<?xml version="1.0" encoding="UTF-8"?><?xml-stylesheet href="https://feeds.captivate.fm/style.xsl" type="text/xsl"?><rss xmlns:dc="http://purl.org/dc/elements/1.1/" xmlns:content="http://purl.org/rss/1.0/modules/content/" xmlns:atom="http://www.w3.org/2005/Atom" version="2.0" xmlns:googleplay="http://www.google.com/schemas/play-podcasts/1.0" xmlns:itunes="http://www.itunes.com/dtds/podcast-1.0.dtd" xmlns:sy="http://purl.org/rss/1.0/modules/syndication/" xmlns:podcast="https://podcastindex.org/namespace/1.0"><channel><atom:link href="https://feeds.captivate.fm/3zozb9fxlbueipjyapmaas/" rel="self" type="application/rss+xml"/><title><![CDATA[It's 5:05! Daily cybersecurity and open source briefing]]></title><podcast:guid>02db01a2-2e09-57a3-9bee-d937fae605d8</podcast:guid><lastBuildDate>Fri, 05 Apr 2024 20:45:18 +0000</lastBuildDate><generator>Captivate.fm</generator><language><![CDATA[en]]></language><copyright><![CDATA[Copyright 2024 Contributors from Around the World]]></copyright><managingEditor>Contributors from Around the World</managingEditor><itunes:summary><![CDATA[“It’s 5:05!'' is a daily audio news cast highlighting security and open source stories from around the world. We filter for the real cybersecurity and open source stories in the news, so you won't have to. 

Each day, a global team of journalists contribute stories they found interesting in their daily research from the previous 24 hours. We present them to you in an easy to listen to format, making the resources available at the end of each episode so you can do a deep dive on stories you find of interest.]]></itunes:summary><image><url>https://artwork.captivate.fm/33e2a4e7-a936-4ef5-905a-3a72363cfbe4/BkhMbfQsRHQi9QFk9GvnUJSv.png</url><title>It&apos;s 5:05! Daily cybersecurity and open source briefing</title><link><![CDATA[https://www.505updates.com]]></link></image><itunes:image href="https://artwork.captivate.fm/33e2a4e7-a936-4ef5-905a-3a72363cfbe4/BkhMbfQsRHQi9QFk9GvnUJSv.png"/><itunes:owner><itunes:name>Contributors from Around the World</itunes:name></itunes:owner><itunes:author>Contributors from Around the World</itunes:author><description>“It’s 5:05!&apos;&apos; is a daily audio news cast highlighting security and open source stories from around the world. We filter for the real cybersecurity and open source stories in the news, so you won&apos;t have to. 

Each day, a global team of journalists contribute stories they found interesting in their daily research from the previous 24 hours. We present them to you in an easy to listen to format, making the resources available at the end of each episode so you can do a deep dive on stories you find of interest.</description><link>https://www.505updates.com</link><atom:link href="https://pubsubhubbub.appspot.com" rel="hub"/><itunes:subtitle><![CDATA[Your daily open source and cybersecurity news update]]></itunes:subtitle><itunes:explicit>false</itunes:explicit><itunes:type>episodic</itunes:type><itunes:category text="News"><itunes:category text="Tech News"/></itunes:category><itunes:category text="News"><itunes:category text="Daily News"/></itunes:category><itunes:category text="Technology"></itunes:category><podcast:locked>no</podcast:locked><podcast:medium>podcast</podcast:medium><item><title>Weekly Cybersecurity and Open-source News Updates</title><itunes:title>Weekly Cybersecurity and Open-source News Updates</itunes:title><description><![CDATA[<p>It's April 5th, 2024, and time for your weekly cybersecurity and open-source news updates. We have news updates from Trac Bannon in Camp Hill, Pennsylvania, Julie Chatman in Washington, DC, Katy Craig in San Diego, California, Edwin Kwan in Sydney, Australia, and Olimpiu Pop in Transylvania, Romania. We'll start with Julie Chatman</p><p>Resources and 300+ episodes, all free, all ungated:</p><p>https://505updates.com/</p>]]></description><content:encoded><![CDATA[<p>It's April 5th, 2024, and time for your weekly cybersecurity and open-source news updates. We have news updates from Trac Bannon in Camp Hill, Pennsylvania, Julie Chatman in Washington, DC, Katy Craig in San Diego, California, Edwin Kwan in Sydney, Australia, and Olimpiu Pop in Transylvania, Romania. We'll start with Julie Chatman</p><p>Resources and 300+ episodes, all free, all ungated:</p><p>https://505updates.com/</p>]]></content:encoded><link><![CDATA[https://3zozb9fxlbueipjyapmaas.captivate.fm/episode/weekly-cybersecurity-and-open-source-news-updates]]></link><guid isPermaLink="false">cdfb5eb6-c2e1-4f43-915a-676916ea4daf</guid><itunes:image href="https://artwork.captivate.fm/33e2a4e7-a936-4ef5-905a-3a72363cfbe4/BkhMbfQsRHQi9QFk9GvnUJSv.png"/><dc:creator><![CDATA[Contributors from Around the World]]></dc:creator><pubDate>Fri, 05 Apr 2024 16:45:00 -0400</pubDate><enclosure url="https://dts.podtrac.com/redirect.mp3/podcasts.captivate.fm/media/67b924d9-39dc-4d30-aff5-b74a5a025d92/505-POV-20240405-converted.mp3" length="7204589" type="audio/mpeg"/><itunes:duration>07:30</itunes:duration><itunes:explicit>false</itunes:explicit><itunes:episodeType>full</itunes:episodeType><itunes:season>2</itunes:season><itunes:episode>10</itunes:episode><itunes:season>2</itunes:season><podcast:episode>10</podcast:episode><podcast:season>2</podcast:season><itunes:author>Contributors from Around the World</itunes:author></item><item><title>POV Friday: The Rise Of Low Code/No Code Citizen Developers</title><itunes:title>POV Friday: The Rise Of Low Code/No Code Citizen Developers</itunes:title><description><![CDATA[<p>It's March 29th, 2024 and time for Point of View Friday, where we cover a single topic from multiple perspectives. Today's point of discussion is around low-code/no-code solutions and their implications. Today we have perspectives from Julie Chatman in Washington, DC, Katy Craig in San Diego, California, Trac Bannon in Camp Hill, Pennsylvania, Edwin Kwan in Sydney, Australia, and Olimpiu Pop reporting from KubeCon Paris.</p><p>We'll start with Katy Craig.</p><p>Resources and 300+ episodes, all free, all ungated:</p><p>https://505updates.com/</p>]]></description><content:encoded><![CDATA[<p>It's March 29th, 2024 and time for Point of View Friday, where we cover a single topic from multiple perspectives. Today's point of discussion is around low-code/no-code solutions and their implications. Today we have perspectives from Julie Chatman in Washington, DC, Katy Craig in San Diego, California, Trac Bannon in Camp Hill, Pennsylvania, Edwin Kwan in Sydney, Australia, and Olimpiu Pop reporting from KubeCon Paris.</p><p>We'll start with Katy Craig.</p><p>Resources and 300+ episodes, all free, all ungated:</p><p>https://505updates.com/</p>]]></content:encoded><link><![CDATA[https://3zozb9fxlbueipjyapmaas.captivate.fm/episode/pov-friday-the-rise-of-low-code-no-code-citizen-developers]]></link><guid isPermaLink="false">fd480189-91a6-4c84-b300-aecfd04b9119</guid><itunes:image href="https://artwork.captivate.fm/33e2a4e7-a936-4ef5-905a-3a72363cfbe4/BkhMbfQsRHQi9QFk9GvnUJSv.png"/><dc:creator><![CDATA[Contributors from Around the World]]></dc:creator><pubDate>Fri, 29 Mar 2024 16:45:00 -0400</pubDate><enclosure url="https://dts.podtrac.com/redirect.mp3/podcasts.captivate.fm/media/388f48be-532f-415a-a203-b6aa0c7eb441/POV-2024-03-29-converted.mp3" length="14979462" type="audio/mpeg"/><itunes:duration>15:36</itunes:duration><itunes:explicit>false</itunes:explicit><itunes:episodeType>full</itunes:episodeType><itunes:season>2</itunes:season><itunes:episode>9</itunes:episode><itunes:season>2</itunes:season><podcast:episode>9</podcast:episode><podcast:season>2</podcast:season><itunes:author>Contributors from Around the World</itunes:author></item><item><title>POV Friday: CISA got hacked!?</title><itunes:title>POV Friday: CISA got hacked!?</itunes:title><description><![CDATA[<p>It's March 15th, 2024, and time for Point of View Friday, where we cover a single topic from multiple perspectives. Today's point of discussion is around the recent Cybersecurity and Infrastructure Security Agency hack, and it's suspected perpetrators and implications. We have perspectives from Julie Chatman in Washington, D.C., Katy Craig in San Diego, California, Trac Bannon in Camp Hill, Pennsylvania, and Olimpiu Pop from Transylvania, Romania. We also have a couple of interviews from last month's, AFCEA cybersecurity conference held in San Diego, California.</p><p>We'll start with Katy Craig.</p><p>Resources and 300+ episodes, all free, all ungated:</p><p>https://505updates.com/</p>]]></description><content:encoded><![CDATA[<p>It's March 15th, 2024, and time for Point of View Friday, where we cover a single topic from multiple perspectives. Today's point of discussion is around the recent Cybersecurity and Infrastructure Security Agency hack, and it's suspected perpetrators and implications. We have perspectives from Julie Chatman in Washington, D.C., Katy Craig in San Diego, California, Trac Bannon in Camp Hill, Pennsylvania, and Olimpiu Pop from Transylvania, Romania. We also have a couple of interviews from last month's, AFCEA cybersecurity conference held in San Diego, California.</p><p>We'll start with Katy Craig.</p><p>Resources and 300+ episodes, all free, all ungated:</p><p>https://505updates.com/</p>]]></content:encoded><link><![CDATA[https://3zozb9fxlbueipjyapmaas.captivate.fm/episode/pov-friday-cisa-got-hacked]]></link><guid isPermaLink="false">216907ec-bdee-459a-b5ff-fbd88aa4f654</guid><itunes:image href="https://artwork.captivate.fm/33e2a4e7-a936-4ef5-905a-3a72363cfbe4/BkhMbfQsRHQi9QFk9GvnUJSv.png"/><dc:creator><![CDATA[Contributors from Around the World]]></dc:creator><pubDate>Fri, 15 Mar 2024 16:45:00 -0400</pubDate><enclosure url="https://dts.podtrac.com/redirect.mp3/podcasts.captivate.fm/media/f84fc378-87f5-4a6e-bbfb-97624c0290b1/505-POV-03152024-converted.mp3" length="16226233" type="audio/mpeg"/><itunes:duration>16:54</itunes:duration><itunes:explicit>false</itunes:explicit><itunes:episodeType>full</itunes:episodeType><itunes:season>2</itunes:season><itunes:episode>8</itunes:episode><itunes:season>2</itunes:season><podcast:episode>8</podcast:episode><podcast:season>2</podcast:season><itunes:author>Contributors from Around the World</itunes:author></item><item><title>POV Friday: Backdoored AI</title><itunes:title>POV Friday: Backdoored AI</itunes:title><description><![CDATA[<p>It's March 8th, 2024, International Women's Day, and time for Point of View Friday, where we cover a single topic from multiple perspectives. Today's point of discussion is around the risk of backdoored AI. We have perspectives from Julie Chatman in Washington, D.C., Katy Craig in San Diego, California, Trac Bannon in Camp Hill, Pennsylvania, and Olimpiu Pop from Transylvania, Romania. We also have a couple of news stories at the end, and some interviews from the annual AFCEA conference held in San Diego, California last month.</p><p>We'll start with Julie Chatman.</p><p>Resources and 300+ episodes, all free, all ungated:</p><p>https://505updates.com/</p>]]></description><content:encoded><![CDATA[<p>It's March 8th, 2024, International Women's Day, and time for Point of View Friday, where we cover a single topic from multiple perspectives. Today's point of discussion is around the risk of backdoored AI. We have perspectives from Julie Chatman in Washington, D.C., Katy Craig in San Diego, California, Trac Bannon in Camp Hill, Pennsylvania, and Olimpiu Pop from Transylvania, Romania. We also have a couple of news stories at the end, and some interviews from the annual AFCEA conference held in San Diego, California last month.</p><p>We'll start with Julie Chatman.</p><p>Resources and 300+ episodes, all free, all ungated:</p><p>https://505updates.com/</p>]]></content:encoded><link><![CDATA[https://3zozb9fxlbueipjyapmaas.captivate.fm/episode/pov-friday-backdoored-ai]]></link><guid isPermaLink="false">1fb53b6a-d701-4068-8d9f-d2a7ebd2fdc3</guid><itunes:image href="https://artwork.captivate.fm/33e2a4e7-a936-4ef5-905a-3a72363cfbe4/BkhMbfQsRHQi9QFk9GvnUJSv.png"/><dc:creator><![CDATA[Contributors from Around the World]]></dc:creator><pubDate>Fri, 08 Mar 2024 16:45:00 -0400</pubDate><enclosure url="https://dts.podtrac.com/redirect.mp3/podcasts.captivate.fm/media/412142bd-e55e-40b5-9ca4-8ffa01464380/505-T0308-POV-converted.mp3" length="19512174" type="audio/mpeg"/><itunes:duration>20:20</itunes:duration><itunes:explicit>false</itunes:explicit><itunes:episodeType>full</itunes:episodeType><itunes:season>2</itunes:season><itunes:episode>7</itunes:episode><itunes:season>2</itunes:season><podcast:episode>7</podcast:episode><podcast:season>2</podcast:season><itunes:author>Contributors from Around the World</itunes:author></item><item><title>POV Friday: Apple&apos;s PQ3 raises the bar on postquantum encryption</title><itunes:title>POV Friday: Apple&apos;s PQ3 raises the bar on postquantum encryption</itunes:title><description><![CDATA[<p>It's March 1st, 2024 and time for Point of View Friday, where we cover a single topic from multiple perspectives. Today's point of discussion is around the anticipation of advancements in quantum computing and the massive overhauls of technology taking place. We have perspectives from Trac Bannon in Camp Hill, Pennsylvania, Olimpiu Pop from Transylvania, Romania, and Katy Craig in San Diego, California. We'll start with Trac Bannon.</p><p>Resources and 300+ episodes, all free, all ungated:</p><p>https://505updates.com/</p>]]></description><content:encoded><![CDATA[<p>It's March 1st, 2024 and time for Point of View Friday, where we cover a single topic from multiple perspectives. Today's point of discussion is around the anticipation of advancements in quantum computing and the massive overhauls of technology taking place. We have perspectives from Trac Bannon in Camp Hill, Pennsylvania, Olimpiu Pop from Transylvania, Romania, and Katy Craig in San Diego, California. We'll start with Trac Bannon.</p><p>Resources and 300+ episodes, all free, all ungated:</p><p>https://505updates.com/</p>]]></content:encoded><link><![CDATA[https://3zozb9fxlbueipjyapmaas.captivate.fm/episode/pov-friday-]]></link><guid isPermaLink="false">13df512c-03bb-405f-970e-0a70be6694dd</guid><itunes:image href="https://artwork.captivate.fm/33e2a4e7-a936-4ef5-905a-3a72363cfbe4/BkhMbfQsRHQi9QFk9GvnUJSv.png"/><dc:creator><![CDATA[Contributors from Around the World]]></dc:creator><pubDate>Fri, 01 Mar 2024 16:45:00 -0400</pubDate><enclosure url="https://dts.podtrac.com/redirect.mp3/podcasts.captivate.fm/media/ca3949c1-0cdf-4af9-bd9b-871fc5e8c657/505-POV-03012024-V3-converted.mp3" length="11100753" type="audio/mpeg"/><itunes:duration>09:15</itunes:duration><itunes:explicit>false</itunes:explicit><itunes:episodeType>full</itunes:episodeType><itunes:season>2</itunes:season><itunes:episode>6</itunes:episode><itunes:season>2</itunes:season><podcast:episode>6</podcast:episode><podcast:season>2</podcast:season><itunes:author>Contributors from Around the World</itunes:author></item><item><title>POV Friday: Disinformation a weapon in an election year?</title><itunes:title>POV Friday: Disinformation a weapon in an election year?</itunes:title><description><![CDATA[<p>It's February 23rd, 2024 and time for point of view Friday, where we cover a single topic from multiple perspectives. Today's point of discussion is around the increasing threat of deepfakes to democracies worldwide. We have perspectives from Trac Bannon in Camp Hill, Pennsylvania, Olimpiu Pop from Transylvania, Romania, Hillary Coover in Washington, DC, and Katy Craig in San Diego, California. We'll start with Katie Craig.</p><p>Resources and 300+ episodes, all free, all ungated:</p><p>https://505updates.com/</p>]]></description><content:encoded><![CDATA[<p>It's February 23rd, 2024 and time for point of view Friday, where we cover a single topic from multiple perspectives. Today's point of discussion is around the increasing threat of deepfakes to democracies worldwide. We have perspectives from Trac Bannon in Camp Hill, Pennsylvania, Olimpiu Pop from Transylvania, Romania, Hillary Coover in Washington, DC, and Katy Craig in San Diego, California. We'll start with Katie Craig.</p><p>Resources and 300+ episodes, all free, all ungated:</p><p>https://505updates.com/</p>]]></content:encoded><link><![CDATA[https://3zozb9fxlbueipjyapmaas.captivate.fm/episode/pov]]></link><guid isPermaLink="false">2c0134f6-790f-43e3-b029-d4baedb6fe11</guid><itunes:image href="https://artwork.captivate.fm/33e2a4e7-a936-4ef5-905a-3a72363cfbe4/BkhMbfQsRHQi9QFk9GvnUJSv.png"/><dc:creator><![CDATA[Contributors from Around the World]]></dc:creator><pubDate>Fri, 23 Feb 2024 16:45:00 -0400</pubDate><enclosure url="https://dts.podtrac.com/redirect.mp3/podcasts.captivate.fm/media/c2ee2e77-cf76-4ac1-a21e-485a51877853/505-POV-02-23-24-converted.mp3" length="16601189" type="audio/mpeg"/><itunes:duration>13:50</itunes:duration><itunes:explicit>false</itunes:explicit><itunes:episodeType>full</itunes:episodeType><itunes:season>2</itunes:season><itunes:episode>5</itunes:episode><itunes:season>2</itunes:season><podcast:episode>5</podcast:episode><podcast:season>2</podcast:season><itunes:author>Contributors from Around the World</itunes:author><podcast:chapters url="https://transcripts.captivate.fm/chapter-c2ee2e77-cf76-4ac1-a21e-485a51877853.json" type="application/json+chapters"/></item><item><title>POV Friday: The Securities and Exchange Commission&apos;s change in cybersecurity disclosure rules.</title><itunes:title>POV Friday: The Securities and Exchange Commission&apos;s change in cybersecurity disclosure rules.</itunes:title><description><![CDATA[<p>It's February 16th, 2024 and time for Point of View Friday, where we cover a single topic from multiple perspectives. Today's point of discussion is the Securities and Exchange Commission's change in cybersecurity disclosure rules. We have perspectives today from Trac Bannon in Camp Hill, Pennsylvania, Olimpiu Pop from Transylvania, Romania, and Katy Craig in San Diego, California. We'll start with Trac Bannon&nbsp;</p><p>Resources and 300+ episodes, all free, all ungated:</p><p>https://505updates.com/</p>]]></description><content:encoded><![CDATA[<p>It's February 16th, 2024 and time for Point of View Friday, where we cover a single topic from multiple perspectives. Today's point of discussion is the Securities and Exchange Commission's change in cybersecurity disclosure rules. We have perspectives today from Trac Bannon in Camp Hill, Pennsylvania, Olimpiu Pop from Transylvania, Romania, and Katy Craig in San Diego, California. We'll start with Trac Bannon&nbsp;</p><p>Resources and 300+ episodes, all free, all ungated:</p><p>https://505updates.com/</p>]]></content:encoded><link><![CDATA[https://3zozb9fxlbueipjyapmaas.captivate.fm/episode/pov-friday-the-securities-and-exchange-commissions-change-in-cybersecurity-disclosure-rules-]]></link><guid isPermaLink="false">9fac571b-7024-4646-a0a4-cbcc20bd4b5e</guid><itunes:image href="https://artwork.captivate.fm/33e2a4e7-a936-4ef5-905a-3a72363cfbe4/BkhMbfQsRHQi9QFk9GvnUJSv.png"/><dc:creator><![CDATA[Contributors from Around the World]]></dc:creator><pubDate>Fri, 16 Feb 2024 16:45:00 -0400</pubDate><enclosure url="https://dts.podtrac.com/redirect.mp3/podcasts.captivate.fm/media/a9d93bec-fece-4884-bb2f-d1ddaad356c7/505-POV-0216-converted.mp3" length="14401157" type="audio/mpeg"/><itunes:duration>12:00</itunes:duration><itunes:explicit>false</itunes:explicit><itunes:episodeType>full</itunes:episodeType><itunes:season>2</itunes:season><itunes:episode>4</itunes:episode><itunes:season>2</itunes:season><podcast:episode>4</podcast:episode><podcast:season>2</podcast:season><itunes:author>Contributors from Around the World</itunes:author><podcast:chapters url="https://transcripts.captivate.fm/chapter-a9d93bec-fece-4884-bb2f-d1ddaad356c7.json" type="application/json+chapters"/></item><item><title>POV Friday: Recent large-scale Microsoft breach.</title><itunes:title>POV Friday: Recent large-scale Microsoft breach.</itunes:title><description><![CDATA[<p>It's February 9, 2024 and time for Point of View Friday where we cover a single topic from multiple perspectives. Today's point of discussion is the recent large-scale Microsoft breach. We have perspectives from Trac Bannon in Camp Hill, Pennsylvania, Olimpiu Pop in Transylvania, Romania and Shannon Lietz in San Diego, California. We'll start with Katy Craig also in San Diego, connecting the dots between the HPE breach and Microsoft.  </p><p>Resources and 300+ episodes, all free, all ungated:</p><p>https://505updates.com/</p>]]></description><content:encoded><![CDATA[<p>It's February 9, 2024 and time for Point of View Friday where we cover a single topic from multiple perspectives. Today's point of discussion is the recent large-scale Microsoft breach. We have perspectives from Trac Bannon in Camp Hill, Pennsylvania, Olimpiu Pop in Transylvania, Romania and Shannon Lietz in San Diego, California. We'll start with Katy Craig also in San Diego, connecting the dots between the HPE breach and Microsoft.  </p><p>Resources and 300+ episodes, all free, all ungated:</p><p>https://505updates.com/</p>]]></content:encoded><link><![CDATA[https://3zozb9fxlbueipjyapmaas.captivate.fm/episode/pov-friday-recent-large-scale-microsoft-breach-]]></link><guid isPermaLink="false">a2f10dd9-7528-40e4-a871-2afc23704ad4</guid><itunes:image href="https://artwork.captivate.fm/33e2a4e7-a936-4ef5-905a-3a72363cfbe4/BkhMbfQsRHQi9QFk9GvnUJSv.png"/><dc:creator><![CDATA[Contributors from Around the World]]></dc:creator><pubDate>Fri, 09 Feb 2024 16:45:00 -0400</pubDate><enclosure url="https://dts.podtrac.com/redirect.mp3/podcasts.captivate.fm/media/b33c6d13-4070-4007-a2d3-42cdd5163490/505-POV-020924-converted.mp3" length="14401157" type="audio/mpeg"/><itunes:duration>12:00</itunes:duration><itunes:explicit>false</itunes:explicit><itunes:episodeType>full</itunes:episodeType><itunes:season>2</itunes:season><itunes:episode>3</itunes:episode><itunes:season>2</itunes:season><podcast:episode>3</podcast:episode><podcast:season>2</podcast:season><itunes:author>Contributors from Around the World</itunes:author><podcast:chapters url="https://transcripts.captivate.fm/chapter-b33c6d13-4070-4007-a2d3-42cdd5163490.json" type="application/json+chapters"/></item><item><title>PoV Friday: 2024 Predictions for AI and Cyber Legislation with Trac Bannon, Edwin Kwan, Olimpiu Pop, and Shannon Lietz</title><itunes:title>PoV Friday: 2024 Predictions for AI and Cyber Legislation with Trac Bannon, Edwin Kwan, Olimpiu Pop, and Shannon Lietz</itunes:title><description><![CDATA[<p> It's January 12th, 2024, and time for Point of View Friday, where we cover a single topic from multiple perspectives. Today's point of discussion is what does the future look like for AI and cyber legislation? We have perspectives from Edwin Kwan in Sydney, Australia, Trac Bannon and Camp Hill, Pennsylvania, Olympia Pop from Transylvania, Romania. We'll begin with Shannon Lietz in San Diego, California on the Win, Lose or Draw when considering cyber legislation. </p><p>Resources and 300+ episodes, all free, all ungated:</p><p>https://505updates.com/</p>]]></description><content:encoded><![CDATA[<p> It's January 12th, 2024, and time for Point of View Friday, where we cover a single topic from multiple perspectives. Today's point of discussion is what does the future look like for AI and cyber legislation? We have perspectives from Edwin Kwan in Sydney, Australia, Trac Bannon and Camp Hill, Pennsylvania, Olympia Pop from Transylvania, Romania. We'll begin with Shannon Lietz in San Diego, California on the Win, Lose or Draw when considering cyber legislation. </p><p>Resources and 300+ episodes, all free, all ungated:</p><p>https://505updates.com/</p>]]></content:encoded><link><![CDATA[https://3zozb9fxlbueipjyapmaas.captivate.fm/episode/pov-friday-2024-predictions-for-ai-and-cyber-legislation-with-trac-bannon-edwin-kwan-olimpiu-pop-and-shannon-lietz]]></link><guid isPermaLink="false">44b5895b-484f-43ae-8f78-5b67e4b30537</guid><itunes:image href="https://artwork.captivate.fm/a576c94d-ad6b-4efe-95d5-9741b55c6522/OqgMzGmvKE7didRuPi2h6OIH.jpg"/><dc:creator><![CDATA[Contributors from Around the World]]></dc:creator><pubDate>Fri, 12 Jan 2024 16:45:00 -0400</pubDate><enclosure url="https://dts.podtrac.com/redirect.mp3/podcasts.captivate.fm/media/8ddbdf36-c12f-43d8-88ff-e77ef15829c8/2024-01-12-POV-Friday-AI-and-Cyber-Legislation-Final-for-Captiv.mp3" length="12401020" type="audio/mpeg"/><itunes:duration>12:55</itunes:duration><itunes:explicit>false</itunes:explicit><itunes:episodeType>full</itunes:episodeType><itunes:season>2</itunes:season><itunes:episode>2</itunes:episode><itunes:season>2</itunes:season><podcast:episode>2</podcast:episode><podcast:season>2</podcast:season><itunes:author>Contributors from Around the World</itunes:author></item><item><title>PoV Friday: 2024 Predictions for AI with Edwin Kwan, Trac Bannon, Olimpiu Pop and Shannon Lietz</title><itunes:title>PoV Friday: 2024 Predictions for AI with Edwin Kwan, Trac Bannon, Olimpiu Pop and Shannon Lietz</itunes:title><description><![CDATA[<p>From @Sourced Network Productions, It's 5:05!, the Podcast , with your daily cybersecurity and opensource news headlines. 🎙️ Free, ungated access to 300+ episodes of “It’s 5:05!” on your favorite podcast platforms: bit.ly/505-updates</p><p>It’s January 5, 2024, and time for Point of View Friday, where we cover a single topic from multiple perspectives. Today’s point of discussion is “What does the near future look like for AI, what should you consider when utilizing AI for your personal use or business solution?”</p><p>Today’s contributors are Trac Bannon from Camp Hill Pennsylvania, Olimpiu Pop from Transylvania Romania, Shannon Lietz from San Diego California, and Edwin Kwan from Sydney Australia.</p><p>We’ll start with Edwin’s thoughts on an algorithm that can give a thumbs up or down to your job application. </p><p>🎙️ Free access to 300+ episodes of “It’s 5:05!” on your favorite podcast platforms: bit.ly/505-updates</p><p>#newspodcast #PoVFriday</p>]]></description><content:encoded><![CDATA[<p>From @Sourced Network Productions, It's 5:05!, the Podcast , with your daily cybersecurity and opensource news headlines. 🎙️ Free, ungated access to 300+ episodes of “It’s 5:05!” on your favorite podcast platforms: bit.ly/505-updates</p><p>It’s January 5, 2024, and time for Point of View Friday, where we cover a single topic from multiple perspectives. Today’s point of discussion is “What does the near future look like for AI, what should you consider when utilizing AI for your personal use or business solution?”</p><p>Today’s contributors are Trac Bannon from Camp Hill Pennsylvania, Olimpiu Pop from Transylvania Romania, Shannon Lietz from San Diego California, and Edwin Kwan from Sydney Australia.</p><p>We’ll start with Edwin’s thoughts on an algorithm that can give a thumbs up or down to your job application. </p><p>🎙️ Free access to 300+ episodes of “It’s 5:05!” on your favorite podcast platforms: bit.ly/505-updates</p><p>#newspodcast #PoVFriday</p>]]></content:encoded><link><![CDATA[https://3zozb9fxlbueipjyapmaas.captivate.fm/episode/pov-friday-2024-predictions-for-ai-with-edwin-kwan-trac-bannon-olimpiu-pop-and-shannon-lietz]]></link><guid isPermaLink="false">97647abe-0347-4adc-8152-e96e0c34682f</guid><itunes:image href="https://artwork.captivate.fm/ffb20bc2-679d-4695-aac6-02cead5b8cc0/HHUhAgv8ppn9FCJCn9RUdzfM.jpg"/><dc:creator><![CDATA[Contributors from Around the World]]></dc:creator><pubDate>Fri, 05 Jan 2024 16:45:00 -0400</pubDate><enclosure url="https://dts.podtrac.com/redirect.mp3/podcasts.captivate.fm/media/683f9f5a-e3a0-4526-9973-0e7d91490f8b/2024-01-05-POV-Friday-AI-in-the-NearFuture-Final-for-Captivate-.mp3" length="15022439" type="audio/mpeg"/><itunes:duration>15:39</itunes:duration><itunes:explicit>false</itunes:explicit><itunes:episodeType>full</itunes:episodeType><itunes:season>2</itunes:season><itunes:episode>1</itunes:episode><itunes:season>2</itunes:season><podcast:episode>1</podcast:episode><podcast:season>2</podcast:season><itunes:author>Contributors from Around the World</itunes:author></item><item><title>Episode #304: Edwin Kwan: Google Chrome Safety Check Feature Enhancements; Shannon Lietz: EU CRA: Win  | Lose | Draw; Olimpiu Pop: Year in Review: Ukraine and the cyberwar; Marcel Brown: This Day in Tech History</title><itunes:title>Episode #304: Edwin Kwan: Google Chrome Safety Check Feature Enhancements; Shannon Lietz: EU CRA: Win  | Lose | Draw; Olimpiu Pop: Year in Review: Ukraine and the cyberwar; Marcel Brown: This Day in Tech History</itunes:title><description><![CDATA[<p>Free, ungated access to all 300+ episodes of “It’s 5:05!” on your favorite podcast platforms: <a href="https://bit.ly/505-updates" rel="noopener noreferrer" target="_blank">https://bit.ly/505-updates</a>. You’re welcome to 𝗿𝗲𝗽𝗼𝘀𝘁 if your followers will find this of value.</p><p>The stories we’re covering today.</p><p>Marcel Brown: December 31st, 1999. The world waits in anticipation of the year 2000 and the potential disasters that might be brought about by the Y2K bug.  Just for fun, I set up my home with a remote control to turn off all the lights in my house and the TV our friends would be watching at our New Year's Eve party. Seconds after midnight, I pushed the remote control in my pocket, and everything went out. There were definitely a few people in my house that night who thought the apocalypse had come.</p><p>Edwin Kwan: One of the features of Chrome Safety Check is that it will check if any saved passwords have been compromised. In addition, users will receive alerts in the Chrome menu about flagged dangerous extensions, outdated Chrome versions, or disabled safe browsing.</p><p>Shannon Lietz: For the last couple of years, the EU has been talking about how it might address some of the cybersecurity issues that are plaguing its economy. As part of this, addressing the 189 pages of a potential act to come, it's hard to look at it and be both excited and petrified at the same time. There's lots to think about. </p><p>Olimpiu Pop: In 2023, the cyber warfare aspect of the Ukraine war provided concrete examples of both resilience and evolving nature of cyber threats. Ukrainian cyber defenses, although not unbreakable, effectively countered a variety of Russian cyber attacks </p>]]></description><content:encoded><![CDATA[<p>Free, ungated access to all 300+ episodes of “It’s 5:05!” on your favorite podcast platforms: <a href="https://bit.ly/505-updates" rel="noopener noreferrer" target="_blank">https://bit.ly/505-updates</a>. You’re welcome to 𝗿𝗲𝗽𝗼𝘀𝘁 if your followers will find this of value.</p><p>The stories we’re covering today.</p><p>Marcel Brown: December 31st, 1999. The world waits in anticipation of the year 2000 and the potential disasters that might be brought about by the Y2K bug.  Just for fun, I set up my home with a remote control to turn off all the lights in my house and the TV our friends would be watching at our New Year's Eve party. Seconds after midnight, I pushed the remote control in my pocket, and everything went out. There were definitely a few people in my house that night who thought the apocalypse had come.</p><p>Edwin Kwan: One of the features of Chrome Safety Check is that it will check if any saved passwords have been compromised. In addition, users will receive alerts in the Chrome menu about flagged dangerous extensions, outdated Chrome versions, or disabled safe browsing.</p><p>Shannon Lietz: For the last couple of years, the EU has been talking about how it might address some of the cybersecurity issues that are plaguing its economy. As part of this, addressing the 189 pages of a potential act to come, it's hard to look at it and be both excited and petrified at the same time. There's lots to think about. </p><p>Olimpiu Pop: In 2023, the cyber warfare aspect of the Ukraine war provided concrete examples of both resilience and evolving nature of cyber threats. Ukrainian cyber defenses, although not unbreakable, effectively countered a variety of Russian cyber attacks </p>]]></content:encoded><link><![CDATA[https://3zozb9fxlbueipjyapmaas.captivate.fm/episode/episode-304-edwin-kwan-google-chrome-safety-check-feature-enhancements-shannon-lietz-eu-cra-win-lose-draw-olimpiu-pop-year-in-review-ukraine-and-the-cyberwar-marcel-brown-this-day-in-tech-history]]></link><guid isPermaLink="false">d5f835a2-d1bd-44b1-bca9-422a9f8a85b7</guid><itunes:image href="https://artwork.captivate.fm/8a8d4032-560a-46b7-9f11-9cc5451ed3da/zGM9Nj1upy7dbkKH7o6s3OwB.jpg"/><dc:creator><![CDATA[Contributors from Around the World]]></dc:creator><pubDate>Fri, 29 Dec 2023 16:45:00 -0400</pubDate><enclosure url="https://dts.podtrac.com/redirect.mp3/podcasts.captivate.fm/media/98129339-5a7f-417f-9842-aac48d0394cb/505-2023-12-29-Episode-304-Final-converted.mp3" length="13849277" type="audio/mpeg"/><itunes:duration>14:26</itunes:duration><itunes:explicit>false</itunes:explicit><itunes:episodeType>full</itunes:episodeType><itunes:season>1</itunes:season><itunes:episode>304</itunes:episode><itunes:season>1</itunes:season><podcast:episode>304</podcast:episode><podcast:season>1</podcast:season><itunes:author>Contributors from Around the World</itunes:author></item><item><title>Episode #303: Edwin Kwan: Chrome Users Infected via Fake VPNs in Video Game Torrents; Ian Garrett: 6 Key Aspects of SEC Rules for Data Breaches; Olimpiu Pop: Cybersecurity Legislation (CRA, US Legislation); Marcel Brown: This Day in Tech History</title><itunes:title>Episode #303: Edwin Kwan: Chrome Users Infected via Fake VPNs in Video Game Torrents; Ian Garrett: 6 Key Aspects of SEC Rules for Data Breaches; Olimpiu Pop: Cybersecurity Legislation (CRA, US Legislation); Marcel Brown: This Day in Tech History</itunes:title><description><![CDATA[<p>Free, ungated access to all 300+ episodes of “It’s 5:05!” on your favorite podcast platforms: <a href="https://bit.ly/505-updates" rel="noopener noreferrer" target="_blank">https://bit.ly/505-updates</a>. You’re welcome to 𝗿𝗲𝗽𝗼𝘀𝘁 if your followers will find this of value.</p><p>The stories we’re covering today.</p><p>Marcel Brown: December 28th, 1895. The world's first projected movie screening takes place at the Salon Indien du Grand Café in Paris, France.  33 people attend at the admission price of 1 franc each to view 10 films at about 50 seconds each.</p><p>Edwin Kwan: Three malicious Chrome extensions disguised as VPNs infected approximately 1. 5 million users.  The extensions - netPlus, netSafe, and netWin - were distributed through an installer hidden in pirated copies of popular video games like Grand Theft Auto and Assassin's Creed.</p><p>Ian Garrett:  New Year, New Data Breach Disclosure Rules issued by the U. S. Securities and Exchange Commission to reshape the cybersecurity landscape for publicly owned companies. Recently, starting on December 18th, these companies must now comply with the stringent rules requiring them to disclose material cyber incidents within 96 hours.</p><p>Olimpiu Pop: The EU Cybersecurity Schemes, born from the EU Cybersecurity Act, are being developed for different industry categories such as ICT, Cloud services and 5G networks, and will consist of a comprehensive set of rules, technical requirements, standards and evaluation procedures for certification. </p>]]></description><content:encoded><![CDATA[<p>Free, ungated access to all 300+ episodes of “It’s 5:05!” on your favorite podcast platforms: <a href="https://bit.ly/505-updates" rel="noopener noreferrer" target="_blank">https://bit.ly/505-updates</a>. You’re welcome to 𝗿𝗲𝗽𝗼𝘀𝘁 if your followers will find this of value.</p><p>The stories we’re covering today.</p><p>Marcel Brown: December 28th, 1895. The world's first projected movie screening takes place at the Salon Indien du Grand Café in Paris, France.  33 people attend at the admission price of 1 franc each to view 10 films at about 50 seconds each.</p><p>Edwin Kwan: Three malicious Chrome extensions disguised as VPNs infected approximately 1. 5 million users.  The extensions - netPlus, netSafe, and netWin - were distributed through an installer hidden in pirated copies of popular video games like Grand Theft Auto and Assassin's Creed.</p><p>Ian Garrett:  New Year, New Data Breach Disclosure Rules issued by the U. S. Securities and Exchange Commission to reshape the cybersecurity landscape for publicly owned companies. Recently, starting on December 18th, these companies must now comply with the stringent rules requiring them to disclose material cyber incidents within 96 hours.</p><p>Olimpiu Pop: The EU Cybersecurity Schemes, born from the EU Cybersecurity Act, are being developed for different industry categories such as ICT, Cloud services and 5G networks, and will consist of a comprehensive set of rules, technical requirements, standards and evaluation procedures for certification. </p>]]></content:encoded><link><![CDATA[https://3zozb9fxlbueipjyapmaas.captivate.fm/episode/episode-302-edwin-kwan-chrome-users-infected-via-fake-vpns-in-video-game-torrents-ian-garrett-6-key-aspects-of-sec-rules-for-data-breaches-olimpiu-pop-cybersecurity-legislation-cra-us-legislation-marcel-brown-this-day-in-tech-history]]></link><guid isPermaLink="false">5d746054-f6f4-4d5c-8896-5a984a4a8829</guid><itunes:image href="https://artwork.captivate.fm/f496a58a-e864-4e7f-ab88-5d1147d39ee7/qym2cq-Zm4ECYrwlFww-kA2.jpg"/><dc:creator><![CDATA[Contributors from Around the World]]></dc:creator><pubDate>Thu, 28 Dec 2023 16:45:00 -0400</pubDate><enclosure url="https://dts.podtrac.com/redirect.mp3/podcasts.captivate.fm/media/67996396-07fc-45d9-b9d3-b5ee827a9018/505-2023-12-28-Episode-303-Final-converted.mp3" length="11115827" type="audio/mpeg"/><itunes:duration>09:16</itunes:duration><itunes:explicit>false</itunes:explicit><itunes:episodeType>full</itunes:episodeType><itunes:season>1</itunes:season><itunes:episode>303</itunes:episode><itunes:season>1</itunes:season><podcast:episode>303</podcast:episode><podcast:season>1</podcast:season><itunes:author>Contributors from Around the World</itunes:author></item><item><title>Episode #302: Edwin Kwan: Developers Ignore Critical Flaw in Apache Struts 2 Framework; Hillary Coover: The Quantum Computing Revolution and Global Security; Olimpiu Pop: 2023 in Review: AI Legislation; Marcel Brown: This Day in Tech History</title><itunes:title>Episode #302: Edwin Kwan: Developers Ignore Critical Flaw in Apache Struts 2 Framework; Hillary Coover: The Quantum Computing Revolution and Global Security; Olimpiu Pop: 2023 in Review: AI Legislation; Marcel Brown: This Day in Tech History</itunes:title><description><![CDATA[<p>Free, ungated access to all 300+ episodes of “It’s 5:05!” on your favorite podcast platforms: <a href="https://bit.ly/505-updates" rel="noopener noreferrer" target="_blank">https://bit.ly/505-updates</a>. You’re welcome to 𝗿𝗲𝗽𝗼𝘀𝘁 if your followers will find this of value.</p><p>The stories we’re covering today.</p><p>Marcel Brown: December 27th, 1968. Apollo 8 splashes down in the Pacific Ocean, ending the first manned orbit of the moon.  When the spacecraft hit the water, the parachutes dragged it over and left it upside down. Because they were being buffeted by 10 foot swells, astronaut Frank Borman actually got sick and vomited. Welcome back to Earth, Frank.</p><p>Edwin Kwan: A critical remote code execution vulnerability in the Apache Struts 2 framework is reportedly being ignored by developers, leaving approximately 80 percent of recent Strut downloads exposed to the flaw. The severity of the vulnerability, rated as 9. 8 out of 10 in CVSS, arises from a logic bug in the File Upload feature.</p><p>Hillary Coover: Quantum computers operate on subatomic particle properties, enabling them to perform complex calculations and process information at unparalleled speeds compared to today's computers. However, a current challenge is the instability of qubits, the key processing units in quantum computers, which limits their ability to decrypt substantial amounts of data.</p><p>Olimpiu Pop:  In 2023, the European Union made significant strides in AI legislation with the introduction of the EU AI Act. This groundbreaking legislation, agreed upon on December 9, 2023, is the world's first dedicated law on AI and sets a global precedent. </p>]]></description><content:encoded><![CDATA[<p>Free, ungated access to all 300+ episodes of “It’s 5:05!” on your favorite podcast platforms: <a href="https://bit.ly/505-updates" rel="noopener noreferrer" target="_blank">https://bit.ly/505-updates</a>. You’re welcome to 𝗿𝗲𝗽𝗼𝘀𝘁 if your followers will find this of value.</p><p>The stories we’re covering today.</p><p>Marcel Brown: December 27th, 1968. Apollo 8 splashes down in the Pacific Ocean, ending the first manned orbit of the moon.  When the spacecraft hit the water, the parachutes dragged it over and left it upside down. Because they were being buffeted by 10 foot swells, astronaut Frank Borman actually got sick and vomited. Welcome back to Earth, Frank.</p><p>Edwin Kwan: A critical remote code execution vulnerability in the Apache Struts 2 framework is reportedly being ignored by developers, leaving approximately 80 percent of recent Strut downloads exposed to the flaw. The severity of the vulnerability, rated as 9. 8 out of 10 in CVSS, arises from a logic bug in the File Upload feature.</p><p>Hillary Coover: Quantum computers operate on subatomic particle properties, enabling them to perform complex calculations and process information at unparalleled speeds compared to today's computers. However, a current challenge is the instability of qubits, the key processing units in quantum computers, which limits their ability to decrypt substantial amounts of data.</p><p>Olimpiu Pop:  In 2023, the European Union made significant strides in AI legislation with the introduction of the EU AI Act. This groundbreaking legislation, agreed upon on December 9, 2023, is the world's first dedicated law on AI and sets a global precedent. </p>]]></content:encoded><link><![CDATA[https://3zozb9fxlbueipjyapmaas.captivate.fm/episode/episode-302-edwin-kwan-developers-ignore-critical-flaw-in-apache-struts-2-framework-hillary-coover-the-quantum-computing-revolution-and-global-security-olimpiu-pop-2023-in-review-ai-legislation-marcel-brown-this-day-in-tech-history]]></link><guid isPermaLink="false">c020ccb2-0950-4987-be4d-23afcde4be7e</guid><itunes:image href="https://artwork.captivate.fm/026f4b32-c71a-49cc-87f4-f64415506732/oyY1v-iDY3f6tI_Bu8x94n1L.jpg"/><dc:creator><![CDATA[Contributors from Around the World]]></dc:creator><pubDate>Wed, 27 Dec 2023 16:45:00 -0400</pubDate><enclosure url="https://dts.podtrac.com/redirect.mp3/podcasts.captivate.fm/media/e07b94c2-ddb1-43fe-9f4b-b1b0a5495523/505-2023-12-27-Episode-302-Final-converted.mp3" length="11848301" type="audio/mpeg"/><itunes:duration>09:52</itunes:duration><itunes:explicit>false</itunes:explicit><itunes:episodeType>full</itunes:episodeType><itunes:season>1</itunes:season><itunes:episode>302</itunes:episode><itunes:season>1</itunes:season><podcast:episode>302</podcast:episode><podcast:season>1</podcast:season><itunes:author>Contributors from Around the World</itunes:author></item><item><title>Episode #301: Edwin Kwan: Critical Vulnerability Threatens SSH Security; Hillary Coover: National Grid Removes China-Based Supplier&apos;s Components; Ian Garrett: Ransomware Evolves to Extortionware Threat; Olimpiu Pop: 2023 in Review: Cybersecurity and the Supply Chain; Marcel Brown: This Day in Tech History</title><itunes:title>Episode #301: Edwin Kwan: Critical Vulnerability Threatens SSH Security; Hillary Coover: National Grid Removes China-Based Supplier&apos;s Components; Ian Garrett: Ransomware Evolves to Extortionware Threat; Olimpiu Pop: 2023 in Review: Cybersecurity and the Supply Chain; Marcel Brown: This Day in Tech History</itunes:title><description><![CDATA[<p>Free, ungated access to all 300+ episodes of “It’s 5:05!” on your favorite podcast platforms: <a href="https://bit.ly/505-updates" rel="noopener noreferrer" target="_blank">https://bit.ly/505-updates</a>. You’re welcome to 𝗿𝗲𝗽𝗼𝘀𝘁 if your followers will find this of value.</p><p>The stories we’re covering today.</p><p>Marcel Brown: December 25th, 1990. Merry Christmas, everyone. Tim Berners Lee, a British scientist working at the European Organization for Nuclear Research, otherwise known as CERN, along with his associate, Robert Kaliau, were operating the first web server, info.cern.Ch, and first web browser slash editor, World Wide Web, which were reportedly able to communicate over the internet by this date.</p><p>Edwin Kwan: A groundbreaking attack named Terrapin has been uncovered posing a significant threat to the security of the SSH secure shell protocol. What sets Terrapin apart is its ability to undermine cryptographic SSH protections that were previously considered to be immune to such attacks</p><p>Hillary Coover: Britain's National Grid is taking steps to remove components provided by a subsidiary of China-backed Nari Technology from its electricity transmission network due to concerns about cybersecurity. </p><p>Ian Garrett: Cyber criminals in their quest to maximize disruption and ransom demands are evolving their strategies. A notable example is the ransomware group gang known as BlackCat, which recently employed a novel extortion tactic. This incident is the first of its kind, and likely a precursor to future trends in cyber extortion.</p><p>Olimpiu Pop:  In 2023, cybersecurity and supply chain issues evolved significantly. Software supply chain attacks, especially targeting open source software libraries, saw a dramatic increase. The growing reliance on open source software, under the pressure of rapid development cycles, made these libraries prime targets for exploitation.</p>]]></description><content:encoded><![CDATA[<p>Free, ungated access to all 300+ episodes of “It’s 5:05!” on your favorite podcast platforms: <a href="https://bit.ly/505-updates" rel="noopener noreferrer" target="_blank">https://bit.ly/505-updates</a>. You’re welcome to 𝗿𝗲𝗽𝗼𝘀𝘁 if your followers will find this of value.</p><p>The stories we’re covering today.</p><p>Marcel Brown: December 25th, 1990. Merry Christmas, everyone. Tim Berners Lee, a British scientist working at the European Organization for Nuclear Research, otherwise known as CERN, along with his associate, Robert Kaliau, were operating the first web server, info.cern.Ch, and first web browser slash editor, World Wide Web, which were reportedly able to communicate over the internet by this date.</p><p>Edwin Kwan: A groundbreaking attack named Terrapin has been uncovered posing a significant threat to the security of the SSH secure shell protocol. What sets Terrapin apart is its ability to undermine cryptographic SSH protections that were previously considered to be immune to such attacks</p><p>Hillary Coover: Britain's National Grid is taking steps to remove components provided by a subsidiary of China-backed Nari Technology from its electricity transmission network due to concerns about cybersecurity. </p><p>Ian Garrett: Cyber criminals in their quest to maximize disruption and ransom demands are evolving their strategies. A notable example is the ransomware group gang known as BlackCat, which recently employed a novel extortion tactic. This incident is the first of its kind, and likely a precursor to future trends in cyber extortion.</p><p>Olimpiu Pop:  In 2023, cybersecurity and supply chain issues evolved significantly. Software supply chain attacks, especially targeting open source software libraries, saw a dramatic increase. The growing reliance on open source software, under the pressure of rapid development cycles, made these libraries prime targets for exploitation.</p>]]></content:encoded><link><![CDATA[https://3zozb9fxlbueipjyapmaas.captivate.fm/episode/episode-301-edwin-kwan-critical-vulnerability-threatens-ssh-security-hillary-coover-national-grid-removes-china-based-suppliers-components-ian-garrett-ransomware-evolves-to-extortionware-threat-olimpiu-pop-2023-in-review-cybersecurity-and-the-supply-ch...]]></link><guid isPermaLink="false">0cb6c464-74fe-4bb5-9d2e-e691135cca24</guid><itunes:image href="https://artwork.captivate.fm/49b3a349-295b-41df-8013-e78272e56aac/xY97gtPn4pqG6z9CCPATjeY5.jpg"/><dc:creator><![CDATA[Contributors from Around the World]]></dc:creator><pubDate>Tue, 26 Dec 2023 16:45:00 -0400</pubDate><enclosure url="https://dts.podtrac.com/redirect.mp3/podcasts.captivate.fm/media/4bf33918-99f1-4890-bc37-df76276db7ff/505-2023-12-26-Episode-301-Final-converted.mp3" length="17507989" type="audio/mpeg"/><itunes:duration>14:35</itunes:duration><itunes:explicit>false</itunes:explicit><itunes:episodeType>full</itunes:episodeType><itunes:season>1</itunes:season><itunes:episode>301</itunes:episode><itunes:season>1</itunes:season><podcast:episode>301</podcast:episode><podcast:season>1</podcast:season><itunes:author>Contributors from Around the World</itunes:author></item><item><title>Episode #300: Edwin Kwan: SMTP Smuggling ByPasses Email Security Controls; Hillary Coover: Researchers Seek to Unmask Hackers Through Code Analysis and AI; Marcel Brown: This Day in Tech History; Katy Craig: CISO Accountability: Framework for Compliance; Trac Bannon: CISO Accountability: The buck stops… where?; Olimpiu Pop: CISO Accountability: Compliance is not Security</title><itunes:title>Episode #300: Edwin Kwan: SMTP Smuggling ByPasses Email Security Controls; Hillary Coover: Researchers Seek to Unmask Hackers Through Code Analysis and AI; Marcel Brown: This Day in Tech History; Katy Craig: CISO Accountability: Framework for Compliance; Trac Bannon: CISO Accountability: The buck stops… where?; Olimpiu Pop: CISO Accountability: Compliance is not Security</itunes:title><description><![CDATA[<p>Free, ungated access to all 300+ episodes of “It’s 5:05!” on your favorite podcast platforms: <a href="https://bit.ly/505-updates" rel="noopener noreferrer" target="_blank">https://bit.ly/505-updates</a>. You’re welcome to 𝗿𝗲𝗽𝗼𝘀𝘁 if your followers will find this of value.</p><p>The stories we’re covering today.</p><p>Marcel Brown: December 22nd, 1882. Edward Johnson, an associate of Thomas Edison, has walnut sized bulbs made specifically for him to wire his Christmas tree with electric light. The eighty red, white, and blue bulbs formed the first set of electric Christmas tree lights in history.</p><p>Edwin Kwan: A recently discovered  SMTP smuggling technique is allowing cyber attackers to sidestep email security protocols,  posing a significant threat to organizations. The techniques exploit zero-day flaws in messaging servers, allowing attackers to send malicious emails with fake sender addresses.</p><p>Hillary Coover: In an effort to combat cybercrime, U. S. government researchers are embarking on a 30 month project to investigate whether computer code used in cyberattacks can reveal clues about the hackers behind them.</p><p>Katy Craig: The SEC's legal action against the former CISO of SolarWinds is a justified step towards greater accountability in corporate cybersecurity. It highlights the need for individuals in charge to diligently comply with federal safeguards and rules and to report incidents.</p><p>Trac Bannon: The charges against Joe Sullivan and Timothy Brown have dramatic ramifications for industry.  There is the increased scrutiny of CSOs and CISOs. The precedent is set for personal accountability for both cybersecurity practices and disclosures. This means corporate security officers face scrutiny and legal responsibilities similar to CFOs and their responsibility for financial disclosures.</p><p>Olimpiu Pop: Whether we like it or not, we are at war.   The CISO should stop preaching, and transform their slides into actions . Actions, translatable into automated tools that cannot be circumvented or ignored. More than that, as CISO, you should be the north star in terms of ethical conduct.</p>]]></description><content:encoded><![CDATA[<p>Free, ungated access to all 300+ episodes of “It’s 5:05!” on your favorite podcast platforms: <a href="https://bit.ly/505-updates" rel="noopener noreferrer" target="_blank">https://bit.ly/505-updates</a>. You’re welcome to 𝗿𝗲𝗽𝗼𝘀𝘁 if your followers will find this of value.</p><p>The stories we’re covering today.</p><p>Marcel Brown: December 22nd, 1882. Edward Johnson, an associate of Thomas Edison, has walnut sized bulbs made specifically for him to wire his Christmas tree with electric light. The eighty red, white, and blue bulbs formed the first set of electric Christmas tree lights in history.</p><p>Edwin Kwan: A recently discovered  SMTP smuggling technique is allowing cyber attackers to sidestep email security protocols,  posing a significant threat to organizations. The techniques exploit zero-day flaws in messaging servers, allowing attackers to send malicious emails with fake sender addresses.</p><p>Hillary Coover: In an effort to combat cybercrime, U. S. government researchers are embarking on a 30 month project to investigate whether computer code used in cyberattacks can reveal clues about the hackers behind them.</p><p>Katy Craig: The SEC's legal action against the former CISO of SolarWinds is a justified step towards greater accountability in corporate cybersecurity. It highlights the need for individuals in charge to diligently comply with federal safeguards and rules and to report incidents.</p><p>Trac Bannon: The charges against Joe Sullivan and Timothy Brown have dramatic ramifications for industry.  There is the increased scrutiny of CSOs and CISOs. The precedent is set for personal accountability for both cybersecurity practices and disclosures. This means corporate security officers face scrutiny and legal responsibilities similar to CFOs and their responsibility for financial disclosures.</p><p>Olimpiu Pop: Whether we like it or not, we are at war.   The CISO should stop preaching, and transform their slides into actions . Actions, translatable into automated tools that cannot be circumvented or ignored. More than that, as CISO, you should be the north star in terms of ethical conduct.</p>]]></content:encoded><link><![CDATA[https://3zozb9fxlbueipjyapmaas.captivate.fm/episode/episode-300-edwin-kwan-smtp-smuggling-bypasses-email-security-controls-hillary-coover-researchers-seek-to-unmask-hackers-through-code-analysis-and-ai-marcel-brown-this-day-in-tech-history-katy-craig-ciso-accountability-framework-for-compliance-trac-ban...]]></link><guid isPermaLink="false">12f9bf19-5259-40c3-811c-ab328e815752</guid><itunes:image href="https://artwork.captivate.fm/db87b24f-bd4b-453d-800a-28fae7c757dc/ANAOBPx4prWqTzbqpEho39yl.jpg"/><dc:creator><![CDATA[Contributors from Around the World]]></dc:creator><pubDate>Fri, 22 Dec 2023 16:45:00 -0400</pubDate><enclosure url="https://dts.podtrac.com/redirect.mp3/podcasts.captivate.fm/media/30a4d04c-10ac-4048-a3fc-c87b81c9a889/505-2023-12-22-Episode-300-Final-converted.mp3" length="16130498" type="audio/mpeg"/><itunes:duration>16:48</itunes:duration><itunes:explicit>false</itunes:explicit><itunes:episodeType>full</itunes:episodeType><itunes:season>1</itunes:season><itunes:episode>300</itunes:episode><itunes:season>1</itunes:season><podcast:episode>300</podcast:episode><podcast:season>1</podcast:season><itunes:author>Contributors from Around the World</itunes:author></item><item><title>Episode #299: Edwin Kwan: Terminated Bank Cloud Engineer Sabotages Systems; Hillary Coover: Unauthorized Access to MongoDB Corporate Systems; Ian Garrett: Insights from the Microsoft Digital Defense Report 2023; Marcel Brown: This Day in Tech History</title><itunes:title>Episode #299: Edwin Kwan: Terminated Bank Cloud Engineer Sabotages Systems; Hillary Coover: Unauthorized Access to MongoDB Corporate Systems; Ian Garrett: Insights from the Microsoft Digital Defense Report 2023; Marcel Brown: This Day in Tech History</itunes:title><description><![CDATA[<p>Free, ungated access to all 295+ episodes of “It’s 5:05!” on your favorite podcast platforms: <a href="https://bit.ly/505-updates" rel="noopener noreferrer" target="_blank">https://bit.ly/505-updates</a>. You’re welcome to 𝗿𝗲𝗽𝗼𝘀𝘁 if your followers will find this of value.</p><p>The stories we’re covering today.</p><p>Edwin Kwan:  A former cloud engineer at a bank was terminated for violating company policies, including inappropriate laptop use. After he was fired, the employee went home and used a company issued laptop to launch attacks on the bank's network.  </p><p>Hillary Coover: Database management company MongoDB is currently investigating a security incident that has led to the exposure of some customer information. Certain corporate systems were compromised,  containing customer names, phone numbers, email addresses, and other unspecified customer account metadata. For one customer, system logs were accessed. </p><p>Ian Garrett: Microsoft recently released their Digital Defense Report of 2023, which provides crucial insights into the evolving cybersecurity landscape. Let's jump into the 10 essential insights of cybersecurity from the report. </p>]]></description><content:encoded><![CDATA[<p>Free, ungated access to all 295+ episodes of “It’s 5:05!” on your favorite podcast platforms: <a href="https://bit.ly/505-updates" rel="noopener noreferrer" target="_blank">https://bit.ly/505-updates</a>. You’re welcome to 𝗿𝗲𝗽𝗼𝘀𝘁 if your followers will find this of value.</p><p>The stories we’re covering today.</p><p>Edwin Kwan:  A former cloud engineer at a bank was terminated for violating company policies, including inappropriate laptop use. After he was fired, the employee went home and used a company issued laptop to launch attacks on the bank's network.  </p><p>Hillary Coover: Database management company MongoDB is currently investigating a security incident that has led to the exposure of some customer information. Certain corporate systems were compromised,  containing customer names, phone numbers, email addresses, and other unspecified customer account metadata. For one customer, system logs were accessed. </p><p>Ian Garrett: Microsoft recently released their Digital Defense Report of 2023, which provides crucial insights into the evolving cybersecurity landscape. Let's jump into the 10 essential insights of cybersecurity from the report. </p>]]></content:encoded><link><![CDATA[https://3zozb9fxlbueipjyapmaas.captivate.fm/episode/episode-299-edwin-kwan-terminated-bank-cloud-engineer-sabotages-systems-hillary-coover-unauthorized-access-to-mongodb-corporate-systems-ian-garrett-insights-from-the-microsoft-digital-defense-report-2023-marcel-brown-this-day-in-tech-history]]></link><guid isPermaLink="false">e96c1793-c0e1-4f3f-a904-a820b78a530a</guid><itunes:image href="https://artwork.captivate.fm/0113a42b-94db-4d14-805b-2fdb95a393cc/pgivQS7thv5sGHKsejjdlJbm.jpg"/><dc:creator><![CDATA[Contributors from Around the World]]></dc:creator><pubDate>Thu, 21 Dec 2023 16:45:00 -0400</pubDate><enclosure url="https://dts.podtrac.com/redirect.mp3/podcasts.captivate.fm/media/23e8e2e3-b288-4a35-a3d8-4aa3f84e7b59/505-2023-12-21-Episode-299-Final-converted.mp3" length="8298782" type="audio/mpeg"/><itunes:duration>06:55</itunes:duration><itunes:explicit>false</itunes:explicit><itunes:episodeType>full</itunes:episodeType><itunes:season>1</itunes:season><itunes:episode>299</itunes:episode><itunes:season>1</itunes:season><podcast:episode>299</podcast:episode><podcast:season>1</podcast:season><itunes:author>Contributors from Around the World</itunes:author></item><item><title>Episode #298: Edwin Kwan: Ubiquiti User Accounts Suffer Data Breach; Katy Craig: Xfinity Acknowledges 36 Million Customer Accounts Breached; Hillary Coover: L.L. Bean&apos;s Surprising Stance on Data Privacy; Marcel Brown: This Day in Tech History</title><itunes:title>Episode #298: Edwin Kwan: Ubiquiti User Accounts Suffer Data Breach; Katy Craig: Xfinity Acknowledges 36 Million Customer Accounts Breached; Hillary Coover: L.L. Bean&apos;s Surprising Stance on Data Privacy; Marcel Brown: This Day in Tech History</itunes:title><description><![CDATA[<p>Free, ungated access to all 295+ episodes of “It’s 5:05!” on your favorite podcast platforms: <a href="https://bit.ly/505-updates" rel="noopener noreferrer" target="_blank">https://bit.ly/505-updates</a>. You’re welcome to 𝗿𝗲𝗽𝗼𝘀𝘁 if your followers will find this of value.</p><p>The stories we’re covering today.</p><p>Marcel Brown: December 20th, 1996. In a surprise move at the time, Apple Computer announces their intention to purchase Steve Jobs' company, NeXT, and bring Steve Jobs on board as an advisor to CEO Gil Amelio.  Along with the leadership of future CEO Steve Jobs, the resurgence of Apple in the 2000s, and the emergence of the new world of technology can be traced back to this major event in technology history. </p><p>Hillary Coover: In Maine's data privacy debate, L.L. Bean has surprisingly aligned with global tech giants, highlighting the power of local national business alliances in shaping legislation. This unusual alliance between a family-owned retailer and tech giants illustrates the complexity of the national data privacy law debate, primarily occurring at the state level.</p><p>Edwin Kwan: Ubiquiti users were reporting last week that they were seeing other people's notification and had access to their devices. The incident was first reported on Reddit, where a user received a notification from UniFi ProTech, including an image from someone else's security camera.</p><p>Katy Craig: Today we're discussing a significant cyber security incident. Xfinity has recently experienced a major data breach, potentially impacting around 36 million customers . Compromised data includes usernames, hashed passwords,  the last four digits of social security numbers, security questions, birthdates, and contact details. </p>]]></description><content:encoded><![CDATA[<p>Free, ungated access to all 295+ episodes of “It’s 5:05!” on your favorite podcast platforms: <a href="https://bit.ly/505-updates" rel="noopener noreferrer" target="_blank">https://bit.ly/505-updates</a>. You’re welcome to 𝗿𝗲𝗽𝗼𝘀𝘁 if your followers will find this of value.</p><p>The stories we’re covering today.</p><p>Marcel Brown: December 20th, 1996. In a surprise move at the time, Apple Computer announces their intention to purchase Steve Jobs' company, NeXT, and bring Steve Jobs on board as an advisor to CEO Gil Amelio.  Along with the leadership of future CEO Steve Jobs, the resurgence of Apple in the 2000s, and the emergence of the new world of technology can be traced back to this major event in technology history. </p><p>Hillary Coover: In Maine's data privacy debate, L.L. Bean has surprisingly aligned with global tech giants, highlighting the power of local national business alliances in shaping legislation. This unusual alliance between a family-owned retailer and tech giants illustrates the complexity of the national data privacy law debate, primarily occurring at the state level.