Geek-Guy.com

Category: cyber security

When AI Fights Back: Threats, Ethics, and Safety Concerns

In this episode, we explore an incident where Anthropic’s AI, Claude, didn’t just resist shutdown but allegedly blackmailed its engineers. Is this a glitch or the beginning of an AI uprising? Along with co-host Kevin Johnson, we reminisce about past episodes, discuss AI safety and ethics, and examine the implications of AI mimicking human behaviors…

Detect Vulnerabilities Faster With Website Scanner

As digital transformation becomes a strategic imperative, development teams have emerged as a pillar of organizations. Agile and DevOps practices have revolutionized the pace of innovation, enabling businesses to respond rapidly to evolving market demands. However, this accelerated development comes with a cost—the expansion of the application attack surface. Every new feature or update introduces…

Facebook Flaws and Privacy Laws: A Journey into Early Social Media Security from 2009

Join hosts Tom Eston, Scott Wright, and Kevin Johnson in a special best-of episode of the Shared Security Podcast. Travel back to 2009 with the second-ever episode featuring discussions on early Facebook bugs, cross-site scripting vulnerabilities, and a pivotal Canadian privacy ruling involving Facebook. Gain insights into social media security from the past and see…

Living Off the Land (LOTL) Attacks: How your tools are used against you?

Introduction A well-known organisation called SolarWinds was attacked in September 2019. In this attack, a hacker used a supply chain attack to inject malicious code into the system. More than 18,000 SolarWinds customers installed Updates containing the dangerous code. Living off the land attacks use legitimate tools to carry out malicious activities. They are particularly…

Use AI-Driven Reconnaissance to Identify Cyber Threats

Surviving in the digital world is not about stopping the next attack. It’s about preventing any new attack from surfacing. It’s about cyberdefense – predictively and not just reactively. Like the time when GPS revolutionized navigation by showing us what lies ahead, today, AI-Driven Reconnaissance provides security teams a real-time, evolving map of threats before…

GDPR Data Breach Notification Template With Examples [Download]

The GDPR is a law developed by the European Union (EU) to protect individuals’ personal data. Although it originated in the EU, several countries and organisations outside Europe have to date also adopted this regulation, which shows how detailed and well-thought-out it is. Among many of the GDPR’s guidelines, the data breach notification letter is…

Reasoning in the Age of Artificial Intelligence

Lately, I often hear people asking: “Will Artificial Intelligence replace my job?” Perhaps you’ve had this thought too. More than just a matter of the job market or salary expectations, this question challenges our role in society and our ability to remain relevant over time. It’s worth addressing this doubt once and for all, especially…

The Silent Threat in CI/CD: How Hackers Target Your Automation?

Let’s enter the world of software development! Automation has now become the heartbeat of contemporary DevOps practices. However, on the backdrop, the threat associated with it has been growing at a similar rate. Tools like GitHub Actions are known to streamline workflows by automating the testing process, deployment, and integration tasks. As the world talked…

The Silent Threat in CI/CD: How Hackers Target Your Automation?

Let’s enter the world of software development! Automation has now become the heartbeat of contemporary DevOps practices. However, on the backdrop, the threat associated with it has been growing at a similar rate. Tools like GitHub Actions are known to streamline workflows by automating the testing process, deployment, and integration tasks. As the world talked…

The 23andMe Collapse, Signal Gate Fallout

In this episode, we discuss the urgent need to delete your DNA data from 23andMe amid concerns about the company’s potential collapse and lack of federal protections for your personal information. Kevin joins the show to give his thoughts on the Signal Gate scandal involving top government officials, emphasizing the potential risks and lack of…

North Korean Hackers Disguised as IT Workers Targeting UK, European Companies, Google Finds

The attackers pose as legitimate remote IT workers, looking to both generate revenue and access sensitive company data through employment. “Europe needs to wake up fast,” according to Google’s Jamie Collier.

How to defend against a password spraying attack?

Password spraying attacks are becoming a serious threat, especially targeting Active Directory environments. These attacks enable attackers to exploit weak passwords and gain unauthorised access by applying login attempts across multiple accounts, making them difficult to detect. They also bypass account lockout mechanisms, causing significant risk to organisations. In this blog, we will detail how…

How to Prevent Kerberoasting Attacks?

