
Sign up to save your podcasts
Or
In this episode, host Jim Love explores a variety of pressing cybersecurity threats and developments. The episode begins with an invitation for listeners to share their summer reading choices. The main content highlights include North Korean operatives infiltrating US companies through fake identities and AI-generated resumes, the ability of large language models to autonomously execute cyber attacks, a vulnerability in the AI-powered code editor Cursor allowing silent RCE attacks, and the rise of malicious Progressive Web Apps targeting mobile users. The show also discusses the risks associated with clicking unsubscribe links in spam emails. Listeners are encouraged to support the show and contribute through the website.
00:00 Introduction and Summer Reading Request 00:59 North Korean Spies in US Tech Firms 03:25 AI's Role in Cyber Attacks 05:18 Critical Vulnerability in AI Code Editor 07:36 Malicious Mobile Browser Hijacks 09:30 Unsubscribe Links as Phishing Traps 10:50 Conclusion and Listener Engagement
4.6
169169 ratings
In this episode, host Jim Love explores a variety of pressing cybersecurity threats and developments. The episode begins with an invitation for listeners to share their summer reading choices. The main content highlights include North Korean operatives infiltrating US companies through fake identities and AI-generated resumes, the ability of large language models to autonomously execute cyber attacks, a vulnerability in the AI-powered code editor Cursor allowing silent RCE attacks, and the rise of malicious Progressive Web Apps targeting mobile users. The show also discusses the risks associated with clicking unsubscribe links in spam emails. Listeners are encouraged to support the show and contribute through the website.
00:00 Introduction and Summer Reading Request 00:59 North Korean Spies in US Tech Firms 03:25 AI's Role in Cyber Attacks 05:18 Critical Vulnerability in AI Code Editor 07:36 Malicious Mobile Browser Hijacks 09:30 Unsubscribe Links as Phishing Traps 10:50 Conclusion and Listener Engagement
2,002 Listeners
373 Listeners
638 Listeners
370 Listeners
183 Listeners
1,016 Listeners
321 Listeners
417 Listeners
8,002 Listeners
188 Listeners
315 Listeners
73 Listeners
133 Listeners
44 Listeners
169 Listeners