Loading summary
Ben (DJ Bsek)
I had to have a little audio messed up at the beginning so I could act like Jerry. Good morning, everybody. Welcome in. It is Thursday. That means it's Thanksgiving here in in the States. And I'm filling in for Jerry this morning just so we can have a little cyber news. Hopefully everybody is starting off their morning or their afternoon or their evening very well and good. Let's go ahead and run a couple of things and then we'll jump into the news. Let's see. Actually, you know what? I don't have anything I need to run today because you know what? This is a rogue stream. So we're just going to do what we want to do today. I was going to go in and run my own, but CISO series did actually put out something this morning. So we're going to go ahead and run the news from CISO series. I think there's about seven stories or so. Let's check in with Chat real quick. Let me make sure everybody can hear everything. Everybody, everything sounds good. I'm hoping everybody still hears me. Hope I'm not way off. I'm scrolling through here. Oh, good morning from Arizona. Ernesto from. From Arizona. All right, let's see. It is 7:01. Usually Jerry will banter, go through a whole bunch of different things, talk for about 10 minutes. I don't really have any of that stuff this morning. So I, I say we jump into the news. We'll go through the news. I quickly looked at it. We've got a lot of AI this morning. Looks like this morning is all about AI. So let's go ahead, move over and jump over to that and let's get started. Let me fire this up. I've got so many things up and it's been so long since I've done this. I'll make sure that we've got everything squared away. For those of you that don't know, I wiped my obs completely, so I had to restart from scratch. So all the fun stuff that I had on there isn't on there anymore. But we'll, we'll fix that. For those of you that are new here, that don't know me, let me give you a quick intro real fast before we jump into everything. My name is Ben, AKA DJ Bsek is what everybody calls me. I've been in the industry 20 to 25 years. I recently, well, I say recently. Last year got my cissp and I've been helping Jerry out on this stream for, I don't know, like three years now. Just mainly in the background. I Do pop on every other time and again on Fridays at the panels. So that's a little bit about me, but let's go ahead. Let's jump into the news and see where we're at for today. Let me pop over here. That's the wrong story. Here we go. All right, first story. Let's get it from the CISO series.
Sarah Lane
It's cyber security headlines.
Ben (DJ Bsek)
Oh, hold on. That's fast. Whoa. What's going on? Hold on. Let's retry that and y' all let me know if it's too, too quiet. Wait, now it's not going to play. Come on. Like, I can't have a, a good audio session without. All right, so it stopped. All right, let's, let's reload. This wouldn't be, wouldn't be the Daily Cyber Threat Brief if we didn't have some kind of audio. I had everything set up. This, this just proves no matter what.
Sarah Lane
We do from the series, it's cybersecurity headlines.
Ben (DJ Bsek)
Y' all let me know if it's not loud enough.
Sarah Lane
These are the cybersecurity headlines for Thursday, November 27, 2025. I'm Sarah Lane. AWS outage botnet smacks 28 countries. A Marie based botnet called Shadow V2 surfaced during October's major AWS outage, exploiting vulnerabilities in IoT devices from multiple vendors. Fortinet says the botnet infected devices across 28 countries and may have been a test run for future attacks, though it vanished once the outage ended. Shadow V2 spreads via a downloader script and behaves similarly to the Lizard Marais variant, allowing DDoS attacks to. To a command and control server.
Ben (DJ Bsek)
All right, Another day, another botnet. So I saw this one yesterday when it popped up. Botnet takes advantage of AWS outage to smack 28 countries. So we all know it's Mirai. The Mirai botnet. So it's based off of the Mirai botnet. I did see. I saw somebody else talking about this, but it looks like, according to, let's see. Likely serving as a test run for future tax. This is. This is not good. So basically, if, if everybody doesn't know which if you are, you'd have to be under a rock if you didn't know that AWS was out. So AWS had an outage, Was it last week? Week before last? I don't know. We've had so many different outages between AWS and Microsoft Azure and everybody. Cloudflare had an outage. Maybe it was Cloudflare last week. Can't remember. We've had so many. So this new name, Shadow v2, has emerged. Last October's, I'll say last October's AWS outage, infecting IoT devices across the industry and continents, likely serving as a test run for future attacks, according to Fortinet's Fortiguard. Let me see. So they did say that there was a DDoS. So a denial of service. If for those of you that don't know what a denial of service is, usually we use. Not we, not we, but usually what's used is a botnet, which is a whole bunch of different devices, which is just a network of bots, a network of different devices that send out like TCP flood attacks or something like that into one specific IP address. And basically what you do is you send so much traffic to those specific, to that specific IP address, what it does is it basically locks it down and nobody can get to it. Services on the device stop running, so forth. So you deny services to those that are trying to get them. That's a distributed denial of service. So let's jump in. Likely the malware only remained active during the day long outage. So what it sounds like is maybe this stuff was spun up, tested to see if it would work and then spun down. And I may be put into the ether and to hide. Put in the, put in the back black closet. Back closet. During that time it propagated via several vulnerabilities. DDWRT. So man, 2009, holy smokes. So for those of you that don't know what DDWRT is, that is a firmware that you could put on old like linksys routers, you can put them on old wireless routers. But look at that, 2009. In fact, let's do this. Let's go ahead and jump over and let's use mine. So I did fix my stuff and I told Jerry about this yesterday. I fixed my site. So where our EPSS scanner launches fast. So let's see if it works this morning. Oh, look how fast. Okay, so if you got an EPSS score, so this, remember this is 2009. And for those of you that don't know when you read a CVE the year that it happened or the year that it was found is where it comes in. So this is 2009. So we're 2025 going in 2026 and we're looking at close to what, 18 years, something like that. Can't do math off the top of my head. It's too early in the morning. But this is definitely something that number one should be patched. But number two, those devices shouldn't even be out in the wild. Like we're talking wireless devices that were back in 2009 that only run at 54 megs. Like these are. These are those that all the IT people open up their closet and they have this big old junk drawer or this big old junk trunk and they start pulling it out and you start seeing this blue and black wireless router and that's got DDWRT on that. That's just crazy. So we got a 23, 24, we got TP link. It looks like these are all wireless routers. So most of these are probably going to be home routers, home network routers that have access to the Internet or are open to the Internet that we're able to get to. So cloud native botnet previously targeted AWS EC2 instances in September campaigns. We've asked Ford into how many devices were affected by the botnet and they will update the story trying to see if there's anything. Are there any screenshot says blog post. So it looks like maybe we might have an IOC which delivers shadow mirror using binary from. So we could use this IP address here to block. You could block that direct IP address. In fact, you know what, if y' all want to let me pull this up, y' all can see behind. I've got a whole bunch of different things in here. But let me, let me close this real quick and let's. I wrote a little script. In fact, let me find it and I'll pull this up and we'll find out where this IP address is real quick. Since I didn't spend 10 minutes talking in the beginning, we can pull this and let's see here. All right, so what is this IP address here? So I'm going to run. I created a little script that runs out and grabs IP addresses. So let's say 81.88.18.108. All right, so there you go. So this IP address is coming from Berlin. So it's in Europe. There's our city State one Com cloud. So interesting. So that's where the IP address. It looks like that's the ioc. So if I were you, I would at least go in, block that IP address from coming in or out. Is there anything else in here? Shortly after Shadows V run, Microsoft said Azure was hit by a largest cloud based ever or. Oh, that's a different one. Okay. But that was a big 15 million 15 terabytes. All right, interesting story. Let's, let's keep going.