</p><p>Edwin Kwan: Ubiquiti users were reporting last week that they were seeing other people's notification and had access to their devices. The incident was first reported on Reddit, where a user received a notification from UniFi ProTech, including an image from someone else's security camera.</p><p>Katy Craig: Today we're discussing a significant cyber security incident. Xfinity has recently experienced a major data breach, potentially impacting around 36 million customers . Compromised data includes usernames, hashed passwords,  the last four digits of social security numbers, security questions, birthdates, and contact details. </p>]]></content:encoded><link><![CDATA[https://3zozb9fxlbueipjyapmaas.captivate.fm/episode/episode-298-edwin-kwan-ubiquiti-user-accounts-suffer-data-breach-katy-craig-xfinity-acknowledges-36-million-customer-accounts-breached-hillary-coover-l-l-beans-surprising-stance-on-data-privacy-marcel-brown-this-day-in-tech-history]]></link><guid isPermaLink="false">a077ebc5-0733-4115-94fd-ca5f1360f659</guid><itunes:image href="https://artwork.captivate.fm/355b5871-3cea-46c1-afa9-e6e0d6a603a8/apBhbQ1M_sIJ6rEaCZfYjWHI.jpg"/><dc:creator><![CDATA[Contributors from Around the World]]></dc:creator><pubDate>Wed, 20 Dec 2023 16:45:00 -0400</pubDate><enclosure url="https://dts.podtrac.com/redirect.mp3/podcasts.captivate.fm/media/45b1dae1-d624-46ef-a23e-fe68247f8326/505-2023-12-20-Episode-298-Final-converted.mp3" length="10807060" type="audio/mpeg"/><itunes:duration>09:00</itunes:duration><itunes:explicit>false</itunes:explicit><itunes:episodeType>full</itunes:episodeType><itunes:season>1</itunes:season><itunes:episode>298</itunes:episode><itunes:season>1</itunes:season><podcast:episode>298</podcast:episode><podcast:season>1</podcast:season><itunes:author>Contributors from Around the World</itunes:author></item><item><title>Episode #297: Edwin Kwan, My Personal Experience with SMS Impersonation Scams; Hillary Coover, Europe Probes Elon Musk&apos;s X Over Disinformation Handling; Ian Garrett, Cybersecurity, Artificial Intelligence, and Nuclear weapons, Oh my!</title><itunes:title>Episode #297: Edwin Kwan, My Personal Experience with SMS Impersonation Scams; Hillary Coover, Europe Probes Elon Musk&apos;s X Over Disinformation Handling; Ian Garrett, Cybersecurity, Artificial Intelligence, and Nuclear weapons, Oh my!</itunes:title><description><![CDATA[<p>From @Sourced Network Productions, @It's 5:05!, the Podcast , with your daily #cybersecurity and #opensource news headlines. 🎙️ Free access to 280+ episodes of “It’s 5:05!” on your favorite #podcast platforms: bit.ly/505-updates</p><p>In this episode: </p><p>Marcel Brown: This day in Tech History</p><p>December 19th, 1974. Micro Instrumentation and Telemetry Systems, otherwise known as MITS, begins selling the Altair 8800 microcomputer kit.  It is one of the most important computers in history, for it inspired the first generation of entrepreneurs that created the personal computer industry.</p><p>Edwin Kwan: My Personal Experience with SMS Impersonation Scams</p><p>I was recently targeted by an SMS impersonation scam. The scammer was impersonating someone I know who's from the US and a text message came from a US number. I don't have this person's mobile number saved, so replied thinking it might be him. It became obvious fairly quickly that it was a scam, </p><p><br></p><p>Hillary Coover: Europe Probes Elon Musk's X Over Disinformation Handling</p><p> Elon Musk's social media platform, X, formerly known as Twitter, is facing an official investigation in Europe regarding its handling of illegal content and disinformation. The European Commission has initiated a formal infringement proceeding against X under the Digital Services Act.</p><p><br></p><h2>Ian Garrett: Cybersecurity, Artificial Intelligence, and Nuclear weapons, Oh my!</h2><p><br></p><p>Cybersecurity, artificial intelligence, and nuclear weapons. Do we have an update for you? The 2024 National Defense Authorization Act, or NDAA, is a crucial piece of annual legislation for U. S. military funding. The NDAA was passed with a focus on various cybersecurity concerns.</p><p><br></p><p>🎙️ Free access to 290+ episodes of “It’s 5:05!” on your favorite podcast platforms: bit.ly/505-updates</p><p><br></p><p>#newspodcast</p><p><br></p>]]></description><content:encoded><![CDATA[<p>From @Sourced Network Productions, @It's 5:05!, the Podcast , with your daily #cybersecurity and #opensource news headlines. 🎙️ Free access to 280+ episodes of “It’s 5:05!” on your favorite #podcast platforms: bit.ly/505-updates</p><p>In this episode: </p><p>Marcel Brown: This day in Tech History</p><p>December 19th, 1974. Micro Instrumentation and Telemetry Systems, otherwise known as MITS, begins selling the Altair 8800 microcomputer kit.  It is one of the most important computers in history, for it inspired the first generation of entrepreneurs that created the personal computer industry.</p><p>Edwin Kwan: My Personal Experience with SMS Impersonation Scams</p><p>I was recently targeted by an SMS impersonation scam. The scammer was impersonating someone I know who's from the US and a text message came from a US number. I don't have this person's mobile number saved, so replied thinking it might be him. It became obvious fairly quickly that it was a scam, </p><p><br></p><p>Hillary Coover: Europe Probes Elon Musk's X Over Disinformation Handling</p><p> Elon Musk's social media platform, X, formerly known as Twitter, is facing an official investigation in Europe regarding its handling of illegal content and disinformation. The European Commission has initiated a formal infringement proceeding against X under the Digital Services Act.</p><p><br></p><h2>Ian Garrett: Cybersecurity, Artificial Intelligence, and Nuclear weapons, Oh my!</h2><p><br></p><p>Cybersecurity, artificial intelligence, and nuclear weapons. Do we have an update for you? The 2024 National Defense Authorization Act, or NDAA, is a crucial piece of annual legislation for U. S. military funding. The NDAA was passed with a focus on various cybersecurity concerns.</p><p><br></p><p>🎙️ Free access to 290+ episodes of “It’s 5:05!” on your favorite podcast platforms: bit.ly/505-updates</p><p><br></p><p>#newspodcast</p><p><br></p>]]></content:encoded><link><![CDATA[https://3zozb9fxlbueipjyapmaas.captivate.fm/episode/episode-297-edwin-kwan-my-personal-experience-with-sms-impersonation-scams-hillary-coover-europe-probes-elon-musks-x-over-disinformation-handling-ian-garrett-cybersecurity-artificial-intelligence-and-nuclear-weapons-oh-my]]></link><guid isPermaLink="false">802a7707-93dd-4098-89fe-aaa48c945a85</guid><itunes:image href="https://artwork.captivate.fm/69b101b0-164f-4621-b5db-952aa7935fd4/bKec9RQkNeRa7zxKih36lYlP.jpg"/><dc:creator><![CDATA[Contributors from Around the World]]></dc:creator><pubDate>Tue, 19 Dec 2023 16:45:00 -0400</pubDate><enclosure url="https://dts.podtrac.com/redirect.mp3/podcasts.captivate.fm/media/7885a687-d9e6-44f2-918a-a896f9c0f5c5/Episode-297-Tuesday-2023-12-19-Draft.mp3" length="9841375" type="audio/mpeg"/><itunes:duration>10:15</itunes:duration><itunes:explicit>false</itunes:explicit><itunes:episodeType>full</itunes:episodeType><itunes:season>1</itunes:season><itunes:episode>297</itunes:episode><itunes:season>1</itunes:season><podcast:episode>297</podcast:episode><podcast:season>1</podcast:season><itunes:author>Contributors from Around the World</itunes:author></item><item><title>Episode #296: Edwin Kwan: 38% of Apps Still Exposed to Log4J Vulnerability; Katy Craig: Is My Phone Spying on Me?; Hillary Coover: Foreign Geographic Software Poses National Security Threats; Marcel Brown: This Day in Tech History</title><itunes:title>Episode #296: Edwin Kwan: 38% of Apps Still Exposed to Log4J Vulnerability; Katy Craig: Is My Phone Spying on Me?; Hillary Coover: Foreign Geographic Software Poses National Security Threats; Marcel Brown: This Day in Tech History</itunes:title><description><![CDATA[<p>Free, ungated access to all 295+ episodes of “It’s 5:05!” on your favorite podcast platforms: <a href="https://bit.ly/505-updates" rel="noopener noreferrer" target="_blank">https://bit.ly/505-updates</a>. You’re welcome to 𝗿𝗲𝗽𝗼𝘀𝘁 if your followers will find this of value.</p><p>The stories we’re covering today.</p><p>Marcel Brown: December 17th, 1903. Orville and Wilbur Wright make their famous first controlled and sustained flights with a heavier than air, powered aircraft. Orville made the very first flight, which lasted about 12 seconds. </p><p>Edwin Kwan: It's been almost three years since the critical Log4j vulnerability was disclosed.  Despite patches being available shortly after vulnerability disclosure, many organizations persistently use vulnerable versions.   There are still approximately 38% of applications using vulnerable versions of the Apache Log4j library.  </p><p>Hillary Coover: China raised concerns about the potential compromise of sensitive data, particularly in crucial sectors like the military, due to the use of foreign geographic information software. The Ministry of State Security has urged security departments to conduct thorough investigations to prevent further breaches. </p><p>Katy Craig: A marketing company, CMG Local Solutions, recently claimed it could access people's private conversations through their device microphones for targeted advertising. This claim raises some serious red flags.</p>]]></description><content:encoded><![CDATA[<p>Free, ungated access to all 295+ episodes of “It’s 5:05!” on your favorite podcast platforms: <a href="https://bit.ly/505-updates" rel="noopener noreferrer" target="_blank">https://bit.ly/505-updates</a>. You’re welcome to 𝗿𝗲𝗽𝗼𝘀𝘁 if your followers will find this of value.</p><p>The stories we’re covering today.</p><p>Marcel Brown: December 17th, 1903. Orville and Wilbur Wright make their famous first controlled and sustained flights with a heavier than air, powered aircraft. Orville made the very first flight, which lasted about 12 seconds. </p><p>Edwin Kwan: It's been almost three years since the critical Log4j vulnerability was disclosed.  Despite patches being available shortly after vulnerability disclosure, many organizations persistently use vulnerable versions.   There are still approximately 38% of applications using vulnerable versions of the Apache Log4j library.  </p><p>Hillary Coover: China raised concerns about the potential compromise of sensitive data, particularly in crucial sectors like the military, due to the use of foreign geographic information software. The Ministry of State Security has urged security departments to conduct thorough investigations to prevent further breaches. </p><p>Katy Craig: A marketing company, CMG Local Solutions, recently claimed it could access people's private conversations through their device microphones for targeted advertising. This claim raises some serious red flags.</p>]]></content:encoded><link><![CDATA[https://3zozb9fxlbueipjyapmaas.captivate.fm/episode/episode-296-edwin-kwan-38-of-apps-still-exposed-to-log4j-vulnerability-katy-craig-is-my-phone-spying-on-me-hillary-coover-foreign-geographic-software-poses-national-security-threats-marcel-brown-this-day-in-tech-history]]></link><guid isPermaLink="false">5d23528e-6207-4ab5-8f00-d7e85cb59707</guid><itunes:image href="https://artwork.captivate.fm/24eece7e-aa2b-4a8e-928d-08350ca46981/fHHdyDatSRJfBMCTNedCaULA.jpg"/><dc:creator><![CDATA[Contributors from Around the World]]></dc:creator><pubDate>Mon, 18 Dec 2023 16:45:00 -0400</pubDate><enclosure url="https://dts.podtrac.com/redirect.mp3/podcasts.captivate.fm/media/34ae012e-a3ec-437c-b8a2-071fa2e428ca/505-2023-12-18-Episode-296-Final-converted.mp3" length="12550992" type="audio/mpeg"/><itunes:duration>10:28</itunes:duration><itunes:explicit>false</itunes:explicit><itunes:episodeType>full</itunes:episodeType><itunes:season>1</itunes:season><itunes:episode>296</itunes:episode><itunes:season>1</itunes:season><podcast:episode>296</podcast:episode><podcast:season>1</podcast:season><itunes:author>Contributors from Around the World</itunes:author></item><item><title>Special Report: POV Friday - Four Opinions on the EU AI Act.</title><itunes:title>Special Report: POV Friday - Four Opinions on the EU AI Act.</itunes:title><description><![CDATA[<p>From Sourced Network Productions, It's 5:05!, the Podcast , with a special report on the EU AI Act. It’s Point of View Friday, featuring Trac Bannon, Katy Craig, Shannon Leitz, and Olimpiu Pop, with their perspectives on the release of the EU AI Act. We’ll start with Katy Craig.</p><p>Katy Craig: Today, we’re diving into a significant milestone in AI regulation: the European Union’s recent passing of the AI Act. This legislation is set to shape how AI is used across industries, but it also raises questions about potential, unintended consequences.</p><p>Trac Bannon: The EU is taking the global lead when it comes to AI governance. In the US, there are many discussions and hearings happening about AI policy at different levels of the government, but nothing cohesive and nothing comprehensive.</p><p>Shannon Lietz: It’s an interesting time to be looking at AI, using AI, and trying to make sense of what it could mean for you. The question is, which use cases is it most well suited for? And are the producers of AI capabilities such as OpenAI and its competitors actually looking at which use cases should be allowed? Which ones are allowed to be adopted?</p><p>Olimpiu Pop: The EU AI Act, with all its ups and downs, is the first one in the world, and it will be the baseline. Can the slow legislative apparatus keep pace with the lightning speed of AI tech space?</p><p>🎙️ Free access to 280+ episodes of “It’s 5:05!” on your favorite #podcast platforms: bit.ly/505-updates</p><p><br></p><p><br></p>]]></description><content:encoded><![CDATA[<p>From Sourced Network Productions, It's 5:05!, the Podcast , with a special report on the EU AI Act. It’s Point of View Friday, featuring Trac Bannon, Katy Craig, Shannon Leitz, and Olimpiu Pop, with their perspectives on the release of the EU AI Act. We’ll start with Katy Craig.</p><p>Katy Craig: Today, we’re diving into a significant milestone in AI regulation: the European Union’s recent passing of the AI Act. This legislation is set to shape how AI is used across industries, but it also raises questions about potential, unintended consequences.</p><p>Trac Bannon: The EU is taking the global lead when it comes to AI governance. In the US, there are many discussions and hearings happening about AI policy at different levels of the government, but nothing cohesive and nothing comprehensive.</p><p>Shannon Lietz: It’s an interesting time to be looking at AI, using AI, and trying to make sense of what it could mean for you. The question is, which use cases is it most well suited for? And are the producers of AI capabilities such as OpenAI and its competitors actually looking at which use cases should be allowed? Which ones are allowed to be adopted?</p><p>Olimpiu Pop: The EU AI Act, with all its ups and downs, is the first one in the world, and it will be the baseline. Can the slow legislative apparatus keep pace with the lightning speed of AI tech space?</p><p>🎙️ Free access to 280+ episodes of “It’s 5:05!” on your favorite #podcast platforms: bit.ly/505-updates</p><p><br></p><p><br></p>]]></content:encoded><link><![CDATA[https://3zozb9fxlbueipjyapmaas.captivate.fm/episode/special-report-pov-friday-four-opinions-on-the-eu-ai-act-]]></link><guid isPermaLink="false">30d0f20e-0f5a-466e-920d-f1c69cbe85de</guid><itunes:image href="https://artwork.captivate.fm/bfab6090-efd7-454d-9431-d47976f1f825/DjMEuu9tEsycLYtpAlWYCnsR.jpg"/><dc:creator><![CDATA[Contributors from Around the World]]></dc:creator><pubDate>Sun, 17 Dec 2023 16:45:00 -0400</pubDate><enclosure url="https://dts.podtrac.com/redirect.mp3/podcasts.captivate.fm/media/d6071ce7-4caa-4a20-8548-0cb2bb8f0cbd/2023-12-15-POV-EU-AI-Act-converted.mp3" length="11665965" type="audio/mpeg"/><itunes:duration>12:09</itunes:duration><itunes:explicit>false</itunes:explicit><itunes:episodeType>full</itunes:episodeType><itunes:author>Contributors from Around the World</itunes:author></item><item><title>Episode #295: Edwin Kwan: Apple Beta Testing Stolen Device Protection Feature; Marcel Brown: This Day in Tech History; Katy Craig: EU AI Act: Significant Milestone in AI Regulation; Trac Bannon: EU AI Act: Does it Leave U.S. in the Dust?; Shannon Lietz: EU AI Act: Win, Lose, or Draw?; Olimpiu Pop: EU AI Act: A Baseline for Regulation</title><itunes:title>Episode #295: Edwin Kwan: Apple Beta Testing Stolen Device Protection Feature; Marcel Brown: This Day in Tech History; Katy Craig: EU AI Act: Significant Milestone in AI Regulation; Trac Bannon: EU AI Act: Does it Leave U.S. in the Dust?; Shannon Lietz: EU AI Act: Win, Lose, or Draw?; Olimpiu Pop: EU AI Act: A Baseline for Regulation</itunes:title><description><![CDATA[<p>Free, ungated access to all 295+ episodes of “It’s 5:05!” on your favorite podcast platforms: <a href="https://bit.ly/505-updates" rel="noopener noreferrer" target="_blank">https://bit.ly/505-updates</a>. You’re welcome to 𝗿𝗲𝗽𝗼𝘀𝘁 if your followers will find this of value.</p><p>The stories we’re covering today.</p><p>Marcel Brown: December 16, 2003. The CAN SPAM Act of 2003 is signed into United States law. Passed in an attempt to control the growing deluge of junk email, the law's effectiveness is dubious at best. Especially considering political spam is exempt from the law.</p><p>Edwin Kwan: Apple will soon be introducing a stolen device protection feature, which is aimed at enhancing security if an iPhone is stolen, particularly in scenarios where thieves obtain the device passcode. </p><p>Katy Craig: Today, we're diving into a significant milestone in AI regulation: the European Union's recent passing of the AI Act. This legislation is set to shape how AI is used across industries, but it also raises questions about potential, unintended consequences. </p><p>Trac Bannon: The EU is taking the global lead when it comes to AI governance.  In the US, there are many discussions and hearings happening about AI policy at different levels of the government, but nothing cohesive and nothing comprehensive. </p><p>Olimpiu Pop: The EU AI Act, with all its ups and downs, is the first one in the world, and it will be the baseline. Can the slow legislative apparatus keep pace with the lightning speed of AI tech space?</p><p>Shannon Lietz: It's an interesting time to be looking at AI, using AI, and trying to make sense of what it could mean for you. The question is, which use cases is it most well suited for? And are the producers of AI capabilities such as OpenAI and its competitors actually looking at which use cases should be allowed? Which ones are allowed to be adopted?</p>]]></description><content:encoded><![CDATA[<p>Free, ungated access to all 295+ episodes of “It’s 5:05!” on your favorite podcast platforms: <a href="https://bit.ly/505-updates" rel="noopener noreferrer" target="_blank">https://bit.ly/505-updates</a>. You’re welcome to 𝗿𝗲𝗽𝗼𝘀𝘁 if your followers will find this of value.</p><p>The stories we’re covering today.</p><p>Marcel Brown: December 16, 2003. The CAN SPAM Act of 2003 is signed into United States law. Passed in an attempt to control the growing deluge of junk email, the law's effectiveness is dubious at best. Especially considering political spam is exempt from the law.</p><p>Edwin Kwan: Apple will soon be introducing a stolen device protection feature, which is aimed at enhancing security if an iPhone is stolen, particularly in scenarios where thieves obtain the device passcode. </p><p>Katy Craig: Today, we're diving into a significant milestone in AI regulation: the European Union's recent passing of the AI Act. This legislation is set to shape how AI is used across industries, but it also raises questions about potential, unintended consequences. </p><p>Trac Bannon: The EU is taking the global lead when it comes to AI governance.  In the US, there are many discussions and hearings happening about AI policy at different levels of the government, but nothing cohesive and nothing comprehensive. </p><p>Olimpiu Pop: The EU AI Act, with all its ups and downs, is the first one in the world, and it will be the baseline. Can the slow legislative apparatus keep pace with the lightning speed of AI tech space?</p><p>Shannon Lietz: It's an interesting time to be looking at AI, using AI, and trying to make sense of what it could mean for you. The question is, which use cases is it most well suited for? And are the producers of AI capabilities such as OpenAI and its competitors actually looking at which use cases should be allowed? Which ones are allowed to be adopted?</p>]]></content:encoded><link><![CDATA[https://3zozb9fxlbueipjyapmaas.captivate.fm/episode/episode-295-edwin-kwan-apple-beta-testing-stolen-device-protection-feature-marcel-brown-this-day-in-tech-history-katy-craig-eu-ai-act-significant-milestone-in-ai-regulation-trac-bannon-eu-ai-act-does-it-leave-u-s-in-the-dust-shannon-lietz-eu-ai-act-win...]]></link><guid isPermaLink="false">986b99be-7d2a-4d38-9264-60cef0b90b49</guid><itunes:image href="https://artwork.captivate.fm/237116a9-aaa2-4bcd-a663-f3bb64d464bf/i-nJO8MqavJxF8wAiRzM1Utp.jpg"/><dc:creator><![CDATA[Contributors from Around the World]]></dc:creator><pubDate>Fri, 15 Dec 2023 16:45:00 -0400</pubDate><enclosure url="https://dts.podtrac.com/redirect.mp3/podcasts.captivate.fm/media/01c18479-15fb-444a-88f6-16fb131c6885/505-2023-12-15-Episode-295-Final-converted.mp3" length="21000037" type="audio/mpeg"/><itunes:duration>17:30</itunes:duration><itunes:explicit>false</itunes:explicit><itunes:episodeType>full</itunes:episodeType><itunes:season>1</itunes:season><itunes:episode>295</itunes:episode><itunes:season>1</itunes:season><podcast:episode>295</podcast:episode><podcast:season>1</podcast:season><itunes:author>Contributors from Around the World</itunes:author></item><item><title>Episode #294: Edwin Kwan: Over 50% Insider Attacks Involve Privilege Elevation Exploits; Katy Craig: Malware Deployment Strategy against Adobe ColdFusion; Ian Garrett: Where Will Cyber Leaders Focus on AI in 2024; Marcel Brown: This Day in Tech History</title><itunes:title>Episode #294: Edwin Kwan: Over 50% Insider Attacks Involve Privilege Elevation Exploits; Katy Craig: Malware Deployment Strategy against Adobe ColdFusion; Ian Garrett: Where Will Cyber Leaders Focus on AI in 2024; Marcel Brown: This Day in Tech History</itunes:title><description><![CDATA[<p> Free, ungated access to all 290+ episodes of “It’s 5:05!” on your favorite podcast platforms: <a href="https://bit.ly/505-updates" rel="noopener noreferrer" target="_blank">https://bit.ly/505-updates</a>. You’re welcome to 𝗿𝗲𝗽𝗼𝘀𝘁 if your followers will find this of value.</p><p>The stories we’re covering today.</p><p>Marcel Brown: December 14th, 1902. The cable ship Silvertown begins laying the first Transpacific telegraph cable from San Francisco, destined for Honolulu, Hawaii. On January 1st, 1903, the connection between Hawaii and San Francisco was established.</p><p>Edwin Kwan: A research study based on data from January 2021 to April 2023 shows a rise in insider threats, with 55% relying on privilege escalation exploits and the remaining 45% introducing risk by downloading or misusing offensive tools.</p><p>Katy Craig:  In June 2023, cybersecurity incidents shook the digital landscape  as threat actors exploited a vulnerability in Adobe ColdFusion. The attackers executed a calculated malware deployment strategy. They exploited the Adobe ColdFusion vulnerability to introduce malware, including a remote access Trojan using HTTP POST commands.</p><p>Ian Garrett: AI has emerged at the forefront of cybersecurity megatrends for 2024.  An overwhelming 93% of respondents anticipate Generative AI,  like ChatGPT, impacting their business strategies within the next 5 years, with 89% already incorporating AI into their R&amp;D efforts.</p>]]></description><content:encoded><![CDATA[<p> Free, ungated access to all 290+ episodes of “It’s 5:05!” on your favorite podcast platforms: <a href="https://bit.ly/505-updates" rel="noopener noreferrer" target="_blank">https://bit.ly/505-updates</a>. You’re welcome to 𝗿𝗲𝗽𝗼𝘀𝘁 if your followers will find this of value.</p><p>The stories we’re covering today.</p><p>Marcel Brown: December 14th, 1902. The cable ship Silvertown begins laying the first Transpacific telegraph cable from San Francisco, destined for Honolulu, Hawaii. On January 1st, 1903, the connection between Hawaii and San Francisco was established.</p><p>Edwin Kwan: A research study based on data from January 2021 to April 2023 shows a rise in insider threats, with 55% relying on privilege escalation exploits and the remaining 45% introducing risk by downloading or misusing offensive tools.</p><p>Katy Craig:  In June 2023, cybersecurity incidents shook the digital landscape  as threat actors exploited a vulnerability in Adobe ColdFusion. The attackers executed a calculated malware deployment strategy. They exploited the Adobe ColdFusion vulnerability to introduce malware, including a remote access Trojan using HTTP POST commands.</p><p>Ian Garrett: AI has emerged at the forefront of cybersecurity megatrends for 2024.  An overwhelming 93% of respondents anticipate Generative AI,  like ChatGPT, impacting their business strategies within the next 5 years, with 89% already incorporating AI into their R&amp;D efforts.</p>]]></content:encoded><link><![CDATA[https://3zozb9fxlbueipjyapmaas.captivate.fm/episode/episode-294-edwin-kwan-over-50-insider-attacks-involve-privilege-elevation-exploits-katy-craig-malware-deployment-strategy-against-adobe-cold-fusion-ian-garrett-where-will-cyber-leaders-focus-on-ai-in-2024-marcel-brown-this-day-in-tech-history]]></link><guid isPermaLink="false">2f902132-9434-4b48-89e9-576990c3af3f</guid><itunes:image href="https://artwork.captivate.fm/49e3da1f-fa2b-4564-928f-3a2e232235a4/8dojPEapFsSPyLSGtpJUf8mX.jpg"/><dc:creator><![CDATA[Contributors from Around the World]]></dc:creator><pubDate>Thu, 14 Dec 2023 16:45:00 -0400</pubDate><enclosure url="https://dts.podtrac.com/redirect.mp3/podcasts.captivate.fm/media/c2a71b76-7961-47a7-b854-ab03e877ba26/505-2023-12-14-Episode-294-Final-converted.mp3" length="11198373" type="audio/mpeg"/><itunes:duration>09:20</itunes:duration><itunes:explicit>false</itunes:explicit><itunes:episodeType>full</itunes:episodeType><itunes:season>1</itunes:season><itunes:episode>294</itunes:episode><itunes:season>1</itunes:season><podcast:episode>294</podcast:episode><podcast:season>1</podcast:season><itunes:author>Contributors from Around the World</itunes:author></item><item><title>Episode #293: Edwin Kwan: Messenger and Facebook: Default End to End Encryption; Hillary Coover: Campaign Targets Taiwan Elections with Stolen Identities and Disinformation; Katy Craig: North Korea’s Lazarus Still Exploiting Log4j; Marcel Brown: This Day in Tech History</title><itunes:title>Episode #293: Edwin Kwan: Messenger and Facebook: Default End to End Encryption; Hillary Coover: Campaign Targets Taiwan Elections with Stolen Identities and Disinformation; Katy Craig: North Korea’s Lazarus Still Exploiting Log4j; Marcel Brown: This Day in Tech History</itunes:title><description><![CDATA[<p>Free, ungated access to all 290+ episodes of “It’s 5:05!” on your favorite podcast platforms: <a href="https://bit.ly/505-updates" rel="noopener noreferrer" target="_blank">https://bit.ly/505-updates</a>. You’re welcome to 𝗿𝗲𝗽𝗼𝘀𝘁 if your followers will find this of value.</p><p>The stories we’re covering today.</p><p>Marcel Brown: December 16, 2016. After a long delay, Apple finally releases their new wireless earbuds, the Apple AirPods. Within two years, they became Apple's most popular accessory, and today are some of the most popular and well recognized earbuds in the market. </p><p>Hillary Coover: A covert campaign dating back to May 2022 is distorting conversations about Taiwan's upcoming elections. The Graphika report exposes hundreds of fake social media accounts on Facebook, TikTok, and YouTube. While the perpetrators remain unidentified, the operation favored a pro-China political party in Taiwan, while criticizing its main rival.</p><p>Katy Craig: Two years after the infamous Log4j vulnerability came to light, North Korean hackers are still exploiting this flaw in widespread cyberattacks. These attacks fall under the wide-reaching activities of the Lazarus umbrella, a term for the various North Korean government hacking operations.</p><p>Edwin Kwan: Meta has announced the rollout of default end-to-end encryption for personal messages and calls on Messenger and Facebook. The rollout will take several months to complete globally, prompting users to set up recovery methods when their chats are upgraded. </p>]]></description><content:encoded><![CDATA[<p>Free, ungated access to all 290+ episodes of “It’s 5:05!” on your favorite podcast platforms: <a href="https://bit.ly/505-updates" rel="noopener noreferrer" target="_blank">https://bit.ly/505-updates</a>. You’re welcome to 𝗿𝗲𝗽𝗼𝘀𝘁 if your followers will find this of value.</p><p>The stories we’re covering today.</p><p>Marcel Brown: December 16, 2016. After a long delay, Apple finally releases their new wireless earbuds, the Apple AirPods. Within two years, they became Apple's most popular accessory, and today are some of the most popular and well recognized earbuds in the market. </p><p>Hillary Coover: A covert campaign dating back to May 2022 is distorting conversations about Taiwan's upcoming elections. The Graphika report exposes hundreds of fake social media accounts on Facebook, TikTok, and YouTube. While the perpetrators remain unidentified, the operation favored a pro-China political party in Taiwan, while criticizing its main rival.</p><p>Katy Craig: Two years after the infamous Log4j vulnerability came to light, North Korean hackers are still exploiting this flaw in widespread cyberattacks. These attacks fall under the wide-reaching activities of the Lazarus umbrella, a term for the various North Korean government hacking operations.</p><p>Edwin Kwan: Meta has announced the rollout of default end-to-end encryption for personal messages and calls on Messenger and Facebook. The rollout will take several months to complete globally, prompting users to set up recovery methods when their chats are upgraded. </p>]]></content:encoded><link><![CDATA[https://3zozb9fxlbueipjyapmaas.captivate.fm/episode/episode-293-edwin-kwan-messenger-and-facebook-default-end-to-end-encryption-hillary-coover-campaign-targets-taiwan-elections-with-stolen-identities-and-disinformation-katy-craig-north-koreas-lazarus-still-exploiting-log4j-marcel-brown-this-day-in-tech-...]]></link><guid isPermaLink="false">5882628e-c4c1-4a86-960a-1c9f1911be8b</guid><itunes:image href="https://artwork.captivate.fm/4e5fb283-eaaa-4352-ad39-b924a05714e1/COvEx4MmzqDP8AzqfuSF8A5o.jpg"/><dc:creator><![CDATA[Contributors from Around the World]]></dc:creator><pubDate>Wed, 13 Dec 2023 16:45:00 -0400</pubDate><enclosure url="https://dts.podtrac.com/redirect.mp3/podcasts.captivate.fm/media/0039ca52-2722-42dd-9a8d-6da6dd0c6bba/505-2023-12-13-Episode-293-Final-converted.mp3" length="10126832" type="audio/mpeg"/><itunes:duration>08:26</itunes:duration><itunes:explicit>false</itunes:explicit><itunes:episodeType>full</itunes:episodeType><itunes:season>1</itunes:season><itunes:episode>293</itunes:episode><itunes:season>1</itunes:season><podcast:episode>293</podcast:episode><podcast:season>1</podcast:season><itunes:author>Contributors from Around the World</itunes:author></item><item><title>Episode #292: Edwin Kwan: 5Ghoul Vulnerabilities Affecting Most 5G Smart Phones; Katy Craig: P2PInfect: Evolving to Target Routers and IoT Devices; Ian Garrett: That Job Candidate Might Be a Hacker; Mark Miller: This Day in Tech History</title><itunes:title>Episode #292: Edwin Kwan: 5Ghoul Vulnerabilities Affecting Most 5G Smart Phones; Katy Craig: P2PInfect: Evolving to Target Routers and IoT Devices; Ian Garrett: That Job Candidate Might Be a Hacker; Mark Miller: This Day in Tech History</itunes:title><description><![CDATA[<p>Free, ungated access to all 290+ episodes of “It’s 5:05!” on your favorite podcast platforms: <a href="https://bit.ly/505-updates" rel="noopener noreferrer" target="_blank">https://bit.ly/505-updates</a>. You’re welcome to 𝗿𝗲𝗽𝗼𝘀𝘁 if your followers will find this of value.</p><p>The stories we’re covering today.</p><p>Mark Miller: December 12th, 1980. Apple computer holds their initial public offering selling 4.6 million shares at $22 per share, and turning more than 40 Apple employees and investors into instant millionaires. </p><p>Edwin Kwan: A set of 14 security vulnerabilities named "5Ghoul" has been discovered in the firmware implementation of 5G mobile network modems from major chipset vendors like MediaTek and Qualcomm. The flaw impacts USB and IoT modems along with hundreds of smartphone models running Android and iOS.</p><p>Katy Craig: Cybersecurity researchers from Cato Security Labs have uncovered a new variant of P2PInfect compiled for the MIPS architecture used widely in routers and IoT devices. This latest version indicates the botnet's expanding capability is in reach. </p><p>Ian Garrett: Now hackers are applying to jobs? TA4557, a threat actor active since 2018, is evolving its strategy to directly target recruiters with malicious URLs. Once the recruiter responds, TA4557 replies with a URL linking to a website controlled by the threat actor, posing as the candidate's resume. </p>]]></description><content:encoded><![CDATA[<p>Free, ungated access to all 290+ episodes of “It’s 5:05!” on your favorite podcast platforms: <a href="https://bit.ly/505-updates" rel="noopener noreferrer" target="_blank">https://bit.ly/505-updates</a>. You’re welcome to 𝗿𝗲𝗽𝗼𝘀𝘁 if your followers will find this of value.</p><p>The stories we’re covering today.</p><p>Mark Miller: December 12th, 1980. Apple computer holds their initial public offering selling 4.6 million shares at $22 per share, and turning more than 40 Apple employees and investors into instant millionaires. </p><p>Edwin Kwan: A set of 14 security vulnerabilities named "5Ghoul" has been discovered in the firmware implementation of 5G mobile network modems from major chipset vendors like MediaTek and Qualcomm. The flaw impacts USB and IoT modems along with hundreds of smartphone models running Android and iOS.</p><p>Katy Craig: Cybersecurity researchers from Cato Security Labs have uncovered a new variant of P2PInfect compiled for the MIPS architecture used widely in routers and IoT devices. This latest version indicates the botnet's expanding capability is in reach. </p><p>Ian Garrett: Now hackers are applying to jobs? TA4557, a threat actor active since 2018, is evolving its strategy to directly target recruiters with malicious URLs. Once the recruiter responds, TA4557 replies with a URL linking to a website controlled by the threat actor, posing as the candidate's resume. </p>]]></content:encoded><link><![CDATA[https://3zozb9fxlbueipjyapmaas.captivate.fm/episode/episode-292-edwin-kwan-5ghoul-vulnerabilities-affecting-most-5g-smart-phones-katy-craig-p2pinfect-evolving-to-target-routers-and-iot-devices-ian-garrett-that-job-candidate-might-be-a-hacker-mark-miller-this-day-in-tech-history]]></link><guid isPermaLink="false">20ca51c8-6e26-4b04-9abb-a49fd7cb51a2</guid><itunes:image href="https://artwork.captivate.fm/07bc0f19-089c-4c34-aab0-c9af6b99943d/NyXi2l51_W2qfc3_skaXWHXr.jpg"/><dc:creator><![CDATA[Contributors from Around the World]]></dc:creator><pubDate>Tue, 12 Dec 2023 16:45:00 -0400</pubDate><enclosure url="https://dts.podtrac.com/redirect.mp3/podcasts.captivate.fm/media/847a4b16-a1fa-4a78-81f5-684724ec4e46/505-2023-12-12-Episode-292-Final-converted.mp3" length="10324315" type="audio/mpeg"/><itunes:duration>08:36</itunes:duration><itunes:explicit>false</itunes:explicit><itunes:episodeType>full</itunes:episodeType><itunes:season>1</itunes:season><itunes:episode>292</itunes:episode><itunes:season>1</itunes:season><podcast:episode>292</podcast:episode><podcast:season>1</podcast:season><itunes:author>Contributors from Around the World</itunes:author></item><item><title>Episode #291: Edwin Kwan: Critical Vulnerabilities Affect Multiple Atlassian Products; Hillary Coover: Russian Deepfake: Celebrities Used in Disinformation Against Ukraine; Mark Miller: Gemini: A fake it till you make it demo by Google; Marcel Brown: This Day in Tech History</title><itunes:title>Episode #291: Edwin Kwan: Critical Vulnerabilities Affect Multiple Atlassian Products; Hillary Coover: Russian Deepfake: Celebrities Used in Disinformation Against Ukraine; Mark Miller: Gemini: A fake it till you make it demo by Google; Marcel Brown: This Day in Tech History</itunes:title><description><![CDATA[<p>Free, ungated access to all 290+ episodes of “It’s 5:05!” on your favorite podcast platforms: <a href="https://bit.ly/505-updates" rel="noopener noreferrer" target="_blank">https://bit.ly/505-updates</a>. You’re welcome to 𝗿𝗲𝗽𝗼𝘀𝘁 if your followers will find this of value.</p><p>The stories we’re covering today.</p><p>Marcel Brown: December 11th, 2008. Google releases the first stable, public version of their new web browser, Chrome. By 2013, Chrome had bypassed Microsoft's Internet Explorer and Mozilla Firefox to become the most popular web browser in the world, and is still considered so today.</p><p>Edwin Kwan: Atlassian has issued an email warning customers of four critical vulnerabilities, each rated 9.0 or higher. Confluence, Jira, and Bitbucket servers, as well as companion apps for macOS are affected. </p><p>Hillary Coover: Every piece of content you put online is at risk of being manipulated. Microsoft's recent cybersecurity research revealed that Russian propagandists employed a deceptive strategy to manipulate at least seven Western celebrities, including Elijah Wood and Priscilla Presley.</p><p>Mark Miller: Well, that was a real train wreck, wasn't it? It looks as if Gemini's launch video jumped the shark. Let's take a step back as VP of research Oreo Venules responds by getting called out for faking the video. </p>]]></description><content:encoded><![CDATA[<p>Free, ungated access to all 290+ episodes of “It’s 5:05!” on your favorite podcast platforms: <a href="https://bit.ly/505-updates" rel="noopener noreferrer" target="_blank">https://bit.ly/505-updates</a>. You’re welcome to 𝗿𝗲𝗽𝗼𝘀𝘁 if your followers will find this of value.</p><p>The stories we’re covering today.</p><p>Marcel Brown: December 11th, 2008. Google releases the first stable, public version of their new web browser, Chrome. By 2013, Chrome had bypassed Microsoft's Internet Explorer and Mozilla Firefox to become the most popular web browser in the world, and is still considered so today.</p><p>Edwin Kwan: Atlassian has issued an email warning customers of four critical vulnerabilities, each rated 9.0 or higher. Confluence, Jira, and Bitbucket servers, as well as companion apps for macOS are affected. </p><p>Hillary Coover: Every piece of content you put online is at risk of being manipulated. Microsoft's recent cybersecurity research revealed that Russian propagandists employed a deceptive strategy to manipulate at least seven Western celebrities, including Elijah Wood and Priscilla Presley.</p><p>Mark Miller: Well, that was a real train wreck, wasn't it? It looks as if Gemini's launch video jumped the shark. Let's take a step back as VP of research Oreo Venules responds by getting called out for faking the video. </p>]]></content:encoded><link><![CDATA[https://3zozb9fxlbueipjyapmaas.captivate.fm/episode/episode-291-edwin-kwan-critical-vulnerabilities-affect-multiple-atlassian-products-hillary-coover-russian-deepfake-celebrities-used-in-disinformation-against-ukraine-mark-miller-gemini-a-fake-it-till-you-make-it-demo-by-google-marcel-brown-this-day-in-...]]></link><guid isPermaLink="false">cb8d2736-6c12-4c1d-a571-679e9b4e4423</guid><itunes:image href="https://artwork.captivate.fm/62cccc9a-36fe-4f9b-8cb8-d5996bee7a04/pg9-hQXLbyxr-Vhuri9uCAqS.jpg"/><dc:creator><![CDATA[Contributors from Around the World]]></dc:creator><pubDate>Mon, 11 Dec 2023 16:45:00 -0400</pubDate><enclosure url="https://dts.podtrac.com/redirect.mp3/podcasts.captivate.fm/media/ae476b77-6e6e-49d8-93c1-0065db0f27c5/505-2023-12-11-Episode-291-Final-converted.mp3" length="9728722" type="audio/mpeg"/><itunes:duration>08:06</itunes:duration><itunes:explicit>false</itunes:explicit><itunes:episodeType>full</itunes:episodeType><itunes:season>1</itunes:season><itunes:episode>291</itunes:episode><itunes:season>1</itunes:season><podcast:episode>291</podcast:episode><podcast:season>1</podcast:season><itunes:author>Contributors from Around the World</itunes:author></item><item><title>Special Report: Point of View Friday - Four Opinions on the OWASP BOM Maturity Model, with Trac Bannon, Katy Craig, Shannon Lietz, and Olimpiu Pop</title><itunes:title>Special Report: Point of View Friday - Four Opinions on the OWASP BOM Maturity Model, with Trac Bannon, Katy Craig, Shannon Lietz, and Olimpiu Pop</itunes:title><description><![CDATA[<p>From @Sourced Network Productions, @It's 5:05!, the Podcast , with a special report on the release of the OWASP BOM Maturity Model. It’s Point of View Friday, featuring Trac Bannon, Katy Craig, Shannon Leitz, and Olimpiu Pop, with their perspectives on the release of the BOM Maturity Model by the OWASP Foundation. We’ll start with Trac Bannon.</p><p>🎙️ Free access to 280+ episodes of “It’s 5:05!” on your favorite #podcast platforms: bit.ly/505-updates</p>]]></description><content:encoded><![CDATA[<p>From @Sourced Network Productions, @It's 5:05!, the Podcast , with a special report on the release of the OWASP BOM Maturity Model. It’s Point of View Friday, featuring Trac Bannon, Katy Craig, Shannon Leitz, and Olimpiu Pop, with their perspectives on the release of the BOM Maturity Model by the OWASP Foundation. We’ll start with Trac Bannon.</p><p>🎙️ Free access to 280+ episodes of “It’s 5:05!” on your favorite #podcast platforms: bit.ly/505-updates</p>]]></content:encoded><link><![CDATA[https://3zozb9fxlbueipjyapmaas.captivate.fm/episode/special-report-point-of-view-friday-four-opinions-on-the-owasp-bom-maturity-model-with-trac-bannon-katy-craig-shannon-lietz-and-olimpiu-pop]]></link><guid isPermaLink="false">f709d90a-4a5c-4670-8723-ea2ca4300c3b</guid><itunes:image href="https://artwork.captivate.fm/9b403632-f20d-4df6-a4f6-2b7dae089c46/x8m-_pvMZBnB7YFV796gQ7uJ.jpg"/><dc:creator><![CDATA[Contributors from Around the World]]></dc:creator><pubDate>Sun, 10 Dec 2023 16:45:00 -0400</pubDate><enclosure url="https://dts.podtrac.com/redirect.mp3/podcasts.captivate.fm/media/a788f16d-395f-4f38-9ce0-74438a12347f/2023-12-08-POV-OWASP-BOM-Maturity-Model-converted.mp3" length="8634909" type="audio/mpeg"/><itunes:duration>10:17</itunes:duration><itunes:explicit>false</itunes:explicit><itunes:episodeType>full</itunes:episodeType><itunes:author>Contributors from Around the World</itunes:author></item><item><title>Episode #290: Edwin Kwan: Bluetooth Authentication Bypass Vulnerability in Apple and Linux; Marcel Brown: This Day in Tech History; Trac Bannon: OWASP BOM Maturity Model: Is It Valuable?; Katy Craig: OWASP BOM Maturity Model: A Benefit for Consumers; Olimpiu Pop: OWASP BOM Maturity Model: Is it too soon?; Shannon Lietz: OWASP BOM Maturity Model: Win, Lose, or Draw?</title><itunes:title>Episode #290: Edwin Kwan: Bluetooth Authentication Bypass Vulnerability in Apple and Linux; Marcel Brown: This Day in Tech History; Trac Bannon: OWASP BOM Maturity Model: Is It Valuable?; Katy Craig: OWASP BOM Maturity Model: A Benefit for Consumers; Olimpiu Pop: OWASP BOM Maturity Model: Is it too soon?; Shannon Lietz: OWASP BOM Maturity Model: Win, Lose, or Draw?</itunes:title><description><![CDATA[<p>Free, ungated access to all 290+ episodes of “It’s 5:05!” on your favorite podcast platforms: <a href="https://bit.ly/505-updates" rel="noopener noreferrer" target="_blank">https://bit.ly/505-updates</a>. You’re welcome to 𝗿𝗲𝗽𝗼𝘀𝘁 if your followers will find this of value.</p><p>The stories we’re covering today.</p><p>Marcel Brown: December 8th, 1975. Paul Terrell opens the Byte Shop in Mountain View, California, one of the first retail computer stores in the world. Paul Terrell and the Byte Shop are most famously known for ordering the first 50 computers from Steve Jobs and Steve Wozniak's fledgling Apple Computer Company in 1976.</p><p>Edwin Kwan: A Bluetooth authentication bypass vulnerability  has been discovered to be impacting Apple, Android, and some Linux devices. The bug allows attackers to connect to devices and inject keystrokes to execute arbitrary commands.</p><p>Trac Bannon: OWASP has just introduced the Software Bill of Materials Maturity Model. In general, I'm not a fan of maturity models. They're often inflexible, arbitrary, and don't consider context.  That said, there is merit in providing guidance given the slow rate of adoption and even the lack of understanding by the software industry.</p><p>Katy Craig: Today we're diving into a game-changer for consumer software transparency: the launch of the BOM Maturity Model by the OWASP Foundation. Simply put, this model is a big win for consumers who want to know more about the software that we use daily. </p><p>Olimpiu Pop: Software Bills of Materials, SBOMs, are those labels that we need to stick on our delivered software packages. How should it happen? For now, at least in the Java ecosystem, there is no way of delivering the label together with the package. </p><p>Shannon Lietz: We're all talking about Bill of Materials these days.  It's an important concept for all of us, for a lot of reasons, in particular software buyers. Anyone who's out there who's buying something from a supplier should be interested in what is in that actual product.</p>]]></description><content:encoded><![CDATA[<p>Free, ungated access to all 290+ episodes of “It’s 5:05!” on your favorite podcast platforms: <a href="https://bit.ly/505-updates" rel="noopener noreferrer" target="_blank">https://bit.ly/505-updates</a>. You’re welcome to 𝗿𝗲𝗽𝗼𝘀𝘁 if your followers will find this of value.</p><p>The stories we’re covering today.</p><p>Marcel Brown: December 8th, 1975. Paul Terrell opens the Byte Shop in Mountain View, California, one of the first retail computer stores in the world. Paul Terrell and the Byte Shop are most famously known for ordering the first 50 computers from Steve Jobs and Steve Wozniak's fledgling Apple Computer Company in 1976.</p><p>Edwin Kwan: A Bluetooth authentication bypass vulnerability  has been discovered to be impacting Apple, Android, and some Linux devices. The bug allows attackers to connect to devices and inject keystrokes to execute arbitrary commands.</p><p>Trac Bannon: OWASP has just introduced the Software Bill of Materials Maturity Model. In general, I'm not a fan of maturity models. They're often inflexible, arbitrary, and don't consider context.  That said, there is merit in providing guidance given the slow rate of adoption and even the lack of understanding by the software industry.</p><p>Katy Craig: Today we're diving into a game-changer for consumer software transparency: the launch of the BOM Maturity Model by the OWASP Foundation. Simply put, this model is a big win for consumers who want to know more about the software that we use daily. </p><p>Olimpiu Pop: Software Bills of Materials, SBOMs, are those labels that we need to stick on our delivered software packages. How should it happen? For now, at least in the Java ecosystem, there is no way of delivering the label together with the package. </p><p>Shannon Lietz: We're all talking about Bill of Materials these days.  It's an important concept for all of us, for a lot of reasons, in particular software buyers. Anyone who's out there who's buying something from a supplier should be interested in what is in that actual product.</p>]]></content:encoded><link><![CDATA[https://3zozb9fxlbueipjyapmaas.captivate.fm/episode/episode-290-edwin-kwan-bluetooth-authentication-bypass-vulnerability-in-apple-and-linux-marcel-brown-this-day-in-tech-history-trac-bannon-owasp-sbom-maturity-model-is-it-valuable-katy-craig-owasp-bill-of-materials-maturity-model-olimpiu-pop-shannon-lie...]]></link><guid isPermaLink="false">88eb320c-4224-4f38-89f0-7841bba0893a</guid><itunes:image href="https://artwork.captivate.fm/f8484348-212e-4afa-aaff-7d47acaf5a47/Jk-IO3SP2d4Thz3sO2nTnJB5.jpg"/><dc:creator><![CDATA[Contributors from Around the World]]></dc:creator><pubDate>Fri, 08 Dec 2023 16:45:00 -0400</pubDate><enclosure url="https://dts.podtrac.com/redirect.mp3/podcasts.captivate.fm/media/547fbc94-b7e1-4ec6-aca2-c9a47966a149/505-2023-12-08-Episode-290-Final-converted.mp3" length="21495841" type="audio/mpeg"/><itunes:duration>17:55</itunes:duration><itunes:explicit>false</itunes:explicit><itunes:episodeType>full</itunes:episodeType><itunes:season>1</itunes:season><itunes:episode>290</itunes:episode><itunes:season>1</itunes:season><podcast:episode>290</podcast:episode><podcast:season>1</podcast:season><itunes:author>Contributors from Around the World</itunes:author></item><item><title>Episode #289: Edwin Kwan: Malicious Wordpress Plugin Issues Fake Security Advisories; Katy Craig: Feds surveilling us via push notifications; Mark Miller: Special Report: ChatGPT Isn’t the Only AI Game in Town; Marcel Brown: This Day in Tech History</title><itunes:title>Episode #289: Edwin Kwan: Malicious Wordpress Plugin Issues Fake Security Advisories; Katy Craig: Feds surveilling us via push notifications; Mark Miller: Special Report: ChatGPT Isn’t the Only AI Game in Town; Marcel Brown: This Day in Tech History</itunes:title><description><![CDATA[<p>Free, ungated access to all 285+ episodes of “It’s 5:05!” on your favorite podcast platforms: <a href="https://bit.ly/505-updates" rel="noopener noreferrer" target="_blank">https://bit.ly/505-updates</a>. You’re welcome to 𝗿𝗲𝗽𝗼𝘀𝘁 if your followers will find this of value.</p><p>The stories we’re covering today.</p><p>Marcel Brown: December 7, 1999. The Recording Industry Association of America sues the peer to peer file sharing service Napster, alleging copyright infringement for allowing users to download copyrighted music for free. The recording industry in general was caught with its pants down when it came to digital music and the internet.</p><p>Edwin Kwan: WordPress administrators are being targeted by a fake security advisory email campaign to install a malicious plugin on their websites. According to security researchers, the attackers sent deceptive emails to website administrators pretending to be from WordPress.</p><p>Katy Craig: A recent revelation has come to light about governments using smartphone apps' push notifications to surveil users. US Senator Ron Wyden warned that unidentified governments are demanding push notification data from Google and Apple. This news raises significant privacy concerns, highlighting the often overlooked implications of push notifications.</p><p>Mark Miller: With the headline grabbing news of Sam Altman and the mess at OpenAI a couple of weeks ago, what's gotten lost in the media is that OpenAI's ChatGPT isn't the only game in town.  There are dozens of other AI chat engines that can provide you with something more specific to your needs than a general AI model that tries to be the best of everything. </p>]]></description><content:encoded><![CDATA[<p>Free, ungated access to all 285+ episodes of “It’s 5:05!” on your favorite podcast platforms: <a href="https://bit.ly/505-updates" rel="noopener noreferrer" target="_blank">https://bit.ly/505-updates</a>. You’re welcome to 𝗿𝗲𝗽𝗼𝘀𝘁 if your followers will find this of value.</p><p>The stories we’re covering today.</p><p>Marcel Brown: December 7, 1999. The Recording Industry Association of America sues the peer to peer file sharing service Napster, alleging copyright infringement for allowing users to download copyrighted music for free. The recording industry in general was caught with its pants down when it came to digital music and the internet.</p><p>Edwin Kwan: WordPress administrators are being targeted by a fake security advisory email campaign to install a malicious plugin on their websites. According to security researchers, the attackers sent deceptive emails to website administrators pretending to be from WordPress.</p><p>Katy Craig: A recent revelation has come to light about governments using smartphone apps' push notifications to surveil users. US Senator Ron Wyden warned that unidentified governments are demanding push notification data from Google and Apple. This news raises significant privacy concerns, highlighting the often overlooked implications of push notifications.</p><p>Mark Miller: With the headline grabbing news of Sam Altman and the mess at OpenAI a couple of weeks ago, what's gotten lost in the media is that OpenAI's ChatGPT isn't the only game in town.  There are dozens of other AI chat engines that can provide you with something more specific to your needs than a general AI model that tries to be the best of everything. </p>]]></content:encoded><link><![CDATA[https://3zozb9fxlbueipjyapmaas.captivate.fm/episode/episode-289-edwin-kwan-malicious-wordpress-plugin-issues-fake-security-advisories-katy-craig-feds-surveilling-us-via-push-notifications-mark-miller-special-report-chatgpt-isnt-the-only-ai-game-in-town-marcel-brown-this-day-in-tech-history]]></link><guid isPermaLink="false">c3ac4bb2-f4f0-4971-a4f3-96feadbc2392</guid><itunes:image href="https://artwork.captivate.fm/e115cdf3-62ed-4d79-8aa1-7adb4c4951ec/jpcuechm3MgiRF0z1SYLud6O.jpg"/><dc:creator><![CDATA[Contributors from Around the World]]></dc:creator><pubDate>Thu, 07 Dec 2023 16:45:00 -0400</pubDate><enclosure url="https://dts.podtrac.com/redirect.mp3/podcasts.captivate.fm/media/34f97295-6a3d-4b9e-ac23-1c0a970e11f2/505-2023-12-07-Episode-289-Final-converted.mp3" length="16697672" type="audio/mpeg"/><itunes:duration>13:55</itunes:duration><itunes:explicit>false</itunes:explicit><itunes:episodeType>full</itunes:episodeType><itunes:season>1</itunes:season><itunes:episode>289</itunes:episode><itunes:season>1</itunes:season><podcast:episode>289</podcast:episode><podcast:season>1</podcast:season><itunes:author>Contributors from Around the World</itunes:author></item><item><title>Episode #288: Edwin Kwan: WhatsApp Updates Password Security; Katy Craig: AI Alliance to Compete with Closed Source LLMs; Hillary Coover: 23andMe: Guard Your DNA Data, Protect Your Family; Marcel Brown: This Day in Tech History</title><itunes:title>Episode #288: Edwin Kwan: WhatsApp Updates Password Security; Katy Craig: AI Alliance to Compete with Closed Source LLMs; Hillary Coover: 23andMe: Guard Your DNA Data, Protect Your Family; Marcel Brown: This Day in Tech History</itunes:title><description><![CDATA[<p>Free, ungated access to all 285+ episodes of “It’s 5:05!” on your favorite podcast platforms: <a href="https://bit.ly/505-updates" rel="noopener noreferrer" target="_blank">https://bit.ly/505-updates</a>. You’re welcome to 𝗿𝗲𝗽𝗼𝘀𝘁 if your followers will find this of value.</p><p>The stories we’re covering today.</p><p>Marcel Brown: December 6, 1994. Apple sues the San Francisco Canyon Company, alleging they helped Intel and Microsoft steal code developed under contract for QuickTime for Windows. Apple was threatening Microsoft with a multi-billion dollar lawsuit that was famously settled by Steve Jobs and Bill Gates in 1997. This settlement is now believed to have helped Apple survive long enough to transform themselves in the 2000s, ushering in the mobile device revolution and the new world of technology.</p><p>Edwin Kwan: WhatsApp has introduced a new secret code feature, allowing users to add an extra layer of security  to their locked chats by setting a custom password. The process of locking chats has been streamlined, utilizing a long-press action for simplicity. WhatsApp aims to enhance privacy and protect sensitive conversations, making it harder for unauthorized access.</p><p>Hillary Coover:  In a world where password updates are about as popular as Monday mornings, the recent 23andMe security breach is here to remind us that a little humor won't save our data, but strong password hygiene will. Password 123 is just not going to cut it anymore. </p><p>Katy Craig: Big news in AI: IBM and Meta, with over 50 others, including AMD, Intel, and Harvard, have launched the AI Alliance. It's a global coalition challenging the closed AI systems of leaders like OpenAI and Google. The Alliance promotes open innovation and open science in AI, offering an alternative to private AI models.</p>]]></description><content:encoded><![CDATA[<p>Free, ungated access to all 285+ episodes of “It’s 5:05!” on your favorite podcast platforms: <a href="https://bit.ly/505-updates" rel="noopener noreferrer" target="_blank">https://bit.ly/505-updates</a>. You’re welcome to 𝗿𝗲𝗽𝗼𝘀𝘁 if your followers will find this of value.</p><p>The stories we’re covering today.</p><p>Marcel Brown: December 6, 1994. Apple sues the San Francisco Canyon Company, alleging they helped Intel and Microsoft steal code developed under contract for QuickTime for Windows. Apple was threatening Microsoft with a multi-billion dollar lawsuit that was famously settled by Steve Jobs and Bill Gates in 1997. This settlement is now believed to have helped Apple survive long enough to transform themselves in the 2000s, ushering in the mobile device revolution and the new world of technology.</p><p>Edwin Kwan: WhatsApp has introduced a new secret code feature, allowing users to add an extra layer of security  to their locked chats by setting a custom password. The process of locking chats has been streamlined, utilizing a long-press action for simplicity. WhatsApp aims to enhance privacy and protect sensitive conversations, making it harder for unauthorized access.</p><p>Hillary Coover:  In a world where password updates are about as popular as Monday mornings, the recent 23andMe security breach is here to remind us that a little humor won't save our data, but strong password hygiene will. Password 123 is just not going to cut it anymore. </p><p>Katy Craig: Big news in AI: IBM and Meta, with over 50 others, including AMD, Intel, and Harvard, have launched the AI Alliance. It's a global coalition challenging the closed AI systems of leaders like OpenAI and Google. The Alliance promotes open innovation and open science in AI, offering an alternative to private AI models.</p>]]></content:encoded><link><![CDATA[https://3zozb9fxlbueipjyapmaas.captivate.fm/episode/episode-288-edwin-kwan-whatapp-updates-password-security-katy-craig-ai-alliance-to-compete-with-closed-source-llms-hillary-coover-23andme-guard-your-dna-data-protect-your-family-marcel-brown-this-day-in-tech-history]]></link><guid isPermaLink="false">21ea1787-f393-4951-bb1e-e239f3418215</guid><itunes:image href="https://artwork.captivate.fm/ac0ba83d-6403-44e5-8d3f-fe6f2ef61e45/vPIFV0OHrYWqlpDcHY_9V1cv.jpg"/><dc:creator><![CDATA[Contributors from Around the World]]></dc:creator><pubDate>Wed, 06 Dec 2023 16:45:00 -0400</pubDate><enclosure url="https://dts.podtrac.com/redirect.mp3/podcasts.captivate.fm/media/17194b3a-3dc5-4279-ad9e-dc2257501199/505-2023-12-06-Episode-288-Final-converted.mp3" length="12655486" type="audio/mpeg"/><itunes:duration>10:33</itunes:duration><itunes:explicit>false</itunes:explicit><itunes:episodeType>full</itunes:episodeType><itunes:season>1</itunes:season><itunes:episode>288</itunes:episode><itunes:season>1</itunes:season><podcast:episode>288</podcast:episode><podcast:season>1</podcast:season><itunes:author>Contributors from Around the World</itunes:author></item><item><title>Episode #287: Edwin Kwan: Mandatory Data Breach Notification Coming to Queensland; Ian Garrett: Deepfakes: A Growing Concern for 2024 Election Security; Katy Craig: A Prickly CACTUS: Ransomware to Encrypt and Exfiltrate Data; Mark Miller: This Day in Tech History</title><itunes:title>Episode #287: Edwin Kwan: Mandatory Data Breach Notification Coming to Queensland; Ian Garrett: Deepfakes: A Growing Concern for 2024 Election Security; Katy Craig: A Prickly CACTUS: Ransomware to Encrypt and Exfiltrate Data; Mark Miller: This Day in Tech History</itunes:title><description><![CDATA[<p>Free, ungated access to all 285+ episodes of “It’s 5:05!” on your favorite podcast platforms: <a href="https://bit.ly/505-updates" rel="noopener noreferrer" target="_blank">https://bit.ly/505-updates</a>. You’re welcome to 𝗿𝗲𝗽𝗼𝘀𝘁 if your followers will find this of value.</p><p>The stories we’re covering today.</p><p>Mark Miller: December 5th, 1965. The first PhD dissertation in computer science is presented. Richard L Wexelblat was the first candidate in a computer science program to complete a dissertation. Wexelblat's diploma presented by the University of Pennsylvania, the home of ENIAC, was the first one to carry the designation, "Computer Science". </p><p>Ian Garrett: Enhancements to AI platforms have been incredible for the content generation market, as it is easier than ever to create realistic content with a fraction of the time it would have before. But, for every good use of a tool, there always is a malicious use as well. </p><p>Edwin Kwan: In a significant move, Queensland's parliament has approved a mandatory data breach notification scheme.  The scheme is set to impact state agencies from mid 2025 and local governments from mid 2026.</p><p>Katy Craig: A new ransomware group named CACTUS recently surfaced, ranking in the top 10 for most monthly victims.  CACTUS represents a sophisticated and multi-faceted cybersecurity threat to large commercial organizations.</p>]]></description><content:encoded><![CDATA[<p>Free, ungated access to all 285+ episodes of “It’s 5:05!” on your favorite podcast platforms: <a href="https://bit.ly/505-updates" rel="noopener noreferrer" target="_blank">https://bit.ly/505-updates</a>. You’re welcome to 𝗿𝗲𝗽𝗼𝘀𝘁 if your followers will find this of value.</p><p>The stories we’re covering today.