A (59:56)
Okay, so check it out. Betterment, a platform I've never heard of that handles cryptocurrency, manages $65 billion. I mean, we're doing some fun stuff over here at Simply Cyber, but last time I checked the P L report, we're not at $65 billion. Holy Jesus. I will tell you, the Buffer Osier Flow Studio will get a few upgrades if we start, if we pass the 65 billion dollar annual revenue mark. Believe that. Okay, I'll be coming to you from the Buffer Osier Flow Studio live from Cayman islands. So on January 9, just a few days ago. So this is fresh reporting. Attacker gained access to third party software that Betterment uses for marketing. Okay, so this is a. This is a perfect scenario. Kind of similar to what I just mentioned for a tabletop exercise. A lot of companies use third party services for marketing. Salesforce, I'm looking at you. And then they used it to basically send out a bunch of phishing emails around a crypto reward scam. So this is what I mean. This is it. Threat actor got in, found a crypto client for this marketing company, and then used the marketing tools. Marketing sends emails, email sequences, nurturing campaign, whatever. They used it and basically sent up straight up. Crypto will triple your crypto limited time offer. Classic marketing. They put a little bit of urgency in it. Speaking of urgency, as an example, we're only taking the first hundred registry registered people for this free workshop I'm hosting on the 28th. So move now. You don't want to be left out in the cold if you're not one of the first hundred. Okay, like literally, that is a marketing technique. Scarcity. All right. It's true though. I'm only taking 100, dude. I can't believe. Hey, click here, get triple your crypto. Like, what business successfully runs like that? You know what I'm saying? People fell for it. Betterment. Here's the thing. Betterment systems weren't compromised. It's a service Betterment uses. But Betterment is now having to handle all of the bad pr. I'm sure they canceled their service with that marketing agency and are probably going to sue them. Yeah, I don't know, guys. This is a perfect. This to me, is a perfect case study. In fact, I would almost check this. Look at this story, learn this story, be familiar with this story, and then in a job interview, you can easily reference this story. But Betterment did nothing wrong. But because of third party risk, all of. Not all, but many of Betterman's clients suffered a crypto breach appearing come from Betterment. So listen, Jay Gold, AKA J Crypto, AKA J Mod, is in chat. He's got his. He's got his bitcoin, right? And he's using it with Betterment. In this instance, he gets a marketing email from a threat actor, gets compromised, and loses his bitcoin. Who do you think Jay Gold is pissed at? The marketing company? No, he's mad at Betterment because he believes he got scammed by Betterment, someone pretending to be Betterment. So all the phone calls and anger, animosity, vitriol, bad pub, you know, flaming Twitter comments, they're all going to go to Betterment. This is a perfect example of where you face all the brunt of the problem and you did nothing wrong. Betterment could have hired the best and brightest cyber security professionals in the world. Infinite budget, infinite people. Right? And this still would have happened 100%. This still would have happened no matter what. Because Betterment did nothing wrong. Okay, so use this as a tabletop exercise. And if you're a GRC person and the interview question has to do with like residual risk or risk you can't tamp out. This is a solid one. Okay. Jesus. That's gonna do it for Simply Cyber's daily cyber threat brief. I sound like Linda Richmond. Oh, my God. I hope you got a. Oh, give me one second. All right, I'm Jerry from Simply Cyber. I had to send my wife a text message. Don't go anywhere. We're gonna holler over to jawjack in a 30 minute AMA where I'll answer whatever questions I can. We'll have a good time. I'm Jerry from Simply Cyber. Till next time, stay there. Ever wonder what it takes to break into cyber security Join us every weekday for Jawjacking, where industry experts answer your burning questions about the cyber security field live, unfiltered, and totally free. Let's level up together. It's time for some jawjacking. Hey, what's up, everybody? It's Buffer Ozer Flow Studio. I'm on a boat. What's up? I'm Jerry Guy. Listen. What do I do? I answer your questions. Why? Because it's all about good times, helping people, educating. Level up. And, you know, that's what we do here. Now, I want to let you know, if you don't know who I am, I'm Jerry Guy. I work here at the Buffer Osier Flow Studio. I always come on after Dr. Gerald Ozier, that nerd in the daily cyber threat brief. Jesus. Got buddy. Why don't you calm down about the stories not being cyber stories, okay? Just roll with the punches, brother. Okay. Talking about