Sarah Lane
LLMs help malware authors evade detection. Google's Threat Intelligence Group says attackers are using malware with large language models at runtime to evade detection. Samples include tools that ask models like Gemini or Hugging Face to rewrite code, generate system specific commands, or help locate secrets. Researchers warn these techniques resemble early polymorphic malware and could make attacks more adaptive, though they remain detectable today due to their reliance on external AI service calls.
Ben (DJ Bsek)
Oh, all right. Big word was in there. So for those of you don't know what polymorphic means, that means that it's an ever changing virus or ever changing malware. Let's look at this. This is interesting. We have a, we have a graphic here. I'm sure Jerry would start playing a saxophone at this point. Let's see. Cyber attackers are integrating large language models into malware. Cyber attackers invest in AI tool development. So phishing is a big one with AI, right? Because they're using all of these different AI models and LLMs to create legit looking phishing messages to send out dark dev. I guess here's all the different AIs that they've got. Oh, I thought this is Xanthropic Xanthorax. I've heard of worm GPT. So these are all the specific AIs that we got our developers using. So this is from Google's Threat Intelligence Group. So threat actors are testing malware that incorporates large language models to create malware that can evade detection by security. Security tools. So here's one of the things, guys, this is not going to stop. It's not going to get better, it's just going to get worse as we move into the age. Well, we're already in the age, but as we get deeper into the age of AI and as we get in deeper with these LLMs and AI models that you're able to feed everything into and then say, hey, how can I bypass this, how can I bypass that? A lot of these models allow you to pull that down and use, and run it locally. So you can bypass those guardrails, right? So you can build, you can build your own server, you can build your own LLM, run your stuff on there, figure out how to bypass guardrails, put the, put things in there and let it start learning. And then once you've taught it or it, it learns what needs to be done to bypass something, then you put that stuff in there. I think a lot of this you're going to start seeing on the Blue side, where they're going to start. It's already being done, but you're going to see more incorporation of AI models in there trying to combat AI. So we're just going to see the fight back and forth. And I think it was last year we talked about this, where we were talking about all the deep fakes and how these deepfakes were getting really good. When you put that deep fake out, how are you going to determine whether or not it's a deep fake? And a lot of people have said, oh, well, what we'll do is we'll take that deepfake and we'll run it through AI And AI will figure out that it's a deep fake, that it's. That it's not real. But then people said, okay, well, what if you take that deep fake and you run it through AI and tell it to clean it and then tell it that it is real? So now the deepfake has been put through an LLM, and that LLM has learned that, oh, no, wait, wait. Even though it says it's a deep fake, it's really not a deep fake. It's. It's real. So at that point, you can't use AI to determine whether or not something's fake or not. So on this one, There's not a lot. So attackers are experimenting with AI. Augmented malware falls into two different categories. Those generated by LLMs and those not. I mean, right now, where is it that they said, oh, unit 42 did this one? Palo Alto. So far, most AI used by cyber attackers has been able to assist in the coding attacks against large targets. Look, this is just something everybody's gonna have to pay attention to. We're gonna have to walk. Walk slowly and keep our. Keep abated breath because we. We will continue to see this. And it will get worse, in my opinion. In my opinion, it's going to get worse before it gets better. I know there are a lot of companies out there that are trying to combat a lot of this stuff, but attackers move a lot faster than blue teamers because all they got to do is get it right once. Right? That's what we talk about. All right, let's move on to the next one. If you've got questions about any of this stuff, just hold them. We'll do jawjacking later and we can talk about this.
Sarah Lane
Anthropic questioned over Claude Espionage. The U.S. house Homeland Security Committee has summoned Anthropic CEO Dario Amodei to testify on December 17th about a likely Chinese espionage campaign. That used Anthropic's AI Claude to target at least 30 organizations. Lawmakers praised Anthropic for disclosing the attack, but called it a significant inflection point for US Cybersecurity. The hearing will focus on how AI, quantum computing and cloud infrastructure are reshaping state sponsored cyber threats.
Ben (DJ Bsek)
Two stories back to back, this is literally the exact same story. Oh, in a different context. Right. So this is exactly what I was talking about. The Homeland Security Committee is reaching out to Anthropic. I'm sure they're going to reach out to open AI. I'm sure they'll reach out to OpenAI. I'm sure they're going to reach out to any LLM or any big language model or GPT that's out there that they can get their hands on to sit there and talk to. This falls into the exact same category. The last story. So the last story talked about how we have people out there that are using AI to create malware. This story right here is saying, hey, we're the government. We heard that you announced that apparently the Chinese espionage was using Anthropic to create malware or create tools. I want you to come talk about that and tell us what's going on, how. And we're going to get, you know, bloviated people sitting on the, on the pulpits sitting there screaming about this and that and we won't get into politics and all that stuff, but that's basically what it's going to be. It's going to be a dog and pony show just to talk about AI and get there, to get their name out there, get their face out there. Getting deeper into this falls back into the story that we just talked about. This is, this one was good. Right? So Anthropic found this. What they say is Anthropic found this and then reported it and said, hey, look, it looks like we've got a Chinese espionage campaign going on using our models. We're going to let everybody know that this is going on and we're going to stop it. And they were able says that they were able to do that. Let's see, the committee sent Amodi, I guess that's a letter Wednesday commending Anthropic for disclosing the campaign. But members are also called the incident a significant inflection point and requested for him to speak on the committee in December 17th. So December 17th, let's say December 18th, we'll probably have a big story about what was said in, in this, in this Intelligence briefing or in this, in this testimony, let's see. Incident was consequential for the United States Homeland Security because it demonstrates what a capable and well resourced state sponsored cyber attacker or a cyber actor such as those linked to the PRC can now accomplish using commercially available US AI systems, even when providers maintain strong safeguards. So here's my first thought. Anybody out there heard of Deep Seek, like, why would China be reaching out to Anthropic and using Anthropic if they've got Deep Seek, which was so much better, so much faster, use less power? It seems like maybe Deep Seek's kind of gone away because that was, I believe that was Chinese based, Chinese built. My question, if I was on these panels. So y' all think about this. Anybody, y' all think about what questions you would ask. If you're sitting on the panel, what would you ask? What would you ask the CEO of Anthropic? My question would be why would a threat actor use the commercially available piece of this? Why wouldn't they pull it down and hide it away? Like, why wouldn't you pull the, the LLM down, put it on your own stuff and run it there? Then guess what? Anthropic can't stop you from doing stuff. That's, that's my thinking. I'm thinking right now is they're doing it out in the open. If they're doing it out in the open, then what are they doing behind the scenes? Are they already running this stuff behind the scenes? And then they're going, hey, let's use the commercially available one and see how much better it is. Does, is it better? Is it faster? That's my thought. Yeah. Phil Stafford, hit it. That's kind of where I'm at, Phil, is like, because Anthropic is an American AI, it's like they're using a US IP address. But the thing is, is there you can do that many other different ways you can use an IP address and try to get through different things and show that you're coming from somewhere inside the US that's the least of their worries. My bigger thing is, is what are they doing on the backside of this? Because if they're doing it out in the open, there's something bigger on the backside, at least in my opinion. Let's see what else we have. The committee also invited comment. Oh, so there you go. So we've got Google Cloud in here, We've got Quantum Exchange. I guess they want to talk about quantum computing as well. I'm sure they're going to get all this big, everybody's going to get all high and mighty about quantum computing. Committee leaders cited a need to closely examine how evidence or how advances in artificial intelligence, quantum computing and related technologies and hyperscale cloud infrastructure are reshaping both defense capabilities and operational tradecraft available to state sponsored. So that's another thing is everything's moved. Everything's moved to the quote unquote cloud. And you can spin up, compute for cheap and use a lot of other people's resources in real time and not have to purchase all this infrastructure and then you can just tear it down and not pay for it over the top. So seems I'm going to breathe through chat a little bit, see if we've got anything in here. Yeah, there's, it's crazy, it's, it's nuts. I mean, to me, we, we're in the day and age, like I just said before, we're in the day and age of where this is just going to continue to happen. So our first three stories was a. Yeah, the first three stories included AI and we're seeing that. And we will continue to probably see that in every single story moving forward, some way, shape or form AI is going to be in the fix of these stories. Let's move on.