</p><p>Mark Miller: December 5th, 1965. The first PhD dissertation in computer science is presented. Richard L Wexelblat was the first candidate in a computer science program to complete a dissertation. Wexelblat's diploma presented by the University of Pennsylvania, the home of ENIAC, was the first one to carry the designation, "Computer Science". </p><p>Ian Garrett: Enhancements to AI platforms have been incredible for the content generation market, as it is easier than ever to create realistic content with a fraction of the time it would have before. But, for every good use of a tool, there always is a malicious use as well. </p><p>Edwin Kwan: In a significant move, Queensland's parliament has approved a mandatory data breach notification scheme.  The scheme is set to impact state agencies from mid 2025 and local governments from mid 2026.</p><p>Katy Craig: A new ransomware group named CACTUS recently surfaced, ranking in the top 10 for most monthly victims.  CACTUS represents a sophisticated and multi-faceted cybersecurity threat to large commercial organizations.</p>]]></content:encoded><link><![CDATA[https://3zozb9fxlbueipjyapmaas.captivate.fm/episode/episode-287-edwin-kwan-mandatory-data-breach-notification-coming-to-queensland-ian-garrett-deepfakes-a-growing-concern-for-2024-election-security-katy-craig-a-prickly-cactus-ransomware-to-encrypt-and-exfiltrate-data-mark-miller-this-day-in-tech-history]]></link><guid isPermaLink="false">0fc63717-3d00-48f7-aeec-7b9704418e23</guid><itunes:image href="https://artwork.captivate.fm/e06fb718-821e-4d61-a8e8-abca3f100c1d/j9v1vMcQzCgO4EA4XYsAxEb3.jpg"/><dc:creator><![CDATA[Contributors from Around the World]]></dc:creator><pubDate>Tue, 05 Dec 2023 16:45:00 -0400</pubDate><enclosure url="https://dts.podtrac.com/redirect.mp3/podcasts.captivate.fm/media/53dbf7f9-3a72-4c3b-a085-e83dd686571f/505-2023-12-5-Episode-287-Final-converted.mp3" length="11343614" type="audio/mpeg"/><itunes:duration>09:27</itunes:duration><itunes:explicit>false</itunes:explicit><itunes:episodeType>full</itunes:episodeType><itunes:season>1</itunes:season><itunes:episode>287</itunes:episode><itunes:season>1</itunes:season><podcast:episode>287</podcast:episode><podcast:season>1</podcast:season><itunes:author>Contributors from Around the World</itunes:author></item><item><title>Episode #286: Edwin Kwan: Discovered Zoom Vulnerability Allows Account Hijacking; Katy Craig: LogoFAIL: New UEFI Vulnerabilities Threaten Device Firmware Security; Hillary Coover: Secure Shopping Strategies: Navigating the Peak Season with Virtual Credit Cards; Marcel Brown: This Day in Tech History</title><itunes:title>Episode #286: Edwin Kwan: Discovered Zoom Vulnerability Allows Account Hijacking; Katy Craig: LogoFAIL: New UEFI Vulnerabilities Threaten Device Firmware Security; Hillary Coover: Secure Shopping Strategies: Navigating the Peak Season with Virtual Credit Cards; Marcel Brown: This Day in Tech History</itunes:title><description><![CDATA[<p>Free, ungated access to all 285+ episodes of “It’s 5:05!” on your favorite podcast platforms: <a href="https://bit.ly/505-updates" rel="noopener noreferrer" target="_blank">https://bit.ly/505-updates</a>. You’re welcome to 𝗿𝗲𝗽𝗼𝘀𝘁 if your followers will find this of value.</p><p>The stories we’re covering today.</p><p>Marcel Brown: December 3rd, 2001. Inventor Dean Kamen unveils the Segway self-balancing battery-powered vehicle on the TV show Good Morning America. The Segway uses computers and motors in its base to keep itself upright while the user is riding it.  While the original Segway was not considered a commercial success, it definitely became a familiar icon of personal transportation. </p><p>Edwin Kwan: Security researchers revealed a vulnerability in Zoom that allowed the unauthorized access of service accounts.  The vulnerability enabled hackers to claim a Zoom Room's service account, gaining invisible access to team chat, whiteboards, and other applications.</p><p>Hillary Coover: As we approach peak shopping season, it's crucial to consider measures to protect yourself from online fraud. One effective tool is the use of virtual credit cards.  Here are a few frequently asked questions to get you all set up.</p><p>Katy Craig: Security researchers have unveiled "LogoFAIL," a set of vulnerabilities in the Unified Extensible Firmware Interface (UEFI), used by various firmware vendors.  These flaws, found in firmware image-parsing libraries, pose a significant risk to a wide range of consumer and enterprise devices from major manufacturers.</p>]]></description><content:encoded><![CDATA[<p>Free, ungated access to all 285+ episodes of “It’s 5:05!” on your favorite podcast platforms: <a href="https://bit.ly/505-updates" rel="noopener noreferrer" target="_blank">https://bit.ly/505-updates</a>. You’re welcome to 𝗿𝗲𝗽𝗼𝘀𝘁 if your followers will find this of value.</p><p>The stories we’re covering today.</p><p>Marcel Brown: December 3rd, 2001. Inventor Dean Kamen unveils the Segway self-balancing battery-powered vehicle on the TV show Good Morning America. The Segway uses computers and motors in its base to keep itself upright while the user is riding it.  While the original Segway was not considered a commercial success, it definitely became a familiar icon of personal transportation. </p><p>Edwin Kwan: Security researchers revealed a vulnerability in Zoom that allowed the unauthorized access of service accounts.  The vulnerability enabled hackers to claim a Zoom Room's service account, gaining invisible access to team chat, whiteboards, and other applications.</p><p>Hillary Coover: As we approach peak shopping season, it's crucial to consider measures to protect yourself from online fraud. One effective tool is the use of virtual credit cards.  Here are a few frequently asked questions to get you all set up.</p><p>Katy Craig: Security researchers have unveiled "LogoFAIL," a set of vulnerabilities in the Unified Extensible Firmware Interface (UEFI), used by various firmware vendors.  These flaws, found in firmware image-parsing libraries, pose a significant risk to a wide range of consumer and enterprise devices from major manufacturers.</p>]]></content:encoded><link><![CDATA[https://3zozb9fxlbueipjyapmaas.captivate.fm/episode/episode-286-edwin-kwan-discovered-zoom-vulnerability-allows-account-hijacking-katy-craig-logofail-new-uefi-vulnerabilities-threaten-device-firmware-security-hillary-coover-secure-shopping-strategies-navigating-the-peak-season-with-virtual-credit-cards-...]]></link><guid isPermaLink="false">7b151a2f-7a00-483e-9110-5da39066e307</guid><itunes:image href="https://artwork.captivate.fm/fb265073-bb32-40f3-807b-d1b675c26310/buHukh5qbC7eY5kRdtjGF-Ug.jpg"/><dc:creator><![CDATA[Contributors from Around the World]]></dc:creator><pubDate>Mon, 04 Dec 2023 16:45:00 -0400</pubDate><enclosure url="https://dts.podtrac.com/redirect.mp3/podcasts.captivate.fm/media/5060b7a8-5780-470d-852a-89506f584510/505-2023-12-4-Episode-286-Final-converted.mp3" length="11431907" type="audio/mpeg"/><itunes:duration>09:32</itunes:duration><itunes:explicit>false</itunes:explicit><itunes:episodeType>full</itunes:episodeType><itunes:season>1</itunes:season><itunes:episode>286</itunes:episode><itunes:season>1</itunes:season><podcast:episode>286</podcast:episode><podcast:season>1</podcast:season><itunes:author>Contributors from Around the World</itunes:author></item><item><title>Episode #285: Edwin Kwan: Apple Releases Emergency Zero-Day Security Updates; Macrel Brown: This Day in Tech History; Katy Craig: AI Guidelines: US and EU Release Secure AI System Development Guidelines; Olimpiu Pop: AI Guidelines: Can governments protect us from AI?; Trac Bannon: AI Guidelines: Can CISA and her partners keep up the pace?</title><itunes:title>Episode #285: Edwin Kwan: Apple Releases Emergency Zero-Day Security Updates; Macrel Brown: This Day in Tech History; Katy Craig: AI Guidelines: US and EU Release Secure AI System Development Guidelines; Olimpiu Pop: AI Guidelines: Can governments protect us from AI?; Trac Bannon: AI Guidelines: Can CISA and her partners keep up the pace?</itunes:title><description><![CDATA[<p>Free, ungated access to all 285+ episodes of “It’s 5:05!” on your favorite podcast platforms: <a href="https://bit.ly/505-updates" rel="noopener noreferrer" target="_blank">https://bit.ly/505-updates</a>. You’re welcome to 𝗿𝗲𝗽𝗼𝘀𝘁 if your followers will find this of value.</p><p>The stories we’re covering today.</p><p>Marcel Brown: December 1st, 1996. America Online launches a new subscription plan offering their subscribers unlimited dial up internet access for $19.95 a month. Previously, AOL charged $9.95 a month for 5 hours of usage. The new plan brought in over 1 million new customers to AOL within weeks, and daily usage doubled among subscribers, to a whole 32 minutes per day.</p><p>Edwin Kwan: Apple has urgently released security updates to address two zero day vulnerabilities that were actively being exploited. These vulnerabilities impact iPhones, iPads, and Mac devices.</p><p>Katy Craig: CISA and the United Kingdom's National Cyber Security Centre jointly released guidelines for secure AI system development, developed in cooperation with 21 other agencies and ministries from across the world, including all members of the group of seven major industrial economies. </p><p>Trac Bannon: The CISA AI Roadmap is a comprehensive, whole of agency plan. They've aligned it with the U. S. National AI Strategy. The roadmap has lines of effort to promote the beneficial uses of AI, enhance cybersecurity capabilities, and improve protection of AI systems from cyber based threats. One specific example that I find particularly valuable is the emphasis on secure by design principles in AI adoption.</p><p>Olimpiu Pop: UK's Cyber Security Agency provided guidelines, and they invite you to act securely while developing your AI system.  They mostly refer to general software development practices. Practices that the industry is trying to impose without much success for years now.</p>]]></description><content:encoded><![CDATA[<p>Free, ungated access to all 285+ episodes of “It’s 5:05!” on your favorite podcast platforms: <a href="https://bit.ly/505-updates" rel="noopener noreferrer" target="_blank">https://bit.ly/505-updates</a>. You’re welcome to 𝗿𝗲𝗽𝗼𝘀𝘁 if your followers will find this of value.</p><p>The stories we’re covering today.</p><p>Marcel Brown: December 1st, 1996. America Online launches a new subscription plan offering their subscribers unlimited dial up internet access for $19.95 a month. Previously, AOL charged $9.95 a month for 5 hours of usage. The new plan brought in over 1 million new customers to AOL within weeks, and daily usage doubled among subscribers, to a whole 32 minutes per day.</p><p>Edwin Kwan: Apple has urgently released security updates to address two zero day vulnerabilities that were actively being exploited. These vulnerabilities impact iPhones, iPads, and Mac devices.</p><p>Katy Craig: CISA and the United Kingdom's National Cyber Security Centre jointly released guidelines for secure AI system development, developed in cooperation with 21 other agencies and ministries from across the world, including all members of the group of seven major industrial economies. </p><p>Trac Bannon: The CISA AI Roadmap is a comprehensive, whole of agency plan. They've aligned it with the U. S. National AI Strategy. The roadmap has lines of effort to promote the beneficial uses of AI, enhance cybersecurity capabilities, and improve protection of AI systems from cyber based threats. One specific example that I find particularly valuable is the emphasis on secure by design principles in AI adoption.</p><p>Olimpiu Pop: UK's Cyber Security Agency provided guidelines, and they invite you to act securely while developing your AI system.  They mostly refer to general software development practices. Practices that the industry is trying to impose without much success for years now.</p>]]></content:encoded><link><![CDATA[https://3zozb9fxlbueipjyapmaas.captivate.fm/episode/episode-285-edwin-kwan-apple-releases-emergency-zero-day-security-updates-macrel-brown-this-day-in-tech-history-katy-craig-ai-guidelines-us-and-eu-release-secure-ai-system-development-guidelines-olimpiu-pop-ai-guidelines-can-governments-protect-us-from...]]></link><guid isPermaLink="false">8a8a3e28-c338-465f-8443-626586ad2885</guid><itunes:image href="https://artwork.captivate.fm/753cd7f1-c188-496b-b2f4-4639e6e0d69c/4C1DWXaUuEsYf7qtsuSvB7CO.jpg"/><dc:creator><![CDATA[Contributors from Around the World]]></dc:creator><pubDate>Fri, 01 Dec 2023 16:45:00 -0400</pubDate><enclosure url="https://dts.podtrac.com/redirect.mp3/podcasts.captivate.fm/media/cf3cbb8e-4adf-47aa-a9ec-89b3d76aace1/505-2023-12-1-Episode-285-Final-converted.mp3" length="16530486" type="audio/mpeg"/><itunes:duration>17:13</itunes:duration><itunes:explicit>false</itunes:explicit><itunes:episodeType>full</itunes:episodeType><itunes:season>1</itunes:season><itunes:episode>285</itunes:episode><itunes:season>1</itunes:season><podcast:episode>285</podcast:episode><podcast:season>1</podcast:season><itunes:author>Contributors from Around the World</itunes:author></item><item><title>Episode #284: Edwin Kwan: Are We Sharing Too Much on LinkedIn?; Katy Craig: MITRE ATLAS: Mapping Security Vulnerabilities in AI; Ian Garrett: The Two Faces of Cybersecurity Investing; Marcel Brown: This Day in Tech History</title><itunes:title>Episode #284: Edwin Kwan: Are We Sharing Too Much on LinkedIn?; Katy Craig: MITRE ATLAS: Mapping Security Vulnerabilities in AI; Ian Garrett: The Two Faces of Cybersecurity Investing; Marcel Brown: This Day in Tech History</itunes:title><description><![CDATA[<p>Free, ungated access to all 280+ episodes of “It’s 5:05!” on your favorite podcast platforms: <a href="https://bit.ly/505-updates" rel="noopener noreferrer" target="_blank">https://bit.ly/505-updates</a>. You’re welcome to 𝗿𝗲𝗽𝗼𝘀𝘁 if your followers will find this of value.</p><p>The stories we’re covering today.</p><p>Marcel Brown: November 30th, 2009. Book retailer Barnes Noble releases their first Nook eReader to compete with the highly successful Amazon Kindle, released two years earlier. </p><p>Edwin Kwan: Are we sharing too much on LinkedIn? Daniel Barbosa from WeLiveSecurity recently published an article on the potential risks associated with the wealth of personal information shared on LinkedIn, which is the world's largest professional social network. </p><p>Katy Craig: MITRE, a government-funded research organization, is leading an ambitious project to map the security vulnerabilities in artificial intelligence (AI) systems. Recognizing the critical nature of AI security, international cyber defense agencies have called for enhanced security practices throughout the AI system lifecycle.</p><p>Ian Garrett: Is investing in cybersecurity hot or not? It turns out it depends who you're asking, because there's a huge divide between the private and public markets. </p>]]></description><content:encoded><![CDATA[<p>Free, ungated access to all 280+ episodes of “It’s 5:05!” on your favorite podcast platforms: <a href="https://bit.ly/505-updates" rel="noopener noreferrer" target="_blank">https://bit.ly/505-updates</a>. You’re welcome to 𝗿𝗲𝗽𝗼𝘀𝘁 if your followers will find this of value.</p><p>The stories we’re covering today.</p><p>Marcel Brown: November 30th, 2009. Book retailer Barnes Noble releases their first Nook eReader to compete with the highly successful Amazon Kindle, released two years earlier. </p><p>Edwin Kwan: Are we sharing too much on LinkedIn? Daniel Barbosa from WeLiveSecurity recently published an article on the potential risks associated with the wealth of personal information shared on LinkedIn, which is the world's largest professional social network. </p><p>Katy Craig: MITRE, a government-funded research organization, is leading an ambitious project to map the security vulnerabilities in artificial intelligence (AI) systems. Recognizing the critical nature of AI security, international cyber defense agencies have called for enhanced security practices throughout the AI system lifecycle.</p><p>Ian Garrett: Is investing in cybersecurity hot or not? It turns out it depends who you're asking, because there's a huge divide between the private and public markets. </p>]]></content:encoded><link><![CDATA[https://3zozb9fxlbueipjyapmaas.captivate.fm/episode/episode-284-edwin-kwan-are-we-sharing-too-much-on-linkedin-katy-craig-mitre-atlas-mapping-security-vulnerabilities-in-ai-ian-garrett-the-two-faces-of-cybersecurity-investing-marcel-brown-this-day-in-tech-history]]></link><guid isPermaLink="false">7d8129f3-ad5e-4a8e-acc5-61b0adf50a0e</guid><itunes:image href="https://artwork.captivate.fm/72f47c6e-631e-49aa-86ca-9dc1a7ace9fe/Ru_Xp5gIs5nhJAKQv3carX43.jpg"/><dc:creator><![CDATA[Contributors from Around the World]]></dc:creator><pubDate>Thu, 30 Nov 2023 16:45:00 -0400</pubDate><enclosure url="https://dts.podtrac.com/redirect.mp3/podcasts.captivate.fm/media/1fc5a7ad-94c7-41e5-b319-553bcc5c8819/505-2023-11-30-Episode-284-Final-converted.mp3" length="10793998" type="audio/mpeg"/><itunes:duration>09:00</itunes:duration><itunes:explicit>false</itunes:explicit><itunes:episodeType>full</itunes:episodeType><itunes:season>1</itunes:season><itunes:episode>284</itunes:episode><itunes:season>1</itunes:season><podcast:episode>284</podcast:episode><podcast:season>1</podcast:season><itunes:author>Contributors from Around the World</itunes:author></item><item><title>Episode #283: Edwin Kwan: Australian Banks Begin Blocking Transfers to Suspect Accounts; Katy Craig: Google’s Cybersecurity Forecast: The Growing Influence of AI; Hillary Coover: Hacker&apos;s Haven: Cocaine Infiltration Unveiled in Europe&apos;s Biggest Ports; Marcel Brown: This Day in Tech History</title><itunes:title>Episode #283: Edwin Kwan: Australian Banks Begin Blocking Transfers to Suspect Accounts; Katy Craig: Google’s Cybersecurity Forecast: The Growing Influence of AI; Hillary Coover: Hacker&apos;s Haven: Cocaine Infiltration Unveiled in Europe&apos;s Biggest Ports; Marcel Brown: This Day in Tech History</itunes:title><description><![CDATA[<p>Free, ungated access to all 280+ episodes of “It’s 5:05!” on your favorite podcast platforms: <a href="https://bit.ly/505-updates" rel="noopener noreferrer" target="_blank">https://bit.ly/505-updates</a>. You’re welcome to 𝗿𝗲𝗽𝗼𝘀𝘁 if your followers will find this of value.</p><p>The stories we’re covering today.</p><p>Marcel Brown:  November 29th, 1972. Atari introduces their first product, Pong, which would become the world's first commercially successful video game.  Nolan Bushnell installed the game at Andy Capp's Tavern in Sunnyvale, California on this day. There were 10,000 machines installed within four months. </p><p>Edwin Kwan: In 2023, Australians  suffered over $400 million in losses due to scams. The actual figure is believed to be much higher considering under reporting. Australian banks have yielded to pressure from consumer groups and pledged to enhance efforts against scams by implementing technology to block transfers to suspicious accounts. </p><p>Hillary Coover: As more and more cocaine is sneaking into Europe, big ports like Rotterdam and Antwerp are facing cybercrime aiding smuggling operations.  In a shocking expose, the intricate web of criminal infiltration into Europe's major ports is revealed.</p><p>Katy Craig: Google's latest cybersecurity forecast presents a concise yet comprehensive look at the emerging cyber landscape for 2024.  This report from Google underlines the urgent need for advanced AI-integrated cybersecurity measures to combat these evolving threats and safeguard digital ecosystems in 2024 and beyond.</p>]]></description><content:encoded><![CDATA[<p>Free, ungated access to all 280+ episodes of “It’s 5:05!” on your favorite podcast platforms: <a href="https://bit.ly/505-updates" rel="noopener noreferrer" target="_blank">https://bit.ly/505-updates</a>. You’re welcome to 𝗿𝗲𝗽𝗼𝘀𝘁 if your followers will find this of value.</p><p>The stories we’re covering today.</p><p>Marcel Brown:  November 29th, 1972. Atari introduces their first product, Pong, which would become the world's first commercially successful video game.  Nolan Bushnell installed the game at Andy Capp's Tavern in Sunnyvale, California on this day. There were 10,000 machines installed within four months. </p><p>Edwin Kwan: In 2023, Australians  suffered over $400 million in losses due to scams. The actual figure is believed to be much higher considering under reporting. Australian banks have yielded to pressure from consumer groups and pledged to enhance efforts against scams by implementing technology to block transfers to suspicious accounts. </p><p>Hillary Coover: As more and more cocaine is sneaking into Europe, big ports like Rotterdam and Antwerp are facing cybercrime aiding smuggling operations.  In a shocking expose, the intricate web of criminal infiltration into Europe's major ports is revealed.</p><p>Katy Craig: Google's latest cybersecurity forecast presents a concise yet comprehensive look at the emerging cyber landscape for 2024.  This report from Google underlines the urgent need for advanced AI-integrated cybersecurity measures to combat these evolving threats and safeguard digital ecosystems in 2024 and beyond.</p>]]></content:encoded><link><![CDATA[https://3zozb9fxlbueipjyapmaas.captivate.fm/episode/episode-283-edwin-kwan-australian-banks-begin-blocking-transfers-to-suspect-accounts-katy-craig-googles-cybersecurity-forecast-the-growing-influence-of-ai-hillary-coover-hackers-haven-cocaine-infiltration-unveiled-in-europes-biggest-ports-marcel-brown-...]]></link><guid isPermaLink="false">21ae6d57-b81e-411f-b8ef-2b59cb7453cb</guid><itunes:image href="https://artwork.captivate.fm/d96044c7-1853-4c88-97e1-95d87c4c104d/7LWM3INH5jD9-BQqfTlxB95V.jpg"/><dc:creator><![CDATA[Contributors from Around the World]]></dc:creator><pubDate>Wed, 29 Nov 2023 16:45:00 -0400</pubDate><enclosure url="https://dts.podtrac.com/redirect.mp3/podcasts.captivate.fm/media/25be4242-33e8-4d0c-a98d-981793492c57/505-2023-11-29-Episode-283-Final-converted.mp3" length="16573852" type="audio/mpeg"/><itunes:duration>13:49</itunes:duration><itunes:explicit>false</itunes:explicit><itunes:episodeType>full</itunes:episodeType><itunes:season>1</itunes:season><itunes:episode>283</itunes:episode><itunes:season>1</itunes:season><podcast:episode>283</podcast:episode><podcast:season>1</podcast:season><itunes:author>Contributors from Around the World</itunes:author></item><item><title>Episode #282: Ian Garrett: Deprecation of Defender Application Guard for MS Office; Edwin Kwan: Open Source 3D Design Suite Targeted by DDoS; Katy Craig: US and UK: Joint Guidelines for AI System Security; Marcel Brown: This Day in Tech History</title><itunes:title>Episode #282: Ian Garrett: Deprecation of Defender Application Guard for MS Office; Edwin Kwan: Open Source 3D Design Suite Targeted by DDoS; Katy Craig: US and UK: Joint Guidelines for AI System Security; Marcel Brown: This Day in Tech History</itunes:title><description><![CDATA[<p>Free, ungated access to all 280+ episodes of “It’s 5:05!” on your favorite podcast platforms: <a href="https://bit.ly/505-updates" rel="noopener noreferrer" target="_blank">https://bit.ly/505-updates</a>. You’re welcome to 𝗿𝗲𝗽𝗼𝘀𝘁 if your followers will find this of value.</p><p>The stories we’re covering today.</p><p>Marcel Brown: November 28, 1948. Just in time for the Christmas shopping season, 57 units of the first commercial instant camera, the Polaroid Land Camera Model 95, go on sale at the Jordan Marsh Department Store in Boston. Polaroid believed that 57 units would be enough to last through Christmas.</p><p>Edwin Kwan: Open Source Blender Project is being targeted by Distributed Denial of Service attacks resulting in site outages. The attacks have severely disrupted operations, making it difficult to process legitimate connection requests. Despite continuous efforts by the administrators, attempts to block attackers' IP ranges were unsuccessful.</p><p>Katy Craig: In a landmark collaboration, the United States and the United Kingdom have jointly issued comprehensive guidelines to strengthen the security and integrity of artificial intelligence, or AI, systems. This crucial document is directed at AI system providers, including those using both in-house and external models and APIs. </p><p>Ian Garrett: Microsoft has announced the deprecation of Defender Application Guard for Office and the Windows Security Isolation APIs. These tools were integral in securing Microsoft 365 apps by creating a secure sandbox for files from untrusted sources. Microsoft's decision to deprecate Defender Application Guard for Office has significant implications for organizations and IT professionals. </p>]]></description><content:encoded><![CDATA[<p>Free, ungated access to all 280+ episodes of “It’s 5:05!” on your favorite podcast platforms: <a href="https://bit.ly/505-updates" rel="noopener noreferrer" target="_blank">https://bit.ly/505-updates</a>. You’re welcome to 𝗿𝗲𝗽𝗼𝘀𝘁 if your followers will find this of value.</p><p>The stories we’re covering today.</p><p>Marcel Brown: November 28, 1948. Just in time for the Christmas shopping season, 57 units of the first commercial instant camera, the Polaroid Land Camera Model 95, go on sale at the Jordan Marsh Department Store in Boston. Polaroid believed that 57 units would be enough to last through Christmas.</p><p>Edwin Kwan: Open Source Blender Project is being targeted by Distributed Denial of Service attacks resulting in site outages. The attacks have severely disrupted operations, making it difficult to process legitimate connection requests. Despite continuous efforts by the administrators, attempts to block attackers' IP ranges were unsuccessful.</p><p>Katy Craig: In a landmark collaboration, the United States and the United Kingdom have jointly issued comprehensive guidelines to strengthen the security and integrity of artificial intelligence, or AI, systems. This crucial document is directed at AI system providers, including those using both in-house and external models and APIs. </p><p>Ian Garrett: Microsoft has announced the deprecation of Defender Application Guard for Office and the Windows Security Isolation APIs. These tools were integral in securing Microsoft 365 apps by creating a secure sandbox for files from untrusted sources. Microsoft's decision to deprecate Defender Application Guard for Office has significant implications for organizations and IT professionals. </p>]]></content:encoded><link><![CDATA[https://3zozb9fxlbueipjyapmaas.captivate.fm/episode/episode-282-ian-garrett-deprecation-of-defender-application-guard-for-ms-office-edwin-kwan-open-source-3d-design-suite-targeted-by-ddos-katy-craig-us-and-uk-joint-guidelines-for-ai-system-security-marcel-brown-this-day-in-tech-history]]></link><guid isPermaLink="false">cdf28de5-6b5d-44b4-9a96-87f78eb11104</guid><itunes:image href="https://artwork.captivate.fm/07bbf864-456f-483c-ba2c-e4c1d508c254/Ucur9RKuLW7-UYNOrtfSb-xr.jpg"/><dc:creator><![CDATA[Contributors from Around the World]]></dc:creator><pubDate>Tue, 28 Nov 2023 16:45:00 -0400</pubDate><enclosure url="https://dts.podtrac.com/redirect.mp3/podcasts.captivate.fm/media/5caead4d-4176-4f4e-9141-42e88f4d6418/505-2023-11-28-Episode-282-Final-converted.mp3" length="12208266" type="audio/mpeg"/><itunes:duration>10:10</itunes:duration><itunes:explicit>false</itunes:explicit><itunes:episodeType>full</itunes:episodeType><itunes:season>1</itunes:season><itunes:episode>282</itunes:episode><itunes:season>1</itunes:season><podcast:episode>282</podcast:episode><podcast:season>1</podcast:season><itunes:author>Contributors from Around the World</itunes:author></item><item><title>Episode #281: Edwin Kwan: OwnCloud App Suffers Three Critical Vulnerabilities; Katy Craig: AI-Enabled Autonomous Vehicles and Lethal Weapons; Hillary Coover: Debunking the Incognito Shopping Myth; Marcel Brown: This Day in Tech History</title><itunes:title>Episode #281: Edwin Kwan: OwnCloud App Suffers Three Critical Vulnerabilities; Katy Craig: AI-Enabled Autonomous Vehicles and Lethal Weapons; Hillary Coover: Debunking the Incognito Shopping Myth; Marcel Brown: This Day in Tech History</itunes:title><description><![CDATA[<p>Free, ungated access to all 280+ episodes of “It’s 5:05!” on your favorite podcast platforms: <a href="https://bit.ly/505-updates" rel="noopener noreferrer" target="_blank">https://bit.ly/505-updates</a>. You’re welcome to 𝗿𝗲𝗽𝗼𝘀𝘁 if your followers will find this of value.</p><p>The stories we’re covering today.</p><p>Marcel Brown: November 27, 1995. Nearly six months to the day after Bill Gates sent his Internet Tidal Wave memo recognizing the importance of the Internet, and only three months after releasing version 1.0, Microsoft releases Internet Explorer 2.0 for Windows 95 and Windows NT 3.5.</p><p>Edwin Kwan: Three critical vulnerabilities have been reported to affect  OwnCloud, exposing users to potential data breaches. One of these flaws, with a maximum severity score, exposes administrator passwords and mail server credentials. </p><p>Hillary Coover: Despite the widespread belief that private browsing can secure better prices during online shopping, it turns out that Incognito mode doesn't deliver on this promise. All private browsing modes do is erase your search history from the device and prevent the browser from using cookies to track your activity across sites.</p><p>Katy Craig: The Pentagon is racing against time and technology in its ambitious Replicator initiative, aiming to deploy thousands of AI-enabled autonomous vehicles by 2026. This strategic push is to keep pace with China's rapid advancements in military technology.  </p>]]></description><content:encoded><![CDATA[<p>Free, ungated access to all 280+ episodes of “It’s 5:05!” on your favorite podcast platforms: <a href="https://bit.ly/505-updates" rel="noopener noreferrer" target="_blank">https://bit.ly/505-updates</a>. You’re welcome to 𝗿𝗲𝗽𝗼𝘀𝘁 if your followers will find this of value.</p><p>The stories we’re covering today.</p><p>Marcel Brown: November 27, 1995. Nearly six months to the day after Bill Gates sent his Internet Tidal Wave memo recognizing the importance of the Internet, and only three months after releasing version 1.0, Microsoft releases Internet Explorer 2.0 for Windows 95 and Windows NT 3.5.</p><p>Edwin Kwan: Three critical vulnerabilities have been reported to affect  OwnCloud, exposing users to potential data breaches. One of these flaws, with a maximum severity score, exposes administrator passwords and mail server credentials. </p><p>Hillary Coover: Despite the widespread belief that private browsing can secure better prices during online shopping, it turns out that Incognito mode doesn't deliver on this promise. All private browsing modes do is erase your search history from the device and prevent the browser from using cookies to track your activity across sites.</p><p>Katy Craig: The Pentagon is racing against time and technology in its ambitious Replicator initiative, aiming to deploy thousands of AI-enabled autonomous vehicles by 2026. This strategic push is to keep pace with China's rapid advancements in military technology.  </p>]]></content:encoded><link><![CDATA[https://3zozb9fxlbueipjyapmaas.captivate.fm/episode/episode-281-edwin-kwan-owncloud-app-suffers-three-critical-vulnerabilities-katy-craig-ai-enabled-autonomous-vehicles-and-lethal-weapons-hillary-coover-debunking-the-incognito-shopping-myth-marcel-brown-this-day-in-tech-history]]></link><guid isPermaLink="false">59d7778a-2ba9-4a55-b1e0-8defdc361bf6</guid><itunes:image href="https://artwork.captivate.fm/c9464fd7-157e-4dd0-a7f7-80220aebe659/S6DoZaJknh3eQctYYkxdoCUr.jpg"/><dc:creator><![CDATA[Contributors from Around the World]]></dc:creator><pubDate>Mon, 27 Nov 2023 16:45:00 -0400</pubDate><enclosure url="https://dts.podtrac.com/redirect.mp3/podcasts.captivate.fm/media/edcc6506-576a-4a30-975a-b833c5e751a5/505-2023-11-27-Episode-281-Final-converted.mp3" length="12245359" type="audio/mpeg"/><itunes:duration>10:12</itunes:duration><itunes:explicit>false</itunes:explicit><itunes:episodeType>full</itunes:episodeType><itunes:season>1</itunes:season><itunes:episode>281</itunes:episode><itunes:season>1</itunes:season><podcast:episode>281</podcast:episode><podcast:season>1</podcast:season><itunes:author>Contributors from Around the World</itunes:author></item><item><title>Special Report: POV Friday with Trac Bannon - OpenAI: Should Camelot Be Restored?</title><itunes:title>Special Report: POV Friday with Trac Bannon - OpenAI: Should Camelot Be Restored?</itunes:title><description><![CDATA[<p>Hello, this is Trac Bannon reporting from Camp Hill, Pennsylvania.</p><p>The news of San Altman sacking by the OpenAI Board of Directors shook the world on Friday, November 17th. As events unfolded in the following hours and days, the world suffered collective whiplash. While many are asking why the board made that decision, more profound questions are being raised about the balance between innovative leadership and effective governance.</p><p>The sacking of Altman, coupled with the ChatGPT outage on November 21st, underscores the delicate equilibrium required in leading cutting edge technology organizations. The impact of such high level upheaval on an organization’s workforce can’t be overstated.</p><p>Morale, trust, and psychological safety matter. In the case of Sam Altman, the mix of political events and operational stability are sending additional shockwaves.</p><p>Right or wrong, Sam Altman is viewed as a bold visionary pushing the boundaries of AI technology while maintaining a strong ethical compass. His departure from OpenAI could change the company’s direction and shows the difficulty of balancing visionary leadership and governance.</p><p>It is no secret that Microsoft is the largest corporate investor in OpenAI, sinking over $10 billion and the use of their Azure cloud computing environment.  As the OpenAI drama plays out, Satya Nadella has been the steady hand on the rudder. His simple words speak volumes. Surprises are bad.</p><p>Consider that industry leaders have consistently warned us of the potential risk of AI on humanity. Elon Musk, Bill Gates, Ginni Rometty, Mark Zuckerberg, and the late Stephen Hawking.</p><p>Nadella immediately stepped in to voice his support for the work of OpenAI, regardless of the configuration… a reference to Microsoft’s offer to hire Altman, Greg Brockman, and 743 of OpenAI’s 770 workers to keep the technology and innovation moving forward, yet contained.</p><p>Should OpenAI’s Camelot be restored? No, the evidence is clear. The world’s most powerful technology needs a combination of innovation and governance.</p><p>Sam Altman is currently in discussions to return to OpenAI. Satya has voiced continuing support for OpenAI. The world should collectively hope for a future where AI is both innovative and responsibly governed, benefiting humanity wisely and ethically.</p><p>Something to noodle on.</p><p>Full episode available: https://505updates.com/2023-11-24-cybersecurity-and-open-source-headlines/ 🎙️ Free, ungated access to all 280+ episodes of “It’s 5:05!” on your favorite podcast platforms: https://bit.ly/505-updates</p>]]></description><content:encoded><![CDATA[<p>Hello, this is Trac Bannon reporting from Camp Hill, Pennsylvania.</p><p>The news of San Altman sacking by the OpenAI Board of Directors shook the world on Friday, November 17th. As events unfolded in the following hours and days, the world suffered collective whiplash. While many are asking why the board made that decision, more profound questions are being raised about the balance between innovative leadership and effective governance.</p><p>The sacking of Altman, coupled with the ChatGPT outage on November 21st, underscores the delicate equilibrium required in leading cutting edge technology organizations. The impact of such high level upheaval on an organization’s workforce can’t be overstated.</p><p>Morale, trust, and psychological safety matter. In the case of Sam Altman, the mix of political events and operational stability are sending additional shockwaves.</p><p>Right or wrong, Sam Altman is viewed as a bold visionary pushing the boundaries of AI technology while maintaining a strong ethical compass. His departure from OpenAI could change the company’s direction and shows the difficulty of balancing visionary leadership and governance.</p><p>It is no secret that Microsoft is the largest corporate investor in OpenAI, sinking over $10 billion and the use of their Azure cloud computing environment.  As the OpenAI drama plays out, Satya Nadella has been the steady hand on the rudder. His simple words speak volumes. Surprises are bad.</p><p>Consider that industry leaders have consistently warned us of the potential risk of AI on humanity. Elon Musk, Bill Gates, Ginni Rometty, Mark Zuckerberg, and the late Stephen Hawking.</p><p>Nadella immediately stepped in to voice his support for the work of OpenAI, regardless of the configuration… a reference to Microsoft’s offer to hire Altman, Greg Brockman, and 743 of OpenAI’s 770 workers to keep the technology and innovation moving forward, yet contained.</p><p>Should OpenAI’s Camelot be restored? No, the evidence is clear. The world’s most powerful technology needs a combination of innovation and governance.</p><p>Sam Altman is currently in discussions to return to OpenAI. Satya has voiced continuing support for OpenAI. The world should collectively hope for a future where AI is both innovative and responsibly governed, benefiting humanity wisely and ethically.</p><p>Something to noodle on.</p><p>Full episode available: https://505updates.com/2023-11-24-cybersecurity-and-open-source-headlines/ 🎙️ Free, ungated access to all 280+ episodes of “It’s 5:05!” on your favorite podcast platforms: https://bit.ly/505-updates</p>]]></content:encoded><link><![CDATA[https://3zozb9fxlbueipjyapmaas.captivate.fm/episode/special-report-point-of-view-friday-with-trac-bannon-on-sam-altman]]></link><guid isPermaLink="false">9f34efff-14bf-4f65-b2a7-ad9fd4aeea92</guid><itunes:image href="https://artwork.captivate.fm/84876155-9be1-49ca-b833-ab844897a553/gFywjS3DiSuziIcU41wORhhg.jpg"/><dc:creator><![CDATA[Contributors from Around the World]]></dc:creator><pubDate>Fri, 24 Nov 2023 17:45:00 -0400</pubDate><enclosure url="https://dts.podtrac.com/redirect.mp3/podcasts.captivate.fm/media/ee268870-c89e-4a5c-a985-81172c471d58/2023-11-24-505-POV-Friday-Segment-Trac-Bannon-converted.mp3" length="2746577" type="audio/mpeg"/><itunes:duration>02:52</itunes:duration><itunes:explicit>false</itunes:explicit><itunes:episodeType>bonus</itunes:episodeType><itunes:author>Contributors from Around the World</itunes:author></item><item><title>Special Report: POV Friday with Olimpiu Pop - OpenAI: What will its future look like?</title><itunes:title>Special Report: POV Friday with Olimpiu Pop - OpenAI: What will its future look like?</itunes:title><description><![CDATA[<p>The recent turmoil at OpenAI, stemming from the ousting of CEO Sam Altman, has thrown the AI community into a state of intense discussion and speculation. We have a whole saga that looks more like a new season of HBO's Game of Thrones than a sane tech company that is crafting the future of humanity. The coup backfired and Altman seems to be returning in a more powerful position, just in time for the Thanksgiving turkey. </p><p>The saga has significant implications for the broader AI industry. ChatGPT's release and OpenAI's innovative strides have triggered a surge in AI investment, with heavyweights like Microsoft investing substantially.</p><p>What do these events actually underline? Altman's departure underscores the schism in AI development philosophy. </p><p>On one side are proponents of rapid development  and public deployment of AI, represented by Altman,   argue that such an approach is essential for stress testing and perfecting the technology. On the other side are advocates of a more cautious approach favoring extensive development and testing in control environments, to ensure AI safety for public use.  </p><p>Concerns over the uncontrollability of hyper intelligent AI software, have been a significant factor in this divide. This issue is particularly acute among tech workers following the effective altruism movement who prioritize benefits to humanity. </p><p>The question of how to balance commercial success with ethical and safe AI development has become increasingly pertinent. </p><p>Originally founded as a non profit to ensure ethical AI development, OpenAI's transformation into a for profit entity under Altman's tenure has been a contentious issue. This shift has raised concerns about profit motives potentially overshadowing the company's ethical charter, which aims to prevent harm to humanity or undue concentration of power.</p><p>More opinions and resources can be found on 505updates.com. </p><p>Olimpiu Pop, reported from Transylvania, Romania.</p><p>Full episode available: https://505updates.com/2023-11-24-cybersecurity-and-open-source-headlines/ 🎙️ Free, ungated access to all 280+ episodes of “It’s 5:05!” on your favorite podcast platforms: https://bit.ly/505-updates</p>]]></description><content:encoded><![CDATA[<p>The recent turmoil at OpenAI, stemming from the ousting of CEO Sam Altman, has thrown the AI community into a state of intense discussion and speculation. We have a whole saga that looks more like a new season of HBO's Game of Thrones than a sane tech company that is crafting the future of humanity. The coup backfired and Altman seems to be returning in a more powerful position, just in time for the Thanksgiving turkey. </p><p>The saga has significant implications for the broader AI industry. ChatGPT's release and OpenAI's innovative strides have triggered a surge in AI investment, with heavyweights like Microsoft investing substantially.</p><p>What do these events actually underline? Altman's departure underscores the schism in AI development philosophy. </p><p>On one side are proponents of rapid development  and public deployment of AI, represented by Altman,   argue that such an approach is essential for stress testing and perfecting the technology. On the other side are advocates of a more cautious approach favoring extensive development and testing in control environments, to ensure AI safety for public use.  </p><p>Concerns over the uncontrollability of hyper intelligent AI software, have been a significant factor in this divide. This issue is particularly acute among tech workers following the effective altruism movement who prioritize benefits to humanity. </p><p>The question of how to balance commercial success with ethical and safe AI development has become increasingly pertinent. </p><p>Originally founded as a non profit to ensure ethical AI development, OpenAI's transformation into a for profit entity under Altman's tenure has been a contentious issue. This shift has raised concerns about profit motives potentially overshadowing the company's ethical charter, which aims to prevent harm to humanity or undue concentration of power.</p><p>More opinions and resources can be found on 505updates.com. </p><p>Olimpiu Pop, reported from Transylvania, Romania.</p><p>Full episode available: https://505updates.com/2023-11-24-cybersecurity-and-open-source-headlines/ 🎙️ Free, ungated access to all 280+ episodes of “It’s 5:05!” on your favorite podcast platforms: https://bit.ly/505-updates</p>]]></content:encoded><link><![CDATA[https://3zozb9fxlbueipjyapmaas.captivate.fm/episode/special-report-pov-friday-with-olimpiu-pop-openai-what-will-its-future-look-like]]></link><guid isPermaLink="false">19159893-c9ba-4bf2-8689-aca298a4d2ea</guid><itunes:image href="https://artwork.captivate.fm/2942cd52-7216-48a5-893e-59c8d2bc1d09/vk_Zmfk8oFz0PZAuq11IYRGR.jpg"/><dc:creator><![CDATA[Contributors from Around the World]]></dc:creator><pubDate>Fri, 24 Nov 2023 17:30:00 -0400</pubDate><enclosure url="https://dts.podtrac.com/redirect.mp3/podcasts.captivate.fm/media/5ec5fb1c-de11-441e-aeb3-d6afec4c31d4/2023-11-24-505-POV-Friday-Segment-Olimpiu-Pop-converted.mp3" length="2774372" type="audio/mpeg"/><itunes:duration>02:19</itunes:duration><itunes:explicit>false</itunes:explicit><itunes:episodeType>bonus</itunes:episodeType><itunes:author>Contributors from Around the World</itunes:author></item><item><title>Special Report: POV Friday with Shannon Lietz - OpenAI and Microsoft: Win, Lose, or Draw?</title><itunes:title>Special Report: POV Friday with Shannon Lietz - OpenAI and Microsoft: Win, Lose, or Draw?</itunes:title><description><![CDATA[<p>Hi, this is Shannon Leitz  from San Diego, California. </p><p>With all the brouhaha going on with Sam Altman and OpenAI, there's a lot to unpack and digest. A few things for all of us. When OpenAI, not yet a year ago, released its ChatGPT to the world, a fabulous capability if you ask me,  it was pretty obvious at the time that they were chasing adoption and velocity as a brand new organization entering into the market.</p><p>I say that because most folks know that there's sort of a chase for go to market. When doing so, I don't know that anybody, maybe Sam Altman could have known, but I don't know that anybody would have predicted 100 million folks adopting ChatGPT as quickly as they did. </p><p>At the time, there was a clear understanding that resilience was sort of left behind, and the company knew about some of the errors associated with its technology and believed that it could fix it in time.</p><p>Along the way, we've also seen Microsoft throw in billions of dollars in investment and the world is actually at an awe. From my perspective, analyzing the win, lose, or draw of this situation,  it's pretty clear to me that we're at a current place in time where everyone's at a draw. </p><p>What will happen to our beloved ChatGPT? How will that actually turn out in the end? And add a draw, who stands to win? Who stands to lose in this situation? </p><p>It's pretty clear that when Microsoft brought on billions of dollars of investment, and OpenAI moved to Azure to be able to support its technology, that the clear winner that's going to come out of this is going to be Microsoft in the end.</p><p>That means that who loses in this is going to be ultimately OpenAI, its workers, and it's customers. You know, yesterday, only yesterday, even just logging into ChatGPT, there was a huge outage, a spike, if you look at down detector.  This tells me that resilience truly is the fuel of a durable company that underpins the technology that we all love and care about deeply.</p><p>So if you're out there and you're trying to figure out how you're going to deal with this, if your company is born on ChatGPT or OpenAI technology,  it's really important to start thinking about how you're going to find a resilient, adoptable, high velocity technology with lower errors. And that ultimately, the ones that are out there right now, that are being born to compete with OpenAI, they probably have a little bit more time, as they well know.</p><p>This is Shannon Leitz, reporting on the Win, Lose, or Draw.</p>]]></description><content:encoded><![CDATA[<p>Hi, this is Shannon Leitz  from San Diego, California. </p><p>With all the brouhaha going on with Sam Altman and OpenAI, there's a lot to unpack and digest. A few things for all of us. When OpenAI, not yet a year ago, released its ChatGPT to the world, a fabulous capability if you ask me,  it was pretty obvious at the time that they were chasing adoption and velocity as a brand new organization entering into the market.</p><p>I say that because most folks know that there's sort of a chase for go to market. When doing so, I don't know that anybody, maybe Sam Altman could have known, but I don't know that anybody would have predicted 100 million folks adopting ChatGPT as quickly as they did. </p><p>At the time, there was a clear understanding that resilience was sort of left behind, and the company knew about some of the errors associated with its technology and believed that it could fix it in time.</p><p>Along the way, we've also seen Microsoft throw in billions of dollars in investment and the world is actually at an awe. From my perspective, analyzing the win, lose, or draw of this situation,  it's pretty clear to me that we're at a current place in time where everyone's at a draw. </p><p>What will happen to our beloved ChatGPT? How will that actually turn out in the end? And add a draw, who stands to win? Who stands to lose in this situation? </p><p>It's pretty clear that when Microsoft brought on billions of dollars of investment, and OpenAI moved to Azure to be able to support its technology, that the clear winner that's going to come out of this is going to be Microsoft in the end.</p><p>That means that who loses in this is going to be ultimately OpenAI, its workers, and it's customers. You know, yesterday, only yesterday, even just logging into ChatGPT, there was a huge outage, a spike, if you look at down detector.  This tells me that resilience truly is the fuel of a durable company that underpins the technology that we all love and care about deeply.</p><p>So if you're out there and you're trying to figure out how you're going to deal with this, if your company is born on ChatGPT or OpenAI technology,  it's really important to start thinking about how you're going to find a resilient, adoptable, high velocity technology with lower errors. And that ultimately, the ones that are out there right now, that are being born to compete with OpenAI, they probably have a little bit more time, as they well know.</p><p>This is Shannon Leitz, reporting on the Win, Lose, or Draw.</p>]]></content:encoded><link><![CDATA[https://3zozb9fxlbueipjyapmaas.captivate.fm/episode/special-report-pov-friday-with-shannon-lietz-openai-and-microsoft-win-lose-or-draw]]></link><guid isPermaLink="false">ab0642c8-343f-41a9-8f72-63382876fbed</guid><itunes:image href="https://artwork.captivate.fm/c0f59b2a-436e-4ae8-8519-318b2154014b/rwkGrzsfkg_Qc5ERWT0ruhRh.jpg"/><dc:creator><![CDATA[Contributors from Around the World]]></dc:creator><pubDate>Fri, 24 Nov 2023 17:15:00 -0400</pubDate><enclosure url="https://dts.podtrac.com/redirect.mp3/podcasts.captivate.fm/media/0a6f0b1e-c665-4d16-b136-fb324b844daa/2023-11-24-505-POV-Friday-Segment-Shannon-Lietz-converted.mp3" length="2959737" type="audio/mpeg"/><itunes:duration>03:05</itunes:duration><itunes:explicit>false</itunes:explicit><itunes:episodeType>bonus</itunes:episodeType><itunes:author>Contributors from Around the World</itunes:author></item><item><title>Special Report: POV Friday with Katy Craig - OpenAI: Sam Altman’s Triumphant Return</title><itunes:title>Special Report: POV Friday with Katy Craig - OpenAI: Sam Altman’s Triumphant Return</itunes:title><description><![CDATA[<p>This is Katy Craig in San Diego, California. </p><p>In an extraordinary twist fit for a Silicon Valley drama. OpenAI's boardroom coup against CEO Sam Altman not only failed, but spectacularly backfired, leading to a reshuffling of the board itself. The recent turmoil at OpenAI, a beacon in the AI industry, laid bare the complexities and power dynamics at play in the high stakes world of technological innovation.</p><p>The attempt to oust Altman, ostensibly for a lack of transparency, was more than just a disagreement over leadership style. It symbolized a deeper conflict about the direction and speed of AI development. Altman, known for his ambitious, even aggressive, push for rapid AI advancement, found himself at odds with a cautious board.</p><p>However, this move to sideline him inadvertently galvanized a workforce adamant about their leader's vision, leading to a near rebellion. This employee revolt, a clear indicator of Altman's influence and the high regard in which he is held, forced the board's hand. The result, a stunning reversal of fortune where the board not Altman faced the chopping block. </p><p>OpenAI's announcement of Altman's return, flanked by a restructured board, is not just a reinstatement of a CEO, it's a resounding endorsement of his approach to AI development. What's particularly intriguing is the role of Microsoft in this saga. The tech giant, a significant financial backer of OpenAI, briefly flirted with the idea of integrating Altman and co-founder, Greg Brockman into its fold.</p><p>However, as the crisis unfolded, it became clear that Microsoft's interests were best served with Altman at the helm of OpenAI, leading to its tacit support for the board's overhaul. </p><p>The swift resolution culminating in Altman's return underscores a pivotal shift in corporate governance within tech companies. It's a clear message that visionary leadership, often personified by figures like Altman, cannot be easily sidelined, especially when it resonates so strongly with employees and aligns with key stakeholders interests. </p><p>As OpenAI charts its course under Altman's renewed leadership, with a board more aligned with his vision, one thing is clear. In the high octane world of AI development, it's not just about the technology, but also about the people who drive it. Altman's return is a testament to his leadership and a cautionary tale for boards that underestimate the power of visionary CEOs and the teams they inspire. </p><p>This is Katy Craig, stay safe out there. </p><p>Full episode available: https://505updates.com/2023-11-24-cybersecurity-and-open-source-headlines/ 🎙️ Free, ungated access to all 280+ episodes of “It’s 5:05!” on your favorite podcast platforms: https://bit.ly/505-updates</p>]]></description><content:encoded><![CDATA[<p>This is Katy Craig in San Diego, California. </p><p>In an extraordinary twist fit for a Silicon Valley drama. OpenAI's boardroom coup against CEO Sam Altman not only failed, but spectacularly backfired, leading to a reshuffling of the board itself. The recent turmoil at OpenAI, a beacon in the AI industry, laid bare the complexities and power dynamics at play in the high stakes world of technological innovation.</p><p>The attempt to oust Altman, ostensibly for a lack of transparency, was more than just a disagreement over leadership style. It symbolized a deeper conflict about the direction and speed of AI development. Altman, known for his ambitious, even aggressive, push for rapid AI advancement, found himself at odds with a cautious board.</p><p>However, this move to sideline him inadvertently galvanized a workforce adamant about their leader's vision, leading to a near rebellion. This employee revolt, a clear indicator of Altman's influence and the high regard in which he is held, forced the board's hand. The result, a stunning reversal of fortune where the board not Altman faced the chopping block. </p><p>OpenAI's announcement of Altman's return, flanked by a restructured board, is not just a reinstatement of a CEO, it's a resounding endorsement of his approach to AI development. What's particularly intriguing is the role of Microsoft in this saga. The tech giant, a significant financial backer of OpenAI, briefly flirted with the idea of integrating Altman and co-founder, Greg Brockman into its fold.</p><p>However, as the crisis unfolded, it became clear that Microsoft's interests were best served with Altman at the helm of OpenAI, leading to its tacit support for the board's overhaul. </p><p>The swift resolution culminating in Altman's return underscores a pivotal shift in corporate governance within tech companies. It's a clear message that visionary leadership, often personified by figures like Altman, cannot be easily sidelined, especially when it resonates so strongly with employees and aligns with key stakeholders interests. </p><p>As OpenAI charts its course under Altman's renewed leadership, with a board more aligned with his vision, one thing is clear. In the high octane world of AI development, it's not just about the technology, but also about the people who drive it. Altman's return is a testament to his leadership and a cautionary tale for boards that underestimate the power of visionary CEOs and the teams they inspire. </p><p>This is Katy Craig, stay safe out there. </p><p>Full episode available: https://505updates.com/2023-11-24-cybersecurity-and-open-source-headlines/ 🎙️ Free, ungated access to all 280+ episodes of “It’s 5:05!” on your favorite podcast platforms: https://bit.ly/505-updates</p>]]></content:encoded><link><![CDATA[https://3zozb9fxlbueipjyapmaas.captivate.fm/episode/special-report-pov-friday-with-katy-craig-openai-sam-altmans-triumphant-return]]></link><guid isPermaLink="false">dfd35202-0ad5-4084-8ff7-172deae7cf8b</guid><itunes:image href="https://artwork.captivate.fm/067cc46a-85e8-4813-9dd8-e1378494157f/XKGUhdNBn3T1iMoIygdIWhph.jpg"/><dc:creator><![CDATA[Contributors from Around the World]]></dc:creator><pubDate>Fri, 24 Nov 2023 17:00:00 -0400</pubDate><enclosure url="https://dts.podtrac.com/redirect.mp3/podcasts.captivate.fm/media/21dc8e1d-b7aa-4cae-ad91-55aed16c62fa/2023-11-24-Friday-Episode-280-Katy-Craig-converted.mp3" length="3170806" type="audio/mpeg"/><itunes:duration>03:18</itunes:duration><itunes:explicit>false</itunes:explicit><itunes:episodeType>bonus</itunes:episodeType><itunes:author>Contributors from Around the World</itunes:author></item><item><title>Episode #280: Edwin Kwan, Australia Shelves Plan To Ban Ransomware Payments; Trac Bannon, OpenAI:Should Camelot Be Restored?; Katy Craig, Sam Altman&apos;s Triumphant Return; Shannon Lietz, OpenAI and Microsoft: Win, Lose, or Draw?; Olimpiu Pop, OpenAI Opened the Window to the Future.</title><itunes:title>Episode #280: Edwin Kwan, Australia Shelves Plan To Ban Ransomware Payments; Trac Bannon, OpenAI:Should Camelot Be Restored?; Katy Craig, Sam Altman&apos;s Triumphant Return; Shannon Lietz, OpenAI and Microsoft: Win, Lose, or Draw?; Olimpiu Pop, OpenAI Opened the Window to the Future.</itunes:title><description><![CDATA[<p>🎙️ Free, ungated access to all 280+ episodes of “It’s 5:05!” on your favorite podcast platforms: https://bit.ly/505-updates.</p><p>Marcel Brown</p><p>November 25, 2002. Digital media software company, Roxio, purchases the assets of the former Napster, including name, logo, domain name, technology portfolio, and other intellectual property. Roxio was the first company to attempt to use the Napster brand for a music service, renaming PressPlay as Napster 2.0.</p><p>Edwin Kwan</p><p> The Australian government  has shelved plans to ban ransomware payments to cybercriminal groups for at least two years. The government had put the question to the industry in a consultation on whether it should prohibit the payments of ransoms, extortion demands by cybercriminals by victims of cybercrime and or insurers. And if so, under what circumstances? </p><p><br></p><p>Trac Bannon</p><p> The news of San Altman sacking by the OpenAI Board of Directors shook the world on Friday, November 17th. As events unfolded in the following hours and days, the world suffered collective whiplash. While many are asking why the board made that decision, more profound questions are being raised about the balance between innovative leadership and effective governance. </p><p><br></p><p>Katy Craig</p><p>The swift resolution culminating in Altman's return underscores a pivotal shift in corporate governance within tech companies. It's a clear message that visionary leadership, often personified by figures like Altman, cannot be easily sidelined, especially when it resonates so strongly with employees and aligns with key stakeholders interests.</p><p><br></p><p>Shannon Lietz</p><p>With all the brouhaha going on with Sam Altman and OpenAI, there's a lot to unpack and digest. When OpenAI, not yet a year ago, released its ChatGPT to the world it was pretty obvious at the time that they were chasing adoption and velocity as a brand new organization entering into the market. But I don't know that anybody would have predicted 100 million folks adopting ChatGPT as quickly as they did. </p><p><br></p><p>Olimpiu Pop</p><p>The recent turmoil at OpenAI, stemming from the ousting of CEO Sam Altman, has thrown the AI community into a state of intense discussion and speculation. We have a whole saga that looks more like a new season of HBO's Game of Thrones than a sane tech company that is crafting the future of humanity. </p><p><br></p><p>Mark Miller</p><p> From Sourced Network Productions in New York City, It's 5:05 on Friday, November 23rd, 2023. This is your host Mark Miller and its Point of View Friday, where today four of our contributing journalists, give us their take on the OpenAI and Sam Altman circus, which took over the headlines for four days. </p>]]></description><content:encoded><![CDATA[<p>🎙️ Free, ungated access to all 280+ episodes of “It’s 5:05!” on your favorite podcast platforms: https://bit.ly/505-updates.</p><p>Marcel Brown</p><p>November 25, 2002. Digital media software company, Roxio, purchases the assets of the former Napster, including name, logo, domain name, technology portfolio, and other intellectual property. Roxio was the first company to attempt to use the Napster brand for a music service, renaming PressPlay as Napster 2.0.</p><p>Edwin Kwan</p><p> The Australian government  has shelved plans to ban ransomware payments to cybercriminal groups for at least two years. The government had put the question to the industry in a consultation on whether it should prohibit the payments of ransoms, extortion demands by cybercriminals by victims of cybercrime and or insurers. And if so, under what circumstances? </p><p><br></p><p>Trac Bannon</p><p> The news of San Altman sacking by the OpenAI Board of Directors shook the world on Friday, November 17th. As events unfolded in the following hours and days, the world suffered collective whiplash. While many are asking why the board made that decision, more profound questions are being raised about the balance between innovative leadership and effective governance. </p><p><br></p><p>Katy Craig</p><p>The swift resolution culminating in Altman's return underscores a pivotal shift in corporate governance within tech companies. It's a clear message that visionary leadership, often personified by figures like Altman, cannot be easily sidelined, especially when it resonates so strongly with employees and aligns with key stakeholders interests.