshell-vulnerability-patch-now/</li>
<li>(46:48) - Story # 10: https://portswigger.net/daily-swig/black-hat-usa-http-2-flaws-expose-organizations-to-fresh-wave-of-request-smuggling-attacks</li>
</ul>]]>
      </description>
      <content:encoded>
        <![CDATA[ORIGINALLY AIRED ON AUGUST 16, 2021



Articles discussed in this episode:



00:00 – BHIS | Talkin’ Bout News 2021-08-16



01:34 – Story # 1: https://youtu.be/WqD-ATqw3js



05:50 – Story # 2: https://cyberworkx.in/2021/08/11/accenture-data-is-on-darkweb-ransomware-group-threatens-to-release-it-for-public/



09:54 – Story # 3: https://www.vice.com/en/article/akg8wg/tmobile-investigating-customer-data-breach-100-million



13:37 – Story # 4: https://techcommunity.microsoft.com/t5/windows-it-pro-blog/announcing-the-general-availability-of-windows-365/ba-p/2595481



17:00 – Story # 4b: https://www.theverge.com/2021/8/4/22609090/microsoft-365-free-trials-cloud-pcs-demand-trials



19:56 – Story # 5: https://cyberworkx.in/2021/08/09/hacker-exploiting-authentication-bypass-bug-on-millions-of-routers/



33:19 – Story # 6: https://techcrunch.com/2021/08/02/amazon-credit-palm-biometrics/



40:52 – Story # 7: https://www.pcgamer.com/discord-malware-persistence-sophos-report/



44:09 – Story # 8: https://www.bleepingcomputer.com/news/microsoft/microsoft-exchange-servers-scanned-for-proxyshell-vulnerability-patch-now/



46:48 – Story # 9: https://portswigger.net/daily-swig/black-hat-usa-http-2-flaws-expose-organizations-to-fresh-wave-of-request-smuggling-attacks



















Check out our Cyber Range, not just a place to work through challenges and play, but also an open direct/hands-on training environment.    



https://www.blackhillsinfosec.com/services/cyber-range/ 











Join the BHIS Blog Mailing List – get notified when we post new blogs, webcasts,
<ul><li>(00:00) - BHIS | Talkin' Bout News 2021-08-16</li>
<li>(01:34) - Story # 1: https://youtu.be/WqD-ATqw3js</li>
<li>(05:50) - Story # 2: https://cyberworkx.in/2021/08/11/accenture-data-is-on-darkweb-ransomware-group-threatens-to-release-it-for-public/</li>
<li>(09:54) - Story # 4 https://www.vice.com/en/article/akg8wg/tmobile-investigating-customer-data-breach-100-million</li>
<li>(13:37) - Story # 5: https://techcommunity.microsoft.com/t5/windows-it-pro-blog/announcing-the-general-availability-of-windows-365/ba-p/2595481</li>
<li>(17:00) - Story # 5b: https://www.theverge.com/2021/8/4/22609090/microsoft-365-free-trials-cloud-pcs-demand-trials</li>
<li>(19:56) - Story # 6: https://cyberworkx.in/2021/08/09/hacker-exploiting-authentication-bypass-bug-on-millions-of-routers/</li>
<li>(33:19) - Story # 7: https://techcrunch.com/2021/08/02/amazon-credit-palm-biometrics/</li>
<li>(40:52) - Story # 8: https://www.pcgamer.com/discord-malware-persistence-sophos-report/</li>
<li>(44:09) - Story # 9: https://www.bleepingcomputer.com/news/microsoft/microsoft-exchange-servers-scanned-for-proxyshell-vulnerability-patch-now/</li>
<li>(46:48) - Story # 10: https://portswigger.net/daily-swig/black-hat-usa-http-2-flaws-expose-organizations-to-fresh-wave-of-request-smuggling-attacks</li>
</ul>]]>
      </content:encoded>
      <pubDate>Wed, 18 Aug 2021 12:12:32 -0400</pubDate>
      <author>Black Hills Information Security</author>
      <enclosure url="https://media.transistor.fm/9bfd8dd3/3dfd9fd7.mp3" length="39289745" type="audio/mpeg"/>
      <itunes:author>Black Hills Information Security</itunes:author>
      <itunes:image href="https://img.transistorcdn.com/LIWPRBzNUtbmrsP2ePdUo1dwYryxq0pN3ZcuEaumjvc/rs:fill:0:0:1/w:1400/h:1400/q:60/mb:500000/aHR0cHM6Ly9pbWct/dXBsb2FkLXByb2R1/Y3Rpb24udHJhbnNp/c3Rvci5mbS9hMTQw/MmE3MWE0NGM3Y2Zm/YjNkYzQ2MDRjMTk0/MDc1YS5qcGc.jpg"/>
      <itunes:duration>3053</itunes:duration>
      <itunes:summary>ORIGINALLY AIRED ON AUGUST 16, 2021



Articles discussed in this episode:



00:00 – BHIS | Talkin’ Bout News 2021-08-16



01:34 – Story # 1: https://youtu.be/WqD-ATqw3js



05:50 – Story # 2: https://cyberworkx.in/2021/08/11/accenture-data-is-on-darkweb-ransomware-group-threatens-to-release-it-for-public/



09:54 – Story # 3: https://www.vice.com/en/article/akg8wg/tmobile-investigating-customer-data-breach-100-million



13:37 – Story # 4: https://techcommunity.microsoft.com/t5/windows-it-pro-blog/announcing-the-general-availability-of-windows-365/ba-p/2595481



17:00 – Story # 4b: https://www.theverge.com/2021/8/4/22609090/microsoft-365-free-trials-cloud-pcs-demand-trials



19:56 – Story # 5: https://cyberworkx.in/2021/08/09/hacker-exploiting-authentication-bypass-bug-on-millions-of-routers/



33:19 – Story # 6: https://techcrunch.com/2021/08/02/amazon-credit-palm-biometrics/



40:52 – Story # 7: https://www.pcgamer.com/discord-malware-persistence-sophos-report/



44:09 – Story # 8: https://www.bleepingcomputer.com/news/microsoft/microsoft-exchange-servers-scanned-for-proxyshell-vulnerability-patch-now/



46:48 – Story # 9: https://portswigger.net/daily-swig/black-hat-usa-http-2-flaws-expose-organizations-to-fresh-wave-of-request-smuggling-attacks



















Check out our Cyber Range, not just a place to work through challenges and play, but also an open direct/hands-on training environment.    



https://www.blackhillsinfosec.com/services/cyber-range/ 











Join the BHIS Blog Mailing List – get notified when we post new blogs, webcasts,</itunes:summary>
      <itunes:subtitle>ORIGINALLY AIRED ON AUGUST 16, 2021



Articles discussed in this episode:



00:00 – BHIS | Talkin’ Bout News 2021-08-16



01:34 – Story # 1: https://youtu.be/WqD-ATqw3js



05:50 – Story # 2: https://cyberworkx.in/2021/08/11/accenture-data-is-on-darkwe</itunes:subtitle>
      <itunes:keywords>Infosec,Cybersecurity,news</itunes:keywords>
      <itunes:explicit>No</itunes:explicit>
      <podcast:chapters url="https://share.transistor.fm/s/9bfd8dd3/chapters.json" type="application/json+chapters"/>
    </item>
    <item>
      <title>Talkin’ About Infosec News – 8/13/2021</title>
      <itunes:episode>1</itunes:episode>
      <podcast:episode>1</podcast:episode>
      <itunes:title>Talkin’ About Infosec News – 8/13/2021</itunes:title>
      <itunes:episodeType>full</itunes:episodeType>
      <guid isPermaLink="false">https://www.blackhillsinfosec.com/?p=19508</guid>
      <link>https://share.transistor.fm/s/a658a261</link>
      <description>
        <![CDATA[Originally Aired on August 10, 2021



Articles discussed in this episode:



00:00 – BHIS | Talkin’ Bout News 2021-08-10 — The Ransomware Intro



03:18 – Story # 1: https://www.eff.org/deeplinks/2021/08/apples-plan-think-different-about-encryption-opens-backdoor-your-private-life



15:58 – Story # 2: https://www.securityweek.com/details-emerge-iranian-railroad-cyberattack



32:34 – Story # 3: https://www.bleepingcomputer.com/news/microsoft/microsoft-august-2021-patch-tuesday-fixes-3-zero-days-44-flaws/



36:19 – Story # 4: https://www.raccoonvalleyradio.com/2021/08/02/men-file-lawsuit-against-dallas-county-sheriff/



44:22 – Story # 5: https://therecord.media/disgruntled-ransomware-affiliate-leaks-the-conti-gangs-technical-manuals/



52:20 – Story # 6: https://therecord.media/motherboard-vendor-gigabyte-hit-by-ransomexx-ransomware-gang/



Awareness Con Playlist



* https://www.youtube.com/playlist?list=PLqz80p7f6dFuuqMCqdhCKCmhCtg88BPz6



The Ransomeware Song – Forrest Brazeal – Used With Permission



* https://youtu.be/d2dsI8NvdCU



(Thanks to BHIS Discord user @toekneewhyknot for the recommendation)



















Check out our Cyber Range, not just a place to work through challenges and play, but also an open direct/hands-on training environment.    



https://www.blackhillsinfosec.com/services/cyber-range/ 











Join the BHIS Blog Mailing List – get notified when we post new blogs, webcasts, and podcasts.



            
									
						
						Join 3,768 other subscribers						
					
					                    
                        
							Email Address]]>
      </description>
      <content:encoded>
        <![CDATA[Originally Aired on August 10, 2021



Articles discussed in this episode:



00:00 – BHIS | Talkin’ Bout News 2021-08-10 — The Ransomware Intro



03:18 – Story # 1: https://www.eff.org/deeplinks/2021/08/apples-plan-think-different-about-encryption-opens-backdoor-your-private-life



15:58 – Story # 2: https://www.securityweek.com/details-emerge-iranian-railroad-cyberattack



32:34 – Story # 3: https://www.bleepingcomputer.com/news/microsoft/microsoft-august-2021-patch-tuesday-fixes-3-zero-days-44-flaws/



36:19 – Story # 4: https://www.raccoonvalleyradio.com/2021/08/02/men-file-lawsuit-against-dallas-county-sheriff/



44:22 – Story # 5: https://therecord.media/disgruntled-ransomware-affiliate-leaks-the-conti-gangs-technical-manuals/



52:20 – Story # 6: https://therecord.media/motherboard-vendor-gigabyte-hit-by-ransomexx-ransomware-gang/



Awareness Con Playlist



* https://www.youtube.com/playlist?list=PLqz80p7f6dFuuqMCqdhCKCmhCtg88BPz6



The Ransomeware Song – Forrest Brazeal – Used With Permission



* https://youtu.be/d2dsI8NvdCU



(Thanks to BHIS Discord user @toekneewhyknot for the recommendation)



















Check out our Cyber Range, not just a place to work through challenges and play, but also an open direct/hands-on training environment.    



https://www.blackhillsinfosec.com/services/cyber-range/ 











Join the BHIS Blog Mailing List – get notified when we post new blogs, webcasts, and podcasts.



            
									
						
						Join 3,768 other subscribers						
					
					                    
                        
							Email Address]]>
      </content:encoded>
      <pubDate>Fri, 13 Aug 2021 09:23:53 -0400</pubDate>
      <author>Black Hills Information Security</author>
      <enclosure url="https://media.transistor.fm/a658a261/a57cd2be.mp3" length="40969233" type="audio/mpeg"/>
      <itunes:author>Black Hills Information Security</itunes:author>
      <itunes:duration>3413</itunes:duration>
      <itunes:summary>Originally Aired on August 10, 2021



Articles discussed in this episode:



00:00 – BHIS | Talkin’ Bout News 2021-08-10 — The Ransomware Intro



03:18 – Story # 1: https://www.eff.org/deeplinks/2021/08/apples-plan-think-different-about-encryption-opens-backdoor-your-private-life



15:58 – Story # 2: https://www.securityweek.com/details-emerge-iranian-railroad-cyberattack



32:34 – Story # 3: https://www.bleepingcomputer.com/news/microsoft/microsoft-august-2021-patch-tuesday-fixes-3-zero-days-44-flaws/



36:19 – Story # 4: https://www.raccoonvalleyradio.com/2021/08/02/men-file-lawsuit-against-dallas-county-sheriff/



44:22 – Story # 5: https://therecord.media/disgruntled-ransomware-affiliate-leaks-the-conti-gangs-technical-manuals/



52:20 – Story # 6: https://therecord.media/motherboard-vendor-gigabyte-hit-by-ransomexx-ransomware-gang/



Awareness Con Playlist



* https://www.youtube.com/playlist?list=PLqz80p7f6dFuuqMCqdhCKCmhCtg88BPz6



The Ransomeware Song – Forrest Brazeal – Used With Permission



* https://youtu.be/d2dsI8NvdCU



(Thanks to BHIS Discord user @toekneewhyknot for the recommendation)



















Check out our Cyber Range, not just a place to work through challenges and play, but also an open direct/hands-on training environment.    



https://www.blackhillsinfosec.com/services/cyber-range/ 











Join the BHIS Blog Mailing List – get notified when we post new blogs, webcasts, and podcasts.



            
									
						
						Join 3,768 other subscribers						
					
					                    
                        
							Email Address</itunes:summary>
      <itunes:subtitle>Originally Aired on August 10, 2021



Articles discussed in this episode:



00:00 – BHIS | Talkin’ Bout News 2021-08-10 — The Ransomware Intro



03:18 – Story # 1: https://www.eff.org/deeplinks/2021/08/apples-plan-think-different-about-encryption-opens</itunes:subtitle>
      <itunes:keywords>Infosec,Cybersecurity,news</itunes:keywords>
      <itunes:explicit>No</itunes:explicit>
    </item>
    <item>
      <title>Talkin' About Infosec News - 8/13/2021</title>
      <itunes:episode>1</itunes:episode>
      <podcast:episode>1</podcast:episode>
      <itunes:title>Talkin' About Infosec News - 8/13/2021</itunes:title>
      <itunes:episodeType>full</itunes:episodeType>
      <guid isPermaLink="false">http://www.blubrry.com/bhis/80049381/talkin-about-infosec-news-8132021/</guid>
      <link>https://share.transistor.fm/s/6a011a67</link>
      <description>
        <![CDATA[<p>Originally Aired on August 10, 2021</p>
<p>Articles discussed in this episode:</p>
<p><a href="https://youtu.be/JTPa1rGq7qk">https://youtu.be/JTPa1rGq7qk</a></p>
<p>00:00 - BHIS | Talkin’ Bout News 2021-08-10 — The Ransomware Intro</p>
<p>03:18 - Story # 1: https://www.eff.org/deeplinks/2021/08/apples-plan-think-different-about-encryption-opens-backdoor-your-private-life</p>
<p>15:58 - Story # 2: https://www.securityweek.com/details-emerge-iranian-railroad-cyberattack</p>
<p>32:34 - Story # 3: https://www.bleepingcomputer.com/news/microsoft/microsoft-august-2021-patch-tuesday-fixes-3-zero-days-44-flaws/</p>
<p>36:19 - Story # 4: https://www.raccoonvalleyradio.com/2021/08/02/men-file-lawsuit-against-dallas-county-sheriff/</p>
<p>44:22 - Story # 5: https://therecord.media/disgruntled-ransomware-affiliate-leaks-the-conti-gangs-technical-manuals/</p>
<p>52:20 - Story # 6: https://therecord.media/motherboard-vendor-gigabyte-hit-by-ransomexx-ransomware-gang/</p>
<p>Awareness Con Playlist</p>
<ul>
<li><a title="https://www.youtube.com/playlist?list=plqz80p7f6dfuuqmcqdhckcmhctg88bpz6" rel="noreferrer noopener" href="https://www.youtube.com/playlist?list=PLqz80p7f6dFuuqMCqdhCKCmhCtg88BPz6">https://www.youtube.com/playlist?list=PLqz80p7f6dFuuqMCqdhCKCmhCtg88BPz6</a></li>
</ul>
<p>The Ransomeware Song - Forrest Brazeal - Used With Permission</p>
<ul>
<li><a title="https://youtu.be/d2dsi8nvdcu" rel="noreferrer noopener" href="https://youtu.be/d2dsI8NvdCU">https://youtu.be/d2dsI8NvdCU</a></li>
</ul>
<p>(Thanks to BHIS Discord user @toekneewhyknot for the recommendation)</p>]]>
      </description>
      <content:encoded>
        <![CDATA[<p>Originally Aired on August 10, 2021</p>
<p>Articles discussed in this episode:</p>
<p><a href="https://youtu.be/JTPa1rGq7qk">https://youtu.be/JTPa1rGq7qk</a></p>
<p>00:00 - BHIS | Talkin’ Bout News 2021-08-10 — The Ransomware Intro</p>
<p>03:18 - Story # 1: https://www.eff.org/deeplinks/2021/08/apples-plan-think-different-about-encryption-opens-backdoor-your-private-life</p>
<p>15:58 - Story # 2: https://www.securityweek.com/details-emerge-iranian-railroad-cyberattack</p>
<p>32:34 - Story # 3: https://www.bleepingcomputer.com/news/microsoft/microsoft-august-2021-patch-tuesday-fixes-3-zero-days-44-flaws/</p>
<p>36:19 - Story # 4: https://www.raccoonvalleyradio.com/2021/08/02/men-file-lawsuit-against-dallas-county-sheriff/</p>
<p>44:22 - Story # 5: https://therecord.media/disgruntled-ransomware-affiliate-leaks-the-conti-gangs-technical-manuals/</p>
<p>52:20 - Story # 6: https://therecord.media/motherboard-vendor-gigabyte-hit-by-ransomexx-ransomware-gang/</p>
<p>Awareness Con Playlist</p>
<ul>
<li><a title="https://www.youtube.com/playlist?list=plqz80p7f6dfuuqmcqdhckcmhctg88bpz6" rel="noreferrer noopener" href="https://www.youtube.com/playlist?list=PLqz80p7f6dFuuqMCqdhCKCmhCtg88BPz6">https://www.youtube.com/playlist?list=PLqz80p7f6dFuuqMCqdhCKCmhCtg88BPz6</a></li>
</ul>
<p>The Ransomeware Song - Forrest Brazeal - Used With Permission</p>
<ul>
<li><a title="https://youtu.be/d2dsi8nvdcu" rel="noreferrer noopener" href="https://youtu.be/d2dsI8NvdCU">https://youtu.be/d2dsI8NvdCU</a></li>
</ul>
<p>(Thanks to BHIS Discord user @toekneewhyknot for the recommendation)</p>]]>
      </content:encoded>
      <pubDate>Fri, 13 Aug 2021 08:30:52 -0400</pubDate>
      <author>Black Hills Information Security</author>
      <enclosure url="https://media.transistor.fm/6a011a67/d0c25d60.mp3" length="40969251" type="audio/mpeg"/>
      <itunes:author>Black Hills Information Security</itunes:author>
      <itunes:duration>3413</itunes:duration>
      <itunes:summary>Originally Aired on August 10, 2021
Articles discussed in this episode:
https://youtu.be/JTPa1rGq7qk (https://youtu.be/JTPa1rGq7qk)
00:00 - BHIS | Talkin’ Bout News 2021-08-10 — The Ransomware Intro
03:18 - Story # 1: https://www.eff.org/deeplinks/2021/08/apples-plan-think-different-about-encryption-opens-backdoor-your-private-life
15:58 - Story # 2: https://www.securityweek.com/details-emerge-iranian-railroad-cyberattack
32:34 - Story # 3: https://www.bleepingcomputer.com/news/microsoft/microsoft-august-2021-patch-tuesday-fixes-3-zero-days-44-flaws/
36:19 - Story # 4: https://www.raccoonvalleyradio.com/2021/08/02/men-file-lawsuit-against-dallas-county-sheriff/
44:22 - Story # 5: https://therecord.media/disgruntled-ransomware-affiliate-leaks-the-conti-gangs-technical-manuals/
52:20 - Story # 6: https://therecord.media/motherboard-vendor-gigabyte-hit-by-ransomexx-ransomware-gang/
Awareness Con Playlist

* https://www.youtube.com/playlist?list=PLqz80p7f6dFuuqMCqdhCKCmhCtg88BPz6 (https://www.youtube.com/playlist?list=PLqz80p7f6dFuuqMCqdhCKCmhCtg88BPz6)

The Ransomeware Song - Forrest Brazeal - Used With Permission

* https://youtu.be/d2dsI8NvdCU (https://youtu.be/d2dsI8NvdCU)

(Thanks to BHIS Discord user @toekneewhyknot for the recommendation)</itunes:summary>
      <itunes:subtitle>Originally Aired on August 10, 2021
Articles discussed in this episode:
https://youtu.be/JTPa1rGq7qk (https://youtu.be/JTPa1rGq7qk)
00:00 - BHIS | Talkin’ Bout News 2021-08-10 — The Ransomware Intro
03:18 - Story # 1: https://www.eff.org/deeplinks/2021/08</itunes:subtitle>
      <itunes:keywords>Infosec,Cybersecurity,news</itunes:keywords>
      <itunes:explicit>No</itunes:explicit>
    </item>
    <item>
      <title>Talkin’ About Infosec News – 8/4/2021</title>
      <itunes:episode>1</itunes:episode>
      <podcast:episode>1</podcast:episode>
      <itunes:title>Talkin’ About Infosec News – 8/4/2021</itunes:title>
      <itunes:episodeType>full</itunes:episodeType>
      <guid isPermaLink="false">https://www.blackhillsinfosec.com/?p=19419</guid>
      <link>https://share.transistor.fm/s/18e2b821</link>
      <description>
        <![CDATA[Originally Aired on August 2, 2021



Articles discussed in this episode:



00:00 – BHIS | Talkin’ Bout News 2021-08-02 — Gold Foil Hats



05:18 – Story # 1: https://hothardware.com/news/microsoft-printnightmare-hack-grants-windows-admin-privileges



10:40 – Story # 2: https://www.wsj.com/articles/amazon-hit-with-record-eu-privacy-fine-11627646144



28:43 – LINK : Social Zombies – https://vimeo.com/6307559



31:54 – LINK: The Great Hack – https://youtu.be/iX8GxLP1FHo



32:24 – Story # 3: https://thehackernews.com/2021/08/solarmarker-infostealer-malware-once.html



43:58 – Story # 4: https://www.nytimes.com/2021/07/31/opinion/sunday/russia-ransomware-hacking.html



54:33 – [Post]Show Banter™ – Goldfoil



















Check out our Cyber Range, not just a place to work through challenges and play, but also an open direct/hands-on training environment.    



https://www.blackhillsinfosec.com/services/cyber-range/ 











Join the BHIS Blog Mailing List – get notified when we post new blogs, webcasts, and podcasts.



            
									
						
						Join 3,719 other subscribers						
					
					                    
                        
							Email Address                        
                        
                    

					
                        
                        
                        
                        
						                        
	                        Subscribe
<ul><li>(00:00) - BHIS | Talkin' Bout News 2021-08-03 — Gold Foil Hats</li>
<li>(05:18) - Story # 1: https://hothardware.com/news/microsoft-printnightmare-hack-grants-windows-admin-privileges</li>
<li>(10:40) - Story # 2: https://www.wsj.com/articles/amazon-hit-with-record-eu-privacy-fine-11627646144</li>
<li>(28:43) - LINK : Social Zombies - https://vimeo.com/6307559</li>
<li>(31:54) - LINK: The Great Hack – https://youtu.be/iX8GxLP1FHo</li>
<li>(32:24) - Story # 3: https://thehackernews.com/2021/08/solarmarker-infostealer-malware-once.html</li>
<li>(43:58) - Story # 4: https://www.nytimes.com/2021/07/31/opinion/sunday/russia-ransomware-hacking.html</li>
<li>(54:33) - [Post]Show Banter™ - Goldfoil</li>
</ul>]]>
      </description>
      <content:encoded>
        <![CDATA[Originally Aired on August 2, 2021



Articles discussed in this episode:



00:00 – BHIS | Talkin’ Bout News 2021-08-02 — Gold Foil Hats



05:18 – Story # 1: https://hothardware.com/news/microsoft-printnightmare-hack-grants-windows-admin-privileges



10:40 – Story # 2: https://www.wsj.com/articles/amazon-hit-with-record-eu-privacy-fine-11627646144



28:43 – LINK : Social Zombies – https://vimeo.com/6307559



31:54 – LINK: The Great Hack – https://youtu.be/iX8GxLP1FHo



32:24 – Story # 3: https://thehackernews.com/2021/08/solarmarker-infostealer-malware-once.html



43:58 – Story # 4: https://www.nytimes.com/2021/07/31/opinion/sunday/russia-ransomware-hacking.html



54:33 – [Post]Show Banter™ – Goldfoil



















Check out our Cyber Range, not just a place to work through challenges and play, but also an open direct/hands-on training environment.    



https://www.blackhillsinfosec.com/services/cyber-range/ 











Join the BHIS Blog Mailing List – get notified when we post new blogs, webcasts, and podcasts.



            
									
						
						Join 3,719 other subscribers						
					
					                    
                        
							Email Address                        
                        
                    

					
                        
                        
                        
                        
						                        
	                        Subscribe
<ul><li>(00:00) - BHIS | Talkin' Bout News 2021-08-03 — Gold Foil Hats</li>
<li>(05:18) - Story # 1: https://hothardware.com/news/microsoft-printnightmare-hack-grants-windows-admin-privileges</li>
<li>(10:40) - Story # 2: https://www.wsj.com/articles/amazon-hit-with-record-eu-privacy-fine-11627646144</li>
<li>(28:43) - LINK : Social Zombies - https://vimeo.com/6307559</li>
<li>(31:54) - LINK: The Great Hack – https://youtu.be/iX8GxLP1FHo</li>
<li>(32:24) - Story # 3: https://thehackernews.com/2021/08/solarmarker-infostealer-malware-once.html</li>
<li>(43:58) - Story # 4: https://www.nytimes.com/2021/07/31/opinion/sunday/russia-ransomware-hacking.html</li>
<li>(54:33) - [Post]Show Banter™ - Goldfoil</li>
</ul>]]>
      </content:encoded>
      <pubDate>Wed, 04 Aug 2021 14:32:09 -0400</pubDate>
      <author>Black Hills Information Security</author>
      <enclosure url="https://media.transistor.fm/18e2b821/c9cdfc3c.mp3" length="42309199" type="audio/mpeg"/>
      <itunes:author>Black Hills Information Security</itunes:author>
      <itunes:image href="https://img.transistorcdn.com/oIRbbOqe6X_LIWZybbPSRbQ6ErQEmsCv4-mTKaFqm5A/rs:fill:0:0:1/w:1400/h:1400/q:60/mb:500000/aHR0cHM6Ly9pbWct/dXBsb2FkLXByb2R1/Y3Rpb24udHJhbnNp/c3Rvci5mbS9hZDU5/M2EyM2ZkMzhlNmRi/MTllMzZiODRhZTli/YTZlNi5qcGc.jpg"/>
      <itunes:duration>3341</itunes:duration>
      <itunes:summary>Originally Aired on August 2, 2021



Articles discussed in this episode:



00:00 – BHIS | Talkin’ Bout News 2021-08-02 — Gold Foil Hats



05:18 – Story # 1: https://hothardware.com/news/microsoft-printnightmare-hack-grants-windows-admin-privileges



10:40 – Story # 2: https://www.wsj.com/articles/amazon-hit-with-record-eu-privacy-fine-11627646144



28:43 – LINK : Social Zombies – https://vimeo.com/6307559



31:54 – LINK: The Great Hack – https://youtu.be/iX8GxLP1FHo



32:24 – Story # 3: https://thehackernews.com/2021/08/solarmarker-infostealer-malware-once.html



43:58 – Story # 4: https://www.nytimes.com/2021/07/31/opinion/sunday/russia-ransomware-hacking.html



54:33 – [Post]Show Banter™ – Goldfoil



















Check out our Cyber Range, not just a place to work through challenges and play, but also an open direct/hands-on training environment.    



https://www.blackhillsinfosec.com/services/cyber-range/ 











Join the BHIS Blog Mailing List – get notified when we post new blogs, webcasts, and podcasts.



            
									
						
						Join 3,719 other subscribers						
					
					                    
                        
							Email Address                        
                        
                    

					
                        
                        
                        
                        
						                        
	                        Subscribe</itunes:summary>
      <itunes:subtitle>Originally Aired on August 2, 2021



Articles discussed in this episode:



00:00 – BHIS | Talkin’ Bout News 2021-08-02 — Gold Foil Hats



05:18 – Story # 1: https://hothardware.com/news/microsoft-printnightmare-hack-grants-windows-admin-privileges



1</itunes:subtitle>
      <itunes:keywords>Infosec,Cybersecurity,news</itunes:keywords>
      <itunes:explicit>No</itunes:explicit>
      <podcast:chapters url="https://share.transistor.fm/s/18e2b821/chapters.json" type="application/json+chapters"/>
    </item>
    <item>
      <title>Talkin' About Infosec News - 7/28/2021</title>
      <itunes:episode>1</itunes:episode>
      <podcast:episode>1</podcast:episode>
      <itunes:title>Talkin' About Infosec News - 7/28/2021</itunes:title>
      <itunes:episodeType>full</itunes:episodeType>
      <guid isPermaLink="false">http://www.blubrry.com/bhis/79592780/talkin-about-infosec-news-7282021/</guid>
      <link>https://share.transistor.fm/s/d8d20f34</link>
      <description>
        <![CDATA[<h4 class="has-text-align-center">ORIGINALLY AIRED ON JULY 26, 2021
</h4><p><strong>Articles discussed in this episode:</strong></p>
<p>00:00 – BHIS | Talkin’ Bout News 2021-07-26</p>
<p>03:54 – Story # 1: <a rel="noreferrer noopener" href="https://cyberworkx.in/2021/07/24/new-windows-attack-petitpotam-forces-windows-hosts-to-share-ntlm-hashes/">https://cyberworkx.in/2021/07/24/new-windows-attack-petitpotam-forces-windows-hosts-to-share-ntlm-hashes/</a></p>
<p>18:53 – Story # 2: <a rel="noreferrer noopener" href="https://thehackernews.com/2021/07/how-to-mitigate-microsoft-windows-10-11.html">https://thehackernews.com/2021/07/how-to-mitigate-microsoft-windows-10-11.html</a></p>
<p>30:26 – Story # 3: <a rel="noreferrer noopener" href="https://cyberworkx.in/2021/07/23/kaseya-received-the-universal-decryptor-for-revil-ransomware-attack/">https://cyberworkx.in/2021/07/23/kaseya-received-the-universal-decryptor-for-revil-ransomware-attack/</a></p>
<p>51:48 – Random Crap</p>]]>
      </description>
      <content:encoded>
        <![CDATA[<h4 class="has-text-align-center">ORIGINALLY AIRED ON JULY 26, 2021
</h4><p><strong>Articles discussed in this episode:</strong></p>
<p>00:00 – BHIS | Talkin’ Bout News 2021-07-26</p>
<p>03:54 – Story # 1: <a rel="noreferrer noopener" href="https://cyberworkx.in/2021/07/24/new-windows-attack-petitpotam-forces-windows-hosts-to-share-ntlm-hashes/">https://cyberworkx.in/2021/07/24/new-windows-attack-petitpotam-forces-windows-hosts-to-share-ntlm-hashes/</a></p>
<p>18:53 – Story # 2: <a rel="noreferrer noopener" href="https://thehackernews.com/2021/07/how-to-mitigate-microsoft-windows-10-11.html">https://thehackernews.com/2021/07/how-to-mitigate-microsoft-windows-10-11.html</a></p>
<p>30:26 – Story # 3: <a rel="noreferrer noopener" href="https://cyberworkx.in/2021/07/23/kaseya-received-the-universal-decryptor-for-revil-ransomware-attack/">https://cyberworkx.in/2021/07/23/kaseya-received-the-universal-decryptor-for-revil-ransomware-attack/</a></p>
<p>51:48 – Random Crap</p>]]>
      </content:encoded>
      <pubDate>Wed, 28 Jul 2021 12:57:16 -0400</pubDate>
      <author>Black Hills Information Security</author>
      <enclosure url="https://media.transistor.fm/d8d20f34/22f9d1e2.mp3" length="38498702" type="audio/mpeg"/>
      <itunes:author>Black Hills Information Security</itunes:author>
      <itunes:duration>3207</itunes:duration>
      <itunes:summary>ORIGINALLY AIRED ON JULY 26, 2021
Articles discussed in this episode:
00:00 – BHIS | Talkin’ Bout News 2021-07-26
03:54 – Story # 1: https://cyberworkx.in/2021/07/24/new-windows-attack-petitpotam-forces-windows-hosts-to-share-ntlm-hashes/ (https://cyberworkx.in/2021/07/24/new-windows-attack-petitpotam-forces-windows-hosts-to-share-ntlm-hashes/)
18:53 – Story # 2: https://thehackernews.com/2021/07/how-to-mitigate-microsoft-windows-10-11.html (https://thehackernews.com/2021/07/how-to-mitigate-microsoft-windows-10-11.html)
30:26 – Story # 3: https://cyberworkx.in/2021/07/23/kaseya-received-the-universal-decryptor-for-revil-ransomware-attack/ (https://cyberworkx.in/2021/07/23/kaseya-received-the-universal-decryptor-for-revil-ransomware-attack/)
51:48 – Random Crap</itunes:summary>
      <itunes:subtitle>ORIGINALLY AIRED ON JULY 26, 2021
Articles discussed in this episode:
00:00 – BHIS | Talkin’ Bout News 2021-07-26
03:54 – Story # 1: https://cyberworkx.in/2021/07/24/new-windows-attack-petitpotam-forces-windows-hosts-to-share-ntlm-hashes/ (https://cyberwo</itunes:subtitle>
      <itunes:keywords>Infosec,Cybersecurity,news</itunes:keywords>
      <itunes:explicit>No</itunes:explicit>
    </item>
    <item>
      <title>Talkin’ About Infosec News – 7/28/2021</title>
      <itunes:episode>1</itunes:episode>
      <podcast:episode>1</podcast:episode>
      <itunes:title>Talkin’ About Infosec News – 7/28/2021</itunes:title>
      <itunes:episodeType>full</itunes:episodeType>
      <guid isPermaLink="false">https://www.blackhillsinfosec.com/?p=19330</guid>
      <link>https://share.transistor.fm/s/196109b7</link>
      <description>
        <![CDATA[Originally Aired on July 26, 2021



Articles discussed in this episode:



00:00 – BHIS | Talkin’ Bout News 2021-07-26 



03:54 – Story # 1: https://cyberworkx.in/2021/07/24/new-windows-attack-petitpotam-forces-windows-hosts-to-share-ntlm-hashes/ 



18:53 – Story # 2: https://thehackernews.com/2021/07/how-to-mitigate-microsoft-windows-10-11.html 



30:26 – Story # 3: https://cyberworkx.in/2021/07/23/kaseya-received-the-universal-decryptor-for-revil-ransomware-attack/ 



51:48 – Random Crap



















Check out our Cyber Range, not just a place to work through challenges and play, but also an open direct/hands-on training environment.    



https://www.blackhillsinfosec.com/services/cyber-range/ 











Join the BHIS Blog Mailing List – get notified when we post new blogs, webcasts, and podcasts.



            
									
						
						Join 3,696 other subscribers						
					
					                    
                        
							Email Address                        
                        
                    

					
                        
                        
                        
                        
						                        
	                        Subscribe]]>
      </description>
      <content:encoded>
        <![CDATA[Originally Aired on July 26, 2021



Articles discussed in this episode:



00:00 – BHIS | Talkin’ Bout News 2021-07-26 



03:54 – Story # 1: https://cyberworkx.in/2021/07/24/new-windows-attack-petitpotam-forces-windows-hosts-to-share-ntlm-hashes/ 



18:53 – Story # 2: https://thehackernews.com/2021/07/how-to-mitigate-microsoft-windows-10-11.html 



30:26 – Story # 3: https://cyberworkx.in/2021/07/23/kaseya-received-the-universal-decryptor-for-revil-ransomware-attack/ 



51:48 – Random Crap



















Check out our Cyber Range, not just a place to work through challenges and play, but also an open direct/hands-on training environment.    



https://www.blackhillsinfosec.com/services/cyber-range/ 











Join the BHIS Blog Mailing List – get notified when we post new blogs, webcasts, and podcasts.



            
									
						
						Join 3,696 other subscribers						
					
					                    
                        
							Email Address                        
                        
                    

					
                        
                        
                        
                        
						                        
	                        Subscribe]]>
      </content:encoded>
      <pubDate>Wed, 28 Jul 2021 12:12:20 -0400</pubDate>
      <author>Black Hills Information Security</author>
      <enclosure url="https://media.transistor.fm/196109b7/3c614e0a.mp3" length="38498684" type="audio/mpeg"/>
      <itunes:author>Black Hills Information Security</itunes:author>
      <itunes:duration>3207</itunes:duration>
      <itunes:summary>Originally Aired on July 26, 2021



Articles discussed in this episode:



00:00 – BHIS | Talkin’ Bout News 2021-07-26 



03:54 – Story # 1: https://cyberworkx.in/2021/07/24/new-windows-attack-petitpotam-forces-windows-hosts-to-share-ntlm-hashes/ 



18:53 – Story # 2: https://thehackernews.com/2021/07/how-to-mitigate-microsoft-windows-10-11.html 



30:26 – Story # 3: https://cyberworkx.in/2021/07/23/kaseya-received-the-universal-decryptor-for-revil-ransomware-attack/ 



51:48 – Random Crap



















Check out our Cyber Range, not just a place to work through challenges and play, but also an open direct/hands-on training environment.    



https://www.blackhillsinfosec.com/services/cyber-range/ 











Join the BHIS Blog Mailing List – get notified when we post new blogs, webcasts, and podcasts.



            
									
						
						Join 3,696 other subscribers						
					
					                    
                        
							Email Address                        
                        
                    

					
                        
                        
                        
                        
						                        
	                        Subscribe</itunes:summary>
      <itunes:subtitle>Originally Aired on July 26, 2021



Articles discussed in this episode:



00:00 – BHIS | Talkin’ Bout News 2021-07-26 



03:54 – Story # 1: https://cyberworkx.in/2021/07/24/new-windows-attack-petitpotam-forces-windows-hosts-to-share-ntlm-hashes/ 



18</itunes:subtitle>
      <itunes:keywords>Infosec,Cybersecurity,news</itunes:keywords>
      <itunes:explicit>No</itunes:explicit>
    </item>
    <item>
      <title>Webcast: No SPAN Port? No Tap? No Problem!</title>
      <itunes:episode>1</itunes:episode>
      <podcast:episode>1</podcast:episode>
      <itunes:title>Webcast: No SPAN Port? No Tap? No Problem!</itunes:title>
      <itunes:episodeType>full</itunes:episodeType>
      <guid isPermaLink="false">https://www.blackhillsinfosec.com/?p=19231</guid>
      <link>https://share.transistor.fm/s/466102ee</link>
      <description>
        <![CDATA[We’ve been having a problem with people that want to play with Security Onion or RITA at home. If a home router does not have a mirror port it can be difficult to try cool/free network monitoring tools. 



Sure, one could buy another router that has those features. But it is far easier to not do that. So, people don’t. Time goes on and they never get to play with the free enterprise-level cool tools at work or at home. 



However, there are a couple of ways to set up full network monitoring at home. No taps, no mirrored ports, no expensive/obscure devices to buy. 



In fact, the more basic and crappy the wireless router/switch is, the better these techniques work. 



So, in this Black Hills Information Security (BHIS) webcast, we will give you a super easy and hacky way to get open-source enterprise network monitoring up and running at home in no time flat.



Recorded • 2021-04-15 



Join the BHIS Community Discord: https://discord.gg/bhis



00:00 – FEATURE PRESENTATION: No SPAN Port? No Tap? No Problem! 



06:00 – Mental Blocks 



10:52 – Solution to Mental Blocks 



16:26 – ARP Cache Poisoning 



33:26 – Step One: Ubuntu 



34:36 – Step Two: RITA/Zeek/Mongo 



36:45 – Step Three: Install Bettercap 



38:09 – Step Four: Start Bettercap 



39:52 – Step Five: Advanced – arp-spoof 



45:46 – Success! 



47:08 – RITA: Import &amp; Analyze 



49:42 – RITA: Beacons 



52:35 – What Now? 



58:29 – QnA 



[Post]Show Job Hunting – https://youtu.
<ul><li>(00:00) - FEATURE PRESENTATION: No SPAN Port? No Tap? No Problem!</li>
<li>(06:00) - Mental Blocks</li>
<li>(09:41) - LINK : https://wildwesthackinfest.com/antisyphon//soc-core-skills-john-strand/</li>
<li>(10:49) - Solution to Mental Blocks</li>
<li>(16:13) - ARP Cache Poisoning</li>
<li>(33:06) - Step One: Ubuntu</li>
<li>(34:15) - Step Two: RITA/Zeek/Mongo</li>
<li>(36:19) - Step Three: Install Bettercap</li>
<li>(37:42) - Step Four: Start Bettercap</li>
<li>(39:25) - Step Five: Advanced &gt; arp-spoof</li>
<li>(45:16) - Success!</li>
<li>(46:38) - RITA: Import &amp; Analyze</li>
<li>(49:09) - RITA: Beacons</li>
<li>(52:01) - What Now?</li>
<li>(57:47) - QnA</li>
</ul>]]>
      </description>
      <content:encoded>
        <![CDATA[We’ve been having a problem with people that want to play with Security Onion or RITA at home. If a home router does not have a mirror port it can be difficult to try cool/free network monitoring tools. 



Sure, one could buy another router that has those features. But it is far easier to not do that. So, people don’t. Time goes on and they never get to play with the free enterprise-level cool tools at work or at home. 



However, there are a couple of ways to set up full network monitoring at home. No taps, no mirrored ports, no expensive/obscure devices to buy. 



In fact, the more basic and crappy the wireless router/switch is, the better these techniques work. 



So, in this Black Hills Information Security (BHIS) webcast, we will give you a super easy and hacky way to get open-source enterprise network monitoring up and running at home in no time flat.



Recorded • 2021-04-15 



Join the BHIS Community Discord: https://discord.gg/bhis



00:00 – FEATURE PRESENTATION: No SPAN Port? No Tap? No Problem! 



06:00 – Mental Blocks 



10:52 – Solution to Mental Blocks 



16:26 – ARP Cache Poisoning 



33:26 – Step One: Ubuntu 



34:36 – Step Two: RITA/Zeek/Mongo 



36:45 – Step Three: Install Bettercap 



38:09 – Step Four: Start Bettercap 



39:52 – Step Five: Advanced – arp-spoof 



45:46 – Success! 



47:08 – RITA: Import &amp; Analyze 



49:42 – RITA: Beacons 



52:35 – What Now? 



58:29 – QnA 



[Post]Show Job Hunting – https://youtu.
<ul><li>(00:00) - FEATURE PRESENTATION: No SPAN Port? No Tap? No Problem!</li>
<li>(06:00) - Mental Blocks</li>
<li>(09:41) - LINK : https://wildwesthackinfest.com/antisyphon//soc-core-skills-john-strand/</li>
<li>(10:49) - Solution to Mental Blocks</li>
<li>(16:13) - ARP Cache Poisoning</li>
<li>(33:06) - Step One: Ubuntu</li>
<li>(34:15) - Step Two: RITA/Zeek/Mongo</li>
<li>(36:19) - Step Three: Install Bettercap</li>
<li>(37:42) - Step Four: Start Bettercap</li>
<li>(39:25) - Step Five: Advanced &gt; arp-spoof</li>
<li>(45:16) - Success!</li>
<li>(46:38) - RITA: Import &amp; Analyze</li>
<li>(49:09) - RITA: Beacons</li>
<li>(52:01) - What Now?</li>
<li>(57:47) - QnA</li>
</ul>]]>
      </content:encoded>
      <pubDate>Fri, 23 Jul 2021 11:50:42 -0400</pubDate>
      <author>Black Hills Information Security</author>
      <enclosure url="https://media.transistor.fm/466102ee/41253627.mp3" length="49738349" type="audio/mpeg"/>
      <itunes:author>Black Hills Information Security</itunes:author>
      <itunes:image href="https://img.transistorcdn.com/_3XdWOTLfnsHYbRKkX4oQnnO0MwCcFvvE9dEU0PbNg4/rs:fill:0:0:1/w:1400/h:1400/q:60/mb:500000/aHR0cHM6Ly9pbWct/dXBsb2FkLXByb2R1/Y3Rpb24udHJhbnNp/c3Rvci5mbS8xOWM4/Nzg1YmJkYjIxYWNi/MmU3NmMyOTkyNGNi/NTQ5OC5qcGc.jpg"/>
      <itunes:duration>3949</itunes:duration>
      <itunes:summary>We’ve been having a problem with people that want to play with Security Onion or RITA at home. If a home router does not have a mirror port it can be difficult to try cool/free network monitoring tools. 



Sure, one could buy another router that has those features. But it is far easier to not do that. So, people don’t. Time goes on and they never get to play with the free enterprise-level cool tools at work or at home. 



However, there are a couple of ways to set up full network monitoring at home. No taps, no mirrored ports, no expensive/obscure devices to buy. 



In fact, the more basic and crappy the wireless router/switch is, the better these techniques work. 



So, in this Black Hills Information Security (BHIS) webcast, we will give you a super easy and hacky way to get open-source enterprise network monitoring up and running at home in no time flat.



Recorded • 2021-04-15 



Join the BHIS Community Discord: https://discord.gg/bhis



00:00 – FEATURE PRESENTATION: No SPAN Port? No Tap? No Problem! 



06:00 – Mental Blocks 



10:52 – Solution to Mental Blocks 



16:26 – ARP Cache Poisoning 



33:26 – Step One: Ubuntu 



34:36 – Step Two: RITA/Zeek/Mongo 



36:45 – Step Three: Install Bettercap 



38:09 – Step Four: Start Bettercap 



39:52 – Step Five: Advanced – arp-spoof 



45:46 – Success! 



47:08 – RITA: Import &amp;amp; Analyze 



49:42 – RITA: Beacons 



52:35 – What Now? 



58:29 – QnA 



[Post]Show Job Hunting – https://youtu.</itunes:summary>
      <itunes:subtitle>We’ve been having a problem with people that want to play with Security Onion or RITA at home. If a home router does not have a mirror port it can be difficult to try cool/free network monitoring tools. 



Sure, one could buy another router that has thos</itunes:subtitle>
      <itunes:keywords>Infosec,Cybersecurity,news</itunes:keywords>
      <itunes:explicit>No</itunes:explicit>
      <podcast:chapters url="https://share.transistor.fm/s/466102ee/chapters.json" type="application/json+chapters"/>
    </item>
    <item>
      <title>Talkin’ About Infosec News – 7/21/2021</title>
      <itunes:episode>1</itunes:episode>
      <podcast:episode>1</podcast:episode>
      <itunes:title>Talkin’ About Infosec News – 7/21/2021</itunes:title>
      <itunes:episodeType>full</itunes:episodeType>
      <guid isPermaLink="false">https://www.blackhillsinfosec.com/?p=19225</guid>
      <link>https://share.transistor.fm/s/2bce9ecf</link>
      <description>
        <![CDATA[Originally Aired on July 19, 2021



Articles discussed in this episode:



00:00 – BHIS | Talkin’ Bout News 2021-07-19



02:18 – Story # 1: https://github.com/fail2ban/fail2ban/security/advisories/GHSA-m985-3f3v-cwmm



13:15 – Story # 2: https://threatpost.com/attackers-target-florida-condo-collapse-victims/167917/



16:00 – Story # 3: https://citizenlab.ca/2021/07/hooking-candiru-another-mercenary-spyware-vendor-comes-into-focus/



34:41 – Story # 4: https://thehackernews.com/2021/07/turns-out-that-low-risk-ios-wi-fi.html



42:36 – Story # 5: https://thehackernews.com/2021/07/chinas-new-law-requires-researchers-to.html



53:13 – [Post]Show Banter™ — Can’t Get Lumber



















Check out our Cyber Range, not just a place to work through challenges and play, but also an open direct/hands-on training environment.    



https://www.blackhillsinfosec.com/services/cyber-range/ 















Join the BHIS Blog Mailing List – get notified when we post new blogs, webcasts, and podcasts.



            
									
						
						Join 3,639 other subscribers						
					
					                    
                        
							Email Address                        
                        
                    

					
                        
                        
                        
                        
						                        
	                        Subscribe
<ul><li>(00:00) - BHIS | Talkin' Bout News 2021-07-20</li>
<li>(02:18) - Story # 1: https://github.com/fail2ban/fail2ban/security/advisories/GHSA-m985-3f3v-cwmm</li>
<li>(13:15) - Story # 2: https://threatpost.com/attackers-target-florida-condo-collapse-victims/167917/</li>
<li>(16:00) - Story # 3: https://citizenlab.ca/2021/07/hooking-candiru-another-mercenary-spyware-vendor-comes-into-focus/</li>
<li>(34:41) - Story # 4: https://thehackernews.com/2021/07/turns-out-that-low-risk-ios-wi-fi.html</li>
<li>(42:36) - Story # 5: https://thehackernews.com/2021/07/chinas-new-law-requires-researchers-to.html</li>
<li>(53:13) - [Post]Show Banter™ — Can't Get Lumber</li>
</ul>]]>
      </description>
      <content:encoded>
        <![CDATA[Originally Aired on July 19, 2021



Articles discussed in this episode:



00:00 – BHIS | Talkin’ Bout News 2021-07-19



02:18 – Story # 1: https://github.com/fail2ban/fail2ban/security/advisories/GHSA-m985-3f3v-cwmm



13:15 – Story # 2: https://threatpost.com/attackers-target-florida-condo-collapse-victims/167917/



16:00 – Story # 3: https://citizenlab.ca/2021/07/hooking-candiru-another-mercenary-spyware-vendor-comes-into-focus/



34:41 – Story # 4: https://thehackernews.com/2021/07/turns-out-that-low-risk-ios-wi-fi.html



42:36 – Story # 5: https://thehackernews.com/2021/07/chinas-new-law-requires-researchers-to.html



53:13 – [Post]Show Banter™ — Can’t Get Lumber



















Check out our Cyber Range, not just a place to work through challenges and play, but also an open direct/hands-on training environment.    



https://www.blackhillsinfosec.com/services/cyber-range/ 















Join the BHIS Blog Mailing List – get notified when we post new blogs, webcasts, and podcasts.



            
									
						
						Join 3,639 other subscribers						
					
					                    
                        
							Email Address                        
                        
                    

					
                        
                        
                        
                        
						                        
	                        Subscribe
<ul><li>(00:00) - BHIS | Talkin' Bout News 2021-07-20</li>
<li>(02:18) - Story # 1: https://github.com/fail2ban/fail2ban/security/advisories/GHSA-m985-3f3v-cwmm</li>
<li>(13:15) - Story # 2: https://threatpost.com/attackers-target-florida-condo-collapse-victims/167917/</li>
<li>(16:00) - Story # 3: https://citizenlab.ca/2021/07/hooking-candiru-another-mercenary-spyware-vendor-comes-into-focus/</li>
<li>(34:41) - Story # 4: https://thehackernews.com/2021/07/turns-out-that-low-risk-ios-wi-fi.html</li>
<li>(42:36) - Story # 5: https://thehackernews.com/2021/07/chinas-new-law-requires-researchers-to.html</li>
<li>(53:13) - [Post]Show Banter™ — Can't Get Lumber</li>
</ul>]]>
      </content:encoded>
      <pubDate>Wed, 21 Jul 2021 16:00:48 -0400</pubDate>
      <author>Black Hills Information Security</author>
      <enclosure url="https://media.transistor.fm/2bce9ecf/db0fa140.mp3" length="41408172" type="audio/mpeg"/>
      <itunes:author>Black Hills Information Security</itunes:author>
      <itunes:image href="https://img.transistorcdn.com/7EnU3iP2Hj6DZhNrYRc_QAclYb-_sHNeIq4osKlbJrw/rs:fill:0:0:1/w:1400/h:1400/q:60/mb:500000/aHR0cHM6Ly9pbWct/dXBsb2FkLXByb2R1/Y3Rpb24udHJhbnNp/c3Rvci5mbS9jM2Jh/Y2E2M2NlNGE1NjUx/NmY3ZDEzOTVhMzkx/MWFmMy5qcGc.jpg"/>
      <itunes:duration>3245</itunes:duration>
      <itunes:summary>Originally Aired on July 19, 2021



Articles discussed in this episode:



00:00 – BHIS | Talkin’ Bout News 2021-07-19



02:18 – Story # 1: https://github.com/fail2ban/fail2ban/security/advisories/GHSA-m985-3f3v-cwmm



13:15 – Story # 2: https://threatpost.com/attackers-target-florida-condo-collapse-victims/167917/



16:00 – Story # 3: https://citizenlab.ca/2021/07/hooking-candiru-another-mercenary-spyware-vendor-comes-into-focus/



34:41 – Story # 4: https://thehackernews.com/2021/07/turns-out-that-low-risk-ios-wi-fi.html



42:36 – Story # 5: https://thehackernews.com/2021/07/chinas-new-law-requires-researchers-to.html



53:13 – [Post]Show Banter™ — Can’t Get Lumber



















Check out our Cyber Range, not just a place to work through challenges and play, but also an open direct/hands-on training environment.    



https://www.blackhillsinfosec.com/services/cyber-range/ 















Join the BHIS Blog Mailing List – get notified when we post new blogs, webcasts, and podcasts.



            
									
						
						Join 3,639 other subscribers						
					
					                    
                        
							Email Address                        
                        
                    

					
                        
                        
                        
                        
						                        
	                        Subscribe</itunes:summary>
      <itunes:subtitle>Originally Aired on July 19, 2021



Articles discussed in this episode:



00:00 – BHIS | Talkin’ Bout News 2021-07-19



02:18 – Story # 1: https://github.com/fail2ban/fail2ban/security/advisories/GHSA-m985-3f3v-cwmm



13:15 – Story # 2: https://threat</itunes:subtitle>
      <itunes:keywords>Infosec,Cybersecurity,news</itunes:keywords>
      <itunes:explicit>No</itunes:explicit>
      <podcast:chapters url="https://share.transistor.fm/s/2bce9ecf/chapters.json" type="application/json+chapters"/>
    </item>
    <item>
      <title>Talkin’ About Infosec News – 7/12/2021</title>
      <itunes:episode>1</itunes:episode>
      <podcast:episode>1</podcast:episode>
      <itunes:title>Talkin’ About Infosec News – 7/12/2021</itunes:title>
      <itunes:episodeType>full</itunes:episodeType>
      <guid isPermaLink="false">https://www.blackhillsinfosec.com/?p=19191</guid>
      <link>https://share.transistor.fm/s/b208d74f</link>
      <description>
        <![CDATA[Originally Aired on July 12, 2021



Articles discussed in this episode:



00:00 – BHIS | Talkin’ Bout News 2021-07-12



01:56 – Story # 1: https://www.bleepingcomputer.com/news/security/biden-asks-putin-to-crack-down-on-russian-based-ransomware-gangs/



03:09 – Russia’s R.A.R.E. Program



03:54 – Story # 2: https://www.securityweek.com/solarwinds-confirms-new-zero-day-flaw-under-attack



05:33 – Story # 3: https://thehackernews.com/2021/07/hackers-spread-biopass-malware-via.html



08:44 – Story # 4: https://thehackernews.com/2021/07/magecart-hackers-hide-stolen-credit.html



11:53 – Story # 5: https://www.bleepingcomputer.com/news/security/mint-mobile-hit-by-a-data-breach-after-numbers-ported-data-accessed/



15:31 – Story # 6: https://www.microsoft.com/security/blog/2021/07/12/microsoft-to-acquire-riskiq-to-strengthen-cybersecurity-of-digital-transformation-and-hybrid-work/



18:42 – Story # 7: https://threatpost.com/lazarus-engineers-malicious-docs/167647/



29:02 – Story # 8: https://www.bleepingcomputer.com/news/security/insurance-giant-cna-reports-data-breach-after-ransomware-attack/



35:21 – Story # 9: https://thehackernews.com/2021/07/critical-flaws-reported-in-philips-vue.html



46:19 – Story # 10: https://www.bleepingcomputer.com/news/security/fashion-retailer-guess-discloses-data-breach-after-ransomware-attack/



48:16 – Story # 11: https://www.securityweek.com/morgan-stanley-hit-accellion-hack-through-third-party-vendor



49:37 – PDF Doc Details: https://www.doj.nh.
<ul><li>(00:00) - BHIS | Talkin' Bout News 2021-07-12</li>
<li>(01:56) - Story # 1: https://www.bleepingcomputer.com/news/security/biden-asks-putin-to-crack-down-on-russian-based-ransomware-gangs/</li>
<li>(03:09) - Russia's R.A.R.E. Program (Fan Graphic)</li>
<li>(03:54) - Story # 2: https://www.securityweek.com/solarwinds-confirms-new-zero-day-flaw-under-attack</li>
<li>(05:33) - Story # 3: https://thehackernews.com/2021/07/hackers-spread-biopass-malware-via.html</li>
<li>(08:44) - Story # 4: https://thehackernews.com/2021/07/magecart-hackers-hide-stolen-credit.html</li>
<li>(11:53) - Story # 5: https://www.bleepingcomputer.com/news/security/mint-mobile-hit-by-a-data-breach-after-numbers-ported-data-accessed/</li>
<li>(15:31) - Story # 6: https://www.microsoft.com/security/blog/2021/07/12/microsoft-to-acquire-riskiq-to-strengthen-cybersecurity-of-digital-transformation-and-hybrid-work/</li>
<li>(18:42) - Story # 7: https://threatpost.com/lazarus-engineers-malicious-docs/167647/</li>
<li>(29:02) - Story # 8: https://www.bleepingcomputer.com/news/security/insurance-giant-cna-reports-data-breach-after-ransomware-attack/</li>
<li>(35:21) - Story # 9: https://thehackernews.com/2021/07/critical-flaws-reported-in-philips-vue.html</li>
<li>(46:19) - Story # 10: https://www.bleepingcomputer.com/news/security/fashion-retailer-guess-discloses-data-breach-after-ransomware-attack/</li>
<li>(48:16) - Story # 11: https://www.securityweek.com/morgan-stanley-hit-accellion-hack-through-third-party-vendor</li>
<li>(49:37) - PDF Doc Details: https://www.doj.nh.gov/consumer/security-breaches/documents/morgan-stanley-20210702.pdf</li>
</ul>]]>
      </description>
      <content:encoded>
        <![CDATA[Originally Aired on July 12, 2021



Articles discussed in this episode:



00:00 – BHIS | Talkin’ Bout News 2021-07-12



01:56 – Story # 1: https://www.bleepingcomputer.com/news/security/biden-asks-putin-to-crack-down-on-russian-based-ransomware-gangs/



03:09 – Russia’s R.A.R.E. Program



03:54 – Story # 2: https://www.securityweek.com/solarwinds-confirms-new-zero-day-flaw-under-attack



05:33 – Story # 3: https://thehackernews.com/2021/07/hackers-spread-biopass-malware-via.html



08:44 – Story # 4: https://thehackernews.com/2021/07/magecart-hackers-hide-stolen-credit.html



11:53 – Story # 5: https://www.bleepingcomputer.com/news/security/mint-mobile-hit-by-a-data-breach-after-numbers-ported-data-accessed/



15:31 – Story # 6: https://www.microsoft.com/security/blog/2021/07/12/microsoft-to-acquire-riskiq-to-strengthen-cybersecurity-of-digital-transformation-and-hybrid-work/



18:42 – Story # 7: https://threatpost.com/lazarus-engineers-malicious-docs/167647/



29:02 – Story # 8: https://www.bleepingcomputer.com/news/security/insurance-giant-cna-reports-data-breach-after-ransomware-attack/



35:21 – Story # 9: https://thehackernews.com/2021/07/critical-flaws-reported-in-philips-vue.html



46:19 – Story # 10: https://www.bleepingcomputer.com/news/security/fashion-retailer-guess-discloses-data-breach-after-ransomware-attack/



48:16 – Story # 11: https://www.securityweek.com/morgan-stanley-hit-accellion-hack-through-third-party-vendor



49:37 – PDF Doc Details: https://www.doj.nh.
<ul><li>(00:00) - BHIS | Talkin' Bout News 2021-07-12</li>
<li>(01:56) - Story # 1: https://www.bleepingcomputer.com/news/security/biden-asks-putin-to-crack-down-on-russian-based-ransomware-gangs/</li>
<li>(03:09) - Russia's R.A.R.E. Program (Fan Graphic)</li>
<li>(03:54) - Story # 2: https://www.securityweek.com/solarwinds-confirms-new-zero-day-flaw-under-attack</li>
<li>(05:33) - Story # 3: https://thehackernews.com/2021/07/hackers-spread-biopass-malware-via.html</li>
<li>(08:44) - Story # 4: https://thehackernews.com/2021/07/magecart-hackers-hide-stolen-credit.html</li>
<li>(11:53) - Story # 5: https://www.bleepingcomputer.com/news/security/mint-mobile-hit-by-a-data-breach-after-numbers-ported-data-accessed/</li>
<li>(15:31) - Story # 6: https://www.microsoft.com/security/blog/2021/07/12/microsoft-to-acquire-riskiq-to-strengthen-cybersecurity-of-digital-transformation-and-hybrid-work/</li>
<li>(18:42) - Story # 7: https://threatpost.com/lazarus-engineers-malicious-docs/167647/</li>
<li>(29:02) - Story # 8: https://www.bleepingcomputer.com/news/security/insurance-giant-cna-reports-data-breach-after-ransomware-attack/</li>
<li>(35:21) - Story # 9: https://thehackernews.com/2021/07/critical-flaws-reported-in-philips-vue.html</li>
<li>(46:19) - Story # 10: https://www.bleepingcomputer.com/news/security/fashion-retailer-guess-discloses-data-breach-after-ransomware-attack/</li>
<li>(48:16) - Story # 11: https://www.securityweek.com/morgan-stanley-hit-accellion-hack-through-third-party-vendor</li>
<li>(49:37) - PDF Doc Details: https://www.doj.nh.gov/consumer/security-breaches/documents/morgan-stanley-20210702.pdf</li>
</ul>]]>
      </content:encoded>
      <pubDate>Fri, 16 Jul 2021 16:44:07 -0400</pubDate>
      <author>Black Hills Information Security</author>
      <enclosure url="https://media.transistor.fm/b208d74f/8bc68548.mp3" length="40735373" type="audio/mpeg"/>
      <itunes:author>Black Hills Information Security</itunes:author>
      <itunes:image href="https://img.transistorcdn.com/dJk9aJuBwHM4WRuPtzBL0_kdXtCzESEuKbcd8A2VEfQ/rs:fill:0:0:1/w:1400/h:1400/q:60/mb:500000/aHR0cHM6Ly9pbWct/dXBsb2FkLXByb2R1/Y3Rpb24udHJhbnNp/c3Rvci5mbS9mZGJh/YzI0YjJmODdhODMy/ZDMyMmFjNGIzMTU1/NWNhZi5qcGc.jpg"/>
      <itunes:duration>3190</itunes:duration>
      <itunes:summary>Originally Aired on July 12, 2021



Articles discussed in this episode:



00:00 – BHIS | Talkin’ Bout News 2021-07-12



01:56 – Story # 1: https://www.bleepingcomputer.com/news/security/biden-asks-putin-to-crack-down-on-russian-based-ransomware-gangs/



03:09 – Russia’s R.A.R.E. Program



03:54 – Story # 2: https://www.securityweek.com/solarwinds-confirms-new-zero-day-flaw-under-attack



05:33 – Story # 3: https://thehackernews.com/2021/07/hackers-spread-biopass-malware-via.html



08:44 – Story # 4: https://thehackernews.com/2021/07/magecart-hackers-hide-stolen-credit.html



11:53 – Story # 5: https://www.bleepingcomputer.com/news/security/mint-mobile-hit-by-a-data-breach-after-numbers-ported-data-accessed/



15:31 – Story # 6: https://www.microsoft.com/security/blog/2021/07/12/microsoft-to-acquire-riskiq-to-strengthen-cybersecurity-of-digital-transformation-and-hybrid-work/



18:42 – Story # 7: https://threatpost.com/lazarus-engineers-malicious-docs/167647/



29:02 – Story # 8: https://www.bleepingcomputer.com/news/security/insurance-giant-cna-reports-data-breach-after-ransomware-attack/



35:21 – Story # 9: https://thehackernews.com/2021/07/critical-flaws-reported-in-philips-vue.html



46:19 – Story # 10: https://www.bleepingcomputer.com/news/security/fashion-retailer-guess-discloses-data-breach-after-ransomware-attack/



48:16 – Story # 11: https://www.securityweek.com/morgan-stanley-hit-accellion-hack-through-third-party-vendor



49:37 – PDF Doc Details: https://www.doj.nh.</itunes:summary>
      <itunes:subtitle>Originally Aired on July 12, 2021



Articles discussed in this episode:



00:00 – BHIS | Talkin’ Bout News 2021-07-12



01:56 – Story # 1: https://www.bleepingcomputer.com/news/security/biden-asks-putin-to-crack-down-on-russian-based-ransomware-gangs/
</itunes:subtitle>
      <itunes:keywords>Infosec,Cybersecurity,news</itunes:keywords>
      <itunes:explicit>No</itunes:explicit>
      <podcast:chapters url="https://share.transistor.fm/s/b208d74f/chapters.json" type="application/json+chapters"/>
    </item>
    <item>
      <title>Webcast: How to Build a Phishing Engagement - Coding TTP's</title>
      <itunes:episode>1</itunes:episode>
      <podcast:episode>1</podcast:episode>
      <itunes:title>Webcast: How to Build a Phishing Engagement - Coding TTP's</itunes:title>
      <itunes:episodeType>full</itunes:episodeType>
      <guid isPermaLink="false">https://www.blackhillsinfosec.com/?p=19153</guid>
      <link>https://share.transistor.fm/s/afeb5086</link>
      <description>
        <![CDATA[Building a phishing engagement is hard. While the concept is straightforward, real-world execution is tricky. Being successful takes enormous amounts of up-front setup and knowledge in quickly evolving phishing tactics. While there is always a need to craft a custom email, the most considerable amount of work is setting up an infrastructure to make it all work. 



Wouldn’t it be nice if you had a playbook of how to set everything up to save time and prevent mistakes? 



What if we coded this playbook so we could share this with others and modify our tactics when things change? 



In this Black Hills Information Security (BHIS) webcast, we’re going to do just that. We will take a top-down look at how a phishing engagement is designed. Then we will work through coding this design, so we don’t have to keep building a phish. Lastly, we will touch on how to fly under the radar and how coding TTP’s help save time and guarantee accuracy. 



Join the BHIS Community Discord: https://discord.gg/bhis 



Music By Beau: https://www.nobandwidth.io 



00:00 – FEATURE PRESENTATION: How to Build a Phishing Engagement – Coding TTP’s 



01:06 – About Ralph May 



01:58 – Disclaimers 



03:19 – Overview 



03:56 – Phishing is Hard 



06:33 – Infrastructure 



07:12 – Operational Security 



08:39 – Designing a Phish 



13:18 – Phishing Emails 



15:48 – 1st Tool: EVILGINX2 



17:30 – EVILGINX IOC’s 



18:20 – 2nd Tool: GoPhish 



19:08 – GoPhish IOC’s 



20:52 – 3rd Tool: NGINX
<ul><li>(00:00) - FEATURE PRESENTATION: How to Build a Phishing Engagement - Coding TTP's</li>
<li>(01:02) - About Ralph May</li>
<li>(01:51) - Disclaimers</li>
<li>(03:06) - Overview</li>
<li>(03:43) - Phishing is Hard</li>
<li>(06:20) - Infrastructure</li>
<li>(06:59) - Operational Security</li>
<li>(08:26) - Designing a Phish</li>
<li>(13:01) - Phishing Emails</li>
<li>(15:29) - 1st Tool: EVILGINX2</li>
<li>(17:10) - EVILGINX IOC's</li>
<li>(18:00) - 2nd Tool: GoPhish</li>
<li>(18:48) - GoPhish IOC's</li>
<li>(20:31) - 3rd Tool: NGINX</li>
<li>(21:45) - 4th Tool: Digital Ocean Cloud Provider</li>
<li>(22:10) - 5th Tool: Mailgun Email Service</li>
<li>(22:52) - 6th Tool: CDN-Azure</li>
<li>(23:33) - Coding a Phish – 1st Tool: Ansible</li>
<li>(26:09) - 2nd Tool: Terraform</li>
<li>(28:36) - 3rd Tool: Docker</li>
<li>(30:22) - Combining Ansible and Terraform</li>
<li>(32:14) - Ansible Secrets</li>
<li>(34:04) - DEMO: Executing a Phishing Engagement</li>
<li>(41:57) - What's Next</li>
<li>(43:19) - QnA</li>
<li>(56:03) - PostShow Banter™  — Ohs and Ahs</li>
</ul>]]>
      </description>
      <content:encoded>
        <![CDATA[Building a phishing engagement is hard. While the concept is straightforward, real-world execution is tricky. Being successful takes enormous amounts of up-front setup and knowledge in quickly evolving phishing tactics. While there is always a need to craft a custom email, the most considerable amount of work is setting up an infrastructure to make it all work. 



Wouldn’t it be nice if you had a playbook of how to set everything up to save time and prevent mistakes? 



What if we coded this playbook so we could share this with others and modify our tactics when things change? 



In this Black Hills Information Security (BHIS) webcast, we’re going to do just that. We will take a top-down look at how a phishing engagement is designed. Then we will work through coding this design, so we don’t have to keep building a phish. Lastly, we will touch on how to fly under the radar and how coding TTP’s help save time and guarantee accuracy. 



Join the BHIS Community Discord: https://discord.gg/bhis 



Music By Beau: https://www.nobandwidth.io 



00:00 – FEATURE PRESENTATION: How to Build a Phishing Engagement – Coding TTP’s 



01:06 – About Ralph May 



01:58 – Disclaimers 



03:19 – Overview 



03:56 – Phishing is Hard 



06:33 – Infrastructure 



07:12 – Operational Security 



08:39 – Designing a Phish 



13:18 – Phishing Emails 



15:48 – 1st Tool: EVILGINX2 



17:30 – EVILGINX IOC’s 



18:20 – 2nd Tool: GoPhish 



19:08 – GoPhish IOC’s 



20:52 – 3rd Tool: NGINX
<ul><li>(00:00) - FEATURE PRESENTATION: How to Build a Phishing Engagement - Coding TTP's</li>
<li>(01:02) - About Ralph May</li>
<li>(01:51) - Disclaimers</li>
<li>(03:06) - Overview</li>
<li>(03:43) - Phishing is Hard</li>
<li>(06:20) - Infrastructure</li>
<li>(06:59) - Operational Security</li>
<li>(08:26) - Designing a Phish</li>
<li>(13:01) - Phishing Emails</li>
<li>(15:29) - 1st Tool: EVILGINX2</li>
<li>(17:10) - EVILGINX IOC's</li>
<li>(18:00) - 2nd Tool: GoPhish</li>
<li>(18:48) - GoPhish IOC's</li>
<li>(20:31) - 3rd Tool: NGINX</li>
<li>(21:45) - 4th Tool: Digital Ocean Cloud Provider</li>
<li>(22:10) - 5th Tool: Mailgun Email Service</li>
<li>(22:52) - 6th Tool: CDN-Azure</li>
<li>(23:33) - Coding a Phish – 1st Tool: Ansible</li>
<li>(26:09) - 2nd Tool: Terraform</li>
<li>(28:36) - 3rd Tool: Docker</li>
<li>(30:22) - Combining Ansible and Terraform</li>
<li>(32:14) - Ansible Secrets</li>
<li>(34:04) - DEMO: Executing a Phishing Engagement</li>
<li>(41:57) - What's Next</li>
<li>(43:19) - QnA</li>
<li>(56:03) - PostShow Banter™  — Ohs and Ahs</li>
</ul>]]>
      </content:encoded>
      <pubDate>Wed, 14 Jul 2021 08:20:00 -0400</pubDate>
      <author>Black Hills Information Security</author>
      <enclosure url="https://media.transistor.fm/afeb5086/98ad63a5.mp3" length="49926098" type="audio/mpeg"/>
      <itunes:author>Black Hills Information Security</itunes:author>
      <itunes:image href="https://img.transistorcdn.com/iEMIIDCbBDozFR3_tH2VbVnL2DFmIIbeD3seZ53zcZo/rs:fill:0:0:1/w:1400/h:1400/q:60/mb:500000/aHR0cHM6Ly9pbWct/dXBsb2FkLXByb2R1/Y3Rpb24udHJhbnNp/c3Rvci5mbS9mNmQ4/NzExMDg1OTJmYmQ2/Yzc4NTFiNWJiY2I1/MTdmMi5qcGc.jpg"/>
      <itunes:duration>3895</itunes:duration>
      <itunes:summary>Building a phishing engagement is hard. While the concept is straightforward, real-world execution is tricky. Being successful takes enormous amounts of up-front setup and knowledge in quickly evolving phishing tactics. While there is always a need to craft a custom email, the most considerable amount of work is setting up an infrastructure to make it all work. 



Wouldn’t it be nice if you had a playbook of how to set everything up to save time and prevent mistakes? 



What if we coded this playbook so we could share this with others and modify our tactics when things change? 



In this Black Hills Information Security (BHIS) webcast, we’re going to do just that. We will take a top-down look at how a phishing engagement is designed. Then we will work through coding this design, so we don’t have to keep building a phish. Lastly, we will touch on how to fly under the radar and how coding TTP’s help save time and guarantee accuracy. 



Join the BHIS Community Discord: https://discord.gg/bhis 



Music By Beau: https://www.nobandwidth.io 



00:00 – FEATURE PRESENTATION: How to Build a Phishing Engagement – Coding TTP’s 



01:06 – About Ralph May 



01:58 – Disclaimers 



03:19 – Overview 



03:56 – Phishing is Hard 



06:33 – Infrastructure 



07:12 – Operational Security 



08:39 – Designing a Phish 



13:18 – Phishing Emails 



15:48 – 1st Tool: EVILGINX2 



17:30 – EVILGINX IOC’s 



18:20 – 2nd Tool: GoPhish 



19:08 – GoPhish IOC’s 



20:52 – 3rd Tool: NGINX</itunes:summary>
      <itunes:subtitle>Building a phishing engagement is hard. While the concept is straightforward, real-world execution is tricky. Being successful takes enormous amounts of up-front setup and knowledge in quickly evolving phishing tactics. While there is always a need to cra</itunes:subtitle>
      <itunes:keywords>Infosec,Cybersecurity,news</itunes:keywords>
      <itunes:explicit>No</itunes:explicit>
      <podcast:chapters url="https://share.transistor.fm/s/afeb5086/chapters.json" type="application/json+chapters"/>
    </item>
    <item>
      <title>The Birth of PreShowBanterCon-A-Thon 2021!™</title>
      <itunes:episode>1</itunes:episode>
      <podcast:episode>1</podcast:episode>
      <itunes:title>The Birth of PreShowBanterCon-A-Thon 2021!™</itunes:title>
      <itunes:episodeType>full</itunes:episodeType>
      <guid isPermaLink="false">https://www.blackhillsinfosec.com/?p=19145</guid>
      <link>https://share.transistor.fm/s/29db46f1</link>
      <description>
        <![CDATA[Join the BHIS Community Discord: https://discord.gg/bhis 



Music By Beau: https://www.nobandwidth.io 



00:00 – 2021-04-01 – PreShow Banter™ — Intro Sec Con &amp; The Birth of PreShowBanterCon-A-Thon 2021!™ 



05:29 – You’re So Vanity 



08:39 – Let’s Talk About Florida Man 



11:27 – Kellon is here – Intro Sec Con



















Check out our Cyber Range, not just a place to work through challenges and play, but also an open direct/hands-on training environment.    



https://www.blackhillsinfosec.com/services/cyber-range/ 















Join the BHIS Blog Mailing List – get notified when we post new blogs, webcasts, and podcasts.



            
									
						
						Join 3,588 other subscribers						
					
					                    
                        
							Email Address                        
                        
                    

					
                        
                        
                        
                        
						                        
	                        Subscribe
<ul><li>(00:00) - 2021-04-01 - PreShow Banter™ — Intro Sec Con &amp; The Birth of PreShowBanterCon-A-Thon 2021!™</li>
<li>(08:28) - Let's Talk About Florida Man</li>
<li>(11:12) - Kellon is here - Intro Sec Con</li>
</ul>]]>
      </description>
      <content:encoded>
        <![CDATA[Join the BHIS Community Discord: https://discord.gg/bhis 



Music By Beau: https://www.nobandwidth.io 



00:00 – 2021-04-01 – PreShow Banter™ — Intro Sec Con &amp; The Birth of PreShowBanterCon-A-Thon 2021!™ 



05:29 – You’re So Vanity 



08:39 – Let’s Talk About Florida Man 



11:27 – Kellon is here – Intro Sec Con



















Check out our Cyber Range, not just a place to work through challenges and play, but also an open direct/hands-on training environment.    



https://www.blackhillsinfosec.com/services/cyber-range/ 















Join the BHIS Blog Mailing List – get notified when we post new blogs, webcasts, and podcasts.