Sarah Lane
Forge library gets fixed for signature flaw. A high severity flaw in the nodeforge JavaScript cryptography library lets attackers bypass signature verification by crafting malformed ASN1 data that the library incorrectly treated as valid. Palo Alto Networks reported the issue. Which could allow authentication, bypass or tampering in apps that rely on nodeforge. The library sees roughly 26 million weekly downloads. A fix shipped in version 1.3.2. And developers are urged to update immediately.
Ben (DJ Bsek)
Whoa, whoa. Okay, I heard something. I heard 26 million downloads a day. Hold on, let's, let's look at, let's do this. Let's throw this in here real quick. Let's see what this says. Okay, so our EPSS score is extremely low on here. I don't know if y' all see that. Our EPSS score is slow as low. Our CVSS is 8.3 or 8.6. This isn't a high one. Let's see. Enter node forge 1.3. All right, let's, let's dig into this for a minute. Popular Forge library gets fixed for signature verification Bypass law. A vulnerability in the Node Forge package, a popular JavaScript crypto. Oh, okay, so looks like this one, if it's used the way. If there. If it's used as Much as they're saying that it's used. Let me see, where's this? Okay. The impact may be significant considering the nodeforge is massively popular with close to 26.0 weekly downloads. Okay, I thought I heard daily. I was going to say. Good lord. Okay, so 20, 26 million. Still a lot in a week, but we got npm. So I read something about this. Maybe this is still part of what's going on. I heard that there are lots of NPM packages that are. That are legit packages that now have malware in them. I think. I'm sure we probably went over this last or during the week. This week, because I saw it this week at some point. But there are a lot of packages that seem to be compromised and we've seen a lot of. I was about to say social engineering, but we've seen a lot of. What is the word I'm looking for? Drawing a blank. This is what happens when you get old. It's like the solar winds stuff. I can't think of. I can't think of the word right now. It's too early, people. It's too early. So interpretation conflict vulnerability in forge versions 1.3.1 and earlier enables unauthenticated attackers to craft. So did they say they've updated it? So if you've got one point, if you're using 1.3.1, you're vulnerable to this. Attack the library. Okay, yeah, so fix was released earlier today. So that have been yesterday at 1.3.2. So developers are. Developers need to patch your stuff. Ah, you gotta patch it. Make sure you patch this. The library used by projects that need cryptography, cryptographic and public key infrastructure functionality and JavaScript. Yeah, this is a big one because you're using. It's got your public key in there, it's got your cryptography in there. So it sounds like this is one you definitely need to go ahead and patch. Especially if you're a developer and you're using this package. Download it, patch it, get your stuff fixed.
Sarah Lane
Huge thanks to our sponsor, Nobe4. Cybersecurity isn't just a tech problem, it's a human one. That is why KnowBe4's Human Risk Management platform allows you to measure, quantify and actually reduce human risk across your work with AI powered risk scoring, automated coaching and reporting. HRM helps you surface your highest risk users and reduce the risk of data breaches and cyber attacks. Proactively ready to move from awareness to action. Request a demo of HRM plus today@Nov4.com.
Ben (DJ Bsek)
All right, guess where we're at. We're at the mid roll. So since I gave this to Jerry, I've got it for us this morning. I don't have a. A lot to talk mid roll, but I do figure I will. I'll run this and we'll continue to see if we can use this without getting a hit. Oh, the shirt. Yeah. So my shirt, my Gen X shirt. It says Gen X raised on hose water and neglect. Hopefully everybody's having a great day. Y' all think about this because I'm gonna bring this question up when we talk about. We're talking about jawjacking. I got a little tongue twisted there. What is everybody. For those in the U.S. i know everybody's not in the U.S. and we got like, what? Oh, we only got 106 people in here because everybody's still asleep. But it's a row. It's rogue. Not worried about members today. Those in the U.S. what do you do today? What is your. Your one big thing that you're gonna do with Thanksgiving? And I've got another question I'm going to ask everybody. I'm gonna tease this, but it's about Christmas lights. I've got a question around this and I want Christmas lights and Christmas trees. I want to. I want to see where everybody stands on a particular topic. We are. Where are we at? We're at 7:29. So moving a little quick. Don't have a lot to. To go through like Jerry does. I don't actually have anything to run today, so I don't need to go through sponsors today right now. But we will. We'll let the music play and kind of take a. What's everybody's thought on this one? Everybody. Like, everybody likes this version. Is this version good for everybody? At least everybody that's here? I think it's the closest one I can find to the. To the normal. I'm gonna try and see. Where are we at on this? Two minutes and 14 seconds. Seconds in. Yeah, they already had Thanksgiving Candid's. Thanksgiving's in October, I believe. Green through chat. Just trying to grab some of these before we get our llama loss. We got studied for security plus. Oh, somebody got a six hour round trip today. I'm talking about when I talk about what I do. Let me get the jawjacking, but that's big, man. That's a long. That's a long drive. That's three there, three back. Man. Gen X rocks. But we're getting old. Our knees are popping, our elbows are are popping. I think we did too much pop and lock and now we just pop. Come on. All right, everybody, you ready? Let's throw the LA la and then we'll get into. La. All right, let's jump back in. We can, we can jam some more music later on.
Sarah Lane
Shai Hulud v2 Campaign Exposes Secrets the Shai Hulud v2 supply chain attack has expanded from npm compromising more than 830 npm packages and exposing thousands of secrets. Malware embedded in these packages backdoors developer machines, harvests API keys, cloud credentials and GitHub tokens and exfiltrates them to randomly named public repositories. By exploiting misconfigurations, the attack affects more than 28,000 repositories. Security firms urge rotating keys, auditing dependencies, removing compromised packages, and hardening development pipelines to prevent further spread.