</p><p><br></p><p>Shannon Lietz</p><p>With all the brouhaha going on with Sam Altman and OpenAI, there's a lot to unpack and digest. When OpenAI, not yet a year ago, released its ChatGPT to the world it was pretty obvious at the time that they were chasing adoption and velocity as a brand new organization entering into the market. But I don't know that anybody would have predicted 100 million folks adopting ChatGPT as quickly as they did. </p><p><br></p><p>Olimpiu Pop</p><p>The recent turmoil at OpenAI, stemming from the ousting of CEO Sam Altman, has thrown the AI community into a state of intense discussion and speculation. We have a whole saga that looks more like a new season of HBO's Game of Thrones than a sane tech company that is crafting the future of humanity. </p><p><br></p><p>Mark Miller</p><p> From Sourced Network Productions in New York City, It's 5:05 on Friday, November 23rd, 2023. This is your host Mark Miller and its Point of View Friday, where today four of our contributing journalists, give us their take on the OpenAI and Sam Altman circus, which took over the headlines for four days. </p>]]></content:encoded><link><![CDATA[https://3zozb9fxlbueipjyapmaas.captivate.fm/episode/episode-280-edwin-kwan-australia-shelves-plan-to-ban-ransomware-payments-trac-bannon-openai-should-camelot-be-restored-katy-craig-sam-altmans-triumphant-return-shannon-lietz-openai-and-microsoft-win-lose-or-draw-olimpiu-pop-openai-opened-the-window-to-...]]></link><guid isPermaLink="false">33e10bcf-f183-4eb9-ac35-981744c348b3</guid><itunes:image href="https://artwork.captivate.fm/897f77c6-ff0c-4b8e-95c2-bf26a4025239/kDJEjXhV19id15a0VsAY6hrV.jpg"/><dc:creator><![CDATA[Contributors from Around the World]]></dc:creator><pubDate>Fri, 24 Nov 2023 16:45:00 -0400</pubDate><enclosure url="https://dts.podtrac.com/redirect.mp3/podcasts.captivate.fm/media/b1109e45-05b3-406d-ba10-f24493e6aeb3/2023-11-24-Friday-Episode-280-Final-for-Captivate-converted.mp3" length="18264566" type="audio/mpeg"/><itunes:duration>19:02</itunes:duration><itunes:explicit>false</itunes:explicit><itunes:episodeType>full</itunes:episodeType><itunes:season>1</itunes:season><itunes:episode>280</itunes:episode><itunes:season>1</itunes:season><podcast:episode>280</podcast:episode><podcast:season>1</podcast:season><itunes:author>Contributors from Around the World</itunes:author></item><item><title>Episode #279: Edwin Kwan, Australian Government Releases New Cybersecurity Strategy; Ian Garret, Move Over Phishing, Quishing is the New Scam; Olimpiu Pop, Software Supply Chain Trends - Part 2</title><itunes:title>Episode #279: Edwin Kwan, Australian Government Releases New Cybersecurity Strategy; Ian Garret, Move Over Phishing, Quishing is the New Scam; Olimpiu Pop, Software Supply Chain Trends - Part 2</itunes:title><description><![CDATA[<p>🎙️ Free, ungated access to all 235+ episodes of “It’s 5:05!” on your favorite podcast platforms: https://bit.ly/505-updates. </p><p>Marcel Brown, St. Louis, Missouri</p><p>November 23rd, 2004. Blizzard Entertainment releases the massively multiplayer online role playing game, World of Warcraft. It quickly became the most popular MMORPG of all time.  In the nearly 20 years since its release, World of Warcraft has had 9 major expansion packs, with 3 more expansion packs already planned for the future. </p><p><br></p><p>Edwin Kwan, Sydney, Australia</p><p> The Australian government has released its revised cybersecurity strategy for its plan to become a world leader in cyber security by 2030. It seeks to make Australia a hard target for cyber attacks by undermining cybercrime business models and putting Australian businesses and consumers in a stronger position to prepare and respond effectively.</p><p><br></p><p>Olimpiu Pop, Transylvania, Romania</p><p>The average Java application uses 148 dependencies, with around 10 releases occurring annually. That means that the developer is not only to make the initial selection of those libraries, but to track an average of 1,500 dependency changes throughout the year.  Combine this with the fact that almost 20%  of all track projects no further qualify as maintained. </p><p><br></p><p>Ian Garret, Arlington, Virginia</p><p>Quishing, or QR code phishing, has seen a dramatic increase in 2023.  This method involves encoding malicious links into QR codes, a technique that is proving both effective for attackers and challenging for defense systems. Let's talk about why it's on the rise, and what CISOs and security teams are doing about it.</p>]]></description><content:encoded><![CDATA[<p>🎙️ Free, ungated access to all 235+ episodes of “It’s 5:05!” on your favorite podcast platforms: https://bit.ly/505-updates. </p><p>Marcel Brown, St. Louis, Missouri</p><p>November 23rd, 2004. Blizzard Entertainment releases the massively multiplayer online role playing game, World of Warcraft. It quickly became the most popular MMORPG of all time.  In the nearly 20 years since its release, World of Warcraft has had 9 major expansion packs, with 3 more expansion packs already planned for the future. </p><p><br></p><p>Edwin Kwan, Sydney, Australia</p><p> The Australian government has released its revised cybersecurity strategy for its plan to become a world leader in cyber security by 2030. It seeks to make Australia a hard target for cyber attacks by undermining cybercrime business models and putting Australian businesses and consumers in a stronger position to prepare and respond effectively.</p><p><br></p><p>Olimpiu Pop, Transylvania, Romania</p><p>The average Java application uses 148 dependencies, with around 10 releases occurring annually. That means that the developer is not only to make the initial selection of those libraries, but to track an average of 1,500 dependency changes throughout the year.  Combine this with the fact that almost 20%  of all track projects no further qualify as maintained. </p><p><br></p><p>Ian Garret, Arlington, Virginia</p><p>Quishing, or QR code phishing, has seen a dramatic increase in 2023.  This method involves encoding malicious links into QR codes, a technique that is proving both effective for attackers and challenging for defense systems. Let's talk about why it's on the rise, and what CISOs and security teams are doing about it.</p>]]></content:encoded><link><![CDATA[https://3zozb9fxlbueipjyapmaas.captivate.fm/episode/episode-279-edwin-kwan-australian-government-releases-new-cybersecurity-strategy-ian-garret-move-over-phishing-quishing-is-the-new-scam-olimpiu-pop-software-supply-chain-trends-part-2]]></link><guid isPermaLink="false">37f6e409-9a9e-4236-af9a-73ae247bddd6</guid><itunes:image href="https://artwork.captivate.fm/2563f3ac-72bf-4186-9418-537692ec084d/ybMvhpeIwTT7fOqQg9ef1P-g.jpg"/><dc:creator><![CDATA[Contributors from Around the World]]></dc:creator><pubDate>Thu, 23 Nov 2023 16:45:00 -0400</pubDate><enclosure url="https://dts.podtrac.com/redirect.mp3/podcasts.captivate.fm/media/9e63771a-185a-44c1-afd0-8a895169eef0/505-2023-11-23-Thursday-Thanksgiving-Episode-converted.mp3" length="13116252" type="audio/mpeg"/><itunes:duration>10:56</itunes:duration><itunes:explicit>false</itunes:explicit><itunes:episodeType>full</itunes:episodeType><itunes:season>1</itunes:season><itunes:episode>279</itunes:episode><itunes:season>1</itunes:season><podcast:episode>279</podcast:episode><podcast:season>1</podcast:season><itunes:author>Contributors from Around the World</itunes:author></item><item><title>Episode #278: Edwin Kwan: Canadian Government Impacted by Third Party Breach; Hillary Coover: COO Attacks Local Hospitals for Business Gain; Olimpiu Pop: Software Supply Chain Report: 245.000 malicious packages deployed; Marcel Brown: This Day in Tech History</title><itunes:title>Episode #278: Edwin Kwan: Canadian Government Impacted by Third Party Breach; Hillary Coover: COO Attacks Local Hospitals for Business Gain; Olimpiu Pop: Software Supply Chain Report: 245.000 malicious packages deployed; Marcel Brown: This Day in Tech History</itunes:title><description><![CDATA[<p>Free, ungated access to all 275+ episodes of “It’s 5:05!” on your favorite podcast platforms: <a href="https://bit.ly/505-updates" rel="noopener noreferrer" target="_blank">https://bit.ly/505-updates</a>. You’re welcome to 𝗿𝗲𝗽𝗼𝘀𝘁 if your followers will find this of value.</p><p>The stories we’re covering today.</p><p>Marcel Brown: November 22, 2005. Microsoft releases the Xbox 360, the second generation of their popular game console. And on November 22, 2013, exactly 8 years later, Microsoft released the Xbox One, which makes absolutely no sense.</p><p>Edwin Kwan: Two third party service providers for the Canadian government have suffered breaches resulting in data in the last 24 years being potentially compromised. The servers that were impacted by the breach held data related to current and former Canadian government staff, members of the Canadian Armed Forces, and the Royal Canadian Mounted Police workers.</p><p>Olimpiu Pop: The software supply chain report was released last month. I read it. I covered it for the InfoQ and then I read parts of it again. There are some key points that still need to be spoken out. It's  a before and after the pandemic story. </p><p>Hillary Coover; We're all familiar with  ambulance chasing sales and marketing tactics, but this Cybersecurity Executive took things to a whole new level. In a shocking case, the Chief Operating Officer of an Atlanta based security company, Securalytics, took matters into his own hands by orchestrating cyberattacks on two local hospitals.</p>]]></description><content:encoded><![CDATA[<p>Free, ungated access to all 275+ episodes of “It’s 5:05!” on your favorite podcast platforms: <a href="https://bit.ly/505-updates" rel="noopener noreferrer" target="_blank">https://bit.ly/505-updates</a>. You’re welcome to 𝗿𝗲𝗽𝗼𝘀𝘁 if your followers will find this of value.</p><p>The stories we’re covering today.</p><p>Marcel Brown: November 22, 2005. Microsoft releases the Xbox 360, the second generation of their popular game console. And on November 22, 2013, exactly 8 years later, Microsoft released the Xbox One, which makes absolutely no sense.</p><p>Edwin Kwan: Two third party service providers for the Canadian government have suffered breaches resulting in data in the last 24 years being potentially compromised. The servers that were impacted by the breach held data related to current and former Canadian government staff, members of the Canadian Armed Forces, and the Royal Canadian Mounted Police workers.</p><p>Olimpiu Pop: The software supply chain report was released last month. I read it. I covered it for the InfoQ and then I read parts of it again. There are some key points that still need to be spoken out. It's  a before and after the pandemic story. </p><p>Hillary Coover; We're all familiar with  ambulance chasing sales and marketing tactics, but this Cybersecurity Executive took things to a whole new level. In a shocking case, the Chief Operating Officer of an Atlanta based security company, Securalytics, took matters into his own hands by orchestrating cyberattacks on two local hospitals.</p>]]></content:encoded><link><![CDATA[https://3zozb9fxlbueipjyapmaas.captivate.fm/episode/episode-278-edwin-kwan-canadian-government-impacted-by-third-party-breach-hillary-coover-coo-attacks-local-hospitals-for-business-gain-olimpiu-pop-software-supply-chain-report-245-000-malicious-packages-deployed-marcel-brown-this-day-in-tech-history]]></link><guid isPermaLink="false">910b0da0-a8a9-45ba-a892-1710e1dd70cd</guid><itunes:image href="https://artwork.captivate.fm/33e2a4e7-a936-4ef5-905a-3a72363cfbe4/BkhMbfQsRHQi9QFk9GvnUJSv.png"/><dc:creator><![CDATA[Contributors from Around the World]]></dc:creator><pubDate>Wed, 22 Nov 2023 16:45:00 -0400</pubDate><enclosure url="https://dts.podtrac.com/redirect.mp3/podcasts.captivate.fm/media/588f87d9-3cb6-426d-a339-a9b557773e67/505-2023-11-22-Episode-278-Final-converted.mp3" length="11545803" type="audio/mpeg"/><itunes:duration>09:37</itunes:duration><itunes:explicit>false</itunes:explicit><itunes:episodeType>full</itunes:episodeType><itunes:season>1</itunes:season><itunes:episode>278</itunes:episode><itunes:season>1</itunes:season><podcast:episode>278</podcast:episode><podcast:season>1</podcast:season><itunes:author>Contributors from Around the World</itunes:author></item><item><title>Episode #277: Edwin Kwan: Malicious Android Banking Apps Targeting Users in India; Ian Garrett: M&amp;A Deals that Look into the Future of the Cybersecurity Industry; Katy Craig: SEC Sues SolarWinds: Part II; Marcel Brown: This Day in Tech History</title><itunes:title>Episode #277: Edwin Kwan: Malicious Android Banking Apps Targeting Users in India; Ian Garrett: M&amp;A Deals that Look into the Future of the Cybersecurity Industry; Katy Craig: SEC Sues SolarWinds: Part II; Marcel Brown: This Day in Tech History</itunes:title><description><![CDATA[<p>Free, ungated access to all 275+ episodes of “It’s 5:05!” on your favorite podcast platforms: <a href="https://bit.ly/505-updates" rel="noopener noreferrer" target="_blank">https://bit.ly/505-updates</a>. You’re welcome to 𝗿𝗲𝗽𝗼𝘀𝘁 if your followers will find this of value.</p><p>The stories we’re covering today.</p><p>Marcel Brown: November 21st, 1877. Thomas Edison announces his invention of the phonograph, a way to record and play back sound. As often happens with many great inventors, Edison stumbled upon this particular invention while working on a way to record telephone communication at his lab in Menlo Park, New Jersey.</p><p>Edwin Kwan: Security researchers have uncovered a malware campaign to steal sensitive information from Android smartphone users in India. Researchers say that the campaign is using social media platforms like WhatsApp and Telegram to lure users into installing a malicious app by impersonating legitimate organizations such as banks, government services, and utilities.</p><p>Katy Craig: In light of the recent SEC charges against SolarWinds' Chief Information Security Officer, or CISO, Timothy G. Brown, there's a compelling argument for holding company officers accountable for neglecting cybersecurity and failing to report known risks. The charges against Brown for not disclosing significant cybersecurity vulnerabilities before and during the 2020 SUNBURST cyberattack, underline a crucial point: CISOs, like CFOs, must prioritize transparency and honesty in reporting risks.</p><p>Ian Garrett: We can learn a lot about the state of the cybersecurity industry through the type of mergers and acquisitions, or M&amp;A, that occur.  2023 has been a cautious yet significant year for mergers and acquisitions in the cybersecurity sector. Despite fears of a recession, rising interest rates, and conservative spending trends, the relentless pace of cyberattacks has maintained steady M&amp;A activity.</p>]]></description><content:encoded><![CDATA[<p>Free, ungated access to all 275+ episodes of “It’s 5:05!” on your favorite podcast platforms: <a href="https://bit.ly/505-updates" rel="noopener noreferrer" target="_blank">https://bit.ly/505-updates</a>. You’re welcome to 𝗿𝗲𝗽𝗼𝘀𝘁 if your followers will find this of value.</p><p>The stories we’re covering today.</p><p>Marcel Brown: November 21st, 1877. Thomas Edison announces his invention of the phonograph, a way to record and play back sound. As often happens with many great inventors, Edison stumbled upon this particular invention while working on a way to record telephone communication at his lab in Menlo Park, New Jersey.</p><p>Edwin Kwan: Security researchers have uncovered a malware campaign to steal sensitive information from Android smartphone users in India. Researchers say that the campaign is using social media platforms like WhatsApp and Telegram to lure users into installing a malicious app by impersonating legitimate organizations such as banks, government services, and utilities.</p><p>Katy Craig: In light of the recent SEC charges against SolarWinds' Chief Information Security Officer, or CISO, Timothy G. Brown, there's a compelling argument for holding company officers accountable for neglecting cybersecurity and failing to report known risks. The charges against Brown for not disclosing significant cybersecurity vulnerabilities before and during the 2020 SUNBURST cyberattack, underline a crucial point: CISOs, like CFOs, must prioritize transparency and honesty in reporting risks.</p><p>Ian Garrett: We can learn a lot about the state of the cybersecurity industry through the type of mergers and acquisitions, or M&amp;A, that occur.  2023 has been a cautious yet significant year for mergers and acquisitions in the cybersecurity sector. Despite fears of a recession, rising interest rates, and conservative spending trends, the relentless pace of cyberattacks has maintained steady M&amp;A activity.</p>]]></content:encoded><link><![CDATA[https://3zozb9fxlbueipjyapmaas.captivate.fm/episode/episode-277-edwin-kwan-malicious-android-banking-apps-targeting-users-in-india-ian-garrett-ma-deals-that-look-into-the-future-of-the-cybersecurity-industry-katy-craig-sec-sues-solarwinds-part-ii-marcel-brown-this-day-in-tech-history]]></link><guid isPermaLink="false">fe7fa62d-e6d0-4ec8-997e-4fe137d12f69</guid><itunes:image href="https://artwork.captivate.fm/33e2a4e7-a936-4ef5-905a-3a72363cfbe4/BkhMbfQsRHQi9QFk9GvnUJSv.png"/><dc:creator><![CDATA[Contributors from Around the World]]></dc:creator><pubDate>Tue, 21 Nov 2023 16:45:00 -0400</pubDate><enclosure url="https://dts.podtrac.com/redirect.mp3/podcasts.captivate.fm/media/8a900221-1d61-4f21-813d-18f6785703b1/505-2023-11-21-Episode-277-Final-converted.mp3" length="12671156" type="audio/mpeg"/><itunes:duration>10:34</itunes:duration><itunes:explicit>false</itunes:explicit><itunes:episodeType>full</itunes:episodeType><itunes:season>1</itunes:season><itunes:episode>277</itunes:episode><itunes:season>1</itunes:season><podcast:episode>277</podcast:episode><podcast:season>1</podcast:season><itunes:author>Contributors from Around the World</itunes:author></item><item><title>Episode #276: Edwin Kwan: Australia&apos;s First Cyber Security Coordinator Recalled; Katy Craig: SEC Sues SolarWinds for Misleading Investors; Hillary Coover: A New Breed of Cybercrime Targeting Teenage Boys; Marcel Brown: This Day in Tech History</title><itunes:title>Episode #276: Edwin Kwan: Australia&apos;s First Cyber Security Coordinator Recalled; Katy Craig: SEC Sues SolarWinds for Misleading Investors; Hillary Coover: A New Breed of Cybercrime Targeting Teenage Boys; Marcel Brown: This Day in Tech History</itunes:title><description><![CDATA[<p>Free, ungated access to all 275+ episodes of “It’s 5:05!” on your favorite podcast platforms: <a href="https://bit.ly/505-updates" rel="noopener noreferrer" target="_blank">https://bit.ly/505-updates</a>. You’re welcome to 𝗿𝗲𝗽𝗼𝘀𝘁 if your followers will find this of value.</p><p>The stories we’re covering today.</p><p>Marcel Brown: November 19th, 2006. Nintendo releases the Wii game console to compete with the Sony PlayStation 3 and Microsoft Xbox 360. By foregoing raw computing power for increased player interaction, utilizing the innovative motion-sensitive "Wiimote" controller, the Wii defied expectations and became the best selling 7th generation game console.  </p><p>Edwin Kwan: Australia's first cybersecurity coordinator has been recalled to Defence after just four months into the role. The two-star general was working on delivering on the Home Affairs and Cybersecurity Minister's commitment to building a more coordinated approach to preparing for and managing the consequences of cybersecurity incidents.</p><p>Hillary Coover: A new breed of cybercrime has emerged targeting teen boys. Law enforcement and child protection experts describe a growing wave of online predators targeting teens through a sophisticated nude-photo scam.  These new scammers focus mostly on monetary gain.</p><p>Katy Craig: The US Securities and Exchange Commission, SEC, has charged SolarWinds Corporation and its Chief Information Security Officer, Timothy G. Brown, with misleading investors about significant cybersecurity vulnerabilities. The SEC's complaint highlights instances where Brown and other employees were aware of, but failed to adequately address vulnerabilities in SolarWinds' systems.</p>]]></description><content:encoded><![CDATA[<p>Free, ungated access to all 275+ episodes of “It’s 5:05!” on your favorite podcast platforms: <a href="https://bit.ly/505-updates" rel="noopener noreferrer" target="_blank">https://bit.ly/505-updates</a>. You’re welcome to 𝗿𝗲𝗽𝗼𝘀𝘁 if your followers will find this of value.</p><p>The stories we’re covering today.</p><p>Marcel Brown: November 19th, 2006. Nintendo releases the Wii game console to compete with the Sony PlayStation 3 and Microsoft Xbox 360. By foregoing raw computing power for increased player interaction, utilizing the innovative motion-sensitive "Wiimote" controller, the Wii defied expectations and became the best selling 7th generation game console.  </p><p>Edwin Kwan: Australia's first cybersecurity coordinator has been recalled to Defence after just four months into the role. The two-star general was working on delivering on the Home Affairs and Cybersecurity Minister's commitment to building a more coordinated approach to preparing for and managing the consequences of cybersecurity incidents.</p><p>Hillary Coover: A new breed of cybercrime has emerged targeting teen boys. Law enforcement and child protection experts describe a growing wave of online predators targeting teens through a sophisticated nude-photo scam.  These new scammers focus mostly on monetary gain.</p><p>Katy Craig: The US Securities and Exchange Commission, SEC, has charged SolarWinds Corporation and its Chief Information Security Officer, Timothy G. Brown, with misleading investors about significant cybersecurity vulnerabilities. The SEC's complaint highlights instances where Brown and other employees were aware of, but failed to adequately address vulnerabilities in SolarWinds' systems.</p>]]></content:encoded><link><![CDATA[https://3zozb9fxlbueipjyapmaas.captivate.fm/episode/episode-276-edwin-kwan-australias-first-cyber-security-coordinator-recalled-katy-craig-sec-sues-solarwinds-for-misleading-investors-hillary-coover-a-new-breed-of-cybercrime-targeting-teenage-boys-marcel-brown-this-day-in-tech-history]]></link><guid isPermaLink="false">db5a82d7-432e-4f3f-aaec-0a19ced363c1</guid><itunes:image href="https://artwork.captivate.fm/33e2a4e7-a936-4ef5-905a-3a72363cfbe4/BkhMbfQsRHQi9QFk9GvnUJSv.png"/><dc:creator><![CDATA[Contributors from Around the World]]></dc:creator><pubDate>Mon, 20 Nov 2023 16:45:00 -0400</pubDate><enclosure url="https://dts.podtrac.com/redirect.mp3/podcasts.captivate.fm/media/5891353a-41b8-401b-9f63-f807b0f2a609/505-2023-11-20-Episode-276-Final-converted.mp3" length="10938714" type="audio/mpeg"/><itunes:duration>09:07</itunes:duration><itunes:explicit>false</itunes:explicit><itunes:episodeType>full</itunes:episodeType><itunes:season>1</itunes:season><itunes:episode>276</itunes:episode><itunes:season>1</itunes:season><podcast:episode>276</podcast:episode><podcast:season>1</podcast:season><itunes:author>Contributors from Around the World</itunes:author></item><item><title>Episode #275: Edwin Kwan: Popular WordPress Plugin Exposes over 600K to Attacks; Marcel Brown: This Day in Tech History; Katy Craig: EU AI Act; Shannon Lietz: The AI Act; Olimpiu Pop: To Regulate Or Not To Regulate AI in EU</title><itunes:title>Episode #275: Edwin Kwan: Popular WordPress Plugin Exposes over 600K to Attacks; Marcel Brown: This Day in Tech History; Katy Craig: EU AI Act; Shannon Lietz: The AI Act; Olimpiu Pop: To Regulate Or Not To Regulate AI in EU</itunes:title><description><![CDATA[<p>Free, ungated access to all 275+ episodes of “It’s 5:05!” on your favorite podcast platforms: <a href="https://bit.ly/505-updates" rel="noopener noreferrer" target="_blank">https://bit.ly/505-updates</a>. You’re welcome to 𝗿𝗲𝗽𝗼𝘀𝘁 if your followers will find this of value.</p><p>The stories we’re covering today.</p><p>Marcel Brown: November 17th, 1970. Douglas Engelbart receives a U. S. patent for his XY Position Indicator for a display system, more commonly known as the computer mouse.  Engelbart called his device a mouse because the cord looked like a tail.  </p><p>Edwin Kwan: A popular WordPress plugin has been discovered to be vulnerable to a high-severity vulnerability.  There are currently more than 600,000 websites that are using the vulnerable version and are potentially exposed to the vulnerability. </p><p>Katy Craig: As the European Union considers the way ahead for the AI Act, a critical question arises. Should the EU establish a dedicated office to oversee and manage it?  The establishment of a dedicated office for AI regulation must find a balance between oversight and innovation, efficiency and flexibility, and harmonization and autonomy. </p><p>Shannon Lietz: The win on the AI Act is the fact that the EU is going to put some capability behind it. It's such a powerful forward motion for us in terms of the future of what we need for humanity.  We've really got to start to establish some of the playing rules for how this becomes beneficial to everyone. </p><p>Olimpiu Pop: while a delay in the AI Act's implementation may allow for more thorough consideration and balancing of various interests, it also runs the risk of leaving the EU unprepared to address the rapid advancements and potential risks associated with powerful AI technology.</p>]]></description><content:encoded><![CDATA[<p>Free, ungated access to all 275+ episodes of “It’s 5:05!” on your favorite podcast platforms: <a href="https://bit.ly/505-updates" rel="noopener noreferrer" target="_blank">https://bit.ly/505-updates</a>. You’re welcome to 𝗿𝗲𝗽𝗼𝘀𝘁 if your followers will find this of value.</p><p>The stories we’re covering today.</p><p>Marcel Brown: November 17th, 1970. Douglas Engelbart receives a U. S. patent for his XY Position Indicator for a display system, more commonly known as the computer mouse.  Engelbart called his device a mouse because the cord looked like a tail.  </p><p>Edwin Kwan: A popular WordPress plugin has been discovered to be vulnerable to a high-severity vulnerability.  There are currently more than 600,000 websites that are using the vulnerable version and are potentially exposed to the vulnerability. </p><p>Katy Craig: As the European Union considers the way ahead for the AI Act, a critical question arises. Should the EU establish a dedicated office to oversee and manage it?  The establishment of a dedicated office for AI regulation must find a balance between oversight and innovation, efficiency and flexibility, and harmonization and autonomy. </p><p>Shannon Lietz: The win on the AI Act is the fact that the EU is going to put some capability behind it. It's such a powerful forward motion for us in terms of the future of what we need for humanity.  We've really got to start to establish some of the playing rules for how this becomes beneficial to everyone. </p><p>Olimpiu Pop: while a delay in the AI Act's implementation may allow for more thorough consideration and balancing of various interests, it also runs the risk of leaving the EU unprepared to address the rapid advancements and potential risks associated with powerful AI technology.</p>]]></content:encoded><link><![CDATA[https://3zozb9fxlbueipjyapmaas.captivate.fm/episode/episode-275-edwin-kwan-popular-wordpress-plugin-exposes-over-600k-to-attacks-marcel-brown-this-day-in-tech-history-katy-craig-eu-ai-act-shannon-lietz-the-ai-act-olimpiu-pop-to-regulate-or-not-to-regulate-ai-in-eu]]></link><guid isPermaLink="false">e614a7f1-1b34-42d8-adb2-778d2bf42a3d</guid><itunes:image href="https://artwork.captivate.fm/33e2a4e7-a936-4ef5-905a-3a72363cfbe4/BkhMbfQsRHQi9QFk9GvnUJSv.png"/><dc:creator><![CDATA[Contributors from Around the World]]></dc:creator><pubDate>Fri, 17 Nov 2023 16:45:00 -0400</pubDate><enclosure url="https://dts.podtrac.com/redirect.mp3/podcasts.captivate.fm/media/bc086c73-b0cb-4a47-b56a-ff4562bd33cb/505-2023-11-17-Episode-275-Final-converted.mp3" length="14209976" type="audio/mpeg"/><itunes:duration>14:48</itunes:duration><itunes:explicit>false</itunes:explicit><itunes:episodeType>full</itunes:episodeType><itunes:season>1</itunes:season><itunes:episode>275</itunes:episode><itunes:season>1</itunes:season><podcast:episode>275</podcast:episode><podcast:season>1</podcast:season><itunes:author>Contributors from Around the World</itunes:author></item><item><title>Episode #274: Edwin Kwan: Cyberattack Threatens Australian Christmas; Ian Garrett: $500k Compensation for the Top 25% of Cybersecurity Professionals; Mark Miller: OpenAI Takes a Run at Startups Investments that Use Their Platform; Marcel Brown: This Day in Tech History</title><itunes:title>Episode #274: Edwin Kwan: Cyberattack Threatens Australian Christmas; Ian Garrett: $500k Compensation for the Top 25% of Cybersecurity Professionals; Mark Miller: OpenAI Takes a Run at Startups Investments that Use Their Platform; Marcel Brown: This Day in Tech History</itunes:title><description><![CDATA[<p>Free, ungated access to all 270+ episodes of “It’s 5:05!” on your favorite podcast platforms: <a href="https://bit.ly/505-updates" rel="noopener noreferrer" target="_blank">https://bit.ly/505-updates</a>. You’re welcome to 𝗿𝗲𝗽𝗼𝘀𝘁 if your followers will find this of value.</p><p>The stories we’re covering today.</p><p>Marcel Brown: November 16, 1982. Steve Jobs writes a letter to Macintosh Labs asking for the rights to use Macintosh as the brand name of Apple's still-in- development computer.  Gordon Gao, president of Macintosh Labs, visited Apple headquarters for a product demonstration. However, Macintosh lawyers advised Gao to reject the request.</p><p>Edwin Kwan: DP World Australia suffered a cyber attack which disrupted its landside freight operations.  The attack resulted in around 30,000 shipping containers not being moved and crowding of available storage spaces at the ports.  </p><p>Ian Garrett: It's no secret that there's a massive shortage in cybersecurity talent, and with any resource that's high in demand with low supply, there are people willing to pay top dollar. For top cybersecurity professionals, companies are now offering substantial packages. </p><p>Mark Miller: Hold on to your ass, developer, because you aren't a developer on the OpenAI platform. You're an idea generator for OpenAI's next iteration.  This is Mark Miller  sitting here shaking my head over what transpired last week at OpenAI's first developer conference.</p>]]></description><content:encoded><![CDATA[<p>Free, ungated access to all 270+ episodes of “It’s 5:05!” on your favorite podcast platforms: <a href="https://bit.ly/505-updates" rel="noopener noreferrer" target="_blank">https://bit.ly/505-updates</a>. You’re welcome to 𝗿𝗲𝗽𝗼𝘀𝘁 if your followers will find this of value.</p><p>The stories we’re covering today.</p><p>Marcel Brown: November 16, 1982. Steve Jobs writes a letter to Macintosh Labs asking for the rights to use Macintosh as the brand name of Apple's still-in- development computer.  Gordon Gao, president of Macintosh Labs, visited Apple headquarters for a product demonstration. However, Macintosh lawyers advised Gao to reject the request.</p><p>Edwin Kwan: DP World Australia suffered a cyber attack which disrupted its landside freight operations.  The attack resulted in around 30,000 shipping containers not being moved and crowding of available storage spaces at the ports.  </p><p>Ian Garrett: It's no secret that there's a massive shortage in cybersecurity talent, and with any resource that's high in demand with low supply, there are people willing to pay top dollar. For top cybersecurity professionals, companies are now offering substantial packages. </p><p>Mark Miller: Hold on to your ass, developer, because you aren't a developer on the OpenAI platform. You're an idea generator for OpenAI's next iteration.  This is Mark Miller  sitting here shaking my head over what transpired last week at OpenAI's first developer conference.</p>]]></content:encoded><link><![CDATA[https://3zozb9fxlbueipjyapmaas.captivate.fm/episode/episode-274-edwin-kwan-cyberattack-threatens-australian-christmas-ian-garrett-500k-compensation-for-the-top-25-of-cybersecurity-professionals-mark-miller-openai-takes-a-run-at-startups-investments-that-use-their-platform-marcel-brown-this-day-in-tech-h...]]></link><guid isPermaLink="false">e967692c-0b38-45bc-905c-90e7a6dbc64a</guid><itunes:image href="https://artwork.captivate.fm/33e2a4e7-a936-4ef5-905a-3a72363cfbe4/BkhMbfQsRHQi9QFk9GvnUJSv.png"/><dc:creator><![CDATA[Contributors from Around the World]]></dc:creator><pubDate>Thu, 16 Nov 2023 16:45:00 -0400</pubDate><enclosure url="https://dts.podtrac.com/redirect.mp3/podcasts.captivate.fm/media/c8b66789-0352-4b69-9bab-00f04092ac61/505-2023-11-16-Episode-274-Final-converted.mp3" length="9717753" type="audio/mpeg"/><itunes:duration>10:07</itunes:duration><itunes:explicit>false</itunes:explicit><itunes:episodeType>full</itunes:episodeType><itunes:season>1</itunes:season><itunes:episode>274</itunes:episode><itunes:season>1</itunes:season><podcast:episode>274</podcast:episode><podcast:season>1</podcast:season><itunes:author>Contributors from Around the World</itunes:author></item><item><title>Episode #273: Edwin Kwan: OpenAI Suffered DDOS Attack Resulting in Intermittent Outage; Katy Craig: Citrix Bleed; Hillary Coover: Holiday Shopper Alert: Protect Your Finances from Cyber Grinches!; Marcel Brown: This Day in Tech History</title><itunes:title>Episode #273: Edwin Kwan: OpenAI Suffered DDOS Attack Resulting in Intermittent Outage; Katy Craig: Citrix Bleed; Hillary Coover: Holiday Shopper Alert: Protect Your Finances from Cyber Grinches!; Marcel Brown: This Day in Tech History</itunes:title><description><![CDATA[<p>Free, ungated access to all 270+ episodes of “It’s 5:05!” on your favorite podcast platforms: <a href="https://bit.ly/505-updates" rel="noopener noreferrer" target="_blank">https://bit.ly/505-updates</a>. You’re welcome to 𝗿𝗲𝗽𝗼𝘀𝘁 if your followers will find this of value.</p><p>The stories we’re covering today.</p><p>Marcel Brown: November 15, 1996. The first version of ICQ, the Internet's first popular instant messaging program, is released by four high school students from Israel. By the end of 1997, ICQ had more than 5 million users, and in mid-1998, AOL purchased the company for $407 million. </p><p>Edwin Kwan: Users of OpenAI's API, ChatGPT, and Dall-E services were experiencing intermittent outages. They would see messages from their queries saying that " something seems to have gone wrong  or we're experiencing exceptionally high demand. Please hang tight as we work on scaling our systems."</p><p>Hillary Coover: As the festive season approaches, the thrill of holiday shopping is palpable, but so is the excitement for cybercriminals aiming to capitalize on the online shopping surge through scams and data theft.  One rising concern demanding attention is the surge in credit card skimming, a threat likely to intensify in the coming weeks.</p><p>Katy Craig: The Citrix Bleed vulnerability  has become the focal point of threat actors' attention, with active exploitation campaigns targeting government, technical, and legal organizations across the Americas, Europe, Africa, and the Asia Pacific region.  The attackers employed a clever technique involving specially crafted HTTP GET requests. </p>]]></description><content:encoded><![CDATA[<p>Free, ungated access to all 270+ episodes of “It’s 5:05!” on your favorite podcast platforms: <a href="https://bit.ly/505-updates" rel="noopener noreferrer" target="_blank">https://bit.ly/505-updates</a>. You’re welcome to 𝗿𝗲𝗽𝗼𝘀𝘁 if your followers will find this of value.</p><p>The stories we’re covering today.</p><p>Marcel Brown: November 15, 1996. The first version of ICQ, the Internet's first popular instant messaging program, is released by four high school students from Israel. By the end of 1997, ICQ had more than 5 million users, and in mid-1998, AOL purchased the company for $407 million. </p><p>Edwin Kwan: Users of OpenAI's API, ChatGPT, and Dall-E services were experiencing intermittent outages. They would see messages from their queries saying that " something seems to have gone wrong  or we're experiencing exceptionally high demand. Please hang tight as we work on scaling our systems."</p><p>Hillary Coover: As the festive season approaches, the thrill of holiday shopping is palpable, but so is the excitement for cybercriminals aiming to capitalize on the online shopping surge through scams and data theft.  One rising concern demanding attention is the surge in credit card skimming, a threat likely to intensify in the coming weeks.</p><p>Katy Craig: The Citrix Bleed vulnerability  has become the focal point of threat actors' attention, with active exploitation campaigns targeting government, technical, and legal organizations across the Americas, Europe, Africa, and the Asia Pacific region.  The attackers employed a clever technique involving specially crafted HTTP GET requests. </p>]]></content:encoded><link><![CDATA[https://3zozb9fxlbueipjyapmaas.captivate.fm/episode/episode-273-edwin-kwan-openai-suffered-ddos-attack-resulting-in-intermittent-outage-katy-craig-citrix-bleed-hillary-coover-holiday-shopper-alert-protect-your-finances-from-cyber-grinches-marcel-brown-this-day-in-tech-history]]></link><guid isPermaLink="false">f04994c2-a63b-4684-b826-73935c9da549</guid><itunes:image href="https://artwork.captivate.fm/33e2a4e7-a936-4ef5-905a-3a72363cfbe4/BkhMbfQsRHQi9QFk9GvnUJSv.png"/><dc:creator><![CDATA[Contributors from Around the World]]></dc:creator><pubDate>Wed, 15 Nov 2023 16:45:00 -0400</pubDate><enclosure url="https://dts.podtrac.com/redirect.mp3/podcasts.captivate.fm/media/7faffbb0-0e24-43f6-a4fb-757293a8a1cc/505-2023-11-15-Episode-273-Final-converted.mp3" length="13187860" type="audio/mpeg"/><itunes:duration>10:59</itunes:duration><itunes:explicit>false</itunes:explicit><itunes:episodeType>full</itunes:episodeType><itunes:season>1</itunes:season><itunes:episode>273</itunes:episode><itunes:season>1</itunes:season><podcast:episode>273</podcast:episode><podcast:season>1</podcast:season><itunes:author>Contributors from Around the World</itunes:author></item><item><title>Episode #272: Edwin Kwan: Signal Testing Use of Usernames to Keep Phone Number Private; Ian Garrett: Identity-based Security is the New Perimeter; Hillary Coover: Decoding Tomorrow&apos;s Defense: The Rise of Deception Technology in Cybersecurity Strategies; Marcel Brown: This Day in Tech History</title><itunes:title>Episode #272: Edwin Kwan: Signal Testing Use of Usernames to Keep Phone Number Private; Ian Garrett: Identity-based Security is the New Perimeter; Hillary Coover: Decoding Tomorrow&apos;s Defense: The Rise of Deception Technology in Cybersecurity Strategies; Marcel Brown: This Day in Tech History</itunes:title><description><![CDATA[<p>Free, ungated access to all 270+ episodes of “It’s 5:05!” on your favorite podcast platforms: <a href="https://bit.ly/505-updates" rel="noopener noreferrer" target="_blank">https://bit.ly/505-updates</a>. You’re welcome to 𝗿𝗲𝗽𝗼𝘀𝘁 if your followers will find this of value.</p><p>The stories we’re covering today.</p><p>Marcel Brown: November 14, 1971. NASA's Mariner 9 reaches the planet Mars and becomes the first man-made object to orbit another planet. </p><p>Edwin Kwan: Signal has started testing the use of account usernames to allow users to keep their phone numbers private.  Users would be able to turn off phone number discovery in their privacy settings and only allow the username to be the primary way others can contact them.</p><p>Hillary Coover: Could deception technology be the ultimate strategy for staying ahead of cyber threats? A CSO opinion piece is quickly circulating and predicts that a convergence of IT and cybersecurity trends will make deception technology more accessible by the end of 2025. </p><p>Ian Garrett: The cybersecurity domain is experiencing a significant paradigm shift. Traditional perimeter defenses like firewalls are making way for a more identity-centric approach. As we move forward, identity will no longer be a siloed discipline, but an integrated, interconnected aspect of cybersecurity infrastructure.</p>]]></description><content:encoded><![CDATA[<p>Free, ungated access to all 270+ episodes of “It’s 5:05!” on your favorite podcast platforms: <a href="https://bit.ly/505-updates" rel="noopener noreferrer" target="_blank">https://bit.ly/505-updates</a>. You’re welcome to 𝗿𝗲𝗽𝗼𝘀𝘁 if your followers will find this of value.</p><p>The stories we’re covering today.</p><p>Marcel Brown: November 14, 1971. NASA's Mariner 9 reaches the planet Mars and becomes the first man-made object to orbit another planet. </p><p>Edwin Kwan: Signal has started testing the use of account usernames to allow users to keep their phone numbers private.  Users would be able to turn off phone number discovery in their privacy settings and only allow the username to be the primary way others can contact them.</p><p>Hillary Coover: Could deception technology be the ultimate strategy for staying ahead of cyber threats? A CSO opinion piece is quickly circulating and predicts that a convergence of IT and cybersecurity trends will make deception technology more accessible by the end of 2025. </p><p>Ian Garrett: The cybersecurity domain is experiencing a significant paradigm shift. Traditional perimeter defenses like firewalls are making way for a more identity-centric approach. As we move forward, identity will no longer be a siloed discipline, but an integrated, interconnected aspect of cybersecurity infrastructure.</p>]]></content:encoded><link><![CDATA[https://3zozb9fxlbueipjyapmaas.captivate.fm/episode/episode-272-edwin-kwan-signal-testing-use-of-usernames-to-keep-phone-number-private-ian-garrett-identity-based-security-is-the-new-perimeter-hillary-coover-decoding-tomorrows-defense-the-rise-of-deception-technology-in-cybersecurity-strategies-marcel-b...]]></link><guid isPermaLink="false">00427d09-161e-4fa8-babc-59480cd89ff0</guid><itunes:image href="https://artwork.captivate.fm/33e2a4e7-a936-4ef5-905a-3a72363cfbe4/BkhMbfQsRHQi9QFk9GvnUJSv.png"/><dc:creator><![CDATA[Contributors from Around the World]]></dc:creator><pubDate>Tue, 14 Nov 2023 16:45:00 -0400</pubDate><enclosure url="https://dts.podtrac.com/redirect.mp3/podcasts.captivate.fm/media/a0c0fc68-ae72-45c9-8c3e-9018366aa1d8/505-2023-11-14-Episode-272-Final-converted.mp3" length="13024332" type="audio/mpeg"/><itunes:duration>10:51</itunes:duration><itunes:explicit>false</itunes:explicit><itunes:episodeType>full</itunes:episodeType><itunes:season>1</itunes:season><itunes:episode>272</itunes:episode><itunes:season>1</itunes:season><podcast:episode>272</podcast:episode><podcast:season>1</podcast:season><itunes:author>Contributors from Around the World</itunes:author></item><item><title>Episode #271: Edwin Kwan: Singapore Marina Bay Sands Suffers Data Breach Impacting 665K Customers; Katy Craig: PHaaS Provider BPL Taken Down; Hillary Coover: Boeing&apos;s recent cybersecurity breach; Marcel Brown: This Day in Tech History</title><itunes:title>Episode #271: Edwin Kwan: Singapore Marina Bay Sands Suffers Data Breach Impacting 665K Customers; Katy Craig: PHaaS Provider BPL Taken Down; Hillary Coover: Boeing&apos;s recent cybersecurity breach; Marcel Brown: This Day in Tech History</itunes:title><description><![CDATA[<p>Free, ungated access to all 270+ episodes of “It’s 5:05!” on your favorite podcast platforms: <a href="https://bit.ly/505-updates" rel="noopener noreferrer" target="_blank">https://bit.ly/505-updates</a>. You’re welcome to 𝗿𝗲𝗽𝗼𝘀𝘁 if your followers will find this of value.</p><p>The stories we’re covering today.</p><p>Marcel Brown: November 12, 2000. Bill Gates demonstrates a functional prototype of a tablet PC. Microsoft claims the Tablet PC will represent the next major evolution in PC design and functionality. However, the Tablet PC initiative never really takes off, and it isn't until Apple introduced the iPad in 2010 that tablet computing is widely adopted.</p><p>Edwin Kwan: Marina Bay Sands in Singapore has disclosed that they  suffered a data breach impacting 665,000 customers. It became aware of the security incident on 20th October,  2023, which involved unauthorized third-party access on the 19th and 20th of October. </p><p>Hillary Coover: Boeing's recent cybersecurity breach reveal vulnerabilities in the aerospace industry? Boeing revealed on Friday that data from its systems was compromised by a malicious ransomware attacker.    </p><p>Katy Craig: Malaysian police have taken down the notorious Phishing-as-a-Service provider, BulletProftLink, and apprehended eight suspects, including the platform's  main administrator. </p>]]></description><content:encoded><![CDATA[<p>Free, ungated access to all 270+ episodes of “It’s 5:05!” on your favorite podcast platforms: <a href="https://bit.ly/505-updates" rel="noopener noreferrer" target="_blank">https://bit.ly/505-updates</a>. You’re welcome to 𝗿𝗲𝗽𝗼𝘀𝘁 if your followers will find this of value.</p><p>The stories we’re covering today.</p><p>Marcel Brown: November 12, 2000. Bill Gates demonstrates a functional prototype of a tablet PC. Microsoft claims the Tablet PC will represent the next major evolution in PC design and functionality. However, the Tablet PC initiative never really takes off, and it isn't until Apple introduced the iPad in 2010 that tablet computing is widely adopted.</p><p>Edwin Kwan: Marina Bay Sands in Singapore has disclosed that they  suffered a data breach impacting 665,000 customers. It became aware of the security incident on 20th October,  2023, which involved unauthorized third-party access on the 19th and 20th of October. </p><p>Hillary Coover: Boeing's recent cybersecurity breach reveal vulnerabilities in the aerospace industry? Boeing revealed on Friday that data from its systems was compromised by a malicious ransomware attacker.    </p><p>Katy Craig: Malaysian police have taken down the notorious Phishing-as-a-Service provider, BulletProftLink, and apprehended eight suspects, including the platform's  main administrator. </p>]]></content:encoded><link><![CDATA[https://3zozb9fxlbueipjyapmaas.captivate.fm/episode/episode-271-edwin-kwan-singapore-marina-bay-sands-suffers-data-breach-impacting-665k-customers-katy-craig-phaas-provider-bpl-taken-down-hillary-coover-boeings-recent-cybersecurity-breach-marcel-brown-this-day-in-tech-history]]></link><guid isPermaLink="false">2ffee815-4cfb-40bb-b054-9ffd32143ec2</guid><itunes:image href="https://artwork.captivate.fm/33e2a4e7-a936-4ef5-905a-3a72363cfbe4/BkhMbfQsRHQi9QFk9GvnUJSv.png"/><dc:creator><![CDATA[Contributors from Around the World]]></dc:creator><pubDate>Mon, 13 Nov 2023 16:45:00 -0400</pubDate><enclosure url="https://dts.podtrac.com/redirect.mp3/podcasts.captivate.fm/media/435b320b-145d-4bcc-b42d-b05de9b9d7ac/505-2023-11-13-Episode-271-Final-converted.mp3" length="11057834" type="audio/mpeg"/><itunes:duration>09:13</itunes:duration><itunes:explicit>false</itunes:explicit><itunes:episodeType>full</itunes:episodeType><itunes:season>1</itunes:season><itunes:episode>271</itunes:episode><itunes:season>1</itunes:season><podcast:episode>271</podcast:episode><podcast:season>1</podcast:season><itunes:author>Contributors from Around the World</itunes:author></item><item><title>Episode #270: Edwin Kwan: WhatsApp Introduces Location Privacy Feature; Hillary Coover: A Shift Towards Empowering Users for Image Authenticity; Olimpiu Pop: And the gold medal for the largest non-payroll goes to…; Val Cole: This Day in Tech History</title><itunes:title>Episode #270: Edwin Kwan: WhatsApp Introduces Location Privacy Feature; Hillary Coover: A Shift Towards Empowering Users for Image Authenticity; Olimpiu Pop: And the gold medal for the largest non-payroll goes to…; Val Cole: This Day in Tech History</itunes:title><description><![CDATA[<p>Free, ungated access to all 270+ episodes of “It’s 5:05!” on your favorite podcast platforms: <a href="https://bit.ly/505-updates" rel="noopener noreferrer" target="_blank">https://bit.ly/505-updates</a>. You’re welcome to 𝗿𝗲𝗽𝗼𝘀𝘁 if your followers will find this of value.</p><p>The stories we’re covering today.</p><p>Val Cole: November 10th, 1983.  In 1983, which was 25 years before I was born, Microsoft announced version 1. 0 of Windows. It was the first graphical user interface for IBM compatible PCs.</p><p>Edwin Kwan: WhatsApp is rolling out a privacy feature that allows users to keep their location private.  However, there is a potential trade off. The phone quality might be reduced due to the connection relay via the  WhatsApp servers. </p><p>Hillary Coover: We know many innovators are working to find ways to determine an image's authenticity with detection technology. What if there's another way? What if users held the power to determine image authenticity through content credentials? </p><p>Olimpiu Pop: Based on estimates from the State of the Software Supply Chain, 96 percent of the running software is open source, and where there are high percentages, there is also government. And government regulates.  Given the legislative changes around the globe, does that mean that open source is preparing to enter a new era? </p>]]></description><content:encoded><![CDATA[<p>Free, ungated access to all 270+ episodes of “It’s 5:05!” on your favorite podcast platforms: <a href="https://bit.ly/505-updates" rel="noopener noreferrer" target="_blank">https://bit.ly/505-updates</a>. You’re welcome to 𝗿𝗲𝗽𝗼𝘀𝘁 if your followers will find this of value.</p><p>The stories we’re covering today.</p><p>Val Cole: November 10th, 1983.  In 1983, which was 25 years before I was born, Microsoft announced version 1. 0 of Windows. It was the first graphical user interface for IBM compatible PCs.</p><p>Edwin Kwan: WhatsApp is rolling out a privacy feature that allows users to keep their location private.  However, there is a potential trade off. The phone quality might be reduced due to the connection relay via the  WhatsApp servers. </p><p>Hillary Coover: We know many innovators are working to find ways to determine an image's authenticity with detection technology. What if there's another way? What if users held the power to determine image authenticity through content credentials? </p><p>Olimpiu Pop: Based on estimates from the State of the Software Supply Chain, 96 percent of the running software is open source, and where there are high percentages, there is also government. And government regulates.  Given the legislative changes around the globe, does that mean that open source is preparing to enter a new era? </p>]]></content:encoded><link><![CDATA[https://3zozb9fxlbueipjyapmaas.captivate.fm/episode/episode-270-edwin-kwan-whatsapp-introduces-location-privacy-feature-hillary-coover-a-shift-towards-empowering-users-for-image-authenticity-olimpiu-pop-and-the-gold-medal-for-the-largest-non-payroll-goes-to-val-cole-this-day-in-tech-history]]></link><guid isPermaLink="false">00dd71f1-676c-46c5-9981-81c45e227c36</guid><itunes:image href="https://artwork.captivate.fm/33e2a4e7-a936-4ef5-905a-3a72363cfbe4/BkhMbfQsRHQi9QFk9GvnUJSv.png"/><dc:creator><![CDATA[Contributors from Around the World]]></dc:creator><pubDate>Fri, 10 Nov 2023 16:45:00 -0400</pubDate><enclosure url="https://dts.podtrac.com/redirect.mp3/podcasts.captivate.fm/media/07318969-bb2e-4ee1-8f69-e81f690f432f/505-2023-11-10-Episode-270-Final-converted.mp3" length="9618487" type="audio/mpeg"/><itunes:duration>08:01</itunes:duration><itunes:explicit>false</itunes:explicit><itunes:episodeType>full</itunes:episodeType><itunes:season>1</itunes:season><itunes:episode>270</itunes:episode><itunes:season>1</itunes:season><podcast:episode>270</podcast:episode><podcast:season>1</podcast:season><itunes:author>Contributors from Around the World</itunes:author></item><item><title>Episode #269: Edwin Kwan: WhatsApp Mods for Android May Contain Spyware; Ian Garrett: Cyber Attackers and Defenders Enter an AI Arms Race; Katy Craig: Russia, Iran, and China: US 2024 Election Meddling Likely; Mark Miller: This Day in Tech History</title><itunes:title>Episode #269: Edwin Kwan: WhatsApp Mods for Android May Contain Spyware; Ian Garrett: Cyber Attackers and Defenders Enter an AI Arms Race; Katy Craig: Russia, Iran, and China: US 2024 Election Meddling Likely; Mark Miller: This Day in Tech History</itunes:title><description><![CDATA[<p>Free, ungated access to all 265+ episodes of “It’s 5:05!” on your favorite podcast platforms: <a href="https://bit.ly/505-updates" rel="noopener noreferrer" target="_blank">https://bit.ly/505-updates</a>. You’re welcome to 𝗿𝗲𝗽𝗼𝘀𝘁 if your followers will find this of value.</p><p>The stories we’re covering today.</p><p>Marcel Brown: November 9, 1922. Albert Einstein is named the winner of the 1922 nobel Prize for Physics for his explanation of the photoelectric effect. The Nobel Committee passed on several nominations for his many other seminal contributions, although these led to prizes for others who later applied more advanced technology to experimentally verify Einstein's work. </p><p>Edwin Kwan: Security researchers have discovered modified versions of the Instant Messaging app being promoted and on website advertising on Telegram. Those versions contains suspicious components, such as a service and broadcast receiver, which cannot be found on the original WhatsApp client.</p><p>Katy Craig: In the run up to the 2024 U. S. presidential election and key global elections, Russia, Iran, and China are expected to intensify their interference efforts, according to a Microsoft Threat Analysis report. Russia, in particular, is viewed as the most committed and capable threat to the upcoming U. S. election.   </p><p>Ian Garrett: Artificial intelligence is reshaping the dynamics of cybersecurity, offering both opportunities and challenges.  The survey by Axonius, conducted among IT and security decision makers, reveals that 76 percent of organizations are increasing their spending on AI and machine learning compared to the previous year.  </p>]]></description><content:encoded><![CDATA[<p>Free, ungated access to all 265+ episodes of “It’s 5:05!” on your favorite podcast platforms: <a href="https://bit.ly/505-updates" rel="noopener noreferrer" target="_blank">https://bit.ly/505-updates</a>. You’re welcome to 𝗿𝗲𝗽𝗼𝘀𝘁 if your followers will find this of value.</p><p>The stories we’re covering today.</p><p>Marcel Brown: November 9, 1922. Albert Einstein is named the winner of the 1922 nobel Prize for Physics for his explanation of the photoelectric effect. The Nobel Committee passed on several nominations for his many other seminal contributions, although these led to prizes for others who later applied more advanced technology to experimentally verify Einstein's work. </p><p>Edwin Kwan: Security researchers have discovered modified versions of the Instant Messaging app being promoted and on website advertising on Telegram. Those versions contains suspicious components, such as a service and broadcast receiver, which cannot be found on the original WhatsApp client.</p><p>Katy Craig: In the run up to the 2024 U. S. presidential election and key global elections, Russia, Iran, and China are expected to intensify their interference efforts, according to a Microsoft Threat Analysis report. Russia, in particular, is viewed as the most committed and capable threat to the upcoming U. S. election.   </p><p>Ian Garrett: Artificial intelligence is reshaping the dynamics of cybersecurity, offering both opportunities and challenges.  The survey by Axonius, conducted among IT and security decision makers, reveals that 76 percent of organizations are increasing their spending on AI and machine learning compared to the previous year.  </p>]]></content:encoded><link><![CDATA[https://3zozb9fxlbueipjyapmaas.captivate.fm/episode/episode-269-edwin-kwan-security-assessed-apps-now-receives-badge-on-google-play-store-ian-garrett-cyber-attackers-and-defenders-enter-an-ai-arms-race-katy-craig-russia-iran-and-china-us-2024-election-meddling-likely-mark-miller-this-day-in-tech-history]]></link><guid isPermaLink="false">97e2eb08-e92b-49a1-b780-49126f04c402</guid><itunes:image href="https://artwork.captivate.fm/33e2a4e7-a936-4ef5-905a-3a72363cfbe4/BkhMbfQsRHQi9QFk9GvnUJSv.png"/><dc:creator><![CDATA[Contributors from Around the World]]></dc:creator><pubDate>Thu, 09 Nov 2023 16:45:00 -0400</pubDate><enclosure url="https://dts.podtrac.com/redirect.mp3/podcasts.captivate.fm/media/613c6f44-2151-466c-a24c-e4ed5dcbac1a/505-2023-11-09-Episode-269-Final-converted.mp3" length="10938612" type="audio/mpeg"/><itunes:duration>11:24</itunes:duration><itunes:explicit>false</itunes:explicit><itunes:episodeType>full</itunes:episodeType><itunes:season>1</itunes:season><itunes:episode>269</itunes:episode><itunes:season>1</itunes:season><podcast:episode>269</podcast:episode><podcast:season>1</podcast:season><itunes:author>Contributors from Around the World</itunes:author></item><item><title>Episode #268: Edwin Kwan: Security Assessed Apps Now Receives Badge on Google Play Store; Olimpiu Pop: StarCoder - An Open Source State Of The Art Code LLM; Katy Craig: China’s Global Cyber Power; Marcel Brown: This Day in Tech History</title><itunes:title>Episode #268: Edwin Kwan: Security Assessed Apps Now Receives Badge on Google Play Store; Olimpiu Pop: StarCoder - An Open Source State Of The Art Code LLM; Katy Craig: China’s Global Cyber Power; Marcel Brown: This Day in Tech History</itunes:title><description><![CDATA[<p>Free, ungated access to all 265+ episodes of “It’s 5:05!” on your favorite podcast platforms: <a href="https://bit.ly/505-updates" rel="noopener noreferrer" target="_blank">https://bit.ly/505-updates</a>. You’re welcome to 𝗿𝗲𝗽𝗼𝘀𝘁 if your followers will find this of value.</p><p>The stories we’re covering today.</p><p>Marcel Brown: November 8, 1895. German physics professor Wilhelm Röntgen stumbles upon what he would later describe as "X-rays" while experimenting with electrical discharge tubes. Curious as to what was causing a faint green glow on a nearby fluorescent screen, Röntgen began systematically studying the unknown rays and published the first paper on the phenomenon less than two months later.  </p><p>Edwin Kwan: Google Play Store has rolled out a new badge to highlight apps that have been independently security reviewed. Google has emphasized that the security validation process only checks if a developer has prioritized security and privacy practices, it does not imply that the validated app is free of vulnerabilities  </p><p>Katy Craig:  In recent years, Chinese state-sponsored cyber operations have transformed into a more mature and coordinated threat. They now focus on exploiting vulnerabilities in public-facing security and network appliances, both known and zero-day.  Chinese cyber-enabled economic espionage has evolved towards a more targeted approach, supporting specific strategic and geopolitical goals, such as the Belt and Road Initiative.</p><p>Olimpiu Pop: BigCode is an initiative from HuggingFace to provide open-source, state-of-the-art models for code generation. StarCoder is one of the stars, maybe the brightest. It was the outcome of refined training with Python tokens of StarCoderBase.  </p>]]></description><content:encoded><![CDATA[<p>Free, ungated access to all 265+ episodes of “It’s 5:05!” on your favorite podcast platforms: <a href="https://bit.ly/505-updates" rel="noopener noreferrer" target="_blank">https://bit.ly/505-updates</a>. You’re welcome to 𝗿𝗲𝗽𝗼𝘀𝘁 if your followers will find this of value.</p><p>The stories we’re covering today.</p><p>Marcel Brown: November 8, 1895. German physics professor Wilhelm Röntgen stumbles upon what he would later describe as "X-rays" while experimenting with electrical discharge tubes. Curious as to what was causing a faint green glow on a nearby fluorescent screen, Röntgen began systematically studying the unknown rays and published the first paper on the phenomenon less than two months later.  </p><p>Edwin Kwan: Google Play Store has rolled out a new badge to highlight apps that have been independently security reviewed. Google has emphasized that the security validation process only checks if a developer has prioritized security and privacy practices, it does not imply that the validated app is free of vulnerabilities  </p><p>Katy Craig:  In recent years, Chinese state-sponsored cyber operations have transformed into a more mature and coordinated threat. They now focus on exploiting vulnerabilities in public-facing security and network appliances, both known and zero-day.  Chinese cyber-enabled economic espionage has evolved towards a more targeted approach, supporting specific strategic and geopolitical goals, such as the Belt and Road Initiative.</p><p>Olimpiu Pop: BigCode is an initiative from HuggingFace to provide open-source, state-of-the-art models for code generation. StarCoder is one of the stars, maybe the brightest. It was the outcome of refined training with Python tokens of StarCoderBase.  </p>]]></content:encoded><link><![CDATA[https://3zozb9fxlbueipjyapmaas.captivate.fm/episode/episode-268-edwin-kwan-security-assessed-apps-now-receives-badge-on-google-play-store-olimpiu-pop-starcoder-an-open-source-state-of-the-art-code-llm-katy-craig-chinas-global-cyber-power-marcel-brown-this-day-in-tech-history]]></link><guid isPermaLink="false">06da2f49-9395-42c3-a6df-fe034796af19</guid><itunes:image href="https://artwork.captivate.fm/abeed5cc-a5d6-471e-a630-735a84c9051e/p3RuFs5YLCt4khXHTF6Kggad.jpg"/><dc:creator><![CDATA[Contributors from Around the World]]></dc:creator><pubDate>Wed, 08 Nov 2023 16:45:00 -0400</pubDate><enclosure url="https://dts.podtrac.com/redirect.mp3/podcasts.captivate.fm/media/d742f99f-c13a-4ec9-b55b-790e140264ed/505-2023-11-08-Episode-268-Final-converted.mp3" length="11237036" type="audio/mpeg"/><itunes:duration>09:22</itunes:duration><itunes:explicit>false</itunes:explicit><itunes:episodeType>full</itunes:episodeType><itunes:season>1</itunes:season><itunes:episode>268</itunes:episode><itunes:season>1</itunes:season><podcast:episode>268</podcast:episode><podcast:season>1</podcast:season><itunes:author>Contributors from Around the World</itunes:author></item><item><title>Episode #267: Edwin Kwan: Okta Suffered Data Breach Impacting Their Employees; Ian Garrett: Rising ransomware attacks drive zero trust adoption; Olimpiu Pop: BigCode A Project With a Mission: Build State Of The Art LLM Coding Models That Are Open</title><itunes:title>Episode #267: Edwin Kwan: Okta Suffered Data Breach Impacting Their Employees; Ian Garrett: Rising ransomware attacks drive zero trust adoption; Olimpiu Pop: BigCode A Project With a Mission: Build State Of The Art LLM Coding Models That Are Open</itunes:title><description><![CDATA[<p>Free, ungated access to all 265+ episodes of “It’s 5:05!” on your favorite podcast platforms: <a href="https://bit.ly/505-updates" rel="noopener noreferrer" target="_blank">https://bit.ly/505-updates</a>. You’re welcome to 𝗿𝗲𝗽𝗼𝘀𝘁 if your followers will find this of value.</p><p>The stories we’re covering today.</p><p>Edwin Kwan: Okta has suffered yet another data breach, this one affecting their employees' personal information.