Kerberoasting attack targets the Active Directory environment to enable attackers to extract and crack service account credentials. Threat actors can gain elevated privileges by exploiting weak password policies and misconfiguration, which further results in lateral movement and deeper network compromise. In this article, we will learn about the harm that Kerberoasting causes, also its impact…

Evolution and Growth: The History of Penetration Testing

The history of penetration testing begins with military strategies used to test enemy defenses. Over time, this evolved into a formal practice for identifying vulnerabilities in computer systems. This article traces the brief history of of penetration testing, from its early conceptual roots in military exercises, through the rise of ‘Tiger Teams’ in the 1970s,…

Next.js Vulnerability Exposes Middleware Security Gaps

On March 21, 2025, a critical authorization bypass vulnerability in Next.js, identified as CVE-2025-29927, was disclosed with a CVSS score of 9.1. This framework’s middleware handling flaw enables attackers to bypass authentication and authorization, exposing sensitive routes to unauthorized access. Exploiting this vulnerability does not require authentication, providing attackers with direct access to protected routes.…

Understanding Privacy Changes: eBay’s AI Policy and The Future of Data Privacy

In this episode, host Tom Eston discusses recent privacy changes on eBay related to AI training and the implications for user data. He highlights the hidden opt-out feature for AI data usage and questions the transparency of such policies, especially in regions without strict privacy laws like the United States. The host also explores how…

Cyber Crisis Management Plan: Shield for Brand Reputation

Despite advances in security technology, cybersecurity attacks and data breaches are increasingly common as attackers keep discovering new vulnerabilities and infiltration methods. Organizations now understand that a cyberattack or data breach is often inevitable—it’s typically a question of when, not if. The positive side is that cybersecurity crisis management plans can help businesses prepare effectively…

Will the FDA Start Banning Chinese-Made Medical Devices?

Interview with Joe Silvia, CEO of MedWare Cyber Click here to listen. In late January, the FDA issued a safety warning on Contec CMS8000 patient monitors and those relabeled as MN-120. The Chinese-made devices, used by thousands of medical institutions across the world, contain back doors in the firmware that could put patients at risk.……

From Spreadsheets to Solutions: How PlexTrac Enhances Security Workflows

In this special episode of the Shared Security Podcast, join Tom Eston and Dan DeCloss, CTO and founder of PlexTrac, as they discuss the challenges of data overload in vulnerability remediation. Discover how PlexTrac addresses these issues by integrating various data sources, providing customized risk scoring, and enhancing remediation workflows. The episode offers an insightful…

Tackling Data Overload: Strategies for Effective Vulnerability Remediation

In part one of our three part series with PlexTrac, we address the challenges of data overload in vulnerability remediation. Tom hosts Dahvid Schloss, co-founder and course creator at Emulated Criminals, and Dan DeCloss, CTO and founder of PlexTrac. They share their expertise on the key data and workflow hurdles that security teams face today.…

Everything While Training: Lessons on C and C++ Secure Coding Practices with Tanya Janca

Click here for full interview. In this show, we speak with Tanya Janca, aka SheHacksPurple, a renowned code security trainer with nearly 30 years of experience in application development, engineering, and testing. In the past, she’s worked in counterterrorism for the Canadian government and as chief security officer for the federal election in Canada. When……

Trump Administration and the Russian Cyber Threat, Firefox Privacy Changes

In this episode, we discuss whether the Trump administration ordered the U.S. Cyber Command and CISA to stand down on the Russian cyber threat. We also touch on the Canadian tariff situation with insights from Scott Wright. Additionally, we discuss the recent changes to Firefox’s privacy policy and what it means for user data. **…

Why Supply Chain Attacks Are The Biggest Threat To Businesses?

In 2024, approximately 183,000 customers worldwide were affected by supply chain attacks. In terms of frequency, the software supply chain experienced one attack every 48 hours. Surprisingly, India is among the most targeted countries, along with the USA, UK, Australia, Japan, and Germany. Manufacturing, healthcare, defense, and aerospace are among the most targeted sectors. Among…

Top 7 Cyber Security Challenges Faced by SaaS Organizations

Today’s technology-driven world needs Software-as-a-Service (SaaS) organizations. Their software solutions help organizations perform effectively and efficiently. SaaS applications are easily available over the internet. It allows users to access them via a web browser without requiring complex installations or infrastructure. With 42,000 SaaS companies worldwide, it makes up 36.6% of the cloud service market. The…

Cybersecurity Impact of DOGE, Apple’s Stand Against Encryption Backdoors

In this episode, Kevin and Tom discuss current events including the latest developments with DOGE and the significant changes happening at the Cybersecurity and Infrastructure Security Agency (CISA). They also touch on Apple’s decision to refuse creating backdoors for encryption, setting a new precedent in digital security. Tune in for an insightful discussion on the…

Cybersecurity Impact of DOGE, Apple’s Stand Against Encryption Backdoors

In this episode, Kevin and Tom discuss current events including the latest developments with DOGE and the significant changes happening at the Cybersecurity and Infrastructure Security Agency (CISA). They also touch on Apple’s decision to refuse creating backdoors for encryption, setting a new precedent in digital security. Tune in for an insightful discussion on the…

UK’s Secret Apple Backdoor Request, AI Chatbots Used For Stalking

In this episode, we discuss the UK government’s demand for Apple to create a secret backdoor for accessing encrypted iCloud backups under the Investigatory Powers Act and its potential global implications on privacy. We also discuss the first known case where AI chatbots were used in a stalking indictment, highlighting the dangers of technology misuse…