Ben (DJ Bsek)
All right, this is the story that I was actually talking about that I heard earlier this week. So this is, this is on the 26th, I swear I heard this like on Monday or maybe last week. This is what I was talking about. Tons and tons of NPM packages right here that have been compromised. And I think they said they're at 28,000. So this falls back to the story. We just, it's amazing. These stories are like in order. Hey, AI, AI, AI. Then we got NPM packages. Now we got another NPM package. So the second wave of Shia Khaloud supply chain attack, which is the word I was thinking of earlier, I was trying to think of supply chain attack, has spilled over to the Maven ecosystem after compromising more than 830 packages. So we got 830 npm packages that have been registered. The socket research team said it identified a Maven central package named Org, MV MVMP Post hocus. It embeds the same two components associated with this means Postlog project is compromised, released in both JavaScript npm and Java Maven ecosystems driven by the same Shiloh V2 payload. So I don't, I don't know what Shiloh Shia hollowed V2. I don't know what the payload is itself. But this seems pretty nasty when you read into it. So we've got. It aims to still sensitive data like API packages or API keys, cloud credentials, NPM GitHub tokens and facilitate deeper supply chain like worm like fashion. This is nasty. This is looking at saying that it's more stealthy. More stealthy aggressive and scalable and destructive. Let's see, besides borrowing the overly oh wait do we have a. Oh. All right, let's see what we got here. So let's see if we can follow this. We've got compromise. So compromise package install. So the victim gets it runs the JavaScript here, local. So local persistence is set up, environment scanning. Man, this one's. It's pretty nasty. So we've got local persistence, we've got environment scanning, we've got local assistance. In the project directories, local secrets are harvested, GitHub repo manipulation and CD. So this is going to be one. All right, for this is if you use this, if this is a package that you're using, or if this is something you're using, this is something that you're going to need to dive into your development team. Whoever's using these packages, it's going to have to dive into and make sure that they have not been compromised. Number one, look at their pipelines. You may have to. Hopefully you've got a backup of your pipeline. You may have to roll back your pipeline to get this stuff out. Looks like there are also environments, cloud environments, aws, Azure and gcp. And then to me, the bigger one here is that it's like worm propagation. Hey, that's not an arrow. I don't know what my arrow is. That's a box. All right, whatever. So wormlike propagation, meaning this gets into the system, and then once it's into the system, it continues to move through, like, side channels to go through everything and infect all of your stuff. Delete files, corrupt workspace covers, track sabotage. This one's. This one's pretty nasty. Oh, hold on. So we have an outbound C2 that is not my arrow. Outbound C2, we've got remote command and long term persistence. I mean. Yeah, let's read through this. Is there anything in here? So further analysis by Keto uncovered that the threat actors exploited vulnerabilities. Is there anything in here? It's assessed that the activity has continued. A broader set of attacks targeting the ecosystem. Trying to see, do they have any IOCs? Is there anything in here about. I mean, is it just that they're getting hit with it? Hold on. Data compiled by GitGuardian Ox leaking hundreds of GitHub access tokens. Credentials associated with Amazon Web Services, Google cloud. More than 5,000 files were uploaded to GitHub with exfiltration secrets, 4,600 GitLab repositories. It wasn't a different tab, Jerry. It's just right there. No, that's not it. That was it. That was. So there's nothing. Users are advised to rote. So, okay, I get this, right? Everybody, Everybody understand what they're saying here? Let's rotate our tokens, let's rotate our keys, let's audit all our dependencies and try and remove compromised versions. Here's the problem. If you rotate your tokens and you rotate your keys and you don't do anything with the compromised version and you don't check your environment, guess what's going to happen? They're already in your system and they are going to get your tokens, they are going to get everything that you just did. So if you just rotate it, they're going to get everything back. The other thing here is they've got GitHub repo manipulation and CI CD pipeline injection. So they're already there. This is a deep. They're in deep with this stuff. Then they've got outbound connections back too. I mean, this is going to take some time to go through and figure out. From the looks of it, it doesn't look like this is going to be something like, hey, your developers are going to go and roll some stuff back and they'll be done because they're already in the pipelines. This one's pretty. So another reminder that modern software supply chain is still way too easy to break. Yeah, this one's. I don't know where to go with this one. This one's. This one's pretty bad. If, if you use any of these 800. Wait, 28, 28,000. No, 830 packages. But I thought they said something about 28,000. 28,000. No. Okay, maybe not. So any of these 830 packages in this registry? It's going to be a long weekend. All right, let's. Let's keep moving.
Sarah Lane
Prompt injections muddle. ChatGPT's Atlas Browser OpenAI's ChatGPT Atlas Browser launched back in October. It includes agentic AI capable of autonomous tasks. But this expands the risk of prompt injections. Direct or even indirect injections could expose sensitive data, execute code, or compromise networks of agents. Experts warn that the problem grows as agents gain tool access and autonomy, making attacks more dangerous. Mitigations include strict least privilege access, sandboxing, human oversight, and treating untrusted input as hostile.
Ben (DJ Bsek)
Yeah, so this is something I've been thinking about lately. Everybody's using agentic AI, right? Everybody's using Chad GPT, we're using Claude, we're putting stuff in place. And prior we were using AI in the sense of everybody's getting on chat gbt. We're asking you questions, we're asking it to tell people are using AI or Chat gbt more or less like their, their new Google, right? Hey, what do I do here? How do I do this? Where's this at? And you get a, instead of just a, you know, a vomit of web pages, you actually get somebody to tell you, hey, this is what it is, that that's what people were using it as. Instead of getting this big throw up of hey, here's all of the websites that you can go look for and this is how you do it. Now we have Chat GPT, we have Gemini, we've got Claude, where you ask that same question that you would put in Google and you actually get a legit answer back. Now though, we're moving to Agenic AI. And when we talk about agency, we're talking about how are you going to automate stuff? We're talking about things like N8N make, there's another Zapier. So we're taking these AI structures and we're putting them in and creating workflows that do things for us. But the only way to, for them to be able to do those things for us is, is for us to give those specific agents access to the data that we have. And if you don't have guardrails on that, you're, for lack of a better term, you're. Because now it can see all of your data, it's got access to your stuff. And this is something I've, I've stepped back and I've thought, you know, this would be great, let me set this up and do this. But I don't want it to have access to everything that I've got in Google. I don't want it to have access to everything that I have in Microsoft. I don't need it to have access to everything that I've got over in Cloudflare or over in, you know, whatever. You gotta be careful with this stuff. This is where as practitioners we need to come in, we need to step in because companies right now, everybody is going crazy with AI and everybody wants to use AI to put in place to be able to do the jobs, do them faster, do it more efficient. But we're moving, in my opinion, we're moving way too fast because we're not putting those guardrails in place. We're not actually thinking about what's going on on the back end of that stuff. Because if you give them all that access, not only do they have all that access, but now, but let's say for instance, let me give a kind of getting on the soapbox here. Let's go back to the NPM packages. So let's say for instance, you want to set up an automation in there that's going to go out, check all the new packages, automatically download them, put them in place, put them into your pipeline and be done. But you didn't check to find out there wasn't a scan on there. So hey, maybe you can get something to scan those. But now you're just going and automatically downloading NPM packages and putting them in place using your AI searching. Hey, what's the best package for this? Oh, it's going to be this package over here. Okay. Has that package had any problems? Well, no problems that we see. Well that's because that's a brand new problem. It just came out. Boom. Now you've got that new NPM package in your pipeline and you're, you're screwed. That's the way I think, I think of this stuff. Like this is great. It's awesome that we have AI. It's awesome that we have the ability, it helps out with things. For people that don't know how to script, that don't know how to code, it's great for them to learn and do stuff. But we have to have that human element in place to be able to look at this stuff and be able to decipher what's actually going on. Otherwise all of soon is just going to spit out all this stuff, put it in place and be done with it and we're going to have issues. So let's see Chaddy be Atlas. It's open as that's their web browser. So it advertises the agent as being able to book appointments, create side slideshows and more, handling complex tasks from start to finish. ChatGPT's agent capabilities are available for only $20. So on their normal thing, $20, you can do it though it's a bit far more excessive. This is the bigger thing. Prompt injections also are going to exist and everybody's heard of AI hallucination. You start getting prompt injections in there, you're able to direct prompt inject. For example, might be able to ask the chatbot a question that gets into divulging sensitive company documentation. So that's kind of where I was getting at. You're given an agent full on access to all of your stuff with no guardrails. So now your low level desk person can go, hey, what does Joe Bob make? Or what is, what is Sally made? Sally in accounting, what does she make? And the agent has full access to everything in the company and they're able to see what people make or maybe they have access to. Man, this could get dark. I'm not going to get deep in this. This could get dark. Maybe somebody doesn't like somebody in the office, you know, now you can see all their personal stuff. Does it have access to see HIPAA records that somebody has, you know, somebody went to the doctor. Does it, does it now know that so and so's got, you know, some issue with them? It could get bad. Those are the type of like, it's hard in our industry. We want to bring out all the new tools. We love all the new tools, we love to bring new tools to people, but we also have to be cognizant of what these tools are capable of doing and not just see the good, but also see the bad that's in them. And we have to bring that bad out to let people know we can say, hey look, these are fantastic, these are great. But here's where I see the problem and if we're good with this problem, then go ahead and do it. It's a business decision. If this is what you want to do, is what you want to do. But I'm telling you, this is what I see foresee, this is what could happen. So we need to figure out either how we're going to fix this prior to putting in place or we need to know that this is a problem that's going to, that could happen and we're going to have to fix it along the way. All right, I'll get off my soapbox. We'll, we'll move on.