</p><p>Ian Garrett: How has ransomware impacted zero-trust adoption? With the rising threat of ransomware attacks, organizations have turned to the adoption of zero-trust and network segmentation strategies to counter these threats </p><p>Olimpiu Pop: Even though there was always the choice, open-source versus closed-source, now, again, the world is at a turning point. Will you embrace open or closed?</p>]]></description><content:encoded><![CDATA[<p>Free, ungated access to all 265+ episodes of “It’s 5:05!” on your favorite podcast platforms: <a href="https://bit.ly/505-updates" rel="noopener noreferrer" target="_blank">https://bit.ly/505-updates</a>. You’re welcome to 𝗿𝗲𝗽𝗼𝘀𝘁 if your followers will find this of value.</p><p>The stories we’re covering today.</p><p>Edwin Kwan: Okta has suffered yet another data breach, this one affecting their employees' personal information.</p><p>Ian Garrett: How has ransomware impacted zero-trust adoption? With the rising threat of ransomware attacks, organizations have turned to the adoption of zero-trust and network segmentation strategies to counter these threats </p><p>Olimpiu Pop: Even though there was always the choice, open-source versus closed-source, now, again, the world is at a turning point. Will you embrace open or closed?</p>]]></content:encoded><link><![CDATA[https://3zozb9fxlbueipjyapmaas.captivate.fm/episode/episode-267-edwin-kwan-okta-suffered-data-breach-impacting-their-employees-ian-garrett-rising-ransomware-attacks-drive-zero-trust-adoption-olimpiu-pop-bigcode-a-project-with-a-mission-build-state-of-the-art-llm-coding-models-that-are-open]]></link><guid isPermaLink="false">ac3a1c7d-b79b-4e6c-a4c8-6f6b115a7520</guid><itunes:image href="https://artwork.captivate.fm/0cfb8ebc-36ef-4822-be24-58ca8252a1c0/so7OuC6Eb_PvtlpypBWO8hQv.jpg"/><dc:creator><![CDATA[Contributors from Around the World]]></dc:creator><pubDate>Tue, 07 Nov 2023 16:45:00 -0400</pubDate><enclosure url="https://dts.podtrac.com/redirect.mp3/podcasts.captivate.fm/media/37327acc-df4e-450a-8c4f-1b965648744c/505-2023-11-07-Episode-267-Final-converted.mp3" length="8088234" type="audio/mpeg"/><itunes:duration>06:44</itunes:duration><itunes:explicit>false</itunes:explicit><itunes:episodeType>full</itunes:episodeType><itunes:season>1</itunes:season><itunes:episode>267</itunes:episode><itunes:season>1</itunes:season><podcast:episode>267</podcast:episode><podcast:season>1</podcast:season><itunes:author>Contributors from Around the World</itunes:author></item><item><title>Episode #266: Edwin Kwan: WeChat and Kaspersky Apps Banned on Canadian Government Devices; Hillary Coover: Meta&apos;s Privacy Pivot: Upholding Principles or Extortion?; Mark Miller: Just in Time for Día de los Muertos: KandyKorn Malware; Marcel Brown: This Day in Tech History</title><itunes:title>Episode #266: Edwin Kwan: WeChat and Kaspersky Apps Banned on Canadian Government Devices; Hillary Coover: Meta&apos;s Privacy Pivot: Upholding Principles or Extortion?; Mark Miller: Just in Time for Día de los Muertos: KandyKorn Malware; Marcel Brown: This Day in Tech History</itunes:title><description><![CDATA[<p>Free, ungated access to all 265+ episodes of “It’s 5:05!” on your favorite podcast platforms: <a href="https://bit.ly/505-updates" rel="noopener noreferrer" target="_blank">https://bit.ly/505-updates</a>. You’re welcome to 𝗿𝗲𝗽𝗼𝘀𝘁 if your followers will find this of value.</p><p>The stories we’re covering today.</p><p>Marcel Brown: November 5th, 2007. Google introduces the Android platform, it's mobile operating system for cell phones based on a modified version of the Linux operating system. The first Android-based phone would ship in September of 2008.  </p><p>Edwin Kwan: The Canadian government has announced a ban on the use of WeChat and Kaspersky's apps on government-issued mobile devices.  The Canadian government banned TikTok in February 2023  and is now adding Tencent's WeChat and Kaspersky to the list.  </p><p>Mark Miller: Leave it to the North Korean nation state to release KandyKorn malware in time for the holiday season, starting with the Day of the Dead.  On October 31st, Elastic Security Lab documented a malware infection that exposed an attempt by the DPRK to infect crypto exchange platforms through their blockchain engineers.  </p><p>Hillary Coover: The debate over the cost of privacy in the face of corporate surveillance is intensifying, as Meta introduces a subscription model allowing users to opt out of behavioral advertising. While Meta argues it aligns with regulatory requirements, critics see it as extortion and an attempt to maintain the status quo, potentially leading to further legal battles. What would you pay for privacy?</p>]]></description><content:encoded><![CDATA[<p>Free, ungated access to all 265+ episodes of “It’s 5:05!” on your favorite podcast platforms: <a href="https://bit.ly/505-updates" rel="noopener noreferrer" target="_blank">https://bit.ly/505-updates</a>. You’re welcome to 𝗿𝗲𝗽𝗼𝘀𝘁 if your followers will find this of value.</p><p>The stories we’re covering today.</p><p>Marcel Brown: November 5th, 2007. Google introduces the Android platform, it's mobile operating system for cell phones based on a modified version of the Linux operating system. The first Android-based phone would ship in September of 2008.  </p><p>Edwin Kwan: The Canadian government has announced a ban on the use of WeChat and Kaspersky's apps on government-issued mobile devices.  The Canadian government banned TikTok in February 2023  and is now adding Tencent's WeChat and Kaspersky to the list.  </p><p>Mark Miller: Leave it to the North Korean nation state to release KandyKorn malware in time for the holiday season, starting with the Day of the Dead.  On October 31st, Elastic Security Lab documented a malware infection that exposed an attempt by the DPRK to infect crypto exchange platforms through their blockchain engineers.  </p><p>Hillary Coover: The debate over the cost of privacy in the face of corporate surveillance is intensifying, as Meta introduces a subscription model allowing users to opt out of behavioral advertising. While Meta argues it aligns with regulatory requirements, critics see it as extortion and an attempt to maintain the status quo, potentially leading to further legal battles. What would you pay for privacy?</p>]]></content:encoded><link><![CDATA[https://3zozb9fxlbueipjyapmaas.captivate.fm/episode/episode-266-edwin-kwan-wechat-and-kaspersky-apps-banned-on-canadian-government-devices-hillary-coover-metas-privacy-pivot-upholding-principles-or-extortion-mark-miller-just-in-time-for-dia-de-los-muertos-kandykorn-malware-marcel-brown-this-day-in-tech-...]]></link><guid isPermaLink="false">67efe7d7-3b48-42ec-8332-b62605356d6f</guid><itunes:image href="https://artwork.captivate.fm/50ace8cd-9d66-45fa-8056-1b55b42b9568/V3leQmtUPf4sTHlbjNDneyXC.jpg"/><dc:creator><![CDATA[Contributors from Around the World]]></dc:creator><pubDate>Mon, 06 Nov 2023 16:45:00 -0400</pubDate><enclosure url="https://dts.podtrac.com/redirect.mp3/podcasts.captivate.fm/media/fc5518ff-0a27-458d-a41b-85efb2c95fde/505-2023-11-06-Episode-266-Final-converted.mp3" length="12895286" type="audio/mpeg"/><itunes:duration>10:45</itunes:duration><itunes:explicit>false</itunes:explicit><itunes:episodeType>full</itunes:episodeType><itunes:season>1</itunes:season><itunes:episode>266</itunes:episode><itunes:season>1</itunes:season><podcast:episode>266</podcast:episode><podcast:season>1</podcast:season><itunes:author>Contributors from Around the World</itunes:author></item><item><title>Episode #265: Edwin Kwan: Who Should Bear the Cost of Invoice Scam?; Marcel Brown: This Day in Tech History; Olimpiu Pop: DORA Metrics - an agile, emotionally safe culture is the way; Shannon Lietz: Security in the DORA Report ; Nathen Harvey: Insights on AI in the DORA Report</title><itunes:title>Episode #265: Edwin Kwan: Who Should Bear the Cost of Invoice Scam?; Marcel Brown: This Day in Tech History; Olimpiu Pop: DORA Metrics - an agile, emotionally safe culture is the way; Shannon Lietz: Security in the DORA Report ; Nathen Harvey: Insights on AI in the DORA Report</itunes:title><description><![CDATA[<p>Free, ungated access to all 265+ episodes of “It’s 5:05!” on your favorite podcast platforms: <a href="https://bit.ly/505-updates" rel="noopener noreferrer" target="_blank">https://bit.ly/505-updates</a>. You’re welcome to 𝗿𝗲𝗽𝗼𝘀𝘁 if your followers will find this of value.</p><p>The stories we’re covering today.</p><p>Marcel Brown: November 3rd, 1957. The Soviet Union launches Sputnik the second spacecraft launched into Earth orbit and the first spacecraft to carry a living creature into orbit. Laika, the Siberian Husky dog, unfortunately only survived a few hours into the flight and died from stress and overheating.</p><p>Edwin Kwan: Who should bear the cost of invoice scam? The victim, the company the money was meant to be sent to, or the bank? A couple tried to purchase a Mercedes-Benz from a dealership, but transferred the money to hackers due to an invoice scam. Mercedes-Benz is claiming that the invoice scam was due to the customer's email being compromised. </p><p>Olimpiu Pop :DORA Metrics became part of the silver bullets arsenal of the software industry. Follow the key metrics and all is well, right? Follow deployment frequency, time to restore the service, lead time for a change, and change failure rate and you're all set. Not really. It's much more than that. </p><p>Shannon Lietz: This year, what I saw that was most remarkable in the report was the AI section.  There's some interesting insights to glean from that section of the report.  In particular, what folks are thinking about in terms of AI contributions. Top three was quite insightful if you ask me. Analyzing data, writing code clocks or data functions, and analyzing security. </p><p>Nathen Harvey: Back in January of 2023, AI was certainly hot, but how do we assess its impact on things like software delivery performance and organizational performance. This was a thing that we as researchers really struggled with. So we asked this question... " for the primary application or service that you work on, how important is the role of AI in contributing to each of the following tasks?"</p>]]></description><content:encoded><![CDATA[<p>Free, ungated access to all 265+ episodes of “It’s 5:05!” on your favorite podcast platforms: <a href="https://bit.ly/505-updates" rel="noopener noreferrer" target="_blank">https://bit.ly/505-updates</a>. You’re welcome to 𝗿𝗲𝗽𝗼𝘀𝘁 if your followers will find this of value.</p><p>The stories we’re covering today.</p><p>Marcel Brown: November 3rd, 1957. The Soviet Union launches Sputnik the second spacecraft launched into Earth orbit and the first spacecraft to carry a living creature into orbit. Laika, the Siberian Husky dog, unfortunately only survived a few hours into the flight and died from stress and overheating.</p><p>Edwin Kwan: Who should bear the cost of invoice scam? The victim, the company the money was meant to be sent to, or the bank? A couple tried to purchase a Mercedes-Benz from a dealership, but transferred the money to hackers due to an invoice scam. Mercedes-Benz is claiming that the invoice scam was due to the customer's email being compromised. </p><p>Olimpiu Pop :DORA Metrics became part of the silver bullets arsenal of the software industry. Follow the key metrics and all is well, right? Follow deployment frequency, time to restore the service, lead time for a change, and change failure rate and you're all set. Not really. It's much more than that. </p><p>Shannon Lietz: This year, what I saw that was most remarkable in the report was the AI section.  There's some interesting insights to glean from that section of the report.  In particular, what folks are thinking about in terms of AI contributions. Top three was quite insightful if you ask me. Analyzing data, writing code clocks or data functions, and analyzing security. </p><p>Nathen Harvey: Back in January of 2023, AI was certainly hot, but how do we assess its impact on things like software delivery performance and organizational performance. This was a thing that we as researchers really struggled with. So we asked this question... " for the primary application or service that you work on, how important is the role of AI in contributing to each of the following tasks?"</p>]]></content:encoded><link><![CDATA[https://3zozb9fxlbueipjyapmaas.captivate.fm/episode/episode-265-edwin-kwan-who-should-bear-the-cost-of-invoice-scam-marcel-brown-this-day-in-tech-history-olimpiu-pop-dora-metrics-an-agile-emotionally-safe-culture-is-the-way-shannon-lietz-nathan-harvey-]]></link><guid isPermaLink="false">82d696e0-eec5-4358-b873-eedc4feb7798</guid><itunes:image href="https://artwork.captivate.fm/77a842c3-0672-429d-81d1-799811fc0e00/7Du8Xy06vZhJH6sWrAeoM2cy.jpg"/><dc:creator><![CDATA[Contributors from Around the World]]></dc:creator><pubDate>Fri, 03 Nov 2023 16:45:00 -0400</pubDate><enclosure url="https://dts.podtrac.com/redirect.mp3/podcasts.captivate.fm/media/4c6bf6e8-aa64-435c-810a-4db657cab8ef/505-2023-11-03-Episode-265-Final-converted.mp3" length="20937343" type="audio/mpeg"/><itunes:duration>17:27</itunes:duration><itunes:explicit>false</itunes:explicit><itunes:episodeType>full</itunes:episodeType><itunes:season>1</itunes:season><itunes:episode>265</itunes:episode><itunes:season>1</itunes:season><podcast:episode>265</podcast:episode><podcast:season>1</podcast:season><itunes:author>Contributors from Around the World</itunes:author></item><item><title>Episode #264: Edwin Kwan: SEC Charges SolarWinds and CISO for Misleading Investors Before Cyber Attack; Ian Garrett: The World Needs 4 Million More Cybersecurity Professionals; Hillary Coover: Global Alliance Takes a Stand: No More Ransom Payments to Cybercriminals; Marcel Brown: This Day in Tech History</title><itunes:title>Episode #264: Edwin Kwan: SEC Charges SolarWinds and CISO for Misleading Investors Before Cyber Attack; Ian Garrett: The World Needs 4 Million More Cybersecurity Professionals; Hillary Coover: Global Alliance Takes a Stand: No More Ransom Payments to Cybercriminals; Marcel Brown: This Day in Tech History</itunes:title><description><![CDATA[<p>Free, ungated access to all 260+ episodes of “It’s 5:05!” on your favorite podcast platforms: <a href="https://bit.ly/505-updates" rel="noopener noreferrer" target="_blank">https://bit.ly/505-updates</a>. You’re welcome to 𝗿𝗲𝗽𝗼𝘀𝘁 if your followers will find this of value.</p><p>The stories we’re covering today.</p><p>Marcel Brown: November 2nd, 1988. Robert Morris of Cornell University launches a self-replicating worm as part of a research project designed to determine the size of the early internet.  Due to a programming error, the "Morris Worm" began repeatedly infecting machines, clogging network traffic, and causing machines to crash. </p><p>Edwin Kwan: The US Securities and Exchange Commission has announced charges against SolarWinds Corporation and its CISO, its Chief Information Security Officer, for fraud and internal control failures relating to allegedly known cybersecurity risks and vulnerabilities. </p><p>Hillary Coover: A coalition of 40 countries, led by the United States, is committing to never pay ransoms to cybercriminals again. This initiative, known as the International Counter Ransomware Initiative, ICRI, is a response to the increase of ransomware attacks on a global scale with the United States accounting for 46% of such incidents.</p><p>Ian Garrett: A recent study from the International Information Systems Security Certification Consortium, the nonprofit member organization for cybersecurity professionals, highlights that the workforce shortage in the cybersecurity industry has reached an all-time high of nearly 4 million people. </p>]]></description><content:encoded><![CDATA[<p>Free, ungated access to all 260+ episodes of “It’s 5:05!” on your favorite podcast platforms: <a href="https://bit.ly/505-updates" rel="noopener noreferrer" target="_blank">https://bit.ly/505-updates</a>. You’re welcome to 𝗿𝗲𝗽𝗼𝘀𝘁 if your followers will find this of value.</p><p>The stories we’re covering today.</p><p>Marcel Brown: November 2nd, 1988. Robert Morris of Cornell University launches a self-replicating worm as part of a research project designed to determine the size of the early internet.  Due to a programming error, the "Morris Worm" began repeatedly infecting machines, clogging network traffic, and causing machines to crash. </p><p>Edwin Kwan: The US Securities and Exchange Commission has announced charges against SolarWinds Corporation and its CISO, its Chief Information Security Officer, for fraud and internal control failures relating to allegedly known cybersecurity risks and vulnerabilities. </p><p>Hillary Coover: A coalition of 40 countries, led by the United States, is committing to never pay ransoms to cybercriminals again. This initiative, known as the International Counter Ransomware Initiative, ICRI, is a response to the increase of ransomware attacks on a global scale with the United States accounting for 46% of such incidents.</p><p>Ian Garrett: A recent study from the International Information Systems Security Certification Consortium, the nonprofit member organization for cybersecurity professionals, highlights that the workforce shortage in the cybersecurity industry has reached an all-time high of nearly 4 million people. </p>]]></content:encoded><link><![CDATA[https://3zozb9fxlbueipjyapmaas.captivate.fm/episode/episode-264-edwin-kwan-sec-charges-solarwinds-and-ciso-for-misleading-investors-before-cyber-attack-ian-garrett-the-world-needs-4-million-more-cybersecurity-professionals-hillary-coover-global-alliance-takes-a-stand-no-more-ransom-payments-to-cybercrim...]]></link><guid isPermaLink="false">e9b480da-b16f-49e3-aa64-2ff410748e82</guid><itunes:image href="https://artwork.captivate.fm/fc7345a3-e64c-4666-963c-b6bc651c9719/uvuLc4IE73ooAgMegU_pqwTz.jpg"/><dc:creator><![CDATA[Contributors from Around the World]]></dc:creator><pubDate>Thu, 02 Nov 2023 16:45:00 -0400</pubDate><enclosure url="https://dts.podtrac.com/redirect.mp3/podcasts.captivate.fm/media/c231deca-ba90-4ccd-bdac-75e5c29ad1ef/505-2023-11-02-Episode-264-Final-converted.mp3" length="11107990" type="audio/mpeg"/><itunes:duration>09:15</itunes:duration><itunes:explicit>false</itunes:explicit><itunes:episodeType>full</itunes:episodeType><itunes:season>1</itunes:season><itunes:episode>264</itunes:episode><itunes:season>1</itunes:season><podcast:episode>264</podcast:episode><podcast:season>1</podcast:season><itunes:author>Contributors from Around the World</itunes:author></item><item><title>Episode 263: Edwin Kwan: APT Malware Disguised as Crypto miner Infects One Million Systems; Mark Miller: Surprise, Surprise! SolarWinds Lied. Imagine that.; Hillary Coover: The Paradox of Cybersecurity: Increasing Threats, Decreasing Budgets, and Talent Shortages.; Marcel Brown: This Day in Tech History</title><itunes:title>Episode 263: Edwin Kwan: APT Malware Disguised as Crypto miner Infects One Million Systems; Mark Miller: Surprise, Surprise! SolarWinds Lied. Imagine that.; Hillary Coover: The Paradox of Cybersecurity: Increasing Threats, Decreasing Budgets, and Talent Shortages.; Marcel Brown: This Day in Tech History</itunes:title><description><![CDATA[<p>Free, ungated access to all 235+ episodes of “It’s 5:05!” on your favorite podcast platforms: <a href="https://bit.ly/505-updates" rel="noopener noreferrer" target="_blank">https://bit.ly/505-updates</a>. You’re welcome to 𝗿𝗲𝗽𝗼𝘀𝘁 if your followers will find this of value.</p><p>The stories we’re covering today.</p><p>Marcel Brown: November 1st, 1963. The largest radio telescope ever constructed, the Arecibo Observatory opened in Puerto Rico. It would be used for many major discoveries including the first direct imaging of an asteroid. </p><p>Hillary Coover: The cybersecurity landscape is experiencing a paradoxical challenge as cyberattacks continue to rise while budgets decrease and companies implement layoffs. A recent survey reveals that nearly half of cybersecurity professionals have seen their teams face spending cuts and personnel reductions in the past year, intensifying the pressure on these teams. </p><p>Edwin Kwan: A malware that was initially thought to be a crypto miner has been discovered to be a sophisticated spy platform.  The malware has infected over a million Windows and Linux systems.    </p><p>Mark Miller: On Monday, the Security and Exchange Commission filed suit against SolarWinds and their CISO, Tim Brown, for fraud and internal controls failure.   You remember the old Gomer Pyle episodes, right? "Surprise, surprise!" That's kind of what I feel like right now.  SolarWinds lied. Imagine that.</p>]]></description><content:encoded><![CDATA[<p>Free, ungated access to all 235+ episodes of “It’s 5:05!” on your favorite podcast platforms: <a href="https://bit.ly/505-updates" rel="noopener noreferrer" target="_blank">https://bit.ly/505-updates</a>. You’re welcome to 𝗿𝗲𝗽𝗼𝘀𝘁 if your followers will find this of value.</p><p>The stories we’re covering today.</p><p>Marcel Brown: November 1st, 1963. The largest radio telescope ever constructed, the Arecibo Observatory opened in Puerto Rico. It would be used for many major discoveries including the first direct imaging of an asteroid. </p><p>Hillary Coover: The cybersecurity landscape is experiencing a paradoxical challenge as cyberattacks continue to rise while budgets decrease and companies implement layoffs. A recent survey reveals that nearly half of cybersecurity professionals have seen their teams face spending cuts and personnel reductions in the past year, intensifying the pressure on these teams. </p><p>Edwin Kwan: A malware that was initially thought to be a crypto miner has been discovered to be a sophisticated spy platform.  The malware has infected over a million Windows and Linux systems.    </p><p>Mark Miller: On Monday, the Security and Exchange Commission filed suit against SolarWinds and their CISO, Tim Brown, for fraud and internal controls failure.   You remember the old Gomer Pyle episodes, right? "Surprise, surprise!" That's kind of what I feel like right now.  SolarWinds lied. Imagine that.</p>]]></content:encoded><link><![CDATA[https://3zozb9fxlbueipjyapmaas.captivate.fm/episode/episode-263-edwin-kwan-apt-malware-disguised-as-crypto-miner-infects-one-million-systems-mark-miller-surprise-surprise-solarwinds-lied-imagine-that-hillary-coover-the-paradox-of-cybersecurity-increasing-threats-decreasing-budgets-and-talent-shortages-m...]]></link><guid isPermaLink="false">099ac470-f89a-44fa-83b9-5a7606f7e5fb</guid><itunes:image href="https://artwork.captivate.fm/144c6830-47a5-4a24-8bf0-96929dacbe98/Kw_VvLbQadV3AYhzxMxA_wl-.jpg"/><dc:creator><![CDATA[Contributors from Around the World]]></dc:creator><pubDate>Wed, 01 Nov 2023 16:45:00 -0400</pubDate><enclosure url="https://dts.podtrac.com/redirect.mp3/podcasts.captivate.fm/media/869fcc5d-12c2-4693-9d62-03ec3848208c/505-2023-11-01-Episode-263-Final-converted.mp3" length="9769998" type="audio/mpeg"/><itunes:duration>10:11</itunes:duration><itunes:explicit>false</itunes:explicit><itunes:episodeType>full</itunes:episodeType><itunes:season>1</itunes:season><itunes:episode>263</itunes:episode><itunes:season>1</itunes:season><podcast:episode>263</podcast:episode><podcast:season>1</podcast:season><itunes:author>Contributors from Around the World</itunes:author></item><item><title>Episdoe #262: Edwin Kwan: Casio Data Breach affects over 120,000 customers in 149 countries; Ian Garrett: 6 Types of Supply Chain Attacks (Part 2); Hillary Coover: Keeping Perspective: Why the Social Media Surveillance Revelation Deserves a Thoughtful Look; Marcel Brown: This Day in Tech History</title><itunes:title>Episdoe #262: Edwin Kwan: Casio Data Breach affects over 120,000 customers in 149 countries; Ian Garrett: 6 Types of Supply Chain Attacks (Part 2); Hillary Coover: Keeping Perspective: Why the Social Media Surveillance Revelation Deserves a Thoughtful Look; Marcel Brown: This Day in Tech History</itunes:title><description><![CDATA[<p>Free, ungated access to all 260+ episodes of “It’s 5:05!” on your favorite podcast platforms: <a href="https://bit.ly/505-updates" rel="noopener noreferrer" target="_blank">https://bit.ly/505-updates</a>. You’re welcome to 𝗿𝗲𝗽𝗼𝘀𝘁 if your followers will find this of value.</p><p>The stories we’re covering today.</p><p>Marcel Brown: October 31st, 2000. Russia launches Soyuz TM-31 carrying the first crew to the International Space Station.  Between the 2011 retirement of the space shuttle and the 2020 demo flight of SpaceX Crew Dragon, the Soyuz served as the only means to ferry crew to or from the International Space Station. </p><p>Edwin Kwan: Casio has suffered a data breach that has affected over 120,000 customers in 149 countries. Casio said that the cause of the breach was due to some of the network settings in the development environment being disabled due to system operational error. </p><p>Hillary Coover: US and Customs Enforcement Agency, ICE, is employing an AI powered tool known as Giant Oak Search Technology to scan social media posts for content that it deems derogatory  to the United States. This revelation, first brought to light by 404 Media, has really ruffled some feathers. </p><p>Ian Garrett: This is the second part of our exploration into software supply chain attacks.  We'll explore dependency confusion, stolen SSL and code-signing certificates, the targeting of developers CI/CD infrastructure, and the use of social engineering to drop malicious code.   </p>]]></description><content:encoded><![CDATA[<p>Free, ungated access to all 260+ episodes of “It’s 5:05!” on your favorite podcast platforms: <a href="https://bit.ly/505-updates" rel="noopener noreferrer" target="_blank">https://bit.ly/505-updates</a>. You’re welcome to 𝗿𝗲𝗽𝗼𝘀𝘁 if your followers will find this of value.</p><p>The stories we’re covering today.</p><p>Marcel Brown: October 31st, 2000. Russia launches Soyuz TM-31 carrying the first crew to the International Space Station.  Between the 2011 retirement of the space shuttle and the 2020 demo flight of SpaceX Crew Dragon, the Soyuz served as the only means to ferry crew to or from the International Space Station. </p><p>Edwin Kwan: Casio has suffered a data breach that has affected over 120,000 customers in 149 countries. Casio said that the cause of the breach was due to some of the network settings in the development environment being disabled due to system operational error. </p><p>Hillary Coover: US and Customs Enforcement Agency, ICE, is employing an AI powered tool known as Giant Oak Search Technology to scan social media posts for content that it deems derogatory  to the United States. This revelation, first brought to light by 404 Media, has really ruffled some feathers. </p><p>Ian Garrett: This is the second part of our exploration into software supply chain attacks.  We'll explore dependency confusion, stolen SSL and code-signing certificates, the targeting of developers CI/CD infrastructure, and the use of social engineering to drop malicious code.   </p>]]></content:encoded><link><![CDATA[https://3zozb9fxlbueipjyapmaas.captivate.fm/episode/episdoe-262-edwin-kwan-casio-data-breach-affects-over-120-000-customers-in-149-countries-ian-garrett-6-types-of-supply-chain-attacks-part-2-hillary-coover-keeping-perspective-why-the-social-media-surveillance-revelation-deserves-a-thoughtful-look-marce...]]></link><guid isPermaLink="false">6b84a612-7e19-4e37-b760-dc3e32f10826</guid><itunes:image href="https://artwork.captivate.fm/d8da5cb6-44c0-4094-9e06-a53ccc35f003/avC-eAGH7W17xNrjZmFXxsTG.jpg"/><dc:creator><![CDATA[Contributors from Around the World]]></dc:creator><pubDate>Tue, 31 Oct 2023 16:45:00 -0400</pubDate><enclosure url="https://dts.podtrac.com/redirect.mp3/podcasts.captivate.fm/media/9391cc31-f4dd-4f86-87d1-0bb265245dac/505-2023-10-31-Episode-262-Final-converted.mp3" length="10915728" type="audio/mpeg"/><itunes:duration>09:06</itunes:duration><itunes:explicit>false</itunes:explicit><itunes:episodeType>full</itunes:episodeType><itunes:season>1</itunes:season><itunes:episode>262</itunes:episode><itunes:season>1</itunes:season><podcast:episode>262</podcast:episode><podcast:season>1</podcast:season><itunes:author>Contributors from Around the World</itunes:author></item><item><title>Episode #261: Edwin Kwan: Israel-Hamas War Crypto Donation Scams; Hillary coover: Linkedin Chatbot; Mark Miller: Stanford University Breached by Akira Ransomware Group; Mark Miller: This Day in Tech History</title><itunes:title>Episode #261: Edwin Kwan: Israel-Hamas War Crypto Donation Scams; Hillary coover: Linkedin Chatbot; Mark Miller: Stanford University Breached by Akira Ransomware Group; Mark Miller: This Day in Tech History</itunes:title><description><![CDATA[<p>Free, ungated access to all 260+ episodes of “It’s 5:05!” on your favorite podcast platforms: <a href="https://bit.ly/505-updates" rel="noopener noreferrer" target="_blank">https://bit.ly/505-updates</a>. You’re welcome to 𝗿𝗲𝗽𝗼𝘀𝘁 if your followers will find this of value.</p><p>The stories we’re covering today.</p><p> Mark Miller: October 29, 1969. UCLA student Charley Kline attempts to transmit the text, "login", to a computer at the Stanford Research Institute.  After the letters L and O are sent, the system crashes, making the first message ever sent on the internet "lo". </p><p>Edwin Kwan: Since the Israel-Hamas war, there's been numerous crypto donation scam sites appearing online. Scammers have been capitalizing on the horrific events of the Israel-Hamas conflict by pretending to be legitimate charities and collecting donations.</p><p>Hillary Coover: LinkedIn is currently testing the use of generative AI to address cybersecurity queries from its employees and external suppliers. Response times with the chatbot averaged just five seconds compared to the approximately 15 minutes that it took when handled by a human.</p><p>Mark Miller: News continues to trickle out about the Akira Ransomware Group breach of the Stanford University Department of Public Safety. This morning, Bitdefender reported that the University is being pressured to pay a ransom of an undisclosed amount in order to stop the leak of 430 gigabytes of private information and confidential documents.</p>]]></description><content:encoded><![CDATA[<p>Free, ungated access to all 260+ episodes of “It’s 5:05!” on your favorite podcast platforms: <a href="https://bit.ly/505-updates" rel="noopener noreferrer" target="_blank">https://bit.ly/505-updates</a>. You’re welcome to 𝗿𝗲𝗽𝗼𝘀𝘁 if your followers will find this of value.</p><p>The stories we’re covering today.</p><p> Mark Miller: October 29, 1969. UCLA student Charley Kline attempts to transmit the text, "login", to a computer at the Stanford Research Institute.  After the letters L and O are sent, the system crashes, making the first message ever sent on the internet "lo". </p><p>Edwin Kwan: Since the Israel-Hamas war, there's been numerous crypto donation scam sites appearing online. Scammers have been capitalizing on the horrific events of the Israel-Hamas conflict by pretending to be legitimate charities and collecting donations.</p><p>Hillary Coover: LinkedIn is currently testing the use of generative AI to address cybersecurity queries from its employees and external suppliers. Response times with the chatbot averaged just five seconds compared to the approximately 15 minutes that it took when handled by a human.</p><p>Mark Miller: News continues to trickle out about the Akira Ransomware Group breach of the Stanford University Department of Public Safety. This morning, Bitdefender reported that the University is being pressured to pay a ransom of an undisclosed amount in order to stop the leak of 430 gigabytes of private information and confidential documents.</p>]]></content:encoded><link><![CDATA[https://3zozb9fxlbueipjyapmaas.captivate.fm/episode/episode-261-edwin-kwan-israel-hamas-war-crypto-donation-scams-hillary-coover-linkedin-chatbot-mark-miller-stanford-university-breached-by-akira-ransomware-group-mark-miller-this-day-in-tech-history]]></link><guid isPermaLink="false">60f889de-b5c9-497b-99db-3195c795d5ce</guid><itunes:image href="https://artwork.captivate.fm/863e4f2f-2cfe-414d-a8db-af83f9beaf1d/Z8qfFoWgB2RORD0k8ig4TUYJ.jpg"/><dc:creator><![CDATA[Contributors from Around the World]]></dc:creator><pubDate>Mon, 30 Oct 2023 16:45:00 -0400</pubDate><enclosure url="https://dts.podtrac.com/redirect.mp3/podcasts.captivate.fm/media/d7c4c821-f7b3-4a32-8bc0-634a65008aad/505-2023-10-30-Episode-261-Final-converted.mp3" length="7574038" type="audio/mpeg"/><itunes:duration>07:53</itunes:duration><itunes:explicit>false</itunes:explicit><itunes:episodeType>full</itunes:episodeType><itunes:season>1</itunes:season><itunes:episode>261</itunes:episode><itunes:season>1</itunes:season><podcast:episode>261</podcast:episode><podcast:season>1</podcast:season><itunes:author>Contributors from Around the World</itunes:author></item><item><title>Episode #260: Edwin Kwan: OAuth Implementation Flaw Allowing Account Takeover; Marcel Brown: This Day in Tech History; Katy Craig: HTTP/2 RapidReset Attack; Olimpiu Pop: HTTP/2 RapidReset: Zero-day Vulnerability; Shannon Lietz: RapidReset: How Critical is It</title><itunes:title>Episode #260: Edwin Kwan: OAuth Implementation Flaw Allowing Account Takeover; Marcel Brown: This Day in Tech History; Katy Craig: HTTP/2 RapidReset Attack; Olimpiu Pop: HTTP/2 RapidReset: Zero-day Vulnerability; Shannon Lietz: RapidReset: How Critical is It</itunes:title><description><![CDATA[<p>Free, ungated access to all 260+ episodes of “It’s 5:05!” on your favorite podcast platforms: <a href="https://bit.ly/505-updates" rel="noopener noreferrer" target="_blank">https://bit.ly/505-updates</a>. You’re welcome to 𝗿𝗲𝗽𝗼𝘀𝘁 if your followers will find this of value.</p><p>The stories we’re covering today.</p><p>Marcel Brown: October 28th, 1998. US president Bill Clinton signs into law the Digital Millennium Copyright Act, or DMCA. The law is intended to criminalize production and dissemination of technology designed to circumvent digital copyright protection, known as Digital Rights Management, or DRM.</p><p>Edwin Kwan: Security researchers  discovered critical misconfiguration flaws in the implementation of the Open Authorization or OAuth standard by three popular websites. The flaw would have allowed attackers to take over user accounts and could lead to identity theft, financial fraud, access to credit cards, and other cybercriminal activity.</p><p>Katy Craig: Recently, Google services and Cloud customers found themselves in the crosshairs of a novel and formidable distributed denial of service, or DDoS, attack, peaking in August, with one assault clocking a staggering 398 million requests per second. </p><p>Olimpiu Pop: HTTP/2 was the first major revamp of the HTTP protocol in ages. It brought significant performance improvements enabled by stream multiplexing. This enables the simultaneous transmission of multiple request and response messages over a single connection without interference between streams. </p><p>Shannon Lietz: I would like to see the industry be a little bit more actionable about what's happening, because you had to   parse this one out to really understand it.  I  came to the realization of is, if you do have companies that you work with, or vendors that you work with, and  they're getting told right away, all of a sudden they have a CVE they have to go deal with, it is going to set a whole bunch of things behind.</p>]]></description><content:encoded><![CDATA[<p>Free, ungated access to all 260+ episodes of “It’s 5:05!” on your favorite podcast platforms: <a href="https://bit.ly/505-updates" rel="noopener noreferrer" target="_blank">https://bit.ly/505-updates</a>. You’re welcome to 𝗿𝗲𝗽𝗼𝘀𝘁 if your followers will find this of value.</p><p>The stories we’re covering today.</p><p>Marcel Brown: October 28th, 1998. US president Bill Clinton signs into law the Digital Millennium Copyright Act, or DMCA. The law is intended to criminalize production and dissemination of technology designed to circumvent digital copyright protection, known as Digital Rights Management, or DRM.</p><p>Edwin Kwan: Security researchers  discovered critical misconfiguration flaws in the implementation of the Open Authorization or OAuth standard by three popular websites. The flaw would have allowed attackers to take over user accounts and could lead to identity theft, financial fraud, access to credit cards, and other cybercriminal activity.</p><p>Katy Craig: Recently, Google services and Cloud customers found themselves in the crosshairs of a novel and formidable distributed denial of service, or DDoS, attack, peaking in August, with one assault clocking a staggering 398 million requests per second. </p><p>Olimpiu Pop: HTTP/2 was the first major revamp of the HTTP protocol in ages. It brought significant performance improvements enabled by stream multiplexing. This enables the simultaneous transmission of multiple request and response messages over a single connection without interference between streams. </p><p>Shannon Lietz: I would like to see the industry be a little bit more actionable about what's happening, because you had to   parse this one out to really understand it.  I  came to the realization of is, if you do have companies that you work with, or vendors that you work with, and  they're getting told right away, all of a sudden they have a CVE they have to go deal with, it is going to set a whole bunch of things behind.</p>]]></content:encoded><link><![CDATA[https://3zozb9fxlbueipjyapmaas.captivate.fm/episode/episode-260-edwin-kwan-oauth-implementation-flaw-allowing-account-takeover-marcel-brown-this-day-in-tech-history-katy-craig-http-2-rapidreset-attack-olimpiu-pop-http-2-rapidreset-zero-day-vulnerability-shannon-lietz-rapidreset-how-critical-is-it]]></link><guid isPermaLink="false">f20598ae-aa43-48d4-a342-e26120fc3d78</guid><itunes:image href="https://artwork.captivate.fm/83b013ba-965c-4c63-8012-b6644aa37bd9/E1f6FBQ0wZqhGe2wL6dpGavC.jpg"/><dc:creator><![CDATA[Contributors from Around the World]]></dc:creator><pubDate>Fri, 27 Oct 2023 16:45:00 -0400</pubDate><enclosure url="https://dts.podtrac.com/redirect.mp3/podcasts.captivate.fm/media/f5ba6131-f4dc-4f79-ab3a-2a62784dbb51/505-2023-10-27-Episode-260-Final-converted.mp3" length="15762276" type="audio/mpeg"/><itunes:duration>16:25</itunes:duration><itunes:explicit>false</itunes:explicit><itunes:episodeType>full</itunes:episodeType><itunes:season>1</itunes:season><itunes:episode>260</itunes:episode><itunes:season>1</itunes:season><podcast:episode>260</podcast:episode><podcast:season>1</podcast:season><itunes:author>Contributors from Around the World</itunes:author></item><item><title>Episode #259: Edwin Kwan: 1Password Impacted by Okta Breach; Ian Garrett: 6 Types of Supply Chain Attacks (Part 1); Katy Craig: New Mirai Malware Variant; Marcel Brown: This Day in Tech History</title><itunes:title>Episode #259: Edwin Kwan: 1Password Impacted by Okta Breach; Ian Garrett: 6 Types of Supply Chain Attacks (Part 1); Katy Craig: New Mirai Malware Variant; Marcel Brown: This Day in Tech History</itunes:title><description><![CDATA[<p>Free, ungated access to all 235+ episodes of “It’s 5:05!” on your favorite podcast platforms: <a href="https://bit.ly/505-updates" rel="noopener noreferrer" target="_blank">https://bit.ly/505-updates</a>. You’re welcome to 𝗿𝗲𝗽𝗼𝘀𝘁 if your followers will find this of value.</p><p>The stories we’re covering today.</p><p>Marcel brown: October 26th, 1861. Only two days after the Transcontinental Telegraph line opened, the Pony Express ceases operation. Prior to the opening of the cross-country telegraph line, the Pony Express was the fastest way to send communication between St. Joseph, Missouri and San Francisco, California.</p><p>Edwin Kwan: 1Password has confirmed that it was attacked by cybercriminals using session information that was stolen in the recent Okta breach. 1Password is a popular password management platform used by over 100,000 businesses. </p><p>Katy Craig: A new variant of the notorious Mirai malware is making headlines. This time, it's going after millions of Android TV set-top boxes used by people for media streaming. </p><p>Ian Garrett: You've likely heard of supply chain attacks, but did you know there are different types of supply chain attacks? This is a two-part series where I cover the different type of attacks. </p>]]></description><content:encoded><![CDATA[<p>Free, ungated access to all 235+ episodes of “It’s 5:05!” on your favorite podcast platforms: <a href="https://bit.ly/505-updates" rel="noopener noreferrer" target="_blank">https://bit.ly/505-updates</a>. You’re welcome to 𝗿𝗲𝗽𝗼𝘀𝘁 if your followers will find this of value.</p><p>The stories we’re covering today.</p><p>Marcel brown: October 26th, 1861. Only two days after the Transcontinental Telegraph line opened, the Pony Express ceases operation. Prior to the opening of the cross-country telegraph line, the Pony Express was the fastest way to send communication between St. Joseph, Missouri and San Francisco, California.</p><p>Edwin Kwan: 1Password has confirmed that it was attacked by cybercriminals using session information that was stolen in the recent Okta breach. 1Password is a popular password management platform used by over 100,000 businesses. </p><p>Katy Craig: A new variant of the notorious Mirai malware is making headlines. This time, it's going after millions of Android TV set-top boxes used by people for media streaming. </p><p>Ian Garrett: You've likely heard of supply chain attacks, but did you know there are different types of supply chain attacks? This is a two-part series where I cover the different type of attacks. </p>]]></content:encoded><link><![CDATA[https://3zozb9fxlbueipjyapmaas.captivate.fm/episode/episode-259-edwin-kwan-1password-impacted-by-okta-breach-ian-garrett-6-types-of-supply-chain-attacks-part-1-katy-craig-new-mirai-malware-variant-marcel-brown-this-day-in-tech-history]]></link><guid isPermaLink="false">a262b73c-5561-4f02-aec6-21743cd23b11</guid><itunes:image href="https://artwork.captivate.fm/5e6e60f5-66a1-49e1-a8a7-b8d60f565433/0lcBdtOnwYl2eea36g7FmI0A.jpg"/><dc:creator><![CDATA[Contributors from Around the World]]></dc:creator><pubDate>Thu, 26 Oct 2023 16:45:00 -0400</pubDate><enclosure url="https://dts.podtrac.com/redirect.mp3/podcasts.captivate.fm/media/ef1edbbb-00a2-48d0-a650-d37181141640/505-2023-10-26-Episode-259-Final-converted.mp3" length="11117394" type="audio/mpeg"/><itunes:duration>09:16</itunes:duration><itunes:explicit>false</itunes:explicit><itunes:episodeType>full</itunes:episodeType><itunes:season>1</itunes:season><itunes:episode>259</itunes:episode><itunes:season>1</itunes:season><podcast:episode>259</podcast:episode><podcast:season>1</podcast:season><itunes:author>Contributors from Around the World</itunes:author></item><item><title>Episode #258: Edwin Kwan: South Australian Superannuation Suffers Breach; Hillary Coover: Meta Lawsuits: Your Child&apos;s Online Safety is at Risk; Mark Miller: Massive DDoS Attack: 201 Million Requests per Second (RPS); Marcel Brown: This Day in Tech History</title><itunes:title>Episode #258: Edwin Kwan: South Australian Superannuation Suffers Breach; Hillary Coover: Meta Lawsuits: Your Child&apos;s Online Safety is at Risk; Mark Miller: Massive DDoS Attack: 201 Million Requests per Second (RPS); Marcel Brown: This Day in Tech History</itunes:title><description><![CDATA[<p>Free, ungated access to all 235+ episodes of “It’s 5:05!” on your favorite podcast platforms: <a href="https://bit.ly/505-updates" rel="noopener noreferrer" target="_blank">https://bit.ly/505-updates</a>. You’re welcome to 𝗿𝗲𝗽𝗼𝘀𝘁 if your followers will find this of value.</p><p>The stories we’re covering today.</p><p>Marcel Brown: October 25th, 2001. Microsoft releases the operating system Windows XP, the successor to both Windows 2000 and Windows ME. </p><p>Edwin Kwan: Super SA, a dedicated superannuation fund for state government employees in South Australia, suffered a data breach. The data loss was through a third-party call center, which Super SA had previously contracted.</p><p>Hillary Coover: Is your child's online safety at risk? I've asked this before in the context of privacy, but today we're talking about the health risks and implications of Instagram on young minds. </p><p>Mark Miller: On October 10, 2023, Grant Bourzikas disclosed the finding of a massive DDoS attack of over 201 million requests per second. According to the CVE report,  the HTTP/2 protocol "allows a denial of service because request cancellation can reset many streams quickly as exploited in the wild in August through October, 2023."</p>]]></description><content:encoded><![CDATA[<p>Free, ungated access to all 235+ episodes of “It’s 5:05!” on your favorite podcast platforms: <a href="https://bit.ly/505-updates" rel="noopener noreferrer" target="_blank">https://bit.ly/505-updates</a>. You’re welcome to 𝗿𝗲𝗽𝗼𝘀𝘁 if your followers will find this of value.</p><p>The stories we’re covering today.</p><p>Marcel Brown: October 25th, 2001. Microsoft releases the operating system Windows XP, the successor to both Windows 2000 and Windows ME. </p><p>Edwin Kwan: Super SA, a dedicated superannuation fund for state government employees in South Australia, suffered a data breach. The data loss was through a third-party call center, which Super SA had previously contracted.</p><p>Hillary Coover: Is your child's online safety at risk? I've asked this before in the context of privacy, but today we're talking about the health risks and implications of Instagram on young minds. </p><p>Mark Miller: On October 10, 2023, Grant Bourzikas disclosed the finding of a massive DDoS attack of over 201 million requests per second. According to the CVE report,  the HTTP/2 protocol "allows a denial of service because request cancellation can reset many streams quickly as exploited in the wild in August through October, 2023."</p>]]></content:encoded><link><![CDATA[https://3zozb9fxlbueipjyapmaas.captivate.fm/episode/episode-258-edwin-kwan-south-australian-superannuation-suffers-breach-hillary-coover-meta-lawsuits-your-childs-online-safety-is-at-risk-mark-miller-massive-ddos-attack-201-million-requests-per-second-rps-marcel-brown-this-day-in-tech-history]]></link><guid isPermaLink="false">3122d2f9-df70-475c-87ce-5276e9e7d51d</guid><itunes:image href="https://artwork.captivate.fm/fe9a3c2d-9583-4909-a31c-067b5e939068/WSfnLaW-0y7PFFLJwSPeQ43.png"/><dc:creator><![CDATA[Contributors from Around the World]]></dc:creator><pubDate>Wed, 25 Oct 2023 16:45:00 -0400</pubDate><enclosure url="https://dts.podtrac.com/redirect.mp3/podcasts.captivate.fm/media/4baa3f46-ef4f-43b4-9b18-12dcccfd2c63/505-2023-10-25-Episode-258-Final-converted.mp3" length="8501074" type="audio/mpeg"/><itunes:duration>08:51</itunes:duration><itunes:explicit>false</itunes:explicit><itunes:episodeType>full</itunes:episodeType><itunes:season>1</itunes:season><itunes:episode>258</itunes:episode><itunes:season>1</itunes:season><podcast:episode>258</podcast:episode><podcast:season>1</podcast:season><itunes:author>Contributors from Around the World</itunes:author></item><item><title>Episode #257: Edwin Kwan: Okta Breach Exposed Sensitive Customer Data; Katy Craig: Cisco Zero Day is Bad News; Ian Garrett: Will Hackers Who Write Phishing Emails Lose Their Jobs? Marcel Brown: This Day in Tech History</title><itunes:title>Episode #257: Edwin Kwan: Okta Breach Exposed Sensitive Customer Data; Katy Craig: Cisco Zero Day is Bad News; Ian Garrett: Will Hackers Who Write Phishing Emails Lose Their Jobs? Marcel Brown: This Day in Tech History</itunes:title><description><![CDATA[<p>Free, ungated access to all 255+ episodes of “It’s 5:05!” on your favorite podcast platforms: <a href="https://bit.ly/505-updates" rel="noopener noreferrer" target="_blank">https://bit.ly/505-updates</a>. You’re welcome to 𝗿𝗲𝗽𝗼𝘀𝘁 if your followers will find this of value.</p><p>The stories we’re covering today.</p><p>Marcel Brown: October 24th, 1861. Western Union completes the first transcontinental telegraph line across the United States. Not coincidentally, two days later, the Pony Express shut down operations.</p><p>Edwin Kwan: Okta recently announced that their support case management system  suffered a breach and sensitive customer data was stolen. Okta said that all affected customers have been notified, and that if you had not been contacted, then there is no impact to your Okta environment or support tickets.</p><p>Katy Craig: Cisco's recent disclosure of a critical zero-day vulnerability in its Web UI reveals a concerning situation. Cybersecurity firm, Censys, has confirmed that over 40,000 hosts have been infected, with more than a quarter of them located in the United States.</p><p>Ian Garrett: Generative AI is reshaping the phishing landscape, making attacks more sophisticated. Most security leaders are ill-prepared to protect against AI-generated email attacks. The majority still rely on cloud email providers or legacy tools for email security, with 53% using secure email gateways.</p>]]></description><content:encoded><![CDATA[<p>Free, ungated access to all 255+ episodes of “It’s 5:05!” on your favorite podcast platforms: <a href="https://bit.ly/505-updates" rel="noopener noreferrer" target="_blank">https://bit.ly/505-updates</a>. You’re welcome to 𝗿𝗲𝗽𝗼𝘀𝘁 if your followers will find this of value.</p><p>The stories we’re covering today.</p><p>Marcel Brown: October 24th, 1861. Western Union completes the first transcontinental telegraph line across the United States. Not coincidentally, two days later, the Pony Express shut down operations.</p><p>Edwin Kwan: Okta recently announced that their support case management system  suffered a breach and sensitive customer data was stolen. Okta said that all affected customers have been notified, and that if you had not been contacted, then there is no impact to your Okta environment or support tickets.</p><p>Katy Craig: Cisco's recent disclosure of a critical zero-day vulnerability in its Web UI reveals a concerning situation. Cybersecurity firm, Censys, has confirmed that over 40,000 hosts have been infected, with more than a quarter of them located in the United States.</p><p>Ian Garrett: Generative AI is reshaping the phishing landscape, making attacks more sophisticated. Most security leaders are ill-prepared to protect against AI-generated email attacks. The majority still rely on cloud email providers or legacy tools for email security, with 53% using secure email gateways.</p>]]></content:encoded><link><![CDATA[https://3zozb9fxlbueipjyapmaas.captivate.fm/episode/episode-257-edwin-kwan-okta-breach-exposed-sensitive-customer-data-katy-craig-cisco-zero-day-is-bad-news-ian-garrett-will-hackers-who-write-phishing-emails-lose-their-jobs-marcel-brown-this-day-in-tech-history]]></link><guid isPermaLink="false">95047643-cbce-4d43-b76d-c8f1e2c8db02</guid><itunes:image href="https://artwork.captivate.fm/4666f8a3-354c-47cd-b189-8bc39d1ad2db/w0XfODiHBYjvgwS0ds4OAXg8.jpg"/><dc:creator><![CDATA[Contributors from Around the World]]></dc:creator><pubDate>Tue, 24 Oct 2023 16:45:00 -0400</pubDate><enclosure url="https://dts.podtrac.com/redirect.mp3/podcasts.captivate.fm/media/8f9815c0-bf28-409b-8ee9-3ffa0b674a4b/505-2023-10-24-Episode-257-Final-converted.mp3" length="9847319" type="audio/mpeg"/><itunes:duration>08:12</itunes:duration><itunes:explicit>false</itunes:explicit><itunes:episodeType>full</itunes:episodeType><itunes:season>1</itunes:season><itunes:episode>257</itunes:episode><itunes:season>1</itunes:season><podcast:episode>257</podcast:episode><podcast:season>1</podcast:season><itunes:author>Contributors from Around the World</itunes:author></item><item><title>Episode 256: Edwin Kwan: Fake Browser Updates Delivering Malware; Katy Craig: Countdown to Q Day; Hillary Coover:  Cookie Tracking Lawsuit in Netherlands; Marcel Brown: This Day in Tech History</title><itunes:title>Episode 256: Edwin Kwan: Fake Browser Updates Delivering Malware; Katy Craig: Countdown to Q Day; Hillary Coover:  Cookie Tracking Lawsuit in Netherlands; Marcel Brown: This Day in Tech History</itunes:title><description><![CDATA[<p>Free, ungated access to all 255+ episodes of “It’s 5:05!” on your favorite podcast platforms: <a href="https://bit.ly/505-updates" rel="noopener noreferrer" target="_blank">https://bit.ly/505-updates</a>. You’re welcome to 𝗿𝗲𝗽𝗼𝘀𝘁 if your followers will find this of value.</p><p>The stories we’re covering today.</p><p>Marcel Brown: October 23, 2001. Using the slogan, 1, 000 songs in your pocket, Steve Jobs introduces the original iPod, featuring a 5GB hard drive, FireWire connectivity, and synchronization to iTunes. </p><p>Edwin Kwan: Attackers are using cybersecurity best practices against users, prompting them to download malicious browser updates. The attackers start by compromising a legitimate but vulnerable website.</p><p>Hillary Coover: A Dutch consumer-rights group, SDBN, has initiated a class-action lawsuit against Amazon for allegedly violating the European Union's privacy law by tracking website visitors without their consent using tracking cookies.</p><p>Katy Craig: Quantum computing holds immense promise in fields like chemistry, materials science, and AI. Yet there's a flip side to this advancement. Deep-pocketed nations like China and Russia, equipped with the scientific expertise and resources, could be making secret strides in quantum computing.</p>]]></description><content:encoded><![CDATA[<p>Free, ungated access to all 255+ episodes of “It’s 5:05!” on your favorite podcast platforms: <a href="https://bit.ly/505-updates" rel="noopener noreferrer" target="_blank">https://bit.ly/505-updates</a>. You’re welcome to 𝗿𝗲𝗽𝗼𝘀𝘁 if your followers will find this of value.</p><p>The stories we’re covering today.</p><p>Marcel Brown: October 23, 2001. Using the slogan, 1, 000 songs in your pocket, Steve Jobs introduces the original iPod, featuring a 5GB hard drive, FireWire connectivity, and synchronization to iTunes. </p><p>Edwin Kwan: Attackers are using cybersecurity best practices against users, prompting them to download malicious browser updates. The attackers start by compromising a legitimate but vulnerable website.</p><p>Hillary Coover: A Dutch consumer-rights group, SDBN, has initiated a class-action lawsuit against Amazon for allegedly violating the European Union's privacy law by tracking website visitors without their consent using tracking cookies.</p><p>Katy Craig: Quantum computing holds immense promise in fields like chemistry, materials science, and AI. Yet there's a flip side to this advancement. Deep-pocketed nations like China and Russia, equipped with the scientific expertise and resources, could be making secret strides in quantum computing.</p>]]></content:encoded><link><![CDATA[https://3zozb9fxlbueipjyapmaas.captivate.fm/episode/episode-256-edwin-kwan-fake-browser-updates-delivering-malware-katy-craig-countdown-to-q-day-hillary-coover-cookie-tracking-lawsuit-in-netherlands-marcel-brown-this-day-in-tech-history]]></link><guid isPermaLink="false">5b3b1d93-c86d-4b87-84cd-985d09ff84a5</guid><itunes:image href="https://artwork.captivate.fm/33e2a4e7-a936-4ef5-905a-3a72363cfbe4/BkhMbfQsRHQi9QFk9GvnUJSv.png"/><dc:creator><![CDATA[Contributors from Around the World]]></dc:creator><pubDate>Mon, 23 Oct 2023 16:45:00 -0400</pubDate><enclosure url="https://dts.podtrac.com/redirect.mp3/podcasts.captivate.fm/media/90164338-7ab8-45bb-bdcd-a0ebb337e082/505-2023-10-23-Episode-256-Final-converted.mp3" length="12648690" type="audio/mpeg"/><itunes:duration>10:32</itunes:duration><itunes:explicit>false</itunes:explicit><itunes:episodeType>full</itunes:episodeType><itunes:season>1</itunes:season><itunes:episode>256</itunes:episode><itunes:season>1</itunes:season><podcast:episode>256</podcast:episode><podcast:season>1</podcast:season><itunes:author>Contributors from Around the World</itunes:author></item><item><title>Episode #255: Edwin Kwan: Top Password Used By IT Admins is ‘admin’; Hillary Coover: Is X&apos;s Anti-Disinformation Tool Backfiring; Shannon Lietz: Is Hashicorp’s Move a Win, Lose, or Draw; Olimpiu Pop: Is Open Source Reaching EOL? Maybe, according to Hashicorp; Marcel Brown: This Day in Tech History</title><itunes:title>Episode #255: Edwin Kwan: Top Password Used By IT Admins is ‘admin’; Hillary Coover: Is X&apos;s Anti-Disinformation Tool Backfiring; Shannon Lietz: Is Hashicorp’s Move a Win, Lose, or Draw; Olimpiu Pop: Is Open Source Reaching EOL? Maybe, according to Hashicorp; Marcel Brown: This Day in Tech History</itunes:title><description><![CDATA[<p>Free, ungated access to all 255+ episodes of “It’s 5:05!” on your favorite podcast platforms: <a href="https://bit.ly/505-updates" rel="noopener noreferrer" target="_blank">https://bit.ly/505-updates</a>. You’re welcome to 𝗿𝗲𝗽𝗼𝘀𝘁 if your followers will find this of value.</p><p>The stories we’re covering today.</p><p>Marcel Brown: October 21st, 1879. Thomas Edison perfects the first commercially practical incandescent light bulb using a filament of carbonized cotton thread. Edison's successful design came only after he had tested over 6, 000 different vegetable fibers.  </p><p>Edwin Kwan: Security researchers have discovered that IT administrators are using weak passwords to protect access to portals, providing easy access to attackers to enterprise networks. An analysis of over 1.8 million administrator accounts found that over 40, 000 were using the password "admin".</p><p>Hillary Coover: X's Community Notes, originally designed to crowdsource fact-checking and combat disinformation, is facing scrutiny because of the vulnerabilities and ineffectiveness uncovered in a WIRED investigation. This investigation revealed that the tool may be manipulated by external groups and lacks transparency</p><p>Olimpiu Pop: There is a lot of noise around open source. Legislation, growing cyber threats, weaponizing open source, and others. Should we put a lid on it? That's something  the HashiCorp CEO thinks. In August, the company changed the license to a closed sourced one, and last week, during the HashiConf, he underlined that the direction he took is a direction to success.</p><p>Shannon Lietz: The challenge that really came out of this is HashiCorp has had a pretty rocket fueled  life, if you will.   They've looked out and realized that they've put Terraform out there for a very long time.  Any company who creates something has the right to fork and end their investment. All they're saying is we're no longer going to invest in the constant creation of this open source software.</p>]]></description><content:encoded><![CDATA[<p>Free, ungated access to all 255+ episodes of “It’s 5:05!” on your favorite podcast platforms: <a href="https://bit.ly/505-updates" rel="noopener noreferrer" target="_blank">https://bit.ly/505-updates</a>. You’re welcome to 𝗿𝗲𝗽𝗼𝘀𝘁 if your followers will find this of value.</p><p>The stories we’re covering today.</p><p>Marcel Brown: October 21st, 1879. Thomas Edison perfects the first commercially practical incandescent light bulb using a filament of carbonized cotton thread. Edison's successful design came only after he had tested over 6, 000 different vegetable fibers.  </p><p>Edwin Kwan: Security researchers have discovered that IT administrators are using weak passwords to protect access to portals, providing easy access to attackers to enterprise networks. An analysis of over 1.8 million administrator accounts found that over 40, 000 were using the password "admin".</p><p>Hillary Coover: X's Community Notes, originally designed to crowdsource fact-checking and combat disinformation, is facing scrutiny because of the vulnerabilities and ineffectiveness uncovered in a WIRED investigation. This investigation revealed that the tool may be manipulated by external groups and lacks transparency</p><p>Olimpiu Pop: There is a lot of noise around open source. Legislation, growing cyber threats, weaponizing open source, and others. Should we put a lid on it? That's something  the HashiCorp CEO thinks. In August, the company changed the license to a closed sourced one, and last week, during the HashiConf, he underlined that the direction he took is a direction to success.</p><p>Shannon Lietz: The challenge that really came out of this is HashiCorp has had a pretty rocket fueled  life, if you will.   They've looked out and realized that they've put Terraform out there for a very long time.  Any company who creates something has the right to fork and end their investment. All they're saying is we're no longer going to invest in the constant creation of this open source software.</p>]]></content:encoded><link><![CDATA[https://3zozb9fxlbueipjyapmaas.captivate.fm/episode/episode-255-edwin-kwan-top-password-used-by-it-admins-is-admin-hillary-coover-is-xs-anti-disinformation-tool-backfiring-shannon-lietz-is-hashicorps-move-a-win-lose-or-draw-olimpiu-pop-is-open-source-reaching-eol-maybe-according-to-hashicorp-marcel-brow...]]></link><guid isPermaLink="false">c22977cd-bb7d-4ce9-bcab-ddfc585d2d9e</guid><itunes:image href="https://artwork.captivate.fm/33e2a4e7-a936-4ef5-905a-3a72363cfbe4/BkhMbfQsRHQi9QFk9GvnUJSv.png"/><dc:creator><![CDATA[Contributors from Around the World]]></dc:creator><pubDate>Fri, 20 Oct 2023 16:45:00 -0400</pubDate><enclosure url="https://dts.podtrac.com/redirect.mp3/podcasts.captivate.fm/media/b43c51b8-dc4b-4bc3-8033-0147a966c6b9/505-2023-10-20-Episode-255-Final-converted.mp3" length="13017538" type="audio/mpeg"/><itunes:duration>13:34</itunes:duration><itunes:explicit>false</itunes:explicit><itunes:episodeType>full</itunes:episodeType><itunes:season>1</itunes:season><itunes:episode>255</itunes:episode><itunes:season>1</itunes:season><podcast:episode>255</podcast:episode><podcast:season>1</podcast:season><itunes:author>Contributors from Around the World</itunes:author></item><item><title>Episode #254: Edwin Kwan: Malicious “Red Alert” App Spying on Israelis; Ian Garrett: 10 Hidden Costs Draining CISO Security Budgets (Part 2); Hillary Coover: Threat Posed by Chinese Espionage and Social Engineering; Marcel Brown: This Day in Tech History</title><itunes:title>Episode #254: Edwin Kwan: Malicious “Red Alert” App Spying on Israelis; Ian Garrett: 10 Hidden Costs Draining CISO Security Budgets (Part 2); Hillary Coover: Threat Posed by Chinese Espionage and Social Engineering; Marcel Brown: This Day in Tech History</itunes:title><description><![CDATA[<p>Free, ungated access to all 235+ episodes of “It’s 5:05!” on your favorite podcast platforms: <a href="https://bit.ly/505-updates" rel="noopener noreferrer" target="_blank">https://bit.ly/505-updates</a>. You’re welcome to 𝗿𝗲𝗽𝗼𝘀𝘁 if your followers will find this of value.