            
									
						
						Join 3,588 other subscribers						
					
					                    
                        
							Email Address                        
                        
                    

					
                        
                        
                        
                        
						                        
	                        Subscribe
<ul><li>(00:00) - 2021-04-01 - PreShow Banter™ — Intro Sec Con &amp; The Birth of PreShowBanterCon-A-Thon 2021!™</li>
<li>(08:28) - Let's Talk About Florida Man</li>
<li>(11:12) - Kellon is here - Intro Sec Con</li>
</ul>]]>
      </content:encoded>
      <pubDate>Tue, 13 Jul 2021 08:24:32 -0400</pubDate>
      <author>Black Hills Information Security</author>
      <enclosure url="https://media.transistor.fm/29db46f1/a6a0d4ce.mp3" length="15437594" type="audio/mpeg"/>
      <itunes:author>Black Hills Information Security</itunes:author>
      <itunes:image href="https://img.transistorcdn.com/V13ElLTYtDCxwtL1vCs0iP5r5IaK5O4zVGJQuMi49V0/rs:fill:0:0:1/w:1400/h:1400/q:60/mb:500000/aHR0cHM6Ly9pbWct/dXBsb2FkLXByb2R1/Y3Rpb24udHJhbnNp/c3Rvci5mbS85MWNl/YmJjMmZkMWJjNmRj/ODc5NTBhOGEwYWMz/NWMzNy5qcGc.jpg"/>
      <itunes:duration>1236</itunes:duration>
      <itunes:summary>Join the BHIS Community Discord: https://discord.gg/bhis 



Music By Beau: https://www.nobandwidth.io 



00:00 – 2021-04-01 – PreShow Banter™ — Intro Sec Con &amp;amp; The Birth of PreShowBanterCon-A-Thon 2021!™ 



05:29 – You’re So Vanity 



08:39 – Let’s Talk About Florida Man 



11:27 – Kellon is here – Intro Sec Con



















Check out our Cyber Range, not just a place to work through challenges and play, but also an open direct/hands-on training environment.    



https://www.blackhillsinfosec.com/services/cyber-range/ 















Join the BHIS Blog Mailing List – get notified when we post new blogs, webcasts, and podcasts.



            
									
						
						Join 3,588 other subscribers						
					
					                    
                        
							Email Address                        
                        
                    

					
                        
                        
                        
                        
						                        
	                        Subscribe</itunes:summary>
      <itunes:subtitle>Join the BHIS Community Discord: https://discord.gg/bhis 



Music By Beau: https://www.nobandwidth.io 



00:00 – 2021-04-01 – PreShow Banter™ — Intro Sec Con &amp;amp; The Birth of PreShowBanterCon-A-Thon 2021!™ 



05:29 – You’re So Vanity 



08:39 – Let’</itunes:subtitle>
      <itunes:keywords>Infosec,Cybersecurity,news</itunes:keywords>
      <itunes:explicit>No</itunes:explicit>
      <podcast:chapters url="https://share.transistor.fm/s/29db46f1/chapters.json" type="application/json+chapters"/>
    </item>
    <item>
      <title>Talkin’ About Infosec News – 7/6/2021</title>
      <itunes:episode>1</itunes:episode>
      <podcast:episode>1</podcast:episode>
      <itunes:title>Talkin’ About Infosec News – 7/6/2021</itunes:title>
      <itunes:episodeType>full</itunes:episodeType>
      <guid isPermaLink="false">https://www.blackhillsinfosec.com/?p=19141</guid>
      <link>https://share.transistor.fm/s/f9dead4b</link>
      <description>
        <![CDATA[Originally Aired on July 6, 2021



Articles discussed in this episode:



00:00 – BHIS | Talkin’ Bout News 2021-07-06



02:32 – Story # 1 – CISA self-assessment audit tool – https://www.bleepingcomputer.com/news/security/cisa-releases-new-ransomware-self-assessment-security-audit-tool/amp/



08:24 – Story # 2 – Insurance rates up 32% – https://www.theregister.com/2021/07/05/cyber_insurance_report/



20:48 – Story # 3 – 0 Day for Windows OS PrintNightmare – https://doublepulsar.com/zero-day-for-every-supported-windows-os-version-in-the-wild-printnightmare-b3fdb82f840c



31:32 – Story # 4 – Kaseya Indicators of Compromises – https://cyberworkx.in/2021/07/06/kaseya-says-its-not-a-supply-chain-attack-and-releases-indicators-of-compromises/



41:16 – Story # 5 – Dotnet Core for PowerShell – https://cyberworkx.in/2021/07/04/critical-remote-code-execution-vulnerability-in-dotnet-core-for-powershell/



42:54 – Story # 6 – Intuit shares data with Equifax – https://krebsonsecurity.com/2021/07/intuit-to-share-payroll-data-from-1-4m-small-businesses-with-equifax/



48:33 – Alissa Torres’ Shout Outs (see description for links)



52:00 – Story # 7 – The Audacity of Spyware – https://mashable.com/article/audacity-spyware-privacy-policy



Alissa Torres’ Shout Outs:



* https://www.dianainitiative.org/event-schedule/* https://dfrws.org/conferences/dfrws-usa-2021/* https://www.activecountermeasures.com/event/hacking-packet-captures-the-foundations-of-network-security/* https://wildwesthackinfest.com/antisyphon//advanced-endpoint-investigations/



















Check out our Cyber Range, not just a place to work through challenges and play,]]>
      </description>
      <content:encoded>
        <![CDATA[Originally Aired on July 6, 2021



Articles discussed in this episode:



00:00 – BHIS | Talkin’ Bout News 2021-07-06



02:32 – Story # 1 – CISA self-assessment audit tool – https://www.bleepingcomputer.com/news/security/cisa-releases-new-ransomware-self-assessment-security-audit-tool/amp/



08:24 – Story # 2 – Insurance rates up 32% – https://www.theregister.com/2021/07/05/cyber_insurance_report/



20:48 – Story # 3 – 0 Day for Windows OS PrintNightmare – https://doublepulsar.com/zero-day-for-every-supported-windows-os-version-in-the-wild-printnightmare-b3fdb82f840c



31:32 – Story # 4 – Kaseya Indicators of Compromises – https://cyberworkx.in/2021/07/06/kaseya-says-its-not-a-supply-chain-attack-and-releases-indicators-of-compromises/



41:16 – Story # 5 – Dotnet Core for PowerShell – https://cyberworkx.in/2021/07/04/critical-remote-code-execution-vulnerability-in-dotnet-core-for-powershell/



42:54 – Story # 6 – Intuit shares data with Equifax – https://krebsonsecurity.com/2021/07/intuit-to-share-payroll-data-from-1-4m-small-businesses-with-equifax/



48:33 – Alissa Torres’ Shout Outs (see description for links)



52:00 – Story # 7 – The Audacity of Spyware – https://mashable.com/article/audacity-spyware-privacy-policy



Alissa Torres’ Shout Outs:



* https://www.dianainitiative.org/event-schedule/* https://dfrws.org/conferences/dfrws-usa-2021/* https://www.activecountermeasures.com/event/hacking-packet-captures-the-foundations-of-network-security/* https://wildwesthackinfest.com/antisyphon//advanced-endpoint-investigations/



















Check out our Cyber Range, not just a place to work through challenges and play,]]>
      </content:encoded>
      <pubDate>Mon, 12 Jul 2021 10:44:35 -0400</pubDate>
      <author>Black Hills Information Security</author>
      <enclosure url="https://media.transistor.fm/f9dead4b/c0606eeb.mp3" length="40569979" type="audio/mpeg"/>
      <itunes:author>Black Hills Information Security</itunes:author>
      <itunes:duration>3380</itunes:duration>
      <itunes:summary>Originally Aired on July 6, 2021



Articles discussed in this episode:



00:00 – BHIS | Talkin’ Bout News 2021-07-06



02:32 – Story # 1 – CISA self-assessment audit tool – https://www.bleepingcomputer.com/news/security/cisa-releases-new-ransomware-self-assessment-security-audit-tool/amp/



08:24 – Story # 2 – Insurance rates up 32% – https://www.theregister.com/2021/07/05/cyber_insurance_report/



20:48 – Story # 3 – 0 Day for Windows OS PrintNightmare – https://doublepulsar.com/zero-day-for-every-supported-windows-os-version-in-the-wild-printnightmare-b3fdb82f840c



31:32 – Story # 4 – Kaseya Indicators of Compromises – https://cyberworkx.in/2021/07/06/kaseya-says-its-not-a-supply-chain-attack-and-releases-indicators-of-compromises/



41:16 – Story # 5 – Dotnet Core for PowerShell – https://cyberworkx.in/2021/07/04/critical-remote-code-execution-vulnerability-in-dotnet-core-for-powershell/



42:54 – Story # 6 – Intuit shares data with Equifax – https://krebsonsecurity.com/2021/07/intuit-to-share-payroll-data-from-1-4m-small-businesses-with-equifax/



48:33 – Alissa Torres’ Shout Outs (see description for links)



52:00 – Story # 7 – The Audacity of Spyware – https://mashable.com/article/audacity-spyware-privacy-policy



Alissa Torres’ Shout Outs:



* https://www.dianainitiative.org/event-schedule/* https://dfrws.org/conferences/dfrws-usa-2021/* https://www.activecountermeasures.com/event/hacking-packet-captures-the-foundations-of-network-security/* https://wildwesthackinfest.com/antisyphon//advanced-endpoint-investigations/



















Check out our Cyber Range, not just a place to work through challenges and play,</itunes:summary>
      <itunes:subtitle>Originally Aired on July 6, 2021



Articles discussed in this episode:



00:00 – BHIS | Talkin’ Bout News 2021-07-06



02:32 – Story # 1 – CISA self-assessment audit tool – https://www.bleepingcomputer.com/news/security/cisa-releases-new-ransomware-sel</itunes:subtitle>
      <itunes:keywords>Infosec,Cybersecurity,news</itunes:keywords>
      <itunes:explicit>No</itunes:explicit>
    </item>
    <item>
      <title>Talkin' About Infosec News - 7/6/2021</title>
      <itunes:episode>1</itunes:episode>
      <podcast:episode>1</podcast:episode>
      <itunes:title>Talkin' About Infosec News - 7/6/2021</itunes:title>
      <itunes:episodeType>full</itunes:episodeType>
      <guid isPermaLink="false">http://www.blubrry.com/bhis/79147491/talkin-about-infosec-news-762021/</guid>
      <link>https://share.transistor.fm/s/0c23c0fa</link>
      <description>
        <![CDATA[<p><strong>Articles discussed in this episode:</strong></p>
<p>00:00 - BHIS | Talkin’ Bout News 2021-07-06</p>
<p>02:32 - Story # 1 - CISA self-assessment audit tool - <a href="https://www.bleepingcomputer.com/news/security/cisa-releases-new-ransomware-self-assessment-security-audit-tool/amp/" rel="noreferrer noopener">https://www.bleepingcomputer.com/news/security/cisa-releases-new-ransomware-self-assessment-security-audit-tool/amp/</a></p>
<p>08:24 - Story # 2 - Insurance rates up 32% - <a href="https://www.theregister.com/2021/07/05/cyber_insurance_report/" rel="noreferrer noopener">https://www.theregister.com/2021/07/05/cyber_insurance_report/</a></p>
<p>20:48 - Story # 3 - 0 Day for Windows OS PrintNightmare - <a href="https://doublepulsar.com/zero-day-for-every-supported-windows-os-version-in-the-wild-printnightmare-b3fdb82f840c" rel="noreferrer noopener">https://doublepulsar.com/zero-day-for-every-supported-windows-os-version-in-the-wild-printnightmare-b3fdb82f840c</a></p>
<p>31:32 - Story # 4 - Kaseya Indicators of Compromises - <a href="https://cyberworkx.in/2021/07/06/kaseya-says-its-not-a-supply-chain-attack-and-releases-indicators-of-compromises/" rel="noreferrer noopener">https://cyberworkx.in/2021/07/06/kaseya-says-its-not-a-supply-chain-attack-and-releases-indicators-of-compromises/</a></p>
<p>41:16 - Story # 5 - Dotnet Core for PowerShell - <a href="https://cyberworkx.in/2021/07/04/critical-remote-code-execution-vulnerability-in-dotnet-core-for-powershell/" rel="noreferrer noopener">https://cyberworkx.in/2021/07/04/critical-remote-code-execution-vulnerability-in-dotnet-core-for-powershell/</a></p>
<p>42:54 - Story # 6 - Intuit shares data with Equifax - <a href="https://krebsonsecurity.com/2021/07/intuit-to-share-payroll-data-from-1-4m-small-businesses-with-equifax/" rel="noreferrer noopener">https://krebsonsecurity.com/2021/07/intuit-to-share-payroll-data-from-1-4m-small-businesses-with-equifax/</a></p>
<p>48:33 - Alissa Torres’ Shout Outs ( see description for links )</p>
<p>52:00 - Story # 7 - The Audacity of Spyware - <a href="https://mashable.com/article/audacity-spyware-privacy-policy" rel="noreferrer noopener">https://mashable.com/article/audacity-spyware-privacy-policy</a></p>
<p><strong>Alissa Torres’ Shout Outs:</strong></p>
<p>                       </p>
<ul>
<li><a href="https://www.dianainitiative.org/event-schedule/" rel="noreferrer noopener">https://www.dianainitiative.org/event-schedule/</a></li>
<li><a href="https://dfrws.org/conferences/dfrws-usa-2021/" rel="noreferrer noopener">https://dfrws.org/conferences/dfrws-usa-2021/</a></li>
<li><a href="https://www.activecountermeasures.com/event/hacking-packet-captures-the-foundations-of-network-security/" rel="noreferrer noopener">https://www.activecountermeasures.com/event/hacking-packet-captures-the-foundations-of-network-security/</a></li>
<li><a href="https://wildwesthackinfest.com/antisyphon//advanced-endpoint-investigations/" rel="noreferrer noopener">https://wildwesthackinfest.com/antisyphon//advanced-endpoint-investigations/</a></li>
</ul>]]>
      </description>
      <content:encoded>
        <![CDATA[<p><strong>Articles discussed in this episode:</strong></p>
<p>00:00 - BHIS | Talkin’ Bout News 2021-07-06</p>
<p>02:32 - Story # 1 - CISA self-assessment audit tool - <a href="https://www.bleepingcomputer.com/news/security/cisa-releases-new-ransomware-self-assessment-security-audit-tool/amp/" rel="noreferrer noopener">https://www.bleepingcomputer.com/news/security/cisa-releases-new-ransomware-self-assessment-security-audit-tool/amp/</a></p>
<p>08:24 - Story # 2 - Insurance rates up 32% - <a href="https://www.theregister.com/2021/07/05/cyber_insurance_report/" rel="noreferrer noopener">https://www.theregister.com/2021/07/05/cyber_insurance_report/</a></p>
<p>20:48 - Story # 3 - 0 Day for Windows OS PrintNightmare - <a href="https://doublepulsar.com/zero-day-for-every-supported-windows-os-version-in-the-wild-printnightmare-b3fdb82f840c" rel="noreferrer noopener">https://doublepulsar.com/zero-day-for-every-supported-windows-os-version-in-the-wild-printnightmare-b3fdb82f840c</a></p>
<p>31:32 - Story # 4 - Kaseya Indicators of Compromises - <a href="https://cyberworkx.in/2021/07/06/kaseya-says-its-not-a-supply-chain-attack-and-releases-indicators-of-compromises/" rel="noreferrer noopener">https://cyberworkx.in/2021/07/06/kaseya-says-its-not-a-supply-chain-attack-and-releases-indicators-of-compromises/</a></p>
<p>41:16 - Story # 5 - Dotnet Core for PowerShell - <a href="https://cyberworkx.in/2021/07/04/critical-remote-code-execution-vulnerability-in-dotnet-core-for-powershell/" rel="noreferrer noopener">https://cyberworkx.in/2021/07/04/critical-remote-code-execution-vulnerability-in-dotnet-core-for-powershell/</a></p>
<p>42:54 - Story # 6 - Intuit shares data with Equifax - <a href="https://krebsonsecurity.com/2021/07/intuit-to-share-payroll-data-from-1-4m-small-businesses-with-equifax/" rel="noreferrer noopener">https://krebsonsecurity.com/2021/07/intuit-to-share-payroll-data-from-1-4m-small-businesses-with-equifax/</a></p>
<p>48:33 - Alissa Torres’ Shout Outs ( see description for links )</p>
<p>52:00 - Story # 7 - The Audacity of Spyware - <a href="https://mashable.com/article/audacity-spyware-privacy-policy" rel="noreferrer noopener">https://mashable.com/article/audacity-spyware-privacy-policy</a></p>
<p><strong>Alissa Torres’ Shout Outs:</strong></p>
<p>                       </p>
<ul>
<li><a href="https://www.dianainitiative.org/event-schedule/" rel="noreferrer noopener">https://www.dianainitiative.org/event-schedule/</a></li>
<li><a href="https://dfrws.org/conferences/dfrws-usa-2021/" rel="noreferrer noopener">https://dfrws.org/conferences/dfrws-usa-2021/</a></li>
<li><a href="https://www.activecountermeasures.com/event/hacking-packet-captures-the-foundations-of-network-security/" rel="noreferrer noopener">https://www.activecountermeasures.com/event/hacking-packet-captures-the-foundations-of-network-security/</a></li>
<li><a href="https://wildwesthackinfest.com/antisyphon//advanced-endpoint-investigations/" rel="noreferrer noopener">https://wildwesthackinfest.com/antisyphon//advanced-endpoint-investigations/</a></li>
</ul>]]>
      </content:encoded>
      <pubDate>Mon, 12 Jul 2021 08:37:54 -0400</pubDate>
      <author>Black Hills Information Security</author>
      <enclosure url="https://media.transistor.fm/0c23c0fa/3e47da88.mp3" length="40569996" type="audio/mpeg"/>
      <itunes:author>Black Hills Information Security</itunes:author>
      <itunes:duration>3380</itunes:duration>
      <itunes:summary>Articles discussed in this episode:
00:00 - BHIS | Talkin’ Bout News 2021-07-06
02:32 - Story # 1 - CISA self-assessment audit tool - https://www.bleepingcomputer.com/news/security/cisa-releases-new-ransomware-self-assessment-security-audit-tool/amp/ (https://www.bleepingcomputer.com/news/security/cisa-releases-new-ransomware-self-assessment-security-audit-tool/amp/)
08:24 - Story # 2 - Insurance rates up 32% - https://www.theregister.com/2021/07/05/cyber_insurance_report/ (https://www.theregister.com/2021/07/05/cyber_insurance_report/)
20:48 - Story # 3 - 0 Day for Windows OS PrintNightmare - https://doublepulsar.com/zero-day-for-every-supported-windows-os-version-in-the-wild-printnightmare-b3fdb82f840c (https://doublepulsar.com/zero-day-for-every-supported-windows-os-version-in-the-wild-printnightmare-b3fdb82f840c)
31:32 - Story # 4 - Kaseya Indicators of Compromises - https://cyberworkx.in/2021/07/06/kaseya-says-its-not-a-supply-chain-attack-and-releases-indicators-of-compromises/ (https://cyberworkx.in/2021/07/06/kaseya-says-its-not-a-supply-chain-attack-and-releases-indicators-of-compromises/)
41:16 - Story # 5 - Dotnet Core for PowerShell - https://cyberworkx.in/2021/07/04/critical-remote-code-execution-vulnerability-in-dotnet-core-for-powershell/ (https://cyberworkx.in/2021/07/04/critical-remote-code-execution-vulnerability-in-dotnet-core-for-powershell/)
42:54 - Story # 6 - Intuit shares data with Equifax - https://krebsonsecurity.com/2021/07/intuit-to-share-payroll-data-from-1-4m-small-businesses-with-equifax/ (https://krebsonsecurity.com/2021/07/intuit-to-share-payroll-data-from-1-4m-small-businesses-with-equifax/)
48:33 - Alissa Torres’ Shout Outs ( see description for links )
52:00 - Story # 7 - The Audacity of Spyware - https://mashable.com/article/audacity-spyware-privacy-policy (https://mashable.com/article/audacity-spyware-privacy-policy)
Alissa Torres’ Shout Outs:
                       

* https://www.dianainitiative.org/event-schedule/ (https://www.dianainitiative.org/event-schedule/)
* https://dfrws.org/conferences/dfrws-usa-2021/ (https://dfrws.org/conferences/dfrws-usa-2021/)
* https://www.activecountermeasures.com/event/hacking-packet-captures-the-foundations-of-network-security/ (https://www.activecountermeasures.com/event/hacking-packet-captures-the-foundations-of-network-security/)
* https://wildwesthackinfest.com/antisyphon//advanced-endpoint-investigations/ (https://wildwesthackinfest.com/antisyphon//advanced-endpoint-investigations/)</itunes:summary>
      <itunes:subtitle>Articles discussed in this episode:
00:00 - BHIS | Talkin’ Bout News 2021-07-06
02:32 - Story # 1 - CISA self-assessment audit tool - https://www.bleepingcomputer.com/news/security/cisa-releases-new-ransomware-self-assessment-security-audit-tool/amp/ (htt</itunes:subtitle>
      <itunes:keywords>Infosec,Cybersecurity,news</itunes:keywords>
      <itunes:explicit>No</itunes:explicit>
    </item>
    <item>
      <title>Talkin’ About Infosec News – 6/28/2021</title>
      <itunes:episode>1</itunes:episode>
      <podcast:episode>1</podcast:episode>
      <itunes:title>Talkin’ About Infosec News – 6/28/2021</itunes:title>
      <itunes:episodeType>full</itunes:episodeType>
      <guid isPermaLink="false">https://www.blackhillsinfosec.com/?p=19053</guid>
      <link>https://share.transistor.fm/s/6871636d</link>
      <description>
        <![CDATA[Originally Aired on June 28, 2021



Articles discussed in this episode:



00:00 – PreShow Banter™ — Way West Recap06:38 – Story 1 : https://www.bleepingcomputer.com/news/security/wd-my-book-nas-devices-are-being-remotely-wiped-clean-worldwide/12:58 – Story 2 : https://www.vice.com/en/article/bvzd8v/hackers-use-fake-call-center-to-trick-victims-into-installing-ransomware19:41 – Story 3 : https://thehackernews.com/2021/06/bios-disconnect-new-high-severity-flaws.html29:27 – Story 4 : https://venturebeat.com/2021/06/16/cybereason-80-of-orgs-that-paid-the-ransom-were-hit-again/44:27 – Story 5 : https://nypost.com/2021/06/23/john-mcafee-dies-by-suicide-inside-prison-in-barcelona/45:43 – Story 6 : https://www.marketplace.org/2021/06/23/texas-homeowners-startled-by-hijacked-thermostats/52:56 – Story 7 : https://www.bleepingcomputer.com/news/security/mercedes-benz-data-breach-exposes-ssns-credit-card-numbers/55:38 – Story 8 : https://securelist.com/ferocious-kitten-6-years-of-covert-surveillance-in-iran/102806/























Check out our Cyber Range, not just a place to work through challenges and play, but also an open direct/hands-on training environment.    



https://www.blackhillsinfosec.com/services/cyber-range/ 















Join the BHIS Blog Mailing List – get notified when we post new blogs, webcasts, and podcasts.



            
									
						
						Join 3,555 other subscribers						
					
					                    
                        
							Email Address                        
                        
                    

					
                        
                        
                        
                        
						                        
	                        Subscribe]]>
      </description>
      <content:encoded>
        <![CDATA[Originally Aired on June 28, 2021



Articles discussed in this episode:



00:00 – PreShow Banter™ — Way West Recap06:38 – Story 1 : https://www.bleepingcomputer.com/news/security/wd-my-book-nas-devices-are-being-remotely-wiped-clean-worldwide/12:58 – Story 2 : https://www.vice.com/en/article/bvzd8v/hackers-use-fake-call-center-to-trick-victims-into-installing-ransomware19:41 – Story 3 : https://thehackernews.com/2021/06/bios-disconnect-new-high-severity-flaws.html29:27 – Story 4 : https://venturebeat.com/2021/06/16/cybereason-80-of-orgs-that-paid-the-ransom-were-hit-again/44:27 – Story 5 : https://nypost.com/2021/06/23/john-mcafee-dies-by-suicide-inside-prison-in-barcelona/45:43 – Story 6 : https://www.marketplace.org/2021/06/23/texas-homeowners-startled-by-hijacked-thermostats/52:56 – Story 7 : https://www.bleepingcomputer.com/news/security/mercedes-benz-data-breach-exposes-ssns-credit-card-numbers/55:38 – Story 8 : https://securelist.com/ferocious-kitten-6-years-of-covert-surveillance-in-iran/102806/























Check out our Cyber Range, not just a place to work through challenges and play, but also an open direct/hands-on training environment.    



https://www.blackhillsinfosec.com/services/cyber-range/ 















Join the BHIS Blog Mailing List – get notified when we post new blogs, webcasts, and podcasts.



            
									
						
						Join 3,555 other subscribers						
					
					                    
                        
							Email Address                        
                        
                    

					
                        
                        
                        
                        
						                        
	                        Subscribe]]>
      </content:encoded>
      <pubDate>Wed, 30 Jun 2021 18:01:18 -0400</pubDate>
      <author>Black Hills Information Security</author>
      <enclosure url="https://media.transistor.fm/6871636d/7b81696a.mp3" length="43356397" type="audio/mpeg"/>
      <itunes:author>Black Hills Information Security</itunes:author>
      <itunes:duration>3612</itunes:duration>
      <itunes:summary>Originally Aired on June 28, 2021



Articles discussed in this episode:



00:00 – PreShow Banter™ — Way West Recap06:38 – Story 1 : https://www.bleepingcomputer.com/news/security/wd-my-book-nas-devices-are-being-remotely-wiped-clean-worldwide/12:58 – Story 2 : https://www.vice.com/en/article/bvzd8v/hackers-use-fake-call-center-to-trick-victims-into-installing-ransomware19:41 – Story 3 : https://thehackernews.com/2021/06/bios-disconnect-new-high-severity-flaws.html29:27 – Story 4 : https://venturebeat.com/2021/06/16/cybereason-80-of-orgs-that-paid-the-ransom-were-hit-again/44:27 – Story 5 : https://nypost.com/2021/06/23/john-mcafee-dies-by-suicide-inside-prison-in-barcelona/45:43 – Story 6 : https://www.marketplace.org/2021/06/23/texas-homeowners-startled-by-hijacked-thermostats/52:56 – Story 7 : https://www.bleepingcomputer.com/news/security/mercedes-benz-data-breach-exposes-ssns-credit-card-numbers/55:38 – Story 8 : https://securelist.com/ferocious-kitten-6-years-of-covert-surveillance-in-iran/102806/























Check out our Cyber Range, not just a place to work through challenges and play, but also an open direct/hands-on training environment.    



https://www.blackhillsinfosec.com/services/cyber-range/ 















Join the BHIS Blog Mailing List – get notified when we post new blogs, webcasts, and podcasts.



            
									
						
						Join 3,555 other subscribers						
					
					                    
                        
							Email Address                        
                        
                    

					
                        
                        
                        
                        
						                        
	                        Subscribe</itunes:summary>
      <itunes:subtitle>Originally Aired on June 28, 2021



Articles discussed in this episode:



00:00 – PreShow Banter™ — Way West Recap06:38 – Story 1 : https://www.bleepingcomputer.com/news/security/wd-my-book-nas-devices-are-being-remotely-wiped-clean-worldwide/12:58 – St</itunes:subtitle>
      <itunes:keywords>Infosec,Cybersecurity,news</itunes:keywords>
      <itunes:explicit>No</itunes:explicit>
    </item>
    <item>
      <title>Talkin' About Infosec News - 6/28/2021</title>
      <itunes:episode>1</itunes:episode>
      <podcast:episode>1</podcast:episode>
      <itunes:title>Talkin' About Infosec News - 6/28/2021</itunes:title>
      <itunes:episodeType>full</itunes:episodeType>
      <guid isPermaLink="false">http://www.blubrry.com/bhis/78798949/talkin-about-infosec-news-6282021/</guid>
      <link>https://share.transistor.fm/s/0bf1c0cc</link>
      <description>
        <![CDATA[<p>00:00 - PreShow Banter™ — Way West Recap<br> 06:38 - Story 1 : <a title="https://www.bleepingcomputer.com/news/security/wd-my-book-nas-devices-are-being-remotely-wiped-clean-worldwide/" rel="noreferrer noopener" href="https://www.bleepingcomputer.com/news/security/wd-my-book-nas-devices-are-being-remotely-wiped-clean-worldwide/">https://www.bleepingcomputer.com/news/security/wd-my-book-nas-devices-are-being-remotely-wiped-clean-worldwide/</a><br> 12:58 - Story 2 : <a title="https://www.vice.com/en/article/bvzd8v/hackers-use-fake-call-center-to-trick-victims-into-installing-ransomware" rel="noreferrer noopener" href="https://www.vice.com/en/article/bvzd8v/hackers-use-fake-call-center-to-trick-victims-into-installing-ransomware">https://www.vice.com/en/article/bvzd8v/hackers-use-fake-call-center-to-trick-victims-into-installing-ransomware</a><br> 19:41 - Story 3 : <a title="https://thehackernews.com/2021/06/bios-disconnect-new-high-severity-flaws.html" rel="noreferrer noopener" href="https://thehackernews.com/2021/06/bios-disconnect-new-high-severity-flaws.html">https://thehackernews.com/2021/06/bios-disconnect-new-high-severity-flaws.html</a><br> 29:27 - Story 4 : <a title="https://venturebeat.com/2021/06/16/cybereason-80-of-orgs-that-paid-the-ransom-were-hit-again/" rel="noreferrer noopener" href="https://venturebeat.com/2021/06/16/cybereason-80-of-orgs-that-paid-the-ransom-were-hit-again/">https://venturebeat.com/2021/06/16/cybereason-80-of-orgs-that-paid-the-ransom-were-hit-again/</a><br> 44:27 - Story 5 : <a title="https://nypost.com/2021/06/23/john-mcafee-dies-by-suicide-inside-prison-in-barcelona/" rel="noreferrer noopener" href="https://nypost.com/2021/06/23/john-mcafee-dies-by-suicide-inside-prison-in-barcelona/">https://nypost.com/2021/06/23/john-mcafee-dies-by-suicide-inside-prison-in-barcelona/</a><br> 45:43 - Story 6 : <a title="https://www.marketplace.org/2021/06/23/texas-homeowners-startled-by-hijacked-thermostats/" rel="noreferrer noopener" href="https://www.marketplace.org/2021/06/23/texas-homeowners-startled-by-hijacked-thermostats/">https://www.marketplace.org/2021/06/23/texas-homeowners-startled-by-hijacked-thermostats/</a><br> 52:56 - Story 7 : <a title="https://www.bleepingcomputer.com/news/security/mercedes-benz-data-breach-exposes-ssns-credit-card-numbers/" rel="noreferrer noopener" href="https://www.bleepingcomputer.com/news/security/mercedes-benz-data-breach-exposes-ssns-credit-card-numbers/">https://www.bleepingcomputer.com/news/security/mercedes-benz-data-breach-exposes-ssns-credit-card-numbers/</a><br> 55:38 - Story 8 : <a title="https://securelist.com/ferocious-kitten-6-years-of-covert-surveillance-in-iran/102806/" rel="noreferrer noopener" href="https://securelist.com/ferocious-kitten-6-years-of-covert-surveillance-in-iran/102806/">https://securelist.com/ferocious-kitten-6-years-of-covert-surveillance-in-iran/102806/</a></p>]]>
      </description>
      <content:encoded>
        <![CDATA[<p>00:00 - PreShow Banter™ — Way West Recap<br> 06:38 - Story 1 : <a title="https://www.bleepingcomputer.com/news/security/wd-my-book-nas-devices-are-being-remotely-wiped-clean-worldwide/" rel="noreferrer noopener" href="https://www.bleepingcomputer.com/news/security/wd-my-book-nas-devices-are-being-remotely-wiped-clean-worldwide/">https://www.bleepingcomputer.com/news/security/wd-my-book-nas-devices-are-being-remotely-wiped-clean-worldwide/</a><br> 12:58 - Story 2 : <a title="https://www.vice.com/en/article/bvzd8v/hackers-use-fake-call-center-to-trick-victims-into-installing-ransomware" rel="noreferrer noopener" href="https://www.vice.com/en/article/bvzd8v/hackers-use-fake-call-center-to-trick-victims-into-installing-ransomware">https://www.vice.com/en/article/bvzd8v/hackers-use-fake-call-center-to-trick-victims-into-installing-ransomware</a><br> 19:41 - Story 3 : <a title="https://thehackernews.com/2021/06/bios-disconnect-new-high-severity-flaws.html" rel="noreferrer noopener" href="https://thehackernews.com/2021/06/bios-disconnect-new-high-severity-flaws.html">https://thehackernews.com/2021/06/bios-disconnect-new-high-severity-flaws.html</a><br> 29:27 - Story 4 : <a title="https://venturebeat.com/2021/06/16/cybereason-80-of-orgs-that-paid-the-ransom-were-hit-again/" rel="noreferrer noopener" href="https://venturebeat.com/2021/06/16/cybereason-80-of-orgs-that-paid-the-ransom-were-hit-again/">https://venturebeat.com/2021/06/16/cybereason-80-of-orgs-that-paid-the-ransom-were-hit-again/</a><br> 44:27 - Story 5 : <a title="https://nypost.com/2021/06/23/john-mcafee-dies-by-suicide-inside-prison-in-barcelona/" rel="noreferrer noopener" href="https://nypost.com/2021/06/23/john-mcafee-dies-by-suicide-inside-prison-in-barcelona/">https://nypost.com/2021/06/23/john-mcafee-dies-by-suicide-inside-prison-in-barcelona/</a><br> 45:43 - Story 6 : <a title="https://www.marketplace.org/2021/06/23/texas-homeowners-startled-by-hijacked-thermostats/" rel="noreferrer noopener" href="https://www.marketplace.org/2021/06/23/texas-homeowners-startled-by-hijacked-thermostats/">https://www.marketplace.org/2021/06/23/texas-homeowners-startled-by-hijacked-thermostats/</a><br> 52:56 - Story 7 : <a title="https://www.bleepingcomputer.com/news/security/mercedes-benz-data-breach-exposes-ssns-credit-card-numbers/" rel="noreferrer noopener" href="https://www.bleepingcomputer.com/news/security/mercedes-benz-data-breach-exposes-ssns-credit-card-numbers/">https://www.bleepingcomputer.com/news/security/mercedes-benz-data-breach-exposes-ssns-credit-card-numbers/</a><br> 55:38 - Story 8 : <a title="https://securelist.com/ferocious-kitten-6-years-of-covert-surveillance-in-iran/102806/" rel="noreferrer noopener" href="https://securelist.com/ferocious-kitten-6-years-of-covert-surveillance-in-iran/102806/">https://securelist.com/ferocious-kitten-6-years-of-covert-surveillance-in-iran/102806/</a></p>]]>
      </content:encoded>
      <pubDate>Wed, 30 Jun 2021 11:41:47 -0400</pubDate>
      <author>Black Hills Information Security</author>
      <enclosure url="https://media.transistor.fm/0bf1c0cc/d6010f28.mp3" length="43356415" type="audio/mpeg"/>
      <itunes:author>Black Hills Information Security</itunes:author>
      <itunes:duration>3612</itunes:duration>
      <itunes:summary>00:00 - PreShow Banter™ — Way West Recap 06:38 - Story 1 : https://www.bleepingcomputer.com/news/security/wd-my-book-nas-devices-are-being-remotely-wiped-clean-worldwide/ (https://www.bleepingcomputer.com/news/security/wd-my-book-nas-devices-are-being-remotely-wiped-clean-worldwide/) 12:58 - Story 2 : https://www.vice.com/en/article/bvzd8v/hackers-use-fake-call-center-to-trick-victims-into-installing-ransomware (https://www.vice.com/en/article/bvzd8v/hackers-use-fake-call-center-to-trick-victims-into-installing-ransomware) 19:41 - Story 3 : https://thehackernews.com/2021/06/bios-disconnect-new-high-severity-flaws.html (https://thehackernews.com/2021/06/bios-disconnect-new-high-severity-flaws.html) 29:27 - Story 4 : https://venturebeat.com/2021/06/16/cybereason-80-of-orgs-that-paid-the-ransom-were-hit-again/ (https://venturebeat.com/2021/06/16/cybereason-80-of-orgs-that-paid-the-ransom-were-hit-again/) 44:27 - Story 5 : https://nypost.com/2021/06/23/john-mcafee-dies-by-suicide-inside-prison-in-barcelona/ (https://nypost.com/2021/06/23/john-mcafee-dies-by-suicide-inside-prison-in-barcelona/) 45:43 - Story 6 : https://www.marketplace.org/2021/06/23/texas-homeowners-startled-by-hijacked-thermostats/ (https://www.marketplace.org/2021/06/23/texas-homeowners-startled-by-hijacked-thermostats/) 52:56 - Story 7 : https://www.bleepingcomputer.com/news/security/mercedes-benz-data-breach-exposes-ssns-credit-card-numbers/ (https://www.bleepingcomputer.com/news/security/mercedes-benz-data-breach-exposes-ssns-credit-card-numbers/) 55:38 - Story 8 : https://securelist.com/ferocious-kitten-6-years-of-covert-surveillance-in-iran/102806/ (https://securelist.com/ferocious-kitten-6-years-of-covert-surveillance-in-iran/102806/)</itunes:summary>
      <itunes:subtitle>00:00 - PreShow Banter™ — Way West Recap 06:38 - Story 1 : https://www.bleepingcomputer.com/news/security/wd-my-book-nas-devices-are-being-remotely-wiped-clean-worldwide/ (https://www.bleepingcomputer.com/news/security/wd-my-book-nas-devices-are-being-rem</itunes:subtitle>
      <itunes:keywords>Infosec,Cybersecurity,news</itunes:keywords>
      <itunes:explicit>No</itunes:explicit>
    </item>
    <item>
      <title>Talkin' About Infosec News - 6/7/2021</title>
      <itunes:episode>1</itunes:episode>
      <podcast:episode>1</podcast:episode>
      <itunes:title>Talkin' About Infosec News - 6/7/2021</itunes:title>
      <itunes:episodeType>full</itunes:episodeType>
      <guid isPermaLink="false">http://www.blubrry.com/bhis/78298896/talkin-about-infosec-news-672021/</guid>
      <link>https://share.transistor.fm/s/469b825b</link>
      <description>
        <![CDATA[



<a href="https://youtu.be/ZXNzG8ilfiw">https://youtu.be/ZXNzG8ilfiw</a>
<p><br></p>
<a href="https://www.youtube.com/watch?v=ZXNzG8ilfiw&amp;t=0s">00:00</a> - Talkin’ Bout Ransomware 
<a href="https://www.youtube.com/watch?v=ZXNzG8ilfiw&amp;t=86s">01:26</a> - Story 1: <a href="https://nypost.com/2021/06/06/texas-mom-arrested-after-posing-as-her-13-year-old-daughter-at-middle-school/">https://nypost.com/2021/06/06/texas-mom-arrested-after-posing-as-her-13-year-old-daughter-at-middle-school/</a>
<a href="https://www.youtube.com/watch?v=ZXNzG8ilfiw&amp;t=386s">06:26</a> - Story 2: <a href="https://cyberworkx.in/2021/06/07/worlds-first-known-malware-targeting-windows-containers-to-compromise-cloud-environments/">https://cyberworkx.in/2021/06/07/worlds-first-known-malware-targeting-windows-containers-to-compromise-cloud-environments/</a>
<a href="https://www.youtube.com/watch?v=ZXNzG8ilfiw&amp;t=642s">10:42</a> - Story 3: <a href="https://threatpost.com/revil-spill-details-us-attacks/166669/">https://threatpost.com/revil-spill-details-us-attacks/166669/</a>
<a href="https://www.youtube.com/watch?v=ZXNzG8ilfiw&amp;t=1347s">22:27</a> - Story 4: <a href="https://www.eff.org/deeplinks/2021/06/van-buren-victory-against-overbroad-interpretations-cfaa-protects-security">https://www.eff.org/deeplinks/2021/06/van-buren-victory-against-overbroad-interpretations-cfaa-protects-security</a>
<a href="https://www.youtube.com/watch?v=ZXNzG8ilfiw&amp;t=1483s">24:43</a> - Story 5: <a href="https://cyberworkx.in/2021/06/05/microsoft-teams-is-getting-better-security-end-to-end-encryption-for-voice-calls-from-july/">https://cyberworkx.in/2021/06/05/microsoft-teams-is-getting-better-security-end-to-end-encryption-for-voice-calls-from-july/</a>
<a href="https://www.youtube.com/watch?v=ZXNzG8ilfiw&amp;t=1833s">30:33</a> - Story 6: <a href="https://lock.cmpxchg8b.com/passmgrs.html">https://lock.cmpxchg8b.com/passmgrs.html</a>

Join the BHIS Community Discord: <a href="https://discord.gg/bhis">https://discord.gg/bhis</a>




<p></p>




]]>
      </description>
      <content:encoded>
        <![CDATA[



<a href="https://youtu.be/ZXNzG8ilfiw">https://youtu.be/ZXNzG8ilfiw</a>
<p><br></p>
<a href="https://www.youtube.com/watch?v=ZXNzG8ilfiw&amp;t=0s">00:00</a> - Talkin’ Bout Ransomware 
<a href="https://www.youtube.com/watch?v=ZXNzG8ilfiw&amp;t=86s">01:26</a> - Story 1: <a href="https://nypost.com/2021/06/06/texas-mom-arrested-after-posing-as-her-13-year-old-daughter-at-middle-school/">https://nypost.com/2021/06/06/texas-mom-arrested-after-posing-as-her-13-year-old-daughter-at-middle-school/</a>
<a href="https://www.youtube.com/watch?v=ZXNzG8ilfiw&amp;t=386s">06:26</a> - Story 2: <a href="https://cyberworkx.in/2021/06/07/worlds-first-known-malware-targeting-windows-containers-to-compromise-cloud-environments/">https://cyberworkx.in/2021/06/07/worlds-first-known-malware-targeting-windows-containers-to-compromise-cloud-environments/</a>
<a href="https://www.youtube.com/watch?v=ZXNzG8ilfiw&amp;t=642s">10:42</a> - Story 3: <a href="https://threatpost.com/revil-spill-details-us-attacks/166669/">https://threatpost.com/revil-spill-details-us-attacks/166669/</a>
<a href="https://www.youtube.com/watch?v=ZXNzG8ilfiw&amp;t=1347s">22:27</a> - Story 4: <a href="https://www.eff.org/deeplinks/2021/06/van-buren-victory-against-overbroad-interpretations-cfaa-protects-security">https://www.eff.org/deeplinks/2021/06/van-buren-victory-against-overbroad-interpretations-cfaa-protects-security</a>
<a href="https://www.youtube.com/watch?v=ZXNzG8ilfiw&amp;t=1483s">24:43</a> - Story 5: <a href="https://cyberworkx.in/2021/06/05/microsoft-teams-is-getting-better-security-end-to-end-encryption-for-voice-calls-from-july/">https://cyberworkx.in/2021/06/05/microsoft-teams-is-getting-better-security-end-to-end-encryption-for-voice-calls-from-july/</a>
<a href="https://www.youtube.com/watch?v=ZXNzG8ilfiw&amp;t=1833s">30:33</a> - Story 6: <a href="https://lock.cmpxchg8b.com/passmgrs.html">https://lock.cmpxchg8b.com/passmgrs.html</a>

Join the BHIS Community Discord: <a href="https://discord.gg/bhis">https://discord.gg/bhis</a>




<p></p>




]]>
      </content:encoded>
      <pubDate>Mon, 14 Jun 2021 11:01:00 -0400</pubDate>
      <author>Black Hills Information Security</author>
      <enclosure url="https://media.transistor.fm/469b825b/57496568.mp3" length="30100987" type="audio/mpeg"/>
      <itunes:author>Black Hills Information Security</itunes:author>
      <itunes:duration>2508</itunes:duration>
      <itunes:summary>https://youtu.be/ZXNzG8ilfiw (https://youtu.be/ZXNzG8ilfiw)

00:00 (https://www.youtube.com/watch?v=ZXNzG8ilfiw&amp;amp;t=0s) - Talkin’ Bout Ransomware 
01:26 (https://www.youtube.com/watch?v=ZXNzG8ilfiw&amp;amp;t=86s) - Story 1: https://nypost.com/2021/06/06/texas-mom-arrested-after-posing-as-her-13-year-old-daughter-at-middle-school/ (https://nypost.com/2021/06/06/texas-mom-arrested-after-posing-as-her-13-year-old-daughter-at-middle-school/)
06:26 (https://www.youtube.com/watch?v=ZXNzG8ilfiw&amp;amp;t=386s) - Story 2: https://cyberworkx.in/2021/06/07/worlds-first-known-malware-targeting-windows-containers-to-compromise-cloud-environments/ (https://cyberworkx.in/2021/06/07/worlds-first-known-malware-targeting-windows-containers-to-compromise-cloud-environments/)
10:42 (https://www.youtube.com/watch?v=ZXNzG8ilfiw&amp;amp;t=642s) - Story 3: https://threatpost.com/revil-spill-details-us-attacks/166669/ (https://threatpost.com/revil-spill-details-us-attacks/166669/)
22:27 (https://www.youtube.com/watch?v=ZXNzG8ilfiw&amp;amp;t=1347s) - Story 4: https://www.eff.org/deeplinks/2021/06/van-buren-victory-against-overbroad-interpretations-cfaa-protects-security (https://www.eff.org/deeplinks/2021/06/van-buren-victory-against-overbroad-interpretations-cfaa-protects-security)</itunes:summary>
      <itunes:subtitle>https://youtu.be/ZXNzG8ilfiw (https://youtu.be/ZXNzG8ilfiw)

00:00 (https://www.youtube.com/watch?v=ZXNzG8ilfiw&amp;amp;t=0s) - Talkin’ Bout Ransomware 
01:26 (https://www.youtube.com/watch?v=ZXNzG8ilfiw&amp;amp;t=86s) - Story 1: https://nypost.com/2021/06/06/tex</itunes:subtitle>
      <itunes:keywords>Infosec,Cybersecurity,news</itunes:keywords>
      <itunes:explicit>No</itunes:explicit>
    </item>
    <item>
      <title>Talkin’ About Infosec News – 6/1/2021</title>
      <itunes:episode>1</itunes:episode>
      <podcast:episode>1</podcast:episode>
      <itunes:title>Talkin’ About Infosec News – 6/1/2021</itunes:title>
      <itunes:episodeType>full</itunes:episodeType>
      <guid isPermaLink="false">https://www.blackhillsinfosec.com/?p=19008</guid>
      <link>https://share.transistor.fm/s/805e3c8d</link>
      <description>
        <![CDATA[Originally Aired on June 1, 2021



Articles discussed in this episode:



00:00 – PreShow Banter™ — Fishing Attacks



02:40 – Story 1: https://m1racles.com/



05:33 – Story 2: https://arstechnica.com/gadgets/2021/05/vulnerability-in-vmware-product-has-severity-rating-of-9-8-out-of-10/



11:26 – Story 3: https://www.securityweek.com/nuclear-flash-cards-us-secrets-exposed-learning-apps



15:29 – Story 4: https://www.darkreading.com/risk/cyber-insurance-firms-start-tapping-out-as-ransomware-continues-to-rise/d/d-id/1341109



23:44 – Story 5: https://www.zdnet.com/article/various-japanese-government-entities-had-data-stolen-in-cyber-attack-report/



26:26 – Story 6: https://www.microsoft.com/security/blog/2021/05/27/new-sophisticated-email-based-attack-from-nobelium/



















Check out our Cyber Range, not just a place to work through challenges and play, but also an open direct/hands-on training environment.    



https://www.blackhillsinfosec.com/services/cyber-range/ 















Join the BHIS Blog Mailing List – get notified when we post new blogs, webcasts, and podcasts.



            
									
						
						Join 3,444 other subscribers						
					
					                    
                        
							Email Address                        
                        
                    

					
                        
                        
                        
                        
						                        
	                        Subscribe
<ul><li>(00:00) - PreShow Banter™ — Fishing Attacks</li>
<li>(02:40) - Story 1 : https://m1racles.com/</li>
<li>(05:33) - Story 2 : https://arstechnica.com/gadgets/2021/05/vulnerability-in-vmware-product-has-severity-rating-of-9-8-out-of-10/</li>
<li>(11:26) - Story 3 : https://www.securityweek.com/nuclear-flash-cards-us-secrets-exposed-learning-apps</li>
<li>(15:29) - Story 4 : https://www.darkreading.com/risk/cyber-insurance-firms-start-tapping-out-as-ransomware-continues-to-rise/d/d-id/1341109</li>
<li>(23:44) - Story 5 : https://www.zdnet.com/article/various-japanese-government-entities-had-data-stolen-in-cyber-attack-report/</li>
<li>(26:26) - Story 7 : https://www.microsoft.com/security/blog/2021/05/27/new-sophisticated-email-based-attack-from-nobelium/</li>
</ul>]]>
      </description>
      <content:encoded>
        <![CDATA[Originally Aired on June 1, 2021



Articles discussed in this episode:



00:00 – PreShow Banter™ — Fishing Attacks



02:40 – Story 1: https://m1racles.com/



05:33 – Story 2: https://arstechnica.com/gadgets/2021/05/vulnerability-in-vmware-product-has-severity-rating-of-9-8-out-of-10/



11:26 – Story 3: https://www.securityweek.com/nuclear-flash-cards-us-secrets-exposed-learning-apps



15:29 – Story 4: https://www.darkreading.com/risk/cyber-insurance-firms-start-tapping-out-as-ransomware-continues-to-rise/d/d-id/1341109



23:44 – Story 5: https://www.zdnet.com/article/various-japanese-government-entities-had-data-stolen-in-cyber-attack-report/



26:26 – Story 6: https://www.microsoft.com/security/blog/2021/05/27/new-sophisticated-email-based-attack-from-nobelium/



















Check out our Cyber Range, not just a place to work through challenges and play, but also an open direct/hands-on training environment.    



https://www.blackhillsinfosec.com/services/cyber-range/ 















Join the BHIS Blog Mailing List – get notified when we post new blogs, webcasts, and podcasts.



            
									
						
						Join 3,444 other subscribers						
					
					                    
                        
							Email Address                        
                        
                    

					
                        
                        
                        
                        
						                        
	                        Subscribe
<ul><li>(00:00) - PreShow Banter™ — Fishing Attacks</li>
<li>(02:40) - Story 1 : https://m1racles.com/</li>
<li>(05:33) - Story 2 : https://arstechnica.com/gadgets/2021/05/vulnerability-in-vmware-product-has-severity-rating-of-9-8-out-of-10/</li>
<li>(11:26) - Story 3 : https://www.securityweek.com/nuclear-flash-cards-us-secrets-exposed-learning-apps</li>
<li>(15:29) - Story 4 : https://www.darkreading.com/risk/cyber-insurance-firms-start-tapping-out-as-ransomware-continues-to-rise/d/d-id/1341109</li>
<li>(23:44) - Story 5 : https://www.zdnet.com/article/various-japanese-government-entities-had-data-stolen-in-cyber-attack-report/</li>
<li>(26:26) - Story 7 : https://www.microsoft.com/security/blog/2021/05/27/new-sophisticated-email-based-attack-from-nobelium/</li>
</ul>]]>
      </content:encoded>
      <pubDate>Fri, 04 Jun 2021 09:04:21 -0400</pubDate>
      <author>Black Hills Information Security</author>
      <enclosure url="https://media.transistor.fm/805e3c8d/b4cfc8ca.mp3" length="25561192" type="audio/mpeg"/>
      <itunes:author>Black Hills Information Security</itunes:author>
      <itunes:image href="https://img.transistorcdn.com/WPWRQDeKdGee4EWH8XAqrbrIyoey9yZvtSQOLl2rQN8/rs:fill:0:0:1/w:1400/h:1400/q:60/mb:500000/aHR0cHM6Ly9pbWct/dXBsb2FkLXByb2R1/Y3Rpb24udHJhbnNp/c3Rvci5mbS9iNTUx/MjRkNDczM2MyMDRl/MWZjZGZlYWM2NTlh/YWMyOS5qcGc.jpg"/>
      <itunes:duration>1988</itunes:duration>
      <itunes:summary>Originally Aired on June 1, 2021



Articles discussed in this episode:



00:00 – PreShow Banter™ — Fishing Attacks



02:40 – Story 1: https://m1racles.com/



05:33 – Story 2: https://arstechnica.com/gadgets/2021/05/vulnerability-in-vmware-product-has-severity-rating-of-9-8-out-of-10/



11:26 – Story 3: https://www.securityweek.com/nuclear-flash-cards-us-secrets-exposed-learning-apps



15:29 – Story 4: https://www.darkreading.com/risk/cyber-insurance-firms-start-tapping-out-as-ransomware-continues-to-rise/d/d-id/1341109



23:44 – Story 5: https://www.zdnet.com/article/various-japanese-government-entities-had-data-stolen-in-cyber-attack-report/



26:26 – Story 6: https://www.microsoft.com/security/blog/2021/05/27/new-sophisticated-email-based-attack-from-nobelium/



















Check out our Cyber Range, not just a place to work through challenges and play, but also an open direct/hands-on training environment.    



https://www.blackhillsinfosec.com/services/cyber-range/ 















Join the BHIS Blog Mailing List – get notified when we post new blogs, webcasts, and podcasts.



            
									
						
						Join 3,444 other subscribers						
					
					                    
                        
							Email Address                        
                        
                    

					
                        
                        
                        
                        
						                        
	                        Subscribe</itunes:summary>
      <itunes:subtitle>Originally Aired on June 1, 2021



Articles discussed in this episode:



00:00 – PreShow Banter™ — Fishing Attacks



02:40 – Story 1: https://m1racles.com/



05:33 – Story 2: https://arstechnica.com/gadgets/2021/05/vulnerability-in-vmware-product-has-</itunes:subtitle>
      <itunes:keywords>Infosec,Cybersecurity,news</itunes:keywords>
      <itunes:explicit>No</itunes:explicit>
      <podcast:chapters url="https://share.transistor.fm/s/805e3c8d/chapters.json" type="application/json+chapters"/>
    </item>
    <item>
      <title>Webcast: Getting Started in Pentesting The Cloud: Azure</title>
      <itunes:episode>1</itunes:episode>
      <podcast:episode>1</podcast:episode>
      <itunes:title>Webcast: Getting Started in Pentesting The Cloud: Azure</itunes:title>
      <itunes:episodeType>full</itunes:episodeType>
      <guid isPermaLink="false">https://www.blackhillsinfosec.com/?p=18988</guid>
      <link>https://share.transistor.fm/s/907ea458</link>
      <description>
        <![CDATA[In this Black Hills Information Security (BHIS) webcast, you will learn tools and techniques for performing penetration tests against Microsoft Azure environments. 



Increasingly, more organizations are migrating resources to being hosted in the cloud. With this comes a greater potential for misconfiguration if there isn’t a solid understanding of the attack surface. While there are many similarities between traditional on-premises pentesting and cloud-based pentesting, the latter is an animal of its own. This webcast attempts to clear up some of the fogginess around cloud-based pentesting, specific to Microsoft Azure environments, including Microsoft 365. 



In order to adequately determine the attack surface, the appropriate coverage areas are highlighted. Differences between Azure resources and Microsoft 365 can oftentimes be confusing but knowing these differences is key to helping you pivot and escalate privileges. Conditional access policies are great for defining different scenarios for how users can authenticate securely but can also be misconfigured. There are security protections for stopping certain password attacks but some of these can be bypassed. Ultimately, a methodology for testing Azure environments along with tools and techniques are presented in this talk. 



36:31 – Webcast officially starts



Join us on the BLACK HILLS INFOSEC Discord server for interaction with Beau and your fellow attendees: https://discord.gg/bhis



















Check out our Cyber Range, not just a place to work through challenges and play, but also an open direct/hands-on training environment.    



https://www.blackhillsinfosec.com/services/cyber-range/ 















Join the BHIS Blog Mailing List – get notified when we post new blogs, webcasts, and podcasts.



            
									
						
						Join 3,437 other subscribers						
					
					                    
                        
							Email Address                        
                        
                    

					
                        
                        
                        
                        
						                        
	                        Subscribe
<ul><li>(00:00) - FEATURE PRESENTATION: Getting Started in Pentesting the Cloud – Azure </li>
<li>(02:32) - WHOAMI</li>
<li>(03:20) - Talk Roadmap</li>
<li>(05:33) - Why Azure?</li>
<li>(08:06) - Identifying Attack Surface</li>
<li>(12:50) - Recon &amp; External Attacks</li>
<li>(19:31) - Password Attacks</li>
<li>(21:37) - Password Protection &amp; Smart Lockout</li>
<li>(23:05) - Authentication</li>
<li>(26:52) - Conditional Access Policies &amp; MFA</li>
<li>(34:11) - Post Compromise</li>
<li>(36:46) - Command Line Access</li>
<li>(37:40) - LINK: CloundPentest Cheatsheets: https://github.com/dafthack/CloudPentestCheatsheets</li>
<li>(37:53) - Azure Subscription Hierarchy</li>
<li>(41:31) - Resource Specific Issues</li>
<li>(41:55) - Serverless Environment Variables</li>
<li>(48:59) - Leveraging Scanning Tools</li>
<li>(51:11) - Key Takeaways</li>
<li>(52:37) - PostShow Banter™ — They Got Questions, Beau</li>
</ul>]]>
      </description>
      <content:encoded>
        <![CDATA[In this Black Hills Information Security (BHIS) webcast, you will learn tools and techniques for performing penetration tests against Microsoft Azure environments. 



Increasingly, more organizations are migrating resources to being hosted in the cloud. With this comes a greater potential for misconfiguration if there isn’t a solid understanding of the attack surface. While there are many similarities between traditional on-premises pentesting and cloud-based pentesting, the latter is an animal of its own. This webcast attempts to clear up some of the fogginess around cloud-based pentesting, specific to Microsoft Azure environments, including Microsoft 365. 



In order to adequately determine the attack surface, the appropriate coverage areas are highlighted. Differences between Azure resources and Microsoft 365 can oftentimes be confusing but knowing these differences is key to helping you pivot and escalate privileges. Conditional access policies are great for defining different scenarios for how users can authenticate securely but can also be misconfigured. There are security protections for stopping certain password attacks but some of these can be bypassed. Ultimately, a methodology for testing Azure environments along with tools and techniques are presented in this talk. 



36:31 – Webcast officially starts



Join us on the BLACK HILLS INFOSEC Discord server for interaction with Beau and your fellow attendees: https://discord.gg/bhis



















Check out our Cyber Range, not just a place to work through challenges and play, but also an open direct/hands-on training environment.    



https://www.blackhillsinfosec.com/services/cyber-range/ 















Join the BHIS Blog Mailing List – get notified when we post new blogs, webcasts, and podcasts.



            
									
						
						Join 3,437 other subscribers						
					
					                    
                        
							Email Address                        
                        
                    

					
                        
                        
                        
                        
						                        
	                        Subscribe
<ul><li>(00:00) - FEATURE PRESENTATION: Getting Started in Pentesting the Cloud – Azure </li>
<li>(02:32) - WHOAMI</li>
<li>(03:20) - Talk Roadmap</li>
<li>(05:33) - Why Azure?</li>
<li>(08:06) - Identifying Attack Surface</li>
<li>(12:50) - Recon &amp; External Attacks</li>
<li>(19:31) - Password Attacks</li>
<li>(21:37) - Password Protection &amp; Smart Lockout</li>
<li>(23:05) - Authentication</li>
<li>(26:52) - Conditional Access Policies &amp; MFA</li>
<li>(34:11) - Post Compromise</li>
<li>(36:46) - Command Line Access</li>
<li>(37:40) - LINK: CloundPentest Cheatsheets: https://github.com/dafthack/CloudPentestCheatsheets</li>
<li>(37:53) - Azure Subscription Hierarchy</li>
<li>(41:31) - Resource Specific Issues</li>
<li>(41:55) - Serverless Environment Variables</li>
<li>(48:59) - Leveraging Scanning Tools</li>
<li>(51:11) - Key Takeaways</li>
<li>(52:37) - PostShow Banter™ — They Got Questions, Beau</li>
</ul>]]>
      </content:encoded>
      <pubDate>Thu, 03 Jun 2021 13:57:41 -0400</pubDate>
      <author>Black Hills Information Security</author>
      <enclosure url="https://media.transistor.fm/907ea458/95718b09.mp3" length="51080401" type="audio/mpeg"/>
      <itunes:author>Black Hills Information Security</itunes:author>
      <itunes:image href="https://img.transistorcdn.com/OftHgflo41ixyr1fGLt0R9F1Oau51UHWjoA3Aj1yWnM/rs:fill:0:0:1/w:1400/h:1400/q:60/mb:500000/aHR0cHM6Ly9pbWct/dXBsb2FkLXByb2R1/Y3Rpb24udHJhbnNp/c3Rvci5mbS82MjA1/ODhkNzQ5YWMzZWM4/ZmZiMzVkMTE0ZjEx/ZTgyOC5qcGc.jpg"/>
      <itunes:duration>4023</itunes:duration>
      <itunes:summary>In this Black Hills Information Security (BHIS) webcast, you will learn tools and techniques for performing penetration tests against Microsoft Azure environments. 



Increasingly, more organizations are migrating resources to being hosted in the cloud. With this comes a greater potential for misconfiguration if there isn’t a solid understanding of the attack surface. While there are many similarities between traditional on-premises pentesting and cloud-based pentesting, the latter is an animal of its own. This webcast attempts to clear up some of the fogginess around cloud-based pentesting, specific to Microsoft Azure environments, including Microsoft 365. 



In order to adequately determine the attack surface, the appropriate coverage areas are highlighted. Differences between Azure resources and Microsoft 365 can oftentimes be confusing but knowing these differences is key to helping you pivot and escalate privileges. Conditional access policies are great for defining different scenarios for how users can authenticate securely but can also be misconfigured. There are security protections for stopping certain password attacks but some of these can be bypassed. Ultimately, a methodology for testing Azure environments along with tools and techniques are presented in this talk. 



36:31 – Webcast officially starts



Join us on the BLACK HILLS INFOSEC Discord server for interaction with Beau and your fellow attendees: https://discord.gg/bhis



















Check out our Cyber Range, not just a place to work through challenges and play, but also an open direct/hands-on training environment.    



https://www.blackhillsinfosec.com/services/cyber-range/ 















Join the BHIS Blog Mailing List – get notified when we post new blogs, webcasts, and podcasts.



            
									
						
						Join 3,437 other subscribers						
					
					                    
                        
							Email Address                        
                        
                    

					
                        
                        
                        
                        
						                        
	                        Subscribe</itunes:summary>
      <itunes:subtitle>In this Black Hills Information Security (BHIS) webcast, you will learn tools and techniques for performing penetration tests against Microsoft Azure environments. 



Increasingly, more organizations are migrating resources to being hosted in the cloud. </itunes:subtitle>
      <itunes:keywords>Infosec,Cybersecurity,news</itunes:keywords>
      <itunes:explicit>No</itunes:explicit>
      <podcast:chapters url="https://share.transistor.fm/s/907ea458/chapters.json" type="application/json+chapters"/>
    </item>
    <item>
      <title>Backdoors &amp; Breaches LIVE - 5/19/2021</title>
      <itunes:episode>1</itunes:episode>
      <podcast:episode>1</podcast:episode>
      <itunes:title>Backdoors &amp; Breaches LIVE - 5/19/2021</itunes:title>
      <itunes:episodeType>full</itunes:episodeType>
      <guid isPermaLink="false">https://www.blackhillsinfosec.com/?p=18968</guid>
      <link>https://share.transistor.fm/s/4f0ef38f</link>
      <description>
        <![CDATA[Join our Incident Master Ean Meyer as we play another round of Backdoors &amp; Breaches (B&amp;B) session using our new Tabletop Simulator (TTS) version! If you have STEAM / TABLETOP SIMULATOR / BACKDOORS &amp; BREACHES WORKSHOP, you can play using the same version of the game. https:/steamcommunity.com/sharedfiles/filedetails/?id=2401033477



Incident Master: 



Ean | EanMeyer



Defenders: 



Qasim | hashtaginfosec



Kaitlyn | Kadawi



Blake | zer0cool



Vee | Po1Zon_P1x13



Ralph | ralphte1



Game Play Master:



Jason | BanjoCrashland



Our good friend Edward Miro wrote an extensive guide on how to install and use B&amp;B on TTS. Check it out below!



https://www.blackhillsinfosec.com/backdoors-breaches-tabletop-simulator-guide/



















Check out our Cyber Range, not just a place to work through challenges and play, but also an open direct/hands-on training environment.    



https://www.blackhillsinfosec.com/services/cyber-range/ 















Join the BHIS Blog Mailing List – get notified when we post new blogs, webcasts, and podcasts.



            
									
						
						Join 3,408 other subscribers						
					
					                    
                        
							Email Address                        
                        
                    

					
                        
                        
                        
                        
						                        
	                        Subscribe]]>
      </description>
      <content:encoded>
        <![CDATA[Join our Incident Master Ean Meyer as we play another round of Backdoors &amp; Breaches (B&amp;B) session using our new Tabletop Simulator (TTS) version! If you have STEAM / TABLETOP SIMULATOR / BACKDOORS &amp; BREACHES WORKSHOP, you can play using the same version of the game. https:/steamcommunity.com/sharedfiles/filedetails/?id=2401033477



Incident Master: 



Ean | EanMeyer



Defenders: 



Qasim | hashtaginfosec



Kaitlyn | Kadawi



Blake | zer0cool



Vee | Po1Zon_P1x13



Ralph | ralphte1



Game Play Master:



Jason | BanjoCrashland



Our good friend Edward Miro wrote an extensive guide on how to install and use B&amp;B on TTS. Check it out below!



https://www.blackhillsinfosec.com/backdoors-breaches-tabletop-simulator-guide/



















Check out our Cyber Range, not just a place to work through challenges and play, but also an open direct/hands-on training environment.    



https://www.blackhillsinfosec.com/services/cyber-range/ 















Join the BHIS Blog Mailing List – get notified when we post new blogs, webcasts, and podcasts.



            
									
						
						Join 3,408 other subscribers						
					
					                    
                        
							Email Address                        
                        
                    

					
                        
                        
                        
                        
						                        
	                        Subscribe]]>
      </content:encoded>
      <pubDate>Fri, 28 May 2021 08:54:18 -0400</pubDate>
      <author>Black Hills Information Security</author>
      <enclosure url="https://media.transistor.fm/4f0ef38f/7a7f8166.mp3" length="34550746" type="audio/mpeg"/>
      <itunes:author>Black Hills Information Security</itunes:author>
      <itunes:image href="https://img.transistorcdn.com/lFNWUQW9DqgM5zK1Jvi9nRZUYMkOM0WVH4ErEb-c-lI/rs:fill:0:0:1/w:1400/h:1400/q:60/mb:500000/aHR0cHM6Ly9pbWct/dXBsb2FkLXByb2R1/Y3Rpb24udHJhbnNp/c3Rvci5mbS8xNTAz/M2QxZmEyM2VmYTYw/ZTA3MjA4MjUwYjU4/ODNjMi5qcGc.jpg"/>
      <itunes:duration>4278</itunes:duration>
      <itunes:summary>Join our Incident Master Ean Meyer as we play another round of Backdoors &amp;amp; Breaches (B&amp;amp;B) session using our new Tabletop Simulator (TTS) version! If you have STEAM / TABLETOP SIMULATOR / BACKDOORS &amp;amp; BREACHES WORKSHOP, you can play using the same version of the game. https:/steamcommunity.com/sharedfiles/filedetails/?id=2401033477



Incident Master: 



Ean | EanMeyer



Defenders: 



Qasim | hashtaginfosec



Kaitlyn | Kadawi



Blake | zer0cool



Vee | Po1Zon_P1x13



Ralph | ralphte1



Game Play Master:



Jason | BanjoCrashland



Our good friend Edward Miro wrote an extensive guide on how to install and use B&amp;amp;B on TTS. Check it out below!



https://www.blackhillsinfosec.com/backdoors-breaches-tabletop-simulator-guide/



















Check out our Cyber Range, not just a place to work through challenges and play, but also an open direct/hands-on training environment.    



https://www.blackhillsinfosec.com/services/cyber-range/ 















Join the BHIS Blog Mailing List – get notified when we post new blogs, webcasts, and podcasts.



            
									
						
						Join 3,408 other subscribers						
					
					                    
                        
							Email Address                        
                        
                    

					
                        
                        
                        
                        
						                        
	                        Subscribe</itunes:summary>
      <itunes:subtitle>Join our Incident Master Ean Meyer as we play another round of Backdoors &amp;amp; Breaches (B&amp;amp;B) session using our new Tabletop Simulator (TTS) version! If you have STEAM / TABLETOP SIMULATOR / BACKDOORS &amp;amp; BREACHES WORKSHOP, you can play using the sa</itunes:subtitle>
      <itunes:keywords>Infosec,Cybersecurity,news</itunes:keywords>
      <itunes:explicit>No</itunes:explicit>
    </item>
    <item>
      <title>Backdoors &amp; Breaches Live! 05/19/2021</title>
      <itunes:episode>1</itunes:episode>
      <podcast:episode>1</podcast:episode>
      <itunes:title>Backdoors &amp; Breaches Live! 05/19/2021</itunes:title>
      <itunes:episodeType>full</itunes:episodeType>
      <guid isPermaLink="false">http://www.blubrry.com/bhis/77451204/backdoors-breaches-live-05192021/</guid>
      <link>https://share.transistor.fm/s/643908f1</link>
      <description>
        <![CDATA[<p>Join Incident Master Ean Meyer as we play another round of Backdoors &amp; Breaches.</p>]]>
      </description>
      <content:encoded>
        <![CDATA[<p>Join Incident Master Ean Meyer as we play another round of Backdoors &amp; Breaches.</p>]]>
      </content:encoded>
      <pubDate>Fri, 21 May 2021 09:15:00 -0400</pubDate>
      <author>Black Hills Information Security</author>
      <enclosure url="https://media.transistor.fm/643908f1/3f987b7c.mp3" length="34233424" type="audio/mpeg"/>
      <itunes:author>Black Hills Information Security</itunes:author>
      <itunes:duration>4278</itunes:duration>
      <itunes:summary>Join Incident Master Ean Meyer as we play another round of Backdoors &amp;amp; Breaches.</itunes:summary>
      <itunes:subtitle>Join Incident Master Ean Meyer as we play another round of Backdoors &amp;amp; Breaches.</itunes:subtitle>
      <itunes:keywords>Infosec,Cybersecurity,news</itunes:keywords>
      <itunes:explicit>No</itunes:explicit>
    </item>
    <item>
      <title>Webcast: Your Free and Open Source EDR Options!</title>
      <itunes:episode>1</itunes:episode>
      <podcast:episode>1</podcast:episode>
      <itunes:title>Webcast: Your Free and Open Source EDR Options!</itunes:title>
      <itunes:episodeType>full</itunes:episodeType>
      <guid isPermaLink="false">https://www.blackhillsinfosec.com/?p=18904</guid>
      <link>https://share.transistor.fm/s/a1a8194f</link>
      <description>
        <![CDATA[There has been a huge explosion of different free and open-source options for EDR in the security space. Which is nice because the commercial offerings are stupid expensive. In this Black Hills Information Security (BHIS) webcast, we look at OpenEDR, Elastic, and Velociraptor. With all these great options, there is no reason your organization should not have one of these offerings. Further, they are essential for any IR gig you may do. 



You may be a shop that is looking at commercial offerings, however, you should always look at the free offerings first. Remember, you are not paying for what the commercial product offers, you are paying for what it does versus what the free offerings do not.



Join the BHIS Community Discord: https://discord.gg/bhis 



0:00:00 – FEATURE PRESENTATION: Your Free &amp; Open EDR Options! 



0:02:03 – Why We here? 



0:04:46 – EDR? Like that there electronic music? 



0:11:48 – Vendors 



0:14:21 – MITRE Evaluations 



0:19:17 – So, Why EDR? 



0:23:05 – Free and Open Source? 



0:28:48 – OSSEC 



0:31:12 – So, WAZUH 



0:38:28 – Velociraptor 



0:41:09 – DEMO: Velociraptor 



0:48:35 – Vendors and Free/OS 



0:49:57 – Elastic (Formerly Endgame) 



0:55:09 – OPEN EDR – From Comodo 



0:58:41 – Conclusions 



1:01:53 – Backdoors &amp; Breaches Virtual



Slides for this webcast can be found here:
<ul><li>(00:00) - FEATURE PRESENTATION: Your Free &amp; Open EDR Options!</li>
<li>(02:03) - Why We here?</li>
<li>(04:46) - EDR? Like that there electronic music?</li>
<li>(11:48) - Vendors</li>
<li>(14:21) - MITRE Evaluations</li>
<li>(19:17) - So, Why EDR?</li>
<li>(23:05) - Free and Open Source?</li>
<li>(28:48) - OSSEC</li>
<li>(31:12) - So, WAZUH</li>
<li>(38:28) - Velociraptor</li>
<li>(41:09) - DEMO: Velociraptor</li>
<li>(48:35) - Vendors and Free/OS</li>
<li>(49:57) - Elastic (Formerly Endgame)</li>
<li>(55:09) - OPEN EDR - From Comodo</li>
<li>(58:41) - Conclusions</li>
<li>(01:01:53) - Backdoors and Breaches Virtual</li>
<li>(01:07:05) - John Pitches BHIS SOC</li>
</ul>]]>
      </description>
      <content:encoded>
        <![CDATA[There has been a huge explosion of different free and open-source options for EDR in the security space. Which is nice because the commercial offerings are stupid expensive. In this Black Hills Information Security (BHIS) webcast, we look at OpenEDR, Elastic, and Velociraptor. With all these great options, there is no reason your organization should not have one of these offerings. Further, they are essential for any IR gig you may do. 



You may be a shop that is looking at commercial offerings, however, you should always look at the free offerings first. Remember, you are not paying for what the commercial product offers, you are paying for what it does versus what the free offerings do not.



Join the BHIS Community Discord: https://discord.gg/bhis 



0:00:00 – FEATURE PRESENTATION: Your Free &amp; Open EDR Options! 



0:02:03 – Why We here? 



0:04:46 – EDR? Like that there electronic music? 



0:11:48 – Vendors 



0:14:21 – MITRE Evaluations 



0:19:17 – So, Why EDR? 



0:23:05 – Free and Open Source? 



0:28:48 – OSSEC 



0:31:12 – So, WAZUH 



0:38:28 – Velociraptor 



0:41:09 – DEMO: Velociraptor 



0:48:35 – Vendors and Free/OS 



0:49:57 – Elastic (Formerly Endgame) 



0:55:09 – OPEN EDR – From Comodo 



0:58:41 – Conclusions 



1:01:53 – Backdoors &amp; Breaches Virtual



Slides for this webcast can be found here:
<ul><li>(00:00) - FEATURE PRESENTATION: Your Free &amp; Open EDR Options!</li>
<li>(02:03) - Why We here?</li>
<li>(04:46) - EDR? Like that there electronic music?</li>
<li>(11:48) - Vendors</li>
<li>(14:21) - MITRE Evaluations</li>
<li>(19:17) - So, Why EDR?</li>
<li>(23:05) - Free and Open Source?</li>
<li>(28:48) - OSSEC</li>
<li>(31:12) - So, WAZUH</li>
<li>(38:28) - Velociraptor</li>
<li>(41:09) - DEMO: Velociraptor</li>
<li>(48:35) - Vendors and Free/OS</li>
<li>(49:57) - Elastic (Formerly Endgame)</li>
<li>(55:09) - OPEN EDR - From Comodo</li>
<li>(58:41) - Conclusions</li>
<li>(01:01:53) - Backdoors and Breaches Virtual</li>
<li>(01:07:05) - John Pitches BHIS SOC</li>
</ul>]]>
      </content:encoded>
      <pubDate>Wed, 19 May 2021 08:45:00 -0400</pubDate>
      <author>Black Hills Information Security</author>
      <enclosure url="https://media.transistor.fm/a1a8194f/4eaf6f5b.mp3" length="41344630" type="audio/mpeg"/>
      <itunes:author>Black Hills Information Security</itunes:author>
      <itunes:image href="https://img.transistorcdn.com/iL4hlvsQsTMOHUffQ28yeoB8K0pR7mrw8Jt1qZrv7dg/rs:fill:0:0:1/w:1400/h:1400/q:60/mb:500000/aHR0cHM6Ly9pbWct/dXBsb2FkLXByb2R1/Y3Rpb24udHJhbnNp/c3Rvci5mbS8yZTc2/M2VjYTU4ZGUyNjQ5/NWRlMmNlYzc5YThm/ZjdmYS5qcGc.jpg"/>
      <itunes:duration>4911</itunes:duration>
      <itunes:summary>There has been a huge explosion of different free and open-source options for EDR in the security space. Which is nice because the commercial offerings are stupid expensive. In this Black Hills Information Security (BHIS) webcast, we look at OpenEDR, Elastic, and Velociraptor. With all these great options, there is no reason your organization should not have one of these offerings. Further, they are essential for any IR gig you may do. 



You may be a shop that is looking at commercial offerings, however, you should always look at the free offerings first. Remember, you are not paying for what the commercial product offers, you are paying for what it does versus what the free offerings do not.



Join the BHIS Community Discord: https://discord.gg/bhis 



0:00:00 – FEATURE PRESENTATION: Your Free &amp;amp; Open EDR Options! 



0:02:03 – Why We here? 



0:04:46 – EDR? Like that there electronic music? 



0:11:48 – Vendors 



0:14:21 – MITRE Evaluations 



0:19:17 – So, Why EDR? 