Sarah Lane
Patchwork cyber regs are driving up costs. The Global System for Mobile Communications association, or gsma, says that fragmented, poorly designed regulations for mobile operators are driving up costs without making networks safer. In a new report, the group says overlapping laws and duplicate reporting force operators to spend as much as half their security team's time on compliance. Instead of threat mitigation, the GSMA wants governments to simplify rules aligned with international standards and shift towards coordinated outcomes focused frameworks.
Ben (DJ Bsek)
Oh man, I heard something that touched home the mobile operators. Core security spending is projected to more than double in 2030 as a result of as threats evolve while poorly designed and fragmented policy frameworks add extra compliance cost. According to the industry, I believe so. This is the Register. I think the Register is located in England. I'm wondering if this is just about England, but here's my take on this. What Are we at, we're at 774-8750. The more compliancing, more compliances you put in place, the harder it is on your security team, the harder it is on your IT team. Because now instead of trying to mitigate issues and mitigate problems, we're trying to just be compliant. Jerry talked about, I think it was earlier this week we talked about how you can be compliant, right? You can have a, you can have a gate in the walkway and the gate shut, but you can still walk right around it. Guess what? Hey, we're compliant because you put the gate there, but it doesn't stop anybody from getting in. Is the gate locked? Yes, it's locked as a lock on it. But you didn't tell me that, you know, you didn't say that I had to lock the back door or I had to leave the window locked and lose my voice and then had to leave the window locked as well or the window shut. Like when it comes to compliance, they're checkboxes, right? Those of us that have, have dealt with this, you've gotten your, you know, 20 page spreadsheet or your different things. Is, do you do this? Do you have MFA in? Yes, MFA is on. But is, is it MFA that requires FIDO keys? Is it MFA that just uses sms? Is it mfa? Like when you, when you get down to it, yes, we're compliant, but are we secure? Compliance and secure are not the same thing. Where was it in here? They said something about it's causing issues. In many countries, providers face a patchwork of overlapping laws and specific sector specific policies. They're at the mercy of multiple regulatory bodies. This can result in a higher compliance cost and duplicate reporting, diverting resources from the, from effective risk. So yeah, this is exactly what I'm talking about right here. So we have now, I think we're talking about sell, we're talking about sales signals here with GSM and network. So basically we're saying, hey, this network needs to be compliant. So now we're spending billions of dollars to be compliant, but not necessarily more secure. That's basically what this story is telling you. You got your teams that are going to spend billions of dollars to make sure that they got that gate around that cell tower. But hey, is the gate around the cell tower? Yes, it is that. Are you able to stop people from climbing into it? Now? That's what this story is about. All right, next one.
Sarah Lane
Comcast to pay 1.5 million for vendor breach. Comcast will pay a $1.5 million FCC fine.
Ben (DJ Bsek)
Who cares?
Sarah Lane
Third party debt collector FBCS was hacked back in 2024, exposing data on roughly 274,000 customers. FBCS waited five months to notify Comcast and had repeatedly claimed that no Comcast data was affected. Attackers indeed stole names, addresses, Social Security numbers, dates of birth, and and account numbers. Under the settlement, Comcast has to tighten vendor oversight, run biannual risk assessments, and report violations for three years.
Ben (DJ Bsek)
Oh, my God. Okay, y' all probably saw me do this on screen. $1.5 million for Comcast. That's like reaching in your pocket and grabbing a couple of dimes and nickels. Who cares? That doesn't mean anything. We're talking about 1.5. I feel like Allen Iverson. We're talking about 1.5 million. 1.5 million for a vendor breach affecting 270,000 customers. That $1.5 million fine is $5 a person, $5 a customer, $5.55 per person. So you're telling me that's what my data is worth? That's what my personal data is like? We all know our personal data is all over the place, but you're literally just telling them five dollars. Who cares? This is crazy. Comcast will pay $1.5 million in a federal federal communications investigation into February 2024 vendor data breach that exposed personal information of nearly 275,000. Oh, wait, 275,000. Okay, so maybe it's a little less than five dollars. In fact, was it like four dollars and something? So 1.5 million divided by two hundred and seventy five, 000. No, still. So. Five dollars and fifty cents American dollars. Think. What are we doing here? This is why. This is why they don't. They don't care. They don't care about any data breaches. Who cares? In fact, let's see. Comcast 2024 revenue, 30 billion. Wait, that's in quarter one. Hold on a second. 30 billion in quarter one. 30 billion. So one. So $120 billion and you find them 1.45 million. Like what in. Good Lord. Hey, what are we doing? The FCB, FCBS data breach was initially believed to have affected 1.9 million people in total, but the tally was raised to 3.2 million in June. Finally. Now, before I get over my skis, which I probably already did, Files banks. So they notified Comcast on July 15 the customer data had been compromised. Is this a third party attack? Was this. Not directly with Comcast? So it affected Comcast customers. The threat sold personal data. May got A little out over my skis, but still. $1.5 million to. For 270, 000. That's $5 a person to Comcast. American mass media telecommunications. Those may have been the third party that got that they use that they had to deal with, which would be. Which would be even. It'd be interesting. So if a third party got attacked, it got attacked. For vendor breach. So, yeah, so the vendor was breached. They had 270,000 customers in this vendor. So that's it. That isn't interesting now still, it's only 1.5 million. But it's interesting to say that a vendor was breached and Comcast has to pay their customers. That's an interesting one. It's not bad either, because you know what that becomes? Third party risk. So then now you've got your third party risk, and now you're looking at as Comcast. You look at this and go, okay, do these people do what they say they do, right? Oh, they're compliant, but are they secure? All right, anyway. Oh, that's all right. All right, everybody. That is the news for today. We are going to. It is 7:56 in the time of the land of where I'm at, where you're at. It's probably a different time, but it's 756. We are done with the news today. We're gonna jump over for Jawjack. And we do have something later this morning that I think we've got. Got a. Let me look here real quick. I believe there is. There's a show. Jerry's got a podcast that is this morning that the ioc. Oh, we got the Cyber Mentors podcast after this. Okay, so we're gonna jump into jawjacking. And jawjacking like that. We're gonna jump in, we're going to do some jawjacking for those that are going to stick around. And then we will raid over into the cyber Security Mentor podcast of this. If you're just here for the news, thank you for being here, hanging around with this little rogue show that I had going on. And if you're going to stick around, I'll see you on the other side of this. And we'll be back. If I could find our thing. Here we go.
Jerry from Simply Cyber
Ever wonder what it takes to break into cyber security? Join us every weekday for Jawjacking, where industry experts answer your burning questions about the cyber security field live, unfiltered, and totally free. Let's level up together. It's time for some jawjacking.