</p><p>The stories we’re covering today.</p><p>Marcel Brown: October 19th, 1979. According to Dan Bricklin, one of the co-creators of VisiCalc, the first "real" release of VisiCalc was completed and packaged for shipment. VisiCalc was the first commercially available spreadsheet software and quickly became the first killer app of the personal computer market.</p><p>Edwin Kwan: Malicious version of the Israeli incoming airstrike warning app has been found distributed over the internet. The fake site serving the malicious software was created on October 12th, 2023 and provided download options for both iOS and Android versions.</p><p>Hillary Coover: In light of recent warnings from intelligence agencies, we have to consider our own readiness to face insider threats. The MI5 head's statements regarding over 20,000 covert online approaches by Chinese spies in the UK should serve as a sobering reminder of the evolving landscape.</p><p>Ian Garrett: Security budgets can be tricky to manage, and often hidden costs can erode these budgets.  Understanding these hidden expenses, negotiating for fair pricing, and aligning security strategies with business priorities can help optimize budgets.</p>]]></description><content:encoded><![CDATA[<p>Free, ungated access to all 235+ episodes of “It’s 5:05!” on your favorite podcast platforms: <a href="https://bit.ly/505-updates" rel="noopener noreferrer" target="_blank">https://bit.ly/505-updates</a>. You’re welcome to 𝗿𝗲𝗽𝗼𝘀𝘁 if your followers will find this of value.</p><p>The stories we’re covering today.</p><p>Marcel Brown: October 19th, 1979. According to Dan Bricklin, one of the co-creators of VisiCalc, the first "real" release of VisiCalc was completed and packaged for shipment. VisiCalc was the first commercially available spreadsheet software and quickly became the first killer app of the personal computer market.</p><p>Edwin Kwan: Malicious version of the Israeli incoming airstrike warning app has been found distributed over the internet. The fake site serving the malicious software was created on October 12th, 2023 and provided download options for both iOS and Android versions.</p><p>Hillary Coover: In light of recent warnings from intelligence agencies, we have to consider our own readiness to face insider threats. The MI5 head's statements regarding over 20,000 covert online approaches by Chinese spies in the UK should serve as a sobering reminder of the evolving landscape.</p><p>Ian Garrett: Security budgets can be tricky to manage, and often hidden costs can erode these budgets.  Understanding these hidden expenses, negotiating for fair pricing, and aligning security strategies with business priorities can help optimize budgets.</p>]]></content:encoded><link><![CDATA[https://3zozb9fxlbueipjyapmaas.captivate.fm/episode/episode-254-edwin-kwan-malicious-red-alert-app-spying-on-israelis-ian-garrett-10-hidden-costs-draining-ciso-security-budgets-part-2-hillary-coover-threat-posed-by-chinese-espionage-and-social-engineering-marcel-brown-this-day-in-tech-history]]></link><guid isPermaLink="false">12adef7c-df31-4d0f-8851-1807880e9a5b</guid><itunes:image href="https://artwork.captivate.fm/33e2a4e7-a936-4ef5-905a-3a72363cfbe4/BkhMbfQsRHQi9QFk9GvnUJSv.png"/><dc:creator><![CDATA[Contributors from Around the World]]></dc:creator><pubDate>Thu, 19 Oct 2023 16:45:00 -0400</pubDate><enclosure url="https://dts.podtrac.com/redirect.mp3/podcasts.captivate.fm/media/95d03057-45c7-40ca-bae2-f43301ee1126/505-2023-10-19-Episode-254-Final-converted.mp3" length="11307565" type="audio/mpeg"/><itunes:duration>09:25</itunes:duration><itunes:explicit>false</itunes:explicit><itunes:episodeType>full</itunes:episodeType><itunes:season>1</itunes:season><itunes:episode>254</itunes:episode><itunes:season>1</itunes:season><podcast:episode>254</podcast:episode><podcast:season>1</podcast:season><itunes:author>Contributors from Around the World</itunes:author></item><item><title>Episode 253: Edwin Kwan: Over 10,000 Cisco Devices Hacked; Julie Chatman: NSA and CISA: Top ten cybersecurity configuration blunders; Hillary Coover: Safeguarding Nations: The Crucial Role of Satellite Imagery Data; Marcel Brown: This Day in Tech History</title><itunes:title>Episode 253: Edwin Kwan: Over 10,000 Cisco Devices Hacked; Julie Chatman: NSA and CISA: Top ten cybersecurity configuration blunders; Hillary Coover: Safeguarding Nations: The Crucial Role of Satellite Imagery Data; Marcel Brown: This Day in Tech History</itunes:title><description><![CDATA[<p>Free, ungated access to all 235+ episodes of “It’s 5:05!” on your favorite podcast platforms: <a href="https://bit.ly/505-updates" rel="noopener noreferrer" target="_blank">https://bit.ly/505-updates</a>. You’re welcome to 𝗿𝗲𝗽𝗼𝘀𝘁 if your followers will find this of value.</p><p>The stories we’re covering today.</p><p>Marcel Brown: October 18th, 1985. Nintendo releases the Nintendo Entertainment System in New York and limited other North American markets. An immediate hit, Nintendo released the system nationwide in February of 1986.</p><p>Julie Chatman: I'm Julie Chatman in Washington DC with a special message for cyber warriors, especially network defenders. The U. S. National Security Agency and the Cybersecurity and Infrastructure Security Agency have unveiled the Top 10 Cybersecurity Misconfigurations that attackers are hoping to find in your organization's network and what you can do about them.</p><p>Hillary Coover: Ever wonder how satellite imagery data contribute to safeguarding both geopolitics and cybersecurity? This resource really amplifies their capacity to anticipate and address physical security challenges that directly influence cybersecurity.</p><p>Edwin Kwan: Attackers are actively exploiting a zero-day vulnerability in Cisco devices to gain full administrative privileges and take complete control of the device remotely. Attackers have been exploiting this vulnerability since 18th September and over 10,000 devices have been hacked.</p>]]></description><content:encoded><![CDATA[<p>Free, ungated access to all 235+ episodes of “It’s 5:05!” on your favorite podcast platforms: <a href="https://bit.ly/505-updates" rel="noopener noreferrer" target="_blank">https://bit.ly/505-updates</a>. You’re welcome to 𝗿𝗲𝗽𝗼𝘀𝘁 if your followers will find this of value.</p><p>The stories we’re covering today.</p><p>Marcel Brown: October 18th, 1985. Nintendo releases the Nintendo Entertainment System in New York and limited other North American markets. An immediate hit, Nintendo released the system nationwide in February of 1986.</p><p>Julie Chatman: I'm Julie Chatman in Washington DC with a special message for cyber warriors, especially network defenders. The U. S. National Security Agency and the Cybersecurity and Infrastructure Security Agency have unveiled the Top 10 Cybersecurity Misconfigurations that attackers are hoping to find in your organization's network and what you can do about them.</p><p>Hillary Coover: Ever wonder how satellite imagery data contribute to safeguarding both geopolitics and cybersecurity? This resource really amplifies their capacity to anticipate and address physical security challenges that directly influence cybersecurity.</p><p>Edwin Kwan: Attackers are actively exploiting a zero-day vulnerability in Cisco devices to gain full administrative privileges and take complete control of the device remotely. Attackers have been exploiting this vulnerability since 18th September and over 10,000 devices have been hacked.</p>]]></content:encoded><link><![CDATA[https://3zozb9fxlbueipjyapmaas.captivate.fm/episode/episode-253-edwin-kwan-over-10-000-cisco-devices-hacked-julie-chatman-nsa-and-cisa-top-ten-cybersecurity-configuration-blunders-hillary-coover-safeguarding-nations-the-crucial-role-of-satellite-imagery-data-marcel-brown-this-day-in-tech-history]]></link><guid isPermaLink="false">27ed3b57-9bee-47a5-af24-6dd99efa6193</guid><itunes:image href="https://artwork.captivate.fm/6b89e3ce-0272-4048-8d75-2a13d902c03e/0VSr_CMwT4Vbx3G7rqzkJAJZ.png"/><dc:creator><![CDATA[Contributors from Around the World]]></dc:creator><pubDate>Wed, 18 Oct 2023 16:45:00 -0400</pubDate><enclosure url="https://dts.podtrac.com/redirect.mp3/podcasts.captivate.fm/media/4926fe08-a12e-4dd8-9ee3-65b08a98eeb7/505-2023-10-18-Episode-253-Final-converted.mp3" length="13333101" type="audio/mpeg"/><itunes:duration>11:07</itunes:duration><itunes:explicit>false</itunes:explicit><itunes:episodeType>full</itunes:episodeType><itunes:season>1</itunes:season><itunes:episode>253</itunes:episode><itunes:season>1</itunes:season><podcast:episode>253</podcast:episode><podcast:season>1</podcast:season><itunes:author>Contributors from Around the World</itunes:author></item><item><title>Episode 252: Edwin Kwan: Equifax Ltd fined £11 million for Preventable Cybersecurity Breach; Ian Garrett: 10 Hidden Costs Draining CISO Security Budgets (Part 1); Mark Miller: Follow Up to Atlassian Confluence Level 10 Vulnerability Alert; Marcel Brown: This Day in Tech History</title><itunes:title>Episode 252: Edwin Kwan: Equifax Ltd fined £11 million for Preventable Cybersecurity Breach; Ian Garrett: 10 Hidden Costs Draining CISO Security Budgets (Part 1); Mark Miller: Follow Up to Atlassian Confluence Level 10 Vulnerability Alert; Marcel Brown: This Day in Tech History</itunes:title><description><![CDATA[<p>Free, ungated access to all 250+ episodes of “It’s 5:05!” on your favorite podcast platforms: <a href="https://bit.ly/505-updates" rel="noopener noreferrer" target="_blank">https://bit.ly/505-updates</a>. You’re welcome to 𝗿𝗲𝗽𝗼𝘀𝘁 if your followers will find this of value.</p><p>The stories we’re covering today.</p><p>Marcel Brown: October 17, 1990. Colin Needham, an English movie fan, launches the "rec.arts.movies movie database," which would later be known as the Internet Movie Database, or IMDb. An engineer working for HP at the time, by 1996, Needham quit his job to work on IMDb full-time.</p><p>Edwin Kwan: Equifax has been fined £11 million by Britain's financial watchdog for the 2017 cybersecurity breach. The British Financial Conduct Authority, or FCA, said that the cyber attack and unauthorized access to UK consumer data was entirely preventable. </p><p> Mark Miller: The Broken Access Control Vulnerability in the Confluence Data Center and Server has been getting a lot of attention.  This is a Level 10 vulnerability, the highest warning available. There is evidence that this is a nation-state attack, actively exploiting the vulnerability. </p><p>Ian Garrett: Everyone hates hidden costs, and it's only worse when you're already on a shoestring budget. As CISOs navigate a landscape of complex pricing structures, overlapping services, and other traps, there are more than enough hidden costs that constrain precious cybersecurity budgets.</p>]]></description><content:encoded><![CDATA[<p>Free, ungated access to all 250+ episodes of “It’s 5:05!” on your favorite podcast platforms: <a href="https://bit.ly/505-updates" rel="noopener noreferrer" target="_blank">https://bit.ly/505-updates</a>. You’re welcome to 𝗿𝗲𝗽𝗼𝘀𝘁 if your followers will find this of value.</p><p>The stories we’re covering today.</p><p>Marcel Brown: October 17, 1990. Colin Needham, an English movie fan, launches the "rec.arts.movies movie database," which would later be known as the Internet Movie Database, or IMDb. An engineer working for HP at the time, by 1996, Needham quit his job to work on IMDb full-time.</p><p>Edwin Kwan: Equifax has been fined £11 million by Britain's financial watchdog for the 2017 cybersecurity breach. The British Financial Conduct Authority, or FCA, said that the cyber attack and unauthorized access to UK consumer data was entirely preventable. </p><p> Mark Miller: The Broken Access Control Vulnerability in the Confluence Data Center and Server has been getting a lot of attention.  This is a Level 10 vulnerability, the highest warning available. There is evidence that this is a nation-state attack, actively exploiting the vulnerability. </p><p>Ian Garrett: Everyone hates hidden costs, and it's only worse when you're already on a shoestring budget. As CISOs navigate a landscape of complex pricing structures, overlapping services, and other traps, there are more than enough hidden costs that constrain precious cybersecurity budgets.</p>]]></content:encoded><link><![CDATA[https://3zozb9fxlbueipjyapmaas.captivate.fm/episode/episode-252-edwin-kwan-equifax-ltd-fined-11-million-for-preventable-cybersecurity-breach-ian-garrett-10-hidden-costs-draining-ciso-security-budgets-part-1-mark-miller-follow-up-to-atlassian-confluence-level-10-vulnerability-alert-marcel-brown-this-day-...]]></link><guid isPermaLink="false">3de7ea2b-6a3d-4b38-8af8-91f9bff9ad94</guid><itunes:image href="https://artwork.captivate.fm/33e2a4e7-a936-4ef5-905a-3a72363cfbe4/BkhMbfQsRHQi9QFk9GvnUJSv.png"/><dc:creator><![CDATA[Contributors from Around the World]]></dc:creator><pubDate>Tue, 17 Oct 2023 16:45:00 -0400</pubDate><enclosure url="https://dts.podtrac.com/redirect.mp3/podcasts.captivate.fm/media/755758bb-1d92-4cc7-acf5-194e5f9a961a/505-2023-10-17-Episode-252-Final-converted.mp3" length="10629426" type="audio/mpeg"/><itunes:duration>08:51</itunes:duration><itunes:explicit>false</itunes:explicit><itunes:episodeType>full</itunes:episodeType><itunes:season>1</itunes:season><itunes:episode>252</itunes:episode><itunes:season>1</itunes:season><podcast:episode>252</podcast:episode><podcast:season>1</podcast:season><itunes:author>Contributors from Around the World</itunes:author></item><item><title>Episode #251: Edwin Kwan: Queensland Introduces Mandatory Data Breach Notification; Mark Miller: Overwhelmed with Cybersecurity Alerts? Yeah, so am I.; Hillary Coover: Government vs Corporate Surveillance: Which is more Intrusive?; Marcel Brown: This Day in Tech History</title><itunes:title>Episode #251: Edwin Kwan: Queensland Introduces Mandatory Data Breach Notification; Mark Miller: Overwhelmed with Cybersecurity Alerts? Yeah, so am I.; Hillary Coover: Government vs Corporate Surveillance: Which is more Intrusive?; Marcel Brown: This Day in Tech History</itunes:title><description><![CDATA[<p>Free, ungated access to all 250+ episodes of “It’s 5:05!” on your favorite podcast platforms: <a href="https://bit.ly/505-updates" rel="noopener noreferrer" target="_blank">https://bit.ly/505-updates</a>. You’re welcome to 𝗿𝗲𝗽𝗼𝘀𝘁 if your followers will find this of value.</p><p>The stories we’re covering today.</p><p>Marcel Brown: October 16th, 1959. Control Data Corporation releases their CDC 1604 computer, the world's fastest computer at the time, and the first commercially successful fully-transistorized computer.  The 1604 was CDC's first computer, primarily designed by engineer Seymour Cray. </p><p>Mark Miller: All the "recommendations" are saying use strong passwords, train your people, update your software, yadda, yadda, yadda, same ol', same ol'. That's not working- it never has. I'm not arguing against good practices like this, but when the shit hits the fan, what you REALLY want is a good backup. </p><p>Hillary Coover: The technology ingrained in our smartphones and computers designed for displaying advertisements, inadvertently serves as a conduit for surveillance. A recent report from the US intelligence community emphasized that consumer technologies expose sensitive information about everyone, often without their awareness or ability to prevent it. </p><p>Edwin Kwan: The Attorney General said that recent high-profile data breaches have demonstrated that disclosure of personal information has the potential to result in serious harm to individuals, which is why they are establishing the scheme so that there are clear, consistent requirements to notify individuals of data breaches of Queensland government agencies. </p>]]></description><content:encoded><![CDATA[<p>Free, ungated access to all 250+ episodes of “It’s 5:05!” on your favorite podcast platforms: <a href="https://bit.ly/505-updates" rel="noopener noreferrer" target="_blank">https://bit.ly/505-updates</a>. You’re welcome to 𝗿𝗲𝗽𝗼𝘀𝘁 if your followers will find this of value.</p><p>The stories we’re covering today.</p><p>Marcel Brown: October 16th, 1959. Control Data Corporation releases their CDC 1604 computer, the world's fastest computer at the time, and the first commercially successful fully-transistorized computer.  The 1604 was CDC's first computer, primarily designed by engineer Seymour Cray. </p><p>Mark Miller: All the "recommendations" are saying use strong passwords, train your people, update your software, yadda, yadda, yadda, same ol', same ol'. That's not working- it never has. I'm not arguing against good practices like this, but when the shit hits the fan, what you REALLY want is a good backup. </p><p>Hillary Coover: The technology ingrained in our smartphones and computers designed for displaying advertisements, inadvertently serves as a conduit for surveillance. A recent report from the US intelligence community emphasized that consumer technologies expose sensitive information about everyone, often without their awareness or ability to prevent it. </p><p>Edwin Kwan: The Attorney General said that recent high-profile data breaches have demonstrated that disclosure of personal information has the potential to result in serious harm to individuals, which is why they are establishing the scheme so that there are clear, consistent requirements to notify individuals of data breaches of Queensland government agencies. </p>]]></content:encoded><link><![CDATA[https://3zozb9fxlbueipjyapmaas.captivate.fm/episode/episode-251-edwin-kwan-queensland-introduces-mandatory-data-breach-notification-mark-miller-overwhelmed-with-cybersecurity-alerts-yeah-so-am-i-hillary-coover-government-vs-corporate-surveillance-which-is-more-intrusive-marcel-brown-this-day-in-tech-his...]]></link><guid isPermaLink="false">85eaa33b-a9b2-443e-b4ff-43faf01e6151</guid><itunes:image href="https://artwork.captivate.fm/fa3e9348-eb82-40be-aa70-ace509c7f2f9/dG_JsN0SeTDERkAhMt_rOMxv.jpg"/><dc:creator><![CDATA[Contributors from Around the World]]></dc:creator><pubDate>Mon, 16 Oct 2023 16:45:00 -0400</pubDate><enclosure url="https://dts.podtrac.com/redirect.mp3/podcasts.captivate.fm/media/176a60a7-a779-4afe-bfec-58b2ce750a08/505-2023-10-16-Episode-251-Final-converted.mp3" length="12653392" type="audio/mpeg"/><itunes:duration>10:33</itunes:duration><itunes:explicit>false</itunes:explicit><itunes:episodeType>full</itunes:episodeType><itunes:season>1</itunes:season><itunes:episode>251</itunes:episode><itunes:season>1</itunes:season><podcast:episode>251</podcast:episode><podcast:season>1</podcast:season><itunes:author>Contributors from Around the World</itunes:author></item><item><title>Episode #250: ChatGPT’s maker OpenAI is thinking about making AI chips; Curl Patches Worst Security Flaw in Ages; Is OpenAI the Next Google</title><itunes:title>Episode #250: ChatGPT’s maker OpenAI is thinking about making AI chips; Curl Patches Worst Security Flaw in Ages; Is OpenAI the Next Google</itunes:title><description><![CDATA[<p>🎙️ Free, ungated access to all 235+ episodes of “It’s 5:05!” on your favorite podcast platforms: https://bit.ly/505-updates. ♻️ You’re welcome to 𝗿𝗲𝗽𝗼𝘀𝘁 if your followers will find this of value.</p><p>The stories we're covering today.</p><p>Marcel Brown:  October 13th, 1983. Ameritech Mobile Communications executive, Bob Barnett, makes a phone call from a car parked near Soldier Field in Chicago, officially launching the first cellular network in the United States.</p><p>Edwin Kwan: Patches have been released for two security vulnerabilities affecting the Curl data transfer library, one of which could potentially result in code execution. </p><p>Katy Craig: OpenAI, a leading AI startup, is considering venturing into the development of its own AI chips.  The reverse integration move aims to reduce dependency on GPU-based hardware, which has been strained by the generative AI boom.</p><p>Shannon Lietz:  This essentially means that we're going to see AI be the beginning of the reunification of hardware and software. And ultimately, where I see cybersecurity getting built in is going to be in these mega players.</p><p>Olimpiu Pop:  An analysis considers that they would need $ 48 billion worth in GPU chips and another $16 billion per year in maintenance costs. That's quite a pile of money, even for a company with a sack of gold. For this reason,  also for the shortage of the  GPU chips, OpenAI considers building their own. </p>]]></description><content:encoded><![CDATA[<p>🎙️ Free, ungated access to all 235+ episodes of “It’s 5:05!” on your favorite podcast platforms: https://bit.ly/505-updates. ♻️ You’re welcome to 𝗿𝗲𝗽𝗼𝘀𝘁 if your followers will find this of value.</p><p>The stories we're covering today.</p><p>Marcel Brown:  October 13th, 1983. Ameritech Mobile Communications executive, Bob Barnett, makes a phone call from a car parked near Soldier Field in Chicago, officially launching the first cellular network in the United States.</p><p>Edwin Kwan: Patches have been released for two security vulnerabilities affecting the Curl data transfer library, one of which could potentially result in code execution. </p><p>Katy Craig: OpenAI, a leading AI startup, is considering venturing into the development of its own AI chips.  The reverse integration move aims to reduce dependency on GPU-based hardware, which has been strained by the generative AI boom.</p><p>Shannon Lietz:  This essentially means that we're going to see AI be the beginning of the reunification of hardware and software. And ultimately, where I see cybersecurity getting built in is going to be in these mega players.</p><p>Olimpiu Pop:  An analysis considers that they would need $ 48 billion worth in GPU chips and another $16 billion per year in maintenance costs. That's quite a pile of money, even for a company with a sack of gold. For this reason,  also for the shortage of the  GPU chips, OpenAI considers building their own. </p>]]></content:encoded><link><![CDATA[https://3zozb9fxlbueipjyapmaas.captivate.fm/episode/episode-250-chatgpts-maker-openai-is-thinking-about-making-ai-chips-curl-patches-worst-security-flaw-in-ages-is-chatgpt-the-next-google]]></link><guid isPermaLink="false">3d27f088-356e-44c7-bc21-3556bc83ba44</guid><itunes:image href="https://artwork.captivate.fm/33e2a4e7-a936-4ef5-905a-3a72363cfbe4/BkhMbfQsRHQi9QFk9GvnUJSv.png"/><dc:creator><![CDATA[Contributors from Around the World]]></dc:creator><pubDate>Fri, 13 Oct 2023 16:45:00 -0400</pubDate><enclosure url="https://dts.podtrac.com/redirect.mp3/podcasts.captivate.fm/media/932a54b6-8d68-4dee-8020-d5947d255da2/505-2023-10-13-Episode-250-Friday-Final-converted.mp3" length="15115694" type="audio/mpeg"/><itunes:duration>12:36</itunes:duration><itunes:explicit>false</itunes:explicit><itunes:episodeType>full</itunes:episodeType><itunes:season>1</itunes:season><itunes:episode>250</itunes:episode><itunes:season>1</itunes:season><podcast:episode>250</podcast:episode><podcast:season>1</podcast:season><itunes:author>Contributors from Around the World</itunes:author></item><item><title>Episode 249: Edwin Kwan: Vulnerable WordPress Plugin Results in Thousands of Sites Hacked; Ian Garrett: 5 Tips to Take Zero Trust from Buzzword to Implementation; Mark Miller: CISA and FBI: AvosLocker Ransomware (Update); Marcel Brown: This Day in Tech History</title><itunes:title>Episode 249: Edwin Kwan: Vulnerable WordPress Plugin Results in Thousands of Sites Hacked; Ian Garrett: 5 Tips to Take Zero Trust from Buzzword to Implementation; Mark Miller: CISA and FBI: AvosLocker Ransomware (Update); Marcel Brown: This Day in Tech History</itunes:title><description><![CDATA[<p>Free, ungated access to all 245+ episodes of “It’s 5:05!” on your favorite podcast platforms: <a href="https://bit.ly/505-updates" rel="noopener noreferrer" target="_blank">https://bit.ly/505-updates</a>. You’re welcome to 𝗿𝗲𝗽𝗼𝘀𝘁 if your followers will find this of value.</p><p>The stories we’re covering today.</p><p>Marcel Brown: October 12th, 1988. Hailed by Steve Jobs as a computer five years ahead of its time, NeXT Incorporated introduces their NeXT computer. While not a significant commercial success, the NeXT computer and the technology developed for it have a long and storied history. </p><p>Edwin Kwan: Thousands of WordPress websites have been compromised by attackers exploiting a vulnerability in a popular plugin. A fixed version of the plugin has been released and users are urged to update to version 4.2 or later, immediately.</p><p>Ian Garrett: Does hearing the term "zero-trust" make you roll your eyes? More organizations are taking zero-trust from a buzzword to reality as the traditional castle-in-moat approach to security is becoming obsolete. Let's cover some practical recommendations for implementing a zero-trust cybersecurity framework.</p><p> Mark Miller: AvosLocker, the Ransomware as a Service (RaaS) group, continues to get the attention of CISA and the FBI. Yesterday, October 11, the March 2023 joint advisory on AvosLocker was updated with the latest warnings. </p>]]></description><content:encoded><![CDATA[<p>Free, ungated access to all 245+ episodes of “It’s 5:05!” on your favorite podcast platforms: <a href="https://bit.ly/505-updates" rel="noopener noreferrer" target="_blank">https://bit.ly/505-updates</a>. You’re welcome to 𝗿𝗲𝗽𝗼𝘀𝘁 if your followers will find this of value.</p><p>The stories we’re covering today.</p><p>Marcel Brown: October 12th, 1988. Hailed by Steve Jobs as a computer five years ahead of its time, NeXT Incorporated introduces their NeXT computer. While not a significant commercial success, the NeXT computer and the technology developed for it have a long and storied history. </p><p>Edwin Kwan: Thousands of WordPress websites have been compromised by attackers exploiting a vulnerability in a popular plugin. A fixed version of the plugin has been released and users are urged to update to version 4.2 or later, immediately.</p><p>Ian Garrett: Does hearing the term "zero-trust" make you roll your eyes? More organizations are taking zero-trust from a buzzword to reality as the traditional castle-in-moat approach to security is becoming obsolete. Let's cover some practical recommendations for implementing a zero-trust cybersecurity framework.</p><p> Mark Miller: AvosLocker, the Ransomware as a Service (RaaS) group, continues to get the attention of CISA and the FBI. Yesterday, October 11, the March 2023 joint advisory on AvosLocker was updated with the latest warnings. </p>]]></content:encoded><link><![CDATA[https://3zozb9fxlbueipjyapmaas.captivate.fm/episode/episode-249-edwin-kwan-vulnerable-wordpress-plugin-results-in-thousands-of-sites-hacked-ian-garrett-5-tips-to-take-zero-trust-from-buzzword-to-implementation-mark-miller-cisa-and-fbi-avoslocker-ransomware-update-marcel-brown-this-day-in-tech-history]]></link><guid isPermaLink="false">43bc54fb-6292-43b5-bf3d-38b3f5ea63e4</guid><itunes:image href="https://artwork.captivate.fm/c7cdea83-d489-43bf-a3f7-0dbd4dd903c5/wnoDKos8gR2-6QiPJ-hpzAxX.jpg"/><dc:creator><![CDATA[Contributors from Around the World]]></dc:creator><pubDate>Thu, 12 Oct 2023 16:45:00 -0400</pubDate><enclosure url="https://dts.podtrac.com/redirect.mp3/podcasts.captivate.fm/media/07357296-8a08-41a8-9d5b-4f3b9b2fe8be/505-2023-10-12-Episode-249-Final-converted.mp3" length="11556251" type="audio/mpeg"/><itunes:duration>09:38</itunes:duration><itunes:explicit>false</itunes:explicit><itunes:episodeType>full</itunes:episodeType><itunes:season>1</itunes:season><itunes:episode>249</itunes:episode><itunes:season>1</itunes:season><podcast:episode>249</podcast:episode><podcast:season>1</podcast:season><itunes:author>Contributors from Around the World</itunes:author></item><item><title>Episode 248: Edwin Kwan: D-Link Wi-Fi Device Vulnerable to Command Injection Attack; Katy Craig: Google Goes Passwordless; Hillary Coover: FDA Adapting to AI: Balancing Innovation and Safety; Marcel Brown: This Day, October 11th, in Tech History</title><itunes:title>Episode 248: Edwin Kwan: D-Link Wi-Fi Device Vulnerable to Command Injection Attack; Katy Craig: Google Goes Passwordless; Hillary Coover: FDA Adapting to AI: Balancing Innovation and Safety; Marcel Brown: This Day, October 11th, in Tech History</itunes:title><description><![CDATA[<p>Free, ungated access to all 245+ episodes of “It’s 5:05!” on your favorite podcast platforms: <a href="https://bit.ly/505-updates" rel="noopener noreferrer" target="_blank">https://bit.ly/505-updates</a>. You’re welcome to 𝗿𝗲𝗽𝗼𝘀𝘁 if your followers will find this of value.</p><p>The stories we’re covering today.</p><p>Marcel Brown: October 11, 1887. Dorr Eugene Felt is granted the second of two patents on his comptometer, the first practical and commercially successful key-driven, mechanical calculator. Various comptometers were in continuous production from 1887 to the mid 1970s.</p><p>Edwin Kwan: A popular D-Link WiFi range extender device is susceptible to remote command injection, and there is currently no fix available. The researchers reached out to D-Link to report the flaw in May 2023, but despite multiple follow ups, did not receive any replies.</p><p>Katy Craig:  Google is taking a significant step towards enhancing online security by making 'passkeys' the default login method on its platforms. Passkeys are digital credentials stored on a user's device, eliminating the need to remember passwords and offering a more secure alternative. </p><p>Hillary Coover: Can the FDA keep pace with the rapidly evolving world of AI in healthcare? As developers incorporate more advanced AI systems with human-like outputs, debates around FDA regulation are going to intensify.</p>]]></description><content:encoded><![CDATA[<p>Free, ungated access to all 245+ episodes of “It’s 5:05!” on your favorite podcast platforms: <a href="https://bit.ly/505-updates" rel="noopener noreferrer" target="_blank">https://bit.ly/505-updates</a>. You’re welcome to 𝗿𝗲𝗽𝗼𝘀𝘁 if your followers will find this of value.</p><p>The stories we’re covering today.</p><p>Marcel Brown: October 11, 1887. Dorr Eugene Felt is granted the second of two patents on his comptometer, the first practical and commercially successful key-driven, mechanical calculator. Various comptometers were in continuous production from 1887 to the mid 1970s.</p><p>Edwin Kwan: A popular D-Link WiFi range extender device is susceptible to remote command injection, and there is currently no fix available. The researchers reached out to D-Link to report the flaw in May 2023, but despite multiple follow ups, did not receive any replies.</p><p>Katy Craig:  Google is taking a significant step towards enhancing online security by making 'passkeys' the default login method on its platforms. Passkeys are digital credentials stored on a user's device, eliminating the need to remember passwords and offering a more secure alternative. </p><p>Hillary Coover: Can the FDA keep pace with the rapidly evolving world of AI in healthcare? As developers incorporate more advanced AI systems with human-like outputs, debates around FDA regulation are going to intensify.</p>]]></content:encoded><link><![CDATA[https://3zozb9fxlbueipjyapmaas.captivate.fm/episode/episode-248-edwin-kwan-d-link-wi-fi-device-vulnerable-to-command-injection-attack-katy-craig-google-goes-passwordless-hillary-coover-fda-adapting-to-ai-balancing-innovation-and-safety-marcel-brown-this-day-october-11th-in-tech-history]]></link><guid isPermaLink="false">6d4a87d2-d761-4a32-9b48-9ce67ad0659e</guid><itunes:image href="https://artwork.captivate.fm/33e2a4e7-a936-4ef5-905a-3a72363cfbe4/BkhMbfQsRHQi9QFk9GvnUJSv.png"/><dc:creator><![CDATA[Contributors from Around the World]]></dc:creator><pubDate>Wed, 11 Oct 2023 16:45:00 -0400</pubDate><enclosure url="https://dts.podtrac.com/redirect.mp3/podcasts.captivate.fm/media/47d2c54c-ca13-4a9e-b8b7-84802cbbd1c4/505-2023-10-11-Episode-248-Final-converted.mp3" length="10157134" type="audio/mpeg"/><itunes:duration>08:28</itunes:duration><itunes:explicit>false</itunes:explicit><itunes:episodeType>full</itunes:episodeType><itunes:season>1</itunes:season><itunes:episode>248</itunes:episode><itunes:season>1</itunes:season><podcast:episode>248</podcast:episode><podcast:season>1</podcast:season><itunes:author>Contributors from Around the World</itunes:author></item><item><title>Episode #247: Edwin Kwan: Linux Distributions Vulnerable to Looney Tunables; Katy Craig: Hactivists Enter the Middle-East Fray; Ian Garret: Google Helps Drive the End of Passwords; Marcel Brown:  This Day in Tech History.</title><itunes:title>Episode #247: Edwin Kwan: Linux Distributions Vulnerable to Looney Tunables; Katy Craig: Hactivists Enter the Middle-East Fray; Ian Garret: Google Helps Drive the End of Passwords; Marcel Brown:  This Day in Tech History.</itunes:title><description><![CDATA[<p>Free, ungated access to all 245+ episodes of “It’s 5:05!” on your favorite podcast platforms: <a href="https://bit.ly/505-updates" rel="noopener noreferrer" target="_blank">https://bit.ly/505-updates</a>. You’re welcome to 𝗿𝗲𝗽𝗼𝘀𝘁 if your followers will find this of value.</p><p>The stories we’re covering today:</p><p>Marcel Brown: October 10th, 1980. Namco officially transfers rights to Midway for distribution of the games Pac-Man and Rally-X in North America. While the exact date that Pac-Man started shipping to arcades in North America is currently unknown, most sources cite October of 1980.</p><p>Edwin Kwan: A new Linux vulnerability, known as the Looney Tunables, impacts most Linux distributions and allows attackers to gain administrative root privileges. </p><p>Katy Craig:  In the midst of ongoing clashes between Hamas and the Israel Defense Forces, hacktivist groups have entered the digital battleground.  Cybersecurity experts warn of the growing involvement of threat actor groups in digital attacks on government websites and IT systems.</p><p>Ian Garrett: Is this the beginning of the end of passwords as we know them? Google has made the move to make passkeys the default sign-in option for personal Google accounts, simplifying the login process and enhancing security. </p>]]></description><content:encoded><![CDATA[<p>Free, ungated access to all 245+ episodes of “It’s 5:05!” on your favorite podcast platforms: <a href="https://bit.ly/505-updates" rel="noopener noreferrer" target="_blank">https://bit.ly/505-updates</a>. You’re welcome to 𝗿𝗲𝗽𝗼𝘀𝘁 if your followers will find this of value.</p><p>The stories we’re covering today:</p><p>Marcel Brown: October 10th, 1980. Namco officially transfers rights to Midway for distribution of the games Pac-Man and Rally-X in North America. While the exact date that Pac-Man started shipping to arcades in North America is currently unknown, most sources cite October of 1980.</p><p>Edwin Kwan: A new Linux vulnerability, known as the Looney Tunables, impacts most Linux distributions and allows attackers to gain administrative root privileges. </p><p>Katy Craig:  In the midst of ongoing clashes between Hamas and the Israel Defense Forces, hacktivist groups have entered the digital battleground.  Cybersecurity experts warn of the growing involvement of threat actor groups in digital attacks on government websites and IT systems.</p><p>Ian Garrett: Is this the beginning of the end of passwords as we know them? Google has made the move to make passkeys the default sign-in option for personal Google accounts, simplifying the login process and enhancing security. </p>]]></content:encoded><link><![CDATA[https://3zozb9fxlbueipjyapmaas.captivate.fm/episode/episode-247-edwin-kwan-linux-distributions-vulnerable-to-looney-tunables-katy-craig-hactivists-enter-the-middle-east-fray-ian-garret-google-helps-drive-the-end-of-passwords-marcel-brown-this-day-in-tech-history-]]></link><guid isPermaLink="false">4463e216-b411-4e1e-9ccd-b4940a288e4b</guid><itunes:image href="https://artwork.captivate.fm/12c45c1d-00dc-4145-a5ed-29323c960e10/ApNqtGAUU8SagbH7R8oIziao.jpg"/><dc:creator><![CDATA[Contributors from Around the World]]></dc:creator><pubDate>Tue, 10 Oct 2023 16:45:00 -0400</pubDate><enclosure url="https://dts.podtrac.com/redirect.mp3/podcasts.captivate.fm/media/a64ade3b-01d6-48c9-822a-c00794eec6b8/505-2023-10-10-Episode-247-Final-converted.mp3" length="10337899" type="audio/mpeg"/><itunes:duration>08:37</itunes:duration><itunes:explicit>false</itunes:explicit><itunes:episodeType>full</itunes:episodeType><itunes:season>1</itunes:season><itunes:episode>247</itunes:episode><itunes:season>1</itunes:season><podcast:episode>247</podcast:episode><podcast:season>1</podcast:season><itunes:author>Contributors from Around the World</itunes:author></item><item><title>Episode #246: ShellTorch Flaw Affecting Open Source AI Servers; Human Powered Ransomware; Bipartisan Commission Seeks TikTok&apos;s Response</title><itunes:title>Episode #246: ShellTorch Flaw Affecting Open Source AI Servers; Human Powered Ransomware; Bipartisan Commission Seeks TikTok&apos;s Response</itunes:title><description><![CDATA[<p>Free, ungated access to all 235+ episodes of “It’s 5:05!” on your favorite podcast platforms: <a href="https://bit.ly/505-updates" rel="noopener noreferrer" target="_blank">https://bit.ly/505-updates</a>. You’re welcome to 𝗿𝗲𝗽𝗼𝘀𝘁 if your followers will find this of value. </p><p>The stories we’re covering today.</p><p>Marcel Brown: October 8th, 1992. The video game Mortal Kombat is released into arcades. Now one of the most popular fighting game series in history, the original Mortal Kombat became well known for its graphic display of blood and deadly finishing moves known as Fatalities.</p><p>Edwin Kwan: Security researchers have disclosed multiple critical vulnerabilities in the TorchServe tool that could be chained together to achieve remote code execution on affected systems. </p><p>Hillary Coover: Could TikTok's recent personnel shifts from Beijing to the United States be a threat to security of US data? And is the popular app truly independent from its Chinese parent company, ByteDance? </p><p>Katy Craig: In a concerning shift, ransomware attacks have taken a sinister turn, with a significant rise in human-operated ransomware incidents, according to Microsoft's annual digital defense report.</p>]]></description><content:encoded><![CDATA[<p>Free, ungated access to all 235+ episodes of “It’s 5:05!” on your favorite podcast platforms: <a href="https://bit.ly/505-updates" rel="noopener noreferrer" target="_blank">https://bit.ly/505-updates</a>. You’re welcome to 𝗿𝗲𝗽𝗼𝘀𝘁 if your followers will find this of value. </p><p>The stories we’re covering today.</p><p>Marcel Brown: October 8th, 1992. The video game Mortal Kombat is released into arcades. Now one of the most popular fighting game series in history, the original Mortal Kombat became well known for its graphic display of blood and deadly finishing moves known as Fatalities.</p><p>Edwin Kwan: Security researchers have disclosed multiple critical vulnerabilities in the TorchServe tool that could be chained together to achieve remote code execution on affected systems. </p><p>Hillary Coover: Could TikTok's recent personnel shifts from Beijing to the United States be a threat to security of US data? And is the popular app truly independent from its Chinese parent company, ByteDance? </p><p>Katy Craig: In a concerning shift, ransomware attacks have taken a sinister turn, with a significant rise in human-operated ransomware incidents, according to Microsoft's annual digital defense report.</p>]]></content:encoded><link><![CDATA[https://3zozb9fxlbueipjyapmaas.captivate.fm/episode/episode-246-shelltorch-flaw-affecting-open-source-ai-servers-human-powered-ransomware-bipartisan-commission-seeks-tiktoks-response]]></link><guid isPermaLink="false">92302086-76ec-4c66-8123-768ba31f1b34</guid><itunes:image href="https://artwork.captivate.fm/1ea15783-7668-4a9f-a41c-c164adf2c206/Rvc4YKfQ3y1vSysa_YtlyB3v.jpg"/><dc:creator><![CDATA[Contributors from Around the World]]></dc:creator><pubDate>Mon, 09 Oct 2023 16:45:00 -0400</pubDate><enclosure url="https://dts.podtrac.com/redirect.mp3/podcasts.captivate.fm/media/3fd6371c-eb19-4707-9d36-9b11849fd6a2/505-2023-10-09-Episode-246-Final-converted.mp3" length="9914714" type="audio/mpeg"/><itunes:duration>08:16</itunes:duration><itunes:explicit>false</itunes:explicit><itunes:episodeType>full</itunes:episodeType><itunes:season>1</itunes:season><itunes:episode>246</itunes:episode><itunes:season>1</itunes:season><podcast:episode>246</podcast:episode><podcast:season>1</podcast:season><itunes:author>Contributors from Around the World</itunes:author></item><item><title>Episode #245: npm Typo-Squat Deploys RootKits; Software Supply Chain: What Matters to an Architect; Security During Software Creation; OpenSSF Scorecards for Open Source</title><itunes:title>Episode #245: npm Typo-Squat Deploys RootKits; Software Supply Chain: What Matters to an Architect; Security During Software Creation; OpenSSF Scorecards for Open Source</itunes:title><description><![CDATA[<p>🎙️ Free, ungated access to all 235+ episodes of “It’s 5:05!” on your favorite podcast platforms: https://bit.ly/505-updates. ♻️ You’re welcome to 𝗿𝗲𝗽𝗼𝘀𝘁 if your followers will find this of value.</p><p>The stories we're covering today.</p><p>Marcel Brown:  October 6th, 1942. Chester Carlson is issued a patent on a process called electrophotography, now commonly known as photocopying. It was not until 1946 that a company had any interest in pursuing photocopying commercially.</p><p>Edwin Kwan: A malicious component in the npm package registry has been found to be deploying an open-source rootkit. This incident is a reminder that developers need to take caution when installing open-source components.</p><p>Trac Bannon: Sonatype has released the 9th Annual State of Supply Chain Report. One of the most important evolutions is the emphasis on security during software creation.</p><p>Olimpiu Pop: Sonatype published the 9th edition of their already-traditional state of the software supply chain report. There is a high need of continuously monitoring the state of the libraries that we are using in our projects. According to the report, 18.6% of the open-source projects are not maintained anymore.</p><p>Katy Craig: OpenSSF is to software, what a health inspector is to restaurants. And guess what? They’ve got scorecards. Good scores here don’t just get you bragging rights. They predict fewer vulnerabilities, so your software is not just rocking it, it’s also locking it down.</p>]]></description><content:encoded><![CDATA[<p>🎙️ Free, ungated access to all 235+ episodes of “It’s 5:05!” on your favorite podcast platforms: https://bit.ly/505-updates. ♻️ You’re welcome to 𝗿𝗲𝗽𝗼𝘀𝘁 if your followers will find this of value.</p><p>The stories we're covering today.</p><p>Marcel Brown:  October 6th, 1942. Chester Carlson is issued a patent on a process called electrophotography, now commonly known as photocopying. It was not until 1946 that a company had any interest in pursuing photocopying commercially.</p><p>Edwin Kwan: A malicious component in the npm package registry has been found to be deploying an open-source rootkit. This incident is a reminder that developers need to take caution when installing open-source components.</p><p>Trac Bannon: Sonatype has released the 9th Annual State of Supply Chain Report. One of the most important evolutions is the emphasis on security during software creation.</p><p>Olimpiu Pop: Sonatype published the 9th edition of their already-traditional state of the software supply chain report. There is a high need of continuously monitoring the state of the libraries that we are using in our projects. According to the report, 18.6% of the open-source projects are not maintained anymore.</p><p>Katy Craig: OpenSSF is to software, what a health inspector is to restaurants. And guess what? They’ve got scorecards. Good scores here don’t just get you bragging rights. They predict fewer vulnerabilities, so your software is not just rocking it, it’s also locking it down.</p>]]></content:encoded><link><![CDATA[https://3zozb9fxlbueipjyapmaas.captivate.fm/episode/episode-245-npm-typo-squat-deploys-rootkits-software-supply-chain-what-matters-to-an-architect-security-during-software-creation-openssf-scorecards-for-open-source]]></link><guid isPermaLink="false">45358f40-c19c-4f98-a760-c3d0ae90cb6c</guid><itunes:image href="https://artwork.captivate.fm/00403370-4e78-4a5e-bb2a-72a425d25822/Z5qdls6_pBSm6t4Y0TobsSmu.jpg"/><dc:creator><![CDATA[Contributors from Around the World]]></dc:creator><pubDate>Fri, 06 Oct 2023 16:45:00 -0400</pubDate><enclosure url="https://dts.podtrac.com/redirect.mp3/podcasts.captivate.fm/media/d32cadf6-77f2-44e6-b687-7418164220b8/505-2023-10-06-Episode-245-Final-converted.mp3" length="17705996" type="audio/mpeg"/><itunes:duration>14:45</itunes:duration><itunes:explicit>false</itunes:explicit><itunes:episodeType>full</itunes:episodeType><itunes:season>1</itunes:season><itunes:episode>245</itunes:episode><itunes:season>1</itunes:season><podcast:episode>245</podcast:episode><podcast:season>1</podcast:season><itunes:author>Contributors from Around the World</itunes:author></item><item><title>Episode #244: Exploitation of WS_FTP Vulnerability; Cybersecurity Fight Against Human Trafficking; Permission Slip: Manage Your Digital Data</title><itunes:title>Episode #244: Exploitation of WS_FTP Vulnerability; Cybersecurity Fight Against Human Trafficking; Permission Slip: Manage Your Digital Data</itunes:title><description><![CDATA[<p>🎙️ Free, ungated access to all 235+ episodes of “It’s 5:05!” on your favorite podcast platforms: https://bit.ly/505-updates. ♻️ You’re welcome to 𝗿𝗲𝗽𝗼𝘀𝘁 if your followers will find this of value.</p><p>The stories we're covering today.</p><p>Marcel Brown: October 5th, 1991. At just 21 years old, Linus Torvalds releases the first publicly available version of the Linux kernel, version 0.2, weighing in at just over 10,000 lines of code when first released. As of 2020, the Linux kernel was nearly 30 million lines of code. </p><p>Edwin Kwan:  Security researchers have spotted evidence of mass exploitation of vulnerabilities in Progress Software's WS_FTP server file-sharing platform. The server file-sharing platform has a maximum severity remote code execution vulnerability, which attackers can exploit using a simple HTTP request.</p><p>Katy Craig: There's a new app called Permission Slip by CR that empowers you to take control of your personal information. With Permission Slip, you can swipe through a list of companies that may possess your data, and with a simple tap, request them to delete your account or halt the sale of your information.</p><p>Did you know that over 50 million people are affected worldwide by modern human trafficking? Have you ever considered the fact that the very technology cybersecurity and open-source professionals use day in and day out could be used to help combat such evil?</p>]]></description><content:encoded><![CDATA[<p>🎙️ Free, ungated access to all 235+ episodes of “It’s 5:05!” on your favorite podcast platforms: https://bit.ly/505-updates. ♻️ You’re welcome to 𝗿𝗲𝗽𝗼𝘀𝘁 if your followers will find this of value.</p><p>The stories we're covering today.</p><p>Marcel Brown: October 5th, 1991. At just 21 years old, Linus Torvalds releases the first publicly available version of the Linux kernel, version 0.2, weighing in at just over 10,000 lines of code when first released. As of 2020, the Linux kernel was nearly 30 million lines of code. </p><p>Edwin Kwan:  Security researchers have spotted evidence of mass exploitation of vulnerabilities in Progress Software's WS_FTP server file-sharing platform. The server file-sharing platform has a maximum severity remote code execution vulnerability, which attackers can exploit using a simple HTTP request.</p><p>Katy Craig: There's a new app called Permission Slip by CR that empowers you to take control of your personal information. With Permission Slip, you can swipe through a list of companies that may possess your data, and with a simple tap, request them to delete your account or halt the sale of your information.</p><p>Did you know that over 50 million people are affected worldwide by modern human trafficking? Have you ever considered the fact that the very technology cybersecurity and open-source professionals use day in and day out could be used to help combat such evil?</p>]]></content:encoded><link><![CDATA[https://3zozb9fxlbueipjyapmaas.captivate.fm/episode/episode-244-exploitation-of-ws-ftp-vulnerability-cybersecurity-fight-against-human-trafficking-permission-slip-manage-your-digital-data]]></link><guid isPermaLink="false">432da8a6-231f-4191-9d87-66c8a33fabde</guid><itunes:image href="https://artwork.captivate.fm/d66c1594-d2a2-4514-8ed6-d1246542fb10/UBkmgVhNHSc66awcK7uXeDt7.jpg"/><dc:creator><![CDATA[Contributors from Around the World]]></dc:creator><pubDate>Thu, 05 Oct 2023 16:45:00 -0400</pubDate><enclosure url="https://dts.podtrac.com/redirect.mp3/podcasts.captivate.fm/media/28b21d9b-f85f-4401-9ee8-90cf34d33df7/505-2023-10-05-Episode-244-Final-converted.mp3" length="10587108" type="audio/mpeg"/><itunes:duration>08:49</itunes:duration><itunes:explicit>false</itunes:explicit><itunes:episodeType>full</itunes:episodeType><itunes:season>1</itunes:season><itunes:episode>244</itunes:episode><itunes:season>1</itunes:season><podcast:episode>244</podcast:episode><podcast:season>1</podcast:season><itunes:author>Contributors from Around the World</itunes:author></item><item><title>Episode #243: Critical Vulnerability in Popular Image Rendering Library Under Active Exploitation; Google Alters Search Queries for Profits; Hundreds of Women in Cybersecurity Convene in Arlington, VA to Drive Industry Transformation; This Day in Tech History</title><itunes:title>Episode #243: Critical Vulnerability in Popular Image Rendering Library Under Active Exploitation; Google Alters Search Queries for Profits; Hundreds of Women in Cybersecurity Convene in Arlington, VA to Drive Industry Transformation; This Day in Tech History</itunes:title><description><![CDATA[<p>🎙️ Free, ungated access to all 235+ episodes of “It’s 5:05!” on your favorite podcast platforms: https://bit.ly/505-updates. ♻️ You’re welcome to 𝗿𝗲𝗽𝗼𝘀𝘁 if your followers will find this of value.</p><p>Mark Miller:  October 4th, 1968. The new issue of Science Magazine contains a Hewlett Packard ad for its new HP9100A. The ad boasted the dynamic functionality of this new device called both a personal computer. and a programmable calculator.   </p><p>Edwin Kwan: A popular library for rendering images in the WebP format has a critical vulnerability that is under active exploitation. The vulnerability is with the LibWebP library and it suffers from a heap buffer overflow, which allows a remote attacker to perform an out-of-bounds memory write.</p><p>Katy Craig:  Google is secretly altering billions of queries every day, all with one goal in mind: to lead you into purchasing more products and services.</p><p>Hillary Coover: We're all familiar with the "She-cession,"  but were you aware that the cybersecurity industry lost 40 percent of its female workforce in that time? That, along with many other jaw-dropping insights, came out of this week's gathering of hundreds of women in cybersecurity. </p><p>From Sourced Network Productions in Washington, DC, it's 5:05. I'm Hillary Coover. Today is Monday, October 4th, 2023. Here's the full story behind today's cyber security and open-source headlines.</p>]]></description><content:encoded><![CDATA[<p>🎙️ Free, ungated access to all 235+ episodes of “It’s 5:05!” on your favorite podcast platforms: https://bit.ly/505-updates. ♻️ You’re welcome to 𝗿𝗲𝗽𝗼𝘀𝘁 if your followers will find this of value.</p><p>Mark Miller:  October 4th, 1968. The new issue of Science Magazine contains a Hewlett Packard ad for its new HP9100A. The ad boasted the dynamic functionality of this new device called both a personal computer. and a programmable calculator.   </p><p>Edwin Kwan: A popular library for rendering images in the WebP format has a critical vulnerability that is under active exploitation. The vulnerability is with the LibWebP library and it suffers from a heap buffer overflow, which allows a remote attacker to perform an out-of-bounds memory write.</p><p>Katy Craig:  Google is secretly altering billions of queries every day, all with one goal in mind: to lead you into purchasing more products and services.</p><p>Hillary Coover: We're all familiar with the "She-cession,"  but were you aware that the cybersecurity industry lost 40 percent of its female workforce in that time? That, along with many other jaw-dropping insights, came out of this week's gathering of hundreds of women in cybersecurity. </p><p>From Sourced Network Productions in Washington, DC, it's 5:05. I'm Hillary Coover. Today is Monday, October 4th, 2023. Here's the full story behind today's cyber security and open-source headlines.</p>]]></content:encoded><link><![CDATA[https://3zozb9fxlbueipjyapmaas.captivate.fm/episode/episode-243-critical-vulnerability-in-popular-image-rendering-library-under-active-exploitation-google-alters-search-queries-for-profits-hundreds-of-women-in-cybersecurity-convene-in-arlington-va-to-drive-industry-transformation-this-day-in-tech-histor...]]></link><guid isPermaLink="false">5f0b3109-0e0c-415d-8c2c-d3b5a66f8610</guid><itunes:image href="https://artwork.captivate.fm/305157e1-3591-464d-9aa0-66b860f0ff48/KWBQFf7XQhZ8_b_I_1KlT5Dl.jpg"/><dc:creator><![CDATA[Contributors from Around the World]]></dc:creator><pubDate>Wed, 04 Oct 2023 16:45:00 -0400</pubDate><enclosure url="https://dts.podtrac.com/redirect.mp3/podcasts.captivate.fm/media/1f281680-02cc-4b61-90d3-c720c28386ec/505-2023-10-04-Episode-243-v01-Final-converted.mp3" length="10456497" type="audio/mpeg"/><itunes:duration>08:43</itunes:duration><itunes:explicit>false</itunes:explicit><itunes:episodeType>full</itunes:episodeType><itunes:season>1</itunes:season><itunes:episode>243</itunes:episode><itunes:season>1</itunes:season><podcast:episode>243</podcast:episode><podcast:season>1</podcast:season><itunes:author>Contributors from Around the World</itunes:author></item><item><title>Episode #242: Microsoft&apos;s AI Chat Serving Up Malware; New SEC Regulation Already Making Waves in Public Companies; Adware in Microsoft’s Bing Chat; This Day in Tech History</title><itunes:title>Episode #242: Microsoft&apos;s AI Chat Serving Up Malware; New SEC Regulation Already Making Waves in Public Companies; Adware in Microsoft’s Bing Chat; This Day in Tech History</itunes:title><description><![CDATA[<p>🎙️ Free, ungated access to all 235+ episodes of “It’s 5:05!” on your favorite podcast platforms: https://bit.ly/505-updates. ♻️ You’re welcome to 𝗿𝗲𝗽𝗼𝘀𝘁 if your followers will find this of value.</p><p>Marcel Brown:  October 3rd, 1950. AT&amp;T Bell Laboratories researchers John Bardeen, Walter Brattain, and William Shockley receive a U. S. patent for their invention of the transistor, which they had successfully demonstrated two years earlier.</p><p>Edwin Kwan: BingChat was first introduced in February this year. However, incorporating ads into the platform has opened the doors to threat actors who have been purchasing advertisement to distribute malware.</p><p>Ian Garrett: Under the new SEC regulations, publicly traded companies will be required to disclose cybersecurity incidents within four days, including details about the incident’s nature, scope, timing, and its impact.</p><p>Katy Craig: Malicious ads within Microsoft Bing’s AI chatbot are spreading malware. Threat actors insert ads in various ways, like when a user hovers over a link, triggering an ad before displaying the organic result.</p><p>Today is Tuesday, October 3rd, 2023. From Sourced to Network Productions in New York City, It’s 5:05. I’m Mark Miller. To start today’s updates, Edwin Kwan and Katy Craig talk about a flaw in the Microsoft Bing ChatBot platform that allows adversaries to place malware inside of advertisements.</p>]]></description><content:encoded><![CDATA[<p>🎙️ Free, ungated access to all 235+ episodes of “It’s 5:05!” on your favorite podcast platforms: https://bit.ly/505-updates. ♻️ You’re welcome to 𝗿𝗲𝗽𝗼𝘀𝘁 if your followers will find this of value.</p><p>Marcel Brown:  October 3rd, 1950. AT&amp;T Bell Laboratories researchers John Bardeen, Walter Brattain, and William Shockley receive a U. S. patent for their invention of the transistor, which they had successfully demonstrated two years earlier.</p><p>Edwin Kwan: BingChat was first introduced in February this year. However, incorporating ads into the platform has opened the doors to threat actors who have been purchasing advertisement to distribute malware.</p><p>Ian Garrett: Under the new SEC regulations, publicly traded companies will be required to disclose cybersecurity incidents within four days, including details about the incident’s nature, scope, timing, and its impact.</p><p>Katy Craig: Malicious ads within Microsoft Bing’s AI chatbot are spreading malware. Threat actors insert ads in various ways, like when a user hovers over a link, triggering an ad before displaying the organic result.</p><p>Today is Tuesday, October 3rd, 2023. From Sourced to Network Productions in New York City, It’s 5:05. I’m Mark Miller. To start today’s updates, Edwin Kwan and Katy Craig talk about a flaw in the Microsoft Bing ChatBot platform that allows adversaries to place malware inside of advertisements.</p>]]></content:encoded><link><![CDATA[https://3zozb9fxlbueipjyapmaas.captivate.fm/episode/episode-242-microsofts-ai-chat-serving-up-malware-new-sec-regulation-already-making-waves-in-public-companies-adware-in-microsofts-bing-chat-this-day-in-tech-history]]></link><guid isPermaLink="false">74f45336-f4a3-40ef-90fc-f26a4c770983</guid><itunes:image href="https://artwork.captivate.fm/33e2a4e7-a936-4ef5-905a-3a72363cfbe4/BkhMbfQsRHQi9QFk9GvnUJSv.png"/><dc:creator><![CDATA[Contributors from Around the World]]></dc:creator><pubDate>Tue, 03 Oct 2023 16:45:00 -0400</pubDate><enclosure url="https://dts.podtrac.com/redirect.mp3/podcasts.captivate.fm/media/02a0d4ed-0f1e-4fa4-81ac-33c4359b54a4/505-2023-10-03-Episode-242-Final-v02-converted.mp3" length="10891695" type="audio/mpeg"/><itunes:duration>09:05</itunes:duration><itunes:explicit>false</itunes:explicit><itunes:episodeType>full</itunes:episodeType><itunes:season>1</itunes:season><itunes:episode>242</itunes:episode><itunes:season>1</itunes:season><podcast:episode>242</podcast:episode><podcast:season>1</podcast:season><itunes:author>Contributors from Around the World</itunes:author></item><item><title>Episode #241: Fake Bitwarden Website Serving Malware to Windows Users; SpyGPT; AI Election Disinformation; This Day in Tech History</title><itunes:title>Episode #241: Fake Bitwarden Website Serving Malware to Windows Users; SpyGPT; AI Election Disinformation; This Day in Tech History</itunes:title><description><![CDATA[<p>🎙️ Free, ungated access to all 235+ episodes of “It’s 5:05!” on your favorite podcast platforms: https://bit.ly/505-updates. ♻️ You’re welcome to 𝗿𝗲𝗽𝗼𝘀𝘁 if your followers will find this of value.</p><p>Marcel Brown:  October 1st, 1982. The first commercial compact disc player, the Sony CDP-101, goes on sale in Japan. At a list price of 168,000 yen, this would have been approximately 730 US dollars. It was later introduced worldwide in March of 1983.</p><p>Edwin Kwan: A fake Bitwarden password manager lookalike site is distributing malware to unsuspecting visitors. The Bitwarden password manager has increased in popularity lately and with a growing user base, the software and its users are becoming a popular target for cybercriminals.&nbsp;</p><p>Katy Craig:  Is your privacy at risk?  Intelligence agencies are diving headfirst into the world of open-source data and it's stirring up some serious concerns.&nbsp;</p><p>Hillary Coover: Can artificial intelligence rig elections? The sooner we anticipate and prepare for these challenges, the better equipped we'll be to safeguard the integrity of elections worldwide.</p><p>From Sourced Network Productions in Washington, DC, it's 5:05. I'm Hillary Coover. Today is Monday, October 2nd, 2023. Here's the full story behind today's cyber security and open-source headlines.</p>]]></description><content:encoded><![CDATA[<p>🎙️ Free, ungated access to all 235+ episodes of “It’s 5:05!” on your favorite podcast platforms: https://bit.ly/505-updates. ♻️ You’re welcome to 𝗿𝗲𝗽𝗼𝘀𝘁 if your followers will find this of value.</p><p>Marcel Brown:  October 1st, 1982. The first commercial compact disc player, the Sony CDP-101, goes on sale in Japan. At a list price of 168,000 yen, this would have been approximately 730 US dollars. It was later introduced worldwide in March of 1983.</p><p>Edwin Kwan: A fake Bitwarden password manager lookalike site is distributing malware to unsuspecting visitors. The Bitwarden password manager has increased in popularity lately and with a growing user base, the software and its users are becoming a popular target for cybercriminals.&nbsp;</p><p>Katy Craig:  Is your privacy at risk?  Intelligence agencies are diving headfirst into the world of open-source data and it's stirring up some serious concerns.&nbsp;</p><p>Hillary Coover: Can artificial intelligence rig elections? The sooner we anticipate and prepare for these challenges, the better equipped we'll be to safeguard the integrity of elections worldwide.</p><p>From Sourced Network Productions in Washington, DC, it's 5:05. I'm Hillary Coover. Today is Monday, October 2nd, 2023. Here's the full story behind today's cyber security and open-source headlines.</p>]]></content:encoded><link><![CDATA[https://3zozb9fxlbueipjyapmaas.captivate.fm/episode/episode-241-fake-bitwarden-website-serving-malware-to-windows-users-spygpt-ai-election-disinformation-this-day-in-tech-history]]></link><guid isPermaLink="false">6d99c4f3-6495-409a-8377-0c49b80f332e</guid><itunes:image href="https://artwork.captivate.fm/33e2a4e7-a936-4ef5-905a-3a72363cfbe4/BkhMbfQsRHQi9QFk9GvnUJSv.png"/><dc:creator><![CDATA[Contributors from Around the World]]></dc:creator><pubDate>Mon, 02 Oct 2023 16:45:00 -0400</pubDate><enclosure url="https://dts.podtrac.com/redirect.mp3/podcasts.captivate.fm/media/d6a20571-f38d-4848-8f16-f1b8ed92b28d/505-2023-10-02-Episode-241-Final-converted.mp3" length="10060478" type="audio/mpeg"/><itunes:duration>08:23</itunes:duration><itunes:explicit>false</itunes:explicit><itunes:episodeType>full</itunes:episodeType><itunes:season>1</itunes:season><itunes:episode>241</itunes:episode><itunes:season>1</itunes:season><podcast:episode>241</podcast:episode><podcast:season>1</podcast:season><itunes:author>Contributors from Around the World</itunes:author></item><item><title>Episode #240: Attackers Impersonating Dependabot; Here’s to the Crazy Ones; CISA Security Planning Workbook</title><itunes:title>Episode #240: Attackers Impersonating Dependabot; Here’s to the Crazy Ones; CISA Security Planning Workbook</itunes:title><description><![CDATA[<p>🎙️ Free, ungated access to all 235+ episodes of “It’s 5:05!” on your favorite podcast platforms: https://bit.ly/505-updates. ♻️ You’re welcome to 𝗿𝗲𝗽𝗼𝘀𝘁 if your followers will find this of value.