
Sign up to save your podcasts
Or


The sources consist of excerpts from the transcript of a cybersecurity podcast, "Security Intelligence" from IBM Technology, which discusses several pressing security issues. The hosts and expert panelists focus heavily on the dangers and vulnerabilities associated with new AI browsers, such as OpenAI's Atlas, highlighting concerns about prompt injections and the need for stronger security fundamentals before enterprise adoption. They also examine the threat of the YouTube Ghost Network, a resilient operation using fake accounts and videos to distribute malware, which leverages user trust in the platform. Furthermore, the discussion covers the advanced Glassworm malware, which utilizes public infrastructure like the Solana blockchain and Google Calendar for command and control and hides malicious code using invisible Unicode characters. Finally, the experts address the neglect of mobile security in organizations, emphasizing the risks posed by smishing attacks and the challenges of securing Bring Your Own Device (BYOD) policies, concluding with a brief look at the importance of resiliency and contingency planning following the AWS outage.
By StevenThe sources consist of excerpts from the transcript of a cybersecurity podcast, "Security Intelligence" from IBM Technology, which discusses several pressing security issues. The hosts and expert panelists focus heavily on the dangers and vulnerabilities associated with new AI browsers, such as OpenAI's Atlas, highlighting concerns about prompt injections and the need for stronger security fundamentals before enterprise adoption. They also examine the threat of the YouTube Ghost Network, a resilient operation using fake accounts and videos to distribute malware, which leverages user trust in the platform. Furthermore, the discussion covers the advanced Glassworm malware, which utilizes public infrastructure like the Solana blockchain and Google Calendar for command and control and hides malicious code using invisible Unicode characters. Finally, the experts address the neglect of mobile security in organizations, emphasizing the risks posed by smishing attacks and the challenges of securing Bring Your Own Device (BYOD) policies, concluding with a brief look at the importance of resiliency and contingency planning following the AWS outage.