0:23:05 – Free and Open Source? 



0:28:48 – OSSEC 



0:31:12 – So, WAZUH 



0:38:28 – Velociraptor 



0:41:09 – DEMO: Velociraptor 



0:48:35 – Vendors and Free/OS 



0:49:57 – Elastic (Formerly Endgame) 



0:55:09 – OPEN EDR – From Comodo 



0:58:41 – Conclusions 



1:01:53 – Backdoors &amp;amp; Breaches Virtual



Slides for this webcast can be found here:</itunes:summary>
      <itunes:subtitle>There has been a huge explosion of different free and open-source options for EDR in the security space. Which is nice because the commercial offerings are stupid expensive. In this Black Hills Information Security (BHIS) webcast, we look at OpenEDR, Elas</itunes:subtitle>
      <itunes:keywords>Infosec,Cybersecurity,news</itunes:keywords>
      <itunes:explicit>No</itunes:explicit>
      <podcast:chapters url="https://share.transistor.fm/s/a1a8194f/chapters.json" type="application/json+chapters"/>
    </item>
    <item>
      <title>Talkin’ About Infosec News – 5/10/2021</title>
      <itunes:episode>1</itunes:episode>
      <podcast:episode>1</podcast:episode>
      <itunes:title>Talkin’ About Infosec News – 5/10/2021</itunes:title>
      <itunes:episodeType>full</itunes:episodeType>
      <guid isPermaLink="false">https://www.blackhillsinfosec.com/?p=18888</guid>
      <link>https://share.transistor.fm/s/f0edbed5</link>
      <description>
        <![CDATA[Originally Aired on May 10, 2021



Articles discussed in this episode:



* https://whyy.org/segments/the-greatest-hoax-on-earth/ * https://www.fbi.gov/news/pressrel/press-releases/fbi-statement-on-network-disruption-at-colonial-pipeline * https://arstechnica.com/gadgets/2021/05/peloton-takes-3-months-to-fix-flaw-that-exposed-users-private-information/ * https://threatpost.com/critical-cisco-sd-wan-hyperflex-bugs/165923/ * https://www.macrumors.com/2021/05/10/hacked-airtag-links-to-custom-url-lost-mode/ * https://jalopnik.com/security-researchers-hack-a-tesla-from-a-drone-1846833249



















Check out our Cyber Range, not just a place to work through challenges and play, but also an open direct/hands-on training environment.    



https://www.blackhillsinfosec.com/services/cyber-range/ 















Join the BHIS Blog Mailing List – get notified when we post new blogs, webcasts, and podcasts.



            
									
						
						Join 3,362 other subscribers						
					
					                    
                        
							Email Address                        
                        
                    

					
                        
                        
                        
                        
						                        
	                        Subscribe]]>
      </description>
      <content:encoded>
        <![CDATA[Originally Aired on May 10, 2021



Articles discussed in this episode:



* https://whyy.org/segments/the-greatest-hoax-on-earth/ * https://www.fbi.gov/news/pressrel/press-releases/fbi-statement-on-network-disruption-at-colonial-pipeline * https://arstechnica.com/gadgets/2021/05/peloton-takes-3-months-to-fix-flaw-that-exposed-users-private-information/ * https://threatpost.com/critical-cisco-sd-wan-hyperflex-bugs/165923/ * https://www.macrumors.com/2021/05/10/hacked-airtag-links-to-custom-url-lost-mode/ * https://jalopnik.com/security-researchers-hack-a-tesla-from-a-drone-1846833249



















Check out our Cyber Range, not just a place to work through challenges and play, but also an open direct/hands-on training environment.    



https://www.blackhillsinfosec.com/services/cyber-range/ 















Join the BHIS Blog Mailing List – get notified when we post new blogs, webcasts, and podcasts.



            
									
						
						Join 3,362 other subscribers						
					
					                    
                        
							Email Address                        
                        
                    

					
                        
                        
                        
                        
						                        
	                        Subscribe]]>
      </content:encoded>
      <pubDate>Fri, 14 May 2021 11:43:18 -0400</pubDate>
      <author>Black Hills Information Security</author>
      <enclosure url="https://media.transistor.fm/f0edbed5/7ace9432.mp3" length="27404158" type="audio/mpeg"/>
      <itunes:author>Black Hills Information Security</itunes:author>
      <itunes:image href="https://img.transistorcdn.com/EfwWgghh3nWRQwKb0-RMJDWIJ_a1fQYwMrJJtfE6g1g/rs:fill:0:0:1/w:1400/h:1400/q:60/mb:500000/aHR0cHM6Ly9pbWct/dXBsb2FkLXByb2R1/Y3Rpb24udHJhbnNp/c3Rvci5mbS84OTE4/ZDE2OTc5N2RhZDgy/NzM3ZWFjMWNhYjgx/MjVkOC5wbmc.jpg"/>
      <itunes:duration>3420</itunes:duration>
      <itunes:summary>Originally Aired on May 10, 2021



Articles discussed in this episode:



* https://whyy.org/segments/the-greatest-hoax-on-earth/ * https://www.fbi.gov/news/pressrel/press-releases/fbi-statement-on-network-disruption-at-colonial-pipeline * https://arstechnica.com/gadgets/2021/05/peloton-takes-3-months-to-fix-flaw-that-exposed-users-private-information/ * https://threatpost.com/critical-cisco-sd-wan-hyperflex-bugs/165923/ * https://www.macrumors.com/2021/05/10/hacked-airtag-links-to-custom-url-lost-mode/ * https://jalopnik.com/security-researchers-hack-a-tesla-from-a-drone-1846833249



















Check out our Cyber Range, not just a place to work through challenges and play, but also an open direct/hands-on training environment.    



https://www.blackhillsinfosec.com/services/cyber-range/ 















Join the BHIS Blog Mailing List – get notified when we post new blogs, webcasts, and podcasts.



            
									
						
						Join 3,362 other subscribers						
					
					                    
                        
							Email Address                        
                        
                    

					
                        
                        
                        
                        
						                        
	                        Subscribe</itunes:summary>
      <itunes:subtitle>Originally Aired on May 10, 2021



Articles discussed in this episode:



* https://whyy.org/segments/the-greatest-hoax-on-earth/ * https://www.fbi.gov/news/pressrel/press-releases/fbi-statement-on-network-disruption-at-colonial-pipeline * https://arstec</itunes:subtitle>
      <itunes:keywords>Infosec,Cybersecurity,news</itunes:keywords>
      <itunes:explicit>No</itunes:explicit>
    </item>
    <item>
      <title>Webcast: Ok, Let's Talk About Ransomware</title>
      <itunes:episode>1</itunes:episode>
      <podcast:episode>1</podcast:episode>
      <itunes:title>Webcast: Ok, Let's Talk About Ransomware</itunes:title>
      <itunes:episodeType>full</itunes:episodeType>
      <guid isPermaLink="false">https://www.blackhillsinfosec.com/?p=18881</guid>
      <link>https://share.transistor.fm/s/99a30f91</link>
      <description>
        <![CDATA[This is a joint emergency webcast from the teams of Black Hills Information Security, Wild West Hackin’ Fest, and Active Countermeasures, presented by John Strand. 



There have been a couple of very scary ransomware stories in the news over the past few weeks. We figured it would be a good idea to throw a quick emergency webcast together to cover some of these new developments and hit on some very real and very easy things to mitigate against some of these attacks. 



We say “some” because these attacks are evolving. Traditionally, there are two classes of ransomware, but we are seeing a third start to develop which is harder to deal with. 



But not impossible. 



Yes, we will be talking about deception and attribution. Yes, we will be talking about beacon analysis. Because they are kind of our things. 



But, we will also discuss some new open-source technologies. And… something you can just turn on. 



The point is these attacks are rapidly evolving. The attack on Colonial shows just a glimpse of how bad these attacks are going to get. 



Also, we are seeing how we cannot view Operation Technology (OT) as a completely different security creature. Everything is interconnected. We need to start treating security more holistically and stop saying things like, “we just want to focus on the OT/SCADA/PCI/HIPAA enclave.”



Slides for this webcast can be found here: https://www.blackhillsinfosec.com/wp-content/uploads/2021/05/SLIDES_LetsTalkAboutRansomware.pdf



















Check out our Cyber Range, not just a place to work through challenges and play, but also an open direct/hands-on training environment.    



https://www.blackhillsinfosec.com/services/cyber-range/ 















Join the BHIS Blog Mailing List – get notified when we post new blogs, webcasts, and podcasts.



            
									
						
						Join 3,344 other subscribers						
					
					                    
                        
							Email Address                        
                        
                    

					
                        
                        
                        
                        
						                        
	                        Subscribe
<ul><li>(00:00) - PreShow Banter™ — John Strand Has Windows Updates</li>
<li>(25:39) - FEATURE PRESENTATION: OK, Let’s Talk About Ransomware</li>
<li>(01:25:34) - Wrap-up Questions</li>
</ul>]]>
      </description>
      <content:encoded>
        <![CDATA[This is a joint emergency webcast from the teams of Black Hills Information Security, Wild West Hackin’ Fest, and Active Countermeasures, presented by John Strand. 



There have been a couple of very scary ransomware stories in the news over the past few weeks. We figured it would be a good idea to throw a quick emergency webcast together to cover some of these new developments and hit on some very real and very easy things to mitigate against some of these attacks. 



We say “some” because these attacks are evolving. Traditionally, there are two classes of ransomware, but we are seeing a third start to develop which is harder to deal with. 



But not impossible. 



Yes, we will be talking about deception and attribution. Yes, we will be talking about beacon analysis. Because they are kind of our things. 



But, we will also discuss some new open-source technologies. And… something you can just turn on. 



The point is these attacks are rapidly evolving. The attack on Colonial shows just a glimpse of how bad these attacks are going to get. 



Also, we are seeing how we cannot view Operation Technology (OT) as a completely different security creature. Everything is interconnected. We need to start treating security more holistically and stop saying things like, “we just want to focus on the OT/SCADA/PCI/HIPAA enclave.”



Slides for this webcast can be found here: https://www.blackhillsinfosec.com/wp-content/uploads/2021/05/SLIDES_LetsTalkAboutRansomware.pdf



















Check out our Cyber Range, not just a place to work through challenges and play, but also an open direct/hands-on training environment.    



https://www.blackhillsinfosec.com/services/cyber-range/ 















Join the BHIS Blog Mailing List – get notified when we post new blogs, webcasts, and podcasts.



            
									
						
						Join 3,344 other subscribers						
					
					                    
                        
							Email Address                        
                        
                    

					
                        
                        
                        
                        
						                        
	                        Subscribe
<ul><li>(00:00) - PreShow Banter™ — John Strand Has Windows Updates</li>
<li>(25:39) - FEATURE PRESENTATION: OK, Let’s Talk About Ransomware</li>
<li>(01:25:34) - Wrap-up Questions</li>
</ul>]]>
      </content:encoded>
      <pubDate>Wed, 12 May 2021 13:11:52 -0400</pubDate>
      <author>Black Hills Information Security</author>
      <enclosure url="https://media.transistor.fm/99a30f91/3b5fb04c.mp3" length="44091514" type="audio/mpeg"/>
      <itunes:author>Black Hills Information Security</itunes:author>
      <itunes:image href="https://img.transistorcdn.com/gJKB_-r5zXlsos63bMq5a2QUuilInCra7-AJFPk81qo/rs:fill:0:0:1/w:1400/h:1400/q:60/mb:500000/aHR0cHM6Ly9pbWct/dXBsb2FkLXByb2R1/Y3Rpb24udHJhbnNp/c3Rvci5mbS9iMzg5/ZDgzNGE3OWJkMzIx/ZmQyMDYzMjAzMjAx/YzVkOS5wbmc.jpg"/>
      <itunes:duration>5506</itunes:duration>
      <itunes:summary>This is a joint emergency webcast from the teams of Black Hills Information Security, Wild West Hackin’ Fest, and Active Countermeasures, presented by John Strand. 



There have been a couple of very scary ransomware stories in the news over the past few weeks. We figured it would be a good idea to throw a quick emergency webcast together to cover some of these new developments and hit on some very real and very easy things to mitigate against some of these attacks. 



We say “some” because these attacks are evolving. Traditionally, there are two classes of ransomware, but we are seeing a third start to develop which is harder to deal with. 



But not impossible. 



Yes, we will be talking about deception and attribution. Yes, we will be talking about beacon analysis. Because they are kind of our things. 



But, we will also discuss some new open-source technologies. And… something you can just turn on. 



The point is these attacks are rapidly evolving. The attack on Colonial shows just a glimpse of how bad these attacks are going to get. 



Also, we are seeing how we cannot view Operation Technology (OT) as a completely different security creature. Everything is interconnected. We need to start treating security more holistically and stop saying things like, “we just want to focus on the OT/SCADA/PCI/HIPAA enclave.”



Slides for this webcast can be found here: https://www.blackhillsinfosec.com/wp-content/uploads/2021/05/SLIDES_LetsTalkAboutRansomware.pdf



















Check out our Cyber Range, not just a place to work through challenges and play, but also an open direct/hands-on training environment.    



https://www.blackhillsinfosec.com/services/cyber-range/ 















Join the BHIS Blog Mailing List – get notified when we post new blogs, webcasts, and podcasts.



            
									
						
						Join 3,344 other subscribers						
					
					                    
                        
							Email Address                        
                        
                    

					
                        
                        
                        
                        
						                        
	                        Subscribe</itunes:summary>
      <itunes:subtitle>This is a joint emergency webcast from the teams of Black Hills Information Security, Wild West Hackin’ Fest, and Active Countermeasures, presented by John Strand. 



There have been a couple of very scary ransomware stories in the news over the past few</itunes:subtitle>
      <itunes:keywords>Infosec,Cybersecurity,news</itunes:keywords>
      <itunes:explicit>No</itunes:explicit>
      <podcast:chapters url="https://share.transistor.fm/s/99a30f91/chapters.json" type="application/json+chapters"/>
    </item>
    <item>
      <title>Talkin’ About Infosec News – 5/5/2021</title>
      <itunes:episode>1</itunes:episode>
      <podcast:episode>1</podcast:episode>
      <itunes:title>Talkin’ About Infosec News – 5/5/2021</itunes:title>
      <itunes:episodeType>full</itunes:episodeType>
      <guid isPermaLink="false">https://www.blackhillsinfosec.com/?p=18831</guid>
      <link>https://share.transistor.fm/s/2c81ab08</link>
      <description>
        <![CDATA[Originally Aired on May 5, 2021



Articles discussed in this episode:



* https://thehackernews.com/images/-V6c2_ZHgMzI/YJFAaQl5RjI/AAAAAAAAA_8/wNs6d4zWc1MHLJ5VPaSpzHvXkFIIcwfZQCLcBGAsYHQ/s0/reset-passsword.jpg * https://threatpost.com/dell-kernel-privilege-bugs/165843/ * https://www.bleepingcomputer.com/news/security/new-windows-pingback-malware-uses-icmp-for-covert-communication/ * https://signal.org/blog/the-instagram-ads-you-will-never-see/ * https://nakedsecurity.sophos.com/2021/05/04/apple-products-hit-by-fourfecta-of-zero-day-exploits-patch-now/



















Check out our Cyber Range, not just a place to work through challenges and play, but also an open direct/hands-on training environment.    



https://www.blackhillsinfosec.com/services/cyber-range/ 















Join the BHIS Blog Mailing List – get notified when we post new blogs, webcasts, and podcasts.



            
									
						
						Join 3,321 other subscribers						
					
					                    
                        
							Email Address                        
                        
                    

					
                        
                        
                        
                        
						                        
	                        Subscribe]]>
      </description>
      <content:encoded>
        <![CDATA[Originally Aired on May 5, 2021



Articles discussed in this episode:



* https://thehackernews.com/images/-V6c2_ZHgMzI/YJFAaQl5RjI/AAAAAAAAA_8/wNs6d4zWc1MHLJ5VPaSpzHvXkFIIcwfZQCLcBGAsYHQ/s0/reset-passsword.jpg * https://threatpost.com/dell-kernel-privilege-bugs/165843/ * https://www.bleepingcomputer.com/news/security/new-windows-pingback-malware-uses-icmp-for-covert-communication/ * https://signal.org/blog/the-instagram-ads-you-will-never-see/ * https://nakedsecurity.sophos.com/2021/05/04/apple-products-hit-by-fourfecta-of-zero-day-exploits-patch-now/



















Check out our Cyber Range, not just a place to work through challenges and play, but also an open direct/hands-on training environment.    



https://www.blackhillsinfosec.com/services/cyber-range/ 















Join the BHIS Blog Mailing List – get notified when we post new blogs, webcasts, and podcasts.



            
									
						
						Join 3,321 other subscribers						
					
					                    
                        
							Email Address                        
                        
                    

					
                        
                        
                        
                        
						                        
	                        Subscribe]]>
      </content:encoded>
      <pubDate>Fri, 07 May 2021 08:53:00 -0400</pubDate>
      <author>Black Hills Information Security</author>
      <enclosure url="https://media.transistor.fm/2c81ab08/c9b3d82b.mp3" length="14459132" type="audio/mpeg"/>
      <itunes:author>Black Hills Information Security</itunes:author>
      <itunes:image href="https://img.transistorcdn.com/fCnj2I01J_w4Z7u5Al0-giLfHIFWAFpBIsMVpV0ozBo/rs:fill:0:0:1/w:1400/h:1400/q:60/mb:500000/aHR0cHM6Ly9pbWct/dXBsb2FkLXByb2R1/Y3Rpb24udHJhbnNp/c3Rvci5mbS8yODFm/NmZjOThiNzcxYjQ0/NmViNGZjM2Y2MmE4/NDAyYy5wbmc.jpg"/>
      <itunes:duration>1802</itunes:duration>
      <itunes:summary>Originally Aired on May 5, 2021



Articles discussed in this episode:



* https://thehackernews.com/images/-V6c2_ZHgMzI/YJFAaQl5RjI/AAAAAAAAA_8/wNs6d4zWc1MHLJ5VPaSpzHvXkFIIcwfZQCLcBGAsYHQ/s0/reset-passsword.jpg * https://threatpost.com/dell-kernel-privilege-bugs/165843/ * https://www.bleepingcomputer.com/news/security/new-windows-pingback-malware-uses-icmp-for-covert-communication/ * https://signal.org/blog/the-instagram-ads-you-will-never-see/ * https://nakedsecurity.sophos.com/2021/05/04/apple-products-hit-by-fourfecta-of-zero-day-exploits-patch-now/



















Check out our Cyber Range, not just a place to work through challenges and play, but also an open direct/hands-on training environment.    



https://www.blackhillsinfosec.com/services/cyber-range/ 















Join the BHIS Blog Mailing List – get notified when we post new blogs, webcasts, and podcasts.



            
									
						
						Join 3,321 other subscribers						
					
					                    
                        
							Email Address                        
                        
                    

					
                        
                        
                        
                        
						                        
	                        Subscribe</itunes:summary>
      <itunes:subtitle>Originally Aired on May 5, 2021



Articles discussed in this episode:



* https://thehackernews.com/images/-V6c2_ZHgMzI/YJFAaQl5RjI/AAAAAAAAA_8/wNs6d4zWc1MHLJ5VPaSpzHvXkFIIcwfZQCLcBGAsYHQ/s0/reset-passsword.jpg * https://threatpost.com/dell-kernel-privi</itunes:subtitle>
      <itunes:keywords>Infosec,Cybersecurity,news</itunes:keywords>
      <itunes:explicit>No</itunes:explicit>
    </item>
    <item>
      <title>Talkin’ About Infosec News – 5/3/2021</title>
      <itunes:episode>1</itunes:episode>
      <podcast:episode>1</podcast:episode>
      <itunes:title>Talkin’ About Infosec News – 5/3/2021</itunes:title>
      <itunes:episodeType>full</itunes:episodeType>
      <guid isPermaLink="false">https://www.blackhillsinfosec.com/?p=18826</guid>
      <link>https://share.transistor.fm/s/dbc9325c</link>
      <description>
        <![CDATA[Originally Aired on May 3, 2021



Articles discussed in this episode:



* https://threatpost.com/deepfake-attacks-surge-experts-warn/165798/ * https://threatpost.com/linux-kernel-bug-wider-cyberattacks/165640/* https://www.reddit.com/r/netsec/comments/n36x7h/arbitrary_code_execution_in_exiftool/* https://krebsonsecurity.com/2021/04/experians-credit-freeze-security-is-still-a-joke/* https://github.com/alievk/avatarify-python * https://media.ccc.de/v/29c3-5327-en-writing_a_thumbdrive_from_scratch_h264



















Check out our Cyber Range, not just a place to work through challenges and play, but also an open direct/hands-on training environment.    



https://www.blackhillsinfosec.com/services/cyber-range/ 















Join the BHIS Blog Mailing List – get notified when we post new blogs, webcasts, and podcasts.



            
									
						
						Join 3,306 other subscribers						
					
					                    
                        
							Email Address                        
                        
                    

					
                        
                        
                        
                        
						                        
	                        Subscribe]]>
      </description>
      <content:encoded>
        <![CDATA[Originally Aired on May 3, 2021



Articles discussed in this episode:



* https://threatpost.com/deepfake-attacks-surge-experts-warn/165798/ * https://threatpost.com/linux-kernel-bug-wider-cyberattacks/165640/* https://www.reddit.com/r/netsec/comments/n36x7h/arbitrary_code_execution_in_exiftool/* https://krebsonsecurity.com/2021/04/experians-credit-freeze-security-is-still-a-joke/* https://github.com/alievk/avatarify-python * https://media.ccc.de/v/29c3-5327-en-writing_a_thumbdrive_from_scratch_h264



















Check out our Cyber Range, not just a place to work through challenges and play, but also an open direct/hands-on training environment.    



https://www.blackhillsinfosec.com/services/cyber-range/ 















Join the BHIS Blog Mailing List – get notified when we post new blogs, webcasts, and podcasts.



            
									
						
						Join 3,306 other subscribers						
					
					                    
                        
							Email Address                        
                        
                    

					
                        
                        
                        
                        
						                        
	                        Subscribe]]>
      </content:encoded>
      <pubDate>Wed, 05 May 2021 13:04:52 -0400</pubDate>
      <author>Black Hills Information Security</author>
      <enclosure url="https://media.transistor.fm/dbc9325c/3de4ec48.mp3" length="26220284" type="audio/mpeg"/>
      <itunes:author>Black Hills Information Security</itunes:author>
      <itunes:image href="https://img.transistorcdn.com/nl-HO_wRS_hXhOkPym1VhM9KzUnLf8WkvJK84JOfFTU/rs:fill:0:0:1/w:1400/h:1400/q:60/mb:500000/aHR0cHM6Ly9pbWct/dXBsb2FkLXByb2R1/Y3Rpb24udHJhbnNp/c3Rvci5mbS84MzJm/MDg5MzUzOGRlOGNl/NDE1Zjk3ZWZmMjAx/NTljZS5wbmc.jpg"/>
      <itunes:duration>3272</itunes:duration>
      <itunes:summary>Originally Aired on May 3, 2021



Articles discussed in this episode:



* https://threatpost.com/deepfake-attacks-surge-experts-warn/165798/ * https://threatpost.com/linux-kernel-bug-wider-cyberattacks/165640/* https://www.reddit.com/r/netsec/comments/n36x7h/arbitrary_code_execution_in_exiftool/* https://krebsonsecurity.com/2021/04/experians-credit-freeze-security-is-still-a-joke/* https://github.com/alievk/avatarify-python * https://media.ccc.de/v/29c3-5327-en-writing_a_thumbdrive_from_scratch_h264



















Check out our Cyber Range, not just a place to work through challenges and play, but also an open direct/hands-on training environment.    



https://www.blackhillsinfosec.com/services/cyber-range/ 















Join the BHIS Blog Mailing List – get notified when we post new blogs, webcasts, and podcasts.



            
									
						
						Join 3,306 other subscribers						
					
					                    
                        
							Email Address                        
                        
                    

					
                        
                        
                        
                        
						                        
	                        Subscribe</itunes:summary>
      <itunes:subtitle>Originally Aired on May 3, 2021



Articles discussed in this episode:



* https://threatpost.com/deepfake-attacks-surge-experts-warn/165798/ * https://threatpost.com/linux-kernel-bug-wider-cyberattacks/165640/* https://www.reddit.com/r/netsec/comments/n</itunes:subtitle>
      <itunes:keywords>Infosec,Cybersecurity,news</itunes:keywords>
      <itunes:explicit>No</itunes:explicit>
    </item>
    <item>
      <title>Backdoors &amp; Breaches LIVE - 4/28/2021</title>
      <itunes:episode>1</itunes:episode>
      <podcast:episode>1</podcast:episode>
      <itunes:title>Backdoors &amp; Breaches LIVE - 4/28/2021</itunes:title>
      <itunes:episodeType>full</itunes:episodeType>
      <guid isPermaLink="false">https://www.blackhillsinfosec.com/?p=18737</guid>
      <link>https://share.transistor.fm/s/d68fab86</link>
      <description>
        <![CDATA[Join our Incident Master BanjoCrashland as we play another round of Backdoors &amp; Breaches (B&amp;B) session using our new Tabletop Simulator (TTS) version! If you have STEAM / TABLETOP SIMULATOR / BACKDOORS &amp; BREACHES WORKSHOP, you can play using the same version of the game. https:/steamcommunity.com/sharedfiles/filedetails/?id=2401033477



Incident Master: 



Jason Blanchard | BanjoCrashland



Defenders: 



Matt Thomas | slegna



Richard Phung | p3hndrx



Maril Vernon | SheWhoHacks



Kaitlyn Wimberley | kadawi



Blake Regan | zer0cool



Ralph May | ralphte1



John Strand | strandjs



Our good friend Edward Miro wrote an extensive guide on how to install and use B&amp;B on TTS. Check it out below!



https://www.blackhillsinfosec.com/backdoors-breaches-tabletop-simulator-guide/



Join the BHIS Blog Mailing List – get notified when we post new blogs, webcasts, and podcasts.



            
									
						
						Join 3,295 other subscribers						
					
					                    
                        
							Email Address                        
                        
                    

					
                        
                        
                        
                        
						                        
	                        Subscribe]]>
      </description>
      <content:encoded>
        <![CDATA[Join our Incident Master BanjoCrashland as we play another round of Backdoors &amp; Breaches (B&amp;B) session using our new Tabletop Simulator (TTS) version! If you have STEAM / TABLETOP SIMULATOR / BACKDOORS &amp; BREACHES WORKSHOP, you can play using the same version of the game. https:/steamcommunity.com/sharedfiles/filedetails/?id=2401033477



Incident Master: 



Jason Blanchard | BanjoCrashland



Defenders: 



Matt Thomas | slegna



Richard Phung | p3hndrx



Maril Vernon | SheWhoHacks



Kaitlyn Wimberley | kadawi



Blake Regan | zer0cool



Ralph May | ralphte1



John Strand | strandjs



Our good friend Edward Miro wrote an extensive guide on how to install and use B&amp;B on TTS. Check it out below!



https://www.blackhillsinfosec.com/backdoors-breaches-tabletop-simulator-guide/



Join the BHIS Blog Mailing List – get notified when we post new blogs, webcasts, and podcasts.



            
									
						
						Join 3,295 other subscribers						
					
					                    
                        
							Email Address                        
                        
                    

					
                        
                        
                        
                        
						                        
	                        Subscribe]]>
      </content:encoded>
      <pubDate>Fri, 30 Apr 2021 12:00:43 -0400</pubDate>
      <author>Black Hills Information Security</author>
      <enclosure url="https://media.transistor.fm/d68fab86/3329180b.mp3" length="22206728" type="audio/mpeg"/>
      <itunes:author>Black Hills Information Security</itunes:author>
      <itunes:image href="https://img.transistorcdn.com/MtUOXypemQZvSJUlzCra16ZXNlJdxSKPq70DsfTbbEY/rs:fill:0:0:1/w:1400/h:1400/q:60/mb:500000/aHR0cHM6Ly9pbWct/dXBsb2FkLXByb2R1/Y3Rpb24udHJhbnNp/c3Rvci5mbS9mZDJl/OGMzMzBmYzE2NDcx/MDQzYWJkNWQ4ZmI5/MjJhNy5qcGc.jpg"/>
      <itunes:duration>2749</itunes:duration>
      <itunes:summary>Join our Incident Master BanjoCrashland as we play another round of Backdoors &amp;amp; Breaches (B&amp;amp;B) session using our new Tabletop Simulator (TTS) version! If you have STEAM / TABLETOP SIMULATOR / BACKDOORS &amp;amp; BREACHES WORKSHOP, you can play using the same version of the game. https:/steamcommunity.com/sharedfiles/filedetails/?id=2401033477



Incident Master: 



Jason Blanchard | BanjoCrashland



Defenders: 



Matt Thomas | slegna



Richard Phung | p3hndrx



Maril Vernon | SheWhoHacks



Kaitlyn Wimberley | kadawi



Blake Regan | zer0cool



Ralph May | ralphte1



John Strand | strandjs



Our good friend Edward Miro wrote an extensive guide on how to install and use B&amp;amp;B on TTS. Check it out below!



https://www.blackhillsinfosec.com/backdoors-breaches-tabletop-simulator-guide/



Join the BHIS Blog Mailing List – get notified when we post new blogs, webcasts, and podcasts.



            
									
						
						Join 3,295 other subscribers						
					
					                    
                        
							Email Address                        
                        
                    

					
                        
                        
                        
                        
						                        
	                        Subscribe</itunes:summary>
      <itunes:subtitle>Join our Incident Master BanjoCrashland as we play another round of Backdoors &amp;amp; Breaches (B&amp;amp;B) session using our new Tabletop Simulator (TTS) version! If you have STEAM / TABLETOP SIMULATOR / BACKDOORS &amp;amp; BREACHES WORKSHOP, you can play using t</itunes:subtitle>
      <itunes:keywords>Infosec,Cybersecurity,news</itunes:keywords>
      <itunes:explicit>No</itunes:explicit>
    </item>
    <item>
      <title>Talkin’ About Infosec News – 4/26/2021</title>
      <itunes:episode>1</itunes:episode>
      <podcast:episode>1</podcast:episode>
      <itunes:title>Talkin’ About Infosec News – 4/26/2021</itunes:title>
      <itunes:episodeType>full</itunes:episodeType>
      <guid isPermaLink="false">https://www.blackhillsinfosec.com/?p=18734</guid>
      <link>https://share.transistor.fm/s/8d214519</link>
      <description>
        <![CDATA[Originally Aired on April 26, 2021



Articles discussed in this episode:



* https://usdaynews.com/celebrities/celebrity-death/dan-kaminsky-death-cause/* https://signal.org/blog/cellebrite-vulnerabilities/* https://arstechnica.com/gadgets/2021/04/hackers-backdoor-corporate-password-manager-and-steal-customer-data/* https://youtu.be/G0gOAvpGoJg



    
























Check out our Cyber Range, not just a place to work through challenges and play, but also an open direct/hands-on training environment.    



https://www.blackhillsinfosec.com/services/cyber-range/ 















Join the BHIS Blog Mailing List – get notified when we post new blogs, webcasts, and podcasts.



            
									
						
						Join 3,281 other subscribers						
					
					                    
                        
							Email Address                        
                        
                    

                    
                        
                        
                        
                        
						                        
	                        Subscribe]]>
      </description>
      <content:encoded>
        <![CDATA[Originally Aired on April 26, 2021



Articles discussed in this episode:



* https://usdaynews.com/celebrities/celebrity-death/dan-kaminsky-death-cause/* https://signal.org/blog/cellebrite-vulnerabilities/* https://arstechnica.com/gadgets/2021/04/hackers-backdoor-corporate-password-manager-and-steal-customer-data/* https://youtu.be/G0gOAvpGoJg



    
























Check out our Cyber Range, not just a place to work through challenges and play, but also an open direct/hands-on training environment.    



https://www.blackhillsinfosec.com/services/cyber-range/ 















Join the BHIS Blog Mailing List – get notified when we post new blogs, webcasts, and podcasts.



            
									
						
						Join 3,281 other subscribers						
					
					                    
                        
							Email Address                        
                        
                    

                    
                        
                        
                        
                        
						                        
	                        Subscribe]]>
      </content:encoded>
      <pubDate>Wed, 28 Apr 2021 10:11:04 -0400</pubDate>
      <author>Black Hills Information Security</author>
      <enclosure url="https://media.transistor.fm/8d214519/44e6b1f3.mp3" length="24941374" type="audio/mpeg"/>
      <itunes:author>Black Hills Information Security</itunes:author>
      <itunes:image href="https://img.transistorcdn.com/tEQGz6HObZz33_A6ShX3CT9Ep7EzBQrUDvX1fnY1e4w/rs:fill:0:0:1/w:1400/h:1400/q:60/mb:500000/aHR0cHM6Ly9pbWct/dXBsb2FkLXByb2R1/Y3Rpb24udHJhbnNp/c3Rvci5mbS9hN2M1/ZDM4ZDY5ZTdiYTFk/YjI5ZmE4ZThmZTcw/OGVjNS5wbmc.jpg"/>
      <itunes:duration>3112</itunes:duration>
      <itunes:summary>Originally Aired on April 26, 2021



Articles discussed in this episode:



* https://usdaynews.com/celebrities/celebrity-death/dan-kaminsky-death-cause/* https://signal.org/blog/cellebrite-vulnerabilities/* https://arstechnica.com/gadgets/2021/04/hackers-backdoor-corporate-password-manager-and-steal-customer-data/* https://youtu.be/G0gOAvpGoJg



    
























Check out our Cyber Range, not just a place to work through challenges and play, but also an open direct/hands-on training environment.    



https://www.blackhillsinfosec.com/services/cyber-range/ 















Join the BHIS Blog Mailing List – get notified when we post new blogs, webcasts, and podcasts.



            
									
						
						Join 3,281 other subscribers						
					
					                    
                        
							Email Address                        
                        
                    

                    
                        
                        
                        
                        
						                        
	                        Subscribe</itunes:summary>
      <itunes:subtitle>Originally Aired on April 26, 2021



Articles discussed in this episode:



* https://usdaynews.com/celebrities/celebrity-death/dan-kaminsky-death-cause/* https://signal.org/blog/cellebrite-vulnerabilities/* https://arstechnica.com/gadgets/2021/04/hacker</itunes:subtitle>
      <itunes:keywords>Infosec,Cybersecurity,news</itunes:keywords>
      <itunes:explicit>No</itunes:explicit>
    </item>
    <item>
      <title>Talkin’ About Infosec News – 4/19/2021</title>
      <itunes:episode>1</itunes:episode>
      <podcast:episode>1</podcast:episode>
      <itunes:title>Talkin’ About Infosec News – 4/19/2021</itunes:title>
      <itunes:episodeType>full</itunes:episodeType>
      <guid isPermaLink="false">https://www.blackhillsinfosec.com/?p=18691</guid>
      <link>https://share.transistor.fm/s/3ca0a163</link>
      <description>
        <![CDATA[Originally Aired on April 19, 2021



Articles discussed in this episode:



* https://www.theverge.com/2021/4/13/22382821/fbi-doj-hafnium-remote-access-removal-hack* https://apnews.com/article/russia-safe-harbor-ransomeware-hacking-c9dab7eb3841be45dff2d93ed3102999* https://threatpost.com/critical-cloud-bug-vmware-carbon-black/165278/* https://www.theverge.com/2021/4/18/22390379/federal-investigators-breach-software-codecov-solarwinds* https://threatpost.com/google-project-zero-cuts-bug-disclosure-timeline-to-a-30-day-grace-period/165432/



















Check out our Cyber Range, not just a place to work through challenges and play, but also an open direct/hands-on training environment.    



https://www.blackhillsinfosec.com/services/cyber-range/ 















Join the BHIS Blog Mailing List – get notified when we post new blogs, webcasts, and podcasts.



            
									
						
						Join 3,264 other subscribers						
					
					                    
                        
							Email Address                        
                        
                    

                    
                        
                        
                        
                        
						                        
	                        Subscribe]]>
      </description>
      <content:encoded>
        <![CDATA[Originally Aired on April 19, 2021



Articles discussed in this episode:



* https://www.theverge.com/2021/4/13/22382821/fbi-doj-hafnium-remote-access-removal-hack* https://apnews.com/article/russia-safe-harbor-ransomeware-hacking-c9dab7eb3841be45dff2d93ed3102999* https://threatpost.com/critical-cloud-bug-vmware-carbon-black/165278/* https://www.theverge.com/2021/4/18/22390379/federal-investigators-breach-software-codecov-solarwinds* https://threatpost.com/google-project-zero-cuts-bug-disclosure-timeline-to-a-30-day-grace-period/165432/



















Check out our Cyber Range, not just a place to work through challenges and play, but also an open direct/hands-on training environment.    



https://www.blackhillsinfosec.com/services/cyber-range/ 















Join the BHIS Blog Mailing List – get notified when we post new blogs, webcasts, and podcasts.



            
									
						
						Join 3,264 other subscribers						
					
					                    
                        
							Email Address                        
                        
                    

                    
                        
                        
                        
                        
						                        
	                        Subscribe]]>
      </content:encoded>
      <pubDate>Wed, 21 Apr 2021 11:19:59 -0400</pubDate>
      <author>Black Hills Information Security</author>
      <enclosure url="https://media.transistor.fm/3ca0a163/35c8f345.mp3" length="25429630" type="audio/mpeg"/>
      <itunes:author>Black Hills Information Security</itunes:author>
      <itunes:image href="https://img.transistorcdn.com/pNdYPB6rhDYZ-TeFA9G4TqNizmYfI7FQ6nKUwASAnng/rs:fill:0:0:1/w:1400/h:1400/q:60/mb:500000/aHR0cHM6Ly9pbWct/dXBsb2FkLXByb2R1/Y3Rpb24udHJhbnNp/c3Rvci5mbS9iYjZi/ZjI1YjE5MDJiNmU5/ODViMzVkNTAyYzI5/ZWRjMC5wbmc.jpg"/>
      <itunes:duration>3174</itunes:duration>
      <itunes:summary>Originally Aired on April 19, 2021



Articles discussed in this episode:



* https://www.theverge.com/2021/4/13/22382821/fbi-doj-hafnium-remote-access-removal-hack* https://apnews.com/article/russia-safe-harbor-ransomeware-hacking-c9dab7eb3841be45dff2d93ed3102999* https://threatpost.com/critical-cloud-bug-vmware-carbon-black/165278/* https://www.theverge.com/2021/4/18/22390379/federal-investigators-breach-software-codecov-solarwinds* https://threatpost.com/google-project-zero-cuts-bug-disclosure-timeline-to-a-30-day-grace-period/165432/



















Check out our Cyber Range, not just a place to work through challenges and play, but also an open direct/hands-on training environment.    



https://www.blackhillsinfosec.com/services/cyber-range/ 















Join the BHIS Blog Mailing List – get notified when we post new blogs, webcasts, and podcasts.



            
									
						
						Join 3,264 other subscribers						
					
					                    
                        
							Email Address                        
                        
                    

                    
                        
                        
                        
                        
						                        
	                        Subscribe</itunes:summary>
      <itunes:subtitle>Originally Aired on April 19, 2021



Articles discussed in this episode:



* https://www.theverge.com/2021/4/13/22382821/fbi-doj-hafnium-remote-access-removal-hack* https://apnews.com/article/russia-safe-harbor-ransomeware-hacking-c9dab7eb3841be45dff2d9</itunes:subtitle>
      <itunes:keywords>Infosec,Cybersecurity,news</itunes:keywords>
      <itunes:explicit>No</itunes:explicit>
    </item>
    <item>
      <title>Talkin’ About Infosec News – 4/12/2021</title>
      <itunes:episode>1</itunes:episode>
      <podcast:episode>1</podcast:episode>
      <itunes:title>Talkin’ About Infosec News – 4/12/2021</itunes:title>
      <itunes:episodeType>full</itunes:episodeType>
      <guid isPermaLink="false">https://www.blackhillsinfosec.com/?p=18619</guid>
      <link>https://share.transistor.fm/s/3f97a1b5</link>
      <description>
        <![CDATA[Originally Aired on April 12, 2021



Articles discussed in this episode:



* https://threatpost.com/azure-functions-privilege-escalation/165307/* https://www.theverge.com/2021/4/8/22374464/linkedin-data-leak-500-million-accounts-scraped-microsoft* https://news.linkedin.com/2021/april/an-update-from-linkedin* https://www.bbc.com/news/world-middle-east-56708778* https://www.tenable.com/blog/cve-2018-13379-cve-2019-5591-cve-2020-12812-fortinet-vulnerabilities-targeted-by-apt-actors



















Check out our Cyber Range, not just a place to work through challenges and play, but also an open direct/hands-on training environment.    



https://www.blackhillsinfosec.com/services/cyber-range/ 















Join the BHIS Blog Mailing List – get notified when we post new blogs, webcasts, and podcasts.



            
									
						
						Join 3,241 other subscribers						
					
					                    
                        
							Email Address                        
                        
                    

                    
                        
                        
                        
                        
						                        
	                        Subscribe]]>
      </description>
      <content:encoded>
        <![CDATA[Originally Aired on April 12, 2021



Articles discussed in this episode:



* https://threatpost.com/azure-functions-privilege-escalation/165307/* https://www.theverge.com/2021/4/8/22374464/linkedin-data-leak-500-million-accounts-scraped-microsoft* https://news.linkedin.com/2021/april/an-update-from-linkedin* https://www.bbc.com/news/world-middle-east-56708778* https://www.tenable.com/blog/cve-2018-13379-cve-2019-5591-cve-2020-12812-fortinet-vulnerabilities-targeted-by-apt-actors



















Check out our Cyber Range, not just a place to work through challenges and play, but also an open direct/hands-on training environment.    



https://www.blackhillsinfosec.com/services/cyber-range/ 















Join the BHIS Blog Mailing List – get notified when we post new blogs, webcasts, and podcasts.



            
									
						
						Join 3,241 other subscribers						
					
					                    
                        
							Email Address                        
                        
                    

                    
                        
                        
                        
                        
						                        
	                        Subscribe]]>
      </content:encoded>
      <pubDate>Wed, 14 Apr 2021 09:15:00 -0400</pubDate>
      <author>Black Hills Information Security</author>
      <enclosure url="https://media.transistor.fm/3f97a1b5/1968e218.mp3" length="18578698" type="audio/mpeg"/>
      <itunes:author>Black Hills Information Security</itunes:author>
      <itunes:image href="https://img.transistorcdn.com/azjx98SbKBizq3o_tapNns9XvgnM1qbv3k4-YrjtKcs/rs:fill:0:0:1/w:1400/h:1400/q:60/mb:500000/aHR0cHM6Ly9pbWct/dXBsb2FkLXByb2R1/Y3Rpb24udHJhbnNp/c3Rvci5mbS9mYzhk/NjViMjU1YmY0NmYx/ZWNkNTRkYmI1NzU0/YmYyYi5wbmc.jpg"/>
      <itunes:duration>2317</itunes:duration>
      <itunes:summary>Originally Aired on April 12, 2021



Articles discussed in this episode:



* https://threatpost.com/azure-functions-privilege-escalation/165307/* https://www.theverge.com/2021/4/8/22374464/linkedin-data-leak-500-million-accounts-scraped-microsoft* https://news.linkedin.com/2021/april/an-update-from-linkedin* https://www.bbc.com/news/world-middle-east-56708778* https://www.tenable.com/blog/cve-2018-13379-cve-2019-5591-cve-2020-12812-fortinet-vulnerabilities-targeted-by-apt-actors



















Check out our Cyber Range, not just a place to work through challenges and play, but also an open direct/hands-on training environment.    



https://www.blackhillsinfosec.com/services/cyber-range/ 















Join the BHIS Blog Mailing List – get notified when we post new blogs, webcasts, and podcasts.



            
									
						
						Join 3,241 other subscribers						
					
					                    
                        
							Email Address                        
                        
                    

                    
                        
                        
                        
                        
						                        
	                        Subscribe</itunes:summary>
      <itunes:subtitle>Originally Aired on April 12, 2021



Articles discussed in this episode:



* https://threatpost.com/azure-functions-privilege-escalation/165307/* https://www.theverge.com/2021/4/8/22374464/linkedin-data-leak-500-million-accounts-scraped-microsoft* https</itunes:subtitle>
      <itunes:keywords>Infosec,Cybersecurity,news</itunes:keywords>
      <itunes:explicit>No</itunes:explicit>
    </item>
    <item>
      <title>Talkin’ About Infosec News – 4/7/2021</title>
      <itunes:episode>1</itunes:episode>
      <podcast:episode>1</podcast:episode>
      <itunes:title>Talkin’ About Infosec News – 4/7/2021</itunes:title>
      <itunes:episodeType>full</itunes:episodeType>
      <guid isPermaLink="false">https://www.blackhillsinfosec.com/?p=18603</guid>
      <link>https://share.transistor.fm/s/20f2351e</link>
      <description>
        <![CDATA[Originally Aired on April 7, 2021



Articles discussed in this episode:



* https://www.scmagazine.com/home/security-news/phishing/array-of-recent-phishing-schemes-use-personalized-job-lures-voice-manipulation/* https://www.coindesk.com/hackers-mined-crypto-on-githubs-servers-report* https://www.securityweek.com/white-hats-earn-440000-hacking-microsoft-products-first-day-pwn2own-2021* https://www.infosecurity-magazine.com/news/consulting-firm-data-breach/* https://github.com/Neo23x0/Raccine* https://github.com/ralphte/build_a_phish* https://support.microsoft.com/en-us/windows/protect-your-pc-from-ransomware-08ed68a7-939f-726c-7e84-a72ba92c01c3* https://www.infosecurity-magazine.com/news/florida-school-district-40m-ransom/



















Check out our Cyber Range, not just a place to work through challenges and play, but also an open direct/hands-on training environment.    



https://www.blackhillsinfosec.com/services/cyber-range/ 















Join the BHIS Blog Mailing List – get notified when we post new blogs, webcasts, and podcasts.



            
									
						
						Join 3,208 other subscribers						
					
					                    
                        
							Email Address                        
                        
                    

                    
                        
                        
                        
                        
						                        
	                        Subscribe]]>
      </description>
      <content:encoded>
        <![CDATA[Originally Aired on April 7, 2021



Articles discussed in this episode:



* https://www.scmagazine.com/home/security-news/phishing/array-of-recent-phishing-schemes-use-personalized-job-lures-voice-manipulation/* https://www.coindesk.com/hackers-mined-crypto-on-githubs-servers-report* https://www.securityweek.com/white-hats-earn-440000-hacking-microsoft-products-first-day-pwn2own-2021* https://www.infosecurity-magazine.com/news/consulting-firm-data-breach/* https://github.com/Neo23x0/Raccine* https://github.com/ralphte/build_a_phish* https://support.microsoft.com/en-us/windows/protect-your-pc-from-ransomware-08ed68a7-939f-726c-7e84-a72ba92c01c3* https://www.infosecurity-magazine.com/news/florida-school-district-40m-ransom/



















Check out our Cyber Range, not just a place to work through challenges and play, but also an open direct/hands-on training environment.    



https://www.blackhillsinfosec.com/services/cyber-range/ 















Join the BHIS Blog Mailing List – get notified when we post new blogs, webcasts, and podcasts.



            
									
						
						Join 3,208 other subscribers						
					
					                    
                        
							Email Address                        
                        
                    

                    
                        
                        
                        
                        
						                        
	                        Subscribe]]>
      </content:encoded>
      <pubDate>Thu, 08 Apr 2021 12:30:48 -0400</pubDate>
      <author>Black Hills Information Security</author>
      <enclosure url="https://media.transistor.fm/20f2351e/38aed0ad.mp3" length="27359996" type="audio/mpeg"/>
      <itunes:author>Black Hills Information Security</itunes:author>
      <itunes:image href="https://img.transistorcdn.com/IQrIv4hkTQfWsexTWSCW-rgj6enR7Pj_bXnpLES5WKI/rs:fill:0:0:1/w:1400/h:1400/q:60/mb:500000/aHR0cHM6Ly9pbWct/dXBsb2FkLXByb2R1/Y3Rpb24udHJhbnNp/c3Rvci5mbS8zZDI2/OTc1Njc4NzNhOTY1/YjBmMzg3YzA5NzQ5/OTNmYS5wbmc.jpg"/>
      <itunes:duration>3415</itunes:duration>
      <itunes:summary>Originally Aired on April 7, 2021



Articles discussed in this episode:



* https://www.scmagazine.com/home/security-news/phishing/array-of-recent-phishing-schemes-use-personalized-job-lures-voice-manipulation/* https://www.coindesk.com/hackers-mined-crypto-on-githubs-servers-report* https://www.securityweek.com/white-hats-earn-440000-hacking-microsoft-products-first-day-pwn2own-2021* https://www.infosecurity-magazine.com/news/consulting-firm-data-breach/* https://github.com/Neo23x0/Raccine* https://github.com/ralphte/build_a_phish* https://support.microsoft.com/en-us/windows/protect-your-pc-from-ransomware-08ed68a7-939f-726c-7e84-a72ba92c01c3* https://www.infosecurity-magazine.com/news/florida-school-district-40m-ransom/



















Check out our Cyber Range, not just a place to work through challenges and play, but also an open direct/hands-on training environment.    



https://www.blackhillsinfosec.com/services/cyber-range/ 















Join the BHIS Blog Mailing List – get notified when we post new blogs, webcasts, and podcasts.



            
									
						
						Join 3,208 other subscribers						
					
					                    
                        
							Email Address                        
                        
                    

                    
                        
                        
                        
                        
						                        
	                        Subscribe</itunes:summary>
      <itunes:subtitle>Originally Aired on April 7, 2021



Articles discussed in this episode:



* https://www.scmagazine.com/home/security-news/phishing/array-of-recent-phishing-schemes-use-personalized-job-lures-voice-manipulation/* https://www.coindesk.com/hackers-mined-cr</itunes:subtitle>
      <itunes:keywords>Infosec,Cybersecurity,news</itunes:keywords>
      <itunes:explicit>No</itunes:explicit>
    </item>
    <item>
      <title>Talkin’ About Infosec News – 4/5/2021</title>
      <itunes:episode>1</itunes:episode>
      <podcast:episode>1</podcast:episode>
      <itunes:title>Talkin’ About Infosec News – 4/5/2021</itunes:title>
      <itunes:episodeType>full</itunes:episodeType>
      <guid isPermaLink="false">https://www.blackhillsinfosec.com/?p=18597</guid>
      <link>https://share.transistor.fm/s/279a3627</link>
      <description>
        <![CDATA[Originally Aired on April 5, 2021



Articles discussed in this episode:



* https://www.bleepingcomputer.com/news/security/533-million-facebook-users-phone-numbers-leaked-on-hacker-forum/* https://krebsonsecurity.com/2021/03/whistleblower-ubiquiti-breach-catastrophic/* https://threatpost.com/call-of-duty-cheats-gamers-malware/165209/* https://outflank.nl/services/outflank-security-tooling/* https://thehackernews.com/2021/04/22-year-old-charged-with-hacking-water.html* https://www.paulosyibelo.com/2021/04/this-man-thought-opening-txt-file-is.html



















Check out our Cyber Range, not just a place to work through challenges and play, but also an open direct/hands-on training environment.    



https://www.blackhillsinfosec.com/services/cyber-range/ 















Join the BHIS Blog Mailing List – get notified when we post new blogs, webcasts, and podcasts.



            
									
						
						Join 3,198 other subscribers						
					
					                    
                        
							Email Address                        
                        
                    

                    
                        
                        
                        
                        
						                        
	                        Subscribe]]>
      </description>
      <content:encoded>
        <![CDATA[Originally Aired on April 5, 2021



Articles discussed in this episode:



* https://www.bleepingcomputer.com/news/security/533-million-facebook-users-phone-numbers-leaked-on-hacker-forum/* https://krebsonsecurity.com/2021/03/whistleblower-ubiquiti-breach-catastrophic/* https://threatpost.com/call-of-duty-cheats-gamers-malware/165209/* https://outflank.nl/services/outflank-security-tooling/* https://thehackernews.com/2021/04/22-year-old-charged-with-hacking-water.html* https://www.paulosyibelo.com/2021/04/this-man-thought-opening-txt-file-is.html



















Check out our Cyber Range, not just a place to work through challenges and play, but also an open direct/hands-on training environment.    



https://www.blackhillsinfosec.com/services/cyber-range/ 















Join the BHIS Blog Mailing List – get notified when we post new blogs, webcasts, and podcasts.



            
									
						
						Join 3,198 other subscribers						
					
					                    
                        
							Email Address                        
                        
                    

                    
                        
                        
                        
                        
						                        
	                        Subscribe]]>
      </content:encoded>
      <pubDate>Tue, 06 Apr 2021 14:17:49 -0400</pubDate>
      <author>Black Hills Information Security</author>
      <enclosure url="https://media.transistor.fm/279a3627/9b07ddb4.mp3" length="41000828" type="audio/mpeg"/>
      <itunes:author>Black Hills Information Security</itunes:author>
      <itunes:image href="https://img.transistorcdn.com/mQgmhwKnhBOUuGyQSkLGErBlfI54nWs_L6S0kIP6Fzs/rs:fill:0:0:1/w:1400/h:1400/q:60/mb:500000/aHR0cHM6Ly9pbWct/dXBsb2FkLXByb2R1/Y3Rpb24udHJhbnNp/c3Rvci5mbS84Mjdk/OGIzYzg0YzIzOTg2/OWIzYjdjMzUwYzA5/M2E1Mi5wbmc.jpg"/>
      <itunes:duration>3413</itunes:duration>
      <itunes:summary>Originally Aired on April 5, 2021



Articles discussed in this episode:



* https://www.bleepingcomputer.com/news/security/533-million-facebook-users-phone-numbers-leaked-on-hacker-forum/* https://krebsonsecurity.com/2021/03/whistleblower-ubiquiti-breach-catastrophic/* https://threatpost.com/call-of-duty-cheats-gamers-malware/165209/* https://outflank.nl/services/outflank-security-tooling/* https://thehackernews.com/2021/04/22-year-old-charged-with-hacking-water.html* https://www.paulosyibelo.com/2021/04/this-man-thought-opening-txt-file-is.html



















Check out our Cyber Range, not just a place to work through challenges and play, but also an open direct/hands-on training environment.    



https://www.blackhillsinfosec.com/services/cyber-range/ 















Join the BHIS Blog Mailing List – get notified when we post new blogs, webcasts, and podcasts.



            
									
						
						Join 3,198 other subscribers						
					
					                    
                        
							Email Address                        
                        
                    

                    
                        
                        
                        
                        
						                        
	                        Subscribe</itunes:summary>
      <itunes:subtitle>Originally Aired on April 5, 2021



Articles discussed in this episode:



* https://www.bleepingcomputer.com/news/security/533-million-facebook-users-phone-numbers-leaked-on-hacker-forum/* https://krebsonsecurity.com/2021/03/whistleblower-ubiquiti-breac</itunes:subtitle>
      <itunes:keywords>Infosec,Cybersecurity,news</itunes:keywords>
      <itunes:explicit>No</itunes:explicit>
    </item>
    <item>
      <title>Talkin’ About Infosec News – 3/29/2021</title>
      <itunes:episode>1</itunes:episode>
      <podcast:episode>1</podcast:episode>
      <itunes:title>Talkin’ About Infosec News – 3/29/2021</itunes:title>
      <itunes:episodeType>full</itunes:episodeType>
      <guid isPermaLink="false">https://www.blackhillsinfosec.com/?p=18540</guid>
      <link>https://share.transistor.fm/s/b9c41971</link>
      <description>
        <![CDATA[Originally Aired on March 29, 2021



Articles discussed in this episode:



* https://www.bleepingcomputer.com/news/security/engineer-reports-data-leak-to-nonprofit-hears-from-the-police/* https://thehackernews.com/2021/03/solarwinds-orion-vulnerability.html* https://thehackernews.com/2021/03/apple-issues-urgent-patch-update-for.html* https://unit42.paloaltonetworks.com/malicious-cryptojacking-images/



















Check out our Cyber Range, not just a place to work through challenges and play, but also an open direct/hands-on training environment.    



https://www.blackhillsinfosec.com/services/cyber-range/ 















Join the BHIS Blog Mailing List – get notified when we post new blogs, webcasts, and podcasts.



            
									
						
						Join 3,178 other subscribers						
					
					                    
                        
							Email Address                        
                        
                    

                    
                        
                        
                        
                        
						                        
	                        Subscribe]]>
      </description>
      <content:encoded>
        <![CDATA[Originally Aired on March 29, 2021



Articles discussed in this episode:



* https://www.bleepingcomputer.com/news/security/engineer-reports-data-leak-to-nonprofit-hears-from-the-police/* https://thehackernews.com/2021/03/solarwinds-orion-vulnerability.html* https://thehackernews.com/2021/03/apple-issues-urgent-patch-update-for.html* https://unit42.paloaltonetworks.com/malicious-cryptojacking-images/



















Check out our Cyber Range, not just a place to work through challenges and play, but also an open direct/hands-on training environment.    



https://www.blackhillsinfosec.com/services/cyber-range/ 















Join the BHIS Blog Mailing List – get notified when we post new blogs, webcasts, and podcasts.



            
									
						
						Join 3,178 other subscribers						
					
					                    
                        
							Email Address                        
                        
                    

                    
                        
                        
                        
                        
						                        
	                        Subscribe]]>
      </content:encoded>
      <pubDate>Wed, 31 Mar 2021 08:24:52 -0400</pubDate>
      <author>Black Hills Information Security</author>
      <enclosure url="https://media.transistor.fm/b9c41971/44241c5e.mp3" length="35883646" type="audio/mpeg"/>
      <itunes:author>Black Hills Information Security</itunes:author>
      <itunes:image href="https://img.transistorcdn.com/8yg72U0ng2d6S5kS4y4EJB9B_aiQANaruO4VI1d4Fas/rs:fill:0:0:1/w:1400/h:1400/q:60/mb:500000/aHR0cHM6Ly9pbWct/dXBsb2FkLXByb2R1/Y3Rpb24udHJhbnNp/c3Rvci5mbS80MTIz/ZmQzZmNlYjc2OWY3/NTFhMjIxOGMwMDQw/ZTQ0Ny5wbmc.jpg"/>
      <itunes:duration>2987</itunes:duration>
      <itunes:summary>Originally Aired on March 29, 2021



Articles discussed in this episode:



* https://www.bleepingcomputer.com/news/security/engineer-reports-data-leak-to-nonprofit-hears-from-the-police/* https://thehackernews.com/2021/03/solarwinds-orion-vulnerability.html* https://thehackernews.com/2021/03/apple-issues-urgent-patch-update-for.html* https://unit42.paloaltonetworks.com/malicious-cryptojacking-images/



















Check out our Cyber Range, not just a place to work through challenges and play, but also an open direct/hands-on training environment.    



https://www.blackhillsinfosec.com/services/cyber-range/ 















Join the BHIS Blog Mailing List – get notified when we post new blogs, webcasts, and podcasts.



            
									
						
						Join 3,178 other subscribers						
					
					                    
                        
							Email Address                        
                        
                    

                    
                        
                        
                        
                        
						                        
	                        Subscribe</itunes:summary>
      <itunes:subtitle>Originally Aired on March 29, 2021



Articles discussed in this episode:



* https://www.bleepingcomputer.com/news/security/engineer-reports-data-leak-to-nonprofit-hears-from-the-police/* https://thehackernews.com/2021/03/solarwinds-orion-vulnerability.</itunes:subtitle>
      <itunes:keywords>Infosec,Cybersecurity,news</itunes:keywords>
      <itunes:explicit>No</itunes:explicit>
    </item>
    <item>
      <title>Talkin’ About Infosec News – 3/24/2021</title>
      <itunes:episode>1</itunes:episode>
      <podcast:episode>1</podcast:episode>
      <itunes:title>Talkin’ About Infosec News – 3/24/2021</itunes:title>
      <itunes:episodeType>full</itunes:episodeType>
      <guid isPermaLink="false">https://www.blackhillsinfosec.com/?p=18522</guid>
      <link>https://share.transistor.fm/s/a5af7f39</link>
      <description>
        <![CDATA[Originally Aired on March 24, 2021



Articles discussed in this episode:



* https://www.theverge.com/2021/3/22/22345792/microsoft-discord-acquisition-report-10-billion* https://krebsonsecurity.com/2021/03/weleakinfo-leaked-customer-payment-info/* https://grahamcluley.com/police-raid-apartment-alleged-verkada-hacker/



















Check out our Cyber Range, not just a place to work through challenges and play, but also an open direct/hands-on training environment.    



https://www.blackhillsinfosec.com/services/cyber-range/ 















Join the BHIS Blog Mailing List – get notified when we post new blogs, webcasts, and podcasts.



            
									
						
						Join 3,176 other subscribers						
					
					                    
                        
							Email Address                        
                        
                    

                    
                        
                        
                        
                        
						                        
	                        Subscribe]]>
      </description>
      <content:encoded>
        <![CDATA[Originally Aired on March 24, 2021



Articles discussed in this episode:



* https://www.theverge.com/2021/3/22/22345792/microsoft-discord-acquisition-report-10-billion* https://krebsonsecurity.com/2021/03/weleakinfo-leaked-customer-payment-info/* https://grahamcluley.com/police-raid-apartment-alleged-verkada-hacker/



















Check out our Cyber Range, not just a place to work through challenges and play, but also an open direct/hands-on training environment.    



https://www.blackhillsinfosec.com/services/cyber-range/ 















Join the BHIS Blog Mailing List – get notified when we post new blogs, webcasts, and podcasts.



            
									
						
						Join 3,176 other subscribers						
					
					                    
                        
							Email Address                        
                        
                    

                    
                        
                        
                        
                        
						                        
	                        Subscribe]]>
      </content:encoded>
      <pubDate>Mon, 29 Mar 2021 10:31:59 -0400</pubDate>
      <author>Black Hills Information Security</author>
      <enclosure url="https://media.transistor.fm/a5af7f39/f5b088fe.mp3" length="27455565" type="audio/mpeg"/>
      <itunes:author>Black Hills Information Security</itunes:author>
      <itunes:image href="https://img.transistorcdn.com/2J3p6uAuhvaE1O38d_OfyOYY78CuPKLRtqhn3lJNUfQ/rs:fill:0:0:1/w:1400/h:1400/q:60/mb:500000/aHR0cHM6Ly9pbWct/dXBsb2FkLXByb2R1/Y3Rpb24udHJhbnNp/c3Rvci5mbS9iNjdj/YzkyNzMyZjk2NzZi/MDNmMTZlMjJiZTg3/ZGY1ZC5qcGc.jpg"/>
      <itunes:duration>2259</itunes:duration>
      <itunes:summary>Originally Aired on March 24, 2021



Articles discussed in this episode:



* https://www.theverge.com/2021/3/22/22345792/microsoft-discord-acquisition-report-10-billion* https://krebsonsecurity.com/2021/03/weleakinfo-leaked-customer-payment-info/* https://grahamcluley.com/police-raid-apartment-alleged-verkada-hacker/



















Check out our Cyber Range, not just a place to work through challenges and play, but also an open direct/hands-on training environment.    



https://www.blackhillsinfosec.com/services/cyber-range/ 















Join the BHIS Blog Mailing List – get notified when we post new blogs, webcasts, and podcasts.



            
									
						
						Join 3,176 other subscribers						
					
					                    
                        
							Email Address                        
                        
                    

                    
                        
                        
                        
                        
						                        
	                        Subscribe</itunes:summary>
      <itunes:subtitle>Originally Aired on March 24, 2021



Articles discussed in this episode:



* https://www.theverge.com/2021/3/22/22345792/microsoft-discord-acquisition-report-10-billion* https://krebsonsecurity.com/2021/03/weleakinfo-leaked-customer-payment-info/* https</itunes:subtitle>
      <itunes:keywords>Infosec,Cybersecurity,news</itunes:keywords>
      <itunes:explicit>No</itunes:explicit>
    </item>
    <item>
      <title>Webcast: OPSEC Fundamentals for Remote Red Teams</title>
      <itunes:episode>1</itunes:episode>
      <podcast:episode>1</podcast:episode>
      <itunes:title>Webcast: OPSEC Fundamentals for Remote Red Teams</itunes:title>
      <itunes:episodeType>full</itunes:episodeType>
      <guid isPermaLink="false">https://www.blackhillsinfosec.com/?p=18495</guid>
      <link>https://share.transistor.fm/s/27f1c465</link>
      <description>
        <![CDATA[During remote red team exercises, it can be difficult to keep from leaking information to the target organization’s security team. Every interaction with the target’s website, every email sent, and every network service probed leaves some trace that the red team was there. 



Mature blue teams can correlate those pieces of information to identify red team actions and infrastructure, and use that information to either block the red team outright or execute deception operations to frustrate further attacks. 



In this Black Hills Information Security (BHIS) webcast, Michael will discuss common sources of data leakage during remote red team exercises and steps red teamers can take to eliminate or disguise the leakage outright, or to compartmentalize their actions and keep the blue team from connecting the dots. 



He’ll also discuss how red teamers can see the attack from the defender’s point of view so that these concepts can be applied to new tools and technologies in the future.



Join the BHIS Community Discord: https://discord.gg/bhis​ 



0:00:00​ – PreShow Banter™ — It’s Not Delivery, Its Frozen 



0:09:36​ – PreShow Banter™ — One Rural to Rule Them All 



0:11:51​ – PreShow Banter™ — Proudly Sucking at Charity 



0:13:08​ – PreShow Banter™ — SPECIAL GUEST: Rural Tech Fund 



0:20:39​ – PreShow Banter™ — Meth Lab For Computers 



0:25:41​ – FEATURE PRESENTATION: OPSEC Fundamentals for Remote Red Teams 



0:27:00​ – WHOAMI 



0:30:42​ – Why OPSEC is Important For Red Teams 



0:34:01​ – Possible Countermeasures 



0:36:37​ – Other Red Team Threats 



0:38:06​ – Assessing Red Team Actions
<ul><li>(00:00) - PreShow Banter™ — It's Not Delivery, Its Frozen</li>
<li>(09:36) - PreShow Banter™ — One Rural to Rule Them All</li>
<li>(11:51) - PreShow Banter™ — Proudly Sucking at Charity</li>
<li>(13:08) - PreShow Banter™ — SPECIAL GUEST: Rural Tech Fund</li>
<li>(20:39) - PreShow Banter™ — Meth Lab For Computies</li>
<li>(25:41) - FEATURE PRESENTATION: OPSEC Fundamentals for Remote Red Teams</li>
<li>(26:59) - WHOAMI</li>
<li>(30:42) - Why OPSEC is Important For Red Teams</li>
<li>(34:01) - Possible Countermeasures</li>
<li>(36:37) - Other Red Team Threats</li>
<li>(38:06) - Assessing Red Team Actions</li>
<li>(39:26) - Building OPSEC Standard Procedures</li>
<li>(40:42) - Local Workstation Setup</li>
<li>(45:01) - OS Modifications</li>
<li>(49:44) - TOOL Configurations</li>
<li>(56:35) - Source IP Addresses</li>
<li>(01:01:36) - Fail-Safe VPN</li>
<li>(01:02:57) - Other Third-Party Services</li>
<li>(01:10:05) - Network Services</li>
<li>(01:15:19) - Testing New Tools</li>
<li>(01:21:42) - Got Questions</li>
<li>(01:27:03) - PostShow Banter™ — Access Granted</li>
</ul>]]>
      </description>
      <content:encoded>
        <![CDATA[During remote red team exercises, it can be difficult to keep from leaking information to the target organization’s security team. Every interaction with the target’s website, every email sent, and every network service probed leaves some trace that the red team was there. 



Mature blue teams can correlate those pieces of information to identify red team actions and infrastructure, and use that information to either block the red team outright or execute deception operations to frustrate further attacks. 



In this Black Hills Information Security (BHIS) webcast, Michael will discuss common sources of data leakage during remote red team exercises and steps red teamers can take to eliminate or disguise the leakage outright, or to compartmentalize their actions and keep the blue team from connecting the dots. 



He’ll also discuss how red teamers can see the attack from the defender’s point of view so that these concepts can be applied to new tools and technologies in the future.



Join the BHIS Community Discord: https://discord.gg/bhis​ 



0:00:00​ – PreShow Banter™ — It’s Not Delivery, Its Frozen 



0:09:36​ – PreShow Banter™ — One Rural to Rule Them All 



0:11:51​ – PreShow Banter™ — Proudly Sucking at Charity 



0:13:08​ – PreShow Banter™ — SPECIAL GUEST: Rural Tech Fund 



0:20:39​ – PreShow Banter™ — Meth Lab For Computers 



0:25:41​ – FEATURE PRESENTATION: OPSEC Fundamentals for Remote Red Teams 



0:27:00​ – WHOAMI 



0:30:42​ – Why OPSEC is Important For Red Teams 



0:34:01​ – Possible Countermeasures 



0:36:37​ – Other Red Team Threats 



0:38:06​ – Assessing Red Team Actions
<ul><li>(00:00) - PreShow Banter™ — It's Not Delivery, Its Frozen</li>
<li>(09:36) - PreShow Banter™ — One Rural to Rule Them All</li>
<li>(11:51) - PreShow Banter™ — Proudly Sucking at Charity</li>
<li>(13:08) - PreShow Banter™ — SPECIAL GUEST: Rural Tech Fund</li>
<li>(20:39) - PreShow Banter™ — Meth Lab For Computies</li>
<li>(25:41) - FEATURE PRESENTATION: OPSEC Fundamentals for Remote Red Teams</li>
<li>(26:59) - WHOAMI</li>
<li>(30:42) - Why OPSEC is Important For Red Teams</li>
<li>(34:01) - Possible Countermeasures</li>
<li>(36:37) - Other Red Team Threats</li>
<li>(38:06) - Assessing Red Team Actions</li>
<li>(39:26) - Building OPSEC Standard Procedures</li>
<li>(40:42) - Local Workstation Setup</li>
<li>(45:01) - OS Modifications</li>
<li>(49:44) - TOOL Configurations</li>
<li>(56:35) - Source IP Addresses</li>
<li>(01:01:36) - Fail-Safe VPN</li>
<li>(01:02:57) - Other Third-Party Services</li>
<li>(01:10:05) - Network Services</li>
<li>(01:15:19) - Testing New Tools</li>
<li>(01:21:42) - Got Questions</li>
<li>(01:27:03) - PostShow Banter™ — Access Granted</li>
</ul>]]>
      </content:encoded>
      <pubDate>Thu, 25 Mar 2021 08:29:00 -0400</pubDate>
      <author>Black Hills Information Security</author>
      <enclosure url="https://media.transistor.fm/27f1c465/ac3de652.mp3" length="75809056" type="audio/mpeg"/>
      <itunes:author>Black Hills Information Security</itunes:author>
      <itunes:image href="https://img.transistorcdn.com/YtyGQJgtZP0v4-fU754J6-nix6vzVPI1l8LF4JBnQ2Y/rs:fill:0:0:1/w:1400/h:1400/q:60/mb:500000/aHR0cHM6Ly9pbWct/dXBsb2FkLXByb2R1/Y3Rpb24udHJhbnNp/c3Rvci5mbS9iNTc3/NmEyNzVmZTVhNGY1/MDZhMWM2MjdhYzRk/YThmZi5qcGc.jpg"/>
      <itunes:duration>6066</itunes:duration>
      <itunes:summary>During remote red team exercises, it can be difficult to keep from leaking information to the target organization’s security team. Every interaction with the target’s website, every email sent, and every network service probed leaves some trace that the red team was there. 



Mature blue teams can correlate those pieces of information to identify red team actions and infrastructure, and use that information to either block the red team outright or execute deception operations to frustrate further attacks. 



In this Black Hills Information Security (BHIS) webcast, Michael will discuss common sources of data leakage during remote red team exercises and steps red teamers can take to eliminate or disguise the leakage outright, or to compartmentalize their actions and keep the blue team from connecting the dots. 



He’ll also discuss how red teamers can see the attack from the defender’s point of view so that these concepts can be applied to new tools and technologies in the future.



Join the BHIS Community Discord: https://discord.gg/bhis​ 



0:00:00​ – PreShow Banter™ — It’s Not Delivery, Its Frozen 



0:09:36​ – PreShow Banter™ — One Rural to Rule Them All 



0:11:51​ – PreShow Banter™ — Proudly Sucking at Charity 



0:13:08​ – PreShow Banter™ — SPECIAL GUEST: Rural Tech Fund 



0:20:39​ – PreShow Banter™ — Meth Lab For Computers 



0:25:41​ – FEATURE PRESENTATION: OPSEC Fundamentals for Remote Red Teams 



0:27:00​ – WHOAMI 



0:30:42​ – Why OPSEC is Important For Red Teams 



0:34:01​ – Possible Countermeasures 



0:36:37​ – Other Red Team Threats 



0:38:06​ – Assessing Red Team Actions</itunes:summary>
      <itunes:subtitle>During remote red team exercises, it can be difficult to keep from leaking information to the target organization’s security team. Every interaction with the target’s website, every email sent, and every network service probed leaves some trace that the r</itunes:subtitle>
      <itunes:keywords>Infosec,Cybersecurity,news</itunes:keywords>
      <itunes:explicit>No</itunes:explicit>
      <podcast:chapters url="https://share.transistor.fm/s/27f1c465/chapters.json" type="application/json+chapters"/>
    </item>
    <item>
      <title>Talkin’ About Infosec News – 3/22/2021</title>
      <itunes:episode>1</itunes:episode>
      <podcast:episode>1</podcast:episode>
      <itunes:title>Talkin’ About Infosec News – 3/22/2021</itunes:title>
      <itunes:episodeType>full</itunes:episodeType>
      <guid isPermaLink="false">https://www.blackhillsinfosec.com/?p=18511</guid>
      <link>https://share.transistor.fm/s/10c7101d</link>
      <description>
        <![CDATA[Originally Aired on March 22, 2021



Articles discussed in this episode:



* https://threatpost.com/google-spectre-poc-exploit-chrome/164787/* https://threatpost.com/office-365-phishing-attack-financial-execs/164925/* https://krebsonsecurity.com/2021/03/weleakinfo-leaked-customer-payment-info/* https://arstechnica.com/gadgets/2021/03/critics-fume-after-github-removes-exploit-code-for-exchange-vulnerabilities/* https://arstechnica.com/information-technology/2021/03/expert-hackers-used-11-zerodays-to-infect-windows-ios-and-android-users/



















Check out our Cyber Range, not just a place to work through challenges and play, but also an open direct/hands-on training environment.    



https://www.blackhillsinfosec.com/services/cyber-range/ 















Join the BHIS Blog Mailing List – get notified when we post new blogs, webcasts, and podcasts.



            
									
						
						Join 3,168 other subscribers						
					
					                    
                        
							Email Address                        
                        
                    

                    
                        
                        
                        
                        
						                        
	                        Subscribe
<ul><li>(00:00) - Intro</li>
<li>(01:00) - Critics fume after Github removes exploit code for Exchange vulnerabilities</li>
<li>(17:44) - Google Releases Spectre PoC Exploit For Chrome</li>
<li>(28:40) - “Expert” hackers used 11 0-days to infect Windows, iOS, and Android users</li>
</ul>]]>
      </description>
      <content:encoded>
        <![CDATA[Originally Aired on March 22, 2021



Articles discussed in this episode:



* https://threatpost.com/google-spectre-poc-exploit-chrome/164787/* https://threatpost.com/office-365-phishing-attack-financial-execs/164925/* https://krebsonsecurity.com/2021/03/weleakinfo-leaked-customer-payment-info/* https://arstechnica.com/gadgets/2021/03/critics-fume-after-github-removes-exploit-code-for-exchange-vulnerabilities/* https://arstechnica.com/information-technology/2021/03/expert-hackers-used-11-zerodays-to-infect-windows-ios-and-android-users/



















Check out our Cyber Range, not just a place to work through challenges and play, but also an open direct/hands-on training environment.    



https://www.blackhillsinfosec.com/services/cyber-range/ 















Join the BHIS Blog Mailing List – get notified when we post new blogs, webcasts, and podcasts.



            
									
						
						Join 3,168 other subscribers						
					
					                    
                        
							Email Address                        
                        
                    

                    
                        
                        
                        
                        
						                        
	                        Subscribe
<ul><li>(00:00) - Intro</li>
<li>(01:00) - Critics fume after Github removes exploit code for Exchange vulnerabilities</li>
<li>(17:44) - Google Releases Spectre PoC Exploit For Chrome</li>
<li>(28:40) - “Expert” hackers used 11 0-days to infect Windows, iOS, and Android users</li>
</ul>]]>
      </content:encoded>
      <pubDate>Tue, 23 Mar 2021 15:26:23 -0400</pubDate>
      <author>Black Hills Information Security</author>
      <enclosure url="https://media.transistor.fm/10c7101d/ed8da671.mp3" length="21207844" type="audio/mpeg"/>
      <itunes:author>Black Hills Information Security</itunes:author>
      <itunes:image href="https://img.transistorcdn.com/blNoyJD6EtFWACoIH7qArNeYIXTtHR9dHWBemn77Eh8/rs:fill:0:0:1/w:1400/h:1400/q:60/mb:500000/aHR0cHM6Ly9pbWct/dXBsb2FkLXByb2R1/Y3Rpb24udHJhbnNp/c3Rvci5mbS9iYTgy/MTBlYzJhNDljYmQy/MzcyZjVhN2Y2OGZl/ZTFjMC5wbmc.jpg"/>
      <itunes:duration>2483</itunes:duration>
      <itunes:summary>Originally Aired on March 22, 2021



Articles discussed in this episode:



* https://threatpost.com/google-spectre-poc-exploit-chrome/164787/* https://threatpost.com/office-365-phishing-attack-financial-execs/164925/* https://krebsonsecurity.com/2021/03/weleakinfo-leaked-customer-payment-info/* https://arstechnica.com/gadgets/2021/03/critics-fume-after-github-removes-exploit-code-for-exchange-vulnerabilities/* https://arstechnica.com/information-technology/2021/03/expert-hackers-used-11-zerodays-to-infect-windows-ios-and-android-users/



















Check out our Cyber Range, not just a place to work through challenges and play, but also an open direct/hands-on training environment.    



https://www.blackhillsinfosec.com/services/cyber-range/ 















Join the BHIS Blog Mailing List – get notified when we post new blogs, webcasts, and podcasts.