</p><p>Marcel Brown:  September 28th, 1997. Just a little over two weeks after naming Steve Jobs interim CEO, Apple launches their Think Different ad campaign. “Here’s to the Crazy Ones, the misfits, the rebels, the troublemakers, the round pegs in the square holes. Because the people who are crazy enough to think they can change the world, are the ones who do.”</p><p>Edwin Kwan:  Security researchers have discovered a campaign where attackers were attempting to sneak code into software projects by disguising them as changes made by GitHub Dependabot.</p><p><br></p><p>Trac Bannon:  CISA has published a comprehensive guide for planning and implementing effective security measures. Why does it matter that the security planning workbook comes from CISA? By CISA taking lead and making the workbook public, the techniques and guidance are accessible to any organization, regardless of size or resources.</p><p><br></p><p>Katy Craig: Prepare for security success with the Cybersecurity and Infrastructure Security Agency’s Security Planning Workbook. What’s unique about this workbook is its accessibility. You don’t need to be a security expert to use it effectively.</p><p><br></p><p>Olimpiu Pop: This month, the Cybersecurity and Infrastructure Security Agency published its security planning workbook for those who want to improve their security, regardless of the scope of their organization. The workbook will respond to questions like, ” How do you form a planning team? How do you assess risk? What should you consider when mitigating risk?”</p><p><br></p><p>Today is Friday, September 29th, 2023. From Sourced Network Productions in New York City, It’s 5:05. I’m Mark Miller sitting in for Hillary Coover, who will be back on Monday. Today’s episode includes our Friday Point of View segments with updates from Trac Bannon, Katy Craig, and Olimpiu Pop on CISA’s Security Planning Workbook. To start today’s updates, Edwin Kwan talks about a campaign where attackers were attempting to sneak code into software projects by disguising them as changes made by GitHub Dependabot.</p>]]></description><content:encoded><![CDATA[<p>🎙️ Free, ungated access to all 235+ episodes of “It’s 5:05!” on your favorite podcast platforms: https://bit.ly/505-updates. ♻️ You’re welcome to 𝗿𝗲𝗽𝗼𝘀𝘁 if your followers will find this of value.</p><p>Marcel Brown:  September 28th, 1997. Just a little over two weeks after naming Steve Jobs interim CEO, Apple launches their Think Different ad campaign. “Here’s to the Crazy Ones, the misfits, the rebels, the troublemakers, the round pegs in the square holes. Because the people who are crazy enough to think they can change the world, are the ones who do.”</p><p>Edwin Kwan:  Security researchers have discovered a campaign where attackers were attempting to sneak code into software projects by disguising them as changes made by GitHub Dependabot.</p><p><br></p><p>Trac Bannon:  CISA has published a comprehensive guide for planning and implementing effective security measures. Why does it matter that the security planning workbook comes from CISA? By CISA taking lead and making the workbook public, the techniques and guidance are accessible to any organization, regardless of size or resources.</p><p><br></p><p>Katy Craig: Prepare for security success with the Cybersecurity and Infrastructure Security Agency’s Security Planning Workbook. What’s unique about this workbook is its accessibility. You don’t need to be a security expert to use it effectively.</p><p><br></p><p>Olimpiu Pop: This month, the Cybersecurity and Infrastructure Security Agency published its security planning workbook for those who want to improve their security, regardless of the scope of their organization. The workbook will respond to questions like, ” How do you form a planning team? How do you assess risk? What should you consider when mitigating risk?”</p><p><br></p><p>Today is Friday, September 29th, 2023. From Sourced Network Productions in New York City, It’s 5:05. I’m Mark Miller sitting in for Hillary Coover, who will be back on Monday. Today’s episode includes our Friday Point of View segments with updates from Trac Bannon, Katy Craig, and Olimpiu Pop on CISA’s Security Planning Workbook. To start today’s updates, Edwin Kwan talks about a campaign where attackers were attempting to sneak code into software projects by disguising them as changes made by GitHub Dependabot.</p>]]></content:encoded><link><![CDATA[https://3zozb9fxlbueipjyapmaas.captivate.fm/episode/episode-240-attackers-impersonating-dependabot-heres-to-the-crazy-ones-cisa-security-planning-workbook]]></link><guid isPermaLink="false">a26fec1e-48b0-49ce-aff8-d454f9f12cf5</guid><itunes:image href="https://artwork.captivate.fm/33e2a4e7-a936-4ef5-905a-3a72363cfbe4/BkhMbfQsRHQi9QFk9GvnUJSv.png"/><dc:creator><![CDATA[Contributors from Around the World]]></dc:creator><pubDate>Fri, 29 Sep 2023 16:45:00 -0400</pubDate><enclosure url="https://dts.podtrac.com/redirect.mp3/podcasts.captivate.fm/media/7effef59-0748-4aa9-a7c0-14d84a682969/505-2023-09-29-Episode-240-Final-converted.mp3" length="13730577" type="audio/mpeg"/><itunes:duration>14:18</itunes:duration><itunes:explicit>false</itunes:explicit><itunes:episodeType>full</itunes:episodeType><itunes:season>1</itunes:season><itunes:episode>240</itunes:episode><itunes:season>1</itunes:season><podcast:episode>240</podcast:episode><podcast:season>1</podcast:season><itunes:author>Contributors from Around the World</itunes:author></item><item><title>Episode #239: FinServ Industry Sees a Massive Rise In Attacks; Info Stealing Campaign Targeting Developers Through OSS; Rethinking Cyber&apos;s Role in Modern Warfare; Navigating Employee Rationalizations for a Secure Future</title><itunes:title>Episode #239: FinServ Industry Sees a Massive Rise In Attacks; Info Stealing Campaign Targeting Developers Through OSS; Rethinking Cyber&apos;s Role in Modern Warfare; Navigating Employee Rationalizations for a Secure Future</itunes:title><description><![CDATA[<p>🎙️ Free, ungated access to all 235+ episodes of “It’s 5:05!” on your favorite podcast platforms: https://bit.ly/505-updates. ♻️ You’re welcome to 𝗿𝗲𝗽𝗼𝘀𝘁 if your followers will find this of value.</p><p>Edwin Kwan:  ​ Attackers have been running a campaign this month using malicious open source packages to steal sensitive data from software developers. The attackers utilized typosquatting to trick developers into downloading the packages.</p><p>Katy Craig: In the wake of Russia’s invasion of Ukraine and the subsequent year and a half of conflict, the Pentagon is revising its perspective on the role of cyber operations in war. It’s become clear that cyber alone won’t yield immediate results. The Russia-Ukraine conflict revealed discrepancies between expectations and reality in terms of cyber disruptions and impacts.</p><p>Ian Garret: Web application and API attacks against the financial services sector increased by a staggering 65 percent in Q2 2023 compared with the same period from the previous year. This surge resulted in a total of 9 billion attacks within just 18 months, with banks being the primary target.</p><p>Hillary Coover: Addressing employees non compliance with cybersecurity rules is a pressing concern for most organizations. The threat of sanctions often fails to deter rule violations, primarily due to rationalizations that diminish the wrongness of these actions. To combat this, management can employ two key strategies.</p><p><br></p><p>Today is Thursday, September 28th, 2023. From sourced network productions in New York City, It’s 5:05. I’m Mark Miller sitting in for Hillary Coover. Today’s episode begins with Ian Garrett presenting highlights from the Akamai report examining the trends in the financial services industry.</p>]]></description><content:encoded><![CDATA[<p>🎙️ Free, ungated access to all 235+ episodes of “It’s 5:05!” on your favorite podcast platforms: https://bit.ly/505-updates. ♻️ You’re welcome to 𝗿𝗲𝗽𝗼𝘀𝘁 if your followers will find this of value.</p><p>Edwin Kwan:  ​ Attackers have been running a campaign this month using malicious open source packages to steal sensitive data from software developers. The attackers utilized typosquatting to trick developers into downloading the packages.</p><p>Katy Craig: In the wake of Russia’s invasion of Ukraine and the subsequent year and a half of conflict, the Pentagon is revising its perspective on the role of cyber operations in war. It’s become clear that cyber alone won’t yield immediate results. The Russia-Ukraine conflict revealed discrepancies between expectations and reality in terms of cyber disruptions and impacts.</p><p>Ian Garret: Web application and API attacks against the financial services sector increased by a staggering 65 percent in Q2 2023 compared with the same period from the previous year. This surge resulted in a total of 9 billion attacks within just 18 months, with banks being the primary target.</p><p>Hillary Coover: Addressing employees non compliance with cybersecurity rules is a pressing concern for most organizations. The threat of sanctions often fails to deter rule violations, primarily due to rationalizations that diminish the wrongness of these actions. To combat this, management can employ two key strategies.</p><p><br></p><p>Today is Thursday, September 28th, 2023. From sourced network productions in New York City, It’s 5:05. I’m Mark Miller sitting in for Hillary Coover. Today’s episode begins with Ian Garrett presenting highlights from the Akamai report examining the trends in the financial services industry.</p>]]></content:encoded><link><![CDATA[https://3zozb9fxlbueipjyapmaas.captivate.fm/episode/episode-239-finserv-industry-sees-a-massive-rise-in-attacks-info-stealing-campaign-targeting-developers-through-oss-rethinking-cybers-role-in-modern-warfare-navigating-employee-rationalizations-for-a-secure-future]]></link><guid isPermaLink="false">ddd94c87-fad7-4848-b58a-3d9e49e165ed</guid><itunes:image href="https://artwork.captivate.fm/33e2a4e7-a936-4ef5-905a-3a72363cfbe4/BkhMbfQsRHQi9QFk9GvnUJSv.png"/><dc:creator><![CDATA[Contributors from Around the World]]></dc:creator><pubDate>Thu, 28 Sep 2023 16:45:00 -0400</pubDate><enclosure url="https://dts.podtrac.com/redirect.mp3/podcasts.captivate.fm/media/f6ffb8d9-76a0-43a2-8119-d2860313a47c/505-2023-09-28-Episode-239-Final-converted.mp3" length="12801247" type="audio/mpeg"/><itunes:duration>10:40</itunes:duration><itunes:explicit>false</itunes:explicit><itunes:episodeType>full</itunes:episodeType><itunes:season>1</itunes:season><itunes:episode>239</itunes:episode><itunes:season>1</itunes:season><podcast:episode>239</podcast:episode><podcast:season>1</podcast:season><itunes:author>Contributors from Around the World</itunes:author></item><item><title>Episode #238: Using Graphics Cards to Steal Website Data; Spyware Disguised as Online Ads; Milestone Initiative: Voting Machine Testing</title><itunes:title>Episode #238: Using Graphics Cards to Steal Website Data; Spyware Disguised as Online Ads; Milestone Initiative: Voting Machine Testing</itunes:title><description><![CDATA[<p>🎙️ Free, ungated access to all 235+ episodes of “It’s 5:05!” on your favorite podcast platforms: https://bit.ly/505-updates. ♻️ You’re welcome to 𝗿𝗲𝗽𝗼𝘀𝘁 if your followers will find this of value.</p><p>Edwin Kwan: Researchers have published a paper demonstrating how a malicious website can exploit a vulnerability in the GPU to perform a cross origin attack, and get access to sensitive visual data displayed by other websites.</p><p>Katy Craig: SIn a pivotal move to fortify the security of U. S. election systems, the Information Technology  Information Sharing Analysis Center recently hosted the inaugural Election Security Research Forum. The focus was on systems encountered by voters at polling sites, from digital scanners to ballot marking devices.</p><p>Kadi McKean: Your phone and computer can be unwitting hosts to malicious software, all because you clicked on that enticing ad. How can we protect ourselves from this silent menace, when even the ads we encounter daily are potential vectors of intrusion?</p><p>Trac Bannon: Hello there. This is Trac Bannon reporting from Jersey City, New Jersey. Hey, today I'm here with Mike Vizard from Techstrong Group, and we are at the DevOps World Tour in Jersey City. </p><p>Bob Bannon:    This is Bob Bannon. We're here at DevOps World Tour in Jersey City, New Jersey, and I'm talking with Trac and Topo . I just wanted to know, what did you intend to get out of today? </p>]]></description><content:encoded><![CDATA[<p>🎙️ Free, ungated access to all 235+ episodes of “It’s 5:05!” on your favorite podcast platforms: https://bit.ly/505-updates. ♻️ You’re welcome to 𝗿𝗲𝗽𝗼𝘀𝘁 if your followers will find this of value.</p><p>Edwin Kwan: Researchers have published a paper demonstrating how a malicious website can exploit a vulnerability in the GPU to perform a cross origin attack, and get access to sensitive visual data displayed by other websites.</p><p>Katy Craig: SIn a pivotal move to fortify the security of U. S. election systems, the Information Technology  Information Sharing Analysis Center recently hosted the inaugural Election Security Research Forum. The focus was on systems encountered by voters at polling sites, from digital scanners to ballot marking devices.</p><p>Kadi McKean: Your phone and computer can be unwitting hosts to malicious software, all because you clicked on that enticing ad. How can we protect ourselves from this silent menace, when even the ads we encounter daily are potential vectors of intrusion?</p><p>Trac Bannon: Hello there. This is Trac Bannon reporting from Jersey City, New Jersey. Hey, today I'm here with Mike Vizard from Techstrong Group, and we are at the DevOps World Tour in Jersey City. </p><p>Bob Bannon:    This is Bob Bannon. We're here at DevOps World Tour in Jersey City, New Jersey, and I'm talking with Trac and Topo . I just wanted to know, what did you intend to get out of today? </p>]]></content:encoded><link><![CDATA[https://3zozb9fxlbueipjyapmaas.captivate.fm/episode/episode-238-using-graphics-cards-to-steal-website-data-spyware-disguised-as-online-ads-milestone-initiative-voting-machine-testing]]></link><guid isPermaLink="false">52fe3ddf-4bf5-458f-98bd-7e9d26d6ee3c</guid><itunes:image href="https://artwork.captivate.fm/33e2a4e7-a936-4ef5-905a-3a72363cfbe4/BkhMbfQsRHQi9QFk9GvnUJSv.png"/><dc:creator><![CDATA[Contributors from Around the World]]></dc:creator><pubDate>Wed, 27 Sep 2023 16:45:00 -0400</pubDate><enclosure url="https://dts.podtrac.com/redirect.mp3/podcasts.captivate.fm/media/73d374f5-dfd8-4351-9b22-7041f968ada2/505-2023-09-27-Episode-238-Final-converted.mp3" length="11284265" type="audio/mpeg"/><itunes:duration>11:45</itunes:duration><itunes:explicit>false</itunes:explicit><itunes:episodeType>full</itunes:episodeType><itunes:season>1</itunes:season><itunes:episode>238</itunes:episode><itunes:season>1</itunes:season><podcast:episode>238</podcast:episode><podcast:season>1</podcast:season><itunes:author>Contributors from Around the World</itunes:author></item><item><title>Episode #237: Beware: Phishing Scam from Legitimate Booking Platforms; Google Basic HTML Users Need to Find a New Home; Live From DevOps World Tour; This Day in Tech History</title><itunes:title>Episode #237: Beware: Phishing Scam from Legitimate Booking Platforms; Google Basic HTML Users Need to Find a New Home; Live From DevOps World Tour; This Day in Tech History</itunes:title><description><![CDATA[<p>🎙️ Free access to 230+ episodes of “It’s 5:05!” on your favorite podcast platforms: bit.ly/505-updates&nbsp; ♻️ You’re welcome to 𝗿𝗲𝗽𝗼𝘀𝘁 if your followers will find this of value. 📌</p><h3>This Day, September 26, in Tech History</h3><p><a href="https://505updates.com/marcelbrown/" rel="noopener noreferrer" target="_blank"><strong>🇺🇸</strong> Marcel Brown, St. Louis, Missouri ↗</a></p><p>September 26, 1996. IOmega kicked off a 17 stop Zip Across America promotional tour demonstrating their new mass storage device, the ZipDrive. Do you all remember those? It was a 3. 5 inch, 100 megabyte capacity disk. </p><h3>Beware: Phishing Scam from Legitimate Booking Platforms</h3><p><a href="https://505updates.com/edwinkwan/" rel="noopener noreferrer" target="_blank">🇦🇺 Edwin Kwan - Sydney, Australia ↗</a></p><p>Phishing scams just got more sophisticated with scammers targeting hotel staff in order to phish their customers. They first make contact with the hotel staff under the guise of making a reservation.</p><h3>Google Basic HTML Users Need to Find a New Home</h3><p><a href="https://505updates.com/iangarrett/" rel="noopener noreferrer" target="_blank"><strong>🇺🇸 </strong>Ian Garrett, Arlington, Virginia ↗</a></p><p>There's another casualty in the war between security and usability.  Google has started notifying Gmail users about the retirement of basic HTML view in January 2024. After this date, users will need modern web browsers to continue accessing Gmail.</p><p><br></p><h3>Live From DevOps World Tour</h3><p><a href="https://505updates.com/tracbannon/" rel="noopener noreferrer" target="_blank"><strong>🇺🇸</strong> Tracy (Trac) Bannon, Camp Hill, Pennsylvania↗</a></p><p>I'm reporting from Jersey City, New Jersey. I'm at the DevOps World Tour sponsored by CloudBees and dang, I'm excited. I'm getting to see old friends and meeting new. Our topics are including AI Augmented DevOps, Platform Engineering for App Modernization, SEI Quality of Service at Scale with CI Observability. </p><p><br></p><p> From Sourced Network Productions in New York City, It's 5:05. I'm Executive Producer, Mark Miller. Today is Tuesday, September 26th, 2023. We're going to start off with something new  Trac Bannon has been live at the CloudBees  DevOps World Tour in Jersey City. She's recorded a couple segments with people that have been presenters at the conference itself.  This is going to be a short, ongoing series over the next couple of days.  </p><p>Today Trac is going to talk with Bill Bensing about governance engineering. Sit tight, this is kind of fun.</p>]]></description><content:encoded><![CDATA[<p>🎙️ Free access to 230+ episodes of “It’s 5:05!” on your favorite podcast platforms: bit.ly/505-updates&nbsp; ♻️ You’re welcome to 𝗿𝗲𝗽𝗼𝘀𝘁 if your followers will find this of value. 📌</p><h3>This Day, September 26, in Tech History</h3><p><a href="https://505updates.com/marcelbrown/" rel="noopener noreferrer" target="_blank"><strong>🇺🇸</strong> Marcel Brown, St. Louis, Missouri ↗</a></p><p>September 26, 1996. IOmega kicked off a 17 stop Zip Across America promotional tour demonstrating their new mass storage device, the ZipDrive. Do you all remember those? It was a 3. 5 inch, 100 megabyte capacity disk. </p><h3>Beware: Phishing Scam from Legitimate Booking Platforms</h3><p><a href="https://505updates.com/edwinkwan/" rel="noopener noreferrer" target="_blank">🇦🇺 Edwin Kwan - Sydney, Australia ↗</a></p><p>Phishing scams just got more sophisticated with scammers targeting hotel staff in order to phish their customers. They first make contact with the hotel staff under the guise of making a reservation.</p><h3>Google Basic HTML Users Need to Find a New Home</h3><p><a href="https://505updates.com/iangarrett/" rel="noopener noreferrer" target="_blank"><strong>🇺🇸 </strong>Ian Garrett, Arlington, Virginia ↗</a></p><p>There's another casualty in the war between security and usability.  Google has started notifying Gmail users about the retirement of basic HTML view in January 2024. After this date, users will need modern web browsers to continue accessing Gmail.</p><p><br></p><h3>Live From DevOps World Tour</h3><p><a href="https://505updates.com/tracbannon/" rel="noopener noreferrer" target="_blank"><strong>🇺🇸</strong> Tracy (Trac) Bannon, Camp Hill, Pennsylvania↗</a></p><p>I'm reporting from Jersey City, New Jersey. I'm at the DevOps World Tour sponsored by CloudBees and dang, I'm excited. I'm getting to see old friends and meeting new. Our topics are including AI Augmented DevOps, Platform Engineering for App Modernization, SEI Quality of Service at Scale with CI Observability. </p><p><br></p><p> From Sourced Network Productions in New York City, It's 5:05. I'm Executive Producer, Mark Miller. Today is Tuesday, September 26th, 2023. We're going to start off with something new  Trac Bannon has been live at the CloudBees  DevOps World Tour in Jersey City. She's recorded a couple segments with people that have been presenters at the conference itself.  This is going to be a short, ongoing series over the next couple of days.  </p><p>Today Trac is going to talk with Bill Bensing about governance engineering. Sit tight, this is kind of fun.</p>]]></content:encoded><link><![CDATA[https://3zozb9fxlbueipjyapmaas.captivate.fm/episode/episode-237-beware-phishing-scam-from-legitimate-booking-platforms-google-basic-html-users-need-to-find-a-new-home-live-from-devops-world-tour-this-day-in-tech-history]]></link><guid isPermaLink="false">358aca3a-9912-461d-b736-25bc6ae1bbd2</guid><itunes:image href="https://artwork.captivate.fm/33e2a4e7-a936-4ef5-905a-3a72363cfbe4/BkhMbfQsRHQi9QFk9GvnUJSv.png"/><dc:creator><![CDATA[Contributors from Around the World]]></dc:creator><pubDate>Tue, 26 Sep 2023 16:45:00 -0400</pubDate><enclosure url="https://dts.podtrac.com/redirect.mp3/podcasts.captivate.fm/media/d5fec9cc-ef0a-4e9b-8545-918e120dcd27/505-2023-09-26-Episode-237-Monday-Final-converted.mp3" length="11981000" type="audio/mpeg"/><itunes:duration>09:59</itunes:duration><itunes:explicit>false</itunes:explicit><itunes:episodeType>full</itunes:episodeType><itunes:season>1</itunes:season><itunes:episode>237</itunes:episode><itunes:season>1</itunes:season><podcast:episode>237</podcast:episode><podcast:season>1</podcast:season><itunes:author>Contributors from Around the World</itunes:author></item><item><title>Episode #236: Malware Disguised as Fake Proof of Concept Exploit; iOS 17 Privacy Settings; Balancing Conversational AI Advancements with Privacy Concerns; This Day in Tech History</title><itunes:title>Episode #236: Malware Disguised as Fake Proof of Concept Exploit; iOS 17 Privacy Settings; Balancing Conversational AI Advancements with Privacy Concerns; This Day in Tech History</itunes:title><description><![CDATA[<p>🎙️ Free access to 230+ episodes of “It’s 5:05!” on your favorite podcast platforms: bit.ly/505-updates&nbsp; ♻️ You’re welcome to 𝗿𝗲𝗽𝗼𝘀𝘁 if your followers will find this of value. 📌</p><h3>Malware Disguised as Fake Proof of Concept Exploit</h3><p><a href="https://505updates.com/edwinkwan/" rel="noopener noreferrer" target="_blank">🇦🇺 Edwin Kwan - Sydney, Australia ↗</a></p><p>Beware of what you download! A malicious actor has attempted to disguise a malware as a proof of concept exploit for the recently-released WinRAR vulnerability.&nbsp;</p><h3>iOS 17 Privacy Settings</h3><p><a href="https://505updates.com/katycraig/" rel="noopener noreferrer" target="_blank">🇺🇸 Katy Craig - San Diego, California ↗</a></p><p>With the release of iOS 17, there's a heads-up you need to know about. iOS 17 has a knack for reactivating sensitive location options you might have disabled.&nbsp;</p><h3>Balancing Conversational AI Advancements with Privacy Concerns</h3><p><a href="http://505updates.com/hillarycoover/" rel="noopener noreferrer" target="_blank">🇺🇸 Hillary Coover, Washington, DC ↗</a></p><p>Amazon has made some big improvements to its Alexa devices, making them even more conversational. However, these advances have sparked important concerns about our privacy. Is the convenience of conversational AI devices like Alexa truly worth the potential privacy violations and increased security risks they bring into our homes?</p><h3>This Day, September 22-25, in Tech History</h3><p><a href="https://505updates.com/marcelbrown/" rel="noopener noreferrer" target="_blank"><strong>🇺🇸</strong> Marcel Brown, St. Louis, Missouri ↗</a></p><p>September 25th, 1973, Micro Computer Machines of Canada introduces their MCM 70 microcomputer at a programmer's user conference in Toronto.&nbsp;</p>]]></description><content:encoded><![CDATA[<p>🎙️ Free access to 230+ episodes of “It’s 5:05!” on your favorite podcast platforms: bit.ly/505-updates&nbsp; ♻️ You’re welcome to 𝗿𝗲𝗽𝗼𝘀𝘁 if your followers will find this of value. 📌</p><h3>Malware Disguised as Fake Proof of Concept Exploit</h3><p><a href="https://505updates.com/edwinkwan/" rel="noopener noreferrer" target="_blank">🇦🇺 Edwin Kwan - Sydney, Australia ↗</a></p><p>Beware of what you download! A malicious actor has attempted to disguise a malware as a proof of concept exploit for the recently-released WinRAR vulnerability.&nbsp;</p><h3>iOS 17 Privacy Settings</h3><p><a href="https://505updates.com/katycraig/" rel="noopener noreferrer" target="_blank">🇺🇸 Katy Craig - San Diego, California ↗</a></p><p>With the release of iOS 17, there's a heads-up you need to know about. iOS 17 has a knack for reactivating sensitive location options you might have disabled.&nbsp;</p><h3>Balancing Conversational AI Advancements with Privacy Concerns</h3><p><a href="http://505updates.com/hillarycoover/" rel="noopener noreferrer" target="_blank">🇺🇸 Hillary Coover, Washington, DC ↗</a></p><p>Amazon has made some big improvements to its Alexa devices, making them even more conversational. However, these advances have sparked important concerns about our privacy. Is the convenience of conversational AI devices like Alexa truly worth the potential privacy violations and increased security risks they bring into our homes?</p><h3>This Day, September 22-25, in Tech History</h3><p><a href="https://505updates.com/marcelbrown/" rel="noopener noreferrer" target="_blank"><strong>🇺🇸</strong> Marcel Brown, St. Louis, Missouri ↗</a></p><p>September 25th, 1973, Micro Computer Machines of Canada introduces their MCM 70 microcomputer at a programmer's user conference in Toronto.&nbsp;</p>]]></content:encoded><link><![CDATA[https://3zozb9fxlbueipjyapmaas.captivate.fm/episode/episode-236-malware-disguised-as-fake-proof-of-concept-exploit-ios-17-privacy-settings-balancing-conversational-ai-advancements-with-privacy-concerns-this-day-in-tech-history]]></link><guid isPermaLink="false">6a75f1e7-d1a1-48ec-b86f-08e6b14a9a54</guid><itunes:image href="https://artwork.captivate.fm/33e2a4e7-a936-4ef5-905a-3a72363cfbe4/BkhMbfQsRHQi9QFk9GvnUJSv.png"/><dc:creator><![CDATA[Contributors from Around the World]]></dc:creator><pubDate>Mon, 25 Sep 2023 16:45:00 -0400</pubDate><enclosure url="https://dts.podtrac.com/redirect.mp3/podcasts.captivate.fm/media/00083774-15af-40f9-876f-ae8517ea4ead/2023-09-25-505-Episode-236-converted.mp3" length="7615322" type="audio/mpeg"/><itunes:duration>10:35</itunes:duration><itunes:explicit>false</itunes:explicit><itunes:episodeType>full</itunes:episodeType><itunes:season>1</itunes:season><itunes:episode>236</itunes:episode><itunes:season>1</itunes:season><podcast:episode>236</podcast:episode><podcast:season>1</podcast:season><itunes:author>Contributors from Around the World</itunes:author></item><item><title>Episode #235: Pizza Hut Australia Data Breach; Future of Autonomous Defense Systems; Unmasking Election Security; GoLang Flaw in go.mod directive; First Perfect Reproducible Toolchain Shadowed By Critical Vulnerabilities</title><itunes:title>Episode #235: Pizza Hut Australia Data Breach; Future of Autonomous Defense Systems; Unmasking Election Security; GoLang Flaw in go.mod directive; First Perfect Reproducible Toolchain Shadowed By Critical Vulnerabilities</itunes:title><description><![CDATA[<p>🎙️ Free access to 230+ episodes of “It’s 5:05!” on your favorite podcast platforms: bit.ly/505-updates  ♻️ You’re welcome to 𝗿𝗲𝗽𝗼𝘀𝘁 if your followers will find this of value. 📌</p><p>Pizza Hut Australia Suffers Data Breach</p><p>🇦🇺 Edwin Kwan - Sydney, Australia</p><p> Pizza Hut Australia notified 193, 000 customers that the company had suffered a data breach. That information included full name, delivery address, delivery instructions, email address, phone number, mass credit card data, and encrypted passwords for online accounts. </p><p>DOD’s Replicator: Future of Autonomous Defense Systems</p><p>🇺🇸 Katy Craig - San Diego, California </p><p>Deputy Secretary of Defense Kathleen Hicks has just unveiled a vision called Replicator that's all about scale and efficiency. Replicator isn't just about mass-producing these systems, it's about creating a blueprint for future scalability.</p><p>Unmasking Election Security</p><p>🇺🇸 Hillary Coover, Washington, DC</p><p>US voting machine companies are collaborating with cybersecurity experts to conduct additional stress tests on their systems in preparation for the 2024 election and to counter misinformation. Three major voting equipment manufacturers allowed a group of verified cybersecurity researchers access to their software and hardware for nearly two days.</p><p><br></p><p>GoLang Flaw in go.mod directive</p><p>🇺🇸 Tracy (Trac) Bannon, Camp Hill, Pennsylvania</p><p> Golang introduced a new cool feature called the go.mod directive in Go version 1.21.  Unfortunately, the bad guys can exploit this. too.  According to the 2021 Go Developer Survey, there are approximately 2. 7 million developers who use Golang. That's a pretty nice-sized attack surface.</p><p><br></p><p>The First Perfect Reproducible Toolchain Shadowed By Critical Vulnerabilities</p><p>🇷🇴 Olimpiu Pop, Transylvania, Romania</p><p>The libraries we use in  our projects are used in  their binary format. Yes, even  open source ones. That means that the open part in the open source is not fully used, as the code is not inspected. Given the growing number of supply chain attacks, we need a solution for it. Reproducible builds will guarantee that what you have is actually what you wanted.</p><p><br></p>]]></description><content:encoded><![CDATA[<p>🎙️ Free access to 230+ episodes of “It’s 5:05!” on your favorite podcast platforms: bit.ly/505-updates  ♻️ You’re welcome to 𝗿𝗲𝗽𝗼𝘀𝘁 if your followers will find this of value. 📌</p><p>Pizza Hut Australia Suffers Data Breach</p><p>🇦🇺 Edwin Kwan - Sydney, Australia</p><p> Pizza Hut Australia notified 193, 000 customers that the company had suffered a data breach. That information included full name, delivery address, delivery instructions, email address, phone number, mass credit card data, and encrypted passwords for online accounts. </p><p>DOD’s Replicator: Future of Autonomous Defense Systems</p><p>🇺🇸 Katy Craig - San Diego, California </p><p>Deputy Secretary of Defense Kathleen Hicks has just unveiled a vision called Replicator that's all about scale and efficiency. Replicator isn't just about mass-producing these systems, it's about creating a blueprint for future scalability.</p><p>Unmasking Election Security</p><p>🇺🇸 Hillary Coover, Washington, DC</p><p>US voting machine companies are collaborating with cybersecurity experts to conduct additional stress tests on their systems in preparation for the 2024 election and to counter misinformation. Three major voting equipment manufacturers allowed a group of verified cybersecurity researchers access to their software and hardware for nearly two days.</p><p><br></p><p>GoLang Flaw in go.mod directive</p><p>🇺🇸 Tracy (Trac) Bannon, Camp Hill, Pennsylvania</p><p> Golang introduced a new cool feature called the go.mod directive in Go version 1.21.  Unfortunately, the bad guys can exploit this. too.  According to the 2021 Go Developer Survey, there are approximately 2. 7 million developers who use Golang. That's a pretty nice-sized attack surface.</p><p><br></p><p>The First Perfect Reproducible Toolchain Shadowed By Critical Vulnerabilities</p><p>🇷🇴 Olimpiu Pop, Transylvania, Romania</p><p>The libraries we use in  our projects are used in  their binary format. Yes, even  open source ones. That means that the open part in the open source is not fully used, as the code is not inspected. Given the growing number of supply chain attacks, we need a solution for it. Reproducible builds will guarantee that what you have is actually what you wanted.</p><p><br></p>]]></content:encoded><link><![CDATA[https://3zozb9fxlbueipjyapmaas.captivate.fm/episode/episode-235-pizza-hut-australia-data-breach-future-of-autonomous-defense-systems-unmasking-election-security-golang-flaw-in-go-mod-directive-first-perfect-reproducible-toolchain-shadowed-by-critical-vulnerabilities]]></link><guid isPermaLink="false">48ed550b-c3fc-47f2-be3c-e85011e91d0a</guid><itunes:image href="https://artwork.captivate.fm/33e2a4e7-a936-4ef5-905a-3a72363cfbe4/BkhMbfQsRHQi9QFk9GvnUJSv.png"/><dc:creator><![CDATA[Contributors from Around the World]]></dc:creator><pubDate>Fri, 22 Sep 2023 16:45:00 -0400</pubDate><enclosure url="https://dts.podtrac.com/redirect.mp3/podcasts.captivate.fm/media/1628d872-527f-44e5-a83f-c7aa43b6e720/505-2023-09-22-Episode-235-Friday-Final-converted.mp3" length="14807970" type="audio/mpeg"/><itunes:duration>12:20</itunes:duration><itunes:explicit>false</itunes:explicit><itunes:episodeType>full</itunes:episodeType><itunes:season>1</itunes:season><itunes:episode>235</itunes:episode><itunes:season>1</itunes:season><podcast:episode>235</podcast:episode><podcast:season>1</podcast:season><itunes:author>Contributors from Around the World</itunes:author></item><item><title>Episode #234: Aussie Feds Introduce Digital Identity Legislation; Beijing Thwarted by Digital Tripwire; Gen Z&apos;s Battle with Online Scams</title><itunes:title>Episode #234: Aussie Feds Introduce Digital Identity Legislation; Beijing Thwarted by Digital Tripwire; Gen Z&apos;s Battle with Online Scams</itunes:title><description><![CDATA[<p>🎙️ Free, ungated access to all 225+ episodes of “It’s 5:05!” on your favorite podcast platforms: https://bit.ly/505-updates. ♻️ You’re welcome to 𝗿𝗲𝗽𝗼𝘀𝘁 if your followers will find this of value.</p><p>This Day in Tech History</p><p>🇺🇸 Marcel Brown - St. Louis, Missouri </p><p>September 21st, 2003. After 14 years in space, eight of those as the first man-made object orbiting Jupiter, the unmanned NASA spacecraft, Galileo, is sent into the atmosphere of the giant planet. </p><h3><strong>Australian Federal Government Introduces Digital Identity Legislation</strong></h3><p>🇦🇺 Edwin Kwan - Sydney, Australia</p><p>In an effort to reduce cybercrime, the Australian Federal Government has introduced digital identity legislation to Parliament. This will allow businesses to verify information about their customers without needing to collect information that would be useful to cybercriminals.</p><h3><strong>Beijing Thwarted by Digital Tripwire</strong></h3><p>🇺🇸 Katy Craig - San Diego, California</p><p>Imagine setting up a digital tripwire and then BAM! It catches a major hacking attempt in real-time. Well, that's exactly what happened at the U.S. State Department.  Two years ago, a sharp-eyed government IT analyst set up a custom warning system within the agency's network. This past June, that system alerted them to a Chinese-linked hack targeting their Microsoft email systems. </p><p><strong>Gen Z's Battle with Online Scams</strong></p><p>🇺🇸 Hillary Coover, Washington, DC</p><p>Gen Z, raised in the digital age, is surprisingly more vulnerable to online scams than their tech-unsavvy, Boomer grandparents. A Deloitte survey shows Gen Z members born from the late 1990s to the early 2010s are falling victim to phishing, identity theft, romance scams and cyber bullying at higher rates. </p>]]></description><content:encoded><![CDATA[<p>🎙️ Free, ungated access to all 225+ episodes of “It’s 5:05!” on your favorite podcast platforms: https://bit.ly/505-updates. ♻️ You’re welcome to 𝗿𝗲𝗽𝗼𝘀𝘁 if your followers will find this of value.</p><p>This Day in Tech History</p><p>🇺🇸 Marcel Brown - St. Louis, Missouri </p><p>September 21st, 2003. After 14 years in space, eight of those as the first man-made object orbiting Jupiter, the unmanned NASA spacecraft, Galileo, is sent into the atmosphere of the giant planet. </p><h3><strong>Australian Federal Government Introduces Digital Identity Legislation</strong></h3><p>🇦🇺 Edwin Kwan - Sydney, Australia</p><p>In an effort to reduce cybercrime, the Australian Federal Government has introduced digital identity legislation to Parliament. This will allow businesses to verify information about their customers without needing to collect information that would be useful to cybercriminals.</p><h3><strong>Beijing Thwarted by Digital Tripwire</strong></h3><p>🇺🇸 Katy Craig - San Diego, California</p><p>Imagine setting up a digital tripwire and then BAM! It catches a major hacking attempt in real-time. Well, that's exactly what happened at the U.S. State Department.  Two years ago, a sharp-eyed government IT analyst set up a custom warning system within the agency's network. This past June, that system alerted them to a Chinese-linked hack targeting their Microsoft email systems. </p><p><strong>Gen Z's Battle with Online Scams</strong></p><p>🇺🇸 Hillary Coover, Washington, DC</p><p>Gen Z, raised in the digital age, is surprisingly more vulnerable to online scams than their tech-unsavvy, Boomer grandparents. A Deloitte survey shows Gen Z members born from the late 1990s to the early 2010s are falling victim to phishing, identity theft, romance scams and cyber bullying at higher rates. </p>]]></content:encoded><link><![CDATA[https://3zozb9fxlbueipjyapmaas.captivate.fm/episode/episode-234-aussie-feds-introduce-digital-identity-legislation-beijing-thwarted-by-digital-tripwire-gen-zs-battle-with-online-scams]]></link><guid isPermaLink="false">15a2b2d7-09ed-42f5-b09e-59289abbda30</guid><itunes:image href="https://artwork.captivate.fm/33e2a4e7-a936-4ef5-905a-3a72363cfbe4/BkhMbfQsRHQi9QFk9GvnUJSv.png"/><dc:creator><![CDATA[Contributors from Around the World]]></dc:creator><pubDate>Thu, 21 Sep 2023 16:45:00 -0400</pubDate><enclosure url="https://dts.podtrac.com/redirect.mp3/podcasts.captivate.fm/media/b226bc3c-31d1-441c-b930-0be2cc848e02/505-2023-09-21-Episode-234-Thursday-Final-converted.mp3" length="10679581" type="audio/mpeg"/><itunes:duration>08:54</itunes:duration><itunes:explicit>false</itunes:explicit><itunes:episodeType>full</itunes:episodeType><itunes:season>1</itunes:season><itunes:episode>234</itunes:episode><itunes:season>1</itunes:season><podcast:episode>234</podcast:episode><podcast:season>1</podcast:season><itunes:author>Contributors from Around the World</itunes:author></item><item><title>Episode #233: Microsoft Leaked 38TB of Sensitive Data;TikTok Clock is Ticking; Your Healthcare Provider is Under Attack</title><itunes:title>Episode #233: Microsoft Leaked 38TB of Sensitive Data;TikTok Clock is Ticking; Your Healthcare Provider is Under Attack</itunes:title><description><![CDATA[<p>🎙️ Free access to “It’s 5:05!” on your favorite podcast platforms: bit.ly/505-updates 📌</p><p>Marcel Brown: September 20th, 1989. Apple releases the Macintosh Portable Computer, Apple's first attempt at a laptop. That being said, at a weight of 16 pounds, the machine was hardly workable on your lap. </p><p>Edwin Kwan: Microsoft's AI research division has been leaking 38 terabytes worth of sensitive data for over three years.  The leak started back in July 2020 and was due to a Microsoft employee inadvertently sharing the URL for a misconfigured Azure blob storage bucket.</p><p>Katy Craig: Ireland's Data Protection Commission, or DPC, found a glaring security flaw in TikTok's Family Pairing feature. This feature was supposed to let adults chat with kids they're related to. Now what could go wrong here? </p><p><br></p><p>Mark Miller: When a hospital or a health care system is hit with a breach, there are life and death consequences to consider.  The people who perpetuate these breaches are concerned about nothing more than money, not the families affected. It puts the healthcare provider in an untenable situation. </p><p>t's Wednesday, September 20th, 2023, and here are your cybersecurity  and open source headlines for the day.</p><p><br></p><p>♻️ You’re welcome to 𝗿𝗲𝗽𝗼𝘀𝘁 if your followers will find this of value</p>]]></description><content:encoded><![CDATA[<p>🎙️ Free access to “It’s 5:05!” on your favorite podcast platforms: bit.ly/505-updates 📌</p><p>Marcel Brown: September 20th, 1989. Apple releases the Macintosh Portable Computer, Apple's first attempt at a laptop. That being said, at a weight of 16 pounds, the machine was hardly workable on your lap. </p><p>Edwin Kwan: Microsoft's AI research division has been leaking 38 terabytes worth of sensitive data for over three years.  The leak started back in July 2020 and was due to a Microsoft employee inadvertently sharing the URL for a misconfigured Azure blob storage bucket.</p><p>Katy Craig: Ireland's Data Protection Commission, or DPC, found a glaring security flaw in TikTok's Family Pairing feature. This feature was supposed to let adults chat with kids they're related to. Now what could go wrong here? </p><p><br></p><p>Mark Miller: When a hospital or a health care system is hit with a breach, there are life and death consequences to consider.  The people who perpetuate these breaches are concerned about nothing more than money, not the families affected. It puts the healthcare provider in an untenable situation. </p><p>t's Wednesday, September 20th, 2023, and here are your cybersecurity  and open source headlines for the day.</p><p><br></p><p>♻️ You’re welcome to 𝗿𝗲𝗽𝗼𝘀𝘁 if your followers will find this of value</p>]]></content:encoded><link><![CDATA[https://3zozb9fxlbueipjyapmaas.captivate.fm/episode/episode-233-microsoft-leaked-38tb-of-sensitive-data-tiktok-clock-is-ticking-your-healthcare-provider-is-under-attack]]></link><guid isPermaLink="false">3f582beb-3135-4896-96ed-01c45e0c742d</guid><itunes:image href="https://artwork.captivate.fm/33e2a4e7-a936-4ef5-905a-3a72363cfbe4/BkhMbfQsRHQi9QFk9GvnUJSv.png"/><dc:creator><![CDATA[Contributors from Around the World]]></dc:creator><pubDate>Wed, 20 Sep 2023 16:45:00 -0400</pubDate><enclosure url="https://dts.podtrac.com/redirect.mp3/podcasts.captivate.fm/media/803ea9ca-313c-49ee-84f3-3d2ae487c715/505-2023-09-20-Episode-233-Wednesday-Final-converted.mp3" length="9182765" type="audio/mpeg"/><itunes:duration>09:34</itunes:duration><itunes:explicit>false</itunes:explicit><itunes:episodeType>full</itunes:episodeType><itunes:season>1</itunes:season><itunes:episode>233</itunes:episode><itunes:season>1</itunes:season><podcast:episode>233</podcast:episode><podcast:season>1</podcast:season><itunes:author>Contributors from Around the World</itunes:author></item><item><title>Episode #232: Australia to Create Six Cyber Shields as part of Cyber Strategy; Cyber Adversaries Place their Bets Against the House; Cyber War Crimes; TikTok Tracks US Employees; This Day in Tech History</title><itunes:title>Episode #232: Australia to Create Six Cyber Shields as part of Cyber Strategy; Cyber Adversaries Place their Bets Against the House; Cyber War Crimes; TikTok Tracks US Employees; This Day in Tech History</itunes:title><description><![CDATA[<h3>🎙️ Free, ungated access to all 200+ episodes of “It’s 5:05!” on your favorite podcast platforms: https://bit.ly/505-updates. ♻️ You’re welcome to repost if your followers will find this of value.</h3><h3>Segments in this Episode</h3><h3>Australia to Create Six Cyber Shields as part of Cyber Strategy</h3><p><a href="https://505updates.com/edwinkwan/" rel="noopener noreferrer" target="_blank">🇦🇺 Edwin Kwan, Sydney, Australia ↗</a></p><p>As part of a coordinated national action plan, the Australian Government will release a revised Cybersecurity Strategy later this year around six cyber shields.</p><h3>Cyber Adversaries Place their Bets Against the House</h3><p><a href="https://505updates.com/markmiller/" rel="noopener noreferrer" target="_blank">🇺🇸 Mark Miller - White Rock, New Mexico↗</a></p><p>MGM Resorts and Caesar's aren't bragging about their losses right now. According to numerous reports, a major hack against the casinos was started with a social engineering scheme against an outsourced IT support vendor on September 11. Now that this type of hack has been proven to work, it's only a matter of time before the next set of casino attacks roll a big fat 7 against the house.</p><h3>Cyber War Crimes</h3><p><a href="https://505updates.com/katycraig/" rel="noopener noreferrer" target="_blank">🇺🇸 Katy Craig, San Diego, California ↗</a></p><p> The International Criminal Court, or ICC, is stepping into the digital age and setting its sights on cybercrimes that breach international law.  In a world where the battlefield is as likely to be a server farm as a desert, the ICC is saying enough is enough.</p><h3>TikTok Tracks US Employees</h3><p><a href="http://505updates.com/hillarycoover/" rel="noopener noreferrer" target="_blank">🇺🇸 Hillary Coover, Washington, DC ↗</a></p><p> Is TikTok's office attendance tracking a glimpse into the future of workplace surveillance? TikTok, owned by Chinese company ByteDance, unveiled an internal app called MyRTO.</p><h3>This Day, September 19, in Tech History</h3><p><a href="https://505updates.com/marcelbrown/" rel="noopener noreferrer" target="_blank"><strong>🇺🇸</strong> Marcel Brown, St. Louis, Missouri ↗</a></p><p>September 19th, 2006. Microsoft began testing its new video sharing service, Soapbox, which they hoped would compete with YouTube. Clearly, it did not compete very well because, personally, I had never heard of Soapbox, and probably neither did you.</p><p><br></p>]]></description><content:encoded><![CDATA[<h3>🎙️ Free, ungated access to all 200+ episodes of “It’s 5:05!” on your favorite podcast platforms: https://bit.ly/505-updates. ♻️ You’re welcome to repost if your followers will find this of value.</h3><h3>Segments in this Episode</h3><h3>Australia to Create Six Cyber Shields as part of Cyber Strategy</h3><p><a href="https://505updates.com/edwinkwan/" rel="noopener noreferrer" target="_blank">🇦🇺 Edwin Kwan, Sydney, Australia ↗</a></p><p>As part of a coordinated national action plan, the Australian Government will release a revised Cybersecurity Strategy later this year around six cyber shields.</p><h3>Cyber Adversaries Place their Bets Against the House</h3><p><a href="https://505updates.com/markmiller/" rel="noopener noreferrer" target="_blank">🇺🇸 Mark Miller - White Rock, New Mexico↗</a></p><p>MGM Resorts and Caesar's aren't bragging about their losses right now. According to numerous reports, a major hack against the casinos was started with a social engineering scheme against an outsourced IT support vendor on September 11. Now that this type of hack has been proven to work, it's only a matter of time before the next set of casino attacks roll a big fat 7 against the house.</p><h3>Cyber War Crimes</h3><p><a href="https://505updates.com/katycraig/" rel="noopener noreferrer" target="_blank">🇺🇸 Katy Craig, San Diego, California ↗</a></p><p> The International Criminal Court, or ICC, is stepping into the digital age and setting its sights on cybercrimes that breach international law.  In a world where the battlefield is as likely to be a server farm as a desert, the ICC is saying enough is enough.</p><h3>TikTok Tracks US Employees</h3><p><a href="http://505updates.com/hillarycoover/" rel="noopener noreferrer" target="_blank">🇺🇸 Hillary Coover, Washington, DC ↗</a></p><p> Is TikTok's office attendance tracking a glimpse into the future of workplace surveillance? TikTok, owned by Chinese company ByteDance, unveiled an internal app called MyRTO.</p><h3>This Day, September 19, in Tech History</h3><p><a href="https://505updates.com/marcelbrown/" rel="noopener noreferrer" target="_blank"><strong>🇺🇸</strong> Marcel Brown, St. Louis, Missouri ↗</a></p><p>September 19th, 2006. Microsoft began testing its new video sharing service, Soapbox, which they hoped would compete with YouTube. Clearly, it did not compete very well because, personally, I had never heard of Soapbox, and probably neither did you.</p><p><br></p>]]></content:encoded><link><![CDATA[https://3zozb9fxlbueipjyapmaas.captivate.fm/episode/episode-232-australia-to-create-six-cyber-shields-as-part-of-cyber-strategy-cyber-adversaries-place-their-bets-against-the-house-cyber-war-crimes-tiktok-tracks-us-employees-this-day-in-tech-history]]></link><guid isPermaLink="false">30a3831b-aaf1-459e-977d-7a7ee8c2c781</guid><itunes:image href="https://artwork.captivate.fm/33e2a4e7-a936-4ef5-905a-3a72363cfbe4/BkhMbfQsRHQi9QFk9GvnUJSv.png"/><dc:creator><![CDATA[Contributors from Around the World]]></dc:creator><pubDate>Tue, 19 Sep 2023 16:45:00 -0400</pubDate><enclosure url="https://dts.podtrac.com/redirect.mp3/podcasts.captivate.fm/media/bcf23ef8-e6de-4d83-b7de-604f6f0233c5/2023-09-19-505-Episode-232-converted.mp3" length="8984245" type="audio/mpeg"/><itunes:duration>12:29</itunes:duration><itunes:explicit>false</itunes:explicit><itunes:episodeType>full</itunes:episodeType><itunes:season>1</itunes:season><itunes:episode>232</itunes:episode><itunes:season>1</itunes:season><podcast:episode>232</podcast:episode><podcast:season>1</podcast:season><itunes:author>Contributors from Around the World</itunes:author></item><item><title>Episode #231: Auckland&apos;s Transport System Hit by Ransomware Attack; Deep Fakes: A Real Threat; TikTok Fine; This Day in Tech History</title><itunes:title>Episode #231: Auckland&apos;s Transport System Hit by Ransomware Attack; Deep Fakes: A Real Threat; TikTok Fine; This Day in Tech History</itunes:title><description><![CDATA[<h3>🎙️ Free, ungated access to all 200+ episodes of “It’s 5:05!” on your favorite podcast platforms: https://bit.ly/505-updates. ♻️ You’re welcome to repost if your followers will find this of value.</h3><h3>Segments in this Episode</h3><h3>Auckland's Transport System Hit by Ransomware Attack</h3><p><a href="https://505updates.com/edwinkwan/" rel="noopener noreferrer" target="_blank">🇦🇺 Edwin Kwan, Sydney, Australia ↗</a></p><p>The Auckland Transport Authority in New Zealand has suffered a cybersecurity incident that is impacting services relating to ticketing.</p><h3>Deep Fakes: A Real Threat</h3><p><a href="https://505updates.com/katycraig/" rel="noopener noreferrer" target="_blank">🇺🇸 Katy Craig, San Diego, California ↗</a></p><p>Ever wonder if seeing is really believing? Well, in the age of deepfakes, you might want to think twice. Today we're diving into a fresh advisory from the NSA, CISA, and the FBI that's a must-read for any organization.</p><h3>TikTok Fine</h3><p><a href="http://505updates.com/hillarycoover/" rel="noopener noreferrer" target="_blank">🇺🇸 Hillary Coover, Washington, DC ↗</a></p><p>Ever wonder if seeing is really believing? Well, in the age of deepfakes, you might want to think twice. Today we're diving into a fresh advisory from the NSA, CISA, and the FBI that's a must-read for any organization.</p><h3>This Day, September 17, 18, in Tech History</h3><p><a href="https://505updates.com/marcelbrown/" rel="noopener noreferrer" target="_blank"><strong>🇺🇸</strong> Marcel Brown, St. Louis, Missouri ↗</a></p><p>September 17th, 1976. NASA rolls out the first space shuttle, Enterprise, from its assembly facility to a waiting crowd. Included in the crowd was a delegation of actors from the Star Trek TV series.</p>]]></description><content:encoded><![CDATA[<h3>🎙️ Free, ungated access to all 200+ episodes of “It’s 5:05!” on your favorite podcast platforms: https://bit.ly/505-updates. ♻️ You’re welcome to repost if your followers will find this of value.</h3><h3>Segments in this Episode</h3><h3>Auckland's Transport System Hit by Ransomware Attack</h3><p><a href="https://505updates.com/edwinkwan/" rel="noopener noreferrer" target="_blank">🇦🇺 Edwin Kwan, Sydney, Australia ↗</a></p><p>The Auckland Transport Authority in New Zealand has suffered a cybersecurity incident that is impacting services relating to ticketing.</p><h3>Deep Fakes: A Real Threat</h3><p><a href="https://505updates.com/katycraig/" rel="noopener noreferrer" target="_blank">🇺🇸 Katy Craig, San Diego, California ↗</a></p><p>Ever wonder if seeing is really believing? Well, in the age of deepfakes, you might want to think twice. Today we're diving into a fresh advisory from the NSA, CISA, and the FBI that's a must-read for any organization.</p><h3>TikTok Fine</h3><p><a href="http://505updates.com/hillarycoover/" rel="noopener noreferrer" target="_blank">🇺🇸 Hillary Coover, Washington, DC ↗</a></p><p>Ever wonder if seeing is really believing? Well, in the age of deepfakes, you might want to think twice. Today we're diving into a fresh advisory from the NSA, CISA, and the FBI that's a must-read for any organization.</p><h3>This Day, September 17, 18, in Tech History</h3><p><a href="https://505updates.com/marcelbrown/" rel="noopener noreferrer" target="_blank"><strong>🇺🇸</strong> Marcel Brown, St. Louis, Missouri ↗</a></p><p>September 17th, 1976. NASA rolls out the first space shuttle, Enterprise, from its assembly facility to a waiting crowd. Included in the crowd was a delegation of actors from the Star Trek TV series.</p>]]></content:encoded><link><![CDATA[https://3zozb9fxlbueipjyapmaas.captivate.fm/episode/episode-231-aucklands-transport-system-hit-by-ransomware-attack-deep-fakes-a-real-threat-tiktok-fine-this-day-in-tech-history]]></link><guid isPermaLink="false">cfc623ae-9974-4cbf-8c4b-3c3229520bb0</guid><itunes:image href="https://artwork.captivate.fm/33e2a4e7-a936-4ef5-905a-3a72363cfbe4/BkhMbfQsRHQi9QFk9GvnUJSv.png"/><dc:creator><![CDATA[Contributors from Around the World]]></dc:creator><pubDate>Mon, 18 Sep 2023 16:45:00 -0400</pubDate><enclosure url="https://dts.podtrac.com/redirect.mp3/podcasts.captivate.fm/media/a860e0bb-06b6-451e-9708-1af8182f087d/2023-09-18-505-Episode-231-converted.mp3" length="6585888" type="audio/mpeg"/><itunes:duration>09:09</itunes:duration><itunes:explicit>false</itunes:explicit><itunes:episodeType>full</itunes:episodeType><itunes:season>1</itunes:season><itunes:episode>231</itunes:episode><itunes:season>1</itunes:season><podcast:episode>231</podcast:episode><podcast:season>1</podcast:season><itunes:author>Contributors from Around the World</itunes:author></item><item><title>Episode #230: Fake Telegram Apps; Fortifying AI; Transparency, Accountability, Responsibility for AI Models</title><itunes:title>Episode #230: Fake Telegram Apps; Fortifying AI; Transparency, Accountability, Responsibility for AI Models</itunes:title><description><![CDATA[<p>🎙️ Free, ungated access to all 225+ episodes of “It’s 5:05!” on your favorite podcast platforms: https://bit.ly/505-updates. ♻️ You’re welcome to 𝗿𝗲𝗽𝗼𝘀𝘁 if your followers will find this of value.</p><p><a href="#marcelbrown" rel="noopener noreferrer" target="_blank"><strong>Marcel Brown</strong></a>:  <strong>This Day in Tech History</strong></p><p>September 16th, 1997. Twelve years to the day after resigning from Apple, Steve Jobs is named interim CEO of Apple. Only seven months earlier, Jobs' company Next was purchased by Apple. Much of the technology acquired with the purchase was used to build the Mac OS X operating system.</p><p><a href="#edwinkwan" rel="noopener noreferrer" target="_blank"><strong>Edwin Kwan</strong></a>: <strong>Fake Telegram Apps Infect Thousands with Spyware</strong></p><p>Spyware masquerading as Telegram applications have been spotted in the Google Play Store and have been downloaded over 60,000 times. According to security researchers, the app appears visually identical to the official Telegram application.</p><p><a href="#tracybannon" rel="noopener noreferrer" target="_blank"><strong>Trac Bannon</strong></a>: <strong>Secure by Design: Fortifying AI</strong></p><p>We can and should apply CISA's Secure-by-Design and -Default guidance to the sexy trifecta: AI, ML, and Generative AI. Applying the CISA Secure-by-Design guidance presents many considerations and challenges.</p><p><a href="#olimpiupop" rel="noopener noreferrer" target="_blank"><strong>Olimpiu Pop</strong></a>: <strong>Transparency, Accountability, Responsibility for AI Models</strong></p><p>Artificial intelligence, though not always understood, holds enchanting promise to reshape everything. Medicine with faster, more accurate diagnostics, and even our leisure time with Netflix's suggestions and Nest's intuitive thermostats.</p>]]></description><content:encoded><![CDATA[<p>🎙️ Free, ungated access to all 225+ episodes of “It’s 5:05!” on your favorite podcast platforms: https://bit.ly/505-updates. ♻️ You’re welcome to 𝗿𝗲𝗽𝗼𝘀𝘁 if your followers will find this of value.</p><p><a href="#marcelbrown" rel="noopener noreferrer" target="_blank"><strong>Marcel Brown</strong></a>:  <strong>This Day in Tech History</strong></p><p>September 16th, 1997. Twelve years to the day after resigning from Apple, Steve Jobs is named interim CEO of Apple. Only seven months earlier, Jobs' company Next was purchased by Apple. Much of the technology acquired with the purchase was used to build the Mac OS X operating system.</p><p><a href="#edwinkwan" rel="noopener noreferrer" target="_blank"><strong>Edwin Kwan</strong></a>: <strong>Fake Telegram Apps Infect Thousands with Spyware</strong></p><p>Spyware masquerading as Telegram applications have been spotted in the Google Play Store and have been downloaded over 60,000 times. According to security researchers, the app appears visually identical to the official Telegram application.</p><p><a href="#tracybannon" rel="noopener noreferrer" target="_blank"><strong>Trac Bannon</strong></a>: <strong>Secure by Design: Fortifying AI</strong></p><p>We can and should apply CISA's Secure-by-Design and -Default guidance to the sexy trifecta: AI, ML, and Generative AI. Applying the CISA Secure-by-Design guidance presents many considerations and challenges.</p><p><a href="#olimpiupop" rel="noopener noreferrer" target="_blank"><strong>Olimpiu Pop</strong></a>: <strong>Transparency, Accountability, Responsibility for AI Models</strong></p><p>Artificial intelligence, though not always understood, holds enchanting promise to reshape everything. Medicine with faster, more accurate diagnostics, and even our leisure time with Netflix's suggestions and Nest's intuitive thermostats.</p>]]></content:encoded><link><![CDATA[https://3zozb9fxlbueipjyapmaas.captivate.fm/episode/episode-230-fake-telegram-apps-fortifying-ai-transparency-accountability-responsibility-for-ai-models]]></link><guid isPermaLink="false">f04be035-a9cf-46c1-8703-a45c709e7bc3</guid><itunes:image href="https://artwork.captivate.fm/33e2a4e7-a936-4ef5-905a-3a72363cfbe4/BkhMbfQsRHQi9QFk9GvnUJSv.png"/><dc:creator><![CDATA[Contributors from Around the World]]></dc:creator><pubDate>Fri, 15 Sep 2023 16:45:00 -0400</pubDate><enclosure url="https://dts.podtrac.com/redirect.mp3/podcasts.captivate.fm/media/6fcd6f37-0f35-446a-a4d0-86efce953953/505-2023-09-15-Episode-230-Friday-Final-Update-converted.mp3" length="11302233" type="audio/mpeg"/><itunes:duration>11:46</itunes:duration><itunes:explicit>false</itunes:explicit><itunes:episodeType>full</itunes:episodeType><itunes:season>1</itunes:season><itunes:episode>230</itunes:episode><itunes:season>1</itunes:season><podcast:episode>230</podcast:episode><podcast:season>1</podcast:season><itunes:author>Contributors from Around the World</itunes:author></item><item><title>Episode #229: Aussie Feds Mandate Entities Have Dedicated CISO; DoD&apos;s 2023 Cyber Playbook; UFOs Seen Flying over New Mexico</title><itunes:title>Episode #229: Aussie Feds Mandate Entities Have Dedicated CISO; DoD&apos;s 2023 Cyber Playbook; UFOs Seen Flying over New Mexico</itunes:title><description><![CDATA[<p>🎙️ Free, ungated access to all 225+ episodes of “It’s 5:05!” on your favorite podcast platforms: https://bit.ly/505-updates. ♻️ You’re welcome to 𝗿𝗲𝗽𝗼𝘀𝘁 if your followers will find this of value.</p><h2>This Day, September 14, in Tech History</h2><p>🇺🇸 Marcel Brown - St. Louis, Missouri</p><p> September 14th, 2000. Microsoft launches Windows Millennium, otherwise known as Windows ME, or as Microsoft wanted you to pronounce it, Windows Me.  Windows ME would be known for its many problems and is a footnote in history as Windows XP was released just over a year later.</p><h2>Aussie Feds Mandate Entities Have Dedicated CISO</h2><p>🇦🇺 Edwin Kwan - Sydney, Australia ↗</p><p>The Australian federal government is now mandating that non -corporate Commonwealth entities appoint a CISO to be responsible for cybersecurity leadership in the entity. The CISO role is expected to complement that of the existing CSO, and in some cases, the same officer may be appointed to both roles.</p><h2>DoD's 2023 Cyber Playbook</h2><p>🇺🇸 Katy Craig - San Diego, California</p><p>The Department of Defense just released an unclassified summary of its 2023 Cyber Strategy, and it's a must-know for anyone interested in national security and cyber defense. This strategy isn't just a bunch of buzzwords; it's grounded in real-world experience.</p><h2>UFOs Seen Flying over New Mexico</h2><p>🇺🇸 Mark Miller - White Rock, New Mexico</p>]]></description><content:encoded><![CDATA[<p>🎙️ Free, ungated access to all 225+ episodes of “It’s 5:05!” on your favorite podcast platforms: https://bit.ly/505-updates. ♻️ You’re welcome to 𝗿𝗲𝗽𝗼𝘀𝘁 if your followers will find this of value.</p><h2>This Day, September 14, in Tech History</h2><p>🇺🇸 Marcel Brown - St. Louis, Missouri</p><p> September 14th, 2000. Microsoft launches Windows Millennium, otherwise known as Windows ME, or as Microsoft wanted you to pronounce it, Windows Me.  Windows ME would be known for its many problems and is a footnote in history as Windows XP was released just over a year later.</p><h2>Aussie Feds Mandate Entities Have Dedicated CISO</h2><p>🇦🇺 Edwin Kwan - Sydney, Australia ↗</p><p>The Australian federal government is now mandating that non -corporate Commonwealth entities appoint a CISO to be responsible for cybersecurity leadership in the entity. The CISO role is expected to complement that of the existing CSO, and in some cases, the same officer may be appointed to both roles.</p><h2>DoD's 2023 Cyber Playbook</h2><p>🇺🇸 Katy Craig - San Diego, California</p><p>The Department of Defense just released an unclassified summary of its 2023 Cyber Strategy, and it's a must-know for anyone interested in national security and cyber defense. This strategy isn't just a bunch of buzzwords; it's grounded in real-world experience.