Android bugs and Verizon unlocking phones. Chill out, dude. Like, literally red hulking over nothing. I'm the cool one. Dr. Gerald, not the cool one. Let's answer your questions. Put it in chat. Put a question. A queue in front of it. Hone oh. Honest impulse prod digging me. Thank you. All right, what's up, everybody? Let's answer questions. Got to let everybody know I'm going to a Magic the Gathering tournament pre release for Lauren Eclipsed on Friday. My first tournament in 30 years. I will say, the last tournament I entered, I did win with a red green aggro deck. So what's up, guys? Come at me. What? You got questions, I got answers. Let's do it. I see Zach Hill is in chat. Good to see you, Zach Hill. Big fan of Zach Hill. He and I are going to be working together on a video project soon. Should be getting released soon. All right. I don't have water to drink, Marcus Kyler. That's the problem. I came out to the studio at 8 7:55. So here's the deal. For those who don't know really quickly, many of you know my dog's had some surgery and now he's in the recovery phase. He's not allowed to lick himself. We do have a cone, but when you put it on him, he, like, loses his mind. So what we've decided here is no cone. He doesn't really lick that off. And. But if you catch him, you yell at him and he stops doing it. Which means that me or Nadine have to keep a constant eye on him. Which is fine because we love our dogs and we spend tons of time with them. Nadine takes Callen to the bus stop around 7:30, 7:45. And sometimes the bus is late and she doesn't come back. So I can't shower because the dog will lick himself. And then I come out to the studio. So the dogs are with me in the studio right now. So that's what's up. I didn't have time to get a. I didn't have time to get a glass of water. Oh yeah. So really quickly. I mean, Zach, I don't know. I don't know if, I don't know if you want to talk about it or not. But yeah, Zach Hill and I are working on something like I've basically like attached myself to Zach like a barnacle and forcing myself in the most type a way possible to, to some, some work that he's doing that we're going to be working on. So I'm happy to talk about it. I would love to answer cyber security questions. To me, listen, Jawjacking is about helping people in the cyber security industry. So anytime the conversation derails into anything not cyber related, personal stuff, projects, you know, magic, whatever, I, I'm happy to talk about it, but that's not the point of the show. So any opportunity to get back on track is valuable. Valuable to me. Okay. Because this is about you guys. All right. Devin says, did you see the new EFF list of worst data breaches of 2025? No. Let's take a worst data data breaches 2025. Let's take a look here. All right, Electronic Freedom Foundation. Let's see what we got here. Oh my God. This is kind of fun. The say something without saying anything award. Mix panel. A data analytics company collects information on users of any app which has their SDK suffer major breach. The service was used by Ring Doorbell, for example. They left reporters with unanswered question. Okay, whatever. This is interesting but unfortunately I can't read this while streaming because it's not entertaining or valuable for the audience. But I will drop a link to this story. Thanks for sharing it, Devin. And invite you audience to go check it out. Mara Levy says, is Yesterday's stream about LinkedIn available for Team Replay? Yes, it is, Mara Levy. So I will, I will share that right now. Let me, let me just do it live right now. So if you missed it, if you missed it, it's right here. Personal branding for your Cyber career in 2026. This was the first simply cyber skills stream of 2026. So if you didn't know Skill Stream is A new show that I am developed and in pushing out for 2026, we're going to give it a shot. It is a one hour live monthly show with industry professionals. I will not be in any more of them pending a big issue. I wanted to do the first one just to kind of work through some issues, if there were any. But we're. I am bringing you various industry professionals in their specific area of expertise to educate you on for an hour and learn a new skill. That's the skill stream. And Mara, I just dropped that one right there. Lots of value in the personal branding one for sure. Brown Coyote says, what Linux Distro do I like to use most? I guess Ubuntu. All right, dude, so many questions. This is great. Have you. Oh, wait. Is it still a good idea to have an emoji in your LinkedIn name to filter for automated messages? It was not mentioned in the video yesterday. Yeah, I mean, do I still have a emoji? So I got rid of the emoji. I got rid of the emoji. I don't know. I don't think it's a bad idea. I don't think it's a bad idea. What, what are the winning lottery numbers for next week? Okay. All right. Continuing to look through