This week we talk about [0:36] how PowerSchool’s deleted data came back to haunt North Carolina schools, then [6:09] a massive IoT botnet that turned everyday devices into cybercriminal accomplices, then [11:13] a sneaky backdoor hidden in Magento extensions for over six years, and finally [15:50] how a government-endorsed Signal clone led to a national security headache.
-------- Â
20:36
--------
20:36
Episode 87: Phish, RATs, and Rogue Routers: This Week’s Cyber Soap Opera
Contents Commvault’s Zero-Day Drama. 2 Harrods Joins the Cyber Hit List 3 The Malware Love Story You Didn’t Swipe Right On. 4 When Your Router Turns Against You. 5 Links Commvault’s Zero-Day Drama Harrods Joins the Cyber Hit List The Malware Love Story You Didn’t Swipe Right On When Your Router Turns Against You Phish,...
-------- Â
19:01
--------
19:01
Episode 86: Cookies, Cloud Chaos, and a TikTok Takedown
Contents Cookie-Bite Attacks: Emerging Threat to Cloud and MFA Security. 2 Lazarus Strikes Before You Update. 3 Hackers Exploit Cloudflare Tunnels to Infiltrate Systems. 4 R00TK1T’s TikTok Takedown. 5 Links Cookie-Bite Attacks: Emerging Threat to Cloud and MFA Security Lazarus Strikes Before You Update Hackers Exploit Cloudflare Tunnels to Infiltrate Systems R00TK1T’s TikTok Takedown
-------- Â
22:34
--------
22:34
Episode 85: Fake Chrome, Dangling Domains & Volt Typhoon Shenanigans
From fake Chrome download pages spreading SpyNote malware to stealthy attacks on Fortinet devices and dangling DNS exploits, cyber criminals are getting creative. Meanwhile, Volt Typhoon shows China’s long game in infiltrating U.S. infrastructure. This episode dives into the hidden threats lurking behind legitimate facades.
From fake toll smishing attacks and job scam malware to tax-themed phishing and compromised npm packages, cybercriminals are pulling out all the psychological stops. This episode exposes how attackers prey on urgency, trust, and tax season chaos to deploy malware like BeaverTail, Tropidoor, and Remcos. Tune in to learn how to spot the tricks before they drain your data—or your crypto wallet.