            
									
						
						Join 3,168 other subscribers						
					
					                    
                        
							Email Address                        
                        
                    

                    
                        
                        
                        
                        
						                        
	                        Subscribe</itunes:summary>
      <itunes:subtitle>Originally Aired on March 22, 2021



Articles discussed in this episode:



* https://threatpost.com/google-spectre-poc-exploit-chrome/164787/* https://threatpost.com/office-365-phishing-attack-financial-execs/164925/* https://krebsonsecurity.com/2021/03</itunes:subtitle>
      <itunes:keywords>Infosec,Cybersecurity,news</itunes:keywords>
      <itunes:explicit>No</itunes:explicit>
      <podcast:chapters url="https://share.transistor.fm/s/10c7101d/chapters.json" type="application/json+chapters"/>
    </item>
    <item>
      <title>Talkin’ About Infosec News – 3/17/2021</title>
      <itunes:episode>1</itunes:episode>
      <podcast:episode>1</podcast:episode>
      <itunes:title>Talkin’ About Infosec News – 3/17/2021</itunes:title>
      <itunes:episodeType>full</itunes:episodeType>
      <guid isPermaLink="false">https://www.blackhillsinfosec.com/?p=18478</guid>
      <link>https://share.transistor.fm/s/d38b9986</link>
      <description>
        <![CDATA[Originally Aired on March 17, 2021



Articles discussed in this episode:



* https://www.bloomberg.com/news/articles/2021-03-09/hackers-expose-tesla-jails-in-breach-of-150-000-security-cams* https://media.cert.europa.eu/static/SecurityAdvisories/2021/CERT-EU-SA2021-014.pdf* https://security.googleblog.com/2021/03/introducing-sigstore-easy-code-signing.html* https://krebsonsecurity.com/2021/03/weleakinfo-leaked-customer-payment-info/* https://twitter.com/PythonResponder/status/1372023079719817218?s=20



















Check out our Cyber Range, not just a place to work through challenges and play, but also an open direct/hands-on training environment.    



https://www.blackhillsinfosec.com/services/cyber-range/ 















Join the BHIS Blog Mailing List – get notified when we post new blogs, webcasts, and podcasts.



            
									
						
						Join 3,163 other subscribers						
					
					                    
                        
							Email Address                        
                        
                    

                    
                        
                        
                        
                        
						                        
	                        Subscribe]]>
      </description>
      <content:encoded>
        <![CDATA[Originally Aired on March 17, 2021



Articles discussed in this episode:



* https://www.bloomberg.com/news/articles/2021-03-09/hackers-expose-tesla-jails-in-breach-of-150-000-security-cams* https://media.cert.europa.eu/static/SecurityAdvisories/2021/CERT-EU-SA2021-014.pdf* https://security.googleblog.com/2021/03/introducing-sigstore-easy-code-signing.html* https://krebsonsecurity.com/2021/03/weleakinfo-leaked-customer-payment-info/* https://twitter.com/PythonResponder/status/1372023079719817218?s=20



















Check out our Cyber Range, not just a place to work through challenges and play, but also an open direct/hands-on training environment.    



https://www.blackhillsinfosec.com/services/cyber-range/ 















Join the BHIS Blog Mailing List – get notified when we post new blogs, webcasts, and podcasts.



            
									
						
						Join 3,163 other subscribers						
					
					                    
                        
							Email Address                        
                        
                    

                    
                        
                        
                        
                        
						                        
	                        Subscribe]]>
      </content:encoded>
      <pubDate>Fri, 19 Mar 2021 08:29:00 -0400</pubDate>
      <author>Black Hills Information Security</author>
      <enclosure url="https://media.transistor.fm/d38b9986/d38b2f35.mp3" length="23168842" type="audio/mpeg"/>
      <itunes:author>Black Hills Information Security</itunes:author>
      <itunes:image href="https://img.transistorcdn.com/OKsd3rcGVb1m4AXgNPjD-D_VBlTLNOq3dOMl1yCTrcE/rs:fill:0:0:1/w:1400/h:1400/q:60/mb:500000/aHR0cHM6Ly9pbWct/dXBsb2FkLXByb2R1/Y3Rpb24udHJhbnNp/c3Rvci5mbS84ZTE4/NzMzYmI0MmVlYjgy/MzU0Y2Y5ZTE5Y2My/MGQxMi5wbmc.jpg"/>
      <itunes:duration>2891</itunes:duration>
      <itunes:summary>Originally Aired on March 17, 2021



Articles discussed in this episode:



* https://www.bloomberg.com/news/articles/2021-03-09/hackers-expose-tesla-jails-in-breach-of-150-000-security-cams* https://media.cert.europa.eu/static/SecurityAdvisories/2021/CERT-EU-SA2021-014.pdf* https://security.googleblog.com/2021/03/introducing-sigstore-easy-code-signing.html* https://krebsonsecurity.com/2021/03/weleakinfo-leaked-customer-payment-info/* https://twitter.com/PythonResponder/status/1372023079719817218?s=20



















Check out our Cyber Range, not just a place to work through challenges and play, but also an open direct/hands-on training environment.    



https://www.blackhillsinfosec.com/services/cyber-range/ 















Join the BHIS Blog Mailing List – get notified when we post new blogs, webcasts, and podcasts.



            
									
						
						Join 3,163 other subscribers						
					
					                    
                        
							Email Address                        
                        
                    

                    
                        
                        
                        
                        
						                        
	                        Subscribe</itunes:summary>
      <itunes:subtitle>Originally Aired on March 17, 2021



Articles discussed in this episode:



* https://www.bloomberg.com/news/articles/2021-03-09/hackers-expose-tesla-jails-in-breach-of-150-000-security-cams* https://media.cert.europa.eu/static/SecurityAdvisories/2021/CE</itunes:subtitle>
      <itunes:keywords>Infosec,Cybersecurity,news</itunes:keywords>
      <itunes:explicit>No</itunes:explicit>
    </item>
    <item>
      <title>Backdoors &amp; Breaches LIVE - 3/10/2021</title>
      <itunes:episode>1</itunes:episode>
      <podcast:episode>1</podcast:episode>
      <itunes:title>Backdoors &amp; Breaches LIVE - 3/10/2021</itunes:title>
      <itunes:episodeType>full</itunes:episodeType>
      <guid isPermaLink="false">https://www.blackhillsinfosec.com/?p=18345</guid>
      <link>https://share.transistor.fm/s/38330509</link>
      <description>
        <![CDATA[The Livestream of our first Backdoors &amp; Breaches (B&amp;B) session using our new Tabletop Simulator (TTS) version of the game was a success! If you have STEAM / TABLETOP SIMULATOR / BACKDOORS &amp; BREACHES WORKSHOP, you can play using the same version of the game. 



11:05​ – Backdoors &amp; Breaches Session Begins! 







Our good friend Edward Miro wrote an extensive guide on how to install and use B&amp;B on TTS.  Check it out below!



https://www.blackhillsinfosec.com/backdoors-breaches-tabletop-simulator-guide/







Join the BHIS Blog Mailing List – get notified when we post new blogs, webcasts, and podcasts.



            
									
						
						Join 3,144 other subscribers						
					
					                    
                        
							Email Address                        
                        
                    

                    
                        
                        
                        
                        
						                        
	                        Subscribe]]>
      </description>
      <content:encoded>
        <![CDATA[The Livestream of our first Backdoors &amp; Breaches (B&amp;B) session using our new Tabletop Simulator (TTS) version of the game was a success! If you have STEAM / TABLETOP SIMULATOR / BACKDOORS &amp; BREACHES WORKSHOP, you can play using the same version of the game. 



11:05​ – Backdoors &amp; Breaches Session Begins! 







Our good friend Edward Miro wrote an extensive guide on how to install and use B&amp;B on TTS.  Check it out below!



https://www.blackhillsinfosec.com/backdoors-breaches-tabletop-simulator-guide/







Join the BHIS Blog Mailing List – get notified when we post new blogs, webcasts, and podcasts.



            
									
						
						Join 3,144 other subscribers						
					
					                    
                        
							Email Address                        
                        
                    

                    
                        
                        
                        
                        
						                        
	                        Subscribe]]>
      </content:encoded>
      <pubDate>Thu, 18 Mar 2021 08:18:00 -0400</pubDate>
      <author>Black Hills Information Security</author>
      <enclosure url="https://media.transistor.fm/38330509/8eed82c7.mp3" length="22225153" type="audio/mpeg"/>
      <itunes:author>Black Hills Information Security</itunes:author>
      <itunes:duration>2778</itunes:duration>
      <itunes:summary>The Livestream of our first Backdoors &amp;amp; Breaches (B&amp;amp;B) session using our new Tabletop Simulator (TTS) version of the game was a success! If you have STEAM / TABLETOP SIMULATOR / BACKDOORS &amp;amp; BREACHES WORKSHOP, you can play using the same version of the game. 



11:05​ – Backdoors &amp;amp; Breaches Session Begins! 







Our good friend Edward Miro wrote an extensive guide on how to install and use B&amp;amp;B on TTS.  Check it out below!



https://www.blackhillsinfosec.com/backdoors-breaches-tabletop-simulator-guide/







Join the BHIS Blog Mailing List – get notified when we post new blogs, webcasts, and podcasts.



            
									
						
						Join 3,144 other subscribers						
					
					                    
                        
							Email Address                        
                        
                    

                    
                        
                        
                        
                        
						                        
	                        Subscribe</itunes:summary>
      <itunes:subtitle>The Livestream of our first Backdoors &amp;amp; Breaches (B&amp;amp;B) session using our new Tabletop Simulator (TTS) version of the game was a success! If you have STEAM / TABLETOP SIMULATOR / BACKDOORS &amp;amp; BREACHES WORKSHOP, you can play using the same versio</itunes:subtitle>
      <itunes:keywords>Infosec,Cybersecurity,news</itunes:keywords>
      <itunes:explicit>No</itunes:explicit>
    </item>
    <item>
      <title>Webcast: Sacred Cash Cow Tipping 2021</title>
      <itunes:episode>1</itunes:episode>
      <podcast:episode>1</podcast:episode>
      <itunes:title>Webcast: Sacred Cash Cow Tipping 2021</itunes:title>
      <itunes:episodeType>full</itunes:episodeType>
      <guid isPermaLink="false">https://www.blackhillsinfosec.com/?p=18333</guid>
      <link>https://share.transistor.fm/s/d08a80e5</link>
      <description>
        <![CDATA[It is another year for the Sacred Cash Cow Tipping Webcast. For those of you who are new to our email list within the past year, this is a webcast where we cover the various tools and techniques that Black Hills Information Security (BHIS) uses to bypass endpoint security protections. The point of this webcast is not so much to teach people how to bypass these products, but rather to show that they can be bypassed. Hopefully, this leads to some conversations about defense-in-depth and how many vendors exaggerate their capabilities. 



We also discuss how simply writing signatures for specific strains of malware is a waste of time. Well, I mean, it has its place. But it is not something that should be the primary cornerstone of your security support structure.  



There is a lot to unpack in this webcast, one of the main things to unpack is why we are still doing it. We are still doing this because it is still necessary. We still have vendors and CISOs perpetuating the myth that a security product can protect you from all attacks. This is an oversimplification, and it needs to be exterminated like a termite or a cockroach.  



In past years we have had vendors threaten to sue… and some cooler vendors send us beer.   



Hopefully, this year ends in beer.



Join the BHIS Community Discord: https://discord.gg/bhis​ 



0:00:00​ – PreShow Banter™ — We Love You 3000 



0:02:56​ – PreShow Banter™ — SolarWinds Forever 



0:07:26​ – PreShow Banter™ — Watching Bitcoins Being Mined 



0:08:53​ – PreShow Banter™ — TeacherCoin™ 



0:11:12​ – PreShow Banter™ — Babies’ Toys For Your Hands



0:15:45​ – FEATURE PRESENTATION: Sacred Cash Cow Tipping 2021 



0:21:28​ – Ralph May: Due Diligence 



0:25:42​ – Ralph May: ScareCrow 



0:32:56​ – Ralph May: RDP 



0:35:51​ – Marcello: Sentinel One
<ul><li>(00:00) - PreShow Banter™ — We Love You 3000</li>
<li>(02:56) - PreShow Banter™ — SolarWinds Forever</li>
<li>(07:26) - PreShow Banter™ — Watching Bitcoins Being Mined</li>
<li>(08:53) - PreShow Banter™ — TeacherCoin™</li>
<li>(11:12) - PreShow Banter™ — Babies' Toys For Your Hands</li>
<li>(14:06) - PreShow Banter™ — This is Huge</li>
<li>(15:45) - FEATURE PRESENTATION: Sacred Cash Cow Tipping 2021</li>
<li>(21:28) - Ralph May: Due Dilligence</li>
<li>(25:42) - Ralph May: ScareCrow</li>
<li>(32:55) - Ralph May: RDP</li>
<li>(35:50) - Marcello: Sentinel One</li>
<li>(44:52) - Jordan Drysdale: Windows Subsystem for Linux</li>
<li>(53:31) - Rob (mubix) Fuller: Initial Access</li>
<li>(01:05:15) - Rob (mubix) Fuller: Post Exploitation</li>
<li>(01:10:58) - Joff Thyer: Strip PowerShell Script Comments</li>
<li>(01:17:49) - Joff Thyer: Build a .NET Assembly to Execute Shellcode</li>
<li>(01:20:57) - Joff Thyer: Load/Run DLL/Assembly in PowerShell</li>
<li>(01:23:27) - PostShow Banter™</li>
</ul>]]>
      </description>
      <content:encoded>
        <![CDATA[It is another year for the Sacred Cash Cow Tipping Webcast. For those of you who are new to our email list within the past year, this is a webcast where we cover the various tools and techniques that Black Hills Information Security (BHIS) uses to bypass endpoint security protections. The point of this webcast is not so much to teach people how to bypass these products, but rather to show that they can be bypassed. Hopefully, this leads to some conversations about defense-in-depth and how many vendors exaggerate their capabilities. 



We also discuss how simply writing signatures for specific strains of malware is a waste of time. Well, I mean, it has its place. But it is not something that should be the primary cornerstone of your security support structure.  



There is a lot to unpack in this webcast, one of the main things to unpack is why we are still doing it. We are still doing this because it is still necessary. We still have vendors and CISOs perpetuating the myth that a security product can protect you from all attacks. This is an oversimplification, and it needs to be exterminated like a termite or a cockroach.  



In past years we have had vendors threaten to sue… and some cooler vendors send us beer.   



Hopefully, this year ends in beer.



Join the BHIS Community Discord: https://discord.gg/bhis​ 



0:00:00​ – PreShow Banter™ — We Love You 3000 



0:02:56​ – PreShow Banter™ — SolarWinds Forever 



0:07:26​ – PreShow Banter™ — Watching Bitcoins Being Mined 



0:08:53​ – PreShow Banter™ — TeacherCoin™ 



0:11:12​ – PreShow Banter™ — Babies’ Toys For Your Hands



0:15:45​ – FEATURE PRESENTATION: Sacred Cash Cow Tipping 2021 



0:21:28​ – Ralph May: Due Diligence 



0:25:42​ – Ralph May: ScareCrow 



0:32:56​ – Ralph May: RDP 



0:35:51​ – Marcello: Sentinel One
<ul><li>(00:00) - PreShow Banter™ — We Love You 3000</li>
<li>(02:56) - PreShow Banter™ — SolarWinds Forever</li>
<li>(07:26) - PreShow Banter™ — Watching Bitcoins Being Mined</li>
<li>(08:53) - PreShow Banter™ — TeacherCoin™</li>
<li>(11:12) - PreShow Banter™ — Babies' Toys For Your Hands</li>
<li>(14:06) - PreShow Banter™ — This is Huge</li>
<li>(15:45) - FEATURE PRESENTATION: Sacred Cash Cow Tipping 2021</li>
<li>(21:28) - Ralph May: Due Dilligence</li>
<li>(25:42) - Ralph May: ScareCrow</li>
<li>(32:55) - Ralph May: RDP</li>
<li>(35:50) - Marcello: Sentinel One</li>
<li>(44:52) - Jordan Drysdale: Windows Subsystem for Linux</li>
<li>(53:31) - Rob (mubix) Fuller: Initial Access</li>
<li>(01:05:15) - Rob (mubix) Fuller: Post Exploitation</li>
<li>(01:10:58) - Joff Thyer: Strip PowerShell Script Comments</li>
<li>(01:17:49) - Joff Thyer: Build a .NET Assembly to Execute Shellcode</li>
<li>(01:20:57) - Joff Thyer: Load/Run DLL/Assembly in PowerShell</li>
<li>(01:23:27) - PostShow Banter™</li>
</ul>]]>
      </content:encoded>
      <pubDate>Wed, 10 Mar 2021 11:12:55 -0500</pubDate>
      <author>Black Hills Information Security</author>
      <enclosure url="https://media.transistor.fm/d08a80e5/7980f4ed.mp3" length="45719855" type="audio/mpeg"/>
      <itunes:author>Black Hills Information Security</itunes:author>
      <itunes:image href="https://img.transistorcdn.com/xictuX625ifzxlIr8iMwdavCr4vE4_QWhOLbQE6WNfQ/rs:fill:0:0:1/w:1400/h:1400/q:60/mb:500000/aHR0cHM6Ly9pbWct/dXBsb2FkLXByb2R1/Y3Rpb24udHJhbnNp/c3Rvci5mbS8zODcy/ZWVmYzM4NzJkMDhm/M2MwNWQ1NWVmODdm/Y2YwNy5qcGc.jpg"/>
      <itunes:duration>5391</itunes:duration>
      <itunes:summary>It is another year for the Sacred Cash Cow Tipping Webcast. For those of you who are new to our email list within the past year, this is a webcast where we cover the various tools and techniques that Black Hills Information Security (BHIS) uses to bypass endpoint security protections. The point of this webcast is not so much to teach people how to bypass these products, but rather to show that they can be bypassed. Hopefully, this leads to some conversations about defense-in-depth and how many vendors exaggerate their capabilities. 



We also discuss how simply writing signatures for specific strains of malware is a waste of time. Well, I mean, it has its place. But it is not something that should be the primary cornerstone of your security support structure.  



There is a lot to unpack in this webcast, one of the main things to unpack is why we are still doing it. We are still doing this because it is still necessary. We still have vendors and CISOs perpetuating the myth that a security product can protect you from all attacks. This is an oversimplification, and it needs to be exterminated like a termite or a cockroach.  



In past years we have had vendors threaten to sue… and some cooler vendors send us beer.   



Hopefully, this year ends in beer.



Join the BHIS Community Discord: https://discord.gg/bhis​ 



0:00:00​ – PreShow Banter™ — We Love You 3000 



0:02:56​ – PreShow Banter™ — SolarWinds Forever 



0:07:26​ – PreShow Banter™ — Watching Bitcoins Being Mined 



0:08:53​ – PreShow Banter™ — TeacherCoin™ 



0:11:12​ – PreShow Banter™ — Babies’ Toys For Your Hands



0:15:45​ – FEATURE PRESENTATION: Sacred Cash Cow Tipping 2021 



0:21:28​ – Ralph May: Due Diligence 



0:25:42​ – Ralph May: ScareCrow 



0:32:56​ – Ralph May: RDP 



0:35:51​ – Marcello: Sentinel One</itunes:summary>
      <itunes:subtitle>It is another year for the Sacred Cash Cow Tipping Webcast. For those of you who are new to our email list within the past year, this is a webcast where we cover the various tools and techniques that Black Hills Information Security (BHIS) uses to bypass </itunes:subtitle>
      <itunes:keywords>Infosec,Cybersecurity,news</itunes:keywords>
      <itunes:explicit>No</itunes:explicit>
      <podcast:chapters url="https://share.transistor.fm/s/d08a80e5/chapters.json" type="application/json+chapters"/>
    </item>
    <item>
      <title>Talkin’ About Infosec News – 3/8/2021</title>
      <itunes:episode>1</itunes:episode>
      <podcast:episode>1</podcast:episode>
      <itunes:title>Talkin’ About Infosec News – 3/8/2021</itunes:title>
      <itunes:episodeType>full</itunes:episodeType>
      <guid isPermaLink="false">https://www.blackhillsinfosec.com/?p=18328</guid>
      <link>https://share.transistor.fm/s/7a4fbedc</link>
      <description>
        <![CDATA[Originally Aired on March 8, 2021



















Check out our Cyber Range, not just a place to work through challenges and play, but also an open direct/hands-on training environment.    



https://www.blackhillsinfosec.com/services/cyber-range/ 















Join the BHIS Blog Mailing List – get notified when we post new blogs, webcasts, and podcasts.



            
									
						
						Join 3,118 other subscribers						
					
					                    
                        
							Email Address                        
                        
                    

                    
                        
                        
                        
                        
						                        
	                        Subscribe]]>
      </description>
      <content:encoded>
        <![CDATA[Originally Aired on March 8, 2021



















Check out our Cyber Range, not just a place to work through challenges and play, but also an open direct/hands-on training environment.    



https://www.blackhillsinfosec.com/services/cyber-range/ 















Join the BHIS Blog Mailing List – get notified when we post new blogs, webcasts, and podcasts.



            
									
						
						Join 3,118 other subscribers						
					
					                    
                        
							Email Address                        
                        
                    

                    
                        
                        
                        
                        
						                        
	                        Subscribe]]>
      </content:encoded>
      <pubDate>Tue, 09 Mar 2021 08:45:00 -0500</pubDate>
      <author>Black Hills Information Security</author>
      <enclosure url="https://media.transistor.fm/7a4fbedc/0e4b7166.mp3" length="17325684" type="audio/mpeg"/>
      <itunes:author>Black Hills Information Security</itunes:author>
      <itunes:image href="https://img.transistorcdn.com/NkI3kEIllgPzfrjIdI42SqK5ayQFcOnBjc6Bs6SDZT8/rs:fill:0:0:1/w:1400/h:1400/q:60/mb:500000/aHR0cHM6Ly9pbWct/dXBsb2FkLXByb2R1/Y3Rpb24udHJhbnNp/c3Rvci5mbS9hZGU5/ZWM0NzQ2ZWZkN2Fi/YjJmNmMxNWNiOWRj/M2QwMC5wbmc.jpg"/>
      <itunes:duration>2161</itunes:duration>
      <itunes:summary>Originally Aired on March 8, 2021



















Check out our Cyber Range, not just a place to work through challenges and play, but also an open direct/hands-on training environment.    



https://www.blackhillsinfosec.com/services/cyber-range/ 















Join the BHIS Blog Mailing List – get notified when we post new blogs, webcasts, and podcasts.



            
									
						
						Join 3,118 other subscribers						
					
					                    
                        
							Email Address                        
                        
                    

                    
                        
                        
                        
                        
						                        
	                        Subscribe</itunes:summary>
      <itunes:subtitle>Originally Aired on March 8, 2021



















Check out our Cyber Range, not just a place to work through challenges and play, but also an open direct/hands-on training environment.    



https://www.blackhillsinfosec.com/services/cyber-range/ 


</itunes:subtitle>
      <itunes:keywords>Infosec,Cybersecurity,news</itunes:keywords>
      <itunes:explicit>No</itunes:explicit>
    </item>
    <item>
      <title>Talkin’ About Infosec News – 3/3/2021</title>
      <itunes:episode>1</itunes:episode>
      <podcast:episode>1</podcast:episode>
      <itunes:title>Talkin’ About Infosec News – 3/3/2021</itunes:title>
      <itunes:episodeType>full</itunes:episodeType>
      <guid isPermaLink="false">https://www.blackhillsinfosec.com/?p=18323</guid>
      <link>https://share.transistor.fm/s/dbc8e51d</link>
      <description>
        <![CDATA[Originally Aired on March 3, 2021



Articles discussed in this episode:



* https://www.msn.com/en-us/money/other/microsoft-these-exchange-server-zero-day-flaws-are-being-used-by-hackers-so-update-now/ar-BB1ec0In



















Check out our Cyber Range, not just a place to work through challenges and play, but also an open direct/hands-on training environment.    



https://www.blackhillsinfosec.com/services/cyber-range/ 















Join the BHIS Blog Mailing List – get notified when we post new blogs, webcasts, and podcasts.



            
									
						
						Join 3,093 other subscribers						
					
					                    
                        
							Email Address                        
                        
                    

                    
                        
                        
                        
                        
						                        
	                        Subscribe]]>
      </description>
      <content:encoded>
        <![CDATA[Originally Aired on March 3, 2021



Articles discussed in this episode:



* https://www.msn.com/en-us/money/other/microsoft-these-exchange-server-zero-day-flaws-are-being-used-by-hackers-so-update-now/ar-BB1ec0In



















Check out our Cyber Range, not just a place to work through challenges and play, but also an open direct/hands-on training environment.    



https://www.blackhillsinfosec.com/services/cyber-range/ 















Join the BHIS Blog Mailing List – get notified when we post new blogs, webcasts, and podcasts.



            
									
						
						Join 3,093 other subscribers						
					
					                    
                        
							Email Address                        
                        
                    

                    
                        
                        
                        
                        
						                        
	                        Subscribe]]>
      </content:encoded>
      <pubDate>Fri, 05 Mar 2021 14:19:31 -0500</pubDate>
      <author>Black Hills Information Security</author>
      <enclosure url="https://media.transistor.fm/dbc8e51d/f30ddc54.mp3" length="17121588" type="audio/mpeg"/>
      <itunes:author>Black Hills Information Security</itunes:author>
      <itunes:image href="https://img.transistorcdn.com/1ZunTDHI_O2SGSZu1TKkj6MI5YUhe3ZTQxmqJb4GlD4/rs:fill:0:0:1/w:1400/h:1400/q:60/mb:500000/aHR0cHM6Ly9pbWct/dXBsb2FkLXByb2R1/Y3Rpb24udHJhbnNp/c3Rvci5mbS80Njlh/YzBmYWJiNWIwOTU4/N2RmYzk3NTkyZDU0/MjkwMi5wbmc.jpg"/>
      <itunes:duration>2135</itunes:duration>
      <itunes:summary>Originally Aired on March 3, 2021



Articles discussed in this episode:



* https://www.msn.com/en-us/money/other/microsoft-these-exchange-server-zero-day-flaws-are-being-used-by-hackers-so-update-now/ar-BB1ec0In



















Check out our Cyber Range, not just a place to work through challenges and play, but also an open direct/hands-on training environment.    



https://www.blackhillsinfosec.com/services/cyber-range/ 















Join the BHIS Blog Mailing List – get notified when we post new blogs, webcasts, and podcasts.



            
									
						
						Join 3,093 other subscribers						
					
					                    
                        
							Email Address                        
                        
                    

                    
                        
                        
                        
                        
						                        
	                        Subscribe</itunes:summary>
      <itunes:subtitle>Originally Aired on March 3, 2021



Articles discussed in this episode:



* https://www.msn.com/en-us/money/other/microsoft-these-exchange-server-zero-day-flaws-are-being-used-by-hackers-so-update-now/ar-BB1ec0In



















Check out our Cyber R</itunes:subtitle>
      <itunes:keywords>Infosec,Cybersecurity,news</itunes:keywords>
      <itunes:explicit>No</itunes:explicit>
    </item>
    <item>
      <title>Talkin' About Infosec News - 3/1/2021</title>
      <itunes:episode>1</itunes:episode>
      <podcast:episode>1</podcast:episode>
      <itunes:title>Talkin' About Infosec News - 3/1/2021</itunes:title>
      <itunes:episodeType>full</itunes:episodeType>
      <guid isPermaLink="false">https://www.blackhillsinfosec.com/?p=18287</guid>
      <link>https://share.transistor.fm/s/246b5fdd</link>
      <description>
        <![CDATA[Originally Aired on March 1, 2021



Articles discussed in this episode:



* https://threatpost.com/yeezy-sneaker-bots-boost-sun/164312/* https://www.darknet.org.uk/2021/02/gitlab-watchman-audit-gitlab-for-sensitive-data-credentials/* https://www.wired.com/story/gab-hack-data-breach-ddosecrets/* https://www.cyberark.com/resources/threat-research-blog/hunting-azure-blobs-exposes-millions-of-sensitive-files* https://github.com/cyberark/blobhunter



















Check out our Cyber Range, not just a place to work through challenges and play, but also an open direct/hands-on training environment.    



https://www.blackhillsinfosec.com/services/cyber-range/ 















Join the BHIS Blog Mailing List – get notified when we post new blogs, webcasts, and podcasts.



            
									
						
						Join 3,084 other subscribers						
					
					                    
                        
							Email Address                        
                        
                    

                    
                        
                        
                        
                        
						                        
	                        Subscribe]]>
      </description>
      <content:encoded>
        <![CDATA[Originally Aired on March 1, 2021



Articles discussed in this episode:



* https://threatpost.com/yeezy-sneaker-bots-boost-sun/164312/* https://www.darknet.org.uk/2021/02/gitlab-watchman-audit-gitlab-for-sensitive-data-credentials/* https://www.wired.com/story/gab-hack-data-breach-ddosecrets/* https://www.cyberark.com/resources/threat-research-blog/hunting-azure-blobs-exposes-millions-of-sensitive-files* https://github.com/cyberark/blobhunter



















Check out our Cyber Range, not just a place to work through challenges and play, but also an open direct/hands-on training environment.    



https://www.blackhillsinfosec.com/services/cyber-range/ 















Join the BHIS Blog Mailing List – get notified when we post new blogs, webcasts, and podcasts.



            
									
						
						Join 3,084 other subscribers						
					
					                    
                        
							Email Address                        
                        
                    

                    
                        
                        
                        
                        
						                        
	                        Subscribe]]>
      </content:encoded>
      <pubDate>Wed, 03 Mar 2021 08:14:00 -0500</pubDate>
      <author>Black Hills Information Security</author>
      <enclosure url="https://media.transistor.fm/246b5fdd/f05ffa67.mp3" length="24531060" type="audio/mpeg"/>
      <itunes:author>Black Hills Information Security</itunes:author>
      <itunes:image href="https://img.transistorcdn.com/v8ymSUYxHN_be2-622yyDX5Zq9U6sn1aI3WGCa7g814/rs:fill:0:0:1/w:1400/h:1400/q:60/mb:500000/aHR0cHM6Ly9pbWct/dXBsb2FkLXByb2R1/Y3Rpb24udHJhbnNp/c3Rvci5mbS9hNDNm/MTljZjJlYzczZDg2/NzU5NWVkOTc4YTI2/N2I5NS5wbmc.jpg"/>
      <itunes:duration>3061</itunes:duration>
      <itunes:summary>Originally Aired on March 1, 2021



Articles discussed in this episode:



* https://threatpost.com/yeezy-sneaker-bots-boost-sun/164312/* https://www.darknet.org.uk/2021/02/gitlab-watchman-audit-gitlab-for-sensitive-data-credentials/* https://www.wired.com/story/gab-hack-data-breach-ddosecrets/* https://www.cyberark.com/resources/threat-research-blog/hunting-azure-blobs-exposes-millions-of-sensitive-files* https://github.com/cyberark/blobhunter



















Check out our Cyber Range, not just a place to work through challenges and play, but also an open direct/hands-on training environment.    



https://www.blackhillsinfosec.com/services/cyber-range/ 















Join the BHIS Blog Mailing List – get notified when we post new blogs, webcasts, and podcasts.



            
									
						
						Join 3,084 other subscribers						
					
					                    
                        
							Email Address                        
                        
                    

                    
                        
                        
                        
                        
						                        
	                        Subscribe</itunes:summary>
      <itunes:subtitle>Originally Aired on March 1, 2021



Articles discussed in this episode:



* https://threatpost.com/yeezy-sneaker-bots-boost-sun/164312/* https://www.darknet.org.uk/2021/02/gitlab-watchman-audit-gitlab-for-sensitive-data-credentials/* https://www.wired.c</itunes:subtitle>
      <itunes:keywords>Infosec,Cybersecurity,news</itunes:keywords>
      <itunes:explicit>No</itunes:explicit>
    </item>
    <item>
      <title>Talkin' About Infosec News - 2/24/2021</title>
      <itunes:episode>1</itunes:episode>
      <podcast:episode>1</podcast:episode>
      <itunes:title>Talkin' About Infosec News - 2/24/2021</itunes:title>
      <itunes:episodeType>full</itunes:episodeType>
      <guid isPermaLink="false">https://www.blackhillsinfosec.com/?p=18281</guid>
      <link>https://share.transistor.fm/s/e1a30a1d</link>
      <description>
        <![CDATA[Originally Aired on February 24, 2021



Articles discussed in this episode:



* https://www.scmagazine.com/home/security-news/government-and-defense/fireeye-and-microsoft-execs-senators-dissect-mandatory-breach-disclosure-in-wake-of-solarwinds/* https://www.wired.com/story/russia-gru-hackers-us-grid/



















Check out our Cyber Range, not just a place to work through challenges and play, but also an open direct/hands-on training environment.    



https://www.blackhillsinfosec.com/services/cyber-range/ 















Join the BHIS Blog Mailing List – get notified when we post new blogs, webcasts, and podcasts.



            
									
						
						Join 3,080 other subscribers						
					
					                    
                        
							Email Address                        
                        
                    

                    
                        
                        
                        
                        
						                        
	                        Subscribe]]>
      </description>
      <content:encoded>
        <![CDATA[Originally Aired on February 24, 2021



Articles discussed in this episode:



* https://www.scmagazine.com/home/security-news/government-and-defense/fireeye-and-microsoft-execs-senators-dissect-mandatory-breach-disclosure-in-wake-of-solarwinds/* https://www.wired.com/story/russia-gru-hackers-us-grid/



















Check out our Cyber Range, not just a place to work through challenges and play, but also an open direct/hands-on training environment.    



https://www.blackhillsinfosec.com/services/cyber-range/ 















Join the BHIS Blog Mailing List – get notified when we post new blogs, webcasts, and podcasts.



            
									
						
						Join 3,080 other subscribers						
					
					                    
                        
							Email Address                        
                        
                    

                    
                        
                        
                        
                        
						                        
	                        Subscribe]]>
      </content:encoded>
      <pubDate>Fri, 26 Feb 2021 11:37:14 -0500</pubDate>
      <author>Black Hills Information Security</author>
      <enclosure url="https://media.transistor.fm/e1a30a1d/476a708f.mp3" length="20733310" type="audio/mpeg"/>
      <itunes:author>Black Hills Information Security</itunes:author>
      <itunes:image href="https://img.transistorcdn.com/DKtaQgi9wvOY82f-Of0jK_qBU8YqyJ9bCkkgk8djWj0/rs:fill:0:0:1/w:1400/h:1400/q:60/mb:500000/aHR0cHM6Ly9pbWct/dXBsb2FkLXByb2R1/Y3Rpb24udHJhbnNp/c3Rvci5mbS8wZjk1/NWI5N2M1NTc2Zjli/NWM4N2E5N2NlY2Vk/MDBiOC5wbmc.jpg"/>
      <itunes:duration>2586</itunes:duration>
      <itunes:summary>Originally Aired on February 24, 2021



Articles discussed in this episode:



* https://www.scmagazine.com/home/security-news/government-and-defense/fireeye-and-microsoft-execs-senators-dissect-mandatory-breach-disclosure-in-wake-of-solarwinds/* https://www.wired.com/story/russia-gru-hackers-us-grid/



















Check out our Cyber Range, not just a place to work through challenges and play, but also an open direct/hands-on training environment.    



https://www.blackhillsinfosec.com/services/cyber-range/ 















Join the BHIS Blog Mailing List – get notified when we post new blogs, webcasts, and podcasts.



            
									
						
						Join 3,080 other subscribers						
					
					                    
                        
							Email Address                        
                        
                    

                    
                        
                        
                        
                        
						                        
	                        Subscribe</itunes:summary>
      <itunes:subtitle>Originally Aired on February 24, 2021



Articles discussed in this episode:



* https://www.scmagazine.com/home/security-news/government-and-defense/fireeye-and-microsoft-execs-senators-dissect-mandatory-breach-disclosure-in-wake-of-solarwinds/* https:/</itunes:subtitle>
      <itunes:keywords>Infosec,Cybersecurity,news</itunes:keywords>
      <itunes:explicit>No</itunes:explicit>
    </item>
    <item>
      <title>Talkin' About Infosec News - 2/22/2021</title>
      <itunes:episode>1</itunes:episode>
      <podcast:episode>1</podcast:episode>
      <itunes:title>Talkin' About Infosec News - 2/22/2021</itunes:title>
      <itunes:episodeType>full</itunes:episodeType>
      <guid isPermaLink="false">https://www.blackhillsinfosec.com/?p=18257</guid>
      <link>https://share.transistor.fm/s/eb28bc63</link>
      <description>
        <![CDATA[Originally Aired on February 22, 2021



Articles discussed in this episode:



* https://www.reuters.com/article/us-northkorea-cybercrime-pfizer-idUKKBN2AG0NI* https://threatpost.com/silver-sparrow-malware-30k-macs/164121/* https://www.securityweek.com/chinese-hackers-cloned-equation-group-exploit-years-shadow-brokers-leak



















Check out our Cyber Range, not just a place to work through challenges and play, but also an open direct/hands-on training environment.    



https://www.blackhillsinfosec.com/services/cyber-range/ 















Join the BHIS Blog Mailing List – get notified when we post new blogs, webcasts, and podcasts.



            
									
						
						Join 3,071 other subscribers						
					
					                    
                        
							Email Address                        
                        
                    

                    
                        
                        
                        
                        
						                        
	                        Subscribe]]>
      </description>
      <content:encoded>
        <![CDATA[Originally Aired on February 22, 2021



Articles discussed in this episode:



* https://www.reuters.com/article/us-northkorea-cybercrime-pfizer-idUKKBN2AG0NI* https://threatpost.com/silver-sparrow-malware-30k-macs/164121/* https://www.securityweek.com/chinese-hackers-cloned-equation-group-exploit-years-shadow-brokers-leak



















Check out our Cyber Range, not just a place to work through challenges and play, but also an open direct/hands-on training environment.    



https://www.blackhillsinfosec.com/services/cyber-range/ 















Join the BHIS Blog Mailing List – get notified when we post new blogs, webcasts, and podcasts.



            
									
						
						Join 3,071 other subscribers						
					
					                    
                        
							Email Address                        
                        
                    

                    
                        
                        
                        
                        
						                        
	                        Subscribe]]>
      </content:encoded>
      <pubDate>Tue, 23 Feb 2021 09:37:44 -0500</pubDate>
      <author>Black Hills Information Security</author>
      <enclosure url="https://media.transistor.fm/eb28bc63/54430d14.mp3" length="16524470" type="audio/mpeg"/>
      <itunes:author>Black Hills Information Security</itunes:author>
      <itunes:image href="https://img.transistorcdn.com/eZj8cHxaek9TYc5xb1bVK2AsbFK-mrqkDJAnZQux1vY/rs:fill:0:0:1/w:1400/h:1400/q:60/mb:500000/aHR0cHM6Ly9pbWct/dXBsb2FkLXByb2R1/Y3Rpb24udHJhbnNp/c3Rvci5mbS84MmU5/MTQ5MGIwNzlhZWNk/NTAwOGY2MjljODNj/YTg2Yi5wbmc.jpg"/>
      <itunes:duration>2060</itunes:duration>
      <itunes:summary>Originally Aired on February 22, 2021



Articles discussed in this episode:



* https://www.reuters.com/article/us-northkorea-cybercrime-pfizer-idUKKBN2AG0NI* https://threatpost.com/silver-sparrow-malware-30k-macs/164121/* https://www.securityweek.com/chinese-hackers-cloned-equation-group-exploit-years-shadow-brokers-leak



















Check out our Cyber Range, not just a place to work through challenges and play, but also an open direct/hands-on training environment.    



https://www.blackhillsinfosec.com/services/cyber-range/ 















Join the BHIS Blog Mailing List – get notified when we post new blogs, webcasts, and podcasts.



            
									
						
						Join 3,071 other subscribers						
					
					                    
                        
							Email Address                        
                        
                    

                    
                        
                        
                        
                        
						                        
	                        Subscribe</itunes:summary>
      <itunes:subtitle>Originally Aired on February 22, 2021



Articles discussed in this episode:



* https://www.reuters.com/article/us-northkorea-cybercrime-pfizer-idUKKBN2AG0NI* https://threatpost.com/silver-sparrow-malware-30k-macs/164121/* https://www.securityweek.com/c</itunes:subtitle>
      <itunes:keywords>Infosec,Cybersecurity,news</itunes:keywords>
      <itunes:explicit>No</itunes:explicit>
    </item>
    <item>
      <title>Talkin' About Infosec News - 2/17/2021</title>
      <itunes:episode>1</itunes:episode>
      <podcast:episode>1</podcast:episode>
      <itunes:title>Talkin' About Infosec News - 2/17/2021</itunes:title>
      <itunes:episodeType>full</itunes:episodeType>
      <guid isPermaLink="false">https://www.blackhillsinfosec.com/?p=18251</guid>
      <link>https://share.transistor.fm/s/803ffd1e</link>
      <description>
        <![CDATA[Originally Aired on February 17, 2021



Articles discussed in this episode:



* https://www.scmagazine.com/home/security-news/everyones-half-asleep-and-bosses-dont-want-trouble-the-struggle-to-secure-utilities/* https://attack.mitre.org/matrices/enterprise/* https://www.scmagazine.com/home/security-news/network-security/siem-rules-ignore-bulk-of-mitre-attck-framework-placing-risk-burden-on-users/* https://www.securityweek.com/cybercriminals-leak-files-allegedly-stolen-law-firm-jones-day



















Check out our Cyber Range, not just a place to work through challenges and play, but also an open direct/hands-on training environment.    



https://www.blackhillsinfosec.com/services/cyber-range/ 















Join the BHIS Blog Mailing List – get notified when we post new blogs, webcasts, and podcasts.



            
									
						
						Join 3,063 other subscribers						
					
					                    
                        
							Email Address                        
                        
                    

                    
                        
                        
                        
                        
						                        
	                        Subscribe]]>
      </description>
      <content:encoded>
        <![CDATA[Originally Aired on February 17, 2021



Articles discussed in this episode:



* https://www.scmagazine.com/home/security-news/everyones-half-asleep-and-bosses-dont-want-trouble-the-struggle-to-secure-utilities/* https://attack.mitre.org/matrices/enterprise/* https://www.scmagazine.com/home/security-news/network-security/siem-rules-ignore-bulk-of-mitre-attck-framework-placing-risk-burden-on-users/* https://www.securityweek.com/cybercriminals-leak-files-allegedly-stolen-law-firm-jones-day



















Check out our Cyber Range, not just a place to work through challenges and play, but also an open direct/hands-on training environment.    



https://www.blackhillsinfosec.com/services/cyber-range/ 















Join the BHIS Blog Mailing List – get notified when we post new blogs, webcasts, and podcasts.



            
									
						
						Join 3,063 other subscribers						
					
					                    
                        
							Email Address                        
                        
                    

                    
                        
                        
                        
                        
						                        
	                        Subscribe]]>
      </content:encoded>
      <pubDate>Thu, 18 Feb 2021 12:48:20 -0500</pubDate>
      <author>Black Hills Information Security</author>
      <enclosure url="https://media.transistor.fm/803ffd1e/d2961bc5.mp3" length="20988862" type="audio/mpeg"/>
      <itunes:author>Black Hills Information Security</itunes:author>
      <itunes:image href="https://img.transistorcdn.com/ozCr7T8M9bOp5oBzV57ZhMxdWdQ7XOmq3bI7lHCCfCE/rs:fill:0:0:1/w:1400/h:1400/q:60/mb:500000/aHR0cHM6Ly9pbWct/dXBsb2FkLXByb2R1/Y3Rpb24udHJhbnNp/c3Rvci5mbS9kNzk0/MWRkNzhmZTA5NmY3/YjU5MzgxMDMzNGM2/OWM5ZS5wbmc.jpg"/>
      <itunes:duration>2618</itunes:duration>
      <itunes:summary>Originally Aired on February 17, 2021



Articles discussed in this episode:



* https://www.scmagazine.com/home/security-news/everyones-half-asleep-and-bosses-dont-want-trouble-the-struggle-to-secure-utilities/* https://attack.mitre.org/matrices/enterprise/* https://www.scmagazine.com/home/security-news/network-security/siem-rules-ignore-bulk-of-mitre-attck-framework-placing-risk-burden-on-users/* https://www.securityweek.com/cybercriminals-leak-files-allegedly-stolen-law-firm-jones-day



















Check out our Cyber Range, not just a place to work through challenges and play, but also an open direct/hands-on training environment.    



https://www.blackhillsinfosec.com/services/cyber-range/ 















Join the BHIS Blog Mailing List – get notified when we post new blogs, webcasts, and podcasts.



            
									
						
						Join 3,063 other subscribers						
					
					                    
                        
							Email Address                        
                        
                    

                    
                        
                        
                        
                        
						                        
	                        Subscribe</itunes:summary>
      <itunes:subtitle>Originally Aired on February 17, 2021



Articles discussed in this episode:



* https://www.scmagazine.com/home/security-news/everyones-half-asleep-and-bosses-dont-want-trouble-the-struggle-to-secure-utilities/* https://attack.mitre.org/matrices/enterpr</itunes:subtitle>
      <itunes:keywords>Infosec,Cybersecurity,news</itunes:keywords>
      <itunes:explicit>No</itunes:explicit>
    </item>
    <item>
      <title>Talkin' About Infosec News - 2/8/2021</title>
      <itunes:episode>1</itunes:episode>
      <podcast:episode>1</podcast:episode>
      <itunes:title>Talkin' About Infosec News - 2/8/2021</itunes:title>
      <itunes:episodeType>full</itunes:episodeType>
      <guid isPermaLink="false">https://www.blackhillsinfosec.com/?p=18222</guid>
      <link>https://share.transistor.fm/s/95de3fd9</link>
      <description>
        <![CDATA[Originally Aired on February 8, 2021



Articles discussed in this episode:



* https://threatpost.com/500-malicious-chrome-extensions-millions/152918/* https://threatpost.com/fake-forcepoint-google-chrome-extension-hacks/163728/* https://threatpost.com/industrial-networks-hackable-security-holes/163708/* https://www.reuters.com/article/us-usa-cyber-florida/hackers-broke-into-florida-towns-water-treatment-plant-attempted-poisoning-sheriff-says-idUSKBN2A82FV* https://twitter.com/SkelSec/status/1346553596855390212



















Check out our Cyber Range, not just a place to work through challenges and play, but also an open direct/hands-on training environment.    



https://www.blackhillsinfosec.com/services/cyber-range/ 















Join the BHIS Blog Mailing List – get notified when we post new blogs, webcasts, and podcasts.



            
									
						
						Join 3,027 other subscribers						
					
					                    
                        
							Email Address                        
                        
                    

                    
                        
                        
                        
                        
						                        
	                        Subscribe]]>
      </description>
      <content:encoded>
        <![CDATA[Originally Aired on February 8, 2021



Articles discussed in this episode:



* https://threatpost.com/500-malicious-chrome-extensions-millions/152918/* https://threatpost.com/fake-forcepoint-google-chrome-extension-hacks/163728/* https://threatpost.com/industrial-networks-hackable-security-holes/163708/* https://www.reuters.com/article/us-usa-cyber-florida/hackers-broke-into-florida-towns-water-treatment-plant-attempted-poisoning-sheriff-says-idUSKBN2A82FV* https://twitter.com/SkelSec/status/1346553596855390212



















Check out our Cyber Range, not just a place to work through challenges and play, but also an open direct/hands-on training environment.    



https://www.blackhillsinfosec.com/services/cyber-range/ 















Join the BHIS Blog Mailing List – get notified when we post new blogs, webcasts, and podcasts.



            
									
						
						Join 3,027 other subscribers						
					
					                    
                        
							Email Address                        
                        
                    

                    
                        
                        
                        
                        
						                        
	                        Subscribe]]>
      </content:encoded>
      <pubDate>Tue, 09 Feb 2021 10:18:43 -0500</pubDate>
      <author>Black Hills Information Security</author>
      <enclosure url="https://media.transistor.fm/95de3fd9/2355e903.mp3" length="21780092" type="audio/mpeg"/>
      <itunes:author>Black Hills Information Security</itunes:author>
      <itunes:image href="https://img.transistorcdn.com/H4rgboXxkJmz2bTHAwg-fWFBRW8XH_reUercmkzpFCs/rs:fill:0:0:1/w:1400/h:1400/q:60/mb:500000/aHR0cHM6Ly9pbWct/dXBsb2FkLXByb2R1/Y3Rpb24udHJhbnNp/c3Rvci5mbS80NmUz/NjAyOTc1MDdlZmIw/OThkZjgxMTY0MDI0/MDFmNC5wbmc.jpg"/>
      <itunes:duration>2717</itunes:duration>
      <itunes:summary>Originally Aired on February 8, 2021



Articles discussed in this episode:



* https://threatpost.com/500-malicious-chrome-extensions-millions/152918/* https://threatpost.com/fake-forcepoint-google-chrome-extension-hacks/163728/* https://threatpost.com/industrial-networks-hackable-security-holes/163708/* https://www.reuters.com/article/us-usa-cyber-florida/hackers-broke-into-florida-towns-water-treatment-plant-attempted-poisoning-sheriff-says-idUSKBN2A82FV* https://twitter.com/SkelSec/status/1346553596855390212



















Check out our Cyber Range, not just a place to work through challenges and play, but also an open direct/hands-on training environment.    



https://www.blackhillsinfosec.com/services/cyber-range/ 















Join the BHIS Blog Mailing List – get notified when we post new blogs, webcasts, and podcasts.



            
									
						
						Join 3,027 other subscribers						
					
					                    
                        
							Email Address                        
                        
                    

                    
                        
                        
                        
                        
						                        
	                        Subscribe</itunes:summary>
      <itunes:subtitle>Originally Aired on February 8, 2021



Articles discussed in this episode:



* https://threatpost.com/500-malicious-chrome-extensions-millions/152918/* https://threatpost.com/fake-forcepoint-google-chrome-extension-hacks/163728/* https://threatpost.com/</itunes:subtitle>
      <itunes:keywords>Infosec,Cybersecurity,news</itunes:keywords>
      <itunes:explicit>No</itunes:explicit>
    </item>
    <item>
      <title>Talkin' About Infosec News - 2/1/2021</title>
      <itunes:episode>1</itunes:episode>
      <podcast:episode>1</podcast:episode>
      <itunes:title>Talkin' About Infosec News - 2/1/2021</itunes:title>
      <itunes:episodeType>full</itunes:episodeType>
      <guid isPermaLink="false">https://www.blackhillsinfosec.com/?p=18189</guid>
      <link>https://share.transistor.fm/s/54c4e708</link>
      <description>
        <![CDATA[Originally Aired on February 1, 2021



Articles discussed in this episode:



* https://threatpost.com/microsoft-365-bec-innovation/163508/* https://threatpost.com/critical-libgcrypt-crypto-bug-arbitrary-code/163546/* https://www.newyorker.com/magazine/2021/02/08/the-next-cyberattack-is-already-under-way?&amp;web_view=true



















Check out our Cyber Range, not just a place to work through challenges and play, but also an open direct/hands-on training environment.    



https://www.blackhillsinfosec.com/services/cyber-range/ 















Join the BHIS Blog Mailing List – get notified when we post new blogs, webcasts, and podcasts.



            
									
						
						Join 3,008 other subscribers						
					
					                    
                        
							Email Address                        
                        
                    

                    
                        
                        
                        
                        
						                        
	                        Subscribe]]>
      </description>
      <content:encoded>
        <![CDATA[Originally Aired on February 1, 2021



Articles discussed in this episode:



* https://threatpost.com/microsoft-365-bec-innovation/163508/* https://threatpost.com/critical-libgcrypt-crypto-bug-arbitrary-code/163546/* https://www.newyorker.com/magazine/2021/02/08/the-next-cyberattack-is-already-under-way?&amp;web_view=true



















Check out our Cyber Range, not just a place to work through challenges and play, but also an open direct/hands-on training environment.    



https://www.blackhillsinfosec.com/services/cyber-range/ 















Join the BHIS Blog Mailing List – get notified when we post new blogs, webcasts, and podcasts.



            
									
						
						Join 3,008 other subscribers						
					
					                    
                        
							Email Address                        
                        
                    

                    
                        
                        
                        
                        
						                        
	                        Subscribe]]>
      </content:encoded>
      <pubDate>Tue, 02 Feb 2021 12:42:27 -0500</pubDate>
      <author>Black Hills Information Security</author>
      <enclosure url="https://media.transistor.fm/54c4e708/ff9ca539.mp3" length="29947956" type="audio/mpeg"/>
      <itunes:author>Black Hills Information Security</itunes:author>
      <itunes:image href="https://img.transistorcdn.com/YE7jXwP_IntG2AaObLOwd300ibtBo-vBgUmwHVlOBYs/rs:fill:0:0:1/w:1400/h:1400/q:60/mb:500000/aHR0cHM6Ly9pbWct/dXBsb2FkLXByb2R1/Y3Rpb24udHJhbnNp/c3Rvci5mbS9iNWRi/ZGU5MjBlNzYyN2Y2/MTVmZjMzYzdiODhk/Y2I5Zi5wbmc.jpg"/>
      <itunes:duration>3738</itunes:duration>
      <itunes:summary>Originally Aired on February 1, 2021



Articles discussed in this episode:



* https://threatpost.com/microsoft-365-bec-innovation/163508/* https://threatpost.com/critical-libgcrypt-crypto-bug-arbitrary-code/163546/* https://www.newyorker.com/magazine/2021/02/08/the-next-cyberattack-is-already-under-way?&amp;amp;web_view=true



















Check out our Cyber Range, not just a place to work through challenges and play, but also an open direct/hands-on training environment.    



https://www.blackhillsinfosec.com/services/cyber-range/ 















Join the BHIS Blog Mailing List – get notified when we post new blogs, webcasts, and podcasts.



            
									
						
						Join 3,008 other subscribers						
					
					                    
                        
							Email Address                        
                        
                    

                    
                        
                        
                        
                        
						                        
	                        Subscribe</itunes:summary>
      <itunes:subtitle>Originally Aired on February 1, 2021



Articles discussed in this episode:



* https://threatpost.com/microsoft-365-bec-innovation/163508/* https://threatpost.com/critical-libgcrypt-crypto-bug-arbitrary-code/163546/* https://www.newyorker.com/magazine/2</itunes:subtitle>
      <itunes:keywords>Infosec,Cybersecurity,news</itunes:keywords>
      <itunes:explicit>No</itunes:explicit>
    </item>
    <item>
      <title>Talkin’ About Infosec News – 1/25/2021</title>
      <itunes:episode>1</itunes:episode>
      <podcast:episode>1</podcast:episode>
      <itunes:title>Talkin’ About Infosec News – 1/25/2021</itunes:title>
      <itunes:episodeType>full</itunes:episodeType>
      <guid isPermaLink="false">https://www.blackhillsinfosec.com/?p=18138</guid>
      <link>https://share.transistor.fm/s/36dbfd8b</link>
      <description>
        <![CDATA[ORIGINALLY AIRED ON JANUARY 25, 2021



















Check out our Cyber Range, not just a place to work through challenges and play, but also an open direct/hands-on training environment.    



https://www.blackhillsinfosec.com/services/cyber-range/ 















Join the BHIS Blog Mailing List – get notified when we post new blogs, webcasts, and podcasts.



            
									
						
						Join 2,989 other subscribers						
					
					                    
                        
							Email Address                        
                        
                    

                    
                        
                        
                        
                        
						                        
	                        Subscribe]]>
      </description>
      <content:encoded>
        <![CDATA[ORIGINALLY AIRED ON JANUARY 25, 2021



















Check out our Cyber Range, not just a place to work through challenges and play, but also an open direct/hands-on training environment.    



https://www.blackhillsinfosec.com/services/cyber-range/ 















Join the BHIS Blog Mailing List – get notified when we post new blogs, webcasts, and podcasts.



            
									
						
						Join 2,989 other subscribers						
					
					                    
                        
							Email Address                        
                        
                    

                    
                        
                        
                        
                        
						                        
	                        Subscribe]]>
      </content:encoded>
      <pubDate>Tue, 26 Jan 2021 10:58:48 -0500</pubDate>
      <author>Black Hills Information Security</author>
      <enclosure url="https://media.transistor.fm/36dbfd8b/e28c2616.mp3" length="15055670" type="audio/mpeg"/>
      <itunes:author>Black Hills Information Security</itunes:author>
      <itunes:image href="https://img.transistorcdn.com/e_YfIXp7EYXhs3Nl9NNUSjnBfiB5qBlmqdsaMBe8XEU/rs:fill:0:0:1/w:1400/h:1400/q:60/mb:500000/aHR0cHM6Ly9pbWct/dXBsb2FkLXByb2R1/Y3Rpb24udHJhbnNp/c3Rvci5mbS83NTA3/M2EwY2VjODYwOGMw/YWFjMTM1YmI0ZGEw/MmY4Yy5wbmc.jpg"/>
      <itunes:duration>1877</itunes:duration>
      <itunes:summary>ORIGINALLY AIRED ON JANUARY 25, 2021



















Check out our Cyber Range, not just a place to work through challenges and play, but also an open direct/hands-on training environment.    



https://www.blackhillsinfosec.com/services/cyber-range/ 















Join the BHIS Blog Mailing List – get notified when we post new blogs, webcasts, and podcasts.



            
									
						
						Join 2,989 other subscribers						
					
					                    
                        
							Email Address                        
                        
                    

                    
                        
                        
                        
                        
						                        
	                        Subscribe</itunes:summary>
      <itunes:subtitle>ORIGINALLY AIRED ON JANUARY 25, 2021



















Check out our Cyber Range, not just a place to work through challenges and play, but also an open direct/hands-on training environment.    



https://www.blackhillsinfosec.com/services/cyber-range/ </itunes:subtitle>
      <itunes:keywords>Infosec,Cybersecurity,news</itunes:keywords>
      <itunes:explicit>No</itunes:explicit>
    </item>
    <item>
      <title>Talkin’ About Infosec News – 1/20/2021</title>
      <itunes:episode>1</itunes:episode>
      <podcast:episode>1</podcast:episode>
      <itunes:title>Talkin’ About Infosec News – 1/20/2021</itunes:title>
      <itunes:episodeType>full</itunes:episodeType>
      <guid isPermaLink="false">https://www.blackhillsinfosec.com/?p=18132</guid>
      <link>https://share.transistor.fm/s/5e6b2dd8</link>
      <description>
        <![CDATA[ORIGINALLY AIRED ON JANUARY 20, 2021



Articles discussed in this episode:



* https://www.theregister.com/2021/01/20/malwarebytes_solarwinds_hack_latest/* https://threatpost.com/solarwinds-malware-arsenal-raindrop/163153/* https://threatpost.com/dnspooq-flaws-allow-dns-hijacking-of-millions-of-devices/163163/



















Check out our Cyber Range, not just a place to work through challenges and play, but also an open direct/hands-on training environment.    



https://www.blackhillsinfosec.com/services/cyber-range/ 















Join the BHIS Blog Mailing List – get notified when we post new blogs, webcasts, and podcasts.



            
									
						
						Join 2,982 other subscribers						
					
					                    
                        
							Email Address                        
                        
                    

                    
                        
                        
                        
                        
						                        
	                        Subscribe]]>
      </description>
      <content:encoded>
        <![CDATA[ORIGINALLY AIRED ON JANUARY 20, 2021



Articles discussed in this episode:



* https://www.theregister.com/2021/01/20/malwarebytes_solarwinds_hack_latest/* https://threatpost.com/solarwinds-malware-arsenal-raindrop/163153/* https://threatpost.com/dnspooq-flaws-allow-dns-hijacking-of-millions-of-devices/163163/



















Check out our Cyber Range, not just a place to work through challenges and play, but also an open direct/hands-on training environment.    



https://www.blackhillsinfosec.com/services/cyber-range/ 















Join the BHIS Blog Mailing List – get notified when we post new blogs, webcasts, and podcasts.



            
									
						
						Join 2,982 other subscribers						
					
					                    
                        
							Email Address                        
                        
                    

                    
                        
                        
                        
                        
						                        
	                        Subscribe]]>
      </content:encoded>
      <pubDate>Fri, 22 Jan 2021 14:20:00 -0500</pubDate>
      <author>Black Hills Information Security</author>
      <enclosure url="https://media.transistor.fm/5e6b2dd8/f083ddf5.mp3" length="19733558" type="audio/mpeg"/>
      <itunes:author>Black Hills Information Security</itunes:author>
      <itunes:image href="https://img.transistorcdn.com/d7bxYXirpCtfIVgT5QnjV9Dn-Hi5hcv1zVkhu7DBH9w/rs:fill:0:0:1/w:1400/h:1400/q:60/mb:500000/aHR0cHM6Ly9pbWct/dXBsb2FkLXByb2R1/Y3Rpb24udHJhbnNp/c3Rvci5mbS81ZTJl/N2RkZDEyYjc1ZDYy/YThlMDExM2IyMzI4/NWI1Yy5wbmc.jpg"/>
      <itunes:duration>2462</itunes:duration>
      <itunes:summary>ORIGINALLY AIRED ON JANUARY 20, 2021



Articles discussed in this episode:



* https://www.theregister.com/2021/01/20/malwarebytes_solarwinds_hack_latest/* https://threatpost.com/solarwinds-malware-arsenal-raindrop/163153/* https://threatpost.com/dnspooq-flaws-allow-dns-hijacking-of-millions-of-devices/163163/



















Check out our Cyber Range, not just a place to work through challenges and play, but also an open direct/hands-on training environment.    



https://www.blackhillsinfosec.com/services/cyber-range/ 















Join the BHIS Blog Mailing List – get notified when we post new blogs, webcasts, and podcasts.



            
									
						
						Join 2,982 other subscribers						
					
					                    
                        
							Email Address                        
                        
                    

                    
                        
                        
                        
                        
						                        
	                        Subscribe</itunes:summary>
      <itunes:subtitle>ORIGINALLY AIRED ON JANUARY 20, 2021



Articles discussed in this episode:



* https://www.theregister.com/2021/01/20/malwarebytes_solarwinds_hack_latest/* https://threatpost.com/solarwinds-malware-arsenal-raindrop/163153/* https://threatpost.com/dnspoo</itunes:subtitle>
      <itunes:keywords>Infosec,Cybersecurity,news</itunes:keywords>
      <itunes:explicit>No</itunes:explicit>
    </item>
    <item>
      <title>Webcast: Move Aside Script Kiddies - Malware Execution in the Age of Advanced Defenses</title>
      <itunes:episode>1</itunes:episode>
      <podcast:episode>1</podcast:episode>
      <itunes:title>Webcast: Move Aside Script Kiddies - Malware Execution in the Age of Advanced Defenses</itunes:title>
      <itunes:episodeType>full</itunes:episodeType>
      <guid isPermaLink="false">https://www.blackhillsinfosec.com/?p=18051</guid>
      <link>https://share.transistor.fm/s/f6cfea35</link>
      <description>
        <![CDATA[A few short years ago, penetration testers did not have to work too hard for their malware command channels to execute. Fast forward to today in the age of Endpoint Detection and Response, User Behavior Analytics, and advanced built-in O/S defenses, your standard toolkit for malware generation/execution does not work anymore. 



All is not lost! 



Using some relatively simple programming techniques, and tactical changes, we can still gain malware execution to establish our C2 channels. With some additional tactical changes post-exploitation, we can still move around below the radar but we need to move with greater care and stealth than ever before.



Join the BHIS Discord Community– https://discord.gg/aHHh3u5



00:00 – The Soundboard Has Too Many Buttons 



04:10 – FEATURE PRESENTATION: Malware Execution in the Age of Advanced Defenses 



05:36 – Attacker / Threat Actor Emulation 



09:41 – That Matrix 



10:34 – Endpoint Defense Maturity 



13:25 – C2 Implant Execution 



19:41 – Metasploit: Why Is My Network Traffic Caught? 



23:09 – C2 – Customize and LOL 



41:13 – The More You Know… 



44:11 – Recon/Discovery Artifacts 



46:15 – Amusement with AMSI 



47:33 – Simple! 



48:10 – AMSI Bypass 



50:27 – Event Tracing Bypass 



51:34 – Attack Combo! 



52:24 – Conclusion
<ul><li>(00:00) - The Soundboard Has Too Many Buttons</li>
<li>(04:10) - FEATURE PRESENTATION: Malware Execution in the Agge of Advanced Defenses</li>
<li>(05:36) - Attacker / Threat Actor Emulation</li>
<li>(09:41) - That Matrix</li>
<li>(10:34) - Endpoint Defense Maturity</li>
<li>(13:25) - C2 Implant Execution</li>
<li>(19:41) - Metasploit: Why Is My Network Traffic Caught?</li>
<li>(23:09) - C2 - Customize and LOL</li>
<li>(41:13) - The More You Know...</li>
<li>(44:11) - Recon/Discovery Artifacts</li>
<li>(46:15) - Amusement with AMSI</li>
<li>(47:33) - Simple!</li>
<li>(48:10) - AMSI Bypass</li>
<li>(50:27) - Event Tracing Bypass</li>
<li>(51:34) - Attack Combo!</li>
<li>(52:24) - Conclusion</li>
</ul>]]>
      </description>
      <content:encoded>
        <![CDATA[A few short years ago, penetration testers did not have to work too hard for their malware command channels to execute. Fast forward to today in the age of Endpoint Detection and Response, User Behavior Analytics, and advanced built-in O/S defenses, your standard toolkit for malware generation/execution does not work anymore. 



All is not lost! 



Using some relatively simple programming techniques, and tactical changes, we can still gain malware execution to establish our C2 channels. With some additional tactical changes post-exploitation, we can still move around below the radar but we need to move with greater care and stealth than ever before.



Join the BHIS Discord Community– https://discord.gg/aHHh3u5



00:00 – The Soundboard Has Too Many Buttons 



04:10 – FEATURE PRESENTATION: Malware Execution in the Age of Advanced Defenses 



05:36 – Attacker / Threat Actor Emulation 



09:41 – That Matrix 



10:34 – Endpoint Defense Maturity 



13:25 – C2 Implant Execution 



19:41 – Metasploit: Why Is My Network Traffic Caught? 



23:09 – C2 – Customize and LOL 



41:13 – The More You Know… 



44:11 – Recon/Discovery Artifacts 



46:15 – Amusement with AMSI 



47:33 – Simple! 



48:10 – AMSI Bypass 



50:27 – Event Tracing Bypass 



51:34 – Attack Combo! 



52:24 – Conclusion
<ul><li>(00:00) - The Soundboard Has Too Many Buttons</li>
<li>(04:10) - FEATURE PRESENTATION: Malware Execution in the Agge of Advanced Defenses</li>
<li>(05:36) - Attacker / Threat Actor Emulation</li>
<li>(09:41) - That Matrix</li>
<li>(10:34) - Endpoint Defense Maturity</li>
<li>(13:25) - C2 Implant Execution</li>
<li>(19:41) - Metasploit: Why Is My Network Traffic Caught?</li>
<li>(23:09) - C2 - Customize and LOL</li>
<li>(41:13) - The More You Know...</li>
<li>(44:11) - Recon/Discovery Artifacts</li>
<li>(46:15) - Amusement with AMSI</li>
<li>(47:33) - Simple!</li>
<li>(48:10) - AMSI Bypass</li>
<li>(50:27) - Event Tracing Bypass</li>
<li>(51:34) - Attack Combo!</li>
<li>(52:24) - Conclusion</li>
</ul>]]>
      </content:encoded>
      <pubDate>Mon, 18 Jan 2021 08:34:00 -0500</pubDate>
      <author>Black Hills Information Security</author>
      <enclosure url="https://media.transistor.fm/f6cfea35/43ff915b.mp3" length="33325935" type="audio/mpeg"/>
      <itunes:author>Black Hills Information Security</itunes:author>
      <itunes:image href="https://img.transistorcdn.com/fdS6CrAKxKH-aWbl1UeuTZEKkVD1oSg1NcHiArjdH64/rs:fill:0:0:1/w:1400/h:1400/q:60/mb:500000/aHR0cHM6Ly9pbWct/dXBsb2FkLXByb2R1/Y3Rpb24udHJhbnNp/c3Rvci5mbS84ODk3/ZTZlZjU3MmY5MDQw/OGMwYmVhMjdlZDk4/M2E5Mi5qcGc.jpg"/>
      <itunes:duration>3911</itunes:duration>
      <itunes:summary>A few short years ago, penetration testers did not have to work too hard for their malware command channels to execute. Fast forward to today in the age of Endpoint Detection and Response, User Behavior Analytics, and advanced built-in O/S defenses, your standard toolkit for malware generation/execution does not work anymore. 



All is not lost! 



Using some relatively simple programming techniques, and tactical changes, we can still gain malware execution to establish our C2 channels. With some additional tactical changes post-exploitation, we can still move around below the radar but we need to move with greater care and stealth than ever before.



Join the BHIS Discord Community– https://discord.gg/aHHh3u5



00:00 – The Soundboard Has Too Many Buttons 



04:10 – FEATURE PRESENTATION: Malware Execution in the Age of Advanced Defenses 



05:36 – Attacker / Threat Actor Emulation 



09:41 – That Matrix 



10:34 – Endpoint Defense Maturity 



13:25 – C2 Implant Execution 



19:41 – Metasploit: Why Is My Network Traffic Caught? 



23:09 – C2 – Customize and LOL 



41:13 – The More You Know… 



44:11 – Recon/Discovery Artifacts 



46:15 – Amusement with AMSI 



47:33 – Simple! 



48:10 – AMSI Bypass 



50:27 – Event Tracing Bypass 



51:34 – Attack Combo! 



52:24 – Conclusion</itunes:summary>
      <itunes:subtitle>A few short years ago, penetration testers did not have to work too hard for their malware command channels to execute. Fast forward to today in the age of Endpoint Detection and Response, User Behavior Analytics, and advanced built-in O/S defenses, your </itunes:subtitle>
      <itunes:keywords>Infosec,Cybersecurity,news</itunes:keywords>
      <itunes:explicit>No</itunes:explicit>
      <podcast:chapters url="https://share.transistor.fm/s/f6cfea35/chapters.json" type="application/json+chapters"/>
    </item>
    <item>
      <title>Talkin' About Infosec News - 1/13/2021</title>
      <itunes:episode>1</itunes:episode>
      <podcast:episode>1</podcast:episode>
      <itunes:title>Talkin' About Infosec News - 1/13/2021</itunes:title>
      <itunes:episodeType>full</itunes:episodeType>
      <guid isPermaLink="false">https://www.blackhillsinfosec.com/?p=18043</guid>
      <link>https://share.transistor.fm/s/005ca401</link>
      <description>
        <![CDATA[Originally aired on January 13, 2021



Articles discussed in this episode:



* https://www.theregister.com/2021/01/13/darkmarket_europol_shutdown/* https://www.theregister.com/2021/01/12/microsoft_linux_edr/* https://threatpost.com/mimecast-certificate-microsoft-supply-chain-attack/162965/* https://threatpost.com/hackers-leak-pfizer-covid-19-vaccine-data/163008/* https://krebsonsecurity.com/2021/01/ubiquiti-change-your-password-enable-2fa/



















Check out our Cyber Range, not just a place to work through challenges and play, but also an open direct/hands-on training environment.    



https://www.blackhillsinfosec.com/services/cyber-range/ 















Join the BHIS Blog Mailing List – get notified when we post new blogs, webcasts, and podcasts.



            
									
						
						Join 2,975 other subscribers						
					
					                    
                        
							Email Address                        
                        
                    

                    
                        
                        
                        
                        
						                        
	                        Subscribe]]>
      </description>
      <content:encoded>
        <![CDATA[Originally aired on January 13, 2021



Articles discussed in this episode:



* https://www.theregister.com/2021/01/13/darkmarket_europol_shutdown/* https://www.theregister.com/2021/01/12/microsoft_linux_edr/* https://threatpost.com/mimecast-certificate-microsoft-supply-chain-attack/162965/* https://threatpost.com/hackers-leak-pfizer-covid-19-vaccine-data/163008/* https://krebsonsecurity.com/2021/01/ubiquiti-change-your-password-enable-2fa/



















Check out our Cyber Range, not just a place to work through challenges and play, but also an open direct/hands-on training environment.    



https://www.blackhillsinfosec.com/services/cyber-range/ 















Join the BHIS Blog Mailing List – get notified when we post new blogs, webcasts, and podcasts.



            
									
						
						Join 2,975 other subscribers						
					
					                    
                        
							Email Address                        
                        
                    

                    
                        
                        
                        
                        
						                        
	                        Subscribe]]>
      </content:encoded>
      <pubDate>Thu, 14 Jan 2021 08:37:13 -0500</pubDate>
      <author>Black Hills Information Security</author>
      <enclosure url="https://media.transistor.fm/005ca401/c1a146cf.mp3" length="14214289" type="audio/mpeg"/>
      <itunes:author>Black Hills Information Security</itunes:author>
      <itunes:image href="https://img.transistorcdn.com/nz2kIKPe7V3QJrhEVTcSU0WC9uHE9QyJ7rozqe4BMFM/rs:fill:0:0:1/w:1400/h:1400/q:60/mb:500000/aHR0cHM6Ly9pbWct/dXBsb2FkLXByb2R1/Y3Rpb24udHJhbnNp/c3Rvci5mbS8zMWJm/NjU1ZDFjMzIzNTQ0/ZDJhOWQyY2FiYmFk/MGNlNC5wbmc.jpg"/>
      <itunes:duration>1770</itunes:duration>
      <itunes:summary>Originally aired on January 13, 2021



Articles discussed in this episode:



* https://www.theregister.com/2021/01/13/darkmarket_europol_shutdown/* https://www.theregister.com/2021/01/12/microsoft_linux_edr/* https://threatpost.com/mimecast-certificate-microsoft-supply-chain-attack/162965/* https://threatpost.com/hackers-leak-pfizer-covid-19-vaccine-data/163008/* https://krebsonsecurity.com/2021/01/ubiquiti-change-your-password-enable-2fa/



















Check out our Cyber Range, not just a place to work through challenges and play, but also an open direct/hands-on training environment.    



https://www.blackhillsinfosec.com/services/cyber-range/ 















Join the BHIS Blog Mailing List – get notified when we post new blogs, webcasts, and podcasts.



            
									
						
						Join 2,975 other subscribers						
					
					                    
                        
							Email Address                        
                        
                    

                    
                        
                        
                        
                        
						                        
	                        Subscribe</itunes:summary>
      <itunes:subtitle>Originally aired on January 13, 2021



Articles discussed in this episode:



* https://www.theregister.com/2021/01/13/darkmarket_europol_shutdown/* https://www.theregister.com/2021/01/12/microsoft_linux_edr/* https://threatpost.com/mimecast-certificate-</itunes:subtitle>
      <itunes:keywords>Infosec,Cybersecurity,news</itunes:keywords>
      <itunes:explicit>No</itunes:explicit>
    </item>
    <item>
      <title>Webcast: Discussing Implications of the SolarWinds Breach(es)</title>
      <itunes:episode>1</itunes:episode>
      <podcast:episode>1</podcast:episode>
      <itunes:title>Webcast: Discussing Implications of the SolarWinds Breach(es)</itunes:title>
      <itunes:episodeType>full</itunes:episodeType>
      <guid isPermaLink="false">https://www.blackhillsinfosec.com/?p=17737</guid>
      <link>https://share.transistor.fm/s/2c80be18</link>
      <description>
        <![CDATA[Does the news on SUNBURST and SUPERNOVA have you feeling like you’re flapping in the (Solar)Wind? 



Join John Strand, Jonathan Ham, and Jake Williams as they discuss the implications of the breaches in this no-FUD webcast. No, we won’t be discussing “cyber Pearl Harbor” – because lets be honest, that’s just hyperbole. Join us to learn why this is bad, but also why we assess that the sky isn’t falling. Join these three amigos to discuss breach details and actionable steps you can take in your own networks.



















Check out our Cyber Range, not just a place to work through challenges and play, but also an open direct/hands-on training environment.    



https://www.blackhillsinfosec.com/services/cyber-range/ 















Join the BHIS Blog Mailing List – get notified when we post new blogs, webcasts, and podcasts.



            
									
						
						Join 2,956 other subscribers						
					
					                    
                        
							Email Address                        
                        
                    

                    
                        
                        
                        
                        
						                        
	                        Subscribe]]>
      </description>
      <content:encoded>
        <![CDATA[Does the news on SUNBURST and SUPERNOVA have you feeling like you’re flapping in the (Solar)Wind? 



Join John Strand, Jonathan Ham, and Jake Williams as they discuss the implications of the breaches in this no-FUD webcast. No, we won’t be discussing “cyber Pearl Harbor” – because lets be honest, that’s just hyperbole. Join us to learn why this is bad, but also why we assess that the sky isn’t falling. Join these three amigos to discuss breach details and actionable steps you can take in your own networks.



