chat right now. You know, something I do want to do, and this is a fun one for Zach Hill to hear and everybody, but I want to change the layout of jawjacking like what we're looking at. So it is. Lends itself to being cut up into shorts on Opus Pro afterwards. Like right now, if I do Opus Pro on this for video shorts, it looks terrible. That's one thing I want to do. It's not going to look great to you guys because I'm going to have like a vertical of me here, another vertical of me here, and then something over here. But it will be good for shorts because I need to. I need to. Can the puppies make a cameo? Sure. Mara. Hey, come here, Ripley. Gibby's. Come on, come on. Oh, yeah. All right. This is Gibby's one Gibby Goo. You want to say hi, Gibbies. All right. There's Gibby Goo. Living Teddy bear. Come here, Ripple. Come here, Ripley. Come here. No Ripley. All right. And this is Ripley. This is our patient. Oh, yeah. What a baby. Okay, all right, so there you go. There you go, Mara. There's your minute of puppies. Okay, dj, DJ B sec has a solution. Any source of info. How to conduct a risk assessment for vendors implementing AI in their back end. Systems. Not really, unfortunately, ad tech. Because they're probably not even going to tell you. Not really. That there is a. There's a pretty good service here. MIT has the AI Risk repository. This is a pretty good. This is a free service. You can use this. There's two taxonomies in here. There's two taxonomies in here. Ad tech that you can look at and review. Hey, you can look at and review. That could help you. But really, like, unless you're like Amazon or the US Federal government, if you ask a vendor about their backend AI stuff systems, they're going to tell you to no, like, take a hike. They're. Or they're going to be super vague about it. You know what I mean? All right, continuing to look through chat, Modern Rogue says, where did the beard go? Modern Rogue must have missed it the other day. So basically, Modern Rogue and other men in chat with. With beards. Although Modern Rogue doesn't have a beard as far as I'm. As far as I know. I don't think he does. I let my beard grow like a Chia Pet and then I go in my garage with clippers on level two and I just go. And then I restart the clock. I don't have time to shave. I don't like shaving. So that is my solution. I basically have to. I basically shave like 12 times a year. Maybe, maybe 10 times a year. It's when. It's when my chin gets all bushy and gray and I feel like I'm an old man. That's when I cut it. Gotta look young for these. For these youngs. Modern Rogue, right? Gen Z's looking at me. They're like, oh, you old boomer. You don't know anything about anything. So then I trim up and they're like, yo, what's up, Skibidy Riz? Good to see your aura, son. All right, so quick question from Felipe. Hey, from Felipe. He says currently I T. Help desk. Got a Bachelor's in cyber sec +sc 900, 300, building a bunch of labs and posting. Trying to get into iam. What's the best next move? All right, great. I will tell you, Felipe, you're definitely doing all the things right. What I would say is two things. One, it sounds like you're doing projects and posting. That's great. Wherever you're posting them, if it's like a blog or your, you know, website or GitHub repo, keep at it. Make sure that you're regularly putting it on social media. What I would recommend you do is if you really want to get into iam, I would start focusing your energy, effort and public presence on IAM related content. Right? So write a blog post on 10 risks that, you know, you might. 10 misconfigurations that lead to compromise in Entra ID or, you know, review stories about, you know, there's a couple stories today that go buster. One that basically scans listening services for default creds. But like, make the focus on identity and access management. Talk about federated authentication, talk about okta, talk about mfa. Like, make your focus around identity and access management so people are associating you with that. And then, you know, if you can, I would try to, you know, none of your experience or background here necessarily ties directly to iam. Of course, you didn't mention what labs and projects you're working on, but just basically drill into iam. Also, when you're, when you're networking and talking to people, mention that you're interested in iam. Right? Start, start interacting with people who are working in iam. Right. Cyber. I think of IAM as like cyber adjacent or it's a subset of cyber. But you know, if you, if you let people know, they might say, oh yeah, like I don't really work in iam, but I know someone who. Or they say, oh yeah, yeah, I work in. I work in. I am. Let's talk. Right? So I think you're doing great stuff. All right. S07 what's the best way to prepare for an on site interview? It's been so long since I've done one. Hey, gotta keep my dog from licking