Ben (DJ Bsek)
Hey, hey, I'm back Let's find some. Let's find some music we can put in the background. And let's. Let's grab questions, if anybody's got questions. It has been a while. It has been a while. FedEx. Let's find some. I'm gonna put synth wave stream beats on, and that'll be in the background. Don't tell me if it's too loud or not. All right, so that's jawjacking in New Zealand. Yeah. Okay, so I teased a little bit before, but here's a question. I have a legit question because I've. I've heard this from a couple of different. A couple of different ways. Who here. And I wish I could run a poll, because I can't really run polls, but who here puts their tree up before Thanksgiving and puts their Christmas lights up before. Before Thanksgiving? And when I say you put your lights up, you're not paying for somebody to come put lights up. Like, if you pay for somebody to come put your lights up, they're gonna do it before Thanksgiving because they got. They have tons and tons of houses that they're gonna put up. But if you legitimately do all the stuff yourself, which. That's me. I'm a person. I like to do all this stuff myself. But I'm getting to the age to where I'm like, maybe I should stop doing all this stuff myself because everything's popping. You know, that Gen X stuff. Are you one that puts a tree up before Thanksgiving, or do you have. Does Thanksgiving have to come before you put your tree up? Let me know, y' all tell me. All right, here we go. I'm gonna be behind in chat, but I'm gonna move through as quick as I can. All right. Space Tacos is saying, what is your favorite Turkey Day side dish? This is funny because my wife and I were talking about this last night. I am really not a big face guy giving person. Like, I love turkey. I love ham. All the side dishes. To me, my side dish is like apple pie. I'm a sweets person, but if I had to pick one, I would say, like, broccoli, cheese, and rice together. I don't know if you guys do that out there, but would take, like, broccoli, cheese and rice, put it all together. I love broccoli. I love spinach. I love all those type of things. You throw rice and then you throw cheese on top of it. It's amazing. Some good stuff. It's been a while since I could hold my breath up. I still don't pay for Lights to go up. Wait, I still don't pay. Oh, okay. So Phil Stafford is saying he doesn't even pay for them to go up before Thanksgiving. I'm kind of on the fits here, right? So yesterday I mowed the yard. Got the yard already, so we can do the lights. I was talking to my daughter, and I was like, hey, you want to put the lights up now? And I was like, no. I mean, here in Texas, we have not had rain in a long time. So I was like, you know what? I'm just gonna water the yard all day so we can water the yard was not completely dead. And our house doesn't sink into the ground and get all screwed up. But lots of people put their lights out. Lots of people put. Put their trees out. We usually. Usually we wait to put our tree out after Thanksgiving. But since we didn't have much to do yesterday, my daughter and I got out the tree, put the tree up, which is another question I got for everybody. Put the tree up, put the trimmings on it, and did everything. And so now our tree's up and ready to go. So now all I really have to do is put the lights out in the front yard. But if y' all know and you heard, I'm from Texas, I'm in Texas. And we've got UT And A M playing this weekend. Big, big game. So tomorrow, usually the Friday after Thanksgiving, I put up all the lights. But I think tomorrow I'm probably gonna be getting ready for that big game. 6:30 tomorrow. It's a big one. Let's see. With sausage. Oh, let's see. I love green bean casserole. Bacon. A lot of people do green bean casseroles. Let's see. I've always say, I'll do it, but I never happens. I'm with you, FedEx. It's kind of where I've always. We've always been is decorations come after Thanksgiving. Now being off the whole week of Thanksgiving. Well, let me put it this way. As you get older in life, things move slower. You're not able to do things as fast as you once could. So you probably use the whole week to put those. Put those decorations out. Lights have been up since Saturday. We got. Lights have been up since Saturday outside. But it was. So the other thing is, is it's gonna be about the weather too, right? So a lot of people look at the weather and see, is it going to be a decent weekend. Dream Logic is asking me what my favorite coffee and cakes. So I am not a coffee person. Can I drink coffee. I can if it's there. I do not get up in the morning and drink coffee. I'm not a coffee person. I drink vitamin water, those type of things. Cakes, pretty much any cake you put in front of me. I don't like carrot cake. Do not like. Vegetables and cake are not supposed to go together. So carrot cake. No, but like I like. What's funny is I like a good coffee cake. Like a lemon cake confetti cake. If the word cake is in it, I like it. Except for carrot. Oh okay. Sweet. So space taco says it. Apple pie does count as a side dish 100%. So then that's my side dish. Okay, so here we go. This was the other question. Are you a fake tree person or are you a live tree person? I know this is like we're supposed to be talking it and cyber and all this but this holiday we're, we're asking all types of questions. Let's see, we bought a live tree last night and it's going up tomorrow because of Thanksgiving with friends house. That's awesome. A lot of people will also go buy their trees early. I say early, buy them before Thanksgiving. Then you, you're you sitting it like outside and hanging it. So get all the dead, dead needles and stuff off of there. Let's see. Dressing is undefeated. Yeah, I used to be a dressing person. I'm not a big. I mean it is what it is. There's, there's good dressings and there's bad dressings. You get a bad dressing man and that stuff sticks in your mouth. That becomes one of those things where you just, you don't wanna, you become a non dressing person if you get bad dressing day before isn't bad to be honest. It's good. Yeah, that's kind of where I'm at. Like did they, I mean right around that the week of they like don't start putting all your Christmas stuff up when November 1st rolls over. Right. That's. I guess that's kind of where I'm at. Like November 1st. Don't, don't put everything out but. Wild rice, man. I've had wild rice and we have like Spanish rice. For all those who care about protecting your personal data, look into self hosting everything. Yeah. So that, that falls in line with what we talked about earlier with the LLMs. Self hosting a lot of this stuff, pulling it down and actually using those LLMs locally. And that way your data isn't necessarily. You still got to put guardrails on there, put things out. But Self hosting. It would be a lot safer. Man, my throat. What was it gonna say? Network Chuck. Network Chuck has a couple of videos out downloading. I think you use a llama and setting up a llama. Now. I'm not gonna lie, this does happen. So people put up people. I might fall into that category of people. People put the Christmas stuff up right around Thanksgiving and then it doesn't actually come down until the middle of January or February. You know why? Because everybody loves to have that stuff up and be festive. Like you get that feeling. And I don't even call it like the feeling of Christmas, just the feeling of everything is maybe easier. Like got family now. Once all this stuff, once everything gets put back away, it's almost like you're back to. Back to reality. That's Eminem. It's kind of like when you go on vacation right when you hit the door and you're heading out and you're. You hit the airport, you're on that plane. It's like reality goes away and now you're on vacation and all your worries are gone and don't have. Shouldn't be thinking about work or other stuff. Just focus on your vacation, focus on your time. But then when you turn around and you get back on the plane to come home, it all sets in like, damn, it's over. Now I've got to. Now I gotta get back to life. Taking down the. The tree, taking down your decorations. That's that feeling. Dream logic is asking what's in wild rice? Well, if I am wild rice all it's different types of rice. Dream logic. I'm not sure what soft bread is. Is there such thing as hard bread? I mean like a baked like a baguette or whatever. I mean those are hard breads. But I don't know what soft bread. How many just leave? Hey, this happens all the time. Who have everybody raise your hand if you do this. How many just leave their lights up all year round but don't turn them on during the Christmas season. So is everybody see like everybody sees those new lights that everybody's getting and