Check out our Cyber Range, not just a place to work through challenges and play, but also an open direct/hands-on training environment.    



https://www.blackhillsinfosec.com/services/cyber-range/ 















Join the BHIS Blog Mailing List – get notified when we post new blogs, webcasts, and podcasts.



            
									
						
						Join 2,956 other subscribers						
					
					                    
                        
							Email Address                        
                        
                    

                    
                        
                        
                        
                        
						                        
	                        Subscribe]]>
      </content:encoded>
      <pubDate>Thu, 31 Dec 2020 08:18:00 -0500</pubDate>
      <author>Black Hills Information Security</author>
      <enclosure url="https://media.transistor.fm/2c80be18/15476caf.mp3" length="36492653" type="audio/mpeg"/>
      <itunes:author>Black Hills Information Security</itunes:author>
      <itunes:duration>4562</itunes:duration>
      <itunes:summary>Does the news on SUNBURST and SUPERNOVA have you feeling like you’re flapping in the (Solar)Wind? 



Join John Strand, Jonathan Ham, and Jake Williams as they discuss the implications of the breaches in this no-FUD webcast. No, we won’t be discussing “cyber Pearl Harbor” – because lets be honest, that’s just hyperbole. Join us to learn why this is bad, but also why we assess that the sky isn’t falling. Join these three amigos to discuss breach details and actionable steps you can take in your own networks.



















Check out our Cyber Range, not just a place to work through challenges and play, but also an open direct/hands-on training environment.    



https://www.blackhillsinfosec.com/services/cyber-range/ 















Join the BHIS Blog Mailing List – get notified when we post new blogs, webcasts, and podcasts.



            
									
						
						Join 2,956 other subscribers						
					
					                    
                        
							Email Address                        
                        
                    

                    
                        
                        
                        
                        
						                        
	                        Subscribe</itunes:summary>
      <itunes:subtitle>Does the news on SUNBURST and SUPERNOVA have you feeling like you’re flapping in the (Solar)Wind? 



Join John Strand, Jonathan Ham, and Jake Williams as they discuss the implications of the breaches in this no-FUD webcast. No, we won’t be discussing “cy</itunes:subtitle>
      <itunes:keywords>Infosec,Cybersecurity,news</itunes:keywords>
      <itunes:explicit>No</itunes:explicit>
    </item>
    <item>
      <title>Talkin’ About Infosec News – 12/21/2020</title>
      <itunes:episode>1</itunes:episode>
      <podcast:episode>1</podcast:episode>
      <itunes:title>Talkin’ About Infosec News – 12/21/2020</itunes:title>
      <itunes:episodeType>full</itunes:episodeType>
      <guid isPermaLink="false">https://www.blackhillsinfosec.com/?p=17567</guid>
      <link>https://share.transistor.fm/s/c6781d61</link>
      <description>
        <![CDATA[Originally aired on December 21, 2020



Articles discussed in this episode:



* https://citizenlab.ca/2020/12/the-great-ipwn-journalists-hacked-with-suspected-nso-group-imessage-zero-click-exploit/ * https://theintercept.com/2020/12/17/russia-hack-austin-texas/



















Check out our Cyber Range, not just a place to work through challenges and play, but also an open direct/hands-on training environment.    



https://www.blackhillsinfosec.com/services/cyber-range/ 















Join the BHIS Blog Mailing List – get notified when we post new blogs, webcasts, and podcasts.



            
									
						
						Join 2,925 other subscribers						
					
					                    
                        
							Email Address                        
                        
                    

                    
                        
                        
                        
                        
						                        
	                        Subscribe]]>
      </description>
      <content:encoded>
        <![CDATA[Originally aired on December 21, 2020



Articles discussed in this episode:



* https://citizenlab.ca/2020/12/the-great-ipwn-journalists-hacked-with-suspected-nso-group-imessage-zero-click-exploit/ * https://theintercept.com/2020/12/17/russia-hack-austin-texas/



















Check out our Cyber Range, not just a place to work through challenges and play, but also an open direct/hands-on training environment.    



https://www.blackhillsinfosec.com/services/cyber-range/ 















Join the BHIS Blog Mailing List – get notified when we post new blogs, webcasts, and podcasts.



            
									
						
						Join 2,925 other subscribers						
					
					                    
                        
							Email Address                        
                        
                    

                    
                        
                        
                        
                        
						                        
	                        Subscribe]]>
      </content:encoded>
      <pubDate>Tue, 22 Dec 2020 11:41:42 -0500</pubDate>
      <author>Black Hills Information Security</author>
      <enclosure url="https://media.transistor.fm/c6781d61/7a0e600f.mp3" length="25448749" type="audio/mpeg"/>
      <itunes:author>Black Hills Information Security</itunes:author>
      <itunes:image href="https://img.transistorcdn.com/FrM-lx5A5UczZBhQOmzoy-7d9OBgxx11sBNmA1SB7Zg/rs:fill:0:0:1/w:1400/h:1400/q:60/mb:500000/aHR0cHM6Ly9pbWct/dXBsb2FkLXByb2R1/Y3Rpb24udHJhbnNp/c3Rvci5mbS80Yjk3/ZTY1ODMyZTQyNzhk/NTU3ZGYwZWYxNTJh/NjM0My5wbmc.jpg"/>
      <itunes:duration>3166</itunes:duration>
      <itunes:summary>Originally aired on December 21, 2020



Articles discussed in this episode:



* https://citizenlab.ca/2020/12/the-great-ipwn-journalists-hacked-with-suspected-nso-group-imessage-zero-click-exploit/ * https://theintercept.com/2020/12/17/russia-hack-austin-texas/



















Check out our Cyber Range, not just a place to work through challenges and play, but also an open direct/hands-on training environment.    



https://www.blackhillsinfosec.com/services/cyber-range/ 















Join the BHIS Blog Mailing List – get notified when we post new blogs, webcasts, and podcasts.



            
									
						
						Join 2,925 other subscribers						
					
					                    
                        
							Email Address                        
                        
                    

                    
                        
                        
                        
                        
						                        
	                        Subscribe</itunes:summary>
      <itunes:subtitle>Originally aired on December 21, 2020



Articles discussed in this episode:



* https://citizenlab.ca/2020/12/the-great-ipwn-journalists-hacked-with-suspected-nso-group-imessage-zero-click-exploit/ * https://theintercept.com/2020/12/17/russia-hack-austi</itunes:subtitle>
      <itunes:keywords>Infosec,Cybersecurity,news</itunes:keywords>
      <itunes:explicit>No</itunes:explicit>
    </item>
    <item>
      <title>Talkin' About Infosec News - 12/14/2020</title>
      <itunes:episode>1</itunes:episode>
      <podcast:episode>1</podcast:episode>
      <itunes:title>Talkin' About Infosec News - 12/14/2020</itunes:title>
      <itunes:episodeType>full</itunes:episodeType>
      <guid isPermaLink="false">https://www.blackhillsinfosec.com/?p=17486</guid>
      <link>https://share.transistor.fm/s/0dd8dd8d</link>
      <description>
        <![CDATA[Originally aired on December 14, 2020



Articles discussed in this episode:



* https://www.theverge.com/2020/12/14/22173803/gmail-youtube-google-assistant-docs-down-outage* https://www.fireeye.com/blog/threat-research/2020/12/evasive-attacker-leverages-solarwinds-supply-chain-compromises-with-sunburst-backdoor.html* https://krebsonsecurity.com/2020/12/u-s-treasury-commerce-depts-hacked-through-solarwinds-compromise/* https://www.darkreading.com/threat-intelligence/fireeye-breach-fallout-yet-to-be-felt/d/d-id/1339680* https://www.solarwinds.com/solutions/orion



















Check out our Cyber Range, not just a place to work through challenges and play, but also an open direct/hands-on training environment.    



https://www.blackhillsinfosec.com/services/cyber-range/ 















Join the BHIS Blog Mailing List – get notified when we post new blogs, webcasts, and podcasts.



            
									
						
						Join 2,921 other subscribers						
					
					                    
                        
							Email Address                        
                        
                    

                    
                        
                        
                        
                        
						                        
	                        Subscribe]]>
      </description>
      <content:encoded>
        <![CDATA[Originally aired on December 14, 2020



Articles discussed in this episode:



* https://www.theverge.com/2020/12/14/22173803/gmail-youtube-google-assistant-docs-down-outage* https://www.fireeye.com/blog/threat-research/2020/12/evasive-attacker-leverages-solarwinds-supply-chain-compromises-with-sunburst-backdoor.html* https://krebsonsecurity.com/2020/12/u-s-treasury-commerce-depts-hacked-through-solarwinds-compromise/* https://www.darkreading.com/threat-intelligence/fireeye-breach-fallout-yet-to-be-felt/d/d-id/1339680* https://www.solarwinds.com/solutions/orion



















Check out our Cyber Range, not just a place to work through challenges and play, but also an open direct/hands-on training environment.    



https://www.blackhillsinfosec.com/services/cyber-range/ 















Join the BHIS Blog Mailing List – get notified when we post new blogs, webcasts, and podcasts.



            
									
						
						Join 2,921 other subscribers						
					
					                    
                        
							Email Address                        
                        
                    

                    
                        
                        
                        
                        
						                        
	                        Subscribe]]>
      </content:encoded>
      <pubDate>Wed, 16 Dec 2020 08:05:00 -0500</pubDate>
      <author>Black Hills Information Security</author>
      <enclosure url="https://media.transistor.fm/0dd8dd8d/23a4f099.mp3" length="20799465" type="audio/mpeg"/>
      <itunes:author>Black Hills Information Security</itunes:author>
      <itunes:image href="https://img.transistorcdn.com/w_49Yi1_PDW_D92Ce2wsNo49yOlbCvSxMfMyzcLY0XI/rs:fill:0:0:1/w:1400/h:1400/q:60/mb:500000/aHR0cHM6Ly9pbWct/dXBsb2FkLXByb2R1/Y3Rpb24udHJhbnNp/c3Rvci5mbS80ODVh/MjJhMTlmMTZmNmZl/MjFmZDBiZjJkNjQx/MjI2Ny5wbmc.jpg"/>
      <itunes:duration>2585</itunes:duration>
      <itunes:summary>Originally aired on December 14, 2020



Articles discussed in this episode:



* https://www.theverge.com/2020/12/14/22173803/gmail-youtube-google-assistant-docs-down-outage* https://www.fireeye.com/blog/threat-research/2020/12/evasive-attacker-leverages-solarwinds-supply-chain-compromises-with-sunburst-backdoor.html* https://krebsonsecurity.com/2020/12/u-s-treasury-commerce-depts-hacked-through-solarwinds-compromise/* https://www.darkreading.com/threat-intelligence/fireeye-breach-fallout-yet-to-be-felt/d/d-id/1339680* https://www.solarwinds.com/solutions/orion



















Check out our Cyber Range, not just a place to work through challenges and play, but also an open direct/hands-on training environment.    



https://www.blackhillsinfosec.com/services/cyber-range/ 















Join the BHIS Blog Mailing List – get notified when we post new blogs, webcasts, and podcasts.



            
									
						
						Join 2,921 other subscribers						
					
					                    
                        
							Email Address                        
                        
                    

                    
                        
                        
                        
                        
						                        
	                        Subscribe</itunes:summary>
      <itunes:subtitle>Originally aired on December 14, 2020



Articles discussed in this episode:



* https://www.theverge.com/2020/12/14/22173803/gmail-youtube-google-assistant-docs-down-outage* https://www.fireeye.com/blog/threat-research/2020/12/evasive-attacker-leverages</itunes:subtitle>
      <itunes:keywords>Infosec,Cybersecurity,news</itunes:keywords>
      <itunes:explicit>No</itunes:explicit>
    </item>
    <item>
      <title>Talkin' About Infosec News - 12/11/2020</title>
      <itunes:episode>1</itunes:episode>
      <podcast:episode>1</podcast:episode>
      <itunes:title>Talkin' About Infosec News - 12/11/2020</itunes:title>
      <itunes:episodeType>full</itunes:episodeType>
      <guid isPermaLink="false">https://www.blackhillsinfosec.com/?p=17428</guid>
      <link>https://share.transistor.fm/s/73b0c673</link>
      <description>
        <![CDATA[Originally aired on December 11, 2020



Articles discussed in this episode:



* https://www.nobandwidth.io/* https://www.nytimes.com/2020/12/08/technology/fireeye-hacked-russians.html* https://www.picussecurity.com/resource/blog/techniques-tactics-procedures-utilized-by-fireeye-red-team-tools* https://blog.netspi.com/cve-2020-17049-kerberos-bronze-bit-attack/* https://www.bleepingcomputer.com/news/security/microsoft-fixes-new-windows-kerberos-security-bug-in-staged-rollout/* https://capricocave.wordpress.com/2020/12/10/docker-botnets/* https://www.trustedsec.com/blog/4-free-easy-wins-that-make-red-teams-harder/* https://arstechnica.com/tech-policy/2020/12/florida-posted-the-password-to-a-key-disaster-system-on-its-website/



















Check out our Cyber Range, not just a place to work through challenges and play, but also an open direct/hands-on training environment.    



https://www.blackhillsinfosec.com/services/cyber-range/ 















Join the BHIS Blog Mailing List – get notified when we post new blogs, webcasts, and podcasts.



            
									
						
						Join 2,902 other subscribers						
					
					                    
                        
							Email Address                        
                        
                    

                    
                        
                        
                        
                        
						                        
	                        Subscribe]]>
      </description>
      <content:encoded>
        <![CDATA[Originally aired on December 11, 2020



Articles discussed in this episode:



* https://www.nobandwidth.io/* https://www.nytimes.com/2020/12/08/technology/fireeye-hacked-russians.html* https://www.picussecurity.com/resource/blog/techniques-tactics-procedures-utilized-by-fireeye-red-team-tools* https://blog.netspi.com/cve-2020-17049-kerberos-bronze-bit-attack/* https://www.bleepingcomputer.com/news/security/microsoft-fixes-new-windows-kerberos-security-bug-in-staged-rollout/* https://capricocave.wordpress.com/2020/12/10/docker-botnets/* https://www.trustedsec.com/blog/4-free-easy-wins-that-make-red-teams-harder/* https://arstechnica.com/tech-policy/2020/12/florida-posted-the-password-to-a-key-disaster-system-on-its-website/



















Check out our Cyber Range, not just a place to work through challenges and play, but also an open direct/hands-on training environment.    



https://www.blackhillsinfosec.com/services/cyber-range/ 















Join the BHIS Blog Mailing List – get notified when we post new blogs, webcasts, and podcasts.



            
									
						
						Join 2,902 other subscribers						
					
					                    
                        
							Email Address                        
                        
                    

                    
                        
                        
                        
                        
						                        
	                        Subscribe]]>
      </content:encoded>
      <pubDate>Tue, 15 Dec 2020 08:00:00 -0500</pubDate>
      <author>Black Hills Information Security</author>
      <enclosure url="https://media.transistor.fm/73b0c673/8f9503cc.mp3" length="24120449" type="audio/mpeg"/>
      <itunes:author>Black Hills Information Security</itunes:author>
      <itunes:image href="https://img.transistorcdn.com/M4izk4BYkhkbQoGxZKT0lPy6jmuQg28fw58uPGW1vxM/rs:fill:0:0:1/w:1400/h:1400/q:60/mb:500000/aHR0cHM6Ly9pbWct/dXBsb2FkLXByb2R1/Y3Rpb24udHJhbnNp/c3Rvci5mbS9mNDE5/YjI4MmNiNmJlYTdi/YzI3MGQyMzNhOWE1/N2YwMS5wbmc.jpg"/>
      <itunes:duration>3000</itunes:duration>
      <itunes:summary>Originally aired on December 11, 2020



Articles discussed in this episode:



* https://www.nobandwidth.io/* https://www.nytimes.com/2020/12/08/technology/fireeye-hacked-russians.html* https://www.picussecurity.com/resource/blog/techniques-tactics-procedures-utilized-by-fireeye-red-team-tools* https://blog.netspi.com/cve-2020-17049-kerberos-bronze-bit-attack/* https://www.bleepingcomputer.com/news/security/microsoft-fixes-new-windows-kerberos-security-bug-in-staged-rollout/* https://capricocave.wordpress.com/2020/12/10/docker-botnets/* https://www.trustedsec.com/blog/4-free-easy-wins-that-make-red-teams-harder/* https://arstechnica.com/tech-policy/2020/12/florida-posted-the-password-to-a-key-disaster-system-on-its-website/



















Check out our Cyber Range, not just a place to work through challenges and play, but also an open direct/hands-on training environment.    



https://www.blackhillsinfosec.com/services/cyber-range/ 















Join the BHIS Blog Mailing List – get notified when we post new blogs, webcasts, and podcasts.



            
									
						
						Join 2,902 other subscribers						
					
					                    
                        
							Email Address                        
                        
                    

                    
                        
                        
                        
                        
						                        
	                        Subscribe</itunes:summary>
      <itunes:subtitle>Originally aired on December 11, 2020



Articles discussed in this episode:



* https://www.nobandwidth.io/* https://www.nytimes.com/2020/12/08/technology/fireeye-hacked-russians.html* https://www.picussecurity.com/resource/blog/techniques-tactics-proce</itunes:subtitle>
      <itunes:keywords>Infosec,Cybersecurity,news</itunes:keywords>
      <itunes:explicit>No</itunes:explicit>
    </item>
    <item>
      <title>Webcast: Getting Started with Burp Suite &amp; Webapp Pentesting</title>
      <itunes:episode>1</itunes:episode>
      <podcast:episode>1</podcast:episode>
      <itunes:title>Webcast: Getting Started with Burp Suite &amp; Webapp Pentesting</itunes:title>
      <itunes:episodeType>full</itunes:episodeType>
      <guid isPermaLink="false">https://www.blackhillsinfosec.com/?p=17390</guid>
      <link>https://share.transistor.fm/s/42b80e03</link>
      <description>
        <![CDATA[Are you responsible for the security of webapps? Are you curious about how penetration testers are able to find vulnerabilities in them? 



Burp Suite is the preferred tool for many webapp pentesters and bug bounty hunters. It’s easy to get started in Burp, but not all of its features are easy to find or simple to configure. If you’ve ever watched someone else use Burp, you’ve no doubt picked up something useful from them: everyone seems to have their own tricks for getting more out of it. 



In this live one-hour Black Hills Information Security (BHIS) webcast, BB King will walk through how he sets up Burp for his own webapp and Web API pentests. Then he’ll show the settings, tools, and BApp Store Extensions that help him perform better tests. 



If you have any responsibility related to webapps – even if it’s not pentesting them – you may find that Burp Suite can help you. If you already use Burp Suite, come see how one of our testers does it and we bet you’ll find a thing or two you can take back and use on your next security assessment.











Join the BHIS Discord Community– https://discord.gg/aHHh3u5 



0:00:00 – PreShow Banter™ — Special Guests: The Innocent Lives Foundation 



0:29:12 – FEATURE PRESENTATION: Getting Started With Burp Suite 



0:32:33 – Initial Setup After install 



0:45:25 – A Quick Run-Through Burp Suite 



1:22:08 – We Has Questions?



Outline for this webcast can be found here: https://www.blackhillsinfosec.com/wp-content/uploads/2020/12/SLIDES_GettingStartedWithBurpSuiteOutline.pdf







Show Notes: 



* BHIS SWAG STORE! https://spearphish-general-store.myshopify.com/* https://wildwesthackinfest.com/training/ * https://github.com/snoopysecurity/awesome-burp-extensions* https://addons.mozilla.org/en-US/firefox/addon/foxyproxy-standard/* https://bitbucket.org/mrbbking/quieter-firefox/src* https://portswigger.net/ *
<ul><li>(00:00) - PreShow Banter™ —  Special Guests: The Innocent Lives Foundation</li>
<li>(29:12) - FEATURE PRESENTATION: Getting Started With Burb Suite</li>
<li>(32:33) - Initial Setup After install</li>
<li>(45:25) - A Quick Run-Through Burp Suite</li>
<li>(01:22:08) - We Has Questions?</li>
</ul>]]>
      </description>
      <content:encoded>
        <![CDATA[Are you responsible for the security of webapps? Are you curious about how penetration testers are able to find vulnerabilities in them? 



Burp Suite is the preferred tool for many webapp pentesters and bug bounty hunters. It’s easy to get started in Burp, but not all of its features are easy to find or simple to configure. If you’ve ever watched someone else use Burp, you’ve no doubt picked up something useful from them: everyone seems to have their own tricks for getting more out of it. 



In this live one-hour Black Hills Information Security (BHIS) webcast, BB King will walk through how he sets up Burp for his own webapp and Web API pentests. Then he’ll show the settings, tools, and BApp Store Extensions that help him perform better tests. 



If you have any responsibility related to webapps – even if it’s not pentesting them – you may find that Burp Suite can help you. If you already use Burp Suite, come see how one of our testers does it and we bet you’ll find a thing or two you can take back and use on your next security assessment.











Join the BHIS Discord Community– https://discord.gg/aHHh3u5 



0:00:00 – PreShow Banter™ — Special Guests: The Innocent Lives Foundation 



0:29:12 – FEATURE PRESENTATION: Getting Started With Burp Suite 



0:32:33 – Initial Setup After install 



0:45:25 – A Quick Run-Through Burp Suite 



1:22:08 – We Has Questions?



Outline for this webcast can be found here: https://www.blackhillsinfosec.com/wp-content/uploads/2020/12/SLIDES_GettingStartedWithBurpSuiteOutline.pdf







Show Notes: 



* BHIS SWAG STORE! https://spearphish-general-store.myshopify.com/* https://wildwesthackinfest.com/training/ * https://github.com/snoopysecurity/awesome-burp-extensions* https://addons.mozilla.org/en-US/firefox/addon/foxyproxy-standard/* https://bitbucket.org/mrbbking/quieter-firefox/src* https://portswigger.net/ *
<ul><li>(00:00) - PreShow Banter™ —  Special Guests: The Innocent Lives Foundation</li>
<li>(29:12) - FEATURE PRESENTATION: Getting Started With Burb Suite</li>
<li>(32:33) - Initial Setup After install</li>
<li>(45:25) - A Quick Run-Through Burp Suite</li>
<li>(01:22:08) - We Has Questions?</li>
</ul>]]>
      </content:encoded>
      <pubDate>Mon, 07 Dec 2020 11:48:45 -0500</pubDate>
      <author>Black Hills Information Security</author>
      <enclosure url="https://media.transistor.fm/42b80e03/b2f3c081.mp3" length="43386097" type="audio/mpeg"/>
      <itunes:author>Black Hills Information Security</itunes:author>
      <itunes:image href="https://img.transistorcdn.com/P9hwXZKo1LWTURJg5oX11KGKminOv3GhrmS4Aod8Q6A/rs:fill:0:0:1/w:1400/h:1400/q:60/mb:500000/aHR0cHM6Ly9pbWct/dXBsb2FkLXByb2R1/Y3Rpb24udHJhbnNp/c3Rvci5mbS80NmY2/MjkzMjZhZTEzZTc2/ZWEwOGExODUwMjZl/MjNmYy5qcGc.jpg"/>
      <itunes:duration>5281</itunes:duration>
      <itunes:summary>Are you responsible for the security of webapps? Are you curious about how penetration testers are able to find vulnerabilities in them? 



Burp Suite is the preferred tool for many webapp pentesters and bug bounty hunters. It’s easy to get started in Burp, but not all of its features are easy to find or simple to configure. If you’ve ever watched someone else use Burp, you’ve no doubt picked up something useful from them: everyone seems to have their own tricks for getting more out of it. 



In this live one-hour Black Hills Information Security (BHIS) webcast, BB King will walk through how he sets up Burp for his own webapp and Web API pentests. Then he’ll show the settings, tools, and BApp Store Extensions that help him perform better tests. 



If you have any responsibility related to webapps – even if it’s not pentesting them – you may find that Burp Suite can help you. If you already use Burp Suite, come see how one of our testers does it and we bet you’ll find a thing or two you can take back and use on your next security assessment.











Join the BHIS Discord Community– https://discord.gg/aHHh3u5 



0:00:00 – PreShow Banter™ — Special Guests: The Innocent Lives Foundation 



0:29:12 – FEATURE PRESENTATION: Getting Started With Burp Suite 



0:32:33 – Initial Setup After install 



0:45:25 – A Quick Run-Through Burp Suite 



1:22:08 – We Has Questions?



Outline for this webcast can be found here: https://www.blackhillsinfosec.com/wp-content/uploads/2020/12/SLIDES_GettingStartedWithBurpSuiteOutline.pdf







Show Notes: 



* BHIS SWAG STORE! https://spearphish-general-store.myshopify.com/* https://wildwesthackinfest.com/training/ * https://github.com/snoopysecurity/awesome-burp-extensions* https://addons.mozilla.org/en-US/firefox/addon/foxyproxy-standard/* https://bitbucket.org/mrbbking/quieter-firefox/src* https://portswigger.net/ *</itunes:summary>
      <itunes:subtitle>Are you responsible for the security of webapps? Are you curious about how penetration testers are able to find vulnerabilities in them? 



Burp Suite is the preferred tool for many webapp pentesters and bug bounty hunters. It’s easy to get started in Bu</itunes:subtitle>
      <itunes:keywords>Infosec,Cybersecurity,news</itunes:keywords>
      <itunes:explicit>No</itunes:explicit>
      <podcast:chapters url="https://share.transistor.fm/s/42b80e03/chapters.json" type="application/json+chapters"/>
    </item>
    <item>
      <title>Webcast: Pretty Little Python Secrets - Episode 2 - Python Development &amp; Packaging as Beautiful as a Poem</title>
      <itunes:episode>1</itunes:episode>
      <podcast:episode>1</podcast:episode>
      <itunes:title>Webcast: Pretty Little Python Secrets - Episode 2 - Python Development &amp; Packaging as Beautiful as a Poem</itunes:title>
      <itunes:episodeType>full</itunes:episodeType>
      <guid isPermaLink="false">https://www.blackhillsinfosec.com/?p=17376</guid>
      <link>https://share.transistor.fm/s/53fdabb1</link>
      <description>
        <![CDATA[Have you ever tried packaging a Python library/app in order to upload it to the Python Package repository (Pypi)? 



Not so straight forward is it? There’s a gazillion files you need (setup.py, Manifiest.ini, etc..) which all do different things. On top of that, there’s a decent amount of overhead to configure the necessary settings in order to expose any command line interface (CLI) tools your packaging. Additionally, you also need to manage dependencies, keep them in sync with your requirements.txt files and install third-party applications in order to upload them to Pypi. That’s after you even manage to setup a proper development environment and necessary virtual environments for your dependencies. 



Ever wonder if there’s a simpler solution that takes care of everything for you? 



In this Black Hills Information Security (BHIS) webcast, Marcello will show you how to make the entire Python development &amp; packaging process as short and simple as a Haiku (https://python-poetry.org/). He’ll also show you the setup/workflow that he uses for all of his Python projects and throw in some pro tips along the way. 



Missed the first episode? Check out Pretty Little Python Secrets—EP 1—Installing Python Tools/ Libraries the Right Way- Marcello Salvati — https://youtu.be/ieyRV9zQd2U



Join the Black Hills Information Security Discord Community — https://discord.gg/aHHh3u5 



0:00:00 – PreShow Banter™ — Everybody Leaves West Virginia 



0:12:15 – FEATURE PRESENTATION: Making Python Packaging Haiku Simple 



0:16:56 – Why and How to Package Python? 



0:23:26 – What Are All These Files? 



0:31:28 – How to Upload the Dang Thing 



0:37:01 – Setup a Development Environment? 



0:42:44 – Pipenv! 



0:46:52 – Pipenb Solves, but Also Creates Problems 



0:49:21 – Poetry Corner 



0:58:11 – Cookiecutter Automation
<ul><li>(00:00) - PreShow Banter™ — Everybody Leaves West Virginia</li>
<li>(12:15) - FEATURE PRESENTATION: Making Python Packaging Haiku Simple</li>
<li>(16:56) - Why and How to Package Python?</li>
<li>(23:26) - What Are All These Files?</li>
<li>(31:28) - How to Upload the Dang Thing</li>
<li>(37:01) - Setup a Development Environment? </li>
<li>(42:44) - Pipenv!</li>
<li>(46:52) - Pipenb Solves, but Also Creates Problems</li>
<li>(49:21) - Poetry Corner</li>
<li>(58:11) - Cookiecutter Automation</li>
<li>(01:01:53) - Questions!</li>
<li>(01:08:00) - Porchetta</li>
</ul>]]>
      </description>
      <content:encoded>
        <![CDATA[Have you ever tried packaging a Python library/app in order to upload it to the Python Package repository (Pypi)? 



Not so straight forward is it? There’s a gazillion files you need (setup.py, Manifiest.ini, etc..) which all do different things. On top of that, there’s a decent amount of overhead to configure the necessary settings in order to expose any command line interface (CLI) tools your packaging. Additionally, you also need to manage dependencies, keep them in sync with your requirements.txt files and install third-party applications in order to upload them to Pypi. That’s after you even manage to setup a proper development environment and necessary virtual environments for your dependencies. 



Ever wonder if there’s a simpler solution that takes care of everything for you? 



In this Black Hills Information Security (BHIS) webcast, Marcello will show you how to make the entire Python development &amp; packaging process as short and simple as a Haiku (https://python-poetry.org/). He’ll also show you the setup/workflow that he uses for all of his Python projects and throw in some pro tips along the way. 



Missed the first episode? Check out Pretty Little Python Secrets—EP 1—Installing Python Tools/ Libraries the Right Way- Marcello Salvati — https://youtu.be/ieyRV9zQd2U



Join the Black Hills Information Security Discord Community — https://discord.gg/aHHh3u5 



0:00:00 – PreShow Banter™ — Everybody Leaves West Virginia 



0:12:15 – FEATURE PRESENTATION: Making Python Packaging Haiku Simple 



0:16:56 – Why and How to Package Python? 



0:23:26 – What Are All These Files? 



0:31:28 – How to Upload the Dang Thing 



0:37:01 – Setup a Development Environment? 



0:42:44 – Pipenv! 



0:46:52 – Pipenb Solves, but Also Creates Problems 



0:49:21 – Poetry Corner 



0:58:11 – Cookiecutter Automation
<ul><li>(00:00) - PreShow Banter™ — Everybody Leaves West Virginia</li>
<li>(12:15) - FEATURE PRESENTATION: Making Python Packaging Haiku Simple</li>
<li>(16:56) - Why and How to Package Python?</li>
<li>(23:26) - What Are All These Files?</li>
<li>(31:28) - How to Upload the Dang Thing</li>
<li>(37:01) - Setup a Development Environment? </li>
<li>(42:44) - Pipenv!</li>
<li>(46:52) - Pipenb Solves, but Also Creates Problems</li>
<li>(49:21) - Poetry Corner</li>
<li>(58:11) - Cookiecutter Automation</li>
<li>(01:01:53) - Questions!</li>
<li>(01:08:00) - Porchetta</li>
</ul>]]>
      </content:encoded>
      <pubDate>Fri, 04 Dec 2020 08:05:00 -0500</pubDate>
      <author>Black Hills Information Security</author>
      <enclosure url="https://media.transistor.fm/53fdabb1/367c4a7e.mp3" length="36215832" type="audio/mpeg"/>
      <itunes:author>Black Hills Information Security</itunes:author>
      <itunes:duration>4527</itunes:duration>
      <itunes:summary>Have you ever tried packaging a Python library/app in order to upload it to the Python Package repository (Pypi)? 



Not so straight forward is it? There’s a gazillion files you need (setup.py, Manifiest.ini, etc..) which all do different things. On top of that, there’s a decent amount of overhead to configure the necessary settings in order to expose any command line interface (CLI) tools your packaging. Additionally, you also need to manage dependencies, keep them in sync with your requirements.txt files and install third-party applications in order to upload them to Pypi. That’s after you even manage to setup a proper development environment and necessary virtual environments for your dependencies. 



Ever wonder if there’s a simpler solution that takes care of everything for you? 



In this Black Hills Information Security (BHIS) webcast, Marcello will show you how to make the entire Python development &amp;amp; packaging process as short and simple as a Haiku (https://python-poetry.org/). He’ll also show you the setup/workflow that he uses for all of his Python projects and throw in some pro tips along the way. 



Missed the first episode? Check out Pretty Little Python Secrets—EP 1—Installing Python Tools/ Libraries the Right Way- Marcello Salvati — https://youtu.be/ieyRV9zQd2U



Join the Black Hills Information Security Discord Community — https://discord.gg/aHHh3u5 



0:00:00 – PreShow Banter™ — Everybody Leaves West Virginia 



0:12:15 – FEATURE PRESENTATION: Making Python Packaging Haiku Simple 



0:16:56 – Why and How to Package Python? 



0:23:26 – What Are All These Files? 



0:31:28 – How to Upload the Dang Thing 



0:37:01 – Setup a Development Environment? 



0:42:44 – Pipenv! 



0:46:52 – Pipenb Solves, but Also Creates Problems 



0:49:21 – Poetry Corner 



0:58:11 – Cookiecutter Automation</itunes:summary>
      <itunes:subtitle>Have you ever tried packaging a Python library/app in order to upload it to the Python Package repository (Pypi)? 



Not so straight forward is it? There’s a gazillion files you need (setup.py, Manifiest.ini, etc..) which all do different things. On top </itunes:subtitle>
      <itunes:keywords>Infosec,Cybersecurity,news</itunes:keywords>
      <itunes:explicit>No</itunes:explicit>
      <podcast:chapters url="https://share.transistor.fm/s/53fdabb1/chapters.json" type="application/json+chapters"/>
    </item>
    <item>
      <title>Talkin' About Infosec News - 11/30/2020</title>
      <itunes:episode>1</itunes:episode>
      <podcast:episode>1</podcast:episode>
      <itunes:title>Talkin' About Infosec News - 11/30/2020</itunes:title>
      <itunes:episodeType>full</itunes:episodeType>
      <guid isPermaLink="false">https://www.blackhillsinfosec.com/?p=17360</guid>
      <link>https://share.transistor.fm/s/1e404077</link>
      <description>
        <![CDATA[Originally aired on November 30, 2020



Articles discussed in this episode:



* https://www.computerweekly.com/news/252491324/Surge-in-Ryuk-ransomware-attacks-has-hospitals-on-alert* https://www.baltimoresun.com/maryland/baltimore-county/bs-md-co-what-to-know-schools-ransomware-attack-20201130-2j3ws6yffzcrrkfzzf3m43zxma-story.html* https://www.darknet.org.uk/2020/10/fuzzilli-javascript-engine-fuzzing-library



















Check out our Cyber Range, not just a place to work through challenges and play, but also an open direct/hands-on training environment.    



https://www.blackhillsinfosec.com/services/cyber-range/ 















Join the BHIS Blog Mailing List – get notified when we post new blogs, webcasts, and podcasts.



            
									
						
						Join 2,879 other subscribers						
					
					                    
                        
							Email Address                        
                        
                    

                    
                        
                        
                        
                        
						                        
	                        Subscribe
<ul><li>(00:00) - An Intro That Flaps</li>
<li>(01:19) - Surge in Ryuk ransomware</li>
<li>(03:57) - Baltimore County schools ransomware attack</li>
<li>(11:36) - Fuzzy Wuzzy Javascript</li>
</ul>]]>
      </description>
      <content:encoded>
        <![CDATA[Originally aired on November 30, 2020



Articles discussed in this episode:



* https://www.computerweekly.com/news/252491324/Surge-in-Ryuk-ransomware-attacks-has-hospitals-on-alert* https://www.baltimoresun.com/maryland/baltimore-county/bs-md-co-what-to-know-schools-ransomware-attack-20201130-2j3ws6yffzcrrkfzzf3m43zxma-story.html* https://www.darknet.org.uk/2020/10/fuzzilli-javascript-engine-fuzzing-library



















Check out our Cyber Range, not just a place to work through challenges and play, but also an open direct/hands-on training environment.    



https://www.blackhillsinfosec.com/services/cyber-range/ 















Join the BHIS Blog Mailing List – get notified when we post new blogs, webcasts, and podcasts.



            
									
						
						Join 2,879 other subscribers						
					
					                    
                        
							Email Address                        
                        
                    

                    
                        
                        
                        
                        
						                        
	                        Subscribe
<ul><li>(00:00) - An Intro That Flaps</li>
<li>(01:19) - Surge in Ryuk ransomware</li>
<li>(03:57) - Baltimore County schools ransomware attack</li>
<li>(11:36) - Fuzzy Wuzzy Javascript</li>
</ul>]]>
      </content:encoded>
      <pubDate>Tue, 01 Dec 2020 12:21:32 -0500</pubDate>
      <author>Black Hills Information Security</author>
      <enclosure url="https://media.transistor.fm/1e404077/9916339d.mp3" length="11928261" type="audio/mpeg"/>
      <itunes:author>Black Hills Information Security</itunes:author>
      <itunes:image href="https://img.transistorcdn.com/6IUJK4jMkE54Ea1sO_61m8taic4PMIFLMm0a7UsoZ-k/rs:fill:0:0:1/w:1400/h:1400/q:60/mb:500000/aHR0cHM6Ly9pbWct/dXBsb2FkLXByb2R1/Y3Rpb24udHJhbnNp/c3Rvci5mbS8xZDhh/YWFiMTE3NGVlZjkz/NjU4YWNhMDdmMjcz/YjA3Mi5wbmc.jpg"/>
      <itunes:duration>1464</itunes:duration>
      <itunes:summary>Originally aired on November 30, 2020



Articles discussed in this episode:



* https://www.computerweekly.com/news/252491324/Surge-in-Ryuk-ransomware-attacks-has-hospitals-on-alert* https://www.baltimoresun.com/maryland/baltimore-county/bs-md-co-what-to-know-schools-ransomware-attack-20201130-2j3ws6yffzcrrkfzzf3m43zxma-story.html* https://www.darknet.org.uk/2020/10/fuzzilli-javascript-engine-fuzzing-library



















Check out our Cyber Range, not just a place to work through challenges and play, but also an open direct/hands-on training environment.    



https://www.blackhillsinfosec.com/services/cyber-range/ 















Join the BHIS Blog Mailing List – get notified when we post new blogs, webcasts, and podcasts.



            
									
						
						Join 2,879 other subscribers						
					
					                    
                        
							Email Address                        
                        
                    

                    
                        
                        
                        
                        
						                        
	                        Subscribe</itunes:summary>
      <itunes:subtitle>Originally aired on November 30, 2020



Articles discussed in this episode:



* https://www.computerweekly.com/news/252491324/Surge-in-Ryuk-ransomware-attacks-has-hospitals-on-alert* https://www.baltimoresun.com/maryland/baltimore-county/bs-md-co-what-t</itunes:subtitle>
      <itunes:keywords>Infosec,Cybersecurity,news</itunes:keywords>
      <itunes:explicit>No</itunes:explicit>
      <podcast:chapters url="https://share.transistor.fm/s/1e404077/chapters.json" type="application/json+chapters"/>
    </item>
    <item>
      <title>Talkin' About Infosec News - 11/19/2020</title>
      <itunes:episode>1</itunes:episode>
      <podcast:episode>1</podcast:episode>
      <itunes:title>Talkin' About Infosec News - 11/19/2020</itunes:title>
      <itunes:episodeType>full</itunes:episodeType>
      <guid isPermaLink="false">https://www.blackhillsinfosec.com/?p=17270</guid>
      <link>https://share.transistor.fm/s/17bf0d00</link>
      <description>
        <![CDATA[Originally aired on November 19, 2020



Articles discussed in this episode:



* https://duo.com/blog/the-great-dns-vulnerability-of-2008-by-dan-kaminsky* https://blog.cloudflare.com/sad-dns-explained



















Check out our Cyber Range, not just a place to work through challenges and play, but also an open direct/hands-on training environment.    



https://www.blackhillsinfosec.com/services/cyber-range/ 















Join the BHIS Blog Mailing List – get notified when we post new blogs, webcasts, and podcasts.



            
									
						
						Join 2,880 other subscribers						
					
					                    
                        
							Email Address                        
                        
                    

                    
                        
                        
                        
                        
						                        
	                        Subscribe]]>
      </description>
      <content:encoded>
        <![CDATA[Originally aired on November 19, 2020



Articles discussed in this episode:



* https://duo.com/blog/the-great-dns-vulnerability-of-2008-by-dan-kaminsky* https://blog.cloudflare.com/sad-dns-explained



















Check out our Cyber Range, not just a place to work through challenges and play, but also an open direct/hands-on training environment.    



https://www.blackhillsinfosec.com/services/cyber-range/ 















Join the BHIS Blog Mailing List – get notified when we post new blogs, webcasts, and podcasts.



            
									
						
						Join 2,880 other subscribers						
					
					                    
                        
							Email Address                        
                        
                    

                    
                        
                        
                        
                        
						                        
	                        Subscribe]]>
      </content:encoded>
      <pubDate>Wed, 25 Nov 2020 08:35:00 -0500</pubDate>
      <author>Black Hills Information Security</author>
      <enclosure url="https://media.transistor.fm/17bf0d00/dde7043c.mp3" length="8542244" type="audio/mpeg"/>
      <itunes:author>Black Hills Information Security</itunes:author>
      <itunes:duration>1068</itunes:duration>
      <itunes:summary>Originally aired on November 19, 2020



Articles discussed in this episode:



* https://duo.com/blog/the-great-dns-vulnerability-of-2008-by-dan-kaminsky* https://blog.cloudflare.com/sad-dns-explained



















Check out our Cyber Range, not just a place to work through challenges and play, but also an open direct/hands-on training environment.    



https://www.blackhillsinfosec.com/services/cyber-range/ 















Join the BHIS Blog Mailing List – get notified when we post new blogs, webcasts, and podcasts.



            
									
						
						Join 2,880 other subscribers						
					
					                    
                        
							Email Address                        
                        
                    

                    
                        
                        
                        
                        
						                        
	                        Subscribe</itunes:summary>
      <itunes:subtitle>Originally aired on November 19, 2020



Articles discussed in this episode:



* https://duo.com/blog/the-great-dns-vulnerability-of-2008-by-dan-kaminsky* https://blog.cloudflare.com/sad-dns-explained



















Check out our Cyber Range, not jus</itunes:subtitle>
      <itunes:keywords>Infosec,Cybersecurity,news</itunes:keywords>
      <itunes:explicit>No</itunes:explicit>
    </item>
    <item>
      <title>Talkin' About Infosec News - 11/11/2020</title>
      <itunes:episode>1</itunes:episode>
      <podcast:episode>1</podcast:episode>
      <itunes:title>Talkin' About Infosec News - 11/11/2020</itunes:title>
      <itunes:episodeType>full</itunes:episodeType>
      <guid isPermaLink="false">https://www.blackhillsinfosec.com/?p=17212</guid>
      <link>https://share.transistor.fm/s/583d2fe7</link>
      <description>
        <![CDATA[Originally aired on November 11, 2020



Articles discussed in this episode:



* https://www.darkreading.com/attacks-breaches/malware-hidden-in-encrypted-traffic-surges-amid-pandemic/d/d-id/1339420* https://threatpost.com/millions-hotel-guests-worldwide-data-leak/161044/



















Check out our Cyber Range, not just a place to work through challenges and play, but also an open direct/hands-on training environment.    



https://www.blackhillsinfosec.com/services/cyber-range/ 















Join the BHIS Blog Mailing List – get notified when we post new blogs, webcasts, and podcasts.



            
									
						
						Join 2,837 other subscribers						
					
					                    
                        
							Email Address                        
                        
                    

                    
                        
                        
                        
                        
						                        
	                        Subscribe]]>
      </description>
      <content:encoded>
        <![CDATA[Originally aired on November 11, 2020



Articles discussed in this episode:



* https://www.darkreading.com/attacks-breaches/malware-hidden-in-encrypted-traffic-surges-amid-pandemic/d/d-id/1339420* https://threatpost.com/millions-hotel-guests-worldwide-data-leak/161044/



















Check out our Cyber Range, not just a place to work through challenges and play, but also an open direct/hands-on training environment.    



https://www.blackhillsinfosec.com/services/cyber-range/ 















Join the BHIS Blog Mailing List – get notified when we post new blogs, webcasts, and podcasts.



            
									
						
						Join 2,837 other subscribers						
					
					                    
                        
							Email Address                        
                        
                    

                    
                        
                        
                        
                        
						                        
	                        Subscribe]]>
      </content:encoded>
      <pubDate>Fri, 13 Nov 2020 08:10:00 -0500</pubDate>
      <author>Black Hills Information Security</author>
      <enclosure url="https://media.transistor.fm/583d2fe7/f4ea3eaa.mp3" length="21398684" type="audio/mpeg"/>
      <itunes:author>Black Hills Information Security</itunes:author>
      <itunes:duration>2675</itunes:duration>
      <itunes:summary>Originally aired on November 11, 2020



Articles discussed in this episode:



* https://www.darkreading.com/attacks-breaches/malware-hidden-in-encrypted-traffic-surges-amid-pandemic/d/d-id/1339420* https://threatpost.com/millions-hotel-guests-worldwide-data-leak/161044/



















Check out our Cyber Range, not just a place to work through challenges and play, but also an open direct/hands-on training environment.    



https://www.blackhillsinfosec.com/services/cyber-range/ 















Join the BHIS Blog Mailing List – get notified when we post new blogs, webcasts, and podcasts.



            
									
						
						Join 2,837 other subscribers						
					
					                    
                        
							Email Address                        
                        
                    

                    
                        
                        
                        
                        
						                        
	                        Subscribe</itunes:summary>
      <itunes:subtitle>Originally aired on November 11, 2020



Articles discussed in this episode:



* https://www.darkreading.com/attacks-breaches/malware-hidden-in-encrypted-traffic-surges-amid-pandemic/d/d-id/1339420* https://threatpost.com/millions-hotel-guests-worldwide-</itunes:subtitle>
      <itunes:keywords>Infosec,Cybersecurity,news</itunes:keywords>
      <itunes:explicit>No</itunes:explicit>
    </item>
    <item>
      <title>Talkin' About Infosec News - 11/09/2020</title>
      <itunes:episode>1</itunes:episode>
      <podcast:episode>1</podcast:episode>
      <itunes:title>Talkin' About Infosec News - 11/09/2020</itunes:title>
      <itunes:episodeType>full</itunes:episodeType>
      <guid isPermaLink="false">https://www.blackhillsinfosec.com/?p=17195</guid>
      <link>https://share.transistor.fm/s/e03a8344</link>
      <description>
        <![CDATA[Originally aired on 11/09/2020



Articles discussed in this episode:



* https://www.darkreading.com/threat-intelligence/6-ways-passwords-fail-basic-security-tests/d/d-id/1339299* https://www.infosecurity-magazine.com/news/national-guard-uvm-health-network/* https://www.zdnet.com/article/toy-maker-mattel-discloses-ransomware-attack/



















Check out our Cyber Range, not just a place to work through challenges and play, but also an open direct/hands-on training environment.    



https://www.blackhillsinfosec.com/services/cyber-range/ 















Join the BHIS Blog Mailing List – get notified when we post new blogs, webcasts, and podcasts.



            
									
						
						Join 2,843 other subscribers						
					
					                    
                        
							Email Address                        
                        
                    

                    
                        
                        
                        
                        
						                        
	                        Subscribe]]>
      </description>
      <content:encoded>
        <![CDATA[Originally aired on 11/09/2020



Articles discussed in this episode:



* https://www.darkreading.com/threat-intelligence/6-ways-passwords-fail-basic-security-tests/d/d-id/1339299* https://www.infosecurity-magazine.com/news/national-guard-uvm-health-network/* https://www.zdnet.com/article/toy-maker-mattel-discloses-ransomware-attack/



















Check out our Cyber Range, not just a place to work through challenges and play, but also an open direct/hands-on training environment.    



https://www.blackhillsinfosec.com/services/cyber-range/ 















Join the BHIS Blog Mailing List – get notified when we post new blogs, webcasts, and podcasts.



            
									
						
						Join 2,843 other subscribers						
					
					                    
                        
							Email Address                        
                        
                    

                    
                        
                        
                        
                        
						                        
	                        Subscribe]]>
      </content:encoded>
      <pubDate>Thu, 12 Nov 2020 08:15:00 -0500</pubDate>
      <author>Black Hills Information Security</author>
      <enclosure url="https://media.transistor.fm/e03a8344/7e33c3ff.mp3" length="15536536" type="audio/mpeg"/>
      <itunes:author>Black Hills Information Security</itunes:author>
      <itunes:duration>1942</itunes:duration>
      <itunes:summary>Originally aired on 11/09/2020



Articles discussed in this episode:



* https://www.darkreading.com/threat-intelligence/6-ways-passwords-fail-basic-security-tests/d/d-id/1339299* https://www.infosecurity-magazine.com/news/national-guard-uvm-health-network/* https://www.zdnet.com/article/toy-maker-mattel-discloses-ransomware-attack/



















Check out our Cyber Range, not just a place to work through challenges and play, but also an open direct/hands-on training environment.    



https://www.blackhillsinfosec.com/services/cyber-range/ 















Join the BHIS Blog Mailing List – get notified when we post new blogs, webcasts, and podcasts.



            
									
						
						Join 2,843 other subscribers						
					
					                    
                        
							Email Address                        
                        
                    

                    
                        
                        
                        
                        
						                        
	                        Subscribe</itunes:summary>
      <itunes:subtitle>Originally aired on 11/09/2020



Articles discussed in this episode:



* https://www.darkreading.com/threat-intelligence/6-ways-passwords-fail-basic-security-tests/d/d-id/1339299* https://www.infosecurity-magazine.com/news/national-guard-uvm-health-netw</itunes:subtitle>
      <itunes:keywords>Infosec,Cybersecurity,news</itunes:keywords>
      <itunes:explicit>No</itunes:explicit>
    </item>
    <item>
      <title>Talkin' About Infosec News - 10/26/2020</title>
      <itunes:episode>1</itunes:episode>
      <podcast:episode>1</podcast:episode>
      <itunes:title>Talkin' About Infosec News - 10/26/2020</itunes:title>
      <itunes:episodeType>full</itunes:episodeType>
      <guid isPermaLink="false">https://www.blackhillsinfosec.com/?p=17184</guid>
      <link>https://share.transistor.fm/s/0eb4c7ff</link>
      <description>
        <![CDATA[Originally aired on October 26, 2020.



















Check out our Cyber Range, not just a place to work through challenges and play, but also an open direct/hands-on training environment.    



https://www.blackhillsinfosec.com/services/cyber-range/ 















Join the BHIS Blog Mailing List – get notified when we post new blogs, webcasts, and podcasts.



            
									
						
						Join 2,845 other subscribers						
					
					                    
                        
							Email Address                        
                        
                    

                    
                        
                        
                        
                        
						                        
	                        Subscribe]]>
      </description>
      <content:encoded>
        <![CDATA[Originally aired on October 26, 2020.



















Check out our Cyber Range, not just a place to work through challenges and play, but also an open direct/hands-on training environment.    



https://www.blackhillsinfosec.com/services/cyber-range/ 















Join the BHIS Blog Mailing List – get notified when we post new blogs, webcasts, and podcasts.



            
									
						
						Join 2,845 other subscribers						
					
					                    
                        
							Email Address                        
                        
                    

                    
                        
                        
                        
                        
						                        
	                        Subscribe]]>
      </content:encoded>
      <pubDate>Wed, 11 Nov 2020 09:57:44 -0500</pubDate>
      <author>Black Hills Information Security</author>
      <enclosure url="https://media.transistor.fm/0eb4c7ff/acb85c3f.mp3" length="16881120" type="audio/mpeg"/>
      <itunes:author>Black Hills Information Security</itunes:author>
      <itunes:duration>2110</itunes:duration>
      <itunes:summary>Originally aired on October 26, 2020.



















Check out our Cyber Range, not just a place to work through challenges and play, but also an open direct/hands-on training environment.    



https://www.blackhillsinfosec.com/services/cyber-range/ 















Join the BHIS Blog Mailing List – get notified when we post new blogs, webcasts, and podcasts.



            
									
						
						Join 2,845 other subscribers						
					
					                    
                        
							Email Address                        
                        
                    

                    
                        
                        
                        
                        
						                        
	                        Subscribe</itunes:summary>
      <itunes:subtitle>Originally aired on October 26, 2020.



















Check out our Cyber Range, not just a place to work through challenges and play, but also an open direct/hands-on training environment.    



https://www.blackhillsinfosec.com/services/cyber-range/</itunes:subtitle>
      <itunes:keywords>Infosec,Cybersecurity,news</itunes:keywords>
      <itunes:explicit>No</itunes:explicit>
    </item>
    <item>
      <title>Talkin' About Infosec News - 10/21/2020</title>
      <itunes:episode>1</itunes:episode>
      <podcast:episode>1</podcast:episode>
      <itunes:title>Talkin' About Infosec News - 10/21/2020</itunes:title>
      <itunes:episodeType>full</itunes:episodeType>
      <guid isPermaLink="false">https://www.blackhillsinfosec.com/?p=17171</guid>
      <link>https://share.transistor.fm/s/6396ccf3</link>
      <description>
        <![CDATA[Originally aired on October 21, 2020.



















Check out our Cyber Range, not just a place to work through challenges and play, but also an open direct/hands-on training environment.    



https://www.blackhillsinfosec.com/services/cyber-range/ 















Join the BHIS Blog Mailing List – get notified when we post new blogs, webcasts, and podcasts.



            
									
						
						Join 2,828 other subscribers						
					
					                    
                        
							Email Address                        
                        
                    

                    
                        
                        
                        
                        
						                        
	                        Subscribe]]>
      </description>
      <content:encoded>
        <![CDATA[Originally aired on October 21, 2020.



















Check out our Cyber Range, not just a place to work through challenges and play, but also an open direct/hands-on training environment.    



https://www.blackhillsinfosec.com/services/cyber-range/ 















Join the BHIS Blog Mailing List – get notified when we post new blogs, webcasts, and podcasts.



            
									
						
						Join 2,828 other subscribers						
					
					                    
                        
							Email Address                        
                        
                    

                    
                        
                        
                        
                        
						                        
	                        Subscribe]]>
      </content:encoded>
      <pubDate>Mon, 02 Nov 2020 15:43:23 -0500</pubDate>
      <author>Black Hills Information Security</author>
      <enclosure url="https://media.transistor.fm/6396ccf3/3106b70a.mp3" length="12609161" type="audio/mpeg"/>
      <itunes:author>Black Hills Information Security</itunes:author>
      <itunes:duration>1576</itunes:duration>
      <itunes:summary>Originally aired on October 21, 2020.



















Check out our Cyber Range, not just a place to work through challenges and play, but also an open direct/hands-on training environment.    



https://www.blackhillsinfosec.com/services/cyber-range/ 















Join the BHIS Blog Mailing List – get notified when we post new blogs, webcasts, and podcasts.



            
									
						
						Join 2,828 other subscribers						
					
					                    
                        
							Email Address                        
                        
                    

                    
                        
                        
                        
                        
						                        
	                        Subscribe</itunes:summary>
      <itunes:subtitle>Originally aired on October 21, 2020.



















Check out our Cyber Range, not just a place to work through challenges and play, but also an open direct/hands-on training environment.    



https://www.blackhillsinfosec.com/services/cyber-range/</itunes:subtitle>
      <itunes:keywords>Infosec,Cybersecurity,news</itunes:keywords>
      <itunes:explicit>No</itunes:explicit>
    </item>
    <item>
      <title>Webcast: The SOC Age Or, A Young SOC Analyst's Illustrated Primer</title>
      <itunes:episode>1</itunes:episode>
      <podcast:episode>1</podcast:episode>
      <itunes:title>Webcast: The SOC Age Or, A Young SOC Analyst's Illustrated Primer</itunes:title>
      <itunes:episodeType>full</itunes:episodeType>
      <guid isPermaLink="false">https://www.blackhillsinfosec.com/?p=17072</guid>
      <link>https://share.transistor.fm/s/810809ba</link>
      <description>
        <![CDATA[Many people get started in security as a Security Operations Center (SOC) analyst. In this Black Hills Information Security (BHIS) webcast we discuss the core skills that a SOC analyst needs in order to be successful. 



Trust us, these skills are more than just watching the SIEM and letting the SOAR platform handle everything through a AI powered single pane of glass. 



Security has been and will continue to be, hard. This webcast will help people who are getting started be more successful and hopefully happier in their jobs. 



I mean, we can’t make people happy. But, being good at one’s job is a good step in that direction. The rest is on you. 



We also cover some techniques that can be used to help stop SOC burnout. Because that is a real thing….. It is a real thing that many SOC analysts go through. When they do, they often entertain dreams of getting out of security and buying a food truck. 



Let’s help stop that. The world does not need another mediocre falafel truck powered by the crushed hopes and dreams of another infosec burnout.



Slides for this webcast can be found here: https://www.blackhillsinfosec.com/wp-content/uploads/2020/10/SLIDES_TheSOCAge.pdf



Join the BHIS Discord Community — https://discord.gg/aHHh3u5



 “Pay What You Can” SOC Core Skills 16-Hour Training Course: https://wildwesthackinfest.com/online-training/soc-core-skills-john-strand/



0:00:00 – PreShow Banter™ – A Weird Flex 



0:12:24 – FEATURE PRESENTATION: SOC Analyst Key Skills 



0:16:53 – Server Analysis 



0:20:13 – There’s A Guide For That 



0:26:54 – Memory Forensics 



0:34:16 – Egress Traffic Analysis 



0:43:39 – Logs Are Better Than Bad, They’re a Train Wreck 



0:48:40 – “False Positives”]]>
      </description>
      <content:encoded>
        <![CDATA[Many people get started in security as a Security Operations Center (SOC) analyst. In this Black Hills Information Security (BHIS) webcast we discuss the core skills that a SOC analyst needs in order to be successful. 



Trust us, these skills are more than just watching the SIEM and letting the SOAR platform handle everything through a AI powered single pane of glass. 



Security has been and will continue to be, hard. This webcast will help people who are getting started be more successful and hopefully happier in their jobs. 



I mean, we can’t make people happy. But, being good at one’s job is a good step in that direction. The rest is on you. 



We also cover some techniques that can be used to help stop SOC burnout. Because that is a real thing….. It is a real thing that many SOC analysts go through. When they do, they often entertain dreams of getting out of security and buying a food truck. 



Let’s help stop that. The world does not need another mediocre falafel truck powered by the crushed hopes and dreams of another infosec burnout.



Slides for this webcast can be found here: https://www.blackhillsinfosec.com/wp-content/uploads/2020/10/SLIDES_TheSOCAge.pdf



Join the BHIS Discord Community — https://discord.gg/aHHh3u5



 “Pay What You Can” SOC Core Skills 16-Hour Training Course: https://wildwesthackinfest.com/online-training/soc-core-skills-john-strand/



0:00:00 – PreShow Banter™ – A Weird Flex 



0:12:24 – FEATURE PRESENTATION: SOC Analyst Key Skills 



0:16:53 – Server Analysis 



0:20:13 – There’s A Guide For That 



0:26:54 – Memory Forensics 



0:34:16 – Egress Traffic Analysis 



0:43:39 – Logs Are Better Than Bad, They’re a Train Wreck 



0:48:40 – “False Positives”]]>
      </content:encoded>
      <pubDate>Mon, 26 Oct 2020 08:25:00 -0400</pubDate>
      <author>Black Hills Information Security</author>
      <enclosure url="https://media.transistor.fm/810809ba/1ec920a1.mp3" length="36792571" type="audio/mpeg"/>
      <itunes:author>Black Hills Information Security</itunes:author>
      <itunes:image href="https://img.transistorcdn.com/rock1XmnSpHxUHr3GQ4Jea3nJM2Civ5i-juNUvjbI6c/rs:fill:0:0:1/w:1400/h:1400/q:60/mb:500000/aHR0cHM6Ly9pbWct/dXBsb2FkLXByb2R1/Y3Rpb24udHJhbnNp/c3Rvci5mbS8xMDU5/OTEzMmYwYzVkNmMw/MjdkMjljZjA0ZjBk/NTVmNS5qcGc.jpg"/>
      <itunes:duration>4564</itunes:duration>
      <itunes:summary>Many people get started in security as a Security Operations Center (SOC) analyst. In this Black Hills Information Security (BHIS) webcast we discuss the core skills that a SOC analyst needs in order to be successful. 



Trust us, these skills are more than just watching the SIEM and letting the SOAR platform handle everything through a AI powered single pane of glass. 



Security has been and will continue to be, hard. This webcast will help people who are getting started be more successful and hopefully happier in their jobs. 



I mean, we can’t make people happy. But, being good at one’s job is a good step in that direction. The rest is on you. 



We also cover some techniques that can be used to help stop SOC burnout. Because that is a real thing….. It is a real thing that many SOC analysts go through. When they do, they often entertain dreams of getting out of security and buying a food truck. 



Let’s help stop that. The world does not need another mediocre falafel truck powered by the crushed hopes and dreams of another infosec burnout.



Slides for this webcast can be found here: https://www.blackhillsinfosec.com/wp-content/uploads/2020/10/SLIDES_TheSOCAge.pdf



Join the BHIS Discord Community — https://discord.gg/aHHh3u5



 “Pay What You Can” SOC Core Skills 16-Hour Training Course: https://wildwesthackinfest.com/online-training/soc-core-skills-john-strand/



0:00:00 – PreShow Banter™ – A Weird Flex 



0:12:24 – FEATURE PRESENTATION: SOC Analyst Key Skills 



0:16:53 – Server Analysis 



0:20:13 – There’s A Guide For That 



0:26:54 – Memory Forensics 



0:34:16 – Egress Traffic Analysis 



0:43:39 – Logs Are Better Than Bad, They’re a Train Wreck 



0:48:40 – “False Positives”</itunes:summary>
      <itunes:subtitle>Many people get started in security as a Security Operations Center (SOC) analyst. In this Black Hills Information Security (BHIS) webcast we discuss the core skills that a SOC analyst needs in order to be successful. 



Trust us, these skills are more t</itunes:subtitle>
      <itunes:keywords>Infosec,Cybersecurity,news</itunes:keywords>
      <itunes:explicit>No</itunes:explicit>
    </item>
    <item>
      <title>Webcast: Infosec Mentoring | How to Find and Be a Mentor &amp; Mentee</title>
      <itunes:episode>1</itunes:episode>
      <podcast:episode>1</podcast:episode>
      <itunes:title>Webcast: Infosec Mentoring | How to Find and Be a Mentor &amp; Mentee</itunes:title>
      <itunes:episodeType>full</itunes:episodeType>
      <guid isPermaLink="false">https://www.blackhillsinfosec.com/?p=16982</guid>
      <link>https://share.transistor.fm/s/3c5c7cae</link>
      <description>
        <![CDATA[They say it “takes a village” to help raise a child… well, it also takes a village to help raise an infosec professional. With so many technologies, techniques, and tools and the need for soft-skills and the ability to navigate different types of relationships, we all need help. That’s where a formal mentor can be your guide into the unknown.



We ALL can benefit from being mentored and being a mentor.



In this live Black Hills Information Security (BHIS) webcast, we’ll discuss:– How to know if you need a mentor– How to find a mentor– How to be a mentor– How to be a mentee– How to ask someone to be a mentor– Multiple mentors– Difference between mentors, friends, tutors, career counselors, etc.– What to discuss during a mentoring session– How to make the best use of everyone’s time– When to end a mentoring relationship



Slides for this webcast can be found here: https://www.blackhillsinfosec.com/wp-content/uploads/2020/10/SLIDES_InfoSecMentoring_HowtoFindandBe.pdf



Join Our BHIS Discord Community – https://discord.gg/aHHh3u5 



0:00:00 – PreShow Banter™ – We’re There, Trust Us 



0:07:33 – PreShow Banter™ – Trace Labs CTF 



0:24:47 – FEATURE PRESENTATION: InfoSec Mentoring 



0:28:23 – Mentors, the Fresh Maker™ 



0:30:27 – How To Find a Cult Leader, I Mean Mentor. 



0:34:37 – B-Sides Orlando DEMO 



0:42:17 – How To Be a Mentor 



0:56:12 – How to Be A Mentee 



1:03:42 – Your Moment of Self-Doubt 



1:05:34 – Will You Be My Mentor? 



1:11:56 – Reach Out 



1:14:41 – Multiple Mentors 



1:16:36 ...
<ul><li>(00:00) - PreShow Banter™ – We're There, Trust Us</li>
<li>(06:46) - PreShow Banter™ – Trace Labs CTF</li>
<li>(23:21) - FEATURE PRESENTATION: Info Sec Mentoring</li>
<li>(26:54) - Mentors, the Fresh Maker™</li>
<li>(28:55) - How To Find a Cult Leader, I Mean Mentor.</li>
<li>(32:59) - B-Sides Orlando DEMO</li>
<li>(40:29) - How To Be a Mentor</li>
<li>(53:56) - How to Be A Mentee</li>
<li>(01:01:17) - Your Moment of Self-Doubt</li>
<li>(01:03:06) - Will You Be My Mentor?</li>
<li>(01:09:22) - Reach Out</li>
<li>(01:11:57) - Multiple Mentors</li>
<li>(01:13:50) - Mentors, Friends, &amp; Counselors</li>
<li>(01:16:14) - You Discuss Me</li>
<li>(01:17:28) - Time is Valuable</li>
<li>(01:17:46) - This is the End</li>
<li>(01:19:24) - End of Show Banter</li>
</ul>]]>
      </description>
      <content:encoded>
        <![CDATA[They say it “takes a village” to help raise a child… well, it also takes a village to help raise an infosec professional. With so many technologies, techniques, and tools and the need for soft-skills and the ability to navigate different types of relationships, we all need help. That’s where a formal mentor can be your guide into the unknown.



We ALL can benefit from being mentored and being a mentor.



In this live Black Hills Information Security (BHIS) webcast, we’ll discuss:– How to know if you need a mentor– How to find a mentor– How to be a mentor– How to be a mentee– How to ask someone to be a mentor– Multiple mentors– Difference between mentors, friends, tutors, career counselors, etc.– What to discuss during a mentoring session– How to make the best use of everyone’s time– When to end a mentoring relationship



Slides for this webcast can be found here: https://www.blackhillsinfosec.com/wp-content/uploads/2020/10/SLIDES_InfoSecMentoring_HowtoFindandBe.pdf



Join Our BHIS Discord Community – https://discord.gg/aHHh3u5 



0:00:00 – PreShow Banter™ – We’re There, Trust Us 



0:07:33 – PreShow Banter™ – Trace Labs CTF 



0:24:47 – FEATURE PRESENTATION: InfoSec Mentoring 



0:28:23 – Mentors, the Fresh Maker™ 



0:30:27 – How To Find a Cult Leader, I Mean Mentor. 



0:34:37 – B-Sides Orlando DEMO 



0:42:17 – How To Be a Mentor 



0:56:12 – How to Be A Mentee 



1:03:42 – Your Moment of Self-Doubt 



1:05:34 – Will You Be My Mentor? 



1:11:56 – Reach Out 



1:14:41 – Multiple Mentors 



1:16:36 ...
<ul><li>(00:00) - PreShow Banter™ – We're There, Trust Us</li>
<li>(06:46) - PreShow Banter™ – Trace Labs CTF</li>
<li>(23:21) - FEATURE PRESENTATION: Info Sec Mentoring</li>
<li>(26:54) - Mentors, the Fresh Maker™</li>
<li>(28:55) - How To Find a Cult Leader, I Mean Mentor.</li>
<li>(32:59) - B-Sides Orlando DEMO</li>
<li>(40:29) - How To Be a Mentor</li>
<li>(53:56) - How to Be A Mentee</li>
<li>(01:01:17) - Your Moment of Self-Doubt</li>
<li>(01:03:06) - Will You Be My Mentor?</li>
<li>(01:09:22) - Reach Out</li>
<li>(01:11:57) - Multiple Mentors</li>
<li>(01:13:50) - Mentors, Friends, &amp; Counselors</li>
<li>(01:16:14) - You Discuss Me</li>
<li>(01:17:28) - Time is Valuable</li>
<li>(01:17:46) - This is the End</li>
<li>(01:19:24) - End of Show Banter</li>
</ul>]]>
      </content:encoded>
      <pubDate>Mon, 19 Oct 2020 13:10:04 -0400</pubDate>
      <author>Black Hills Information Security</author>
      <enclosure url="https://media.transistor.fm/3c5c7cae/870b5983.mp3" length="43888171" type="audio/mpeg"/>
      <itunes:author>Black Hills Information Security</itunes:author>
      <itunes:image href="https://img.transistorcdn.com/O1dpOzgx5iUffaWj7GxQm6n9Pi5cJ_WvClSH9Ia4A64/rs:fill:0:0:1/w:1400/h:1400/q:60/mb:500000/aHR0cHM6Ly9pbWct/dXBsb2FkLXByb2R1/Y3Rpb24udHJhbnNp/c3Rvci5mbS8yMjVi/YzJmZTk4MTg3Y2Qx/MTliODIxMjYxNjIx/MGQxMS5qcGc.jpg"/>
      <itunes:duration>5168</itunes:duration>
      <itunes:summary>They say it “takes a village” to help raise a child… well, it also takes a village to help raise an infosec professional. With so many technologies, techniques, and tools and the need for soft-skills and the ability to navigate different types of relationships, we all need help. That’s where a formal mentor can be your guide into the unknown.



We ALL can benefit from being mentored and being a mentor.



In this live Black Hills Information Security (BHIS) webcast, we’ll discuss:– How to know if you need a mentor– How to find a mentor– How to be a mentor– How to be a mentee– How to ask someone to be a mentor– Multiple mentors– Difference between mentors, friends, tutors, career counselors, etc.– What to discuss during a mentoring session– How to make the best use of everyone’s time– When to end a mentoring relationship



Slides for this webcast can be found here: https://www.blackhillsinfosec.com/wp-content/uploads/2020/10/SLIDES_InfoSecMentoring_HowtoFindandBe.pdf



Join Our BHIS Discord Community – https://discord.gg/aHHh3u5 



0:00:00 – PreShow Banter™ – We’re There, Trust Us 



0:07:33 – PreShow Banter™ – Trace Labs CTF 



0:24:47 – FEATURE PRESENTATION: InfoSec Mentoring 



0:28:23 – Mentors, the Fresh Maker™ 



0:30:27 – How To Find a Cult Leader, I Mean Mentor. 



0:34:37 – B-Sides Orlando DEMO 



0:42:17 – How To Be a Mentor 



0:56:12 – How to Be A Mentee 



1:03:42 – Your Moment of Self-Doubt 



1:05:34 – Will You Be My Mentor? 



1:11:56 – Reach Out 



1:14:41 – Multiple Mentors 



1:16:36 ...</itunes:summary>
      <itunes:subtitle>They say it “takes a village” to help raise a child… well, it also takes a village to help raise an infosec professional. With so many technologies, techniques, and tools and the need for soft-skills and the ability to navigate different types of relation</itunes:subtitle>
      <itunes:keywords>Infosec,Cybersecurity,news</itunes:keywords>
      <itunes:explicit>No</itunes:explicit>
      <podcast:chapters url="https://share.transistor.fm/s/3c5c7cae/chapters.json" type="application/json+chapters"/>
    </item>
    <item>
      <title>Webcast: When Worlds Collide: OSS Hunting &amp; Adversarial Simulation</title>
      <itunes:episode>1</itunes:episode>
      <podcast:episode>1</podcast:episode>
      <itunes:title>Webcast: When Worlds Collide: OSS Hunting &amp; Adversarial Simulation</itunes:title>
      <itunes:episodeType>full</itunes:episodeType>
      <guid isPermaLink="false">https://www.blackhillsinfosec.com/?p=16862</guid>
      <link>https://share.transistor.fm/s/12bd7a8e</link>
      <description>
        <![CDATA[Worlds collide as Black Hills Information Security (BHIS) brings together legendary developers in open source software (OSS) hunting and adversarial emulation projects for a discussion on the current state of the landscape and what’s coming next. 



As our panel hosts, Jordan and Kent (Atomic Purple Team, PlumHound), continue to focus on advocating and evangelizing for Purple Teaming in the information security community, they have invited Roberto Rodriguez &amp; Nate Guagenti (HELK Project, Mordor) and Marcello Salvati (CrackMapExec, SILENTTRINITY) to discuss the collision of OSS Hunting and Adversarial Emulation platforms, with additional commentary from John Strand. 



The group will discuss Roberto Rodriguez (@Cyb3rWard0g) and Nate Guagenti’s (@neu5ron) development and maintenance of the HELK project while focusing on the ongoing development of Mordor, Datasets, and Azure Resource Manager templates. Joining the world-class hunters is Marcello Salvati (Byt3bl33d3r), developer of CrackMapExec and SILENTTRINITY to continue the discussion of OSS adversarial simulation. John Strand will add commentary on the history of adversarial simulation, hunting, and where the industry may be headed.



Webcast Hosts: 



* Jordan Drysdale @rev10d * Kent Ickler @krelkci 



Special Guests: 



* Roberto Rodriguez @cyb3rward0g * Nate Guagenti @neu5ron * Marcello Salvatti @byt3bl33d3r * John Strand @strandjs



Join the BHIS Community Discord https://discord.gg/aHHh3u5 



Slides for this webcast can be found here: https://www.blackhillsinfosec.com/wp-content/uploads/2020/09/SLIDES_WhenWorldsCollide.pdf



00:00:00 – PreShow Banter™ — We’ve Lost Control 



00:10:47 – FEATURE PRESENTATION: When Worlds Collide 



00:14:26 – Threat Intelligence Sharing 



00:25:57 – Won’t Stop Can’t Stop 



00:32:06 – A Tired Community 



00:38:54 – Re-Investing Open Source Projects
<ul><li>(00:00) - PreShow Banter™ — We've Lost Control</li>
<li>(09:40) - FEATURE PRESENTATION: When Worlds Collide</li>
<li>(13:13) - Threat Intelligence Sharing</li>
<li>(24:03) - Won't Stop Can't Stop</li>
<li>(29:38) - A Tired Community</li>
<li>(35:59) - Re-Investing Open Source Projects</li>
<li>(42:08) - Open Threat Research</li>
<li>(47:18) - Understand Adversary Tradecraft</li>
<li>(49:04) - Mordor Labs</li>
<li>(01:05:43) - Mordor Datasets</li>
<li>(01:08:17) - HELK</li>
<li>(01:14:14) - Threat Hunter Playbook</li>
<li>(01:30:42) - PostShow Banter</li>
</ul>]]>
      </description>
      <content:encoded>
        <![CDATA[Worlds collide as Black Hills Information Security (BHIS) brings together legendary developers in open source software (OSS) hunting and adversarial emulation projects for a discussion on the current state of the landscape and what’s coming next. 



As our panel hosts, Jordan and Kent (Atomic Purple Team, PlumHound), continue to focus on advocating and evangelizing for Purple Teaming in the information security community, they have invited Roberto Rodriguez &amp; Nate Guagenti (HELK Project, Mordor) and Marcello Salvati (CrackMapExec, SILENTTRINITY) to discuss the collision of OSS Hunting and Adversarial Emulation platforms, with additional commentary from John Strand. 



The group will discuss Roberto Rodriguez (@Cyb3rWard0g) and Nate Guagenti’s (@neu5ron) development and maintenance of the HELK project while focusing on the ongoing development of Mordor, Datasets, and Azure Resource Manager templates. Joining the world-class hunters is Marcello Salvati (Byt3bl33d3r), developer of CrackMapExec and SILENTTRINITY to continue the discussion of OSS adversarial simulation. John Strand will add commentary on the history of adversarial simulation, hunting, and where the industry may be headed.



Webcast Hosts: 



* Jordan Drysdale @rev10d * Kent Ickler @krelkci 



Special Guests: 



* Roberto Rodriguez @cyb3rward0g * Nate Guagenti @neu5ron * Marcello Salvatti @byt3bl33d3r * John Strand @strandjs



Join the BHIS Community Discord https://discord.gg/aHHh3u5 



Slides for this webcast can be found here: https://www.blackhillsinfosec.com/wp-content/uploads/2020/09/SLIDES_WhenWorldsCollide.pdf



00:00:00 – PreShow Banter™ — We’ve Lost Control 



00:10:47 – FEATURE PRESENTATION: When Worlds Collide 



00:14:26 – Threat Intelligence Sharing 



00:25:57 – Won’t Stop Can’t Stop 



00:32:06 – A Tired Community 



00:38:54 – Re-Investing Open Source Projects
<ul><li>(00:00) - PreShow Banter™ — We've Lost Control</li>
<li>(09:40) - FEATURE PRESENTATION: When Worlds Collide</li>
<li>(13:13) - Threat Intelligence Sharing</li>
<li>(24:03) - Won't Stop Can't Stop</li>
<li>(29:38) - A Tired Community</li>
<li>(35:59) - Re-Investing Open Source Projects</li>
<li>(42:08) - Open Threat Research</li>
<li>(47:18) - Understand Adversary Tradecraft</li>
<li>(49:04) - Mordor Labs</li>
<li>(01:05:43) - Mordor Datasets</li>
<li>(01:08:17) - HELK</li>
<li>(01:14:14) - Threat Hunter Playbook</li>
<li>(01:30:42) - PostShow Banter</li>
</ul>]]>
      </content:encoded>
      <pubDate>Wed, 09 Sep 2020 11:27:35 -0400</pubDate>
      <author>Black Hills Information Security</author>
      <enclosure url="https://media.transistor.fm/12bd7a8e/217c7602.mp3" length="49004331" type="audio/mpeg"/>
      <itunes:author>Black Hills Information Security</itunes:author>
      <itunes:image href="https://img.transistorcdn.com/UEzNaq-EH5UGWR6VaWByt4JE3pTL-UyEZNiPo8iuYuE/rs:fill:0:0:1/w:1400/h:1400/q:60/mb:500000/aHR0cHM6Ly9pbWct/dXBsb2FkLXByb2R1/Y3Rpb24udHJhbnNp/c3Rvci5mbS80MGY1/NmUwNTA4ZWRmYmFl/YWUxZDNiZDRiZjg2/ZDk4Yy5qcGc.jpg"/>
      <itunes:duration>5885</itunes:duration>
      <itunes:summary>Worlds collide as Black Hills Information Security (BHIS) brings together legendary developers in open source software (OSS) hunting and adversarial emulation projects for a discussion on the current state of the landscape and what’s coming next. 