himself. So on site interview, best way to prepare. Good night's sleep, get there early, feel good about yourself, feel confident about yourself. The way you're dressed, you know, make sure you feel feel good. Right? Because like that's going to translate into your attitude. Personally, I like to review my own resume before I go in just so I kind of. Everything feels fresh. I always like to have at least one or two relevant current stories that I can reach into and integrate into the conversation. You know, have it, have a good handshake. Right? No dead fish situation. Like it's a lot of the meta things. To me, an on site interview is not that much different from a virtual interview. But, you know, I guess it's more about the physical things. Right. Make good eye contact, speak with confidence, acknowledge people. Hopefully that helps. I know, I feel like that was kind of like. I don't know, I thought that was. Those are the answers I would give. I'm not necessarily sure if it helps you, but I wish you the very best. Also, just a reminder and S. Cole07 I don't know what you're interviewing for, but I just want to remind you everybody that I have this interview series that's come out. I'm releasing a video every day in 20 excuse me, every Sunday in 2026. And the first two videos are part of a series. I've got one coming out next week as well. I asked a person looking to break into GRC, a person who's a three years in GRC and someone with 12 years GRC experience, the same interview question. So this video is one interview question and the way they answer it, you can see here I'm breaking down her response. So like if you've ever job interviewed and then you don't know if you did good or not, you got no feedback. That's what this video does. This video literally will give you the feedback and interview and give you the definitely say this. Definitely don't say that. This is a great answer. Could have gone deeper on this. This is for grc, but I wanted to let you know we have penetration tester in the works. It's in edit right now. So that's going to be coming out in February and I'm currently recording Sock analyst ones as well, which will probably be in like April, March, April time frame. So check those out. All right. Who's hosting Jawjacking tomorrow? Oh, that's a great question. So Citadel starts up tomorrow. I want to let everybody know that your Thursday Jawjacking host will be none other than Zach Hill himself. I t career questions from anti siphon and IT career questions. The man helps people. That's his job. That's his passion in life, helping others. He's going to be here tomorrow and every Thursday from 9am to 9:30am Eastern time helping you out. Why are there not many entry level roles out there right now? I even heard someone say entry level jobs are not entry level in cyber. Zach Morrison Entry level jobs in cyber are not entry level. The term entry level may suggest that you don't any prior experience, right? Like entry level, like you just walk in and enter Cyber security is a specialized field. You do need, honestly, you do need some like background IT background. You should like if you don't know what a network is or what an IP address is or what an operating system is or you know, like how technology works at a very, very basic level, you're gonna not be able to do cyber security work. So what I Like to say is there is I. There are really no entry level jobs, except maybe an internship. There are junior level jobs in cybersecurity. All right, let's keep going here. I got a personal note. I'm pretty excited. My son Callan is being recognized again for academic excellence, and that is happening at 10:30am today. So I do get to do jawjacking and then slide over to that event. Silence poet. How do you remain focused in your career at moments when life events are happening? Yeah, I mean, here's my thing. Silence Poet. You. You can't really focus on all the things, right? So if you have life events that are occurring, what I personally do is, like, that's my priority, and I just maintain the. The career part of it. Right? So, like, let's say, for example, I'm focused on career, I'm working on labs, I'm doing all the things. And then there's a, I don't know, a life altering event. We're moving. Okay, well, the moving becomes the priority. But just like if you have something on the stove, I move. I move the career to the back burner. But I'm still. It's still got heat on it and I'm still stirring it. Right? So you still give it some time and some nurturing. You don't abandon it, but you've got to focus on the here and now. I'd also say, like, if your career is a priority, you will find time for it, right? Maybe it's not the back burner. Maybe it's the left side burner. For me, the front right burner is like the primary burner when I cook. So I would just say it really is not necessarily has to remain the priority all the time, but you can't