putting under their soffits of their house. They like stick to the soffit or you drill them in, screw them in and they hold on. So now you, you can like hit it and it'll change red and green lights now and then in the off season you got like what the purple and yellow and stuff for thanks or not Thanksgiving, but Easter. Like everybody's putting those up everywhere. That way they can leave their lights up. Oh I do like a good bread pudding. A good bread pudding. So we actually have a company here that's literally right around the corner from where I'm at that makes the best bread pudding. I'd never had bread pudding before. It sounded like I'm like red pudding. What the. What is that? I was like, all right, I'll try it. I was like, oh my God, this is amazing. Yes. This is hilarious. So this, when we put up the tree yesterday, that was the first thing. I walked into my wife's office and I said, hey, do we have any of that pine smell? We need to put that stuff out. It's. Tis the season. We need to put some pine smell out. She's like, yes, yes, we have it. FedEx says he used to buy live a year ago. We changed to the fake and haven't looked back. Yeah, we used to do. We did lives in all reality. Like if you use. If you buy a fake tree and you use it for five years, it's the same as buying a real tree. Now the only problem is you gotta find a place to store it. So I would prefer a live tree, but the fake one was. Yeah, that's the thing. Like the fake trees are convenient, especially the pre lit trees. You can just put them in place. I've got a. I think our tree is 14ft, 15ft, 12 foot. I don't know, something like that. Maybe it's 12 foot. But yeah, we put. We. It's. It's convenient. Right? I used to put tree decorations up. I'm gonna try and move through. I know there's a lot in here. Bad dressing. Yeah, Bad dressing is beyond disappointing. What is FedEx saying? I'm expecting the Christmas decorations stayed on after Three Kings Day, which is generous. Yeah, there you go. Keep them up. Dreamlike. Wait, you bought a tree poster? Is that what you put up, a tree poster? Phil Staffer, are you asking or are you saying? I think it's Ola. Yeah. Olama is what we download, put in. I got a whole. Oh, I think he was telling somebody that. Dreamlogic wild. Oh, here we go. So Steve Young is telling us what wild rice is. Wild rice is a nutritionist aquatic grass. That is not true. Rice known for its unique flavor, health benefits and cultural significance, particularly among indigenous people. We may not be thinking the same thing. Like, I know you can go and buy wild rice, but it seems like there. It's rice, but it's like different color box. Let's see. The only reason you use versus code is. I need that vacation. Give Me A. Yeah, we all need vacation. Once we get to everybody does everybody feel the same way? Like, as you move through when. When you hit January 1st, it's like, okay, start of the new year, let's start hammering this stuff out. Let's knock all this stuff down. And then, you know, you get to the summer and you're like, man, I really need a break. But you're just trying to push through, and you get through, and you get through Q3, and you're like, all right, I'm Q through Q3. Now. I just got October, November, December, and I got Halloween, and I got Thanksgiving and Christmas. So now's my time to take off. And then, of course, when it's your time to take. Take off, you're like, but I still have all these other projects that still need to get done. Oh, there you go. Yeah, we don't talk about taking stuff down yet. Don't kill vibe. It is a vibe. Don't take it down. Leave it up. Okay, so now. Now Dream Logic is. Is in my wheelhouse here. So Texas Roadhouse soft bread, which we just call bread. Their bread is amazing. But what makes their bread amazing is they have, wait for it, cinnamon butter that's put all over it. So if you don't have a Texas Roadhouse in your area or you've never had had Texas Roadhouse, I'm sorry, but that is the best bread around. In fact, I know, like Walmart and Sam's Costco, all them. Because of what the way Texas Roadhouse was or has become such a staple when it comes to the bread, they now are selling all the different types of butters. Oh, this would be interesting. What does an AI inspired decorated Christmas tree look like? So I guess we're asking two different things. AI inspired me. Does AI build the Christmas tree, or are we talking about the Christmas tree? And then you're putting AI stuff on it, like, you know, different AI ornaments. That could be. That'd be an interesting one. A good bread pudding is wonderful. Yes. Yeah. Okay, Govi. That's what it was. There's different ones. The Govee. And there's other ones. Permanent lighting. It's not really permanent lighting. It's screwed in lighting. What it is. Dream Logic is saying, could you refresh me on board what bread pudding is? I can. It is delicious. That's what it is. I don't know what's in bread pudding. It's like bread and, like, condensed milk and, like, 80 pounds of sugar. It's. I. It's sugar bread. It's delicious. Those are the lazy persons yet I don't know what. Reading through all of these wild rice is delayed. So space taco says wild rice is delicious. Happy Thanksgiving everyone. Oh, here we go. Alpha Sierra. Happy Thanksgiving everyone. Be safe wherever you may go and we'll see you all again tomorrow. You are welcome. She's probably already left because I was at 8:13 and we're at 8:16 so I'm thinking three minutes behind on these. What? Wait, wait. I'm trying to. I don't know what, what they're talking about here but it paired deliciously with Cornish hen back and corner. I don't know what was that? What was paired. This is something we all need. We all need more breaks. Everybody needs a break. I think everybody should get like a two day vacation every month. We gotta reset. Is it fry bread? I don't know what fry bread is. I'm reading comments. When I see something I'll throw it up there. I'm just kind of going through here. Yes. Cinnamon butter is delicious. So good. So good. Hawaiian bread. So I've heard like people using Hawaiian bread to make, to make bread pudding. Like I'm seeing this chat come in over here but I don't see it on, on the other one. What is going on? In fact, let me do this. Let me. I'm gonna close chat and open it back up. Is it not. There it goes. Now it updated. What the heck? It stopped. I couldn't see any chat. All right, Dream logic, do quick search. Bread pudding recipe. So delicious. Hawaiian bread. Like yeah, that's what Hawaiian bread was something that I had seen. Gonna pull this up. We got about 12 minutes. I'm gonna open this up. So I have this on here. Now I can give it to you guys. While I'm. I'm gonna do some self promotion because we don't get a lot of questions. Let me see. So everybody knows I built this a while back. I put this in place. I have been putting when I have the chance. I do put some of the news out. You see some of my stuff. This is something that Jerry and I had talked about as a mod team. We've talked about always being able to go back and like how are we going to be. Is there a way if something happens, do we have the ability to do. Do we have like headlines that we could do? Like for instance today we weren't sure if Cecil series was going to have their stuff because it is Thanksgiving here in the United States. It's usually everybody's off but they did Put it out. But we put. I put this together every day, but I say I put it together every day. I go through. Doesn't necessarily mean that I push it out to the, the site, but I have this in place. So I've got cyber news there. I've also got other things in here. People always ask, are always looking for like a repo or looking for somewhere to, you know, what books do we read, what, what do we do here, what do we do there? What tools do you use? So I've created a blue team group that's got all the different tools in here, different searches. There's other things that I'm putting together. This is my PSS scanner. So that's. We looked at that earlier. We've got header analyzers. So you can put in a header. In fact, we can do this, let's say I'll show you what this does so we can pull simply Cybercon. That's fine. And it'll, it'll analyze the headers of the website and tell you what, what's not set, improvements, suggestions, things to put in place, IP reputations or put that in place. You can check out an ip ips, just stuff in here. But the bigger thing is, is we've got. I have books, I've got learning in here. Things that you. A lot of people are always asking, asking questions of what books should I read, what do they do? I've kind of broken it down into leadership books and different backgrounds learning. So we've got different learning platforms and different podcasts. All