As our panel hosts, Jordan and Kent (Atomic Purple Team, PlumHound), continue to focus on advocating and evangelizing for Purple Teaming in the information security community, they have invited Roberto Rodriguez &amp;amp; Nate Guagenti (HELK Project, Mordor) and Marcello Salvati (CrackMapExec, SILENTTRINITY) to discuss the collision of OSS Hunting and Adversarial Emulation platforms, with additional commentary from John Strand. 



The group will discuss Roberto Rodriguez (@Cyb3rWard0g) and Nate Guagenti’s (@neu5ron) development and maintenance of the HELK project while focusing on the ongoing development of Mordor, Datasets, and Azure Resource Manager templates. Joining the world-class hunters is Marcello Salvati (Byt3bl33d3r), developer of CrackMapExec and SILENTTRINITY to continue the discussion of OSS adversarial simulation. John Strand will add commentary on the history of adversarial simulation, hunting, and where the industry may be headed.



Webcast Hosts: 



* Jordan Drysdale @rev10d * Kent Ickler @krelkci 



Special Guests: 



* Roberto Rodriguez @cyb3rward0g * Nate Guagenti @neu5ron * Marcello Salvatti @byt3bl33d3r * John Strand @strandjs



Join the BHIS Community Discord https://discord.gg/aHHh3u5 



Slides for this webcast can be found here: https://www.blackhillsinfosec.com/wp-content/uploads/2020/09/SLIDES_WhenWorldsCollide.pdf



00:00:00 – PreShow Banter™ — We’ve Lost Control 



00:10:47 – FEATURE PRESENTATION: When Worlds Collide 



00:14:26 – Threat Intelligence Sharing 



00:25:57 – Won’t Stop Can’t Stop 



00:32:06 – A Tired Community 



00:38:54 – Re-Investing Open Source Projects</itunes:summary>
      <itunes:subtitle>Worlds collide as Black Hills Information Security (BHIS) brings together legendary developers in open source software (OSS) hunting and adversarial emulation projects for a discussion on the current state of the landscape and what’s coming next. 



As o</itunes:subtitle>
      <itunes:keywords>Infosec,Cybersecurity,news</itunes:keywords>
      <itunes:explicit>No</itunes:explicit>
      <podcast:chapters url="https://share.transistor.fm/s/12bd7a8e/chapters.json" type="application/json+chapters"/>
    </item>
    <item>
      <title>Webcast: How to Present: Secrets of a Retired SANS Instructor</title>
      <itunes:episode>1</itunes:episode>
      <podcast:episode>1</podcast:episode>
      <itunes:title>Webcast: How to Present: Secrets of a Retired SANS Instructor</itunes:title>
      <itunes:episodeType>full</itunes:episodeType>
      <guid isPermaLink="false">https://www.blackhillsinfosec.com/?p=16840</guid>
      <link>https://share.transistor.fm/s/5a8be8fb</link>
      <description>
        <![CDATA[John Strand //

































Ok, that was a bit of a dramatic title. 



But, it works. 



In this Black Hills Information Security (BHIS) webcast, John covers the tips and tricks on how to effectively present technical topics to large and small groups. 



This presentation includes, but is not limited to: crotch sniffing dogs, heart attacks, how to effectively deal with chafing, don’t drink the water, choosing the right shoes, presenting to management, seriously, chafing is a problem, chickens, getting over impostor syndrome, becoming a PowerPoint ninja, every piece of presenting advice you have ever heard is wrong, using your podium as a weapon, shutting down trolls and tips for presenting in the dark, with no heat/AC and very little water… to over 100 people, and keeping them all happy. 



BHIS Discord Community https://discord.gg/aHHh3u5 



Slides for this webcast can be found here: https://www.blackhillsinfosec.com/wp-content/uploads/2020/09/SLIDES_HowToPresent.pdf



00:00:00 – PreShow Banter™ — War Stories 



00:12:33 – PreShow Banter™ — WWHF 09-2020 Preview 



00:15:52 – FEATURE PRESENTATION: How To Present 



00:26:25 – Lessons! 



00:43:42 – Don’t Drink the Water 



00:46:34 – Imposter 



00:59:02 – Keynote Presentations 



01:07:30 – Projections 



01:17:32 – The Boss Level 



01:20:15 – Conversations That Matter 



01:26:54 – End of Show Questions]]>
      </description>
      <content:encoded>
        <![CDATA[John Strand //

































Ok, that was a bit of a dramatic title. 



But, it works. 



In this Black Hills Information Security (BHIS) webcast, John covers the tips and tricks on how to effectively present technical topics to large and small groups. 



This presentation includes, but is not limited to: crotch sniffing dogs, heart attacks, how to effectively deal with chafing, don’t drink the water, choosing the right shoes, presenting to management, seriously, chafing is a problem, chickens, getting over impostor syndrome, becoming a PowerPoint ninja, every piece of presenting advice you have ever heard is wrong, using your podium as a weapon, shutting down trolls and tips for presenting in the dark, with no heat/AC and very little water… to over 100 people, and keeping them all happy. 



BHIS Discord Community https://discord.gg/aHHh3u5 



Slides for this webcast can be found here: https://www.blackhillsinfosec.com/wp-content/uploads/2020/09/SLIDES_HowToPresent.pdf



00:00:00 – PreShow Banter™ — War Stories 



00:12:33 – PreShow Banter™ — WWHF 09-2020 Preview 



00:15:52 – FEATURE PRESENTATION: How To Present 



00:26:25 – Lessons! 



00:43:42 – Don’t Drink the Water 



00:46:34 – Imposter 



00:59:02 – Keynote Presentations 



01:07:30 – Projections 



01:17:32 – The Boss Level 



01:20:15 – Conversations That Matter 



01:26:54 – End of Show Questions]]>
      </content:encoded>
      <pubDate>Fri, 04 Sep 2020 08:10:00 -0400</pubDate>
      <author>Black Hills Information Security</author>
      <enclosure url="https://media.transistor.fm/5a8be8fb/2030d35b.mp3" length="5322486" type="audio/mpeg"/>
      <itunes:author>Black Hills Information Security</itunes:author>
      <itunes:image href="https://img.transistorcdn.com/RVuLLWAtEdUAkhwcoOvjRqoJIqHgD64mXh8qDC2Xxes/rs:fill:0:0:1/w:1400/h:1400/q:60/mb:500000/aHR0cHM6Ly9pbWct/dXBsb2FkLXByb2R1/Y3Rpb24udHJhbnNp/c3Rvci5mbS8zYzk2/YzFhNmQyZTc1YjNk/NjlkYjAzYzFlMGRj/YjM2ZC5qcGc.jpg"/>
      <itunes:duration>609</itunes:duration>
      <itunes:summary>John Strand //

































Ok, that was a bit of a dramatic title. 



But, it works. 



In this Black Hills Information Security (BHIS) webcast, John covers the tips and tricks on how to effectively present technical topics to large and small groups. 



This presentation includes, but is not limited to: crotch sniffing dogs, heart attacks, how to effectively deal with chafing, don’t drink the water, choosing the right shoes, presenting to management, seriously, chafing is a problem, chickens, getting over impostor syndrome, becoming a PowerPoint ninja, every piece of presenting advice you have ever heard is wrong, using your podium as a weapon, shutting down trolls and tips for presenting in the dark, with no heat/AC and very little water… to over 100 people, and keeping them all happy. 



BHIS Discord Community https://discord.gg/aHHh3u5 



Slides for this webcast can be found here: https://www.blackhillsinfosec.com/wp-content/uploads/2020/09/SLIDES_HowToPresent.pdf



00:00:00 – PreShow Banter™ — War Stories 



00:12:33 – PreShow Banter™ — WWHF 09-2020 Preview 



00:15:52 – FEATURE PRESENTATION: How To Present 



00:26:25 – Lessons! 



00:43:42 – Don’t Drink the Water 



00:46:34 – Imposter 



00:59:02 – Keynote Presentations 



01:07:30 – Projections 



01:17:32 – The Boss Level 



01:20:15 – Conversations That Matter 



01:26:54 – End of Show Questions</itunes:summary>
      <itunes:subtitle>John Strand //

































Ok, that was a bit of a dramatic title. 



But, it works. 



In this Black Hills Information Security (BHIS) webcast, John covers the tips and tricks on how to effectively present technical topics to large</itunes:subtitle>
      <itunes:keywords>Infosec,Cybersecurity,news</itunes:keywords>
      <itunes:explicit>No</itunes:explicit>
    </item>
    <item>
      <title>Webcast: Pretty Little Python Secrets - Episode 1 - Installing Python Tools and Libraries the Right Way</title>
      <itunes:episode>1</itunes:episode>
      <podcast:episode>1</podcast:episode>
      <itunes:title>Webcast: Pretty Little Python Secrets - Episode 1 - Installing Python Tools and Libraries the Right Way</itunes:title>
      <itunes:episodeType>full</itunes:episodeType>
      <guid isPermaLink="false">https://www.blackhillsinfosec.com/?p=16583</guid>
      <link>https://share.transistor.fm/s/5288bd4b</link>
      <description>
        <![CDATA[Have you ever installed a Python tool / library only to then find out other Python based tools you’ve installed previously are now completely broken? Running Kali? Ever try installing a Python tool with apt-get and another with pip?
<ul><li>(00:00) - PreShow Banter™ – Jokes Not Safe For Work</li>
<li>(11:31) - PreShow Banter™ – SponsorWare for GitHub</li>
<li>(20:13) - Feature Presentation: Pretty Little Python Secrets</li>
<li>(25:19) - 1st Circle of Hell: Managing Python Versions</li>
<li>(30:58) - 2nd Circle of Hell: Python Dependencies</li>
<li>(33:25) - Installing Python Tools/Libraries</li>
<li>(39:18) - Isolate, Isolate, Isolate</li>
<li>(46:29) - Pipx – The Easy Button</li>
<li>(51:15) - Making Python Apps Semi-Portable</li>
<li>(53:09) - ZipApps!</li>
<li>(01:03:32) - Shiv!</li>
<li>(01:11:26) - If all else fails.. Docker !</li>
<li>(01:17:12) - Conclusion</li>
</ul>]]>
      </description>
      <content:encoded>
        <![CDATA[Have you ever installed a Python tool / library only to then find out other Python based tools you’ve installed previously are now completely broken? Running Kali? Ever try installing a Python tool with apt-get and another with pip?
<ul><li>(00:00) - PreShow Banter™ – Jokes Not Safe For Work</li>
<li>(11:31) - PreShow Banter™ – SponsorWare for GitHub</li>
<li>(20:13) - Feature Presentation: Pretty Little Python Secrets</li>
<li>(25:19) - 1st Circle of Hell: Managing Python Versions</li>
<li>(30:58) - 2nd Circle of Hell: Python Dependencies</li>
<li>(33:25) - Installing Python Tools/Libraries</li>
<li>(39:18) - Isolate, Isolate, Isolate</li>
<li>(46:29) - Pipx – The Easy Button</li>
<li>(51:15) - Making Python Apps Semi-Portable</li>
<li>(53:09) - ZipApps!</li>
<li>(01:03:32) - Shiv!</li>
<li>(01:11:26) - If all else fails.. Docker !</li>
<li>(01:17:12) - Conclusion</li>
</ul>]]>
      </content:encoded>
      <pubDate>Mon, 24 Aug 2020 08:14:00 -0400</pubDate>
      <author>Black Hills Information Security</author>
      <enclosure url="https://media.transistor.fm/5288bd4b/10ba2aff.mp3" length="39944746" type="audio/mpeg"/>
      <itunes:author>Black Hills Information Security</itunes:author>
      <itunes:image href="https://img.transistorcdn.com/EF0uL_rF0BbPyF6SZTzZqR-rNxUzNHY2Ho5b_-3ffkA/rs:fill:0:0:1/w:1400/h:1400/q:60/mb:500000/aHR0cHM6Ly9pbWct/dXBsb2FkLXByb2R1/Y3Rpb24udHJhbnNp/c3Rvci5mbS85ZWJj/ZTYxODJhMGRmMTBm/OGMxZjhiMTRkM2E3/NmRlMC5qcGc.jpg"/>
      <itunes:duration>4742</itunes:duration>
      <itunes:summary>Have you ever installed a Python tool / library only to then find out other Python based tools you’ve installed previously are now completely broken? Running Kali? Ever try installing a Python tool with apt-get and another with pip?</itunes:summary>
      <itunes:subtitle>Have you ever installed a Python tool / library only to then find out other Python based tools you’ve installed previously are now completely broken? Running Kali? Ever try installing a Python tool with apt-get and another with pip?</itunes:subtitle>
      <itunes:keywords>Infosec,Cybersecurity,news</itunes:keywords>
      <itunes:explicit>No</itunes:explicit>
      <podcast:chapters url="https://share.transistor.fm/s/5288bd4b/chapters.json" type="application/json+chapters"/>
    </item>
    <item>
      <title>Webcast: What to Expect When You're Expecting a Penetration Test</title>
      <itunes:episode>1</itunes:episode>
      <podcast:episode>1</podcast:episode>
      <itunes:title>Webcast: What to Expect When You're Expecting a Penetration Test</itunes:title>
      <itunes:episodeType>full</itunes:episodeType>
      <guid isPermaLink="false">https://www.blackhillsinfosec.com/?p=16559</guid>
      <link>https://share.transistor.fm/s/26ccd531</link>
      <description>
        <![CDATA[CJ and Bryan will share the knowledge they’ve accumulated, by helping 1,000’s of organizations determine what they need and don’t need when it comes to penetration tests and security assessments, over the years. 



Topics Covered: 



* Selecting the type of test * Selecting the company to test * When to test * Issues around conducting a test 



This webcast is for penetration testers and offensive security professionals to see behind-the-scenes of how scoping, Rules of Engagement, and client relations are established. For the defenders and Blue Team professionals, this webcast will help you understand what to expect when deciding if and when you want to test the defenses you’ve put in place.



What to Expect When You Are Expecting…a Penetration Test by Larry Pesce and Suzanne Pereira: https://youtu.be/aJatJZI__V4



Join the Black Hills Information Security Discord Community: https://discord.gg/aHHh3u5 



Slides for this webcast can be found here: https://www.blackhillsinfosec.com/wp-content/uploads/2020/08/SLIDES_WhatToExpect.pdf



00:00 – PreShow Banter™ – Look What I Can Do! 



05:17 – And Now For The Expected Presentation 



15:21 – What Kind of Test is Right for Me 



27:04 – How Big Will It Get? 



36:34 – How Much Will it Cost? 



45:25 – What Are the Risks? 



50:55 – The Big Day 



54:00 – Post-Testum Depression 



1:00:40 – May I Have Another? 



1:05:12 –...
<ul><li>(00:00) - PreShow Banter™ – Look What I Can Do!</li>
<li>(05:17) - And Now For The Expected Presentation</li>
<li>(15:22) - What Kind of Test is Right for Me</li>
<li>(27:05) - How Big Will It Get?</li>
<li>(36:36) - How Much Will it Cost?</li>
<li>(45:28) - What Are the Risks?</li>
<li>(50:58) - The Big Day</li>
<li>(54:03) - Post-Testum Depression</li>
<li>(01:00:44) - May I Have Another?</li>
<li>(01:05:16) - Post-Show Rapid Fire Questions</li>
</ul>]]>
      </description>
      <content:encoded>
        <![CDATA[CJ and Bryan will share the knowledge they’ve accumulated, by helping 1,000’s of organizations determine what they need and don’t need when it comes to penetration tests and security assessments, over the years. 



Topics Covered: 



* Selecting the type of test * Selecting the company to test * When to test * Issues around conducting a test 



This webcast is for penetration testers and offensive security professionals to see behind-the-scenes of how scoping, Rules of Engagement, and client relations are established. For the defenders and Blue Team professionals, this webcast will help you understand what to expect when deciding if and when you want to test the defenses you’ve put in place.



What to Expect When You Are Expecting…a Penetration Test by Larry Pesce and Suzanne Pereira: https://youtu.be/aJatJZI__V4



Join the Black Hills Information Security Discord Community: https://discord.gg/aHHh3u5 



Slides for this webcast can be found here: https://www.blackhillsinfosec.com/wp-content/uploads/2020/08/SLIDES_WhatToExpect.pdf



00:00 – PreShow Banter™ – Look What I Can Do! 



05:17 – And Now For The Expected Presentation 



15:21 – What Kind of Test is Right for Me 



27:04 – How Big Will It Get? 



36:34 – How Much Will it Cost? 



45:25 – What Are the Risks? 



50:55 – The Big Day 



54:00 – Post-Testum Depression 



1:00:40 – May I Have Another? 



1:05:12 –...
<ul><li>(00:00) - PreShow Banter™ – Look What I Can Do!</li>
<li>(05:17) - And Now For The Expected Presentation</li>
<li>(15:22) - What Kind of Test is Right for Me</li>
<li>(27:05) - How Big Will It Get?</li>
<li>(36:36) - How Much Will it Cost?</li>
<li>(45:28) - What Are the Risks?</li>
<li>(50:58) - The Big Day</li>
<li>(54:03) - Post-Testum Depression</li>
<li>(01:00:44) - May I Have Another?</li>
<li>(01:05:16) - Post-Show Rapid Fire Questions</li>
</ul>]]>
      </content:encoded>
      <pubDate>Fri, 21 Aug 2020 10:17:00 -0400</pubDate>
      <author>Black Hills Information Security</author>
      <enclosure url="https://media.transistor.fm/26ccd531/50771366.mp3" length="43542809" type="audio/mpeg"/>
      <itunes:author>Black Hills Information Security</itunes:author>
      <itunes:image href="https://img.transistorcdn.com/i8iKQgNKsDXYrbTZymJwQ2srmBC7ezC8iCE5wtaeHWg/rs:fill:0:0:1/w:1400/h:1400/q:60/mb:500000/aHR0cHM6Ly9pbWct/dXBsb2FkLXByb2R1/Y3Rpb24udHJhbnNp/c3Rvci5mbS85MGIy/MDcwZTgzNDVlN2U5/NWY3MWE2Y2JjNWU4/NTZjMi5qcGc.jpg"/>
      <itunes:duration>5205</itunes:duration>
      <itunes:summary>CJ and Bryan will share the knowledge they’ve accumulated, by helping 1,000’s of organizations determine what they need and don’t need when it comes to penetration tests and security assessments, over the years. 



Topics Covered: 



* Selecting the type of test * Selecting the company to test * When to test * Issues around conducting a test 



This webcast is for penetration testers and offensive security professionals to see behind-the-scenes of how scoping, Rules of Engagement, and client relations are established. For the defenders and Blue Team professionals, this webcast will help you understand what to expect when deciding if and when you want to test the defenses you’ve put in place.



What to Expect When You Are Expecting…a Penetration Test by Larry Pesce and Suzanne Pereira: https://youtu.be/aJatJZI__V4



Join the Black Hills Information Security Discord Community: https://discord.gg/aHHh3u5 



Slides for this webcast can be found here: https://www.blackhillsinfosec.com/wp-content/uploads/2020/08/SLIDES_WhatToExpect.pdf



00:00 – PreShow Banter™ – Look What I Can Do! 



05:17 – And Now For The Expected Presentation 



15:21 – What Kind of Test is Right for Me 



27:04 – How Big Will It Get? 



36:34 – How Much Will it Cost? 



45:25 – What Are the Risks? 



50:55 – The Big Day 



54:00 – Post-Testum Depression 



1:00:40 – May I Have Another? 



1:05:12 –...</itunes:summary>
      <itunes:subtitle>CJ and Bryan will share the knowledge they’ve accumulated, by helping 1,000’s of organizations determine what they need and don’t need when it comes to penetration tests and security assessments, over the years. 



Topics Covered: 



* Selecting the typ</itunes:subtitle>
      <itunes:keywords>Infosec,Cybersecurity,news</itunes:keywords>
      <itunes:explicit>No</itunes:explicit>
      <podcast:chapters url="https://share.transistor.fm/s/26ccd531/chapters.json" type="application/json+chapters"/>
    </item>
    <item>
      <title>Webcast: Atomic Purple Team Framework and Life Cycle</title>
      <itunes:episode>1</itunes:episode>
      <podcast:episode>1</podcast:episode>
      <itunes:title>Webcast: Atomic Purple Team Framework and Life Cycle</itunes:title>
      <itunes:episodeType>full</itunes:episodeType>
      <guid isPermaLink="false">https://www.blackhillsinfosec.com/?p=16433</guid>
      <link>https://share.transistor.fm/s/c0e2253d</link>
      <description>
        <![CDATA[Jordan Drysdale &amp; Kent Ickler //

























Jordan and Kent are back again to continue strengthening organizations’ information security human capital (That’s all you folks!). Organization Leadership and Security Practitioners can gain understanding on the potential designed-to-fail Purple Teams initiatives never reached their full potential. The Duo reviews how systemic organizational career pathing created an insoluble Red vs Blue dichotomy. 



MORE IMPORTANTLY: The team is announcing a recipe for Purple Team Wins: 



The Atomic Purple Team (Lifecycle) Framework 



Organizations struggling to efficiently leverage the skillsets of all information security staff will benefit from considering the Atomic Purple Team Lifecycle Framework’s business-driven workflow. The workflow takes its roots from tested continuous improvement frameworks like ISO9001, ISO27001, Six Sigma, and the like. 



Watch how a methodical balance of risk analysis, attack, hunt and defend methodologies, and business considerations can effectively and continually improve an organizations’ security posture. As an added bonus, the framework incorporates concepts of Human Capital Management and knowledge-flow methodologies to encourage tacit knowledge exchange to further organic growth of the skillsets of all those involved in the Atomic Purple Team framework. 



But wait, there’s more! Budget headaches? Learn how the Atomic Purple Team framework’s methodical flow also aligns to natural business operations management and reporting. The framework provides a clear path to cabinet-approved Purple Team budget appropriations to ensure long term security posture improvement. 



Lastly, Jordan and Kent will demonstrate the Atomic Purple Team Lifecycle in action by running complete live Attack and Hunt/Defend lifecycle(s), all the way to risk management and budgetary thoughts.



Join the Black Hills Information Security Discord discussion server — https://discord.gg/aHHh3u5 



Need slides and much more — https://github.com/DefensiveOrigins/A… 



0:00 – Family Stories 



1:07 – Atomic Purple Team Framework
<ul><li>(00:00) - Family Stories</li>
<li>(01:07) - Atomic Purple Team Framework</li>
<li>(03:28) - Executive Problem Statement</li>
<li>(04:41) - Red Team, Blue Team, Purple Team</li>
<li>(07:18) - Who / What is APT?</li>
<li>(09:22) - Atomic Purple Team Lifecycle</li>
<li>(18:18) - 1. Threat / Risk Assessment (Ingest) Types</li>
<li>(19:59) - 2. Planning — What are the Tools</li>
<li>(20:50) - 3. Attack / Execute / Engage</li>
<li>(21:37) - 4. Hunt and Defend</li>
<li>(22:01) - 5. Adjust &amp; Harden</li>
<li>(23:14) - 6. Reporting and Request for Deployment</li>
<li>(27:07) - Lifecycles Start in Development</li>
<li>(28:15) - Lifecycles End in Production</li>
<li>(28:43) - APT Lab INfrastructure</li>
<li>(29:48) - Off-Roading: Lab Demo</li>
<li>(33:21) - Lifecycle Walkthrough — Goal Setting</li>
<li>(34:50) - Purple Team Lifecycle Walkthrough</li>
<li>(44:02) - Hunt and Defend Methodology</li>
<li>(45:02) - Adjusting to Threat</li>
<li>(47:21) - APTLC Playbook</li>
<li>(48:49) - The Report</li>
<li>(53:15) - Lessons Learned</li>
</ul>]]>
      </description>
      <content:encoded>
        <![CDATA[Jordan Drysdale &amp; Kent Ickler //

























Jordan and Kent are back again to continue strengthening organizations’ information security human capital (That’s all you folks!). Organization Leadership and Security Practitioners can gain understanding on the potential designed-to-fail Purple Teams initiatives never reached their full potential. The Duo reviews how systemic organizational career pathing created an insoluble Red vs Blue dichotomy. 



MORE IMPORTANTLY: The team is announcing a recipe for Purple Team Wins: 



The Atomic Purple Team (Lifecycle) Framework 



Organizations struggling to efficiently leverage the skillsets of all information security staff will benefit from considering the Atomic Purple Team Lifecycle Framework’s business-driven workflow. The workflow takes its roots from tested continuous improvement frameworks like ISO9001, ISO27001, Six Sigma, and the like. 



Watch how a methodical balance of risk analysis, attack, hunt and defend methodologies, and business considerations can effectively and continually improve an organizations’ security posture. As an added bonus, the framework incorporates concepts of Human Capital Management and knowledge-flow methodologies to encourage tacit knowledge exchange to further organic growth of the skillsets of all those involved in the Atomic Purple Team framework. 



But wait, there’s more! Budget headaches? Learn how the Atomic Purple Team framework’s methodical flow also aligns to natural business operations management and reporting. The framework provides a clear path to cabinet-approved Purple Team budget appropriations to ensure long term security posture improvement. 



Lastly, Jordan and Kent will demonstrate the Atomic Purple Team Lifecycle in action by running complete live Attack and Hunt/Defend lifecycle(s), all the way to risk management and budgetary thoughts.



Join the Black Hills Information Security Discord discussion server — https://discord.gg/aHHh3u5 



Need slides and much more — https://github.com/DefensiveOrigins/A… 



0:00 – Family Stories 



1:07 – Atomic Purple Team Framework
<ul><li>(00:00) - Family Stories</li>
<li>(01:07) - Atomic Purple Team Framework</li>
<li>(03:28) - Executive Problem Statement</li>
<li>(04:41) - Red Team, Blue Team, Purple Team</li>
<li>(07:18) - Who / What is APT?</li>
<li>(09:22) - Atomic Purple Team Lifecycle</li>
<li>(18:18) - 1. Threat / Risk Assessment (Ingest) Types</li>
<li>(19:59) - 2. Planning — What are the Tools</li>
<li>(20:50) - 3. Attack / Execute / Engage</li>
<li>(21:37) - 4. Hunt and Defend</li>
<li>(22:01) - 5. Adjust &amp; Harden</li>
<li>(23:14) - 6. Reporting and Request for Deployment</li>
<li>(27:07) - Lifecycles Start in Development</li>
<li>(28:15) - Lifecycles End in Production</li>
<li>(28:43) - APT Lab INfrastructure</li>
<li>(29:48) - Off-Roading: Lab Demo</li>
<li>(33:21) - Lifecycle Walkthrough — Goal Setting</li>
<li>(34:50) - Purple Team Lifecycle Walkthrough</li>
<li>(44:02) - Hunt and Defend Methodology</li>
<li>(45:02) - Adjusting to Threat</li>
<li>(47:21) - APTLC Playbook</li>
<li>(48:49) - The Report</li>
<li>(53:15) - Lessons Learned</li>
</ul>]]>
      </content:encoded>
      <pubDate>Thu, 30 Jul 2020 08:03:00 -0400</pubDate>
      <author>Black Hills Information Security</author>
      <enclosure url="https://media.transistor.fm/c0e2253d/4ceaccb8.mp3" length="31768303" type="audio/mpeg"/>
      <itunes:author>Black Hills Information Security</itunes:author>
      <itunes:image href="https://img.transistorcdn.com/-G0sR93geQ228DE3APNBXTFkQ9VWBbqUK8kjrL7RXjo/rs:fill:0:0:1/w:1400/h:1400/q:60/mb:500000/aHR0cHM6Ly9pbWct/dXBsb2FkLXByb2R1/Y3Rpb24udHJhbnNp/c3Rvci5mbS8xMjdm/N2ZmY2ZkNjkyYjE0/MTA1ZTIyYzg1MTNj/MzJiNy5qcGc.jpg"/>
      <itunes:duration>3569</itunes:duration>
      <itunes:summary>Jordan Drysdale &amp;amp; Kent Ickler //

























Jordan and Kent are back again to continue strengthening organizations’ information security human capital (That’s all you folks!). Organization Leadership and Security Practitioners can gain understanding on the potential designed-to-fail Purple Teams initiatives never reached their full potential. The Duo reviews how systemic organizational career pathing created an insoluble Red vs Blue dichotomy. 



MORE IMPORTANTLY: The team is announcing a recipe for Purple Team Wins: 



The Atomic Purple Team (Lifecycle) Framework 



Organizations struggling to efficiently leverage the skillsets of all information security staff will benefit from considering the Atomic Purple Team Lifecycle Framework’s business-driven workflow. The workflow takes its roots from tested continuous improvement frameworks like ISO9001, ISO27001, Six Sigma, and the like. 



Watch how a methodical balance of risk analysis, attack, hunt and defend methodologies, and business considerations can effectively and continually improve an organizations’ security posture. As an added bonus, the framework incorporates concepts of Human Capital Management and knowledge-flow methodologies to encourage tacit knowledge exchange to further organic growth of the skillsets of all those involved in the Atomic Purple Team framework. 



But wait, there’s more! Budget headaches? Learn how the Atomic Purple Team framework’s methodical flow also aligns to natural business operations management and reporting. The framework provides a clear path to cabinet-approved Purple Team budget appropriations to ensure long term security posture improvement. 



Lastly, Jordan and Kent will demonstrate the Atomic Purple Team Lifecycle in action by running complete live Attack and Hunt/Defend lifecycle(s), all the way to risk management and budgetary thoughts.



Join the Black Hills Information Security Discord discussion server — https://discord.gg/aHHh3u5 



Need slides and much more — https://github.com/DefensiveOrigins/A… 



0:00 – Family Stories 



1:07 – Atomic Purple Team Framework</itunes:summary>
      <itunes:subtitle>Jordan Drysdale &amp;amp; Kent Ickler //

























Jordan and Kent are back again to continue strengthening organizations’ information security human capital (That’s all you folks!). Organization Leadership and Security Practitioners can gain u</itunes:subtitle>
      <itunes:keywords>Infosec,Cybersecurity,news</itunes:keywords>
      <itunes:explicit>No</itunes:explicit>
      <podcast:chapters url="https://share.transistor.fm/s/c0e2253d/chapters.json" type="application/json+chapters"/>
    </item>
    <item>
      <title>Webcast: What About Ransomware?</title>
      <itunes:episode>1</itunes:episode>
      <podcast:episode>1</podcast:episode>
      <itunes:title>Webcast: What About Ransomware?</itunes:title>
      <itunes:episodeType>full</itunes:episodeType>
      <guid isPermaLink="false">https://www.blackhillsinfosec.com/?p=16271</guid>
      <link>https://share.transistor.fm/s/923fc235</link>
      <description>
        <![CDATA[This is a joint webcast between Black Hills Information Security and the Wild West Hackin’ Fest conference. 



We hate ransomware. Like a lot. This is because we feel this is the future of cyber attacks. If you look at the recent cases and the newish versions that involve extortion, there is nothing to like. Well, almost nothing. 



In this webcast, we cover what you can do to prepare (trust us, we have a newish twist on this) and what you can do to mitigate the damage. 



We also talk about working with brokers. 



There will be lots of memes to help this topic go down better. 



Join the Black Hills Information Security Discord discussion server — https://discord.gg/aHHh3u5 



0:00 – Half-Witty Theme Music 



0:53 – Welcome to the New Ransomware 



9:44 – User Training 



15:14 – ATT&amp;CK Matrix 



17:07 – We Should Be Emulating 



21:36 – Open Source Tools 



24:33 – (did we lose john?) 



33:52 – Threat Emulation Warning 



35:52 – Commercial Offerings 



40:01 – PlumHound 



45:33 – Don’t Focus On One Product 



48:08 – Paying a Ransom? 



49:26 – Key Takeaways 



52:16 – Got Questions?
<ul><li>(00:00) - Half-Witty Theme Music</li>
<li>(00:53) - Welcome to the New Ransomeware</li>
<li>(09:44) - User Training</li>
<li>(15:14) - ATT&amp;CK Matrix</li>
<li>(17:07) - We Should Be Emulating</li>
<li>(21:36) - Open Source Tools</li>
<li>(24:33) - (did we loose john?)</li>
<li>(33:52) - Threat Emulation Warning</li>
<li>(35:52) - Commercial Offerings</li>
<li>(40:01) - PlumHound</li>
<li>(45:33) - Don't Focus On One Product</li>
<li>(48:08) - Paying a Ransom?</li>
<li>(49:26) - Key Takeaways</li>
<li>(52:16) - Got Questions?</li>
<li>(59:41) - SPONSOR BONUS: PlexTrac</li>
<li>(01:15:30) - (did we loose john again?)</li>
<li>(01:29:21) - Strings &amp; Memory</li>
</ul>]]>
      </description>
      <content:encoded>
        <![CDATA[This is a joint webcast between Black Hills Information Security and the Wild West Hackin’ Fest conference. 



We hate ransomware. Like a lot. This is because we feel this is the future of cyber attacks. If you look at the recent cases and the newish versions that involve extortion, there is nothing to like. Well, almost nothing. 



In this webcast, we cover what you can do to prepare (trust us, we have a newish twist on this) and what you can do to mitigate the damage. 



We also talk about working with brokers. 



There will be lots of memes to help this topic go down better. 



Join the Black Hills Information Security Discord discussion server — https://discord.gg/aHHh3u5 



0:00 – Half-Witty Theme Music 



0:53 – Welcome to the New Ransomware 



9:44 – User Training 



15:14 – ATT&amp;CK Matrix 



17:07 – We Should Be Emulating 



21:36 – Open Source Tools 



24:33 – (did we lose john?) 



33:52 – Threat Emulation Warning 



35:52 – Commercial Offerings 



40:01 – PlumHound 



45:33 – Don’t Focus On One Product 



48:08 – Paying a Ransom? 



49:26 – Key Takeaways 



52:16 – Got Questions?
<ul><li>(00:00) - Half-Witty Theme Music</li>
<li>(00:53) - Welcome to the New Ransomeware</li>
<li>(09:44) - User Training</li>
<li>(15:14) - ATT&amp;CK Matrix</li>
<li>(17:07) - We Should Be Emulating</li>
<li>(21:36) - Open Source Tools</li>
<li>(24:33) - (did we loose john?)</li>
<li>(33:52) - Threat Emulation Warning</li>
<li>(35:52) - Commercial Offerings</li>
<li>(40:01) - PlumHound</li>
<li>(45:33) - Don't Focus On One Product</li>
<li>(48:08) - Paying a Ransom?</li>
<li>(49:26) - Key Takeaways</li>
<li>(52:16) - Got Questions?</li>
<li>(59:41) - SPONSOR BONUS: PlexTrac</li>
<li>(01:15:30) - (did we loose john again?)</li>
<li>(01:29:21) - Strings &amp; Memory</li>
</ul>]]>
      </content:encoded>
      <pubDate>Mon, 13 Jul 2020 14:57:08 -0400</pubDate>
      <author>Black Hills Information Security</author>
      <enclosure url="https://media.transistor.fm/923fc235/0b4a0da6.mp3" length="43991931" type="audio/mpeg"/>
      <itunes:author>Black Hills Information Security</itunes:author>
      <itunes:duration>5499</itunes:duration>
      <itunes:summary>This is a joint webcast between Black Hills Information Security and the Wild West Hackin’ Fest conference. 



We hate ransomware. Like a lot. This is because we feel this is the future of cyber attacks. If you look at the recent cases and the newish versions that involve extortion, there is nothing to like. Well, almost nothing. 



In this webcast, we cover what you can do to prepare (trust us, we have a newish twist on this) and what you can do to mitigate the damage. 



We also talk about working with brokers. 



There will be lots of memes to help this topic go down better. 



Join the Black Hills Information Security Discord discussion server — https://discord.gg/aHHh3u5 



0:00 – Half-Witty Theme Music 



0:53 – Welcome to the New Ransomware 



9:44 – User Training 



15:14 – ATT&amp;amp;CK Matrix 



17:07 – We Should Be Emulating 



21:36 – Open Source Tools 



24:33 – (did we lose john?) 



33:52 – Threat Emulation Warning 



35:52 – Commercial Offerings 



40:01 – PlumHound 



45:33 – Don’t Focus On One Product 



48:08 – Paying a Ransom? 



49:26 – Key Takeaways 



52:16 – Got Questions?</itunes:summary>
      <itunes:subtitle>This is a joint webcast between Black Hills Information Security and the Wild West Hackin’ Fest conference. 



We hate ransomware. Like a lot. This is because we feel this is the future of cyber attacks. If you look at the recent cases and the newish ver</itunes:subtitle>
      <itunes:keywords>Infosec,Cybersecurity,news</itunes:keywords>
      <itunes:explicit>No</itunes:explicit>
      <podcast:chapters url="https://share.transistor.fm/s/923fc235/chapters.json" type="application/json+chapters"/>
    </item>
    <item>
      <title>Webcast: Modern Webapp Pentesting: How to Attack a JWT</title>
      <itunes:episode>1</itunes:episode>
      <podcast:episode>1</podcast:episode>
      <itunes:title>Webcast: Modern Webapp Pentesting: How to Attack a JWT</itunes:title>
      <itunes:episodeType>full</itunes:episodeType>
      <guid isPermaLink="false">https://www.blackhillsinfosec.com/?p=16214</guid>
      <link>https://share.transistor.fm/s/5cab8b05</link>
      <description>
        <![CDATA[So much information about testing webapps for security problems is old. Don’t get me wrong, the old stuff still works way more often than we’d like, but there’s more to webapp vulnerabilities than cross-site scripting and SQL injection. 



Take JWTs – JSON Web Tokens – for example. These are base64 encoded tokens that sometimes get written to your browser’s localStorage or sessionStorage and passed around in cookies or HTTP headers. They’re pretty common in authentication and authorization logic for web APIs. 



Because they’re encoded, they look like gibberish and it’s easy to skip over them during a test. For the same reason, they’re more complicated to attack. First, you have to notice them. Then you have to decode them. Then you need to interpret the decoded data inside them. THEN, you have to decide what to attack! Once you’ve done that, you still have to create your payload, make valid JSON out of it and rebuild the JWT before you can send it. 



It’s kind of a lot. 



In this Black Hills Information Security webcast – an excerpt from his upcoming 16-hour Modern Webapp Pentesting course – BB King talks about what JSON Web Tokens are, why they’re so controversial, and how to test for their major weaknesses. Then, using OWSAP’s Juice Shop as a target, he shows you a straightforward method for exploiting them that you can use on your own next webapp pentest.



Join the Black Hills Information Security Discord discussion server — https://discord.gg/aHHh3u5 



0:00 – Good Morning! 



1:50 – What Are JSON Web Tokens? 



4:43 – Base64 Vs Base64 URL Encoding 



7:58 – The Construction of a JSON Token 



10:07 – Use Cases 



13:03 – RFCs of Interest 



13:26 – Encoded, Not Encrypted 



19:58 – The Red Slide 



20:39 – OWASP Top Ten Issues
<ul><li>(00:00) - Good Morning!</li>
<li>(01:47) - What Are JSON Web Tokens?</li>
<li>(04:36) - Base64 Vs Base64 URL Encoding</li>
<li>(07:46) - The Construction of a JSON Token</li>
<li>(09:50) - Use Cases</li>
<li>(12:38) - RFCs of Interest</li>
<li>(13:00) - Encoded, Not Encrypted</li>
<li>(19:10) - The Red Slide</li>
<li>(19:50) - OWASP Top Ten Issues</li>
<li>(20:10) - Signature Al Gore Rhythms</li>
<li>(24:30) - Stanced On Privacy</li>
<li>(25:48) - Stanced On Security</li>
<li>(27:45) - Craking</li>
<li>(29:04) - Where To Practice</li>
<li>(33:27) - Decoding the Payload – (Visual DEMO)</li>
<li>(42:52) - Snooping ( Stealing Poorly-Protected Secrets )</li>
<li>(48:27) - For Further Study</li>
</ul>]]>
      </description>
      <content:encoded>
        <![CDATA[So much information about testing webapps for security problems is old. Don’t get me wrong, the old stuff still works way more often than we’d like, but there’s more to webapp vulnerabilities than cross-site scripting and SQL injection. 



Take JWTs – JSON Web Tokens – for example. These are base64 encoded tokens that sometimes get written to your browser’s localStorage or sessionStorage and passed around in cookies or HTTP headers. They’re pretty common in authentication and authorization logic for web APIs. 



Because they’re encoded, they look like gibberish and it’s easy to skip over them during a test. For the same reason, they’re more complicated to attack. First, you have to notice them. Then you have to decode them. Then you need to interpret the decoded data inside them. THEN, you have to decide what to attack! Once you’ve done that, you still have to create your payload, make valid JSON out of it and rebuild the JWT before you can send it. 



It’s kind of a lot. 



In this Black Hills Information Security webcast – an excerpt from his upcoming 16-hour Modern Webapp Pentesting course – BB King talks about what JSON Web Tokens are, why they’re so controversial, and how to test for their major weaknesses. Then, using OWSAP’s Juice Shop as a target, he shows you a straightforward method for exploiting them that you can use on your own next webapp pentest.



Join the Black Hills Information Security Discord discussion server — https://discord.gg/aHHh3u5 



0:00 – Good Morning! 



1:50 – What Are JSON Web Tokens? 



4:43 – Base64 Vs Base64 URL Encoding 



7:58 – The Construction of a JSON Token 



10:07 – Use Cases 



13:03 – RFCs of Interest 



13:26 – Encoded, Not Encrypted 



19:58 – The Red Slide 



20:39 – OWASP Top Ten Issues
<ul><li>(00:00) - Good Morning!</li>
<li>(01:47) - What Are JSON Web Tokens?</li>
<li>(04:36) - Base64 Vs Base64 URL Encoding</li>
<li>(07:46) - The Construction of a JSON Token</li>
<li>(09:50) - Use Cases</li>
<li>(12:38) - RFCs of Interest</li>
<li>(13:00) - Encoded, Not Encrypted</li>
<li>(19:10) - The Red Slide</li>
<li>(19:50) - OWASP Top Ten Issues</li>
<li>(20:10) - Signature Al Gore Rhythms</li>
<li>(24:30) - Stanced On Privacy</li>
<li>(25:48) - Stanced On Security</li>
<li>(27:45) - Craking</li>
<li>(29:04) - Where To Practice</li>
<li>(33:27) - Decoding the Payload – (Visual DEMO)</li>
<li>(42:52) - Snooping ( Stealing Poorly-Protected Secrets )</li>
<li>(48:27) - For Further Study</li>
</ul>]]>
      </content:encoded>
      <pubDate>Mon, 29 Jun 2020 08:05:00 -0400</pubDate>
      <author>Black Hills Information Security</author>
      <enclosure url="https://media.transistor.fm/5cab8b05/7467d637.mp3" length="28502640" type="audio/mpeg"/>
      <itunes:author>Black Hills Information Security</itunes:author>
      <itunes:duration>3349</itunes:duration>
      <itunes:summary>So much information about testing webapps for security problems is old. Don’t get me wrong, the old stuff still works way more often than we’d like, but there’s more to webapp vulnerabilities than cross-site scripting and SQL injection. 



Take JWTs – JSON Web Tokens – for example. These are base64 encoded tokens that sometimes get written to your browser’s localStorage or sessionStorage and passed around in cookies or HTTP headers. They’re pretty common in authentication and authorization logic for web APIs. 



Because they’re encoded, they look like gibberish and it’s easy to skip over them during a test. For the same reason, they’re more complicated to attack. First, you have to notice them. Then you have to decode them. Then you need to interpret the decoded data inside them. THEN, you have to decide what to attack! Once you’ve done that, you still have to create your payload, make valid JSON out of it and rebuild the JWT before you can send it. 



It’s kind of a lot. 



In this Black Hills Information Security webcast – an excerpt from his upcoming 16-hour Modern Webapp Pentesting course – BB King talks about what JSON Web Tokens are, why they’re so controversial, and how to test for their major weaknesses. Then, using OWSAP’s Juice Shop as a target, he shows you a straightforward method for exploiting them that you can use on your own next webapp pentest.



Join the Black Hills Information Security Discord discussion server — https://discord.gg/aHHh3u5 



0:00 – Good Morning! 



1:50 – What Are JSON Web Tokens? 



4:43 – Base64 Vs Base64 URL Encoding 



7:58 – The Construction of a JSON Token 



10:07 – Use Cases 



13:03 – RFCs of Interest 



13:26 – Encoded, Not Encrypted 



19:58 – The Red Slide 



20:39 – OWASP Top Ten Issues</itunes:summary>
      <itunes:subtitle>So much information about testing webapps for security problems is old. Don’t get me wrong, the old stuff still works way more often than we’d like, but there’s more to webapp vulnerabilities than cross-site scripting and SQL injection. 



Take JWTs – JS</itunes:subtitle>
      <itunes:keywords>Infosec,Cybersecurity,news</itunes:keywords>
      <itunes:explicit>No</itunes:explicit>
      <podcast:chapters url="https://share.transistor.fm/s/5cab8b05/chapters.json" type="application/json+chapters"/>
    </item>
    <item>
      <title>Webcast: IPv6: How to Securely Start Deploying</title>
      <itunes:episode>1</itunes:episode>
      <podcast:episode>1</podcast:episode>
      <itunes:title>Webcast: IPv6: How to Securely Start Deploying</itunes:title>
      <itunes:episodeType>full</itunes:episodeType>
      <guid isPermaLink="false">https://www.blackhillsinfosec.com/?p=16206</guid>
      <link>https://share.transistor.fm/s/e971409a</link>
      <description>
        <![CDATA[Joff Thyer has dove into everything that is IPv6 and has so much to share about it. He gets really technical but in a way you’ll be able to understand. 



Google reports that over 30% of their systems access comes via the IPv6 protocol coming into 2020. Many Internet Service Providers have no remaining choice but to deploy IPv6 for simple lack of v4 address resources. The global Internet can already be thought of as balkanized into a split IPv4/IPv6 world based on historical v4 allocation. There will soon come a time whereby accessing IPv4 deployed resources will be considered legacy. 



Join Joff and the BHIS team to discuss security principles surrounding an Internet facing IPv6 deployment. Learn about fundamentals, known security issues, and appropriate infrastructure defenses which must be implemented. 



Enjoy a spirited discussion on how the v4 life support mechanisms of classless interdomain routing and network address translation are not required in a v6 world. It’s past time for IPv6 to become the norm. Fear not as we can do this!



Join the Black Hills Information Security Discord discussion server — https://discord.gg/aHHh3u5 



0:00 – Inaudible, But Good Looking Banter 



0:18 – Here We Are Now. Educate Us 



0:56 – IPv4 And After



5:45 – What’s the Address For IPv6? 



7:40 – What About IPv5? 



8:31 – IPv6 Allocation 



9:27 – IPv6 Packets 



10:28 – IPv6 Address Types 



13:26 – IPv6 Address Typecasting 



14:55 – IPv6 Address Assignment 



16:21 – IPv6 Multiple Interface Addresses 



18:25 – IPv6 EUI-64
<ul><li>(00:01) - Inaudible, But Good Looking Banter</li>
<li>(00:06) - PenTest Puppy Mill (Commercial)</li>
<li>(00:37) - Here We Are Now. Educate Us</li>
<li>(01:14) - IPv4 And After</li>
<li>(05:42) - What’s the Address For IPv6?</li>
<li>(07:32) - What About IPv5?</li>
<li>(08:20) - IPv6 Allocation</li>
<li>(09:16) - IPv6 Packets</li>
<li>(10:16) - IPv6 Address Typecasting</li>
<li>(13:09) - IPv6 Address Assignment</li>
<li>(14:35) - IPv6 Multiple Interface Addresses</li>
<li>(15:59) - IPv6 EUI-64</li>
<li>(18:00) - ICMPv6</li>
<li>(23:27) - ICMPv6 Neighbor Discovery</li>
<li>(27:07) - Securing the v6</li>
<li>(27:58) - IPv6 Address Filtering</li>
<li>(30:07) - ICMPv6 Perimeter Filtering</li>
<li>(31:21) - ICMPv6 Transit Traffic</li>
<li>(32:42) - ICMPv6 Non-Transit</li>
<li>(35:29) - IPv6 Multicast Filtering</li>
<li>(37:47) - IPv6 Protocol Normalization</li>
<li>(38:45) - IPv6 Extension Headers</li>
<li>(39:30) - IPv6 Enforcing EH Rules</li>
<li>(40:27) - IPv6 Header Normalization</li>
<li>(41:57) - IPv6 Protocol Normalization Reprise</li>
<li>(43:22) - Address Privacy / Obscuity</li>
<li>(45:58) - RFC4941 Privacy Extensions</li>
<li>(46:34) - Endpoint Route Table</li>
<li>(47:50) - Summary Recomdendations</li>
<li>(49:35) - To Be Continued...</li>
</ul>]]>
      </description>
      <content:encoded>
        <![CDATA[Joff Thyer has dove into everything that is IPv6 and has so much to share about it. He gets really technical but in a way you’ll be able to understand. 



Google reports that over 30% of their systems access comes via the IPv6 protocol coming into 2020. Many Internet Service Providers have no remaining choice but to deploy IPv6 for simple lack of v4 address resources. The global Internet can already be thought of as balkanized into a split IPv4/IPv6 world based on historical v4 allocation. There will soon come a time whereby accessing IPv4 deployed resources will be considered legacy. 



Join Joff and the BHIS team to discuss security principles surrounding an Internet facing IPv6 deployment. Learn about fundamentals, known security issues, and appropriate infrastructure defenses which must be implemented. 



Enjoy a spirited discussion on how the v4 life support mechanisms of classless interdomain routing and network address translation are not required in a v6 world. It’s past time for IPv6 to become the norm. Fear not as we can do this!



Join the Black Hills Information Security Discord discussion server — https://discord.gg/aHHh3u5 



0:00 – Inaudible, But Good Looking Banter 



0:18 – Here We Are Now. Educate Us 



0:56 – IPv4 And After



5:45 – What’s the Address For IPv6? 



7:40 – What About IPv5? 



8:31 – IPv6 Allocation 



9:27 – IPv6 Packets 



10:28 – IPv6 Address Types 



13:26 – IPv6 Address Typecasting 



14:55 – IPv6 Address Assignment 



16:21 – IPv6 Multiple Interface Addresses 



18:25 – IPv6 EUI-64
<ul><li>(00:01) - Inaudible, But Good Looking Banter</li>
<li>(00:06) - PenTest Puppy Mill (Commercial)</li>
<li>(00:37) - Here We Are Now. Educate Us</li>
<li>(01:14) - IPv4 And After</li>
<li>(05:42) - What’s the Address For IPv6?</li>
<li>(07:32) - What About IPv5?</li>
<li>(08:20) - IPv6 Allocation</li>
<li>(09:16) - IPv6 Packets</li>
<li>(10:16) - IPv6 Address Typecasting</li>
<li>(13:09) - IPv6 Address Assignment</li>
<li>(14:35) - IPv6 Multiple Interface Addresses</li>
<li>(15:59) - IPv6 EUI-64</li>
<li>(18:00) - ICMPv6</li>
<li>(23:27) - ICMPv6 Neighbor Discovery</li>
<li>(27:07) - Securing the v6</li>
<li>(27:58) - IPv6 Address Filtering</li>
<li>(30:07) - ICMPv6 Perimeter Filtering</li>
<li>(31:21) - ICMPv6 Transit Traffic</li>
<li>(32:42) - ICMPv6 Non-Transit</li>
<li>(35:29) - IPv6 Multicast Filtering</li>
<li>(37:47) - IPv6 Protocol Normalization</li>
<li>(38:45) - IPv6 Extension Headers</li>
<li>(39:30) - IPv6 Enforcing EH Rules</li>
<li>(40:27) - IPv6 Header Normalization</li>
<li>(41:57) - IPv6 Protocol Normalization Reprise</li>
<li>(43:22) - Address Privacy / Obscuity</li>
<li>(45:58) - RFC4941 Privacy Extensions</li>
<li>(46:34) - Endpoint Route Table</li>
<li>(47:50) - Summary Recomdendations</li>
<li>(49:35) - To Be Continued...</li>
</ul>]]>
      </content:encoded>
      <pubDate>Wed, 24 Jun 2020 10:54:41 -0400</pubDate>
      <author>Black Hills Information Security</author>
      <enclosure url="https://media.transistor.fm/e971409a/74abd25c.mp3" length="32387108" type="audio/mpeg"/>
      <itunes:author>Black Hills Information Security</itunes:author>
      <itunes:image href="https://img.transistorcdn.com/S0SyL8Ooz1pChohs6oNY6yHr7fzYfcRwLDAw5pTHu6k/rs:fill:0:0:1/w:1400/h:1400/q:60/mb:500000/aHR0cHM6Ly9pbWct/dXBsb2FkLXByb2R1/Y3Rpb24udHJhbnNp/c3Rvci5mbS9iNzFl/YTM3ZjEyZmZkYmNh/MTVjODZlN2RiYjYz/OGVmOS5qcGc.jpg"/>
      <itunes:duration>3553</itunes:duration>
      <itunes:summary>Joff Thyer has dove into everything that is IPv6 and has so much to share about it. He gets really technical but in a way you’ll be able to understand. 



Google reports that over 30% of their systems access comes via the IPv6 protocol coming into 2020. Many Internet Service Providers have no remaining choice but to deploy IPv6 for simple lack of v4 address resources. The global Internet can already be thought of as balkanized into a split IPv4/IPv6 world based on historical v4 allocation. There will soon come a time whereby accessing IPv4 deployed resources will be considered legacy. 



Join Joff and the BHIS team to discuss security principles surrounding an Internet facing IPv6 deployment. Learn about fundamentals, known security issues, and appropriate infrastructure defenses which must be implemented. 



Enjoy a spirited discussion on how the v4 life support mechanisms of classless interdomain routing and network address translation are not required in a v6 world. It’s past time for IPv6 to become the norm. Fear not as we can do this!



Join the Black Hills Information Security Discord discussion server — https://discord.gg/aHHh3u5 



0:00 – Inaudible, But Good Looking Banter 



0:18 – Here We Are Now. Educate Us 



0:56 – IPv4 And After



5:45 – What’s the Address For IPv6? 



7:40 – What About IPv5? 



8:31 – IPv6 Allocation 



9:27 – IPv6 Packets 



10:28 – IPv6 Address Types 



13:26 – IPv6 Address Typecasting 



14:55 – IPv6 Address Assignment 



16:21 – IPv6 Multiple Interface Addresses 



18:25 – IPv6 EUI-64</itunes:summary>
      <itunes:subtitle>Joff Thyer has dove into everything that is IPv6 and has so much to share about it. He gets really technical but in a way you’ll be able to understand. 



Google reports that over 30% of their systems access comes via the IPv6 protocol coming into 2020. </itunes:subtitle>
      <itunes:keywords>Infosec,Cybersecurity,news</itunes:keywords>
      <itunes:explicit>No</itunes:explicit>
      <podcast:chapters url="https://share.transistor.fm/s/e971409a/chapters.json" type="application/json+chapters"/>
    </item>
    <item>
      <title>Webcast: Durable vs. Ephemeral Threat Intel</title>
      <itunes:episode>1</itunes:episode>
      <podcast:episode>1</podcast:episode>
      <itunes:title>Webcast: Durable vs. Ephemeral Threat Intel</itunes:title>
      <itunes:episodeType>full</itunes:episodeType>
      <guid isPermaLink="false">https://www.blackhillsinfosec.com/?p=16195</guid>
      <link>https://share.transistor.fm/s/59940896</link>
      <description>
        <![CDATA[<p>Join us in the Black Hills InfoSec Discord server to keep the security conversation going!<br><a href="https://discord.gg/bhis">https://discord.gg/bhis</a></p><p>Reach out to Black Hills Infosec if you need pentesting, threat hunting, ACTIVE SOC, incident response, or blue team services:<br><a href="https://www.blackhillsinfosec.com">https://www.blackhillsinfosec.com</a></p><p>In this Black Hills Information Security webcast John breakdowns why he hates threat intelligence... Again...</p><p>But, he breaks down some of the cool new projects that are focusing on durable threat intelligence. This is key, because many intel feeds are nothing more than domains, hashes and IP addresses. However, with durable threat intel we see attack techniques that are highly effective, yet are not as easy to block. </p><p>For example, application allow listing abuse, connection profiles (RITA!), PowerShell encoding are all examples of detects you can use that are not specific to a point in time attack methodology.</p><p>John also shares some very cool open source projects that are approaching attacks in this way using ELK.</p><p>Slides for this webcast can be found here:<br><a href="https://www.blackhillsinfosec.com/wp-content/uploads/2020/09/SLIDES_Durable_Ephemeral_Threat_Intel_Strand.pdf">https://www.blackhillsinfosec.com/wp-content/uploads/2020/09/SLIDES_Durable_Ephemeral_Threat_Intel_Strand.pdf</a></p>
<ul><li>(00:00) - Intro</li>
<li>(00:47) - Threat Intel: A Useless Rant</li>
<li>(07:20) - Pyramid of Pain</li>
<li>(10:37) - You Got Another String Coming</li>
<li>(14:34) - Conversation With a Pompous John</li>
<li>(18:42) - Hacking Ain't Easy</li>
<li>(21:51) - ATT&amp;CK Bingo™</li>
<li>(24:02) - Emulation for Iteration</li>
<li>(27:00) - Some Open Source Tools</li>
<li>(31:28) - Threat Emulation Warning</li>
<li>(32:03) - Commercial Tools</li>
<li>(36:03) - MITRE Scorecard</li>
<li>(44:47) - A Bit of Perspective</li>
<li>(47:00) - DeTT&amp;CT</li>
<li>(47:46) - Sigma</li>
<li>(51:24) - Atomic Threat Coverage</li>
<li>(53:58) - PlumHound</li>
<li>(54:35) - RITA</li>
<li>(55:46) - Honeypots</li>
<li>(57:16) - Question Time</li>
<li>(01:06:04) - Breaking Down the Gates</li>
</ul>]]>
      </description>
      <content:encoded>
        <![CDATA[<p>Join us in the Black Hills InfoSec Discord server to keep the security conversation going!<br><a href="https://discord.gg/bhis">https://discord.gg/bhis</a></p><p>Reach out to Black Hills Infosec if you need pentesting, threat hunting, ACTIVE SOC, incident response, or blue team services:<br><a href="https://www.blackhillsinfosec.com">https://www.blackhillsinfosec.com</a></p><p>In this Black Hills Information Security webcast John breakdowns why he hates threat intelligence... Again...</p><p>But, he breaks down some of the cool new projects that are focusing on durable threat intelligence. This is key, because many intel feeds are nothing more than domains, hashes and IP addresses. However, with durable threat intel we see attack techniques that are highly effective, yet are not as easy to block. </p><p>For example, application allow listing abuse, connection profiles (RITA!), PowerShell encoding are all examples of detects you can use that are not specific to a point in time attack methodology.</p><p>John also shares some very cool open source projects that are approaching attacks in this way using ELK.</p><p>Slides for this webcast can be found here:<br><a href="https://www.blackhillsinfosec.com/wp-content/uploads/2020/09/SLIDES_Durable_Ephemeral_Threat_Intel_Strand.pdf">https://www.blackhillsinfosec.com/wp-content/uploads/2020/09/SLIDES_Durable_Ephemeral_Threat_Intel_Strand.pdf</a></p>
<ul><li>(00:00) - Intro</li>
<li>(00:47) - Threat Intel: A Useless Rant</li>
<li>(07:20) - Pyramid of Pain</li>
<li>(10:37) - You Got Another String Coming</li>
<li>(14:34) - Conversation With a Pompous John</li>
<li>(18:42) - Hacking Ain't Easy</li>
<li>(21:51) - ATT&amp;CK Bingo™</li>
<li>(24:02) - Emulation for Iteration</li>
<li>(27:00) - Some Open Source Tools</li>
<li>(31:28) - Threat Emulation Warning</li>
<li>(32:03) - Commercial Tools</li>
<li>(36:03) - MITRE Scorecard</li>
<li>(44:47) - A Bit of Perspective</li>
<li>(47:00) - DeTT&amp;CT</li>
<li>(47:46) - Sigma</li>
<li>(51:24) - Atomic Threat Coverage</li>
<li>(53:58) - PlumHound</li>
<li>(54:35) - RITA</li>
<li>(55:46) - Honeypots</li>
<li>(57:16) - Question Time</li>
<li>(01:06:04) - Breaking Down the Gates</li>
</ul>]]>
      </content:encoded>
      <pubDate>Mon, 22 Jun 2020 14:39:19 -0400</pubDate>
      <author>Black Hills Information Security</author>
      <enclosure url="https://media.transistor.fm/59940896/b9596606.mp3" length="37857531" type="audio/mpeg"/>
      <itunes:author>Black Hills Information Security</itunes:author>
      <itunes:image href="https://img.transistorcdn.com/1A-K9ikTphpnVQRfUuMniKQ0FThpLbBo6-u1Co53zvM/rs:fill:0:0:1/w:1400/h:1400/q:60/mb:500000/aHR0cHM6Ly9pbWct/dXBsb2FkLXByb2R1/Y3Rpb24udHJhbnNp/c3Rvci5mbS9jMzZj/NzM0N2RhMjdiMWI0/YjBlYzIwZGM4OGQ0/YjBiZi5qcGVn.jpg"/>
      <itunes:duration>4394</itunes:duration>
      <itunes:summary>In this Black Hills Information Security webcast John breakdowns why he hates threat intelligence… Again… 



But, he breaks down some of the cool new projects that are focusing on durable threat intelligence. This is key because many intel feeds are nothing more than domains, hashes, and IP addresses. However, with durable threat intel, we see attack techniques that are highly effective, yet are not as easy to block. 



For example, application allow listing abuse, connection profiles (RITA!), PowerShell encoding are all examples of detects you can use that are not specific to a point in time attack methodology. 



John also shares some very cool open source projects that are approaching attacks in this way using ELK.



Join the Black Hills Information Security Discord discussion server — https://discord.gg/aHHh3u5 



0:00 – Be Excellent to Each Other 



1:06 – Threat Intel: A Useless Rant 



7:38 – Pyramid of Pain 



10:55 – You Got Another String Coming 



14:56 – Conversation With a Pompous John 



19:10 – Hacking Ain’t Easy 



22:21 – ATT&amp;amp;CK Bingo™ 



24:33 – Emulation for Iteration 



27:35 – Some Open Source Tools 



32:03 – Threat Emulation Warning 



36:59 – MITRE Scorecard 



45:49 – A Bit of Perspective 



48:02 – DeTT&amp;amp;CT 



48:48 – Sigma</itunes:summary>
      <itunes:subtitle>In this Black Hills Information Security webcast John breakdowns why he hates threat intelligence… Again… 



But, he breaks down some of the cool new projects that are focusing on durable threat intelligence. This is key because many intel feeds are </itunes:subtitle>
      <itunes:keywords>Infosec,Cybersecurity,news</itunes:keywords>
      <itunes:explicit>No</itunes:explicit>
      <podcast:chapters url="https://share.transistor.fm/s/59940896/chapters.json" type="application/json+chapters"/>
    </item>
    <item>
      <title>Webcast: A Blue Team's Perspective on Red Team Hack Tools</title>
      <itunes:episode>1</itunes:episode>
      <podcast:episode>1</podcast:episode>
      <itunes:title>Webcast: A Blue Team's Perspective on Red Team Hack Tools</itunes:title>
      <itunes:episodeType>full</itunes:episodeType>
      <guid isPermaLink="false">https://www.blackhillsinfosec.com/?p=15896</guid>
      <link>https://share.transistor.fm/s/7d707ba5</link>
      <description>
        <![CDATA[Kent and Jordan are back to continue their journey to make the world a better place. This time around, they will be reviewing a series of tools commonly used on pentests to identify flaws in Active Directory and general network design and implementation. 



You’ve probably heard of most of them, like BloodHound, ADExplorer, mimikatz…, wait, Mimikatz as a Blue Team? Yeah, it might be a bit of a stretch, but they’ll get there. Even better, with an introduction to various adversarial simulation frameworks, you can start your own journey of constant improvement. Nmap, CrackMap, BingMaps, and Domain Password Spray. (Re: BingMaps — just checking to see if you’re actually reading these, at this point, our response rate records keep getting shattered, and we just want someone to call us out – the BingMaps API is really cool though). 



In a world seemingly gone mad, come find some solace with these two as they share new discoveries, a tool drop from Kent (which will potentially change the BloodHound game), and more. 



Let’s help the world detect attacks at a higher rate! Let’s skew the Verizon DBR’s reported numbers! Let’s get better together! 



Thanks, as always, and we look forward to spending time with those of you who can join us



0:00 – Big Fish 



0:28 – Question &amp; Enhance 



2:51 – Executive Summary 



3:58 – Executive Problem Statement 



8:48 – Red Team Tools are Red Team Tools 



13:39 – Optics(3) 



16:22 – SIGMA and SIGMAC 



22:13 – Red Team Tool : Responder 



25:35 – Red Team Tool : CrackMapExec 



29:57 – Red Team Tool : DomainPasswordSpray 



38:48 – Red Team Tool : Mimikatz 



46:41 – Red Team Tool : BloodHound
<ul><li>(00:00) - Big Fish</li>
<li>(00:28) - Question &amp; Enhance</li>
<li>(02:51) - Executive Summary</li>
<li>(03:58) - Executive Problem Statement</li>
<li>(08:48) - Red Team Tools are Red Team Tools</li>
<li>(13:39) - Optics(3)</li>
<li>(16:22) - SIGMA and SIGMAC</li>
<li>(22:13) - Red Team Tool : Responder</li>
<li>(25:35) - Red Team Tool : CrackMapExec</li>
<li>(29:57) - Red Team Tool : DomainPasswordSpray</li>
<li>(38:48) - Red Team Tool : Mimikatz</li>
<li>(46:41) - Red Team Tool : BloodHound</li>
<li>(50:59) - Blue Team Tool : Plumbhoud</li>
<li>(58:38) - Final Thoughts</li>
</ul>]]>
      </description>
      <content:encoded>
        <![CDATA[Kent and Jordan are back to continue their journey to make the world a better place. This time around, they will be reviewing a series of tools commonly used on pentests to identify flaws in Active Directory and general network design and implementation. 



You’ve probably heard of most of them, like BloodHound, ADExplorer, mimikatz…, wait, Mimikatz as a Blue Team? Yeah, it might be a bit of a stretch, but they’ll get there. Even better, with an introduction to various adversarial simulation frameworks, you can start your own journey of constant improvement. Nmap, CrackMap, BingMaps, and Domain Password Spray. (Re: BingMaps — just checking to see if you’re actually reading these, at this point, our response rate records keep getting shattered, and we just want someone to call us out – the BingMaps API is really cool though). 



In a world seemingly gone mad, come find some solace with these two as they share new discoveries, a tool drop from Kent (which will potentially change the BloodHound game), and more. 



Let’s help the world detect attacks at a higher rate! Let’s skew the Verizon DBR’s reported numbers! Let’s get better together! 



Thanks, as always, and we look forward to spending time with those of you who can join us



0:00 – Big Fish 



0:28 – Question &amp; Enhance 



2:51 – Executive Summary 



3:58 – Executive Problem Statement 



8:48 – Red Team Tools are Red Team Tools 



13:39 – Optics(3) 



16:22 – SIGMA and SIGMAC 



22:13 – Red Team Tool : Responder 



25:35 – Red Team Tool : CrackMapExec 



29:57 – Red Team Tool : DomainPasswordSpray 



38:48 – Red Team Tool : Mimikatz 



46:41 – Red Team Tool : BloodHound
<ul><li>(00:00) - Big Fish</li>
<li>(00:28) - Question &amp; Enhance</li>
<li>(02:51) - Executive Summary</li>
<li>(03:58) - Executive Problem Statement</li>
<li>(08:48) - Red Team Tools are Red Team Tools</li>
<li>(13:39) - Optics(3)</li>
<li>(16:22) - SIGMA and SIGMAC</li>
<li>(22:13) - Red Team Tool : Responder</li>
<li>(25:35) - Red Team Tool : CrackMapExec</li>
<li>(29:57) - Red Team Tool : DomainPasswordSpray</li>
<li>(38:48) - Red Team Tool : Mimikatz</li>
<li>(46:41) - Red Team Tool : BloodHound</li>
<li>(50:59) - Blue Team Tool : Plumbhoud</li>
<li>(58:38) - Final Thoughts</li>
</ul>]]>
      </content:encoded>
      <pubDate>Mon, 08 Jun 2020 08:28:00 -0400</pubDate>
      <author>Black Hills Information Security</author>
      <enclosure url="https://media.transistor.fm/7d707ba5/529362bf.mp3" length="31664980" type="audio/mpeg"/>
      <itunes:author>Black Hills Information Security</itunes:author>
      <itunes:image href="https://img.transistorcdn.com/jtUq_53nPajhL15WCO-PsipXL53On9TZzUco5c5bDzA/rs:fill:0:0:1/w:1400/h:1400/q:60/mb:500000/aHR0cHM6Ly9pbWct/dXBsb2FkLXByb2R1/Y3Rpb24udHJhbnNp/c3Rvci5mbS9hYjVi/NTg0MzYyN2Q4MTVk/Y2I5NWVhZDFkZjVl/YmQ2Mi5qcGc.jpg"/>
      <itunes:duration>3653</itunes:duration>
      <itunes:summary>Kent and Jordan are back to continue their journey to make the world a better place. This time around, they will be reviewing a series of tools commonly used on pentests to identify flaws in Active Directory and general network design and implementation. 



You’ve probably heard of most of them, like BloodHound, ADExplorer, mimikatz…, wait, Mimikatz as a Blue Team? Yeah, it might be a bit of a stretch, but they’ll get there. Even better, with an introduction to various adversarial simulation frameworks, you can start your own journey of constant improvement. Nmap, CrackMap, BingMaps, and Domain Password Spray. (Re: BingMaps — just checking to see if you’re actually reading these, at this point, our response rate records keep getting shattered, and we just want someone to call us out – the BingMaps API is really cool though). 



In a world seemingly gone mad, come find some solace with these two as they share new discoveries, a tool drop from Kent (which will potentially change the BloodHound game), and more. 



Let’s help the world detect attacks at a higher rate! Let’s skew the Verizon DBR’s reported numbers! Let’s get better together! 



Thanks, as always, and we look forward to spending time with those of you who can join us



0:00 – Big Fish 



0:28 – Question &amp;amp; Enhance 



2:51 – Executive Summary 



3:58 – Executive Problem Statement 



8:48 – Red Team Tools are Red Team Tools 



13:39 – Optics(3) 



16:22 – SIGMA and SIGMAC 



22:13 – Red Team Tool : Responder 



25:35 – Red Team Tool : CrackMapExec 



29:57 – Red Team Tool : DomainPasswordSpray 



38:48 – Red Team Tool : Mimikatz 



46:41 – Red Team Tool : BloodHound</itunes:summary>
      <itunes:subtitle>Kent and Jordan are back to continue their journey to make the world a better place. This time around, they will be reviewing a series of tools commonly used on pentests to identify flaws in Active Directory and general network design and implementation. </itunes:subtitle>
      <itunes:keywords>Infosec,Cybersecurity,news</itunes:keywords>
      <itunes:explicit>No</itunes:explicit>
      <podcast:chapters url="https://share.transistor.fm/s/7d707ba5/chapters.json" type="application/json+chapters"/>
    </item>
    <item>
      <title>Webcast: How to Hunt for Jobs like a Hacker</title>
      <itunes:episode>1</itunes:episode>
      <podcast:episode>1</podcast:episode>
      <itunes:title>Webcast: How to Hunt for Jobs like a Hacker</itunes:title>
      <itunes:episodeType>full</itunes:episodeType>
      <guid isPermaLink="false">https://www.blackhillsinfosec.com/?p=15872</guid>
      <link>https://share.transistor.fm/s/7c61f3a3</link>
      <description>
        <![CDATA[Job hunting? Looking for a career change? Still in college and want to know how to get started now in your career? If you answered yes to any of these questions, this might be the BHIS webcast for you. 



This webcast is an update to Jason’s popular recorded DerbyCon 2016 talk — How to Social Engineer Your Way Into Your Dream Job. If you don’t want to wait, you can watch that now. https://youtu.be/__lvS2pjuSg 



What is covered? 



* How to combine OSINT, marketing technology, and a hacker/social engineer mindset to job hunting * How to be a hunter of jobs… not just a seeker of jobs * How to write your resume during the job hunt * You might already have your dream job 



The hope of this webcast is that you’ll look at job hunting differently and apply the skills and techniques in an effective way to help you get the career of your dreams… or at least a job for now that will help you get to the career of your dreams in the next 5 years. 



Join the Black Hills Information Security Discord discussion server — https://discord.gg/aHHh3u5 



0:00 – Infosec Sad Plant’s Last Day 



0:30 – Pandemic Prologue 



2:34 – Time to Meet the Bobs 



4:20 – Be Prepared 



5:50 – Climbing the Walls of Awful 



8:35 – Another Crack In The Wall 



9:49 – whoami? 



11:58 – Pitch Perfect 



12:53 – Step 1: I Mean Set Your Requirements 



15:10 – Engineering Reverse 



15:44 – “Enough” is Enough, or is it? 



17:30 – Step 2: Top Ten Companies 



18:45...
<ul><li>(00:00) - Infosec Sad Plant's Last Day</li>
<li>(00:30) - Pandemic Prologue</li>
<li>(02:34) - Time to Meet the Bobs</li>
<li>(04:20) - Be Prepared: Kings and Succession</li>
<li>(05:50) - Climbing the Walls of Awful</li>
<li>(08:35) - Another Crack In The Wall</li>
<li>(09:49) - whoami?</li>
<li>(11:58) - Pitch Perfect</li>
<li>(12:53) - Step 1: Cut a hole in the bo... I Mean Set Your Requirements</li>
<li>(15:10) - Engineering Reverse</li>
<li>(15:44) - Enough is Enough, or is it?</li>
<li>(17:30) - Step 2: Top Ten Companies</li>
<li>(18:45) - Hunt V1, Hunt V2, Hunt V3</li>
<li>(20:17) - Document For the People</li>
<li>(24:43) - Step 3: HUNT! - TOP TEN</li>
<li>(39:20) - Jobs Don't Hire People, People Hire People</li>
<li>(39:58) - Step 3: HUNT! - Discovery</li>
<li>(48:23) - Step 3: HUNT! - Internal</li>
<li>(50:22) - Step 4: Make Contact</li>
<li>(53:29) - Step 5: Interview</li>
<li>(54:21) - I'm Sorry, But Your Princess Is In Another Castle</li>
<li>(55:23) - Step 6: Decide</li>
<li>(57:16) - Be Prepared! (reprise)</li>
<li>(59:54) - A Bunch of Requestions</li>
</ul>]]>
      </description>
      <content:encoded>
        <![CDATA[Job hunting? Looking for a career change? Still in college and want to know how to get started now in your career? If you answered yes to any of these questions, this might be the BHIS webcast for you. 



This webcast is an update to Jason’s popular recorded DerbyCon 2016 talk — How to Social Engineer Your Way Into Your Dream Job. If you don’t want to wait, you can watch that now. https://youtu.be/__lvS2pjuSg 



What is covered? 



* How to combine OSINT, marketing technology, and a hacker/social engineer mindset to job hunting * How to be a hunter of jobs… not just a seeker of jobs * How to write your resume during the job hunt * You might already have your dream job 



The hope of this webcast is that you’ll look at job hunting differently and apply the skills and techniques in an effective way to help you get the career of your dreams… or at least a job for now that will help you get to the career of your dreams in the next 5 years. 



Join the Black Hills Information Security Discord discussion server — https://discord.gg/aHHh3u5 



0:00 – Infosec Sad Plant’s Last Day 



0:30 – Pandemic Prologue 



2:34 – Time to Meet the Bobs 



4:20 – Be Prepared 



5:50 – Climbing the Walls of Awful 



8:35 – Another Crack In The Wall 



9:49 – whoami? 



11:58 – Pitch Perfect 



12:53 – Step 1: I Mean Set Your Requirements 



15:10 – Engineering Reverse 



15:44 – “Enough” is Enough, or is it? 