DOGE.gov Debacle: How a Government Website Went to the Dogs and What It Means for Cybersecurity

The Department of Government Efficiency (DOGE) website was left vulnerable to unauthorized edits. This breach exposes critical flaws in government digital infrastructure and highlights the importance of robust security measures, even for seemingly innocuous websites. The post DOGE.gov Debacle: How a Government Website Went to the Dogs and What It Means for Cybersecurity appeared first…

Careers in Cybersecurity: Myths and Realities with Kathleen Smith

In this episode we welcome Kathleen Smith, CMO of ClearedJobs.net, to discuss the current state of the cybersecurity job market. Kathleen shares her extensive experience in the field, recounting her tenure in various cybersecurity events and her contributions to job market research and recruiting. She discusses challenges such as distinguishing between genuine workforce shortages and…

Privacy Concerns with Digital Driver’s Licenses, The Rise of DeepSeek AI

In this episode, we explore the rollout of digital driver’s licenses in states like Illinois and the potential privacy issues that come with them. Can digital IDs truly enhance convenience without compromising your privacy? We also discuss the new Chinese AI model, DeepSeek, which is affecting U.S. tech companies’ stock prices. Join us as we…

Gravy Analytics Breach, Subaru Starlink Vulnerability Exposed

In this episode, we discuss the latest issues with data brokers, focusing on a breach at Gravy Analytics that leaked 30 million location data points online. We also explore a vulnerability in Subaru’s Starlink system that allows unrestricted access to vehicle controls and customer data using just a last name and license plate number. Co-host…

AI Privacy Policies: Unveiling the Secrets Behind ChatGPT, Gemini, and Claude

Do you ever read the privacy policy of your favorite AI tools like ChatGPT, Gemini, or Claude? In this episode, Scott Wright and Tom Eston discuss the critical aspects of these policies, comparing how each AI engine handles your personal data. They explore the implications of data usage, security, and privacy in AI, with insights…

PCI DSS Requirements With v4.0.1 Updates For 2024

PCI DSS refers to the Payment Card Industry Data Security Standard created by the PCI Security Standards Council (PCI SSC), an independent entity founded by major payment card brands, including Visa, JCB International, MasterCard, American Express, and Discover. PCI DSS is designed to protect cardholder data and ensure security of payment infrastructure. PCI DSS 4.0.1…

What is PCI DSS 4.0: Is This Still Applicable For 2024?

In a time when cyber threats continuously evolve, a security standard or framework is essential for protecting digital assets. The Payment Card Industry Data Security Standard (PCI DSS), developed by the PCI Security Standards Council, empowers organisations to safeguard cardholder data globally. PCI DSS offers technical guidance and practical steps to effectively protect cardholder data…

The Digital Battlefield: Understanding Modern Cyberattacks and Global Security

Explore the invisible war being fought in cyberspace, where nations battle without traditional weapons. This comprehensive guide explains modern cyberattacks, their impact on global security, and how countries defend their digital borders in an increasingly connected world. The post The Digital Battlefield: Understanding Modern Cyberattacks and Global Security appeared first on Security Boulevard.

2024 Year in Review: What We Got Right and Looking to 2025

In the final episode of the Shared Security Podcast for 2024, join us as we recap our predictions for the year, discuss what we got right and wrong, and highlight our top episodes on YouTube. We also extend a heartfelt thank you to our Patreon supporters and special guests. Plus, stay tuned for our predictions…

Top Cybersecurity Compliance Issues Businesses Face Today

As organizations increasingly rely on digital infrastructure, the stakes have never been higher. Cybersecurity compliance is necessary to safeguard sensitive data, maintain customer trust, and avoid costly fines. With a constantly shifting threat landscape, evolving regulations, and the rise of new technologies, businesses must prioritize cybersecurity posture improvement to stay ahead of the curve. Assura……

Impact of Unpatched Vulnerabilities in 2025

Vulnerability-based attacks are growing. Undoubtedly, these attacks are hackers’ favorite ways to gain initial access. Such attacks rose by 124% in the third quarter of 2024 compared to 2023. Furthermore, the quick shot of hackers taking advantage of the security flaw (CVE-2024-5806) in Progress MOVEit Transfer amplifies the dreadfulness of unpatched vulnerabilities. Once the vulnerability…

How SLED Organizations Can Enhance Cybersecurity Compliance Before Year-End

As the year comes to a close, State, Local, and Education (SLED) organizations must resharpen their focus on strengthening their cybersecurity defenses. With the growing complexity of cyber threats and the need to safeguard valuable data, it’s vital for SLED organizations to stay ahead of risks. Cybersecurity compliance consulting services offer guidance in navigating state……

Best of 2023: Best online .apk virus scanners – Hackernet

They are a lot of antivirus software and online scanners available to scan antivirus but only some of them work well. Here we listed the Best online .apk virus scanners that scan and compare with the original file version and also check with malware patterns that are available at antivirus providers. These online scanners scan…