the different podcasts. So if you. We've got simply cyber podcasts in here. We had two cyber chicks in here, but all of these are different types of podcasts. You got cyber insecurities in here. There's tons and tons of different podcasts that I found over the years that I put in here, links to them. So this is something for real. Oh yeah, we need to change that Nightbot. So it goes actually to my website. So I actually created. I actually got the domain itself. So DJB, BSAC at. @djbsync.com. yeah. Where did I buy my T shirt? I got this shirt off of Amazon. If you go to Amazon and you just type in Gen X T shirts or Gen X shirts, you get a whole bunch of them. There's a. I've got like four or five of them just like to. I like to wear them around every now and again just to, you know, support my crew. We're getting old. We're out there. Let's see. Yeah. There's a ton. Yeah, I've. I tried to think about what. What I do during the day, like tools that I use daily. And I try to put. I'm like, hey, you know what? If I just had a website that I could go click on there and then the tool was there, then that would be a lot easier than having to go to this website or go to that website or go to the. So I do it for myself, but in turn doing it for myself, it's out there for the community as well, because that's stuff that I'm. I use. Yes. Yes, I have. In fact. Let me see. So I actually recorded one a long time ago. I put it out on SoundCloud. Hold on a second. Let me see if I can find it. Space Taco. Let's see. You. Should I have a YouTube channel? I have a YouTube channel, people. Here, hold on, let me switch my screen. We got about six minutes, so I'll show you guys. So SoundCloud, I did put one out here. Let me see if I can find it. My library. There it is. This is a while back. I don't know if y' all will be able to hear this. Let me. Let's pause this. I don't know where this is. When did I put. This is like a while ago. This is one hour put together. I don't want to play it on YouTube because it will. We'll get banned from YouTube by putting all this stuff on here. But, yeah, there's one that was a long time ago. Here you go. I put that out there. Y' all can go listen to it. And then I do have my own YouTube channel. Let me do this without music in the back of my ears. We got this in here where I've got my channel, but I don't play. We don't put music. Can't put music and stuff on YouTube. So YouTube. YouTube is very much a like, dono when it comes to music. Unless you are an actual artist that's putting it out there, they'll. They'll ban it. Kick you off. I did. So I've got that one. And then we've got. Now where you can go do this stuff is you can go do it on Twitch. So on Twitch, you can put all your stuff up there. And there may still be some things on here. Yeah, so there's still things on there. Three years ago, these are all the funny, funny time. Those were the good times. Oh, back in the day. Back in the day. I'm trying to hang around for a couple More minutes. Because you know what? We got, like, let me pull. Where's it at? I swear. Headed up. There it is. So coming up at 8:30, 9:30 Eastern Time. 8:30, God's time. That's why I like messing around with the Cyber Security Mentors Podcast will be up. It says they tested ACI's Learning Security plus bundle and it looks like they've got. They got some opinions on it. John Hoy. John's great, dude. I. I don't. I don't think I've ever met Steve. John's awesome. That will be a raid. We will raid over there. Once we're done here. We'll raid over. Oh, here, here's. Here's something funny that. Hold on. I want to copy this link. I want to open it because to show y' all what got posted in mod chat, this is what I came into this morning. Are y' all ready for this? The 70 people that are left. Here we go. Eric posted this. He came in like a butterball. That's hilarious. That. That one's pretty funny. Does he get it? Go ahead. We need to put Butterball over the top of that thing. All right, we got any other questions? Anything else? Anything on anybody's mind? Looks like we got a Christmas. We got raids. See, back in the day when I was young. That's pretty hilarious. Came in like a butterball. All right, it's 8:29. I'm gonna go ahead and knock us out of here. Everybody. Have a great day. Have a great Thanksgiving. If you're in the US and you're celebrating Thanksgiving, have a great Thanksgiving. We will see you tomorrow morning with some more cyber security news on Daily Cyber. Daily Cyber threat brief. Till then, let me actually, Let me grab. Where is it at. Me? Put this in chat. Here's the link. Over. I'm gonna put the link in here. Everybody, have a great day. We will see you back here tomorrow. And happy Thanksgiving to everybody. Y' all. Have a good one.
Jerry from Simply Cyber
Hey, everybody. I hope you enjoyed that content. Keep the cyber security train going by connecting with the other Simply Cyber community resources. We have the Discord server that's lively and always keeps the conversation going. You can connect with me directly on LinkedIn and also every single weekday morning on the Simply Cyber channel where we're doing live daily cyber threat briefings, 8aM Eastern Time, as well as Thursday at 4:30pM we're doing live stream interviews with industry experts and we produce videos that we push out every Wednesday morning. I'm Jerry from Simply Cyber. I hope you enjoyed the content, and we'll see you in the next one.
Host: Ben (aka DJ Bsek), on behalf of Simply Cyber (Gerald Auger, Ph.D.)
Theme: Top AI-Driven Cyber Threats, Supply Chain Attacks, and Security Insights for Cybersecurity Insiders
The Thanksgiving edition “wild card” episode is guest-hosted by Ben (“DJ Bsek”), who steps in for Jerry to deliver the day’s most pressing cybersecurity news. With a notable focus on the surge of AI’s role in cyber attacks and defenses, the episode highlights emerging threats, governmental responses, critical software vulnerabilities, and rising compliance challenges. Interlaced with community interaction and practical career advice, the show maintains a conversational, approachable tone with familiar industry camaraderie.
[06:04 – 13:19]
“Another day, another botnet... These are devices that should have been patched—or not even out in the wild.”
(Ben, 06:51)
[13:19 – 18:21]
“This is not going to stop, it’s just going to get worse as we get deeper into the age of AI... attackers move a lot faster than blue teamers because all they have to do is get it right once.”
(Ben, 13:56)
[18:21 – 25:30]
“If they’re doing it out in the open, what are they doing behind the scenes? ... Why wouldn’t they pull the LLM down and run it locally?”
(Ben, 19:04)
[25:30 – 29:23]
“If you’re a developer and you’re using this package, patch it, get your stuff fixed.”
(Ben, 26:09)
[34:30 – 42:31]
“If you rotate tokens and don’t clean your environments, they’ll just get them again... They’re in deep.”
(Ben, 35:18)
[42:31 – 49:57]
“We’re moving way too fast because we’re not putting guardrails in place... We have to have that human element.”
(Ben, 43:15)
[49:57 – 53:49]
“You can have a gate in the walkway and the gate shut, but you can still walk right around it. Guess what? You’re compliant, but are you secure?”
(Ben, 50:37)
[53:49 – 54:36]
“$1.5 million for Comcast? That’s like reaching in your pocket and grabbing a couple dimes and nickels. Who cares?”
(Ben, 54:36)
“These are those that all the IT people open up their closet... start pulling it out and you see this blue and black wireless router with DDWRT... that’s just crazy.” (Ben, 07:40)
“It’s not going to get better; it’s just going to get worse as we move into the age of AI.” (Ben, 14:25)
“Developers are ... [urged to] patch your stuff. Ah, you gotta patch it.” (Ben, 26:49)
“Compliance and secure are not the same thing.” (Ben, 50:51)
“That’s $5 a person. So you’re telling me, that’s what my data is worth?” (Ben, 54:36)
| Segment | Topic | Timestamp | |---------------------|---------------------------------------------------|------------| | Botnet exploits AWS outage | Shadow V2 infects IoT globally | 06:04–13:19 | | LLMs & malware | Google: Attackers use LLMs for evasion | 13:19–18:21| | Anthropic & Congress| Hearing on Claude’s role in China op | 18:21–25:30| | Cryptography library flaw | Node Forge vulnerability | 25:30–29:23| | Massive npm supply chain attack | Shai Hulud v2 | 34:30–42:31| | Prompt injection risks | ChatGPT Agent + Atlas Browser risks | 42:31–49:57| | Regulatory overload | GSMA on telecom compliance | 49:57–53:49| | Vendor breach penalty | Comcast $1.5M fine, third-party risk | 53:49–54:36|
[60:35+]
For further resources, tools, and community interaction, visit DJ Bsek’s site or simplycyber.io.
Catch the Daily Cyber Threat Brief live every weekday for ongoing updates!