just put it in the closet and put it up, because out of sight, out of mind. I mean, honestly. Silence Poet. I mean, I got a PhD. I got a master's and a PhD while my wife or while we were adding children to our family. So, like, pregnant delivery, newborn. I was in a PhD program during all that. Okay. So, like, it really is about time management and. And managing all those things. You know what I mean? So. And I know everybody's situation's different, right? There's socioeconomic concerns, there's financial impacts. There is, you know, you know, different kind of family dynamics. I get all that. I'm not saying my way is the only way. I'm just answering the question how I best can. All right, I got three minutes left. Thoughts on how to build confidence and demonstrate competence in GRC, especially after not working in the field. 3 years. Berlin DAB. Good to see you. Berlin Dam for me. Rebuilding confidence and demonstrating competency. Number one, confidence. Immerse yourself in GRC related stuff. Reading this cyber security framework. Read threat intelligence reports. Look at, you know, like architect some type of lab in your environment and then audit it. Like get cycles. Get not experience, but get back in the routine of doing these things. That's gonna rebuild your confidence because you're gonna be like, oh yeah, I remember all this. And then you'll be able to demonstrate competency because you've just been doing it, right? Audit your home network. You've probably got 50 devices on your home network, right? You can log into your router and look at all the things that have IP addresses assigned to them. Go run a vulnerability scanner, look to see, hey, do I have any default services with default creds? Do I have any devices I didn't know about? Can I patch or update things? Should I put my, here's an architecture one. Put my IoT devices on a separate LAN segment. Put my kids, Xbox and laptops, things that are a higher likelihood of running into compromise because my kids are children and they can be tricked easier. Put those on a separate vlan. Do we have EDR on the kids? Computers in my work machine. Is my work network on a separate vlan? Like these are things you can do and then you can easily talk about. So don't worry about the three years, right? It's just get back in and you know, what's the easiest way to build confidence and get better at riding a bicycle? Get on the bike and pedal. All right, All right, All right, let's go, let's go here. Here we go. Looking at chat. I got two minutes left. Crystal says if you're securing an MSP and still use casea, do you say one should be fine now or two? 20. 20 called, they want their remote management solution back. Yeah, I mean Cassey got compromised pretty gnarly. But I mean, Solar Winds got compromised too. Would you rip Solar Winds out? You know, I'm sure I don't know. Personally. Personally I would. I it. Here's the thing, Crystal. It really depends, right? Do you have a multi year contract? Is Cassette giving you huge discounts? You know, is there a relationship between the Cassia people and your business side people? I, I probably would, would transition. But remember, anytime you switch vendors especially for it, you know, managed services, it is a project to migrate off of what they're doing and migrate onto a new One, Right. They have agents, they have telemetry, VPN or. Yeah, VPN connections and stuff like that. It's a problem, but yeah, I'm right there with you. It's pretty gross. All right, continuing to look here through chat. We're at 9:30 so I'm going to speed run the last questions here. Don't call me an unk it. Career questions. Okay, so I am trying to spell out acronyms. I missed one here. IAM is Identity and Access Management. It's basically handling user accounts, provisioning, permissioning. And, and IAM isn't just about you get an account or you don't get account or you have this role. You don't have this role. It could be provisioning like inside of this application. What, what capabilities do you have access to? Right. All right, let's see. Space tacos. What kind of handshakes appropriate for ladies? We used to get the dainty lady shake, but sometimes get the man handshake. What. What is correct? I mean for me, I, I don't really, I don't know. I wouldn't say a firm hand crushing handshake, but also not the like, you know what I mean? I would just, you know, like, I would say like a little bit of squeeze. You know what I mean? It's a good question though. When will you submit a petition to permanently retire the term quishing? My, my, I've already submitted several. Find the Truth's favorite acronym I think is BGP Border Gateway Protocol. It's how the Internet actually works. Just no one talks about it. All right, continuing to run through, looking for cues. Really quick speed running here. Any other vending specific certs you recommend after SC300? Thinking about CyberArk?