17:30 – Step 2: Top Ten Companies 



18:45...
<ul><li>(00:00) - Infosec Sad Plant's Last Day</li>
<li>(00:30) - Pandemic Prologue</li>
<li>(02:34) - Time to Meet the Bobs</li>
<li>(04:20) - Be Prepared: Kings and Succession</li>
<li>(05:50) - Climbing the Walls of Awful</li>
<li>(08:35) - Another Crack In The Wall</li>
<li>(09:49) - whoami?</li>
<li>(11:58) - Pitch Perfect</li>
<li>(12:53) - Step 1: Cut a hole in the bo... I Mean Set Your Requirements</li>
<li>(15:10) - Engineering Reverse</li>
<li>(15:44) - Enough is Enough, or is it?</li>
<li>(17:30) - Step 2: Top Ten Companies</li>
<li>(18:45) - Hunt V1, Hunt V2, Hunt V3</li>
<li>(20:17) - Document For the People</li>
<li>(24:43) - Step 3: HUNT! - TOP TEN</li>
<li>(39:20) - Jobs Don't Hire People, People Hire People</li>
<li>(39:58) - Step 3: HUNT! - Discovery</li>
<li>(48:23) - Step 3: HUNT! - Internal</li>
<li>(50:22) - Step 4: Make Contact</li>
<li>(53:29) - Step 5: Interview</li>
<li>(54:21) - I'm Sorry, But Your Princess Is In Another Castle</li>
<li>(55:23) - Step 6: Decide</li>
<li>(57:16) - Be Prepared! (reprise)</li>
<li>(59:54) - A Bunch of Requestions</li>
</ul>]]>
      </content:encoded>
      <pubDate>Wed, 03 Jun 2020 08:11:00 -0400</pubDate>
      <author>Black Hills Information Security</author>
      <enclosure url="https://media.transistor.fm/7c61f3a3/f6c73810.mp3" length="46872596" type="audio/mpeg"/>
      <itunes:author>Black Hills Information Security</itunes:author>
      <itunes:image href="https://img.transistorcdn.com/iFxTF2YchoccnBTIUflai4Kk-ONg6WAlt7kMg-Vm358/rs:fill:0:0:1/w:1400/h:1400/q:60/mb:500000/aHR0cHM6Ly9pbWct/dXBsb2FkLXByb2R1/Y3Rpb24udHJhbnNp/c3Rvci5mbS85OTEx/OWMyZTQxZTE3ODg4/ZDA4OTZkZWRkNGUx/ZDcxMi5qcGc.jpg"/>
      <itunes:duration>5399</itunes:duration>
      <itunes:summary>Job hunting? Looking for a career change? Still in college and want to know how to get started now in your career? If you answered yes to any of these questions, this might be the BHIS webcast for you. 



This webcast is an update to Jason’s popular recorded DerbyCon 2016 talk — How to Social Engineer Your Way Into Your Dream Job. If you don’t want to wait, you can watch that now. https://youtu.be/__lvS2pjuSg 



What is covered? 



* How to combine OSINT, marketing technology, and a hacker/social engineer mindset to job hunting * How to be a hunter of jobs… not just a seeker of jobs * How to write your resume during the job hunt * You might already have your dream job 



The hope of this webcast is that you’ll look at job hunting differently and apply the skills and techniques in an effective way to help you get the career of your dreams… or at least a job for now that will help you get to the career of your dreams in the next 5 years. 



Join the Black Hills Information Security Discord discussion server — https://discord.gg/aHHh3u5 



0:00 – Infosec Sad Plant’s Last Day 



0:30 – Pandemic Prologue 



2:34 – Time to Meet the Bobs 



4:20 – Be Prepared 



5:50 – Climbing the Walls of Awful 



8:35 – Another Crack In The Wall 



9:49 – whoami? 



11:58 – Pitch Perfect 



12:53 – Step 1: I Mean Set Your Requirements 



15:10 – Engineering Reverse 



15:44 – “Enough” is Enough, or is it? 



17:30 – Step 2: Top Ten Companies 



18:45...</itunes:summary>
      <itunes:subtitle>Job hunting? Looking for a career change? Still in college and want to know how to get started now in your career? If you answered yes to any of these questions, this might be the BHIS webcast for you. 



This webcast is an update to Jason’s popular reco</itunes:subtitle>
      <itunes:keywords>Infosec,Cybersecurity,news</itunes:keywords>
      <itunes:explicit>No</itunes:explicit>
      <podcast:chapters url="https://share.transistor.fm/s/7c61f3a3/chapters.json" type="application/json+chapters"/>
    </item>
    <item>
      <title>Webcast: Kerberos &amp; Attacks 101</title>
      <itunes:episode>1</itunes:episode>
      <podcast:episode>1</podcast:episode>
      <itunes:title>Webcast: Kerberos &amp; Attacks 101</itunes:title>
      <itunes:episodeType>full</itunes:episodeType>
      <guid isPermaLink="false">https://www.blackhillsinfosec.com/?p=15768</guid>
      <link>https://share.transistor.fm/s/1ce0ba85</link>
      <description>
        <![CDATA[Join the BHIS Discord discussion server: https://discord.gg/aHHh3u5  



We’re really excited to have a close member of our BHIS extended family, Tim Medin from Red Siege InfoSec, here for a webcast on Kerberos &amp; Attacks 101. Tim is the creator of Kerberoasting. Want to understand how Kerberos works? Would you like to understand modern Kerberos attacks? If so, then join Tim Medin as he walks you through how to attack Kerberos with ticket attacks and Kerberoasting. We’ll cover the basics of Kerberos authentication and then show you how the trust model can be exploited for persistence, pivoting, and privilege escalation.  



0:00 – 45 Seconds of Banter 



0:45 – The Creator Of Kerberosting 



1:48 – What Is Kerberos? 



4:49 – How It Works 



9:23 – PAC: Privilege Attribute Certificate 



12:27 – Service Ticket 



14:12 – SPN : Service Principal Name 



16:22 – Three Long Term Keys 



23:39 – I Got A Golden Ticket 



24:57 – Ticket Flow 



27:49 – Skeleton Key 



30:42 – Kerberoasting On an Open Firewall  



33:23 – Extract and Crack
<ul><li>(00:00) - 45 Seconds of Banter</li>
<li>(01:16) - The Creator Of Kerberosting</li>
<li>(02:19) - What Is Kerberos?</li>
<li>(05:21) - How It Works</li>
<li>(09:54) - PAC: Privilege Attribute Certificate</li>
<li>(12:58) - Service Ticket</li>
<li>(14:43) - SPN : Service Principal Name</li>
<li>(16:53) - Three Long Term Keys</li>
<li>(24:10) - I Got A Golden Ticket</li>
<li>(25:28) - Ticket Flow</li>
<li>(28:20) - Skeleton Key</li>
<li>(31:13) - Kerberoasting On an Open Firewall </li>
<li>(33:54) - Extract and Crack</li>
<li>(34:35) - Silver Ticket</li>
<li>(35:56) - Insert Demo Here</li>
<li>(37:55) - Cracking Tickets To Get You Out Of Server Jail</li>
<li>(44:23) - Trollmode Engaged</li>
<li>(45:56) - Pass-The-Ticket</li>
<li>(46:36) - Over-Pass-The-Hash</li>
<li>(47:08) - Wrap-Up</li>
<li>(53:07) - We Have Some Questions</li>
<li>(59:56) - 45 More Seconds of Banter</li>
</ul>]]>
      </description>
      <content:encoded>
        <![CDATA[Join the BHIS Discord discussion server: https://discord.gg/aHHh3u5  



We’re really excited to have a close member of our BHIS extended family, Tim Medin from Red Siege InfoSec, here for a webcast on Kerberos &amp; Attacks 101. Tim is the creator of Kerberoasting. Want to understand how Kerberos works? Would you like to understand modern Kerberos attacks? If so, then join Tim Medin as he walks you through how to attack Kerberos with ticket attacks and Kerberoasting. We’ll cover the basics of Kerberos authentication and then show you how the trust model can be exploited for persistence, pivoting, and privilege escalation.  



0:00 – 45 Seconds of Banter 



0:45 – The Creator Of Kerberosting 



1:48 – What Is Kerberos? 



4:49 – How It Works 



9:23 – PAC: Privilege Attribute Certificate 



12:27 – Service Ticket 



14:12 – SPN : Service Principal Name 



16:22 – Three Long Term Keys 



23:39 – I Got A Golden Ticket 



24:57 – Ticket Flow 



27:49 – Skeleton Key 



30:42 – Kerberoasting On an Open Firewall  



33:23 – Extract and Crack
<ul><li>(00:00) - 45 Seconds of Banter</li>
<li>(01:16) - The Creator Of Kerberosting</li>
<li>(02:19) - What Is Kerberos?</li>
<li>(05:21) - How It Works</li>
<li>(09:54) - PAC: Privilege Attribute Certificate</li>
<li>(12:58) - Service Ticket</li>
<li>(14:43) - SPN : Service Principal Name</li>
<li>(16:53) - Three Long Term Keys</li>
<li>(24:10) - I Got A Golden Ticket</li>
<li>(25:28) - Ticket Flow</li>
<li>(28:20) - Skeleton Key</li>
<li>(31:13) - Kerberoasting On an Open Firewall </li>
<li>(33:54) - Extract and Crack</li>
<li>(34:35) - Silver Ticket</li>
<li>(35:56) - Insert Demo Here</li>
<li>(37:55) - Cracking Tickets To Get You Out Of Server Jail</li>
<li>(44:23) - Trollmode Engaged</li>
<li>(45:56) - Pass-The-Ticket</li>
<li>(46:36) - Over-Pass-The-Hash</li>
<li>(47:08) - Wrap-Up</li>
<li>(53:07) - We Have Some Questions</li>
<li>(59:56) - 45 More Seconds of Banter</li>
</ul>]]>
      </content:encoded>
      <pubDate>Tue, 26 May 2020 10:02:30 -0400</pubDate>
      <author>Black Hills Information Security</author>
      <enclosure url="https://media.transistor.fm/1ce0ba85/3b11fed1.mp3" length="32551697" type="audio/mpeg"/>
      <itunes:author>Black Hills Information Security</itunes:author>
      <itunes:image href="https://img.transistorcdn.com/KjVEmdIghr0ONbfhGmujEKphzQjh5NMR2BEH_YuCMQE/rs:fill:0:0:1/w:1400/h:1400/q:60/mb:500000/aHR0cHM6Ly9pbWct/dXBsb2FkLXByb2R1/Y3Rpb24udHJhbnNp/c3Rvci5mbS9kMzcx/N2U0NjI4MzgzOGEz/MTNiYzU5NmY5NGZk/MDk5MS5qcGc.jpg"/>
      <itunes:duration>3642</itunes:duration>
      <itunes:summary>Join the BHIS Discord discussion server: https://discord.gg/aHHh3u5  



We’re really excited to have a close member of our BHIS extended family, Tim Medin from Red Siege InfoSec, here for a webcast on Kerberos &amp;amp; Attacks 101. Tim is the creator of Kerberoasting. Want to understand how Kerberos works? Would you like to understand modern Kerberos attacks? If so, then join Tim Medin as he walks you through how to attack Kerberos with ticket attacks and Kerberoasting. We’ll cover the basics of Kerberos authentication and then show you how the trust model can be exploited for persistence, pivoting, and privilege escalation.  



0:00 – 45 Seconds of Banter 



0:45 – The Creator Of Kerberosting 



1:48 – What Is Kerberos? 



4:49 – How It Works 



9:23 – PAC: Privilege Attribute Certificate 



12:27 – Service Ticket 



14:12 – SPN : Service Principal Name 



16:22 – Three Long Term Keys 



23:39 – I Got A Golden Ticket 



24:57 – Ticket Flow 



27:49 – Skeleton Key 



30:42 – Kerberoasting On an Open Firewall  



33:23 – Extract and Crack</itunes:summary>
      <itunes:subtitle>Join the BHIS Discord discussion server: https://discord.gg/aHHh3u5  



We’re really excited to have a close member of our BHIS extended family, Tim Medin from Red Siege InfoSec, here for a webcast on Kerberos &amp;amp; Attacks 101. Tim is the creator of Ker</itunes:subtitle>
      <itunes:keywords>Infosec,Cybersecurity,news</itunes:keywords>
      <itunes:explicit>No</itunes:explicit>
      <podcast:chapters url="https://share.transistor.fm/s/1ce0ba85/chapters.json" type="application/json+chapters"/>
    </item>
    <item>
      <title>Webcast: Free Tools! How to Use Developer Tools and Javascript in Webapp Pentests</title>
      <itunes:episode>1</itunes:episode>
      <podcast:episode>1</podcast:episode>
      <itunes:title>Webcast: Free Tools! How to Use Developer Tools and Javascript in Webapp Pentests</itunes:title>
      <itunes:episodeType>full</itunes:episodeType>
      <guid isPermaLink="false">https://www.blackhillsinfosec.com/?p=15610</guid>
      <link>https://share.transistor.fm/s/2908f607</link>
      <description>
        <![CDATA[I like webapps, don’t you? Webapps have got to be the best way to learn about security. Why? Because they’re self-contained and so very transparent. 



You don’t need a big ol’ lab before you can play with them. You can run them in a single tiny VM or even tiny-er Docker image on your laptop. And so long as you’re attacking your own stuff, it’s easy to stay out of trouble. You’re up and running in the time it takes for a single download. 



And the transparent part? Ever since “view source” in the earliest web browsers, it’s been easy to see exactly what’s going on in a webapp and in the browser. Every webapp you ever use has no choice but to give you the (client-side) source code! It’s almost like there’s no such thing as a “black box” webapp pentest if you think about it… 



Anyhow – the Developer Tools in Firefox (and Chrome) are what happens when you take “view source” and add 25 years or so of creativity and power. 



We’ll look at the Developer Tools in the latest Firefox with a pentester’s eye. Inspect and change the DOM (Document Object Model), take screenshots, find and extract key bits of data, use the console to run Javascript in the site’s origin context, and even pause script execution in the debugger if things go too fast… 



Maybe we’ll convince you that you can realistically do a big chunk of a webapp pentest without ever leaving the browser. 



Join the BHIS Discord channel — https://discord.gg/aHHh3u5 



Download the slides: https://www.activecountermeasures.com/presentations/ (BHIS_Webcasts)  



0:00 – A Shady-White Slideshow with “FREE TOOLS!” On the Sign 



0:38 – The Way Back Machine 



11:00 – Always Be Learning 



18:01 – The Path to the Developer Tools 



24:37 – Console Separately From a Window 



30:40 – The Network Tab 



36:23 – Storage Tab
<ul><li>(00:00) - A Shady-White Slideshow with "FREE TOOLS!" On the Sign</li>
<li>(00:35) - The Way Back Machine</li>
<li>(10:16) - Always Be Learning</li>
<li>(16:55) - The Path to the Developer Tools</li>
<li>(23:14) - Console Separately From a Window</li>
<li>(28:44) - The Network Tab</li>
<li>(33:57) - Storage Tab</li>
<li>(35:45) - All The Cookies</li>
<li>(37:42) - The Inspector Gadget Thingy</li>
<li>(41:46) - Debugger</li>
<li>(42:08) - Customize the Tools</li>
<li>(42:18) - Console Tricks</li>
</ul>]]>
      </description>
      <content:encoded>
        <![CDATA[I like webapps, don’t you? Webapps have got to be the best way to learn about security. Why? Because they’re self-contained and so very transparent. 



You don’t need a big ol’ lab before you can play with them. You can run them in a single tiny VM or even tiny-er Docker image on your laptop. And so long as you’re attacking your own stuff, it’s easy to stay out of trouble. You’re up and running in the time it takes for a single download. 



And the transparent part? Ever since “view source” in the earliest web browsers, it’s been easy to see exactly what’s going on in a webapp and in the browser. Every webapp you ever use has no choice but to give you the (client-side) source code! It’s almost like there’s no such thing as a “black box” webapp pentest if you think about it… 



Anyhow – the Developer Tools in Firefox (and Chrome) are what happens when you take “view source” and add 25 years or so of creativity and power. 



We’ll look at the Developer Tools in the latest Firefox with a pentester’s eye. Inspect and change the DOM (Document Object Model), take screenshots, find and extract key bits of data, use the console to run Javascript in the site’s origin context, and even pause script execution in the debugger if things go too fast… 



Maybe we’ll convince you that you can realistically do a big chunk of a webapp pentest without ever leaving the browser. 



Join the BHIS Discord channel — https://discord.gg/aHHh3u5 



Download the slides: https://www.activecountermeasures.com/presentations/ (BHIS_Webcasts)  



0:00 – A Shady-White Slideshow with “FREE TOOLS!” On the Sign 



0:38 – The Way Back Machine 



11:00 – Always Be Learning 



18:01 – The Path to the Developer Tools 



24:37 – Console Separately From a Window 



30:40 – The Network Tab 



36:23 – Storage Tab
<ul><li>(00:00) - A Shady-White Slideshow with "FREE TOOLS!" On the Sign</li>
<li>(00:35) - The Way Back Machine</li>
<li>(10:16) - Always Be Learning</li>
<li>(16:55) - The Path to the Developer Tools</li>
<li>(23:14) - Console Separately From a Window</li>
<li>(28:44) - The Network Tab</li>
<li>(33:57) - Storage Tab</li>
<li>(35:45) - All The Cookies</li>
<li>(37:42) - The Inspector Gadget Thingy</li>
<li>(41:46) - Debugger</li>
<li>(42:08) - Customize the Tools</li>
<li>(42:18) - Console Tricks</li>
</ul>]]>
      </content:encoded>
      <pubDate>Wed, 06 May 2020 08:36:00 -0400</pubDate>
      <author>Black Hills Information Security</author>
      <enclosure url="https://media.transistor.fm/2908f607/755aee8a.mp3" length="23442019" type="audio/mpeg"/>
      <itunes:author>Black Hills Information Security</itunes:author>
      <itunes:image href="https://img.transistorcdn.com/axjLugpRtWBKdbVxduQvq6z_uqhPihhs7qncjKP6bJk/rs:fill:0:0:1/w:1400/h:1400/q:60/mb:500000/aHR0cHM6Ly9pbWct/dXBsb2FkLXByb2R1/Y3Rpb24udHJhbnNp/c3Rvci5mbS9lYzQ5/ZDI0OTE2MjBlOTY4/OTk0OGVmYjQ3OTQz/MGQ4NS5qcGc.jpg"/>
      <itunes:duration>2762</itunes:duration>
      <itunes:summary>I like webapps, don’t you? Webapps have got to be the best way to learn about security. Why? Because they’re self-contained and so very transparent. 



You don’t need a big ol’ lab before you can play with them. You can run them in a single tiny VM or even tiny-er Docker image on your laptop. And so long as you’re attacking your own stuff, it’s easy to stay out of trouble. You’re up and running in the time it takes for a single download. 



And the transparent part? Ever since “view source” in the earliest web browsers, it’s been easy to see exactly what’s going on in a webapp and in the browser. Every webapp you ever use has no choice but to give you the (client-side) source code! It’s almost like there’s no such thing as a “black box” webapp pentest if you think about it… 



Anyhow – the Developer Tools in Firefox (and Chrome) are what happens when you take “view source” and add 25 years or so of creativity and power. 



We’ll look at the Developer Tools in the latest Firefox with a pentester’s eye. Inspect and change the DOM (Document Object Model), take screenshots, find and extract key bits of data, use the console to run Javascript in the site’s origin context, and even pause script execution in the debugger if things go too fast… 



Maybe we’ll convince you that you can realistically do a big chunk of a webapp pentest without ever leaving the browser. 



Join the BHIS Discord channel — https://discord.gg/aHHh3u5 



Download the slides: https://www.activecountermeasures.com/presentations/ (BHIS_Webcasts)  



0:00 – A Shady-White Slideshow with “FREE TOOLS!” On the Sign 



0:38 – The Way Back Machine 



11:00 – Always Be Learning 



18:01 – The Path to the Developer Tools 



24:37 – Console Separately From a Window 



30:40 – The Network Tab 



36:23 – Storage Tab</itunes:summary>
      <itunes:subtitle>I like webapps, don’t you? Webapps have got to be the best way to learn about security. Why? Because they’re self-contained and so very transparent. 



You don’t need a big ol’ lab before you can play with them. You can run them in a single tiny VM or ev</itunes:subtitle>
      <itunes:keywords>Infosec,Cybersecurity,news</itunes:keywords>
      <itunes:explicit>No</itunes:explicit>
      <podcast:chapters url="https://share.transistor.fm/s/2908f607/chapters.json" type="application/json+chapters"/>
    </item>
    <item>
      <title>Webcast: How to Build a Home Lab</title>
      <itunes:episode>1</itunes:episode>
      <podcast:episode>1</podcast:episode>
      <itunes:title>Webcast: How to Build a Home Lab</itunes:title>
      <itunes:episodeType>full</itunes:episodeType>
      <guid isPermaLink="false">https://www.blackhillsinfosec.com/?p=15584</guid>
      <link>https://share.transistor.fm/s/6b320608</link>
      <description>
        <![CDATA[This is a joint webcast from Black Hills Information Security and Active Countermeasures.  



How many of us have tried some new configuration option, utility, or hardware on a production environment, only to crash a critical piece of the business?  (me raising hand…)  It’s amazing how quickly we learn not to do that!  Now we have to decide – do we stop trying out new things because we’re scared of causing problems, or do we come up with a safe way to play and learn? 



We’re going to cover how to set up a Home Lab – an isolated environment where you can test new hardware, programs, and applications.  By keeping this totally separate from everything else, you get free rein to play without risk to your other systems – and without risk of breaking any company policies! 



We’ll cover how to set this up, the equipment needed, and how to configure these.  Best of all, you can use throwaway hardware to do it! 



Join the new Threat Hunting Community Discord discussion server: https://discord.gg/JmXpQFD 



Download slides: www.activecountermeasures.com/presentations 



0:00 – You’re In Charge 



2:06 – Ok. But Why? 



7:18 – The Network Layout 



9:43 – (John’s Spaghetti)  



20:38 – Project Hardware 



26:06 – Firewall 



29:21 – Switch 



30:53 – Wireless AP 



36:49 – Sentinel
<ul><li>(00:00) - You're In Charge</li>
<li>(02:06) - Ok. But Why?</li>
<li>(07:18) - The Network Layout</li>
<li>(09:43) - (John's Spaghetti) </li>
<li>(20:38) - Project Hardware</li>
<li>(26:06) - Firewall</li>
<li>(29:21) - Switch</li>
<li>(30:53) - Wireless AP</li>
<li>(36:49) - Sentinel</li>
<li>(38:33) - File and Drive Image Transfer</li>
<li>(41:04) - Laberv</li>
<li>(43:41) - Guinea Pigs</li>
<li>(44:46) - John's Setup Porn</li>
<li>(46:44) - HELK</li>
<li>(47:35) - Beaker</li>
<li>(48:13) - Creating Evil</li>
<li>(49:48) - Recording</li>
<li>(50:14) - Incrementally Opening Up the Firewall</li>
<li>(51:50) - Software</li>
<li>(53:31) - Packet Capture</li>
<li>(54:25) - Network Monitoring</li>
<li>(55:09) - Scanning</li>
<li>(56:12) - Disk Imaging</li>
<li>(56:43) - On a Budget – What's Critical</li>
<li>(57:04) - Closing Notes</li>
<li>(58:05) - Questions</li>
<li>(01:01:28) - See Something Cool</li>
</ul>]]>
      </description>
      <content:encoded>
        <![CDATA[This is a joint webcast from Black Hills Information Security and Active Countermeasures.  



How many of us have tried some new configuration option, utility, or hardware on a production environment, only to crash a critical piece of the business?  (me raising hand…)  It’s amazing how quickly we learn not to do that!  Now we have to decide – do we stop trying out new things because we’re scared of causing problems, or do we come up with a safe way to play and learn? 



We’re going to cover how to set up a Home Lab – an isolated environment where you can test new hardware, programs, and applications.  By keeping this totally separate from everything else, you get free rein to play without risk to your other systems – and without risk of breaking any company policies! 



We’ll cover how to set this up, the equipment needed, and how to configure these.  Best of all, you can use throwaway hardware to do it! 



Join the new Threat Hunting Community Discord discussion server: https://discord.gg/JmXpQFD 



Download slides: www.activecountermeasures.com/presentations 



0:00 – You’re In Charge 



2:06 – Ok. But Why? 



7:18 – The Network Layout 



9:43 – (John’s Spaghetti)  



20:38 – Project Hardware 



26:06 – Firewall 



29:21 – Switch 



30:53 – Wireless AP 



36:49 – Sentinel
<ul><li>(00:00) - You're In Charge</li>
<li>(02:06) - Ok. But Why?</li>
<li>(07:18) - The Network Layout</li>
<li>(09:43) - (John's Spaghetti) </li>
<li>(20:38) - Project Hardware</li>
<li>(26:06) - Firewall</li>
<li>(29:21) - Switch</li>
<li>(30:53) - Wireless AP</li>
<li>(36:49) - Sentinel</li>
<li>(38:33) - File and Drive Image Transfer</li>
<li>(41:04) - Laberv</li>
<li>(43:41) - Guinea Pigs</li>
<li>(44:46) - John's Setup Porn</li>
<li>(46:44) - HELK</li>
<li>(47:35) - Beaker</li>
<li>(48:13) - Creating Evil</li>
<li>(49:48) - Recording</li>
<li>(50:14) - Incrementally Opening Up the Firewall</li>
<li>(51:50) - Software</li>
<li>(53:31) - Packet Capture</li>
<li>(54:25) - Network Monitoring</li>
<li>(55:09) - Scanning</li>
<li>(56:12) - Disk Imaging</li>
<li>(56:43) - On a Budget – What's Critical</li>
<li>(57:04) - Closing Notes</li>
<li>(58:05) - Questions</li>
<li>(01:01:28) - See Something Cool</li>
</ul>]]>
      </content:encoded>
      <pubDate>Mon, 27 Apr 2020 09:35:00 -0400</pubDate>
      <author>Black Hills Information Security</author>
      <enclosure url="https://media.transistor.fm/6b320608/6385be78.mp3" length="39444777" type="audio/mpeg"/>
      <itunes:author>Black Hills Information Security</itunes:author>
      <itunes:image href="https://img.transistorcdn.com/kiqD1BarJZXNvxMO-F5YJPOmSTkLpKqLg85UpkdrDgA/rs:fill:0:0:1/w:1400/h:1400/q:60/mb:500000/aHR0cHM6Ly9pbWct/dXBsb2FkLXByb2R1/Y3Rpb24udHJhbnNp/c3Rvci5mbS81YmNk/MTI0ODJiZDM4YzM0/YTJlMDlhNzM4ZDUw/ZDg3NS5qcGc.jpg"/>
      <itunes:duration>4495</itunes:duration>
      <itunes:summary>This is a joint webcast from Black Hills Information Security and Active Countermeasures.  



How many of us have tried some new configuration option, utility, or hardware on a production environment, only to crash a critical piece of the business?  (me raising hand…)  It’s amazing how quickly we learn not to do that!  Now we have to decide – do we stop trying out new things because we’re scared of causing problems, or do we come up with a safe way to play and learn? 



We’re going to cover how to set up a Home Lab – an isolated environment where you can test new hardware, programs, and applications.  By keeping this totally separate from everything else, you get free rein to play without risk to your other systems – and without risk of breaking any company policies! 



We’ll cover how to set this up, the equipment needed, and how to configure these.  Best of all, you can use throwaway hardware to do it! 



Join the new Threat Hunting Community Discord discussion server: https://discord.gg/JmXpQFD 



Download slides: www.activecountermeasures.com/presentations 



0:00 – You’re In Charge 



2:06 – Ok. But Why? 



7:18 – The Network Layout 



9:43 – (John’s Spaghetti)  



20:38 – Project Hardware 



26:06 – Firewall 



29:21 – Switch 



30:53 – Wireless AP 



36:49 – Sentinel</itunes:summary>
      <itunes:subtitle>This is a joint webcast from Black Hills Information Security and Active Countermeasures.  



How many of us have tried some new configuration option, utility, or hardware on a production environment, only to crash a critical piece of the business?  (me </itunes:subtitle>
      <itunes:keywords>Infosec,Cybersecurity,news</itunes:keywords>
      <itunes:explicit>No</itunes:explicit>
      <podcast:chapters url="https://share.transistor.fm/s/6b320608/chapters.json" type="application/json+chapters"/>
    </item>
    <item>
      <title>Webcast: Pandemic Paradigm Shift: Remote Working is the New Normal</title>
      <itunes:episode>1</itunes:episode>
      <podcast:episode>1</podcast:episode>
      <itunes:title>Webcast: Pandemic Paradigm Shift: Remote Working is the New Normal</itunes:title>
      <itunes:episodeType>full</itunes:episodeType>
      <guid isPermaLink="false">https://www.blackhillsinfosec.com/?p=15284</guid>
      <link>https://share.transistor.fm/s/590f163a</link>
      <description>
        <![CDATA[What does it mean to work from home across your corporate VPN? 



What exactly is VPN? 



Is your home office prepared? 



How can you improve and better secure your home network? 



Is your corporate network ready for the change in IT environment network access? 



Join us to explore these topics, and describe some potential actions you can take to improve your home office and network environment. 



And join the BHIS Discord to discuss all of this — https://discord.gg/ST5NdFu 



Download slides: https://www.activecountermeasures.com/presentations



0:00 – We’re Not In Normal Anymore



2:04 – Viral Pandemic Networking (VPN) 



7:34 – Home Office Runner



11:16 – What’s Your Frequency, Kenneth? 



17:17 – It’s Always DNS 



19:12 – Secure The Perimeter 



23:34 – Game Recognizes Game 



27:55 – Master of Your Domain 



43:36 – Solutions, Solutions, Solutions 



47:20 – Remote Workers Unite! Individually In Your Own Homes!
<ul><li>(00:00) - We're Not In Normal Anymore.</li>
<li>(02:35) - Viral Pandemic Networking (VPN)</li>
<li>(08:05) - Home Office Runner</li>
<li>(11:47) - What's Your Frequency, Kennith?</li>
<li>(17:48) - It's Always DNS</li>
<li>(19:43) - Secure The Permitter</li>
<li>(24:05) - Game Recognizes Game</li>
<li>(28:26) - Master of Your Domain</li>
<li>(44:08) - Solutions, Solutions, Solutions</li>
<li>(47:51) - Remote Workers Unite! Individually In Your Own Homes.</li>
<li>(51:41) - Questions and Answers</li>
</ul>]]>
      </description>
      <content:encoded>
        <![CDATA[What does it mean to work from home across your corporate VPN? 



What exactly is VPN? 



Is your home office prepared? 



How can you improve and better secure your home network? 



Is your corporate network ready for the change in IT environment network access? 



Join us to explore these topics, and describe some potential actions you can take to improve your home office and network environment. 



And join the BHIS Discord to discuss all of this — https://discord.gg/ST5NdFu 



Download slides: https://www.activecountermeasures.com/presentations



0:00 – We’re Not In Normal Anymore



2:04 – Viral Pandemic Networking (VPN) 



7:34 – Home Office Runner



11:16 – What’s Your Frequency, Kenneth? 



17:17 – It’s Always DNS 



19:12 – Secure The Perimeter 



23:34 – Game Recognizes Game 



27:55 – Master of Your Domain 



43:36 – Solutions, Solutions, Solutions 



47:20 – Remote Workers Unite! Individually In Your Own Homes!
<ul><li>(00:00) - We're Not In Normal Anymore.</li>
<li>(02:35) - Viral Pandemic Networking (VPN)</li>
<li>(08:05) - Home Office Runner</li>
<li>(11:47) - What's Your Frequency, Kennith?</li>
<li>(17:48) - It's Always DNS</li>
<li>(19:43) - Secure The Permitter</li>
<li>(24:05) - Game Recognizes Game</li>
<li>(28:26) - Master of Your Domain</li>
<li>(44:08) - Solutions, Solutions, Solutions</li>
<li>(47:51) - Remote Workers Unite! Individually In Your Own Homes.</li>
<li>(51:41) - Questions and Answers</li>
</ul>]]>
      </content:encoded>
      <pubDate>Wed, 01 Apr 2020 08:12:00 -0400</pubDate>
      <author>Black Hills Information Security</author>
      <enclosure url="https://media.transistor.fm/590f163a/aa5d6d0b.mp3" length="29663255" type="audio/mpeg"/>
      <itunes:author>Black Hills Information Security</itunes:author>
      <itunes:image href="https://img.transistorcdn.com/Aqz50mCaHJmeMqjqAUD6yBv_56X880UZp2NApD45hhg/rs:fill:0:0:1/w:1400/h:1400/q:60/mb:500000/aHR0cHM6Ly9pbWct/dXBsb2FkLXByb2R1/Y3Rpb24udHJhbnNp/c3Rvci5mbS81ZjM1/ZDY2ZWNmM2M5NzM1/NDNkZTE5ZDMxOGFj/ZmM5MS5qcGc.jpg"/>
      <itunes:duration>3505</itunes:duration>
      <itunes:summary>What does it mean to work from home across your corporate VPN? 



What exactly is VPN? 



Is your home office prepared? 



How can you improve and better secure your home network? 



Is your corporate network ready for the change in IT environment network access? 



Join us to explore these topics, and describe some potential actions you can take to improve your home office and network environment. 



And join the BHIS Discord to discuss all of this — https://discord.gg/ST5NdFu 



Download slides: https://www.activecountermeasures.com/presentations



0:00 – We’re Not In Normal Anymore



2:04 – Viral Pandemic Networking (VPN) 



7:34 – Home Office Runner



11:16 – What’s Your Frequency, Kenneth? 



17:17 – It’s Always DNS 



19:12 – Secure The Perimeter 



23:34 – Game Recognizes Game 



27:55 – Master of Your Domain 



43:36 – Solutions, Solutions, Solutions 



47:20 – Remote Workers Unite! Individually In Your Own Homes!</itunes:summary>
      <itunes:subtitle>What does it mean to work from home across your corporate VPN? 



What exactly is VPN? 



Is your home office prepared? 



How can you improve and better secure your home network? 



Is your corporate network ready for the change in IT environment net</itunes:subtitle>
      <itunes:keywords>Infosec,Cybersecurity,news</itunes:keywords>
      <itunes:explicit>No</itunes:explicit>
      <podcast:chapters url="https://share.transistor.fm/s/590f163a/chapters.json" type="application/json+chapters"/>
    </item>
    <item>
      <title>Webcast: How (we) Run a Virtual Conference and How You Can, Too</title>
      <itunes:episode>1</itunes:episode>
      <podcast:episode>1</podcast:episode>
      <itunes:title>Webcast: How (we) Run a Virtual Conference and How You Can, Too</itunes:title>
      <itunes:episodeType>full</itunes:episodeType>
      <guid isPermaLink="false">https://www.blackhillsinfosec.com/?p=15129</guid>
      <link>https://share.transistor.fm/s/e1098af1</link>
      <description>
        <![CDATA[The team at Black Hills Information Security and Wild West Hackin’ Fest had to pivot from doing an in-person information security conference in San Diego to a 100% virtual conference with 6 days of notice. We had a little bit of experience doing a hybrid in-person/virtual conference in November 2019 (with 10 days’ notice).  



The response from the 400+ attendees about the virtual conference was overwhelmingly positive. We did it and you can do it, too. 



In this webcast, we discuss how it all happened, including how we ended our agreement with our venue. We talk about all the things we learned and what we’d do differently next time. 







0:00 – Trust Us, We’re Not Experts 



0:40 – Suddenly Virtual 



3:15 – Venue Vámonos 



11:58 – What Now? 



18:58 – Let’s All Go To The Lobby (and have ourselves a chat) -LobbyCon/Discord 



32:24 – A Stream of Logistics 



43:29 – The Calm 



46:07 – The Storm 



51:48 – The End Credits Scene 



56:40 – Any Questions? 





















Join the BHIS Blog Mailing List – get notified when we post new blogs, webcasts, and podcasts.



            
				Join 2,087 other subscribers
                    
                        
							Email Address                        
                        
                    

                    
                        
                        
                        
                        
						                        
	                        Subscribe
<ul><li>(00:01) - Trust Us, We're Not Experts</li>
<li>(01:11) - Suddenly Virtual</li>
<li>(03:46) - Venue Vámonos</li>
<li>(12:29) - What Now?</li>
<li>(19:29) - Let's All Go To The Lobby (and have ourselves a chat)</li>
<li>(32:55) - A Stream of Logistics</li>
<li>(44:00) - The Calm</li>
<li>(46:38) - The Storm</li>
<li>(52:19) - The End Credits Scene</li>
<li>(57:12) - Any Questions?</li>
</ul>]]>
      </description>
      <content:encoded>
        <![CDATA[The team at Black Hills Information Security and Wild West Hackin’ Fest had to pivot from doing an in-person information security conference in San Diego to a 100% virtual conference with 6 days of notice. We had a little bit of experience doing a hybrid in-person/virtual conference in November 2019 (with 10 days’ notice).  



The response from the 400+ attendees about the virtual conference was overwhelmingly positive. We did it and you can do it, too. 



In this webcast, we discuss how it all happened, including how we ended our agreement with our venue. We talk about all the things we learned and what we’d do differently next time. 







0:00 – Trust Us, We’re Not Experts 



0:40 – Suddenly Virtual 



3:15 – Venue Vámonos 



11:58 – What Now? 



18:58 – Let’s All Go To The Lobby (and have ourselves a chat) -LobbyCon/Discord 



32:24 – A Stream of Logistics 



43:29 – The Calm 



46:07 – The Storm 



51:48 – The End Credits Scene 



56:40 – Any Questions? 





















Join the BHIS Blog Mailing List – get notified when we post new blogs, webcasts, and podcasts.



            
				Join 2,087 other subscribers
                    
                        
							Email Address                        
                        
                    

                    
                        
                        
                        
                        
						                        
	                        Subscribe
<ul><li>(00:01) - Trust Us, We're Not Experts</li>
<li>(01:11) - Suddenly Virtual</li>
<li>(03:46) - Venue Vámonos</li>
<li>(12:29) - What Now?</li>
<li>(19:29) - Let's All Go To The Lobby (and have ourselves a chat)</li>
<li>(32:55) - A Stream of Logistics</li>
<li>(44:00) - The Calm</li>
<li>(46:38) - The Storm</li>
<li>(52:19) - The End Credits Scene</li>
<li>(57:12) - Any Questions?</li>
</ul>]]>
      </content:encoded>
      <pubDate>Wed, 25 Mar 2020 08:05:00 -0400</pubDate>
      <author>Black Hills Information Security</author>
      <enclosure url="https://media.transistor.fm/e1098af1/ce92d311.mp3" length="34663567" type="audio/mpeg"/>
      <itunes:author>Black Hills Information Security</itunes:author>
      <itunes:image href="https://img.transistorcdn.com/XOtfzsjqZXZpbM4XldwyBKi961_1iGjF3mRWigvOW2Y/rs:fill:0:0:1/w:1400/h:1400/q:60/mb:500000/aHR0cHM6Ly9pbWct/dXBsb2FkLXByb2R1/Y3Rpb24udHJhbnNp/c3Rvci5mbS9hMDU4/Zjg1MWM1ZDdiNjhm/YmIzNGZjYzM5Y2Qz/MWRkMi5qcGc.jpg"/>
      <itunes:duration>4071</itunes:duration>
      <itunes:summary>The team at Black Hills Information Security and Wild West Hackin’ Fest had to pivot from doing an in-person information security conference in San Diego to a 100% virtual conference with 6 days of notice. We had a little bit of experience doing a hybrid in-person/virtual conference in November 2019 (with 10 days’ notice).  



The response from the 400+ attendees about the virtual conference was overwhelmingly positive. We did it and you can do it, too. 



In this webcast, we discuss how it all happened, including how we ended our agreement with our venue. We talk about all the things we learned and what we’d do differently next time. 







0:00 – Trust Us, We’re Not Experts 



0:40 – Suddenly Virtual 



3:15 – Venue Vámonos 



11:58 – What Now? 



18:58 – Let’s All Go To The Lobby (and have ourselves a chat) -LobbyCon/Discord 



32:24 – A Stream of Logistics 



43:29 – The Calm 



46:07 – The Storm 



51:48 – The End Credits Scene 



56:40 – Any Questions? 





















Join the BHIS Blog Mailing List – get notified when we post new blogs, webcasts, and podcasts.



            
				Join 2,087 other subscribers
                    
                        
							Email Address                        
                        
                    

                    
                        
                        
                        
                        
						                        
	                        Subscribe</itunes:summary>
      <itunes:subtitle>The team at Black Hills Information Security and Wild West Hackin’ Fest had to pivot from doing an in-person information security conference in San Diego to a 100% virtual conference with 6 days of notice. We had a little bit of experience doing a hybrid </itunes:subtitle>
      <itunes:keywords>Infosec,Cybersecurity,news</itunes:keywords>
      <itunes:explicit>No</itunes:explicit>
      <podcast:chapters url="https://share.transistor.fm/s/e1098af1/chapters.json" type="application/json+chapters"/>
    </item>
    <item>
      <title>Webcast: Think You're Compromised? What Do We Do Next?</title>
      <itunes:episode>1</itunes:episode>
      <podcast:episode>1</podcast:episode>
      <itunes:title>Webcast: Think You're Compromised? What Do We Do Next?</itunes:title>
      <itunes:episodeType>full</itunes:episodeType>
      <guid isPermaLink="false">https://www.blackhillsinfosec.com/?p=15087</guid>
      <link>https://share.transistor.fm/s/35bcafc4</link>
      <description>
        <![CDATA[In this webcast, we will cover what we can do if we think there is a breach on our network. 



We will cover live forensics, cool PowerShell scripts, network, and event log analysis, cool IR spreadsheets, and checklists.  



We will also be covering the status of our ELK project for reviewing Event ID 3 from Sysmon.  



So, a lot… Yep… A crazy amount.  



Download slides: https://www.activecountermeasures.com/presentations  



00:00 – Intro 



00:47 – “Ok, But Why” 



02:17 – Have It The Wrong Way 



04:35 – Have It The Right Way 



06:58 – Lego My Incident Response



08:25 – Monologging On Mute 



11:57 – Wouldn’t Be Prudent 



14:29 – “Better Than Bad, It’s Good”



21:33 – A Van Full of Free Tools 



44:10 – CSI: Memory 



45:01 – We Got Cheat Sheets if You Want Some Cheat Sheets 



47:20 – Overlapping Venn Diagrams 



49:46 – Questions in the Wild 



59:15 – Sucking at Capitalism 







Join the BHIS Blog Mailing List – get notified when we post new blogs, webcasts, and podcasts.



            
				Join 2,052 other subscribers
<ul><li>(00:00) - Intro</li>
<li>(01:18) - Ok, But Why</li>
<li>(02:49) - Have It The Wrong Way</li>
<li>(05:07) - Have It The Right Way</li>
<li>(07:30) - Lego My Incident Response</li>
<li>(08:56) - Monologging On Mute</li>
<li>(12:28) - Wouldn't Be Prudent</li>
<li>(15:00) - Better Than Bad, It's Good</li>
<li>(22:04) - A Van Full of Free Tools</li>
<li>(44:41) - CSI: Memory</li>
<li>(45:32) - We Got Cheat Sheets if You Want Some Cheat Sheets</li>
<li>(47:51) - Overlapping Venn Diagrams</li>
<li>(50:17) - Questions in the Wild</li>
<li>(59:46) - Sucking at Capitalism</li>
</ul>]]>
      </description>
      <content:encoded>
        <![CDATA[In this webcast, we will cover what we can do if we think there is a breach on our network. 



We will cover live forensics, cool PowerShell scripts, network, and event log analysis, cool IR spreadsheets, and checklists.  



We will also be covering the status of our ELK project for reviewing Event ID 3 from Sysmon.  



So, a lot… Yep… A crazy amount.  



Download slides: https://www.activecountermeasures.com/presentations  



00:00 – Intro 



00:47 – “Ok, But Why” 



02:17 – Have It The Wrong Way 



04:35 – Have It The Right Way 



06:58 – Lego My Incident Response



08:25 – Monologging On Mute 



11:57 – Wouldn’t Be Prudent 



14:29 – “Better Than Bad, It’s Good”



21:33 – A Van Full of Free Tools 



44:10 – CSI: Memory 



45:01 – We Got Cheat Sheets if You Want Some Cheat Sheets 



47:20 – Overlapping Venn Diagrams 



49:46 – Questions in the Wild 



59:15 – Sucking at Capitalism 







Join the BHIS Blog Mailing List – get notified when we post new blogs, webcasts, and podcasts.



            
				Join 2,052 other subscribers
<ul><li>(00:00) - Intro</li>
<li>(01:18) - Ok, But Why</li>
<li>(02:49) - Have It The Wrong Way</li>
<li>(05:07) - Have It The Right Way</li>
<li>(07:30) - Lego My Incident Response</li>
<li>(08:56) - Monologging On Mute</li>
<li>(12:28) - Wouldn't Be Prudent</li>
<li>(15:00) - Better Than Bad, It's Good</li>
<li>(22:04) - A Van Full of Free Tools</li>
<li>(44:41) - CSI: Memory</li>
<li>(45:32) - We Got Cheat Sheets if You Want Some Cheat Sheets</li>
<li>(47:51) - Overlapping Venn Diagrams</li>
<li>(50:17) - Questions in the Wild</li>
<li>(59:46) - Sucking at Capitalism</li>
</ul>]]>
      </content:encoded>
      <pubDate>Wed, 11 Mar 2020 11:46:23 -0400</pubDate>
      <author>Black Hills Information Security</author>
      <enclosure url="https://media.transistor.fm/35bcafc4/1844b1d3.mp3" length="31924636" type="audio/mpeg"/>
      <itunes:author>Black Hills Information Security</itunes:author>
      <itunes:image href="https://img.transistorcdn.com/CCBFr2zlrGJRV4sNxd2rxBxcqVIAEcST7QoDF-8VnGc/rs:fill:0:0:1/w:1400/h:1400/q:60/mb:500000/aHR0cHM6Ly9pbWct/dXBsb2FkLXByb2R1/Y3Rpb24udHJhbnNp/c3Rvci5mbS9mZjUx/ZTE1YmEyZGRhNGE5/ODQwODhmNTNhODMy/M2VmOS5qcGc.jpg"/>
      <itunes:duration>3778</itunes:duration>
      <itunes:summary>In this webcast, we will cover what we can do if we think there is a breach on our network. 



We will cover live forensics, cool PowerShell scripts, network, and event log analysis, cool IR spreadsheets, and checklists.  



We will also be covering the status of our ELK project for reviewing Event ID 3 from Sysmon.  



So, a lot… Yep… A crazy amount.  



Download slides: https://www.activecountermeasures.com/presentations  



00:00 – Intro 



00:47 – “Ok, But Why” 



02:17 – Have It The Wrong Way 



04:35 – Have It The Right Way 



06:58 – Lego My Incident Response



08:25 – Monologging On Mute 



11:57 – Wouldn’t Be Prudent 



14:29 – “Better Than Bad, It’s Good”



21:33 – A Van Full of Free Tools 



44:10 – CSI: Memory 



45:01 – We Got Cheat Sheets if You Want Some Cheat Sheets 



47:20 – Overlapping Venn Diagrams 



49:46 – Questions in the Wild 



59:15 – Sucking at Capitalism 







Join the BHIS Blog Mailing List – get notified when we post new blogs, webcasts, and podcasts.



            
				Join 2,052 other subscribers</itunes:summary>
      <itunes:subtitle>In this webcast, we will cover what we can do if we think there is a breach on our network. 



We will cover live forensics, cool PowerShell scripts, network, and event log analysis, cool IR spreadsheets, and checklists.  



We will also be covering the</itunes:subtitle>
      <itunes:keywords>Infosec,Cybersecurity,news</itunes:keywords>
      <itunes:explicit>No</itunes:explicit>
      <podcast:chapters url="https://share.transistor.fm/s/35bcafc4/chapters.json" type="application/json+chapters"/>
    </item>
    <item>
      <title>Webcast: Enterprise Recon For Purple Teams</title>
      <itunes:episode>1</itunes:episode>
      <podcast:episode>1</podcast:episode>
      <itunes:title>Webcast: Enterprise Recon For Purple Teams</itunes:title>
      <itunes:episodeType>full</itunes:episodeType>
      <guid isPermaLink="false">https://www.blackhillsinfosec.com/?p=14920</guid>
      <link>https://share.transistor.fm/s/04949215</link>
      <description>
        <![CDATA[Do you know what your attackers know? 



There’s a good chance you know, but you might not be aware of just how much information can be found historically and in real-time about your business operations and organization. 



Join Jordan Drysdale and Kent Ickler as they discuss and demonstrate Purple Team Enterprise Reconnaissance methods that increase operational network awareness and overall security posture. 



Download slides: https://activecountermeasures.com/presentations



00:00 – Intro 



00:42 – Executive Problem Statement 



02:25 – Recon You Say? 



06:11 – Your Internal Friends… Sometimes 



09:01 – What Does Purple Team Do, Exactly? 



10:13 – There Are A Ton Of Sources Out Here 



49:55 – And Now For Some Crappy Code 



Learn how to monitor cloud services for your organizations’ data being dumped on the web, account compromises, and source code disclosure. 



Use external services to keep an eye on your external landscape to alert on unexpected changes. 



See configurations of operational awareness uncover potential attacker’s methodology and infrastructure to provide you an upper-hand in stopping threats before they escalate. 



See how an attacker utilizes common internet sources to gather intelligence about your technology stack, your perimeter security, your wireless networks, and plan attacks against your organization. 



Know what your attacker knows. 







Wild West Hackin’ Fest – Most Hands-On Infosec Con!







Join us at the new Way West Wild West Hackin’ Fest in San Diego — March 11-13th, 2020. Learn more: https://www.wildwesthackinfest.com/







Join the BHIS Blog Mailing List – get notified when we post new blogs, webcasts, and podcasts.



            
				Join 1,
<ul><li>(00:00) - Intro</li>
<li>(00:42) - Executive Problem Statement</li>
<li>(02:25) - Recon You Say?</li>
<li>(06:11) - Your Internal Friends... Sometimes</li>
<li>(09:01) - What Does Purple Team Do, Exactly?</li>
<li>(10:13) - There Are A Ton Of Sources Out Here</li>
<li>(49:55) - And Now For Some Crappy Code</li>
</ul>]]>
      </description>
      <content:encoded>
        <![CDATA[Do you know what your attackers know? 



There’s a good chance you know, but you might not be aware of just how much information can be found historically and in real-time about your business operations and organization. 



Join Jordan Drysdale and Kent Ickler as they discuss and demonstrate Purple Team Enterprise Reconnaissance methods that increase operational network awareness and overall security posture. 



Download slides: https://activecountermeasures.com/presentations



00:00 – Intro 



00:42 – Executive Problem Statement 



02:25 – Recon You Say? 



06:11 – Your Internal Friends… Sometimes 



09:01 – What Does Purple Team Do, Exactly? 



10:13 – There Are A Ton Of Sources Out Here 



49:55 – And Now For Some Crappy Code 



Learn how to monitor cloud services for your organizations’ data being dumped on the web, account compromises, and source code disclosure. 



Use external services to keep an eye on your external landscape to alert on unexpected changes. 



See configurations of operational awareness uncover potential attacker’s methodology and infrastructure to provide you an upper-hand in stopping threats before they escalate. 



See how an attacker utilizes common internet sources to gather intelligence about your technology stack, your perimeter security, your wireless networks, and plan attacks against your organization. 



Know what your attacker knows. 







Wild West Hackin’ Fest – Most Hands-On Infosec Con!







Join us at the new Way West Wild West Hackin’ Fest in San Diego — March 11-13th, 2020. Learn more: https://www.wildwesthackinfest.com/







Join the BHIS Blog Mailing List – get notified when we post new blogs, webcasts, and podcasts.



            
				Join 1,
<ul><li>(00:00) - Intro</li>
<li>(00:42) - Executive Problem Statement</li>
<li>(02:25) - Recon You Say?</li>
<li>(06:11) - Your Internal Friends... Sometimes</li>
<li>(09:01) - What Does Purple Team Do, Exactly?</li>
<li>(10:13) - There Are A Ton Of Sources Out Here</li>
<li>(49:55) - And Now For Some Crappy Code</li>
</ul>]]>
      </content:encoded>
      <pubDate>Wed, 19 Feb 2020 08:06:00 -0500</pubDate>
      <author>Black Hills Information Security</author>
      <enclosure url="https://media.transistor.fm/04949215/c221c115.mp3" length="31384714" type="audio/mpeg"/>
      <itunes:author>Black Hills Information Security</itunes:author>
      <itunes:image href="https://img.transistorcdn.com/9v77SpIEW_a_MckviGr6Y-viXBzlIgQ3aNfngl7wVLs/rs:fill:0:0:1/w:1400/h:1400/q:60/mb:500000/aHR0cHM6Ly9pbWct/dXBsb2FkLXByb2R1/Y3Rpb24udHJhbnNp/c3Rvci5mbS9jNDU2/NmYzMWIyNDI3NWU2/OGUwMmNhZGRkYWE5/MzI2Zi5qcGc.jpg"/>
      <itunes:duration>3697</itunes:duration>
      <itunes:summary>Do you know what your attackers know? 



There’s a good chance you know, but you might not be aware of just how much information can be found historically and in real-time about your business operations and organization. 



Join Jordan Drysdale and Kent Ickler as they discuss and demonstrate Purple Team Enterprise Reconnaissance methods that increase operational network awareness and overall security posture. 



Download slides: https://activecountermeasures.com/presentations



00:00 – Intro 



00:42 – Executive Problem Statement 



02:25 – Recon You Say? 



06:11 – Your Internal Friends… Sometimes 



09:01 – What Does Purple Team Do, Exactly? 



10:13 – There Are A Ton Of Sources Out Here 



49:55 – And Now For Some Crappy Code 



Learn how to monitor cloud services for your organizations’ data being dumped on the web, account compromises, and source code disclosure. 



Use external services to keep an eye on your external landscape to alert on unexpected changes. 



See configurations of operational awareness uncover potential attacker’s methodology and infrastructure to provide you an upper-hand in stopping threats before they escalate. 



See how an attacker utilizes common internet sources to gather intelligence about your technology stack, your perimeter security, your wireless networks, and plan attacks against your organization. 



Know what your attacker knows. 







Wild West Hackin’ Fest – Most Hands-On Infosec Con!







Join us at the new Way West Wild West Hackin’ Fest in San Diego — March 11-13th, 2020. Learn more: https://www.wildwesthackinfest.com/







Join the BHIS Blog Mailing List – get notified when we post new blogs, webcasts, and podcasts.



            
				Join 1,</itunes:summary>
      <itunes:subtitle>Do you know what your attackers know? 



There’s a good chance you know, but you might not be aware of just how much information can be found historically and in real-time about your business operations and organization. 



Join Jordan Drysdale and Kent</itunes:subtitle>
      <itunes:keywords>Infosec,Cybersecurity,news</itunes:keywords>
      <itunes:explicit>No</itunes:explicit>
      <podcast:chapters url="https://share.transistor.fm/s/04949215/chapters.json" type="application/json+chapters"/>
    </item>
    <item>
      <title>Webcast: Linux Command Line Dojo with Hal Pomeranz</title>
      <itunes:episode>1</itunes:episode>
      <podcast:episode>1</podcast:episode>
      <itunes:title>Webcast: Linux Command Line Dojo with Hal Pomeranz</itunes:title>
      <itunes:episodeType>full</itunes:episodeType>
      <guid isPermaLink="false">https://www.blackhillsinfosec.com/?p=14812</guid>
      <link>https://share.transistor.fm/s/98da740f</link>
      <description>
        <![CDATA[In this webcast, we have our friend Hal Pomeranz sharing his massive knowledge on Linux. If you’re new to Linux, or if you know it and just want to hear from Hal’s years of using and teaching all things Linux, then this is the webcast for you.   



Download slides: http://www.deer-run.com/~hal/CLDojo.pdf  



0:00 – Intro to Hal 9000 



4:05 – It’s A UNIX System 



7:34 – Who’s Trying Naughty URLS? 



27:07 – Care About the Environment 



48:24 – Questions &amp; Answers 



From Hal: 



The Linux command-line is an amazingly powerful programming environment. 



Mastering its functionality can make you enormously more productive. 



Sensei Hal gives you critical insights into tackling difficult command-line challenges in this fast-paced and entertaining presentation.



Who is Hal? Hal Pomeranz is the Founder and Technical Lead of Deer Run Associates, a consulting company focusing on Computer Forensic Investigations and Information Security. He has spent more than twenty years providing pragmatic Information Technology and Security solutions for some of the world’s largest commercial, government, and academic institutions. An expert in the investigation of Linux/Unix systems, Hal has provided Computer Forensic investigative support for several high-profile cases to both law enforcement and commercial clients. 







Wild West Hackin’ Fest – Most Hands-On Infosec Con!







Join us at the new Way West Wild West Hackin’ Fest in San Diego — March 11-13th, 2020. Learn more: https://www.wildwesthackinfest.com/







Join the BHIS Blog Mailing List – get notified when we post new blogs, webcasts, and podcasts.



            
				Join 1,975 other subscribers
                    
                        
							Email Address
<ul><li>(00:00) - Intro to Hal 9000</li>
<li>(04:05) - It's A UNIX System</li>
<li>(07:34) - Who's Trying Naughty URLS?</li>
<li>(27:07) - Care About the Environment</li>
<li>(48:24) - Questions &amp; Answers</li>
</ul>]]>
      </description>
      <content:encoded>
        <![CDATA[In this webcast, we have our friend Hal Pomeranz sharing his massive knowledge on Linux. If you’re new to Linux, or if you know it and just want to hear from Hal’s years of using and teaching all things Linux, then this is the webcast for you.   



Download slides: http://www.deer-run.com/~hal/CLDojo.pdf  



0:00 – Intro to Hal 9000 



4:05 – It’s A UNIX System 



7:34 – Who’s Trying Naughty URLS? 



27:07 – Care About the Environment 



48:24 – Questions &amp; Answers 



From Hal: 



The Linux command-line is an amazingly powerful programming environment. 



Mastering its functionality can make you enormously more productive. 



Sensei Hal gives you critical insights into tackling difficult command-line challenges in this fast-paced and entertaining presentation.



Who is Hal? Hal Pomeranz is the Founder and Technical Lead of Deer Run Associates, a consulting company focusing on Computer Forensic Investigations and Information Security. He has spent more than twenty years providing pragmatic Information Technology and Security solutions for some of the world’s largest commercial, government, and academic institutions. An expert in the investigation of Linux/Unix systems, Hal has provided Computer Forensic investigative support for several high-profile cases to both law enforcement and commercial clients. 







Wild West Hackin’ Fest – Most Hands-On Infosec Con!







Join us at the new Way West Wild West Hackin’ Fest in San Diego — March 11-13th, 2020. Learn more: https://www.wildwesthackinfest.com/







Join the BHIS Blog Mailing List – get notified when we post new blogs, webcasts, and podcasts.



            
				Join 1,975 other subscribers
                    
                        
							Email Address
<ul><li>(00:00) - Intro to Hal 9000</li>
<li>(04:05) - It's A UNIX System</li>
<li>(07:34) - Who's Trying Naughty URLS?</li>
<li>(27:07) - Care About the Environment</li>
<li>(48:24) - Questions &amp; Answers</li>
</ul>]]>
      </content:encoded>
      <pubDate>Mon, 17 Feb 2020 08:05:00 -0500</pubDate>
      <author>Black Hills Information Security</author>
      <enclosure url="https://media.transistor.fm/98da740f/958b2585.mp3" length="29482450" type="audio/mpeg"/>
      <itunes:author>Black Hills Information Security</itunes:author>
      <itunes:image href="https://img.transistorcdn.com/aFQIs5GMwPOQe_iHF8FvV_x3DAFecRtPbgE9-jeKIz8/rs:fill:0:0:1/w:1400/h:1400/q:60/mb:500000/aHR0cHM6Ly9pbWct/dXBsb2FkLXByb2R1/Y3Rpb24udHJhbnNp/c3Rvci5mbS9kYjNk/YTJiMDMyZGU2YzMx/MzYyZjQyZjEwZGZm/MTgyMS5qcGc.jpg"/>
      <itunes:duration>3601</itunes:duration>
      <itunes:summary>In this webcast, we have our friend Hal Pomeranz sharing his massive knowledge on Linux. If you’re new to Linux, or if you know it and just want to hear from Hal’s years of using and teaching all things Linux, then this is the webcast for you.   



Download slides: http://www.deer-run.com/~hal/CLDojo.pdf  



0:00 – Intro to Hal 9000 



4:05 – It’s A UNIX System 



7:34 – Who’s Trying Naughty URLS? 



27:07 – Care About the Environment 



48:24 – Questions &amp;amp; Answers 



From Hal: 



The Linux command-line is an amazingly powerful programming environment. 



Mastering its functionality can make you enormously more productive. 



Sensei Hal gives you critical insights into tackling difficult command-line challenges in this fast-paced and entertaining presentation.



Who is Hal? Hal Pomeranz is the Founder and Technical Lead of Deer Run Associates, a consulting company focusing on Computer Forensic Investigations and Information Security. He has spent more than twenty years providing pragmatic Information Technology and Security solutions for some of the world’s largest commercial, government, and academic institutions. An expert in the investigation of Linux/Unix systems, Hal has provided Computer Forensic investigative support for several high-profile cases to both law enforcement and commercial clients. 







Wild West Hackin’ Fest – Most Hands-On Infosec Con!







Join us at the new Way West Wild West Hackin’ Fest in San Diego — March 11-13th, 2020. Learn more: https://www.wildwesthackinfest.com/







Join the BHIS Blog Mailing List – get notified when we post new blogs, webcasts, and podcasts.



            
				Join 1,975 other subscribers
                    
                        
							Email Address</itunes:summary>
      <itunes:subtitle>In this webcast, we have our friend Hal Pomeranz sharing his massive knowledge on Linux. If you’re new to Linux, or if you know it and just want to hear from Hal’s years of using and teaching all things Linux, then this is the webcast for you.   



Downl</itunes:subtitle>
      <itunes:keywords>Infosec,Cybersecurity,news</itunes:keywords>
      <itunes:explicit>No</itunes:explicit>
      <podcast:chapters url="https://share.transistor.fm/s/98da740f/chapters.json" type="application/json+chapters"/>
    </item>
    <item>
      <title>Webcast: Introducing Competitive Backdoors &amp; Breaches and More!</title>
      <itunes:episode>1</itunes:episode>
      <podcast:episode>1</podcast:episode>
      <itunes:title>Webcast: Introducing Competitive Backdoors &amp; Breaches and More!</itunes:title>
      <itunes:episodeType>full</itunes:episodeType>
      <guid isPermaLink="false">https://www.blackhillsinfosec.com/?p=14791</guid>
      <link>https://share.transistor.fm/s/6ad81b7f</link>
      <description>
        <![CDATA[Backdoors &amp; Breaches kind of took off. 



In case you don’t know, Backdoors &amp; Breaches is an Incident Response Card Game to help people better understand the various attacks and defenses used in security today. 



We have sold out twice on Amazon, given out thousands of copies for free at conferences, and sent 2,000+ free decks to infosec educators (with a few thousand more decks to go). 



As a standalone game, with an Incident Master driving the narrative, it works really well. 



However, we have something else that we have been working on… Competitive Backdoors &amp; Breaches. 



Yes, you can play this game against your co-workers. It just takes at least two decks. 



In this live webcast, we will be covering: advice for being an Incident Master; playing the regular game with remote teammates; answering many of your questions about gameplay; and introducing the rules on how to play this game competitively against another player.  



Download slides: https://www.activecountermeasures.com/presentations 



4:38 – Ok, But Why? 



5:55 – State of Play



9:27 – Initial Compromise Card 



10:31 – Persistence Card 



11:53 – C2 and EXFIL Card 



14:01 – Pivot and Escalate Card 



14:36 – Procedures Card 



16:27 – State of Play 



17:51 – Initial Setup 



20:13 – Resource Points (RP) 



25:41 – Building the Kill Chain
<ul><li>(00:00) - Kinda Goofy</li>
<li>(04:38) - Ok, But Why?</li>
<li>(05:55) - State of Play</li>
<li>(09:27) - Initial Compromise Card</li>
<li>(10:31) - Persistence Card</li>
<li>(11:53) - C2 and EXFIL Card</li>
<li>(14:01) - Pivot and Escalate Card</li>
<li>(14:36) - Procedures Card</li>
<li>(16:27) - State of Play</li>
<li>(17:51) - Initial Setup</li>
<li>(20:13) - Resource Points (RP)</li>
<li>(25:41) - Building the Kill Chain</li>
<li>(28:20) - Attack in Depth</li>
<li>(29:20) - Completing the Kill Chain</li>
<li>(31:31) - Defend Rolls</li>
<li>(34:33) - For Example</li>
<li>(37:29) - Let's Play a Game</li>
<li>(47:39) - Any Questions?</li>
</ul>]]>
      </description>
      <content:encoded>
        <![CDATA[Backdoors &amp; Breaches kind of took off. 



In case you don’t know, Backdoors &amp; Breaches is an Incident Response Card Game to help people better understand the various attacks and defenses used in security today. 



We have sold out twice on Amazon, given out thousands of copies for free at conferences, and sent 2,000+ free decks to infosec educators (with a few thousand more decks to go). 



As a standalone game, with an Incident Master driving the narrative, it works really well. 



However, we have something else that we have been working on… Competitive Backdoors &amp; Breaches. 



Yes, you can play this game against your co-workers. It just takes at least two decks. 



In this live webcast, we will be covering: advice for being an Incident Master; playing the regular game with remote teammates; answering many of your questions about gameplay; and introducing the rules on how to play this game competitively against another player.  



Download slides: https://www.activecountermeasures.com/presentations 



4:38 – Ok, But Why? 



5:55 – State of Play



9:27 – Initial Compromise Card 



10:31 – Persistence Card 



11:53 – C2 and EXFIL Card 



14:01 – Pivot and Escalate Card 



14:36 – Procedures Card 



16:27 – State of Play 



17:51 – Initial Setup 



20:13 – Resource Points (RP) 



25:41 – Building the Kill Chain
<ul><li>(00:00) - Kinda Goofy</li>
<li>(04:38) - Ok, But Why?</li>
<li>(05:55) - State of Play</li>
<li>(09:27) - Initial Compromise Card</li>
<li>(10:31) - Persistence Card</li>
<li>(11:53) - C2 and EXFIL Card</li>
<li>(14:01) - Pivot and Escalate Card</li>
<li>(14:36) - Procedures Card</li>
<li>(16:27) - State of Play</li>
<li>(17:51) - Initial Setup</li>
<li>(20:13) - Resource Points (RP)</li>
<li>(25:41) - Building the Kill Chain</li>
<li>(28:20) - Attack in Depth</li>
<li>(29:20) - Completing the Kill Chain</li>
<li>(31:31) - Defend Rolls</li>
<li>(34:33) - For Example</li>
<li>(37:29) - Let's Play a Game</li>
<li>(47:39) - Any Questions?</li>
</ul>]]>
      </content:encoded>
      <pubDate>Wed, 12 Feb 2020 08:11:00 -0500</pubDate>
      <author>Black Hills Information Security</author>
      <enclosure url="https://media.transistor.fm/6ad81b7f/f493a752.mp3" length="33567511" type="audio/mpeg"/>
      <itunes:author>Black Hills Information Security</itunes:author>
      <itunes:image href="https://img.transistorcdn.com/n3Rw2Go7mnZIbSxsoRr-8MPe4XZFBZP_NuHweQDMQg8/rs:fill:0:0:1/w:1400/h:1400/q:60/mb:500000/aHR0cHM6Ly9pbWct/dXBsb2FkLXByb2R1/Y3Rpb24udHJhbnNp/c3Rvci5mbS8wY2Ni/NmVkZGU3YjE0YWIx/MWFkNGQ4YjljOTZj/MGU5YS5qcGc.jpg"/>
      <itunes:duration>3798</itunes:duration>
      <itunes:summary>Backdoors &amp;amp; Breaches kind of took off. 



In case you don’t know, Backdoors &amp;amp; Breaches is an Incident Response Card Game to help people better understand the various attacks and defenses used in security today. 



We have sold out twice on Amazon, given out thousands of copies for free at conferences, and sent 2,000+ free decks to infosec educators (with a few thousand more decks to go). 



As a standalone game, with an Incident Master driving the narrative, it works really well. 



However, we have something else that we have been working on… Competitive Backdoors &amp;amp; Breaches. 



Yes, you can play this game against your co-workers. It just takes at least two decks. 



In this live webcast, we will be covering: advice for being an Incident Master; playing the regular game with remote teammates; answering many of your questions about gameplay; and introducing the rules on how to play this game competitively against another player.  



Download slides: https://www.activecountermeasures.com/presentations 



4:38 – Ok, But Why? 



5:55 – State of Play



9:27 – Initial Compromise Card 



10:31 – Persistence Card 



11:53 – C2 and EXFIL Card 



14:01 – Pivot and Escalate Card 



14:36 – Procedures Card 



16:27 – State of Play 



17:51 – Initial Setup 



20:13 – Resource Points (RP) 



25:41 – Building the Kill Chain</itunes:summary>
      <itunes:subtitle>Backdoors &amp;amp; Breaches kind of took off. 



In case you don’t know, Backdoors &amp;amp; Breaches is an Incident Response Card Game to help people better understand the various attacks and defenses used in security today. 



We have sold out twice on Amazo</itunes:subtitle>
      <itunes:keywords>Infosec,Cybersecurity,news</itunes:keywords>
      <itunes:explicit>No</itunes:explicit>
      <podcast:chapters url="https://share.transistor.fm/s/6ad81b7f/chapters.json" type="application/json+chapters"/>
    </item>
    <item>
      <title>Webcast: Getting Started in Cyber Deception</title>
      <itunes:episode>1</itunes:episode>
      <podcast:episode>1</podcast:episode>
      <itunes:title>Webcast: Getting Started in Cyber Deception</itunes:title>
      <itunes:episodeType>full</itunes:episodeType>
      <guid isPermaLink="false">https://www.blackhillsinfosec.com/?p=14799</guid>
      <link>https://share.transistor.fm/s/5c520e56</link>
      <description>
        <![CDATA[Ever wanted to get started in cyber deception? Ever wanted to do it for free? 



In this BHIS webcast, we will cover some basic, legal, and easy tools/techniques to get you started in working with low interaction honeypots to serve as an early warning of attacks. 



We will also be sharing a recipe for making wine out of pentester tears. Because attacker tears make the best wine. 



Download slides: https://www.activecountermeasures.com/presentations/



1:00 – A Few Cool Things 



6:00 – Beginnings of Cyber Deception 



9:08 – Conversations 



16:34 – Canarytokens 



18:42 – Scenario: Recon 



23:02 – .exe 



36:13 – Cloned Websites! 



39:07 – Word Docs!!! 



47:41 – One Step Forward 



51:58 – Honeybadger Update 



53:56 – Back To Threat Intel; How BHIS Uses It 



56:03 – Questions 



 This webcast was originally recorded live on January 23, 2020 with John Strand. 







Wild West Hackin’ Fest – Most Hands-On Infosec Con!
<ul><li>(00:00) - Introduction</li>
<li>(01:00) - A Few Cool Things</li>
<li>(06:00) - Beginnings of Cyber Deception</li>
<li>(09:08) - Conversations</li>
<li>(16:34) - Canarytokens</li>
<li>(18:42) - Scenario: Recon</li>
<li>(23:02) - .exe</li>
<li>(36:13) - Cloned Websites!</li>
<li>(39:07) - Word Docs!!!</li>
<li>(47:41) - One Step Forward</li>
<li>(51:58) - Honeybadger Update</li>
<li>(53:56) - Back To Threat Intel</li>
<li>(55:21) - How We Use It</li>
<li>(56:03) - Questions</li>
</ul>]]>
      </description>
      <content:encoded>
        <![CDATA[Ever wanted to get started in cyber deception? Ever wanted to do it for free? 



In this BHIS webcast, we will cover some basic, legal, and easy tools/techniques to get you started in working with low interaction honeypots to serve as an early warning of attacks. 



We will also be sharing a recipe for making wine out of pentester tears. Because attacker tears make the best wine. 



Download slides: https://www.activecountermeasures.com/presentations/



1:00 – A Few Cool Things 



6:00 – Beginnings of Cyber Deception 



9:08 – Conversations 



16:34 – Canarytokens 



18:42 – Scenario: Recon 



23:02 – .exe 



36:13 – Cloned Websites! 



39:07 – Word Docs!!! 



47:41 – One Step Forward 



51:58 – Honeybadger Update 



53:56 – Back To Threat Intel; How BHIS Uses It 



56:03 – Questions 



 This webcast was originally recorded live on January 23, 2020 with John Strand. 







Wild West Hackin’ Fest – Most Hands-On Infosec Con!
<ul><li>(00:00) - Introduction</li>
<li>(01:00) - A Few Cool Things</li>
<li>(06:00) - Beginnings of Cyber Deception</li>
<li>(09:08) - Conversations</li>
<li>(16:34) - Canarytokens</li>
<li>(18:42) - Scenario: Recon</li>
<li>(23:02) - .exe</li>
<li>(36:13) - Cloned Websites!</li>
<li>(39:07) - Word Docs!!!</li>
<li>(47:41) - One Step Forward</li>
<li>(51:58) - Honeybadger Update</li>
<li>(53:56) - Back To Threat Intel</li>
<li>(55:21) - How We Use It</li>
<li>(56:03) - Questions</li>
</ul>]]>
      </content:encoded>
      <pubDate>Mon, 10 Feb 2020 08:07:00 -0500</pubDate>
      <author>Black Hills Information Security</author>
      <enclosure url="https://media.transistor.fm/5c520e56/7fd2e4ba.mp3" length="30339854" type="audio/mpeg"/>
      <itunes:author>Black Hills Information Security</itunes:author>
      <itunes:image href="https://img.transistorcdn.com/t8hPGEvY-yOHM0RVKJJK4PQ33Ktfqk9CxXX0930HSSs/rs:fill:0:0:1/w:1400/h:1400/q:60/mb:500000/aHR0cHM6Ly9pbWct/dXBsb2FkLXByb2R1/Y3Rpb24udHJhbnNp/c3Rvci5mbS8wNjAz/ZTAyYTIwNGQzYTBk/ODcxZjYyNTYxMGE2/NzViMy5qcGc.jpg"/>
      <itunes:duration>3561</itunes:duration>
      <itunes:summary>Ever wanted to get started in cyber deception? Ever wanted to do it for free? 



In this BHIS webcast, we will cover some basic, legal, and easy tools/techniques to get you started in working with low interaction honeypots to serve as an early warning of attacks. 



We will also be sharing a recipe for making wine out of pentester tears. Because attacker tears make the best wine. 



Download slides: https://www.activecountermeasures.com/presentations/



1:00 – A Few Cool Things 



6:00 – Beginnings of Cyber Deception 



9:08 – Conversations 



16:34 – Canarytokens 



18:42 – Scenario: Recon 



23:02 – .exe 



36:13 – Cloned Websites! 



39:07 – Word Docs!!! 



47:41 – One Step Forward 



51:58 – Honeybadger Update 



53:56 – Back To Threat Intel; How BHIS Uses It 



56:03 – Questions 



 This webcast was originally recorded live on January 23, 2020 with John Strand. 







Wild West Hackin’ Fest – Most Hands-On Infosec Con!</itunes:summary>
      <itunes:subtitle>Ever wanted to get started in cyber deception? Ever wanted to do it for free? 



In this BHIS webcast, we will cover some basic, legal, and easy tools/techniques to get you started in working with low interaction honeypots to serve as an early warning of</itunes:subtitle>
      <itunes:keywords>Infosec,Cybersecurity,news</itunes:keywords>
      <itunes:explicit>No</itunes:explicit>
      <podcast:chapters url="https://share.transistor.fm/s/5c520e56/chapters.json" type="application/json+chapters"/>
    </item>
    <item>
      <title>Webcast: Passwords: You Are the Weakest Link</title>
      <itunes:episode>1</itunes:episode>
      <podcast:episode>1</podcast:episode>
      <itunes:title>Webcast: Passwords: You Are the Weakest Link</itunes:title>
      <itunes:episodeType>full</itunes:episodeType>
      <guid isPermaLink="false">https://www.blackhillsinfosec.com/?p=14363</guid>
      <link>https://share.transistor.fm/s/a137b582</link>
      <description>
        <![CDATA[https://media.blubrry.com/bhis/content.blubrry.com/bhis/BHIS_Podcast_Passwords_Youaretheweakestlink.mp3




Why are companies still recommending an 8-character password minimum?   



Passwords are some of the easiest targets for attackers, yet companies still allow weak passwords in their environment. Multiple service providers recommend 8-character minimum passwords based on outdated data.   



Download Slides: https://www.activecountermeasures.com/presentations  



Originally recorded as a live webcast on December 5th, 2019



Presented by: Darin Roberts &amp; CJ Cox



Because of newer attack methods and increased computing power, password minimums need to be increased to 15 characters to keep networks safe.  



On this BHIS Webcast, Darin &amp; CJ discuss: 



* Current password policies: BHIS recommendations, Microsoft, Google, Apple, NIST * Why do we recommend 15 characters – brute force, password crack, LM Hash * Passphrase vs. password * Recommended password policy summary 







Wild West Hackin’ Fest – Most Hands-On Infosec Con!







Join us at the new Way West Wild West Hackin’ Fest in San Diego — March 11-13th, 2020. Learn more: https://www.wildwesthackinfest.com/







Join the BHIS Blog Mailing List – get notified when we post new blogs, webcasts, and podcasts.



