
Sign up to save your podcasts
Or


Data privacy threats are evolving faster than most organizations can track. In this episode of the RITC Cybersecurity Podcast, Mike and Mari break down two emerging risks that every security leader, IT manager, and business owner should be paying attention to:
๐น Hackers exploiting misconfigured proxies to gain unauthorized access to paid LLM services
๐น The FBIโs warning on North Korean threat actors using malicious QR codes in highly targeted spear-phishing campaigns
This conversation connects the dots between AI misuse, data privacy exposure, and modern attack techniques and explains why traditional security assumptions no longer hold.
๐ฏ If youโre responsible for protecting sensitive data, governing AI usage, or managing organizational risk, this episode is a must-listen.
๐ Recorded on: 17th January 2025
๐ Learn more about RITC Cybersecurity ๐ https://www.ritcsecurity.com ๐ฉ [email protected]
๐ Subscribe for expert discussions on cybersecurity architecture, operations, GRC, and security frameworks.
By RITC CybersecurityData privacy threats are evolving faster than most organizations can track. In this episode of the RITC Cybersecurity Podcast, Mike and Mari break down two emerging risks that every security leader, IT manager, and business owner should be paying attention to:
๐น Hackers exploiting misconfigured proxies to gain unauthorized access to paid LLM services
๐น The FBIโs warning on North Korean threat actors using malicious QR codes in highly targeted spear-phishing campaigns
This conversation connects the dots between AI misuse, data privacy exposure, and modern attack techniques and explains why traditional security assumptions no longer hold.
๐ฏ If youโre responsible for protecting sensitive data, governing AI usage, or managing organizational risk, this episode is a must-listen.
๐ Recorded on: 17th January 2025
๐ Learn more about RITC Cybersecurity ๐ https://www.ritcsecurity.com ๐ฉ [email protected]
๐ Subscribe for expert discussions on cybersecurity architecture, operations, GRC, and security frameworks.