            
				Join 1,896 other subscribers
                    
                        
							Email Address                        
                        
                    

                    
                        
                        
                        
                        
						                        
	                        Subscribe
<ul><li>(00:00) - Start</li>
<li>(01:04) - Introduction</li>
<li>(03:26) - In The Beginning</li>
<li>(04:23) - What The Experts Say : PCI</li>
<li>(05:55) - What The Experts Say : Microsoft</li>
<li>(09:29) - What The Experts Say : NIST</li>
<li>(16:01) - What The Experts Say : Google</li>
<li>(16:28) - What The Experts Say : Apple</li>
<li>(16:42) - Still More Experts</li>
<li>(17:49) - Why 15 Characters</li>
<li>(18:06) - Brute Force</li>
<li>(18:44) - Password Spray</li>
<li>(22:48) - Password Cracking</li>
<li>(23:25) - A Hashing Algorithm</li>
<li>(24:07) - More About Hashes</li>
<li>(25:49) - So What Is Password Cracking</li>
<li>(27:16) - Windows Hashes</li>
<li>(27:42) - The LM Hashing Algorithm</li>
<li>(29:46) - LM Hash Is "Weak"</li>
<li>(30:55) - LM Vs. NTLM Cracking</li>
<li>(31:14) - Why 15 Character Passwords – Answer</li>
<li>(32:06) - CJ's Response to the Problem</li>
<li>(36:32) - Let's See the Mathm</li>
<li>(37:09) - Math Examples</li>
<li>(40:30) - From the Field</li>
<li>(42:47) - Would You Like To Play A Game?</li>
<li>(45:03) - Take Aways</li>
<li>(46:46) - Are You Really Going To Let This Guy Decide</li>
<li>(48:33) - Audience Questions &amp; Comments</li>
</ul>]]>
      </description>
      <content:encoded>
        <![CDATA[https://media.blubrry.com/bhis/content.blubrry.com/bhis/BHIS_Podcast_Passwords_Youaretheweakestlink.mp3




Why are companies still recommending an 8-character password minimum?   



Passwords are some of the easiest targets for attackers, yet companies still allow weak passwords in their environment. Multiple service providers recommend 8-character minimum passwords based on outdated data.   



Download Slides: https://www.activecountermeasures.com/presentations  



Originally recorded as a live webcast on December 5th, 2019



Presented by: Darin Roberts &amp; CJ Cox



Because of newer attack methods and increased computing power, password minimums need to be increased to 15 characters to keep networks safe.  



On this BHIS Webcast, Darin &amp; CJ discuss: 



* Current password policies: BHIS recommendations, Microsoft, Google, Apple, NIST * Why do we recommend 15 characters – brute force, password crack, LM Hash * Passphrase vs. password * Recommended password policy summary 







Wild West Hackin’ Fest – Most Hands-On Infosec Con!







Join us at the new Way West Wild West Hackin’ Fest in San Diego — March 11-13th, 2020. Learn more: https://www.wildwesthackinfest.com/







Join the BHIS Blog Mailing List – get notified when we post new blogs, webcasts, and podcasts.



            
				Join 1,896 other subscribers
                    
                        
							Email Address                        
                        
                    

                    
                        
                        
                        
                        
						                        
	                        Subscribe
<ul><li>(00:00) - Start</li>
<li>(01:04) - Introduction</li>
<li>(03:26) - In The Beginning</li>
<li>(04:23) - What The Experts Say : PCI</li>
<li>(05:55) - What The Experts Say : Microsoft</li>
<li>(09:29) - What The Experts Say : NIST</li>
<li>(16:01) - What The Experts Say : Google</li>
<li>(16:28) - What The Experts Say : Apple</li>
<li>(16:42) - Still More Experts</li>
<li>(17:49) - Why 15 Characters</li>
<li>(18:06) - Brute Force</li>
<li>(18:44) - Password Spray</li>
<li>(22:48) - Password Cracking</li>
<li>(23:25) - A Hashing Algorithm</li>
<li>(24:07) - More About Hashes</li>
<li>(25:49) - So What Is Password Cracking</li>
<li>(27:16) - Windows Hashes</li>
<li>(27:42) - The LM Hashing Algorithm</li>
<li>(29:46) - LM Hash Is "Weak"</li>
<li>(30:55) - LM Vs. NTLM Cracking</li>
<li>(31:14) - Why 15 Character Passwords – Answer</li>
<li>(32:06) - CJ's Response to the Problem</li>
<li>(36:32) - Let's See the Mathm</li>
<li>(37:09) - Math Examples</li>
<li>(40:30) - From the Field</li>
<li>(42:47) - Would You Like To Play A Game?</li>
<li>(45:03) - Take Aways</li>
<li>(46:46) - Are You Really Going To Let This Guy Decide</li>
<li>(48:33) - Audience Questions &amp; Comments</li>
</ul>]]>
      </content:encoded>
      <pubDate>Fri, 17 Jan 2020 08:38:51 -0500</pubDate>
      <author>Black Hills Information Security</author>
      <enclosure url="https://media.transistor.fm/a137b582/f14d1c07.mp3" length="33502931" type="audio/mpeg"/>
      <itunes:author>Black Hills Information Security</itunes:author>
      <itunes:image href="https://img.transistorcdn.com/m10WAVpQ62XfPRH3u2Bl5_JKBR1jV0ZErdatvuwbDf0/rs:fill:0:0:1/w:1400/h:1400/q:60/mb:500000/aHR0cHM6Ly9pbWct/dXBsb2FkLXByb2R1/Y3Rpb24udHJhbnNp/c3Rvci5mbS81ODU2/YmZiZjZiNGUyYTcw/NjBlMjBhMzcwZjgx/ODVjZC5qcGc.jpg"/>
      <itunes:duration>3615</itunes:duration>
      <itunes:summary>https://media.blubrry.com/bhis/content.blubrry.com/bhis/BHIS_Podcast_Passwords_Youaretheweakestlink.mp3




Why are companies still recommending an 8-character password minimum?   



Passwords are some of the easiest targets for attackers, yet companies still allow weak passwords in their environment. Multiple service providers recommend 8-character minimum passwords based on outdated data.   



Download Slides: https://www.activecountermeasures.com/presentations  



Originally recorded as a live webcast on December 5th, 2019



Presented by: Darin Roberts &amp;amp; CJ Cox



Because of newer attack methods and increased computing power, password minimums need to be increased to 15 characters to keep networks safe.  



On this BHIS Webcast, Darin &amp;amp; CJ discuss: 



* Current password policies: BHIS recommendations, Microsoft, Google, Apple, NIST * Why do we recommend 15 characters – brute force, password crack, LM Hash * Passphrase vs. password * Recommended password policy summary 







Wild West Hackin’ Fest – Most Hands-On Infosec Con!







Join us at the new Way West Wild West Hackin’ Fest in San Diego — March 11-13th, 2020. Learn more: https://www.wildwesthackinfest.com/







Join the BHIS Blog Mailing List – get notified when we post new blogs, webcasts, and podcasts.



            
				Join 1,896 other subscribers
                    
                        
							Email Address                        
                        
                    

                    
                        
                        
                        
                        
						                        
	                        Subscribe</itunes:summary>
      <itunes:subtitle>https://media.blubrry.com/bhis/content.blubrry.com/bhis/BHIS_Podcast_Passwords_Youaretheweakestlink.mp3




Why are companies still recommending an 8-character password minimum?   



Passwords are some of the easiest targets for attackers, yet companies </itunes:subtitle>
      <itunes:keywords>Infosec,Cybersecurity,news</itunes:keywords>
      <itunes:explicit>No</itunes:explicit>
      <podcast:chapters url="https://share.transistor.fm/s/a137b582/chapters.json" type="application/json+chapters"/>
    </item>
    <item>
      <title>Webcast: Sacred Cash Cow Tipping 2020</title>
      <itunes:episode>1</itunes:episode>
      <podcast:episode>1</podcast:episode>
      <itunes:title>Webcast: Sacred Cash Cow Tipping 2020</itunes:title>
      <itunes:episodeType>full</itunes:episodeType>
      <guid isPermaLink="false">https://www.blackhillsinfosec.com/?p=14583</guid>
      <link>https://share.transistor.fm/s/8b96d62b</link>
      <description>
        <![CDATA[Want to learn how attackers bypass endpoint products?    



Download slides:  https://www.activecountermeasures.com/presentations/ 



3:41 – Alternate Interpreters 



9:19 – Carbon Black Config Issue 



15:07 – Cisco AMP EDR – Quick and Easy Bypass 



18:24 – PowerShell AMSI Bypass – Rhino 



19:07 – CylancePROTECT Bypass 



24:14 – Windows Defender and Carbon Black Bypass 



30:36 – Windows Subsystem for Linux 



39:59 – PowerShell HTTP Web Cradle for Downloads 



Last year we came to the conclusion that we are going to keep going with the Sacred Cash Cow Tipping Webcast series. Why? Because many in the industry still believe that security is something that can be achieved through the purchase of a single product.   



To that end, we feel there is still a need to deconstruct certain parts of security (like AV) and show that there are always structural weaknesses in every security product that is implemented.   



This is becoming even more important now that many of the advanced endpoint products are not just fire-and-forget but have an endless array of different configurations that enable a company to shoot themselves in the foot by reducing the overall effectiveness of these products.   



So, yes, Sacred Cash Cow Tipping is more important than ever.   



To that end, our next webcast will be on bypassing endpoint security products.  The goal of this webcast is to help show people that there is still no silver bullet in security.  We also desperately want to show that configuration and monitoring still matters.  



This is our first webcast of the year. It may run longer than 60 minutes. It will be recorded. We will have a team of Black Hills Testers answering questions throughout the webcast. We have room for 3,000 attendees, so you will be able to attend live if you want. 







Wild West Hackin’ Fest – Most Hands-On Infosec Con!







Join us at the new Way West Wild West Hackin’ Fest in San Diego — March 11-13th, 2020. Learn more: https://www.
<ul><li>(00:00) - Intro</li>
<li>(03:41) - Alternate Interpreters</li>
<li>(09:19) - Carbon Black Config Issue</li>
<li>(15:07) - Cisco AMP EDR - Quick and Easy Bypass</li>
<li>(18:24) - PowerShell AMSI Bypass – Rhino</li>
<li>(19:07) - CylancePROTECT Bypass</li>
<li>(24:14) - WIndows Defender and Carbon Black Bypass</li>
<li>(30:36) - Windows Subsystem for Linux</li>
<li>(39:59) - PowerShell HTTP Web Cradle for Donwloads</li>
</ul>]]>
      </description>
      <content:encoded>
        <![CDATA[Want to learn how attackers bypass endpoint products?    



Download slides:  https://www.activecountermeasures.com/presentations/ 



3:41 – Alternate Interpreters 



9:19 – Carbon Black Config Issue 



15:07 – Cisco AMP EDR – Quick and Easy Bypass 



18:24 – PowerShell AMSI Bypass – Rhino 



19:07 – CylancePROTECT Bypass 



24:14 – Windows Defender and Carbon Black Bypass 



30:36 – Windows Subsystem for Linux 



39:59 – PowerShell HTTP Web Cradle for Downloads 



Last year we came to the conclusion that we are going to keep going with the Sacred Cash Cow Tipping Webcast series. Why? Because many in the industry still believe that security is something that can be achieved through the purchase of a single product.   



To that end, we feel there is still a need to deconstruct certain parts of security (like AV) and show that there are always structural weaknesses in every security product that is implemented.   



This is becoming even more important now that many of the advanced endpoint products are not just fire-and-forget but have an endless array of different configurations that enable a company to shoot themselves in the foot by reducing the overall effectiveness of these products.   



So, yes, Sacred Cash Cow Tipping is more important than ever.   



To that end, our next webcast will be on bypassing endpoint security products.  The goal of this webcast is to help show people that there is still no silver bullet in security.  We also desperately want to show that configuration and monitoring still matters.  



This is our first webcast of the year. It may run longer than 60 minutes. It will be recorded. We will have a team of Black Hills Testers answering questions throughout the webcast. We have room for 3,000 attendees, so you will be able to attend live if you want. 







Wild West Hackin’ Fest – Most Hands-On Infosec Con!







Join us at the new Way West Wild West Hackin’ Fest in San Diego — March 11-13th, 2020. Learn more: https://www.
<ul><li>(00:00) - Intro</li>
<li>(03:41) - Alternate Interpreters</li>
<li>(09:19) - Carbon Black Config Issue</li>
<li>(15:07) - Cisco AMP EDR - Quick and Easy Bypass</li>
<li>(18:24) - PowerShell AMSI Bypass – Rhino</li>
<li>(19:07) - CylancePROTECT Bypass</li>
<li>(24:14) - WIndows Defender and Carbon Black Bypass</li>
<li>(30:36) - Windows Subsystem for Linux</li>
<li>(39:59) - PowerShell HTTP Web Cradle for Donwloads</li>
</ul>]]>
      </content:encoded>
      <pubDate>Tue, 14 Jan 2020 12:36:43 -0500</pubDate>
      <author>Black Hills Information Security</author>
      <enclosure url="https://media.transistor.fm/8b96d62b/9bf85169.mp3" length="30805674" type="audio/mpeg"/>
      <itunes:author>Black Hills Information Security</itunes:author>
      <itunes:image href="https://img.transistorcdn.com/jNDO8RkeC0VnnwUImB1cVolM0W9irdKPNRPK7lI6MVg/rs:fill:0:0:1/w:1400/h:1400/q:60/mb:500000/aHR0cHM6Ly9pbWct/dXBsb2FkLXByb2R1/Y3Rpb24udHJhbnNp/c3Rvci5mbS8yZjM0/MzA5MThlZTM3ZmIw/YTU0ZThjZDNkYzNi/MTBjYy5qcGc.jpg"/>
      <itunes:duration>3634</itunes:duration>
      <itunes:summary>Want to learn how attackers bypass endpoint products?    



Download slides:  https://www.activecountermeasures.com/presentations/ 



3:41 – Alternate Interpreters 



9:19 – Carbon Black Config Issue 



15:07 – Cisco AMP EDR – Quick and Easy Bypass 



18:24 – PowerShell AMSI Bypass – Rhino 



19:07 – CylancePROTECT Bypass 



24:14 – Windows Defender and Carbon Black Bypass 



30:36 – Windows Subsystem for Linux 



39:59 – PowerShell HTTP Web Cradle for Downloads 



Last year we came to the conclusion that we are going to keep going with the Sacred Cash Cow Tipping Webcast series. Why? Because many in the industry still believe that security is something that can be achieved through the purchase of a single product.   



To that end, we feel there is still a need to deconstruct certain parts of security (like AV) and show that there are always structural weaknesses in every security product that is implemented.   



This is becoming even more important now that many of the advanced endpoint products are not just fire-and-forget but have an endless array of different configurations that enable a company to shoot themselves in the foot by reducing the overall effectiveness of these products.   



So, yes, Sacred Cash Cow Tipping is more important than ever.   



To that end, our next webcast will be on bypassing endpoint security products.  The goal of this webcast is to help show people that there is still no silver bullet in security.  We also desperately want to show that configuration and monitoring still matters.  



This is our first webcast of the year. It may run longer than 60 minutes. It will be recorded. We will have a team of Black Hills Testers answering questions throughout the webcast. We have room for 3,000 attendees, so you will be able to attend live if you want. 







Wild West Hackin’ Fest – Most Hands-On Infosec Con!







Join us at the new Way West Wild West Hackin’ Fest in San Diego — March 11-13th, 2020. Learn more: https://www.</itunes:summary>
      <itunes:subtitle>Want to learn how attackers bypass endpoint products?    



Download slides:  https://www.activecountermeasures.com/presentations/ 



3:41 – Alternate Interpreters 



9:19 – Carbon Black Config Issue 



15:07 – Cisco AMP EDR – Quick and Easy Bypass 

</itunes:subtitle>
      <itunes:keywords>Infosec,Cybersecurity,news</itunes:keywords>
      <itunes:explicit>No</itunes:explicit>
      <podcast:chapters url="https://share.transistor.fm/s/8b96d62b/chapters.json" type="application/json+chapters"/>
    </item>
    <item>
      <title>Webcast: Let’s Talk About ELK Baby, Let’s Talk About You and AD</title>
      <itunes:episode>1</itunes:episode>
      <podcast:episode>1</podcast:episode>
      <itunes:title>Webcast: Let’s Talk About ELK Baby, Let’s Talk About You and AD</itunes:title>
      <itunes:episodeType>full</itunes:episodeType>
      <guid isPermaLink="false">https://www.blackhillsinfosec.com/?p=14547</guid>
      <link>https://share.transistor.fm/s/24c5eadd</link>
      <description>
        <![CDATA[BHIS’ Defensery Driven Duo Delivers Another Delectable Transmission! 



We know you are worried about your networks. After hours of discussion, we’ve come to the realization that some of our dedicated followers seem to be much more interested in catching malware than learning how to be (please forgive this next statement) “l33t hax0rs.”  



Download slides:  https://www.activecountermeasures.com/presentations/  



2:47 – Why Are We Doing This? 



5:07 – AT7: The Logs You Are Looking For 



7:41 – AD Best Practices to Frustrate Attackers 



9:37 – AT 5 – Complete Takedown &amp; AT 6 – IOCs 



12:04 – Blue Team-A-Palooza 



14:22 – Windows Logging, Sysmon, and ELK – Part 1 



16:45 – Implementing Sysmon and Applocker 



21:45 – …And Group Policies That Kill Kill-Chains  



22:31 – Here Are Some Important Blogs 



23:35 – Summary Complete 



25:28 – Introducing the Atomic Red Team 



27:50 – Installing the Atomic Framework 



29:29 – Squibbly Doo; The Results; Let’s Take A Step Back: The Atomic Tests; Another Step Back: WEF / Winlogbeat Config 



33:41 – Executing T1015; Catching Executables; Executin...
<ul><li>(00:00) - Intro</li>
<li>(02:47) - Why Are We Doing This?</li>
<li>(05:07) - AT7: The Logs You Are Looking For</li>
<li>(07:41) - AD Best Practices to Frustrate Attackers</li>
<li>(09:37) - AT 5 – Complete Takedown &amp; AT 6 – IOCs</li>
<li>(12:04) - Blue Team-Apalooza</li>
<li>(14:22) - WIndows Logging, Sysmon and ELK – Part 1</li>
<li>(16:45) - Implementing Sysmon and Applocker</li>
<li>(21:45) - ...And Group Policies That Kill Kill-Chains </li>
<li>(22:31) - Here Are Some Important Blogs</li>
<li>(23:35) - Summary Complete</li>
<li>(25:28) - Introducing the Atomic Red Team</li>
<li>(27:50) - Installing the Atomic Framework</li>
<li>(29:29) - Squibbly Doo</li>
<li>(30:46) - The Results</li>
<li>(31:29) - Let's Take A Step Back: The Atomic Tests</li>
<li>(32:18) - Another Step Back: WEF / Winlogbeat Config</li>
<li>(33:41) - Executing T1015</li>
<li>(34:26) - Catching Executables</li>
<li>(41:05) - Executing T1003</li>
<li>(42:02) - ElastAlert</li>
<li>(43:21) - Now, On the ATT&amp;CK</li>
<li>(44:20) - Not Sure If That's a Wrap Yet. (It's Not)</li>
<li>(47:11) - Check Out Our Dashboard</li>
</ul>]]>
      </description>
      <content:encoded>
        <![CDATA[BHIS’ Defensery Driven Duo Delivers Another Delectable Transmission! 



We know you are worried about your networks. After hours of discussion, we’ve come to the realization that some of our dedicated followers seem to be much more interested in catching malware than learning how to be (please forgive this next statement) “l33t hax0rs.”  



Download slides:  https://www.activecountermeasures.com/presentations/  



2:47 – Why Are We Doing This? 



5:07 – AT7: The Logs You Are Looking For 



7:41 – AD Best Practices to Frustrate Attackers 



9:37 – AT 5 – Complete Takedown &amp; AT 6 – IOCs 



12:04 – Blue Team-A-Palooza 



14:22 – Windows Logging, Sysmon, and ELK – Part 1 



16:45 – Implementing Sysmon and Applocker 



21:45 – …And Group Policies That Kill Kill-Chains  



22:31 – Here Are Some Important Blogs 



23:35 – Summary Complete 



25:28 – Introducing the Atomic Red Team 



27:50 – Installing the Atomic Framework 



29:29 – Squibbly Doo; The Results; Let’s Take A Step Back: The Atomic Tests; Another Step Back: WEF / Winlogbeat Config 



33:41 – Executing T1015; Catching Executables; Executin...
<ul><li>(00:00) - Intro</li>
<li>(02:47) - Why Are We Doing This?</li>
<li>(05:07) - AT7: The Logs You Are Looking For</li>
<li>(07:41) - AD Best Practices to Frustrate Attackers</li>
<li>(09:37) - AT 5 – Complete Takedown &amp; AT 6 – IOCs</li>
<li>(12:04) - Blue Team-Apalooza</li>
<li>(14:22) - WIndows Logging, Sysmon and ELK – Part 1</li>
<li>(16:45) - Implementing Sysmon and Applocker</li>
<li>(21:45) - ...And Group Policies That Kill Kill-Chains </li>
<li>(22:31) - Here Are Some Important Blogs</li>
<li>(23:35) - Summary Complete</li>
<li>(25:28) - Introducing the Atomic Red Team</li>
<li>(27:50) - Installing the Atomic Framework</li>
<li>(29:29) - Squibbly Doo</li>
<li>(30:46) - The Results</li>
<li>(31:29) - Let's Take A Step Back: The Atomic Tests</li>
<li>(32:18) - Another Step Back: WEF / Winlogbeat Config</li>
<li>(33:41) - Executing T1015</li>
<li>(34:26) - Catching Executables</li>
<li>(41:05) - Executing T1003</li>
<li>(42:02) - ElastAlert</li>
<li>(43:21) - Now, On the ATT&amp;CK</li>
<li>(44:20) - Not Sure If That's a Wrap Yet. (It's Not)</li>
<li>(47:11) - Check Out Our Dashboard</li>
</ul>]]>
      </content:encoded>
      <pubDate>Tue, 07 Jan 2020 08:03:55 -0500</pubDate>
      <author>Black Hills Information Security</author>
      <enclosure url="https://media.transistor.fm/24c5eadd/525f2112.mp3" length="32343376" type="audio/mpeg"/>
      <itunes:author>Black Hills Information Security</itunes:author>
      <itunes:image href="https://img.transistorcdn.com/pENTAcCm7sgGkhW8fGkEBf4IoVmklB2iiHvmKY0aCy0/rs:fill:0:0:1/w:1400/h:1400/q:60/mb:500000/aHR0cHM6Ly9pbWct/dXBsb2FkLXByb2R1/Y3Rpb24udHJhbnNp/c3Rvci5mbS9mNDUx/MzE3OGQ5YjQ5YmVl/ZDUzMzIwNWNhN2Ex/NmUxYS5qcGc.jpg"/>
      <itunes:duration>3492</itunes:duration>
      <itunes:summary>BHIS’ Defensery Driven Duo Delivers Another Delectable Transmission! 



We know you are worried about your networks. After hours of discussion, we’ve come to the realization that some of our dedicated followers seem to be much more interested in catching malware than learning how to be (please forgive this next statement) “l33t hax0rs.”  



Download slides:  https://www.activecountermeasures.com/presentations/  



2:47 – Why Are We Doing This? 



5:07 – AT7: The Logs You Are Looking For 



7:41 – AD Best Practices to Frustrate Attackers 



9:37 – AT 5 – Complete Takedown &amp;amp; AT 6 – IOCs 



12:04 – Blue Team-A-Palooza 



14:22 – Windows Logging, Sysmon, and ELK – Part 1 



16:45 – Implementing Sysmon and Applocker 



21:45 – …And Group Policies That Kill Kill-Chains  



22:31 – Here Are Some Important Blogs 



23:35 – Summary Complete 



25:28 – Introducing the Atomic Red Team 



27:50 – Installing the Atomic Framework 



29:29 – Squibbly Doo; The Results; Let’s Take A Step Back: The Atomic Tests; Another Step Back: WEF / Winlogbeat Config 



33:41 – Executing T1015; Catching Executables; Executin...</itunes:summary>
      <itunes:subtitle>BHIS’ Defensery Driven Duo Delivers Another Delectable Transmission! 



We know you are worried about your networks. After hours of discussion, we’ve come to the realization that some of our dedicated followers seem to be much more interested in catching</itunes:subtitle>
      <itunes:keywords>Infosec,Cybersecurity,news</itunes:keywords>
      <itunes:explicit>No</itunes:explicit>
      <podcast:chapters url="https://share.transistor.fm/s/24c5eadd/chapters.json" type="application/json+chapters"/>
    </item>
    <item>
      <title>BHIS Podcast: Py2K20 - Transitioning from Python2 to Python3</title>
      <itunes:episode>1</itunes:episode>
      <podcast:episode>1</podcast:episode>
      <itunes:title>BHIS Podcast: Py2K20 - Transitioning from Python2 to Python3</itunes:title>
      <itunes:episodeType>full</itunes:episodeType>
      <guid isPermaLink="false">http://www.blubrry.com/bhis/44370635/bhis-podcast-py2k20-transitioning-from-python2-to-python3/</guid>
      <link>https://share.transistor.fm/s/407e2e22</link>
      <description>
        <![CDATA[<p>In this podcast (originally recored as a live webcast), we talk about the 2020 End of Life for Python2. We address what the short, and medium term impacts will likely be. Key language differences will be highlighted with techniques to modify your code to be forward compatible.</p>
<p>As a SANS instructor teaching SEC573: Automating Information Security with Python, over the past three years, I have steadily moved my teaching materials, examples, demonstrations and personal coding to Python3. In this process, I have had to break habits and learn new habits to write Python3 compatible scripts. I also spend considerable effort showing people how to write Python2 scripts which are forward compatible with Python3 in order to ease the transition.</p>
<p>The largest barrier that most people struggle with is the idea that Python3 has changed the default string encoding to UTF-8 rather than simple byte encoding. Once you learn how to manage your string objects, the remaining transition issues are mostly modern improvements to the language which most people consider advantageous to adopt.</p>
<p>Since Python2 will no longer have active releases after 2020, it is important to embrace the change and move forward with the Python scripting community.</p>]]>
      </description>
      <content:encoded>
        <![CDATA[<p>In this podcast (originally recored as a live webcast), we talk about the 2020 End of Life for Python2. We address what the short, and medium term impacts will likely be. Key language differences will be highlighted with techniques to modify your code to be forward compatible.</p>
<p>As a SANS instructor teaching SEC573: Automating Information Security with Python, over the past three years, I have steadily moved my teaching materials, examples, demonstrations and personal coding to Python3. In this process, I have had to break habits and learn new habits to write Python3 compatible scripts. I also spend considerable effort showing people how to write Python2 scripts which are forward compatible with Python3 in order to ease the transition.</p>
<p>The largest barrier that most people struggle with is the idea that Python3 has changed the default string encoding to UTF-8 rather than simple byte encoding. Once you learn how to manage your string objects, the remaining transition issues are mostly modern improvements to the language which most people consider advantageous to adopt.</p>
<p>Since Python2 will no longer have active releases after 2020, it is important to embrace the change and move forward with the Python scripting community.</p>]]>
      </content:encoded>
      <pubDate>Fri, 31 May 2019 09:19:50 -0400</pubDate>
      <author>Black Hills Information Security</author>
      <enclosure url="https://media.transistor.fm/407e2e22/00e9d68c.mp3" length="78239218" type="audio/mpeg"/>
      <itunes:author>Black Hills Information Security</itunes:author>
      <itunes:duration>3260</itunes:duration>
      <itunes:summary>In this podcast (originally recored as a live webcast), we talk about the 2020 End of Life for Python2. We address what the short, and medium term impacts will likely be. Key language differences will be highlighted with techniques to modify your code to be forward compatible.
As a SANS instructor teaching SEC573: Automating Information Security with Python, over the past three years, I have steadily moved my teaching materials, examples, demonstrations and personal coding to Python3. In this process, I have had to break habits and learn new habits to write Python3 compatible scripts. I also spend considerable effort showing people how to write Python2 scripts which are forward compatible with Python3 in order to ease the transition.
The largest barrier that most people struggle with is the idea that Python3 has changed the default string encoding to UTF-8 rather than simple byte encoding. Once you learn how to manage your string objects, the remaining transition issues are mostly modern improvements to the language which most people consider advantageous to adopt.
Since Python2 will no longer have active releases after 2020, it is important to embrace the change and move forward with the Python scripting community.</itunes:summary>
      <itunes:subtitle>In this podcast (originally recored as a live webcast), we talk about the 2020 End of Life for Python2. We address what the short, and medium term impacts will likely be. Key language differences will be highlighted with techniques to modify your code to </itunes:subtitle>
      <itunes:keywords>Infosec,Cybersecurity,news</itunes:keywords>
      <itunes:explicit>No</itunes:explicit>
    </item>
    <item>
      <title>Podcast: Attack Tactics 6! Return of the Blue Team</title>
      <itunes:episode>1</itunes:episode>
      <podcast:episode>1</podcast:episode>
      <itunes:title>Podcast: Attack Tactics 6! Return of the Blue Team</itunes:title>
      <itunes:episodeType>full</itunes:episodeType>
      <guid isPermaLink="false">https://www.blackhillsinfosec.com/?p=11929</guid>
      <link>https://share.transistor.fm/s/7c8ebbca</link>
      <description>
        <![CDATA[Download slides: https://www.activecountermeasures.com/presentations In this webcast we walk through the step-by-step defenses to stop the attackers in every step of the way we showed in Attack Tactics Part 5!!!]]>
      </description>
      <content:encoded>
        <![CDATA[Download slides: https://www.activecountermeasures.com/presentations In this webcast we walk through the step-by-step defenses to stop the attackers in every step of the way we showed in Attack Tactics Part 5!!!]]>
      </content:encoded>
      <pubDate>Thu, 30 May 2019 14:08:33 -0400</pubDate>
      <author>Black Hills Information Security</author>
      <enclosure url="https://media.transistor.fm/7c8ebbca/5d82f575.mp3" length="80879033" type="audio/mpeg"/>
      <itunes:author>Black Hills Information Security</itunes:author>
      <itunes:duration>3370</itunes:duration>
      <itunes:summary>Download slides: https://www.activecountermeasures.com/presentations In this webcast we walk through the step-by-step defenses to stop the attackers in every step of the way we showed in Attack Tactics Part 5!!!</itunes:summary>
      <itunes:subtitle>Download slides: https://www.activecountermeasures.com/presentations In this webcast we walk through the step-by-step defenses to stop the attackers in every step of the way we showed in Attack Tactics Part 5!!!</itunes:subtitle>
      <itunes:keywords>Infosec,Cybersecurity,news</itunes:keywords>
      <itunes:explicit>No</itunes:explicit>
    </item>
    <item>
      <title>Podcast: Weaponizing Corporate Intel. This Time, It’s Personal!</title>
      <itunes:episode>1</itunes:episode>
      <podcast:episode>1</podcast:episode>
      <itunes:title>Podcast: Weaponizing Corporate Intel. This Time, It’s Personal!</itunes:title>
      <itunes:episodeType>full</itunes:episodeType>
      <guid isPermaLink="false">https://www.blackhillsinfosec.com/?p=11787</guid>
      <link>https://share.transistor.fm/s/34b45911</link>
      <description>
        <![CDATA[Beau Bullock &amp; Mike Felch// Strategically targeting a corporation requires deep knowledge of their technologies and employees. Successfully compromising an organization can depend on the quality of reconnaissance a tester performs up front.]]>
      </description>
      <content:encoded>
        <![CDATA[Beau Bullock &amp; Mike Felch// Strategically targeting a corporation requires deep knowledge of their technologies and employees. Successfully compromising an organization can depend on the quality of reconnaissance a tester performs up front.]]>
      </content:encoded>
      <pubDate>Sat, 11 May 2019 11:26:46 -0400</pubDate>
      <author>Black Hills Information Security</author>
      <enclosure url="https://media.transistor.fm/34b45911/b830358e.mp3" length="81464739" type="audio/mpeg"/>
      <itunes:author>Black Hills Information Security</itunes:author>
      <itunes:duration>3394</itunes:duration>
      <itunes:summary>Beau Bullock &amp;amp; Mike Felch// Strategically targeting a corporation requires deep knowledge of their technologies and employees. Successfully compromising an organization can depend on the quality of reconnaissance a tester performs up front.</itunes:summary>
      <itunes:subtitle>Beau Bullock &amp;amp; Mike Felch// Strategically targeting a corporation requires deep knowledge of their technologies and employees. Successfully compromising an organization can depend on the quality of reconnaissance a tester performs up front.</itunes:subtitle>
      <itunes:keywords>Infosec,Cybersecurity,news</itunes:keywords>
      <itunes:explicit>No</itunes:explicit>
    </item>
    <item>
      <title>BHIS Podcast: Weaponizing Corporate Intel: This Time, It’s Personal!</title>
      <itunes:episode>1</itunes:episode>
      <podcast:episode>1</podcast:episode>
      <itunes:title>BHIS Podcast: Weaponizing Corporate Intel: This Time, It’s Personal!</itunes:title>
      <itunes:episodeType>full</itunes:episodeType>
      <guid isPermaLink="false">http://www.blubrry.com/bhis/43889520/bhis-podcast-weaponizing-corporate-intel-this-time-its-personal/</guid>
      <link>https://share.transistor.fm/s/e8caf815</link>
      <description>
        <![CDATA[<p>Lately, it seems like recon is just not getting as much love as it should. Well, time to change that. In this podcast, we discuss some new tips and tricks... And!!!! We released a new tool -- FireProx<br><br>Strategically targeting a corporation requires deep knowledge of their technologies and employees. Successfully compromising an organization can depend on the quality of reconnaissance a tester performs up front. Often times testers only resort to using publicly available tools which can overlook critical assets.<br><br>In this one-hour BHIS podcast, we begin by examining some commonly overlooked methods to discover external resources. Next, we show how to discover employees of a target organization and quickly locate their social media accounts. Finally, we strategically identify and weaponize personal information about the employees to target the organization directly using new attack techniques. <br><br>Listeners will learn an external defense evasion method, a new process to gain credentialed access, and we'll give a demo on a newly released tool — FireProx!<br><br>While the approach is designed to assist offensive security professionals, the webcast will be informative for technical and non-technical audiences; demonstrating the importance of security-awareness for everyone<br><br>- BHIS</p>]]>
      </description>
      <content:encoded>
        <![CDATA[<p>Lately, it seems like recon is just not getting as much love as it should. Well, time to change that. In this podcast, we discuss some new tips and tricks... And!!!! We released a new tool -- FireProx<br><br>Strategically targeting a corporation requires deep knowledge of their technologies and employees. Successfully compromising an organization can depend on the quality of reconnaissance a tester performs up front. Often times testers only resort to using publicly available tools which can overlook critical assets.<br><br>In this one-hour BHIS podcast, we begin by examining some commonly overlooked methods to discover external resources. Next, we show how to discover employees of a target organization and quickly locate their social media accounts. Finally, we strategically identify and weaponize personal information about the employees to target the organization directly using new attack techniques. <br><br>Listeners will learn an external defense evasion method, a new process to gain credentialed access, and we'll give a demo on a newly released tool — FireProx!<br><br>While the approach is designed to assist offensive security professionals, the webcast will be informative for technical and non-technical audiences; demonstrating the importance of security-awareness for everyone<br><br>- BHIS</p>]]>
      </content:encoded>
      <pubDate>Fri, 10 May 2019 14:40:59 -0400</pubDate>
      <author>Black Hills Information Security</author>
      <enclosure url="https://media.transistor.fm/e8caf815/53e17aeb.mp3" length="81464739" type="audio/mpeg"/>
      <itunes:author>Black Hills Information Security</itunes:author>
      <itunes:duration>3394</itunes:duration>
      <itunes:summary>Lately, it seems like recon is just not getting as much love as it should. Well, time to change that. In this podcast, we discuss some new tips and tricks... And!!!! We released a new tool -- FireProxStrategically targeting a corporation requires deep knowledge of their technologies and employees. Successfully compromising an organization can depend on the quality of reconnaissance a tester performs up front. Often times testers only resort to using publicly available tools which can overlook critical assets.In this one-hour BHIS podcast, we begin by examining some commonly overlooked methods to discover external resources. Next, we show how to discover employees of a target organization and quickly locate their social media accounts. Finally, we strategically identify and weaponize personal information about the employees to target the organization directly using new attack techniques. Listeners will learn an external defense evasion method, a new process to gain credentialed access, and we'll give a demo on a newly released tool — FireProx!While the approach is designed to assist offensive security professionals, the webcast will be informative for technical and non-technical audiences; demonstrating the importance of security-awareness for everyone- BHIS</itunes:summary>
      <itunes:subtitle>Lately, it seems like recon is just not getting as much love as it should. Well, time to change that. In this podcast, we discuss some new tips and tricks... And!!!! We released a new tool -- FireProxStrategically targeting a corporation requires deep kno</itunes:subtitle>
      <itunes:keywords>Infosec,Cybersecurity,news</itunes:keywords>
      <itunes:explicit>No</itunes:explicit>
    </item>
    <item>
      <title>BHIS PODCAST: Tracking attackers. Why attribution matters and how to do it.</title>
      <itunes:episode>1</itunes:episode>
      <podcast:episode>1</podcast:episode>
      <itunes:title>BHIS PODCAST: Tracking attackers. Why attribution matters and how to do it.</itunes:title>
      <itunes:episodeType>full</itunes:episodeType>
      <guid isPermaLink="false">https://www.blackhillsinfosec.com/?p=11088</guid>
      <link>https://share.transistor.fm/s/d49e5529</link>
      <description>
        <![CDATA[In this BHIS podcast, originally recorded as a live webcast, we cover some new techniques and tactics on how to track attackers via various honey tokens.  We cover how to track with Word Web Bugs in ADHD, and cover the awesome toolkit from Thinkst.]]>
      </description>
      <content:encoded>
        <![CDATA[In this BHIS podcast, originally recorded as a live webcast, we cover some new techniques and tactics on how to track attackers via various honey tokens.  We cover how to track with Word Web Bugs in ADHD, and cover the awesome toolkit from Thinkst.]]>
      </content:encoded>
      <pubDate>Mon, 18 Mar 2019 11:54:27 -0400</pubDate>
      <author>Black Hills Information Security</author>
      <enclosure url="https://media.transistor.fm/d49e5529/9c542edd.mp3" length="78800892" type="audio/mpeg"/>
      <itunes:author>Black Hills Information Security</itunes:author>
      <itunes:duration>3283</itunes:duration>
      <itunes:summary>In this BHIS podcast, originally recorded as a live webcast, we cover some new techniques and tactics on how to track attackers via various honey tokens.  We cover how to track with Word Web Bugs in ADHD, and cover the awesome toolkit from Thinkst.</itunes:summary>
      <itunes:subtitle>In this BHIS podcast, originally recorded as a live webcast, we cover some new techniques and tactics on how to track attackers via various honey tokens.  We cover how to track with Word Web Bugs in ADHD, and cover the awesome toolkit from Thinkst.</itunes:subtitle>
      <itunes:keywords>Infosec,Cybersecurity,news</itunes:keywords>
      <itunes:explicit>No</itunes:explicit>
    </item>
    <item>
      <title>BHIS PODCAST: Endpoint Security Got You Down? No PowerShell? No Problem.</title>
      <itunes:episode>1</itunes:episode>
      <podcast:episode>1</podcast:episode>
      <itunes:title>BHIS PODCAST: Endpoint Security Got You Down? No PowerShell? No Problem.</itunes:title>
      <itunes:episodeType>full</itunes:episodeType>
      <guid isPermaLink="false">http://www.blubrry.com/bhis/42356319/bhis-podcast-endpoint-security-got-you-down-no-powershell-no-problem/</guid>
      <link>https://share.transistor.fm/s/6c9489c8</link>
      <description>
        <![CDATA[<p>Do your PowerShell scripts keep getting caught? Tired of dealing with EDRs &amp; Windows Defender every time you need to pop a box?</p>
<p>In this one-hour podcast, originally recorded as a live webcast, we introduce a somewhat new Red Team approach that we call BYOI (Bring Your Own Interpreter).</p>
<p>Turns out, by harnessing the powah of C# and the .NET framework you can embed entire interpreters inside of a C# binary. This allows you to dynamically access all of the .NET API from a scripting language of your choosing without going through Powershell in any way!</p>
<p>We also cover some basic .NET &amp; C# concepts in order to understand why this is possible and all the hype surrounding offensive C# tradecraft.</p>
<p>Additionally, we demo SILENTTRINITY, a post-exploitation tool we have developed that attempts to weaponize the BYOI concept *AND* dropped a pretty huge update for it live during the webcast!</p>
<p>This podcast was originally recorded on 2/14/2019 as a live webcast with our very own Marcello Salvati.</p>
<p>P.S — You can get SILENTTRINITY here:</p>
<p><a href="https://github.com/byt3bl33d3r/SILENTTRINITY">https://github.com/byt3bl33d3r/SILENTTRINITY</a></p>
<p>Also, you can now register for our Cyber Deception class at Black Hat 2019 here: <a href="https://www.blackhat.com/us-19/training/schedule/index.html#a-guide-to-active-defense-cyber-deception-and-hacking-back-14124">https://www.blackhat.com/us-19/training/schedule/index.html#a-guide-to-active-defense-cyber-deception-and-hacking-back-14124</a></p>]]>
      </description>
      <content:encoded>
        <![CDATA[<p>Do your PowerShell scripts keep getting caught? Tired of dealing with EDRs &amp; Windows Defender every time you need to pop a box?</p>
<p>In this one-hour podcast, originally recorded as a live webcast, we introduce a somewhat new Red Team approach that we call BYOI (Bring Your Own Interpreter).</p>
<p>Turns out, by harnessing the powah of C# and the .NET framework you can embed entire interpreters inside of a C# binary. This allows you to dynamically access all of the .NET API from a scripting language of your choosing without going through Powershell in any way!</p>
<p>We also cover some basic .NET &amp; C# concepts in order to understand why this is possible and all the hype surrounding offensive C# tradecraft.</p>
<p>Additionally, we demo SILENTTRINITY, a post-exploitation tool we have developed that attempts to weaponize the BYOI concept *AND* dropped a pretty huge update for it live during the webcast!</p>
<p>This podcast was originally recorded on 2/14/2019 as a live webcast with our very own Marcello Salvati.</p>
<p>P.S — You can get SILENTTRINITY here:</p>
<p><a href="https://github.com/byt3bl33d3r/SILENTTRINITY">https://github.com/byt3bl33d3r/SILENTTRINITY</a></p>
<p>Also, you can now register for our Cyber Deception class at Black Hat 2019 here: <a href="https://www.blackhat.com/us-19/training/schedule/index.html#a-guide-to-active-defense-cyber-deception-and-hacking-back-14124">https://www.blackhat.com/us-19/training/schedule/index.html#a-guide-to-active-defense-cyber-deception-and-hacking-back-14124</a></p>]]>
      </content:encoded>
      <pubDate>Wed, 06 Mar 2019 10:16:19 -0500</pubDate>
      <author>Black Hills Information Security</author>
      <enclosure url="https://media.transistor.fm/6c9489c8/5b317c23.mp3" length="78433152" type="audio/mpeg"/>
      <itunes:author>Black Hills Information Security</itunes:author>
      <itunes:duration>3268</itunes:duration>
      <itunes:summary>Do your PowerShell scripts keep getting caught? Tired of dealing with EDRs &amp;amp; Windows Defender every time you need to pop a box?
In this one-hour podcast, originally recorded as a live webcast, we introduce a somewhat new Red Team approach that we call BYOI (Bring Your Own Interpreter).
Turns out, by harnessing the powah of C# and the .NET framework you can embed entire interpreters inside of a C# binary. This allows you to dynamically access all of the .NET API from a scripting language of your choosing without going through Powershell in any way!
We also cover some basic .NET &amp;amp; C# concepts in order to understand why this is possible and all the hype surrounding offensive C# tradecraft.
Additionally, we demo SILENTTRINITY, a post-exploitation tool we have developed that attempts to weaponize the BYOI concept *AND* dropped a pretty huge update for it live during the webcast!
This podcast was originally recorded on 2/14/2019 as a live webcast with our very own Marcello Salvati.
P.S — You can get SILENTTRINITY here:
https://github.com/byt3bl33d3r/SILENTTRINITY (https://github.com/byt3bl33d3r/SILENTTRINITY)
Also, you can now register for our Cyber Deception class at Black Hat 2019 here: https://www.blackhat.com/us-19/training/schedule/index.html#a-guide-to-active-defense-cyber-deception-and-hacking-back-14124 (https://www.blackhat.com/us-19/training/schedule/index.html#a-guide-to-active-defense-cyber-deception-and-hacking-back-14124)</itunes:summary>
      <itunes:subtitle>Do your PowerShell scripts keep getting caught? Tired of dealing with EDRs &amp;amp; Windows Defender every time you need to pop a box?
In this one-hour podcast, originally recorded as a live webcast, we introduce a somewhat new Red Team approach that we call</itunes:subtitle>
      <itunes:keywords>Infosec,Cybersecurity,news</itunes:keywords>
      <itunes:explicit>No</itunes:explicit>
    </item>
    <item>
      <title>BHIS PODCAST: Endpoint Security Got You Down? No PowerShell? No Problem.</title>
      <itunes:episode>1</itunes:episode>
      <podcast:episode>1</podcast:episode>
      <itunes:title>BHIS PODCAST: Endpoint Security Got You Down? No PowerShell? No Problem.</itunes:title>
      <itunes:episodeType>full</itunes:episodeType>
      <guid isPermaLink="false">https://www.blackhillsinfosec.com/?p=11059</guid>
      <link>https://share.transistor.fm/s/9972c8dd</link>
      <description>
        <![CDATA[Do your PowerShell scripts keep getting caught? Tired of dealing with EDRs &amp; Windows Defender every time you need to pop a box?  In this one-hour podcast, originally recorded as a live webcast, we introduce a somewhat new Red Team approach that we call...]]>
      </description>
      <content:encoded>
        <![CDATA[Do your PowerShell scripts keep getting caught? Tired of dealing with EDRs &amp; Windows Defender every time you need to pop a box?  In this one-hour podcast, originally recorded as a live webcast, we introduce a somewhat new Red Team approach that we call...]]>
      </content:encoded>
      <pubDate>Wed, 06 Mar 2019 10:08:32 -0500</pubDate>
      <author>Black Hills Information Security</author>
      <enclosure url="https://media.transistor.fm/9972c8dd/3198a8a5.mp3" length="78433152" type="audio/mpeg"/>
      <itunes:author>Black Hills Information Security</itunes:author>
      <itunes:duration>3268</itunes:duration>
      <itunes:summary>Do your PowerShell scripts keep getting caught? Tired of dealing with EDRs &amp;amp; Windows Defender every time you need to pop a box?  In this one-hour podcast, originally recorded as a live webcast, we introduce a somewhat new Red Team approach that we call...</itunes:summary>
      <itunes:subtitle>Do your PowerShell scripts keep getting caught? Tired of dealing with EDRs &amp;amp; Windows Defender every time you need to pop a box?  In this one-hour podcast, originally recorded as a live webcast, we introduce a somewhat new Red Team approach that we cal</itunes:subtitle>
      <itunes:keywords>Infosec,Cybersecurity,news</itunes:keywords>
      <itunes:explicit>No</itunes:explicit>
    </item>
    <item>
      <title>BHIS PODCAST: Network Threat Hunting Runbook</title>
      <itunes:episode>1</itunes:episode>
      <podcast:episode>1</podcast:episode>
      <itunes:title>BHIS PODCAST: Network Threat Hunting Runbook</itunes:title>
      <itunes:episodeType>full</itunes:episodeType>
      <guid isPermaLink="false">http://www.blubrry.com/bhis/42193447/bhis-podcast-network-threat-hunting-runbook/</guid>
      <link>https://share.transistor.fm/s/195fc434</link>
      <description>
        <![CDATA[<p>We all know what threat hunting is in general terms; it's when we actively search our network for compromised systems. But what does that mean exactly and what process should we be following? Can I simply check network traffic to see if the evil bit is set, or is there a bit more to it than that? <br><br>In this podcast, originally recorded as a live webcast, we walk you through the methodology of doing a network threat hunt. We talk about what steps to perform and in what order. We also look at some of the tools and online resources you can leverage to expedite the process. In short, this podcast is be a runbook you can leverage for validating the integrity of each of your internal endpoints.</p>]]>
      </description>
      <content:encoded>
        <![CDATA[<p>We all know what threat hunting is in general terms; it's when we actively search our network for compromised systems. But what does that mean exactly and what process should we be following? Can I simply check network traffic to see if the evil bit is set, or is there a bit more to it than that? <br><br>In this podcast, originally recorded as a live webcast, we walk you through the methodology of doing a network threat hunt. We talk about what steps to perform and in what order. We also look at some of the tools and online resources you can leverage to expedite the process. In short, this podcast is be a runbook you can leverage for validating the integrity of each of your internal endpoints.</p>]]>
      </content:encoded>
      <pubDate>Thu, 28 Feb 2019 11:13:03 -0500</pubDate>
      <author>Black Hills Information Security</author>
      <enclosure url="https://media.transistor.fm/195fc434/6fa2bc42.mp3" length="73837850" type="audio/mpeg"/>
      <itunes:author>Black Hills Information Security</itunes:author>
      <itunes:duration>3077</itunes:duration>
      <itunes:summary>We all know what threat hunting is in general terms; it's when we actively search our network for compromised systems. But what does that mean exactly and what process should we be following? Can I simply check network traffic to see if the evil bit is set, or is there a bit more to it than that? In this podcast, originally recorded as a live webcast, we walk you through the methodology of doing a network threat hunt. We talk about what steps to perform and in what order. We also look at some of the tools and online resources you can leverage to expedite the process. In short, this podcast is be a runbook you can leverage for validating the integrity of each of your internal endpoints.</itunes:summary>
      <itunes:subtitle>We all know what threat hunting is in general terms; it's when we actively search our network for compromised systems. But what does that mean exactly and what process should we be following? Can I simply check network traffic to see if the evil bit is se</itunes:subtitle>
      <itunes:keywords>Infosec,Cybersecurity,news</itunes:keywords>
      <itunes:explicit>No</itunes:explicit>
    </item>
    <item>
      <title>BHIS Podcast: Blockchain and You! InfoSec Edition</title>
      <itunes:episode>1</itunes:episode>
      <podcast:episode>1</podcast:episode>
      <itunes:title>BHIS Podcast: Blockchain and You! InfoSec Edition</itunes:title>
      <itunes:episodeType>full</itunes:episodeType>
      <guid isPermaLink="false">https://www.blackhillsinfosec.com/?p=10974</guid>
      <link>https://share.transistor.fm/s/14e88f46</link>
      <description>
        <![CDATA[http://media.blubrry.com/bhis/content.blubrry.com/bhis/BHIS_Blockchain_and_You_Feb2019.mp3




Take a good look at Bitcoin right now… these are the unlucky ones. These are the unfortunate souls who jumped on another overinflated balloon. But, does this Bitcoin crash completely undermine all blockchain technologies?



Since Bitcoin is crashing and burning we figured it would be a good time to have a webcast on blockchain security issues and why blockchain still matters.  



Is it all hype? Is it all just a slow-motion train wreck? Why, exactly, should a security practitioner care? 



There are so many cool applications, and more than a few crazy, stupid applications.  With the crazy applications comes crazy security issues… beyond the 51% attack. 



This podcast was recorded as a live webcast on 2/3/2019



We were joined by Beau Bullock, BHIS Tester, and host the Coinsec Podcast.



And no… we did not give investment advice. Please, please do not ask us what coin is the best to get a 1,000% return on investment in 12 months.  We all got enough of that crap over the holidays. That and fixing printers and fax machines.



For Penetration Testing, Security Assessments, Red Team Engagements, and Threat Hunting: Contact Us!



Join the BHIS Blog Mailing List – get notified when we post new blogs, webcasts, and podcasts.﻿]]>
      </description>
      <content:encoded>
        <![CDATA[http://media.blubrry.com/bhis/content.blubrry.com/bhis/BHIS_Blockchain_and_You_Feb2019.mp3




Take a good look at Bitcoin right now… these are the unlucky ones. These are the unfortunate souls who jumped on another overinflated balloon. But, does this Bitcoin crash completely undermine all blockchain technologies?



Since Bitcoin is crashing and burning we figured it would be a good time to have a webcast on blockchain security issues and why blockchain still matters.  



Is it all hype? Is it all just a slow-motion train wreck? Why, exactly, should a security practitioner care? 



There are so many cool applications, and more than a few crazy, stupid applications.  With the crazy applications comes crazy security issues… beyond the 51% attack. 



This podcast was recorded as a live webcast on 2/3/2019



We were joined by Beau Bullock, BHIS Tester, and host the Coinsec Podcast.



And no… we did not give investment advice. Please, please do not ask us what coin is the best to get a 1,000% return on investment in 12 months.  We all got enough of that crap over the holidays. That and fixing printers and fax machines.



For Penetration Testing, Security Assessments, Red Team Engagements, and Threat Hunting: Contact Us!



Join the BHIS Blog Mailing List – get notified when we post new blogs, webcasts, and podcasts.﻿]]>
      </content:encoded>
      <pubDate>Wed, 27 Feb 2019 16:41:16 -0500</pubDate>
      <author>Black Hills Information Security</author>
      <enclosure url="https://media.transistor.fm/14e88f46/19c1c54a.mp3" length="82332848" type="audio/mpeg"/>
      <itunes:author>Black Hills Information Security</itunes:author>
      <itunes:duration>3431</itunes:duration>
      <itunes:summary>http://media.blubrry.com/bhis/content.blubrry.com/bhis/BHIS_Blockchain_and_You_Feb2019.mp3




Take a good look at Bitcoin right now… these are the unlucky ones. These are the unfortunate souls who jumped on another overinflated balloon. But, does this Bitcoin crash completely undermine all blockchain technologies?



Since Bitcoin is crashing and burning we figured it would be a good time to have a webcast on blockchain security issues and why blockchain still matters.  



Is it all hype? Is it all just a slow-motion train wreck? Why, exactly, should a security practitioner care? 



There are so many cool applications, and more than a few crazy, stupid applications.  With the crazy applications comes crazy security issues… beyond the 51% attack. 



This podcast was recorded as a live webcast on 2/3/2019



We were joined by Beau Bullock, BHIS Tester, and host the Coinsec Podcast.



And no… we did not give investment advice. Please, please do not ask us what coin is the best to get a 1,000% return on investment in 12 months.  We all got enough of that crap over the holidays. That and fixing printers and fax machines.



For Penetration Testing, Security Assessments, Red Team Engagements, and Threat Hunting: Contact Us!



Join the BHIS Blog Mailing List – get notified when we post new blogs, webcasts, and podcasts.﻿</itunes:summary>
      <itunes:subtitle>http://media.blubrry.com/bhis/content.blubrry.com/bhis/BHIS_Blockchain_and_You_Feb2019.mp3




Take a good look at Bitcoin right now… these are the unlucky ones. These are the unfortunate souls who jumped on another overinflated balloon. But, does this Bi</itunes:subtitle>
      <itunes:keywords>Infosec,Cybersecurity,news</itunes:keywords>
      <itunes:explicit>No</itunes:explicit>
    </item>
    <item>
      <title>PODCAST: Sacred Cash Cow Tipping 2019</title>
      <itunes:episode>1</itunes:episode>
      <podcast:episode>1</podcast:episode>
      <itunes:title>PODCAST: Sacred Cash Cow Tipping 2019</itunes:title>
      <itunes:episodeType>full</itunes:episodeType>
      <guid isPermaLink="false">https://www.blackhillsinfosec.com/?p=10622</guid>
      <link>https://share.transistor.fm/s/8dba5e6f</link>
      <description>
        <![CDATA[Yet again it is time for another edition of Sacred Cash Cow Tipping! Or, “Why do these endpoint security bypass techniques still work? Why?” The goal of this is to share just some of the ways Black Hills Information Security bypassed endpoint security ...]]>
      </description>
      <content:encoded>
        <![CDATA[Yet again it is time for another edition of Sacred Cash Cow Tipping! Or, “Why do these endpoint security bypass techniques still work? Why?” The goal of this is to share just some of the ways Black Hills Information Security bypassed endpoint security ...]]>
      </content:encoded>
      <pubDate>Tue, 15 Jan 2019 12:17:04 -0500</pubDate>
      <author>Black Hills Information Security</author>
      <enclosure url="https://media.transistor.fm/8dba5e6f/d8f144c2.mp3" length="66319968" type="audio/mpeg"/>
      <itunes:author>Black Hills Information Security</itunes:author>
      <itunes:duration>2763</itunes:duration>
      <itunes:summary>Yet again it is time for another edition of Sacred Cash Cow Tipping! Or, “Why do these endpoint security bypass techniques still work? Why?” The goal of this is to share just some of the ways Black Hills Information Security bypassed endpoint security ...</itunes:summary>
      <itunes:subtitle>Yet again it is time for another edition of Sacred Cash Cow Tipping! Or, “Why do these endpoint security bypass techniques still work? Why?” The goal of this is to share just some of the ways Black Hills Information Security bypassed endpoint security ...</itunes:subtitle>
      <itunes:keywords>Infosec,Cybersecurity,news</itunes:keywords>
      <itunes:explicit>No</itunes:explicit>
    </item>
    <item>
      <title>PODCAST: RDP Logging Bypass and Azure Active Directory Recon</title>
      <itunes:episode>1</itunes:episode>
      <podcast:episode>1</podcast:episode>
      <itunes:title>PODCAST: RDP Logging Bypass and Azure Active Directory Recon</itunes:title>
      <itunes:episodeType>full</itunes:episodeType>
      <guid isPermaLink="false">https://www.blackhillsinfosec.com/?p=9930</guid>
      <link>https://share.transistor.fm/s/334eff1c</link>
      <description>
        <![CDATA[For this podcast we cover a couple of different topics. First, we talk about how to password spray in a non-attributable sort of way. Beau found a way to obfuscate what RDP logs record with launching password spraying attacks.]]>
      </description>
      <content:encoded>
        <![CDATA[For this podcast we cover a couple of different topics. First, we talk about how to password spray in a non-attributable sort of way. Beau found a way to obfuscate what RDP logs record with launching password spraying attacks.]]>
      </content:encoded>
      <pubDate>Fri, 28 Dec 2018 13:52:53 -0500</pubDate>
      <author>Black Hills Information Security</author>
      <enclosure url="https://media.transistor.fm/334eff1c/27ea7cea.mp3" length="77443911" type="audio/mpeg"/>
      <itunes:author>Black Hills Information Security</itunes:author>
      <itunes:duration>3227</itunes:duration>
      <itunes:summary>For this podcast we cover a couple of different topics. First, we talk about how to password spray in a non-attributable sort of way. Beau found a way to obfuscate what RDP logs record with launching password spraying attacks.</itunes:summary>
      <itunes:subtitle>For this podcast we cover a couple of different topics. First, we talk about how to password spray in a non-attributable sort of way. Beau found a way to obfuscate what RDP logs record with launching password spraying attacks.</itunes:subtitle>
      <itunes:keywords>Infosec,Cybersecurity,news</itunes:keywords>
      <itunes:explicit>No</itunes:explicit>
    </item>
    <item>
      <title>PODCAST: BHIS Sorta Top Used Tools of 2018</title>
      <itunes:episode>1</itunes:episode>
      <podcast:episode>1</podcast:episode>
      <itunes:title>PODCAST: BHIS Sorta Top Used Tools of 2018</itunes:title>
      <itunes:episodeType>full</itunes:episodeType>
      <guid isPermaLink="false">https://www.blackhillsinfosec.com/?p=9842</guid>
      <link>https://share.transistor.fm/s/42a4c7f2</link>
      <description>
        <![CDATA[In this webcast we cover some of the core tools we use all the time at Black Hills Information Security. However, there’s a twist. We don’t talk about Nessus, Nmap, or Metasploit. Why? Because there are a ton of new (and older) tools we use that fall o...]]>
      </description>
      <content:encoded>
        <![CDATA[In this webcast we cover some of the core tools we use all the time at Black Hills Information Security. However, there’s a twist. We don’t talk about Nessus, Nmap, or Metasploit. Why? Because there are a ton of new (and older) tools we use that fall o...]]>
      </content:encoded>
      <pubDate>Mon, 17 Dec 2018 12:33:41 -0500</pubDate>
      <author>Black Hills Information Security</author>
      <enclosure url="https://media.transistor.fm/42a4c7f2/e712be5d.mp3" length="73181965" type="audio/mpeg"/>
      <itunes:author>Black Hills Information Security</itunes:author>
      <itunes:duration>3049</itunes:duration>
      <itunes:summary>In this webcast we cover some of the core tools we use all the time at Black Hills Information Security. However, there’s a twist. We don’t talk about Nessus, Nmap, or Metasploit. Why? Because there are a ton of new (and older) tools we use that fall o...</itunes:summary>
      <itunes:subtitle>In this webcast we cover some of the core tools we use all the time at Black Hills Information Security. However, there’s a twist. We don’t talk about Nessus, Nmap, or Metasploit. Why? Because there are a ton of new (and older) tools we use that fall o...</itunes:subtitle>
      <itunes:keywords>Infosec,Cybersecurity,news</itunes:keywords>
      <itunes:explicit>No</itunes:explicit>
    </item>
    <item>
      <title>PODCAST: Raising Hacker Kids</title>
      <itunes:episode>1</itunes:episode>
      <podcast:episode>1</podcast:episode>
      <itunes:title>PODCAST: Raising Hacker Kids</itunes:title>
      <itunes:episodeType>full</itunes:episodeType>
      <guid isPermaLink="false">https://www.blackhillsinfosec.com/?p=9721</guid>
      <link>https://share.transistor.fm/s/a52b9e2e</link>
      <description>
        <![CDATA[Yes.. Ethical Hacker Kids. The holidays are coming up! Here John &amp; Jordan cover the different games, tools and gifts we can give kids that help teach them the trade. There is nothing, nothing like sitting around with family picking locks,]]>
      </description>
      <content:encoded>
        <![CDATA[Yes.. Ethical Hacker Kids. The holidays are coming up! Here John &amp; Jordan cover the different games, tools and gifts we can give kids that help teach them the trade. There is nothing, nothing like sitting around with family picking locks,]]>
      </content:encoded>
      <pubDate>Tue, 04 Dec 2018 12:32:34 -0500</pubDate>
      <author>Black Hills Information Security</author>
      <enclosure url="https://media.transistor.fm/a52b9e2e/056ead02.mp3" length="66652408" type="audio/mpeg"/>
      <itunes:author>Black Hills Information Security</itunes:author>
      <itunes:duration>2777</itunes:duration>
      <itunes:summary>Yes.. Ethical Hacker Kids. The holidays are coming up! Here John &amp;amp; Jordan cover the different games, tools and gifts we can give kids that help teach them the trade. There is nothing, nothing like sitting around with family picking locks,</itunes:summary>
      <itunes:subtitle>Yes.. Ethical Hacker Kids. The holidays are coming up! Here John &amp;amp; Jordan cover the different games, tools and gifts we can give kids that help teach them the trade. There is nothing, nothing like sitting around with family picking locks,</itunes:subtitle>
      <itunes:keywords>Infosec,Cybersecurity,news</itunes:keywords>
      <itunes:explicit>No</itunes:explicit>
    </item>
    <item>
      <title>PODCAST: Blue Team-Apalooza</title>
      <itunes:episode>1</itunes:episode>
      <podcast:episode>1</podcast:episode>
      <itunes:title>PODCAST: Blue Team-Apalooza</itunes:title>
      <itunes:episodeType>full</itunes:episodeType>
      <guid isPermaLink="false">https://www.blackhillsinfosec.com/?p=9571</guid>
      <link>https://share.transistor.fm/s/afb4b627</link>
      <description>
        <![CDATA[Over the past few months, we have discovered a couple trends that organizations seem to be missing. No silver bullets, just some general vulnerability issues we are seeing again and again. In this podcast, Jordan &amp; Kent give a few pointers and some new...]]>
      </description>
      <content:encoded>
        <![CDATA[Over the past few months, we have discovered a couple trends that organizations seem to be missing. No silver bullets, just some general vulnerability issues we are seeing again and again. In this podcast, Jordan &amp; Kent give a few pointers and some new...]]>
      </content:encoded>
      <pubDate>Thu, 15 Nov 2018 11:57:52 -0500</pubDate>
      <author>Black Hills Information Security</author>
      <enclosure url="https://media.transistor.fm/afb4b627/14c41fde.mp3" length="69912137" type="audio/mpeg"/>
      <itunes:author>Black Hills Information Security</itunes:author>
      <itunes:duration>2913</itunes:duration>
      <itunes:summary>Over the past few months, we have discovered a couple trends that organizations seem to be missing. No silver bullets, just some general vulnerability issues we are seeing again and again. In this podcast, Jordan &amp;amp; Kent give a few pointers and some new...</itunes:summary>
      <itunes:subtitle>Over the past few months, we have discovered a couple trends that organizations seem to be missing. No silver bullets, just some general vulnerability issues we are seeing again and again. In this podcast, Jordan &amp;amp; Kent give a few pointers and some ne</itunes:subtitle>
      <itunes:keywords>Infosec,Cybersecurity,news</itunes:keywords>
      <itunes:explicit>No</itunes:explicit>
    </item>
    <item>
      <title>PODCAST: Creating &amp; Keeping a Malware Zoo</title>
      <itunes:episode>1</itunes:episode>
      <podcast:episode>1</podcast:episode>
      <itunes:title>PODCAST: Creating &amp; Keeping a Malware Zoo</itunes:title>
      <itunes:episodeType>full</itunes:episodeType>
      <guid isPermaLink="false">https://www.blackhillsinfosec.com/?p=9470</guid>
      <link>https://share.transistor.fm/s/785ba089</link>
      <description>
        <![CDATA[Creating and Keeping a Malware Zoo with John Strand]]>
      </description>
      <content:encoded>
        <![CDATA[Creating and Keeping a Malware Zoo with John Strand]]>
      </content:encoded>
      <pubDate>Tue, 09 Oct 2018 10:45:21 -0400</pubDate>
      <author>Black Hills Information Security</author>
      <enclosure url="https://media.transistor.fm/785ba089/adba17dc.mp3" length="59128242" type="audio/mpeg"/>
      <itunes:author>Black Hills Information Security</itunes:author>
      <itunes:duration>2464</itunes:duration>
      <itunes:summary>Creating and Keeping a Malware Zoo with John Strand</itunes:summary>
      <itunes:subtitle>Creating and Keeping a Malware Zoo with John Strand</itunes:subtitle>
      <itunes:keywords>Infosec,Cybersecurity,news</itunes:keywords>
      <itunes:explicit>No</itunes:explicit>
    </item>
    <item>
      <title>PODCAST: John Strand’s 5 Year Plan into InfoSec Part 2</title>
      <itunes:episode>1</itunes:episode>
      <podcast:episode>1</podcast:episode>
      <itunes:title>PODCAST: John Strand’s 5 Year Plan into InfoSec Part 2</itunes:title>
      <itunes:episodeType>full</itunes:episodeType>
      <guid isPermaLink="false">https://www.blackhillsinfosec.com/?p=9374</guid>
      <link>https://share.transistor.fm/s/1b1d5560</link>
      <description>
        <![CDATA[John Strand shares some of his own journey into information security and also his ideas and tips for those wanting to get into the industry from the start, or those looking to change career paths mid stream.]]>
      </description>
      <content:encoded>
        <![CDATA[John Strand shares some of his own journey into information security and also his ideas and tips for those wanting to get into the industry from the start, or those looking to change career paths mid stream.]]>
      </content:encoded>
      <pubDate>Mon, 24 Sep 2018 13:50:34 -0400</pubDate>
      <author>Black Hills Information Security</author>
      <enclosure url="https://media.transistor.fm/1b1d5560/10ffa8b3.mp3" length="71568006" type="audio/mpeg"/>
      <itunes:author>Black Hills Information Security</itunes:author>
      <itunes:duration>2979</itunes:duration>
      <itunes:summary>John Strand shares some of his own journey into information security and also his ideas and tips for those wanting to get into the industry from the start, or those looking to change career paths mid stream.</itunes:summary>
      <itunes:subtitle>John Strand shares some of his own journey into information security and also his ideas and tips for those wanting to get into the industry from the start, or those looking to change career paths mid stream.</itunes:subtitle>
      <itunes:keywords>Infosec,Cybersecurity,news</itunes:keywords>
      <itunes:explicit>No</itunes:explicit>
    </item>
    <item>
      <title>PODCAST: Beacon Analysis</title>
      <itunes:episode>1</itunes:episode>
      <podcast:episode>1</podcast:episode>
      <itunes:title>PODCAST: Beacon Analysis</itunes:title>
      <itunes:episodeType>full</itunes:episodeType>
      <guid isPermaLink="false">https://www.blackhillsinfosec.com/?p=9325</guid>
      <link>https://share.transistor.fm/s/f5aeaea4</link>
      <description>
        <![CDATA[Beacon Analysis with Active Countermeasures COO, Chris Brenton]]>
      </description>
      <content:encoded>
        <![CDATA[Beacon Analysis with Active Countermeasures COO, Chris Brenton]]>
      </content:encoded>
      <pubDate>Mon, 17 Sep 2018 12:21:30 -0400</pubDate>
      <author>Black Hills Information Security</author>
      <enclosure url="https://media.transistor.fm/f5aeaea4/5d2a8913.mp3" length="70598085" type="audio/mpeg"/>
      <itunes:author>Black Hills Information Security</itunes:author>
      <itunes:duration>2939</itunes:duration>
      <itunes:summary>Beacon Analysis with Active Countermeasures COO, Chris Brenton</itunes:summary>
      <itunes:subtitle>Beacon Analysis with Active Countermeasures COO, Chris Brenton</itunes:subtitle>
      <itunes:keywords>Infosec,Cybersecurity,news</itunes:keywords>
      <itunes:explicit>No</itunes:explicit>
    </item>
    <item>
      <title>PODCAST: What Is a Red Team, Anyway?</title>
      <itunes:episode>1</itunes:episode>
      <podcast:episode>1</podcast:episode>
      <itunes:title>PODCAST: What Is a Red Team, Anyway?</itunes:title>
      <itunes:episodeType>full</itunes:episodeType>
      <guid isPermaLink="false">https://www.blackhillsinfosec.com/?p=9287</guid>
      <link>https://share.transistor.fm/s/99521166</link>
      <description>
        <![CDATA[Dakota Nelson explains the different kinds of penetration tests (including red teams) in this industry and how they can help your team.]]>
      </description>
      <content:encoded>
        <![CDATA[Dakota Nelson explains the different kinds of penetration tests (including red teams) in this industry and how they can help your team.]]>
      </content:encoded>
      <pubDate>Mon, 10 Sep 2018 11:01:30 -0400</pubDate>
      <author>Black Hills Information Security</author>
      <enclosure url="https://media.transistor.fm/99521166/7f942823.mp3" length="53089832" type="audio/mpeg"/>
      <itunes:author>Black Hills Information Security</itunes:author>
      <itunes:duration>2210</itunes:duration>
      <itunes:summary>Dakota Nelson explains the different kinds of penetration tests (including red teams) in this industry and how they can help your team.</itunes:summary>
      <itunes:subtitle>Dakota Nelson explains the different kinds of penetration tests (including red teams) in this industry and how they can help your team.</itunes:subtitle>
      <itunes:keywords>Infosec,Cybersecurity,news</itunes:keywords>
      <itunes:explicit>No</itunes:explicit>
    </item>
    <item>
      <title>PODCAST: From Active Countermeasures – Attack Tactics 4</title>
      <itunes:episode>1</itunes:episode>
      <podcast:episode>1</podcast:episode>
      <itunes:title>PODCAST: From Active Countermeasures – Attack Tactics 4</itunes:title>
      <itunes:episodeType>full</itunes:episodeType>
      <guid isPermaLink="false">https://www.blackhillsinfosec.com/?p=9254</guid>
      <link>https://share.transistor.fm/s/92f77b77</link>
      <description>
        <![CDATA[A special guest episode from Active Countermeasures with John Strand and Chris Brenton]]>
      </description>
      <content:encoded>
        <![CDATA[A special guest episode from Active Countermeasures with John Strand and Chris Brenton]]>
      </content:encoded>
      <pubDate>Tue, 28 Aug 2018 12:52:17 -0400</pubDate>
      <author>Black Hills Information Security</author>
      <enclosure url="https://media.transistor.fm/92f77b77/da802447.mp3" length="75839781" type="audio/mpeg"/>
      <itunes:author>Black Hills Information Security</itunes:author>
      <itunes:duration>3158</itunes:duration>
      <itunes:summary>A special guest episode from Active Countermeasures with John Strand and Chris Brenton</itunes:summary>
      <itunes:subtitle>A special guest episode from Active Countermeasures with John Strand and Chris Brenton</itunes:subtitle>
      <itunes:keywords>Infosec,Cybersecurity,news</itunes:keywords>
      <itunes:explicit>No</itunes:explicit>
    </item>
    <item>
      <title>PODCAST: Active Directory Best Practices that Frustrate Pentesters</title>
      <itunes:episode>1</itunes:episode>
      <podcast:episode>1</podcast:episode>
      <itunes:title>PODCAST: Active Directory Best Practices that Frustrate Pentesters</itunes:title>
      <itunes:episodeType>full</itunes:episodeType>
      <guid isPermaLink="false">https://www.blackhillsinfosec.com/?p=9161</guid>
      <link>https://share.transistor.fm/s/17bea451</link>
      <description>
        <![CDATA[Jordan and Kent discuss how to set up Active Directory to best frustrate pentesters - take care of that low hanging fruit!]]>
      </description>
      <content:encoded>
        <![CDATA[Jordan and Kent discuss how to set up Active Directory to best frustrate pentesters - take care of that low hanging fruit!]]>
      </content:encoded>
      <pubDate>Mon, 13 Aug 2018 11:56:22 -0400</pubDate>
      <author>Black Hills Information Security</author>
      <enclosure url="https://media.transistor.fm/17bea451/dfa5ca1f.mp3" length="87944722" type="audio/mpeg"/>
      <itunes:author>Black Hills Information Security</itunes:author>
      <itunes:duration>3662</itunes:duration>
      <itunes:summary>Jordan and Kent discuss how to set up Active Directory to best frustrate pentesters - take care of that low hanging fruit!</itunes:summary>
      <itunes:subtitle>Jordan and Kent discuss how to set up Active Directory to best frustrate pentesters - take care of that low hanging fruit!</itunes:subtitle>
      <itunes:keywords>Infosec,Cybersecurity,news</itunes:keywords>
      <itunes:explicit>No</itunes:explicit>
    </item>
    <item>
      <title>PODCAST: Security Policy: Fact Fiction or Implement the Marquis de Management</title>
      <itunes:episode>1</itunes:episode>
      <podcast:episode>1</podcast:episode>
      <itunes:title>PODCAST: Security Policy: Fact Fiction or Implement the Marquis de Management</itunes:title>
      <itunes:episodeType>full</itunes:episodeType>
      <guid isPermaLink="false">https://www.blackhillsinfosec.com/?p=9101</guid>
      <link>https://share.transistor.fm/s/dc809fad</link>
      <description>
        <![CDATA[CJ Cox talks about the highs, lows, hows and why's of security policy.]]>
      </description>
      <content:encoded>
        <![CDATA[CJ Cox talks about the highs, lows, hows and why's of security policy.]]>
      </content:encoded>
      <pubDate>Mon, 30 Jul 2018 12:12:27 -0400</pubDate>
      <author>Black Hills Information Security</author>
      <enclosure url="https://media.transistor.fm/dc809fad/9743745a.mp3" length="72779852" type="audio/mpeg"/>
      <itunes:author>Black Hills Information Security</itunes:author>
      <itunes:duration>3031</itunes:duration>
      <itunes:summary>CJ Cox talks about the highs, lows, hows and why's of security policy.</itunes:summary>
      <itunes:subtitle>CJ Cox talks about the highs, lows, hows and why's of security policy.</itunes:subtitle>
      <itunes:keywords>Infosec,Cybersecurity,news</itunes:keywords>
      <itunes:explicit>No</itunes:explicit>
    </item>
    <item>
      <title>PODCAST: Highly Caffeinated InfoSec</title>
      <itunes:episode>1</itunes:episode>
      <podcast:episode>1</podcast:episode>
      <itunes:title>PODCAST: Highly Caffeinated InfoSec</itunes:title>
      <itunes:episodeType>full</itunes:episodeType>
      <guid isPermaLink="false">https://www.blackhillsinfosec.com/?p=8990</guid>
      <link>https://share.transistor.fm/s/47d64260</link>
      <description>
        <![CDATA[Join Beau Bullock and Mike Felch as they talk about ways to learn more, network and wake up your inner hacker. See the full episode here and look at the slides here.]]>
      </description>
      <content:encoded>
        <![CDATA[Join Beau Bullock and Mike Felch as they talk about ways to learn more, network and wake up your inner hacker. See the full episode here and look at the slides here.]]>
      </content:encoded>
      <pubDate>Mon, 16 Jul 2018 10:20:26 -0400</pubDate>
      <author>Black Hills Information Security</author>
      <enclosure url="https://media.transistor.fm/47d64260/2f7c57de.mp3" length="73931168" type="audio/mpeg"/>
      <itunes:author>Black Hills Information Security</itunes:author>
      <itunes:duration>3079</itunes:duration>
      <itunes:summary>Join Beau Bullock and Mike Felch as they talk about ways to learn more, network and wake up your inner hacker. See the full episode here and look at the slides here.</itunes:summary>
      <itunes:subtitle>Join Beau Bullock and Mike Felch as they talk about ways to learn more, network and wake up your inner hacker. See the full episode here and look at the slides here.</itunes:subtitle>
      <itunes:keywords>Infosec,Cybersecurity,news</itunes:keywords>
      <itunes:explicit>No</itunes:explicit>
    </item>
  </channel>
</rss>