</p><h2>UFOs Seen Flying over New Mexico</h2><p>🇺🇸 Mark Miller - White Rock, New Mexico</p>]]></content:encoded><link><![CDATA[https://3zozb9fxlbueipjyapmaas.captivate.fm/episode/episode-229-aussie-feds-mandate-agency-have-dedicated-ciso-dods-2023-cyber-playbook-ufos-seen-flying-over-new-mexico]]></link><guid isPermaLink="false">494b87dd-bd78-42d8-9229-83abd5baa562</guid><itunes:image href="https://artwork.captivate.fm/33e2a4e7-a936-4ef5-905a-3a72363cfbe4/BkhMbfQsRHQi9QFk9GvnUJSv.png"/><dc:creator><![CDATA[Contributors from Around the World]]></dc:creator><pubDate>Thu, 14 Sep 2023 16:45:00 -0400</pubDate><enclosure url="https://dts.podtrac.com/redirect.mp3/podcasts.captivate.fm/media/9974fa8a-0bca-4609-9c0a-3b0cb3f0e710/505-2023-09-14-Episode-229-Thursday-Final-converted.mp3" length="11717687" type="audio/mpeg"/><itunes:duration>09:46</itunes:duration><itunes:explicit>false</itunes:explicit><itunes:episodeType>full</itunes:episodeType><itunes:season>1</itunes:season><itunes:episode>229</itunes:episode><itunes:season>1</itunes:season><podcast:episode>229</podcast:episode><podcast:season>1</podcast:season><itunes:author>Contributors from Around the World</itunes:author></item><item><title>Episode #228: Cyber Security Tune Up for Festival Goers; TEMU App: A Trojan Horse in Your Palm; Diversity Trends Emerge in the Growing Cybersecurity Workforce; This Day in Tech History</title><itunes:title>Episode #228: Cyber Security Tune Up for Festival Goers; TEMU App: A Trojan Horse in Your Palm; Diversity Trends Emerge in the Growing Cybersecurity Workforce; This Day in Tech History</itunes:title><description><![CDATA[<p>🎙️ Free, ungated access to all 225+ episodes of “It’s 5:05!” on your favorite podcast platforms: https://bit.ly/505-updates. ♻️ You’re welcome to 𝗿𝗲𝗽𝗼𝘀𝘁 if your followers will find this of value.</p><h2><strong>This Day, September 13, in Tech History</strong></h2><p><a href="https://505updates.com/marcelbrown/" rel="noopener noreferrer" target="_blank"><strong>🇺🇸</strong> Marcel Brown, St. Louis, Missouri</a></p><p> September 13th, 1959. The Soviet space probe, Luna 2, becomes the first man-made object to impact any celestial object. In this case, the Moon.</p><h2><strong>Cyber Security Tune Up for Festival Goers</strong></h2><p><a href="https://505updates.com/edwinkwan/" rel="noopener noreferrer" target="_blank">🇦🇺 Edwin Kwan, Sydney, Australia</a></p><p>In an effort to promote cybersecurity, staff and students from three universities and across three states attended an annual Australian music festival to run daily cybersecurity tune-ups for festival-goers. </p><h2><strong>TEMU App: A Trojan Horse in Your Palm</strong></h2><p><a href="https://505updates.com/katycraig/" rel="noopener noreferrer" target="_blank">🇺🇸 Katy Craig, San Diego, California </a></p><p>Temu, a shopping app that's been downloaded over 100 million times in the US and Europe, is under serious scrutiny for some shady business practices.  This app poses a significant risk to consumers. If you've got it on your phone, it might be time for a digital detox.</p><h2><strong>Diversity Trends Emerge in Growing Cybersecurity Workforce</strong></h2><p><a href="http://505updates.com/hillarycoover/" rel="noopener noreferrer" target="_blank">🇺🇸 Hillary Coover, Washington, DC</a></p><p>Diversity is gaining ground in the cybersecurity sector and there is now a wealth of data resources available.  Despite this positive shift, there's still a need to attract and retain more minority workers in the industry.</p>]]></description><content:encoded><![CDATA[<p>🎙️ Free, ungated access to all 225+ episodes of “It’s 5:05!” on your favorite podcast platforms: https://bit.ly/505-updates. ♻️ You’re welcome to 𝗿𝗲𝗽𝗼𝘀𝘁 if your followers will find this of value.</p><h2><strong>This Day, September 13, in Tech History</strong></h2><p><a href="https://505updates.com/marcelbrown/" rel="noopener noreferrer" target="_blank"><strong>🇺🇸</strong> Marcel Brown, St. Louis, Missouri</a></p><p> September 13th, 1959. The Soviet space probe, Luna 2, becomes the first man-made object to impact any celestial object. In this case, the Moon.</p><h2><strong>Cyber Security Tune Up for Festival Goers</strong></h2><p><a href="https://505updates.com/edwinkwan/" rel="noopener noreferrer" target="_blank">🇦🇺 Edwin Kwan, Sydney, Australia</a></p><p>In an effort to promote cybersecurity, staff and students from three universities and across three states attended an annual Australian music festival to run daily cybersecurity tune-ups for festival-goers. </p><h2><strong>TEMU App: A Trojan Horse in Your Palm</strong></h2><p><a href="https://505updates.com/katycraig/" rel="noopener noreferrer" target="_blank">🇺🇸 Katy Craig, San Diego, California </a></p><p>Temu, a shopping app that's been downloaded over 100 million times in the US and Europe, is under serious scrutiny for some shady business practices.  This app poses a significant risk to consumers. If you've got it on your phone, it might be time for a digital detox.</p><h2><strong>Diversity Trends Emerge in Growing Cybersecurity Workforce</strong></h2><p><a href="http://505updates.com/hillarycoover/" rel="noopener noreferrer" target="_blank">🇺🇸 Hillary Coover, Washington, DC</a></p><p>Diversity is gaining ground in the cybersecurity sector and there is now a wealth of data resources available.  Despite this positive shift, there's still a need to attract and retain more minority workers in the industry.</p>]]></content:encoded><link><![CDATA[https://3zozb9fxlbueipjyapmaas.captivate.fm/episode/episode-228-cyber-security-tune-up-for-festival-goers-temu-app-a-trojan-horse-in-your-palm-diversity-trends-emerge-in-the-growing-cybersecurity-workforce-this-day-in-tech-history]]></link><guid isPermaLink="false">763211ff-ced1-40cd-8e0d-d76be4979390</guid><itunes:image href="https://artwork.captivate.fm/33e2a4e7-a936-4ef5-905a-3a72363cfbe4/BkhMbfQsRHQi9QFk9GvnUJSv.png"/><dc:creator><![CDATA[Contributors from Around the World]]></dc:creator><pubDate>Wed, 13 Sep 2023 16:45:00 -0400</pubDate><enclosure url="https://dts.podtrac.com/redirect.mp3/podcasts.captivate.fm/media/744df277-9e07-4850-bde1-6693470c4f6f/505-2023-09-13-Episode-228-Wednesday-Final-converted.mp3" length="8696260" type="audio/mpeg"/><itunes:duration>09:04</itunes:duration><itunes:explicit>false</itunes:explicit><itunes:episodeType>full</itunes:episodeType><itunes:season>1</itunes:season><itunes:episode>228</itunes:episode><itunes:season>1</itunes:season><podcast:episode>228</podcast:episode><podcast:season>1</podcast:season><itunes:author>Contributors from Around the World</itunes:author></item><item><title>Episode #227: Wyze Suffers Broken Access Control; Introducing the Small Business Cyber Resiliency Act; It&apos;s Not Just A Vehicle; It&apos;s A Data Mine on Wheels; How Will Elon Musk&apos;s X Reshape the Digital Landscape?; This Day, September 12, in Tech History</title><itunes:title>Episode #227: Wyze Suffers Broken Access Control; Introducing the Small Business Cyber Resiliency Act; It&apos;s Not Just A Vehicle; It&apos;s A Data Mine on Wheels; How Will Elon Musk&apos;s X Reshape the Digital Landscape?; This Day, September 12, in Tech History</itunes:title><description><![CDATA[<h3>🎙️ Free, ungated access to all 200+ episodes of “It’s 5:05!” on your favorite podcast platforms: https://bit.ly/505-updates. ♻️ You’re welcome to repost if your followers will find this of value.</h3><h3>Segments in this Episode</h3><h3><br></h3><h2>Wyze Suffers Broken Access Control</h2><p><a href="https://505updates.com/edwinkwan/" rel="noopener noreferrer" target="_blank">🇦🇺 Edwin Kwan, Sydney, Australia ↗</a></p><p>Users reported on Reddit on Friday that when they log into Wyze's web viewer, their web feeds disappeared and they had access to other people's camera feeds instead. The company revealed that they had been aware of a security vulnerability for three years.&nbsp;</p><h2>It's Not Just A Vehicle; It's A Data Mine on Wheels</h2><p><a href="https://505updates.com/kadigrigg/" rel="noopener noreferrer" target="_blank">🇺🇸 Kadi McKean, Alexandria, Virginia </a>↗</p><p>In the ever-evolving landscape of digital privacy, one product category stands out as a poster child for disregard: cars. Cars have officially earned the problematic honor of being the worst reviewed product category in terms of privacy.</p><h2>Introducing the Small Business Cyber Resiliency Act</h2><p><a href="https://505updates.com/katycraig/" rel="noopener noreferrer" target="_blank">🇺🇸 Katy Craig, San Diego, California ↗</a></p><p>U.S. Senator Jim Risch, along with bipartisan support, has introduced the Small Business Cyber Resiliency Act. If passed, this legislation could be a significant step forward in protecting the often vulnerable small business sector from cyber threats.</p><h2>How Will Elon Musk's X Reshape the Digital Landscape?</h2><p><a href="http://505updates.com/hillarycoover/" rel="noopener noreferrer" target="_blank">🇺🇸 Hillary Coover, Washington, DC ↗</a></p><p>Elon Musk's company, X, formerly Twitter, is tightening its grip on data scraping by updating its Terms of Service. Starting on September 29th, X will ban all data scraping and crawling activities without "prior written consent."</p><h2>This Day, September 12, in Tech History</h2><p><a href="https://505updates.com/marcelbrown/" rel="noopener noreferrer" target="_blank"><strong>🇺🇸</strong> Marcel Brown, St. Louis, Missouri ↗</a></p><p>September 12th, 1962. In a speech given at Rice University, President John F. Kennedy gives his famous "We choose to go to the Moon" speech, in which he uttered the famous phrase " I believe that this nation should commit itself to achieving the goal, before this decade is out, of landing a man on the moon and returning him safely to earth." It took just under 7 years before man set foot on the Moon in July of 1969.</p>]]></description><content:encoded><![CDATA[<h3>🎙️ Free, ungated access to all 200+ episodes of “It’s 5:05!” on your favorite podcast platforms: https://bit.ly/505-updates. ♻️ You’re welcome to repost if your followers will find this of value.</h3><h3>Segments in this Episode</h3><h3><br></h3><h2>Wyze Suffers Broken Access Control</h2><p><a href="https://505updates.com/edwinkwan/" rel="noopener noreferrer" target="_blank">🇦🇺 Edwin Kwan, Sydney, Australia ↗</a></p><p>Users reported on Reddit on Friday that when they log into Wyze's web viewer, their web feeds disappeared and they had access to other people's camera feeds instead. The company revealed that they had been aware of a security vulnerability for three years.&nbsp;</p><h2>It's Not Just A Vehicle; It's A Data Mine on Wheels</h2><p><a href="https://505updates.com/kadigrigg/" rel="noopener noreferrer" target="_blank">🇺🇸 Kadi McKean, Alexandria, Virginia </a>↗</p><p>In the ever-evolving landscape of digital privacy, one product category stands out as a poster child for disregard: cars. Cars have officially earned the problematic honor of being the worst reviewed product category in terms of privacy.</p><h2>Introducing the Small Business Cyber Resiliency Act</h2><p><a href="https://505updates.com/katycraig/" rel="noopener noreferrer" target="_blank">🇺🇸 Katy Craig, San Diego, California ↗</a></p><p>U.S. Senator Jim Risch, along with bipartisan support, has introduced the Small Business Cyber Resiliency Act. If passed, this legislation could be a significant step forward in protecting the often vulnerable small business sector from cyber threats.</p><h2>How Will Elon Musk's X Reshape the Digital Landscape?</h2><p><a href="http://505updates.com/hillarycoover/" rel="noopener noreferrer" target="_blank">🇺🇸 Hillary Coover, Washington, DC ↗</a></p><p>Elon Musk's company, X, formerly Twitter, is tightening its grip on data scraping by updating its Terms of Service. Starting on September 29th, X will ban all data scraping and crawling activities without "prior written consent."</p><h2>This Day, September 12, in Tech History</h2><p><a href="https://505updates.com/marcelbrown/" rel="noopener noreferrer" target="_blank"><strong>🇺🇸</strong> Marcel Brown, St. Louis, Missouri ↗</a></p><p>September 12th, 1962. In a speech given at Rice University, President John F. Kennedy gives his famous "We choose to go to the Moon" speech, in which he uttered the famous phrase " I believe that this nation should commit itself to achieving the goal, before this decade is out, of landing a man on the moon and returning him safely to earth." It took just under 7 years before man set foot on the Moon in July of 1969.</p>]]></content:encoded><link><![CDATA[https://3zozb9fxlbueipjyapmaas.captivate.fm/episode/episode-227-wyze-suffers-broken-access-control-introducing-the-small-business-cyber-resiliency-act-its-not-just-a-vehicle-its-a-data-mine-on-wheels-how-will-elon-musks-x-reshape-the-digital-landscape-this-day-september-12-in-tech-history]]></link><guid isPermaLink="false">035504fb-ec6c-4318-8763-aec2d2867ba6</guid><itunes:image href="https://artwork.captivate.fm/33e2a4e7-a936-4ef5-905a-3a72363cfbe4/BkhMbfQsRHQi9QFk9GvnUJSv.png"/><dc:creator><![CDATA[Contributors from Around the World]]></dc:creator><pubDate>Tue, 12 Sep 2023 16:45:00 -0400</pubDate><enclosure url="https://dts.podtrac.com/redirect.mp3/podcasts.captivate.fm/media/8f4b9dfe-5861-4ff0-ab63-c16973dad4c8/2023-09-12-505-Episode-227-converted.mp3" length="7559839" type="audio/mpeg"/><itunes:duration>10:30</itunes:duration><itunes:explicit>false</itunes:explicit><itunes:episodeType>full</itunes:episodeType><itunes:season>1</itunes:season><itunes:episode>227</itunes:episode><itunes:season>1</itunes:season><podcast:episode>227</podcast:episode><podcast:season>1</podcast:season><itunes:author>Contributors from Around the World</itunes:author></item><item><title>Episode #226: Australian Companies Suffers Data Breach Due to Third Party Compromise; Can You Trust That Picture?; Is Your Phone Listening To You; This Day in Tech History</title><itunes:title>Episode #226: Australian Companies Suffers Data Breach Due to Third Party Compromise; Can You Trust That Picture?; Is Your Phone Listening To You; This Day in Tech History</itunes:title><description><![CDATA[<h3>🎙️ Free, ungated access to all 200+ episodes of “It’s 5:05!” on your favorite podcast platforms: https://bit.ly/505-updates. ♻️ You’re welcome to repost if your followers will find this of value.</h3><h3>Segments in this Episode</h3><h3><br></h3><h1>Australian Companies Suffers Data Breach Due to Third Party Compromise</h1><p><a href="https://505updates.com/edwinkwan/" rel="noopener noreferrer" target="_blank">🇦🇺 Edwin Kwan, Sydney, Australia ↗</a></p><p>A notorious ransomware gang has compromised a number of Australian companies and are extorting them. They have claimed responsibility over attacks of several Australian companies in the health, real estate, and law sectors, and have stolen at least 4.95 terabytes of data.</p><h1>Can You Trust That Picture?</h1><p><a href="https://505updates.com/katycraig/" rel="noopener noreferrer" target="_blank">🇺🇸 Katy Craig, San Diego, California ↗</a></p><p>Google Cloud and Vertex AI are rolling out SynthID, a groundbreaking tool designed to watermark and identify AI-generated images. As the landscape of AI-generated content expands, tools like SynthID are becoming crucial in the fight for digital authenticity.&nbsp;</p><h1>Is Your Phone Listening To You</h1><h3><a href="http://505updates.com/hillarycoover/" rel="noopener noreferrer" target="_blank">🇺🇸 Hillary Coover, Washington, DC ↗</a></h3><p>40 percent of Americans who have a smartphone believe that their phone is listening to them without their permission. They're not entirely wrong. Why should you care? The more identifiable data corporations collect on you, the larger your susceptibility to a cybersecurity incident.</p><h1>This Day, September 10, 11 in Tech History</h1><p><a href="https://505updates.com/marcelbrown/" rel="noopener noreferrer" target="_blank"><strong>🇺🇸</strong> Marcel Brown, St. Louis, Missouri ↗</a></p><p>From Sourced Network Productions in Washington, DC, it's 5:05. I'm hillary Coover. Today is Monday, September 11th, 2023. Here's the full story behind today's cybersecurity and open-source headlines.</p>]]></description><content:encoded><![CDATA[<h3>🎙️ Free, ungated access to all 200+ episodes of “It’s 5:05!” on your favorite podcast platforms: https://bit.ly/505-updates. ♻️ You’re welcome to repost if your followers will find this of value.</h3><h3>Segments in this Episode</h3><h3><br></h3><h1>Australian Companies Suffers Data Breach Due to Third Party Compromise</h1><p><a href="https://505updates.com/edwinkwan/" rel="noopener noreferrer" target="_blank">🇦🇺 Edwin Kwan, Sydney, Australia ↗</a></p><p>A notorious ransomware gang has compromised a number of Australian companies and are extorting them. They have claimed responsibility over attacks of several Australian companies in the health, real estate, and law sectors, and have stolen at least 4.95 terabytes of data.</p><h1>Can You Trust That Picture?</h1><p><a href="https://505updates.com/katycraig/" rel="noopener noreferrer" target="_blank">🇺🇸 Katy Craig, San Diego, California ↗</a></p><p>Google Cloud and Vertex AI are rolling out SynthID, a groundbreaking tool designed to watermark and identify AI-generated images. As the landscape of AI-generated content expands, tools like SynthID are becoming crucial in the fight for digital authenticity.&nbsp;</p><h1>Is Your Phone Listening To You</h1><h3><a href="http://505updates.com/hillarycoover/" rel="noopener noreferrer" target="_blank">🇺🇸 Hillary Coover, Washington, DC ↗</a></h3><p>40 percent of Americans who have a smartphone believe that their phone is listening to them without their permission. They're not entirely wrong. Why should you care? The more identifiable data corporations collect on you, the larger your susceptibility to a cybersecurity incident.</p><h1>This Day, September 10, 11 in Tech History</h1><p><a href="https://505updates.com/marcelbrown/" rel="noopener noreferrer" target="_blank"><strong>🇺🇸</strong> Marcel Brown, St. Louis, Missouri ↗</a></p><p>From Sourced Network Productions in Washington, DC, it's 5:05. I'm hillary Coover. Today is Monday, September 11th, 2023. Here's the full story behind today's cybersecurity and open-source headlines.</p>]]></content:encoded><link><![CDATA[https://3zozb9fxlbueipjyapmaas.captivate.fm/episode/episode-226-australian-companies-suffers-data-breach-due-to-third-party-compromise-can-you-trust-that-picture-is-your-phone-listening-to-you-this-day-in-tech-history]]></link><guid isPermaLink="false">e94a305b-5a1e-47a7-b2e8-611c14ff542d</guid><itunes:image href="https://artwork.captivate.fm/33e2a4e7-a936-4ef5-905a-3a72363cfbe4/BkhMbfQsRHQi9QFk9GvnUJSv.png"/><dc:creator><![CDATA[Contributors from Around the World]]></dc:creator><pubDate>Mon, 11 Sep 2023 16:45:00 -0400</pubDate><enclosure url="https://dts.podtrac.com/redirect.mp3/podcasts.captivate.fm/media/a12f1d3a-017b-45d9-81ec-89a6a0fc5bc1/2023-09-11-Episode-226-converted.mp3" length="6319126" type="audio/mpeg"/><itunes:duration>08:47</itunes:duration><itunes:explicit>false</itunes:explicit><itunes:episodeType>full</itunes:episodeType><itunes:season>1</itunes:season><itunes:episode>226</itunes:episode><itunes:season>1</itunes:season><podcast:episode>226</podcast:episode><podcast:season>1</podcast:season><itunes:author>Contributors from Around the World</itunes:author></item><item><title>Episode #225: Identity Theft Victim Targeted While On Holidays; There may be something lurking in your Apple Wallet; Microsoft signing key exposed in crash dump; Wiretaps on Wheels</title><itunes:title>Episode #225: Identity Theft Victim Targeted While On Holidays; There may be something lurking in your Apple Wallet; Microsoft signing key exposed in crash dump; Wiretaps on Wheels</itunes:title><description><![CDATA[<p>🎙️ Free, ungated access to all 200+ episodes of “It’s 5:05!” on your favorite podcast platforms: https://bit.ly/505-updates. ♻️ You’re welcome to 𝗿𝗲𝗽𝗼𝘀𝘁 if your followers will find this of value.</p><h3><strong>Identity Theft Victim Targeted While On Holidays</strong></h3><p><a href="https://505updates.com/edwinkwan/" rel="noopener noreferrer" target="_blank">🇦🇺 Edwin Kwan, Sydney, Australia ↗</a></p><p>Australian couple returns from holiday to discover their bank accounts were drained, shares sold, and 20 new credit and debit cards created under their names. This incident highlighted several issues, including the ability for cybercriminals to open online accounts without the bank verifying the person behind those accounts.</p><h3><strong>There may be something lurking in your Apple Wallet</strong></h3><p><a href="https://505updates.com/juliechatman/" rel="noopener noreferrer" target="_blank"><strong>🇺🇸</strong> Julie Chatman, Washington, DC&nbsp;↗</a></p><p> There may be something lurking in your Apple Wallet. Users are urged to update their devices now. Apple has confirmed that if you have a job, which makes you a target, you can place your phone in Lockdown mode to block this attack.</p><p><br></p><h3><strong>Microsoft signing key exposed in crash dump</strong></h3><p><a href="https://505updates.com/katycraig/" rel="noopener noreferrer" target="_blank">🇺🇸 Katy Craig, San Diego, California ↗</a></p><p>A consumer signing key was exposed in a crash dump in April 2021 and later exploited by a China-based threat group, Storm0558. The exposure of the consumer signing key occurred due to what Microsoft describes as a "race condition," which allowed the key to be present in the crash dump.</p><p><br></p><h3><strong>Wiretaps on Wheels</strong></h3><h3><a href="http://505updates.com/hillarycoover/" rel="noopener noreferrer" target="_blank">🇺🇸 Hillary Coover, Washington, DC ↗</a></h3><p>Is your modern car spying on you? Discover the shocking truth about the "wiretaps on wheels" and how your data privacy may be at risk. </p><p><br></p><h3><strong>This Day, September 7, 8, and 9 in Tech History</strong></h3><p><a href="https://505updates.com/marcelbrown/" rel="noopener noreferrer" target="_blank"><strong>🇺🇸</strong> Marcel Brown, St. Louis, Missouri ↗</a></p><p> ​September 8, 2003. The Recording Industry Association of America, RIAA, sues 261 people for sharing music on internet peer-to-peer networks, including 12-year-old Brianna LaHara.  </p>]]></description><content:encoded><![CDATA[<p>🎙️ Free, ungated access to all 200+ episodes of “It’s 5:05!” on your favorite podcast platforms: https://bit.ly/505-updates. ♻️ You’re welcome to 𝗿𝗲𝗽𝗼𝘀𝘁 if your followers will find this of value.</p><h3><strong>Identity Theft Victim Targeted While On Holidays</strong></h3><p><a href="https://505updates.com/edwinkwan/" rel="noopener noreferrer" target="_blank">🇦🇺 Edwin Kwan, Sydney, Australia ↗</a></p><p>Australian couple returns from holiday to discover their bank accounts were drained, shares sold, and 20 new credit and debit cards created under their names. This incident highlighted several issues, including the ability for cybercriminals to open online accounts without the bank verifying the person behind those accounts.</p><h3><strong>There may be something lurking in your Apple Wallet</strong></h3><p><a href="https://505updates.com/juliechatman/" rel="noopener noreferrer" target="_blank"><strong>🇺🇸</strong> Julie Chatman, Washington, DC&nbsp;↗</a></p><p> There may be something lurking in your Apple Wallet. Users are urged to update their devices now. Apple has confirmed that if you have a job, which makes you a target, you can place your phone in Lockdown mode to block this attack.</p><p><br></p><h3><strong>Microsoft signing key exposed in crash dump</strong></h3><p><a href="https://505updates.com/katycraig/" rel="noopener noreferrer" target="_blank">🇺🇸 Katy Craig, San Diego, California ↗</a></p><p>A consumer signing key was exposed in a crash dump in April 2021 and later exploited by a China-based threat group, Storm0558. The exposure of the consumer signing key occurred due to what Microsoft describes as a "race condition," which allowed the key to be present in the crash dump.</p><p><br></p><h3><strong>Wiretaps on Wheels</strong></h3><h3><a href="http://505updates.com/hillarycoover/" rel="noopener noreferrer" target="_blank">🇺🇸 Hillary Coover, Washington, DC ↗</a></h3><p>Is your modern car spying on you? Discover the shocking truth about the "wiretaps on wheels" and how your data privacy may be at risk. </p><p><br></p><h3><strong>This Day, September 7, 8, and 9 in Tech History</strong></h3><p><a href="https://505updates.com/marcelbrown/" rel="noopener noreferrer" target="_blank"><strong>🇺🇸</strong> Marcel Brown, St. Louis, Missouri ↗</a></p><p> ​September 8, 2003. The Recording Industry Association of America, RIAA, sues 261 people for sharing music on internet peer-to-peer networks, including 12-year-old Brianna LaHara.  </p>]]></content:encoded><link><![CDATA[https://3zozb9fxlbueipjyapmaas.captivate.fm/episode/episode-225-identity-theft-victim-targeted-while-on-holidays-there-may-be-something-lurking-in-your-apple-wallet-microsoft-signing-key-exposed-in-crash-dump-wiretaps-on-wheels]]></link><guid isPermaLink="false">98254e96-301e-4940-a684-26a9777e9e76</guid><itunes:image href="https://artwork.captivate.fm/33e2a4e7-a936-4ef5-905a-3a72363cfbe4/BkhMbfQsRHQi9QFk9GvnUJSv.png"/><dc:creator><![CDATA[Contributors from Around the World]]></dc:creator><pubDate>Fri, 08 Sep 2023 16:45:00 -0400</pubDate><enclosure url="https://dts.podtrac.com/redirect.mp3/podcasts.captivate.fm/media/48e86f62-bab3-4eca-92ff-c39ab676d651/505-2023-09-08-Episode-225-Final-converted.mp3" length="11327310" type="audio/mpeg"/><itunes:duration>11:48</itunes:duration><itunes:explicit>false</itunes:explicit><itunes:episodeType>full</itunes:episodeType><itunes:season>1</itunes:season><itunes:episode>225</itunes:episode><itunes:season>1</itunes:season><podcast:episode>225</podcast:episode><podcast:season>1</podcast:season><itunes:author>Contributors from Around the World</itunes:author></item><item><title>Episode #224: Australian Data Breach Notifications; Most Attacked and Most Vulnerable Cyber Assets; Comply with SEC’s New Cyber Disclosure Rules; Can TikTok Truly Safeguard your Privacy?</title><itunes:title>Episode #224: Australian Data Breach Notifications; Most Attacked and Most Vulnerable Cyber Assets; Comply with SEC’s New Cyber Disclosure Rules; Can TikTok Truly Safeguard your Privacy?</itunes:title><description><![CDATA[<p>🎙️ Free, ungated access to all 200+ episodes of “It’s 5:05!” on your favorite podcast platforms: https://bit.ly/505-updates. ♻️ You’re welcome to 𝗿𝗲𝗽𝗼𝘀𝘁 if your followers will find this of value.</p><h1>Today's Cybersecurity and Open Source Headlines</h1><h2>Edwin Kwan: Australian Data Breach Notifications</h2><p>The Office of the Australian Information Commissioner, OAIC, has just released a report of data breach notifications made between January to June, 2023. The top sectors to notify of data breaches were health service providers, financial services and recruitment agencies.</p><h2>Ian Garrett: Most Attacked and Most Vulnerable Cyber Assets</h2><p>Armis, a security company, conducted a study focused on cyber assets with the highest number of attack attempts and weaponized common vulnerabilities and exposures, or CVEs. The most vulnerable assets are among the Internet of Medical Things, or IoMT, and the most targeted among Operational Technology, or OT assets.</p><h2>Katy Craig: How to Comply with SEC’s New Cyber Disclosure Rules</h2><p>The US Securities and Exchange Commission’s new cyber incident disclosure rules have recently come into effect. Although the specific requirement will not be enforced until December, experts recommend that companies begin preparations immediately</p><h2>Hillary Coover: Can TikTok Truly Safeguard your Privacy?</h2><p>Curious about how TikTok is handling your data and whether it’s safe from prying eyes? TikTok’s recent move to open its first European data center, along with third-party security audits, aims to ease concerns. But the real question is, will these steps truly safeguard your privacy?</p><p>Full episode plus two hundred more: https://bit.ly/505-updates.</p><p><br></p>]]></description><content:encoded><![CDATA[<p>🎙️ Free, ungated access to all 200+ episodes of “It’s 5:05!” on your favorite podcast platforms: https://bit.ly/505-updates. ♻️ You’re welcome to 𝗿𝗲𝗽𝗼𝘀𝘁 if your followers will find this of value.</p><h1>Today's Cybersecurity and Open Source Headlines</h1><h2>Edwin Kwan: Australian Data Breach Notifications</h2><p>The Office of the Australian Information Commissioner, OAIC, has just released a report of data breach notifications made between January to June, 2023. The top sectors to notify of data breaches were health service providers, financial services and recruitment agencies.</p><h2>Ian Garrett: Most Attacked and Most Vulnerable Cyber Assets</h2><p>Armis, a security company, conducted a study focused on cyber assets with the highest number of attack attempts and weaponized common vulnerabilities and exposures, or CVEs. The most vulnerable assets are among the Internet of Medical Things, or IoMT, and the most targeted among Operational Technology, or OT assets.</p><h2>Katy Craig: How to Comply with SEC’s New Cyber Disclosure Rules</h2><p>The US Securities and Exchange Commission’s new cyber incident disclosure rules have recently come into effect. Although the specific requirement will not be enforced until December, experts recommend that companies begin preparations immediately</p><h2>Hillary Coover: Can TikTok Truly Safeguard your Privacy?</h2><p>Curious about how TikTok is handling your data and whether it’s safe from prying eyes? TikTok’s recent move to open its first European data center, along with third-party security audits, aims to ease concerns. But the real question is, will these steps truly safeguard your privacy?</p><p>Full episode plus two hundred more: https://bit.ly/505-updates.</p><p><br></p>]]></content:encoded><link><![CDATA[https://3zozb9fxlbueipjyapmaas.captivate.fm/episode/episode-224-australian-data-breach-notifications-most-attacked-and-most-vulnerable-cyber-assets-comply-with-secs-new-cyber-disclosure-rules-can-tiktok-truly-safeguard-your-privacy]]></link><guid isPermaLink="false">2f7a24ea-11f9-4cc7-b7be-cc79c27333fe</guid><itunes:image href="https://artwork.captivate.fm/33e2a4e7-a936-4ef5-905a-3a72363cfbe4/BkhMbfQsRHQi9QFk9GvnUJSv.png"/><dc:creator><![CDATA[Contributors from Around the World]]></dc:creator><pubDate>Thu, 07 Sep 2023 16:45:00 -0400</pubDate><enclosure url="https://dts.podtrac.com/redirect.mp3/podcasts.captivate.fm/media/c846ea48-3ceb-414b-b577-83794e4688cf/505-2023-09-07-Episode-224-Final-converted.mp3" length="8930317" type="audio/mpeg"/><itunes:duration>09:18</itunes:duration><itunes:explicit>false</itunes:explicit><itunes:episodeType>full</itunes:episodeType><itunes:season>1</itunes:season><itunes:episode>224</itunes:episode><itunes:season>1</itunes:season><podcast:episode>224</podcast:episode><podcast:season>1</podcast:season><itunes:author>Contributors from Around the World</itunes:author></item><item><title>Episode #223: Website on Children&apos;s Snack Compromised and Serving Porn; GenAIVulnerability; Microsoft’s August Patch Tuesday addresses 73 CVEs; High-alert Vulnerability in Ivanti MobileIron Sentry; Critical Vulnerability in Zyxel Routers; This Day in Tech History</title><itunes:title>Episode #223: Website on Children&apos;s Snack Compromised and Serving Porn; GenAIVulnerability; Microsoft’s August Patch Tuesday addresses 73 CVEs; High-alert Vulnerability in Ivanti MobileIron Sentry; Critical Vulnerability in Zyxel Routers; This Day in Tech History</itunes:title><description><![CDATA[<h3>🎙️ Free, ungated access to all 200+ episodes of “It’s 5:05!” on your favorite podcast platforms: https://bit.ly/505-updates. ♻️ You’re welcome to repost if your followers will find this of value.</h3><h3>Segments in this Episode</h3><h3>Website on Children's Snack Compromised and Serving Porn</h3><p><a href="https://🇦🇺EdwinKwan,Sydney,Australia↗" rel="noopener noreferrer" target="_blank">🇦🇺 Edwin Kwan, Sydney, Australia ↗</a></p><p>A UK supermarket chain is recalling four types of children's snacks as the website published on the packaging has been compromised. Usually when a supermarket recalls a food item, it's due to an issue with the food content. In this instance, the recall is due to the website listed on the packaging.</p><h3>GenAIVulnerability</h3><p><a href="http://505updates.com/hillarycoover/" rel="noopener noreferrer" target="_blank">🇺🇸 Hillary Coover, Washington, DC ↗</a></p><p>Concerned about the security of your conversations with AI chatbots? Discover how a hidden threat called 'prompt injection' could be compromising your privacy and data safety.&nbsp;</p><h3>Microsoft’s August Patch Tuesday addresses 73 CVEs</h3><p><a href="https://505updates.com/tracbannon/" rel="noopener noreferrer" target="_blank"><strong>🇺🇸</strong> Tracy (Trac) Bannon, Camp Hill, Pennsylvania↗</a></p><p>Microsoft recently rolled out its August Patch Tuesday updates, and it's crucial for everyone, from individual users to large organizations, to pay attention. Microsoft addressed a staggering total of 73 Common Vulnerabilities and Exposures (CVEs).</p><p><br></p><h3>High-alert Vulnerability in Ivanti MobileIron Sentry</h3><p><a href="https://🇺🇸KatyCraig,SanDiego,California↗" rel="noopener noreferrer" target="_blank">🇺🇸 Katy Craig, San Diego, California ↗</a></p><p>&nbsp;Today we're talking about a high-alert vulnerability in Ivanti MobileIron Sentry, versions 9.18.0 and below. If you're using one of these vulnerable versions of Ivanti MobileIron Sentry, you're essentially handing over the keys to the kingdom.</p><h3>Critical Vulnerability in Zyxel Routers</h3><p><a href="http://505updates.com/olimpiupop/" rel="noopener noreferrer" target="_blank">🇷🇴 Olimpiu Pop, Transylvania, Romania ↗</a></p><p>Do you have a router in your house that is connected to the internet? Yes, those have firmware too. Firmware that more often than not, we forget to update. Who would hack you? The number of regular folks attacked is growing and proof to this is the vulnerability affecting Zyxel routers.</p><h3>This Day, September 6, in Tech History</h3><p><a href="https://505updates.com/marcelbrown/" rel="noopener noreferrer" target="_blank"><strong>🇺🇸</strong> Marcel Brown, St. Louis, Missouri ↗</a></p><p>September 6th, 2001. Microsoft announces that consumers can pre-order Windows XP. Windows XP would remain Microsoft's flagship operating system for over five years until the release of Windows Vista in January of 2007.</p><p><br></p>]]></description><content:encoded><![CDATA[<h3>🎙️ Free, ungated access to all 200+ episodes of “It’s 5:05!” on your favorite podcast platforms: https://bit.ly/505-updates. ♻️ You’re welcome to repost if your followers will find this of value.</h3><h3>Segments in this Episode</h3><h3>Website on Children's Snack Compromised and Serving Porn</h3><p><a href="https://🇦🇺EdwinKwan,Sydney,Australia↗" rel="noopener noreferrer" target="_blank">🇦🇺 Edwin Kwan, Sydney, Australia ↗</a></p><p>A UK supermarket chain is recalling four types of children's snacks as the website published on the packaging has been compromised. Usually when a supermarket recalls a food item, it's due to an issue with the food content. In this instance, the recall is due to the website listed on the packaging.</p><h3>GenAIVulnerability</h3><p><a href="http://505updates.com/hillarycoover/" rel="noopener noreferrer" target="_blank">🇺🇸 Hillary Coover, Washington, DC ↗</a></p><p>Concerned about the security of your conversations with AI chatbots? Discover how a hidden threat called 'prompt injection' could be compromising your privacy and data safety.&nbsp;</p><h3>Microsoft’s August Patch Tuesday addresses 73 CVEs</h3><p><a href="https://505updates.com/tracbannon/" rel="noopener noreferrer" target="_blank"><strong>🇺🇸</strong> Tracy (Trac) Bannon, Camp Hill, Pennsylvania↗</a></p><p>Microsoft recently rolled out its August Patch Tuesday updates, and it's crucial for everyone, from individual users to large organizations, to pay attention. Microsoft addressed a staggering total of 73 Common Vulnerabilities and Exposures (CVEs).</p><p><br></p><h3>High-alert Vulnerability in Ivanti MobileIron Sentry</h3><p><a href="https://🇺🇸KatyCraig,SanDiego,California↗" rel="noopener noreferrer" target="_blank">🇺🇸 Katy Craig, San Diego, California ↗</a></p><p>&nbsp;Today we're talking about a high-alert vulnerability in Ivanti MobileIron Sentry, versions 9.18.0 and below. If you're using one of these vulnerable versions of Ivanti MobileIron Sentry, you're essentially handing over the keys to the kingdom.</p><h3>Critical Vulnerability in Zyxel Routers</h3><p><a href="http://505updates.com/olimpiupop/" rel="noopener noreferrer" target="_blank">🇷🇴 Olimpiu Pop, Transylvania, Romania ↗</a></p><p>Do you have a router in your house that is connected to the internet? Yes, those have firmware too. Firmware that more often than not, we forget to update. Who would hack you? The number of regular folks attacked is growing and proof to this is the vulnerability affecting Zyxel routers.</p><h3>This Day, September 6, in Tech History</h3><p><a href="https://505updates.com/marcelbrown/" rel="noopener noreferrer" target="_blank"><strong>🇺🇸</strong> Marcel Brown, St. Louis, Missouri ↗</a></p><p>September 6th, 2001. Microsoft announces that consumers can pre-order Windows XP. Windows XP would remain Microsoft's flagship operating system for over five years until the release of Windows Vista in January of 2007.</p><p><br></p>]]></content:encoded><link><![CDATA[https://3zozb9fxlbueipjyapmaas.captivate.fm/episode/episode-223-website-on-childrens-snack-compromised-and-serving-porn-genaivulnerability-microsofts-august-patch-tuesday-addresses-73-cves-high-alert-vulnerability-in-ivanti-mobileiron-sentry-critical-vulnerability-in-zyxel-routers-this-day-in-tech-histo...]]></link><guid isPermaLink="false">9156b7ec-500c-4833-8dc1-b7f4a328b23e</guid><itunes:image href="https://artwork.captivate.fm/33e2a4e7-a936-4ef5-905a-3a72363cfbe4/BkhMbfQsRHQi9QFk9GvnUJSv.png"/><dc:creator><![CDATA[Contributors from Around the World]]></dc:creator><pubDate>Wed, 06 Sep 2023 16:45:00 -0400</pubDate><enclosure url="https://dts.podtrac.com/redirect.mp3/podcasts.captivate.fm/media/5c975fbf-b1fe-4814-a113-32abc836a896/2023-09-06-505-Episode-223-converted.mp3" length="10605509" type="audio/mpeg"/><itunes:duration>14:44</itunes:duration><itunes:explicit>false</itunes:explicit><itunes:episodeType>full</itunes:episodeType><itunes:season>1</itunes:season><itunes:episode>223</itunes:episode><itunes:season>1</itunes:season><podcast:episode>223</podcast:episode><podcast:season>1</podcast:season><itunes:author>Contributors from Around the World</itunes:author></item><item><title>Episode #222:WordPress Migration Add-on Vulnerable to Sensitive Information Disclosure; Social Engineering to Bypass Multi-factor Authentication; Okta hack affects US customers; This Day in Tech History</title><itunes:title>Episode #222:WordPress Migration Add-on Vulnerable to Sensitive Information Disclosure; Social Engineering to Bypass Multi-factor Authentication; Okta hack affects US customers; This Day in Tech History</itunes:title><description><![CDATA[<h3>🎙️ Free, ungated access to all 200+ episodes of “It’s 5:05!” on your favorite podcast platforms: https://bit.ly/505-updates. ♻️ You’re welcome to repost if your followers will find this of value.</h3><h3>Segments in this Episode</h3><h3>WordPress Migration Add-on Vulnerable to Sensitive Information Disclosure</h3><p><strong>🇦🇺 Edwin Kwan, Sydney, Australia ↗</strong></p><p>A WordPress migration plugin contains add-ons that suffer from a vulnerability that could result in sensitive information disclosure. The free plugin is not affected by the vulnerability. It is the premium extensions that are affected.</p><h3>Social Engineering to Bypass Multi-factor Authentication</h3><p><strong>🇺🇸 Ian Garrett, Arlington, Virginia ↗</strong></p><p>​​Okta, an identity and access management company has issued a warning regarding a new social engineering attack targeting IT service desks in the US.</p><h3>Okta hack affects US customers</h3><p>🇺🇸 Katy Craig, San Diego, California ↗</p><p>Today we're talking about Okta, the identity and access management company, which has been dealing with a series of targeted attacks. The attackers are going after the IT help desk of Okta's US-based customers. Even the gatekeepers need to double-check who's knocking.</p><h3>This Day, September 3-5, in Tech History</h3><p><strong>🇺🇸</strong> Marcel Brown, St. Louis, Missouri ↗</p><p>4th, 1998. Larry Page and Sergey Brin filing corporation papers for Google in California. Filing on a Friday, the date of official incorporation would be marked as Monday, September 7th. Starting out as a privately held company, Google would hold their IPO about six years later, on August 19th, 2004.&nbsp;</p>]]></description><content:encoded><![CDATA[<h3>🎙️ Free, ungated access to all 200+ episodes of “It’s 5:05!” on your favorite podcast platforms: https://bit.ly/505-updates. ♻️ You’re welcome to repost if your followers will find this of value.</h3><h3>Segments in this Episode</h3><h3>WordPress Migration Add-on Vulnerable to Sensitive Information Disclosure</h3><p><strong>🇦🇺 Edwin Kwan, Sydney, Australia ↗</strong></p><p>A WordPress migration plugin contains add-ons that suffer from a vulnerability that could result in sensitive information disclosure. The free plugin is not affected by the vulnerability. It is the premium extensions that are affected.</p><h3>Social Engineering to Bypass Multi-factor Authentication</h3><p><strong>🇺🇸 Ian Garrett, Arlington, Virginia ↗</strong></p><p>​​Okta, an identity and access management company has issued a warning regarding a new social engineering attack targeting IT service desks in the US.</p><h3>Okta hack affects US customers</h3><p>🇺🇸 Katy Craig, San Diego, California ↗</p><p>Today we're talking about Okta, the identity and access management company, which has been dealing with a series of targeted attacks. The attackers are going after the IT help desk of Okta's US-based customers. Even the gatekeepers need to double-check who's knocking.</p><h3>This Day, September 3-5, in Tech History</h3><p><strong>🇺🇸</strong> Marcel Brown, St. Louis, Missouri ↗</p><p>4th, 1998. Larry Page and Sergey Brin filing corporation papers for Google in California. Filing on a Friday, the date of official incorporation would be marked as Monday, September 7th. Starting out as a privately held company, Google would hold their IPO about six years later, on August 19th, 2004.&nbsp;</p>]]></content:encoded><link><![CDATA[https://3zozb9fxlbueipjyapmaas.captivate.fm/episode/episode-222-wordpress-migration-add-on-vulnerable-to-sensitive-information-disclosure-social-engineering-to-bypass-multi-factor-authentication-okta-hack-affects-us-customers-this-day-in-tech-history]]></link><guid isPermaLink="false">65ef88a7-713a-4d88-8d5b-4762e22f41bd</guid><itunes:image href="https://artwork.captivate.fm/33e2a4e7-a936-4ef5-905a-3a72363cfbe4/BkhMbfQsRHQi9QFk9GvnUJSv.png"/><dc:creator><![CDATA[Contributors from Around the World]]></dc:creator><pubDate>Tue, 05 Sep 2023 16:45:00 -0400</pubDate><enclosure url="https://dts.podtrac.com/redirect.mp3/podcasts.captivate.fm/media/6e30e204-3c19-4e6f-be96-3fcd55d87f47/2023-09-05-Episode-222-converted.mp3" length="6419437" type="audio/mpeg"/><itunes:duration>08:55</itunes:duration><itunes:explicit>false</itunes:explicit><itunes:episodeType>full</itunes:episodeType><itunes:season>1</itunes:season><itunes:episode>222</itunes:episode><itunes:season>1</itunes:season><podcast:episode>222</podcast:episode><podcast:season>1</podcast:season><itunes:author>Contributors from Around the World</itunes:author></item><item><title>Episode #221:University of Sydney Students Suffers Data Breach; FBI takes down Qakbot; First Year in Review</title><itunes:title>Episode #221:University of Sydney Students Suffers Data Breach; FBI takes down Qakbot; First Year in Review</itunes:title><description><![CDATA[<p>🎙️ Free, ungated access to all 200+ episodes of “It’s 5:05!” on your favorite podcast platforms: https://bit.ly/505-updates. ♻️ You’re welcome to repost if your followers will find this of value.</p><p>Segments in this Episode</p><h2>University of Sydney Students Suffers Data Breach</h2><p>🇦🇺 Edwin Kwan, Sydney, Australia ↗</p><p>The University of Sydney has suffered a third party data breach exposing students' personal information. The university said that the issue was isolated to a single platform and had no impact on other university systems.&nbsp;</p><h2>FBI takes down Qakbot</h2><p>🇺🇸 Katy Craig, San Diego, California ↗</p><p>The FBI working with international partners has dismantled Qakbot a massive and disruptive botnet. QakBot was behind at least 40 ransomware attacks causing hundreds of millions in damages, and was running on over 700,000 endpoints worldwide, 200,000 of which were in the US.</p><h2>First Year in Review</h2><p><a href="https://505updates.com/markmiller/" rel="noopener noreferrer" target="_blank">🇺🇸 Mark Miller, New York City↗</a></p><p>It is a holiday here in the United States. With many taking the day off, I'm going to take a couple minutes to evaluate where we've come in the first year of It's 5:05, and let you know where we're headed in the second year.</p>]]></description><content:encoded><![CDATA[<p>🎙️ Free, ungated access to all 200+ episodes of “It’s 5:05!” on your favorite podcast platforms: https://bit.ly/505-updates. ♻️ You’re welcome to repost if your followers will find this of value.</p><p>Segments in this Episode</p><h2>University of Sydney Students Suffers Data Breach</h2><p>🇦🇺 Edwin Kwan, Sydney, Australia ↗</p><p>The University of Sydney has suffered a third party data breach exposing students' personal information. The university said that the issue was isolated to a single platform and had no impact on other university systems.&nbsp;</p><h2>FBI takes down Qakbot</h2><p>🇺🇸 Katy Craig, San Diego, California ↗</p><p>The FBI working with international partners has dismantled Qakbot a massive and disruptive botnet. QakBot was behind at least 40 ransomware attacks causing hundreds of millions in damages, and was running on over 700,000 endpoints worldwide, 200,000 of which were in the US.</p><h2>First Year in Review</h2><p><a href="https://505updates.com/markmiller/" rel="noopener noreferrer" target="_blank">🇺🇸 Mark Miller, New York City↗</a></p><p>It is a holiday here in the United States. With many taking the day off, I'm going to take a couple minutes to evaluate where we've come in the first year of It's 5:05, and let you know where we're headed in the second year.</p>]]></content:encoded><link><![CDATA[https://3zozb9fxlbueipjyapmaas.captivate.fm/episode/episode-221-university-of-sydney-students-suffers-data-breach-fbi-takes-down-qakbot-first-year-in-review]]></link><guid isPermaLink="false">962f8a8b-635e-4746-a9a4-511542fb7742</guid><itunes:image href="https://artwork.captivate.fm/33e2a4e7-a936-4ef5-905a-3a72363cfbe4/BkhMbfQsRHQi9QFk9GvnUJSv.png"/><dc:creator><![CDATA[Contributors from Around the World]]></dc:creator><pubDate>Mon, 04 Sep 2023 16:45:00 -0400</pubDate><enclosure url="https://dts.podtrac.com/redirect.mp3/podcasts.captivate.fm/media/a34516d7-66d8-483e-bf89-0ca251b7ce40/2023-09-04-505-Episode-221-converted.mp3" length="4796919" type="audio/mpeg"/><itunes:duration>06:40</itunes:duration><itunes:explicit>false</itunes:explicit><itunes:episodeType>full</itunes:episodeType><itunes:season>1</itunes:season><itunes:episode>221</itunes:episode><itunes:season>1</itunes:season><podcast:episode>221</podcast:episode><podcast:season>1</podcast:season><itunes:author>Contributors from Around the World</itunes:author></item><item><title>Episode #220: Cybersecurity Framework; Modernizing NIST CSF; What’s cooking in the NIST kitchen?; Defining Profiles and Tiers; Data Breach Victim Gets Fined In Court</title><itunes:title>Episode #220: Cybersecurity Framework; Modernizing NIST CSF; What’s cooking in the NIST kitchen?; Defining Profiles and Tiers; Data Breach Victim Gets Fined In Court</itunes:title><description><![CDATA[<p>🎙️ Free, ungated access to all 200+ episodes of “It’s 5:05!” on your favorite podcast platforms: https://bit.ly/505-updates. ♻️ You’re welcome to repost if your followers will find this of value.</p><p><span class="ql-size-huge">Segments in this Episode</span></p><p><span class="ql-size-large">Data Breach Victim Gets Fined In Court</span></p><p>🇦🇺 Edwin Kwan, Sydney, Australia ↗</p><p> A data breach victim suffered additional emotional toll when she was charged by the courts and fined $1.2 million. The Australian victim had her information compromised in the Medibank data breach .   The victim was served electronically with papers with charges for cybersquatting, trademark infringement, and IP infringement.</p><p><span class="ql-size-large">This Day, September 1, in Tech History</span></p><p>🇺🇸 Marcel Brown, St. Louis, Missouri ↗</p><p>September 1st, 1977. Pioneer 11 becomes the first manmade object to fly by Saturn. After passing Saturn, Pioneer 11 continued on a trajectory towards the center of the Milky Way. The last contact with Pioneer 11 was in November of 1995. </p><p><br></p><p><span class="ql-size-large">CSF: Modernizing the NIST Cybersecurity Framework</span></p><p>🇺🇸 Tracy (Trac) Bannon, Camp Hill, Pennsylvania↗</p><p>The new draft of the NIST Cybersecurity Framework, CSF, is exciting. Why? Because the working group is applying modern software practices and techniques.  The software architect in me is overjoyed that the CSF 2.0 includes a few updates that align with modern software practices.</p><p><br></p><p><span class="ql-size-large">CSF: What’s cooking in the NIST kitchen?</span></p><p>🇺🇸 Katy Craig, San Diego, California ↗</p><p>The NIST Cybersecurity framework is getting a facelift and Version 2.0 is currently in draft form. So what's cooking in the NIST kitchen? Let's find out. First up, scope and intent. </p><p><br></p><p><span class="ql-size-large">CSF: Defining Profiles and Tiers</span></p><p>🇷🇴 Olimpiu Pop, Transylvania, Romania ↗</p><p>Organizations using CSF may choose to handle a risk in different ways.  You can create current profiles for the status quo of your cybersecurity or a target profile to define the end goal. Community profiles for different industries can be used as inspiration.    </p><p><br></p>]]></description><content:encoded><![CDATA[<p>🎙️ Free, ungated access to all 200+ episodes of “It’s 5:05!” on your favorite podcast platforms: https://bit.ly/505-updates. ♻️ You’re welcome to repost if your followers will find this of value.</p><p><span class="ql-size-huge">Segments in this Episode</span></p><p><span class="ql-size-large">Data Breach Victim Gets Fined In Court</span></p><p>🇦🇺 Edwin Kwan, Sydney, Australia ↗</p><p> A data breach victim suffered additional emotional toll when she was charged by the courts and fined $1.2 million. The Australian victim had her information compromised in the Medibank data breach .   The victim was served electronically with papers with charges for cybersquatting, trademark infringement, and IP infringement.</p><p><span class="ql-size-large">This Day, September 1, in Tech History</span></p><p>🇺🇸 Marcel Brown, St. Louis, Missouri ↗</p><p>September 1st, 1977. Pioneer 11 becomes the first manmade object to fly by Saturn. After passing Saturn, Pioneer 11 continued on a trajectory towards the center of the Milky Way. The last contact with Pioneer 11 was in November of 1995. </p><p><br></p><p><span class="ql-size-large">CSF: Modernizing the NIST Cybersecurity Framework</span></p><p>🇺🇸 Tracy (Trac) Bannon, Camp Hill, Pennsylvania↗</p><p>The new draft of the NIST Cybersecurity Framework, CSF, is exciting. Why? Because the working group is applying modern software practices and techniques.  The software architect in me is overjoyed that the CSF 2.0 includes a few updates that align with modern software practices.</p><p><br></p><p><span class="ql-size-large">CSF: What’s cooking in the NIST kitchen?</span></p><p>🇺🇸 Katy Craig, San Diego, California ↗</p><p>The NIST Cybersecurity framework is getting a facelift and Version 2.0 is currently in draft form. So what's cooking in the NIST kitchen? Let's find out. First up, scope and intent. </p><p><br></p><p><span class="ql-size-large">CSF: Defining Profiles and Tiers</span></p><p>🇷🇴 Olimpiu Pop, Transylvania, Romania ↗</p><p>Organizations using CSF may choose to handle a risk in different ways.  You can create current profiles for the status quo of your cybersecurity or a target profile to define the end goal. Community profiles for different industries can be used as inspiration.    </p><p><br></p>]]></content:encoded><link><![CDATA[https://3zozb9fxlbueipjyapmaas.captivate.fm/episode/episode-220-cybersecurity-framework-modernizing-nist-csf-whats-cooking-in-the-nist-kitchen-defining-profiles-and-tiers-data-breach-victim-gets-fined-in-court]]></link><guid isPermaLink="false">07965663-c5de-4a3c-8573-dd7457524635</guid><itunes:image href="https://artwork.captivate.fm/33e2a4e7-a936-4ef5-905a-3a72363cfbe4/BkhMbfQsRHQi9QFk9GvnUJSv.png"/><dc:creator><![CDATA[Contributors from Around the World]]></dc:creator><pubDate>Fri, 01 Sep 2023 16:45:00 -0400</pubDate><enclosure url="https://dts.podtrac.com/redirect.mp3/podcasts.captivate.fm/media/2df37252-b320-4760-9476-2ea4a2fe6137/505-2023-09-01-Friday-Episode-220-Final-converted.mp3" length="12332921" type="audio/mpeg"/><itunes:duration>12:51</itunes:duration><itunes:explicit>false</itunes:explicit><itunes:episodeType>full</itunes:episodeType><itunes:season>1</itunes:season><itunes:episode>220</itunes:episode><itunes:season>1</itunes:season><podcast:episode>220</podcast:episode><podcast:season>1</podcast:season><itunes:author>Contributors from Around the World</itunes:author></item><item><title>Episode #129: Malicious Word Documents Hiding As PDFs; Is it time to nuke your Venmo account?; Part Three: 10 Tasks Slowing Down Security Professionals; Changes to NIST Cybersecurity Framework; This Day in Tech History</title><itunes:title>Episode #129: Malicious Word Documents Hiding As PDFs; Is it time to nuke your Venmo account?; Part Three: 10 Tasks Slowing Down Security Professionals; Changes to NIST Cybersecurity Framework; This Day in Tech History</itunes:title><description><![CDATA[<p>🎙️ Free, ungated access to all 200+ episodes of “It’s 5:05!” on your favorite podcast platforms: https://bit.ly/505-updates. ♻️ You’re welcome to 𝗿𝗲𝗽𝗼𝘀𝘁 if your followers will find this of value.</p><h3>Malicious Word Documents Hiding As PDFs</h3><p><a href="https://505updates.com/edwinkwan/" rel="noopener noreferrer" target="_blank">🇦🇺 Edwin Kwan, Sydney, Australia ↗</a></p><p>Japan's Computer Emergency Response Team, JPCERT, recently shared a newly-detected attack that bypasses detection by embedding malicious Word files in PDFs.</p><h3>Is it time to nuke your Venmo account?</h3><p><a href="https://505updates.com/katycraig/" rel="noopener noreferrer" target="_blank">🇺🇸 Katy Craig, San Diego, California ↗</a></p><p>Have you ever said, "I'll Venmo you," and think nothing of it? Well, it's time to think again. Venmo isn't just for easy payments. It's a data goldmine. It's like leaving breadcrumbs that form a trail of your life- where you go, who you see, and when you see 'em.&nbsp;</p><h3>Part Three: 10 Tasks Slowing Down Security Professionals</h3><p><a href="https://505updates.com/iangarrett/" rel="noopener noreferrer" target="_blank"><strong>🇺🇸 </strong>Ian Garrett, Arlington, Virginia ↗</a></p><p>Have you ever wondered what challenges security teams face due to budgetary and staffing constraints? Today is the last part of a three-part series where we explore the 10 common tasks that often bogged down cybersecurity professionals and discuss strategies employed by security leaders to overcome these hurdles.</p><h3>Changes to NIST Cybersecurity Framework</h3><p><a href="http://505updates.com/olimpiupop/" rel="noopener noreferrer" target="_blank">🇷🇴 Olimpiu Pop, Transylvania, Romania ↗</a></p><p>NIST, the US National Institute of Standards and Technology, published the public draft of version 2.0 of their Cybersecurity Framework. It expanded from protecting just critical infrastructures like hospitals and power plants, to providing cybersecurity guidance for all organizations, regardless of type or size.&nbsp;</p><h3>This Day, August 31, in Tech History</h3><p><a href="https://505updates.com/marcelbrown/" rel="noopener noreferrer" target="_blank"><strong>🇺🇸</strong> Marcel Brown, St. Louis, Missouri ↗</a></p><p>August 31st, 1897. Thomas Edison receives a patent for the Kinetographic Camera, also called the Kinetograph. Edison and his assistant, W. K. L. Dickson, were credited with inventing the Kinetograph in the early 1890s, and it is often considered to be the first real motion picture camera.&nbsp;</p><p>From Sourced Network Productions in Washington, DC, it's 5:05. I'm Hillary Coover. Today is Thursday, August 31st, 2023. Here's the full story behind today's cybersecurity and open source headlines. </p>]]></description><content:encoded><![CDATA[<p>🎙️ Free, ungated access to all 200+ episodes of “It’s 5:05!” on your favorite podcast platforms: https://bit.ly/505-updates. ♻️ You’re welcome to 𝗿𝗲𝗽𝗼𝘀𝘁 if your followers will find this of value.</p><h3>Malicious Word Documents Hiding As PDFs</h3><p><a href="https://505updates.com/edwinkwan/" rel="noopener noreferrer" target="_blank">🇦🇺 Edwin Kwan, Sydney, Australia ↗</a></p><p>Japan's Computer Emergency Response Team, JPCERT, recently shared a newly-detected attack that bypasses detection by embedding malicious Word files in PDFs.</p><h3>Is it time to nuke your Venmo account?</h3><p><a href="https://505updates.com/katycraig/" rel="noopener noreferrer" target="_blank">🇺🇸 Katy Craig, San Diego, California ↗</a></p><p>Have you ever said, "I'll Venmo you," and think nothing of it? Well, it's time to think again. Venmo isn't just for easy payments. It's a data goldmine. It's like leaving breadcrumbs that form a trail of your life- where you go, who you see, and when you see 'em.&nbsp;</p><h3>Part Three: 10 Tasks Slowing Down Security Professionals</h3><p><a href="https://505updates.com/iangarrett/" rel="noopener noreferrer" target="_blank"><strong>🇺🇸 </strong>Ian Garrett, Arlington, Virginia ↗</a></p><p>Have you ever wondered what challenges security teams face due to budgetary and staffing constraints? Today is the last part of a three-part series where we explore the 10 common tasks that often bogged down cybersecurity professionals and discuss strategies employed by security leaders to overcome these hurdles.</p><h3>Changes to NIST Cybersecurity Framework</h3><p><a href="http://505updates.com/olimpiupop/" rel="noopener noreferrer" target="_blank">🇷🇴 Olimpiu Pop, Transylvania, Romania ↗</a></p><p>NIST, the US National Institute of Standards and Technology, published the public draft of version 2.0 of their Cybersecurity Framework. It expanded from protecting just critical infrastructures like hospitals and power plants, to providing cybersecurity guidance for all organizations, regardless of type or size.&nbsp;</p><h3>This Day, August 31, in Tech History</h3><p><a href="https://505updates.com/marcelbrown/" rel="noopener noreferrer" target="_blank"><strong>🇺🇸</strong> Marcel Brown, St. Louis, Missouri ↗</a></p><p>August 31st, 1897. Thomas Edison receives a patent for the Kinetographic Camera, also called the Kinetograph. Edison and his assistant, W. K. L. Dickson, were credited with inventing the Kinetograph in the early 1890s, and it is often considered to be the first real motion picture camera.&nbsp;</p><p>From Sourced Network Productions in Washington, DC, it's 5:05. I'm Hillary Coover. Today is Thursday, August 31st, 2023. Here's the full story behind today's cybersecurity and open source headlines. </p>]]></content:encoded><link><![CDATA[https://3zozb9fxlbueipjyapmaas.captivate.fm/episode/episode-129-malicious-word-documents-hiding-as-pdfs-is-it-time-to-nuke-your-venmo-account-part-three-10-tasks-slowing-down-security-professionals-changes-to-nist-cybersecurity-framework-this-day-in-tech-history]]></link><guid isPermaLink="false">d09875d0-3f8c-41a2-b0cd-58e7800074d4</guid><itunes:image href="https://artwork.captivate.fm/33e2a4e7-a936-4ef5-905a-3a72363cfbe4/BkhMbfQsRHQi9QFk9GvnUJSv.png"/><dc:creator><![CDATA[Contributors from Around the World]]></dc:creator><pubDate>Thu, 31 Aug 2023 16:45:00 -0400</pubDate><enclosure url="https://dts.podtrac.com/redirect.mp3/podcasts.captivate.fm/media/f0af1904-7524-4cfa-b4da-2af44091f043/2023-08-31-505-Episode-219-converted.mp3" length="7212517" type="audio/mpeg"/><itunes:duration>10:01</itunes:duration><itunes:explicit>false</itunes:explicit><itunes:episodeType>full</itunes:episodeType><itunes:season>1</itunes:season><itunes:episode>219</itunes:episode><itunes:season>1</itunes:season><podcast:episode>219</podcast:episode><podcast:season>1</podcast:season><itunes:author>Contributors from Around the World</itunes:author></item><item><title>Episode #128: Data Stealing Libraries Found in Rust Registry; Lazarus Group NK RATs; Spamouflage; Adversaries say, &quot;Show me the Money!&quot;; This Day in Tech History</title><itunes:title>Episode #128: Data Stealing Libraries Found in Rust Registry; Lazarus Group NK RATs; Spamouflage; Adversaries say, &quot;Show me the Money!&quot;; This Day in Tech History</itunes:title><description><![CDATA[<p>🎙️ Free, ungated access to all 200+ episodes of “It’s 5:05!” on your favorite podcast platforms: https://bit.ly/505-updates. ♻️ You’re welcome to 𝗿𝗲𝗽𝗼𝘀𝘁 if your followers will find this of value.</p><h3><strong>Data Stealing Libraries Found in Rust Registry</strong></h3><p><a href="https://505updates.com/edwinkwan/" rel="noopener noreferrer" target="_blank">🇦🇺 Edwin Kwan, Sydney, Australia ↗</a></p><p>Early this month, malicious libraries were discovered in the RUST programming language 's crate registry. It is suspected that the libraries were discovered in the early stages of a campaign. It is unclear what the goal of the attackers were.&nbsp;</p><h3><strong>Lazarus Group NK RATs</strong></h3><p><a href="https://505updates.com/katycraig/" rel="noopener noreferrer" target="_blank">🇺🇸 Katy Craig, San Diego, California ↗</a></p><p>Let's talk CollectionRAT. This one is the new kid on the block, but don't underestimate it. It gathers data, reads and writes files, and even has its own tricks to avoid detection. This ain't no one trick pony.&nbsp;</p><h3><strong>Spamouflage</strong></h3><p><a href="http://505updates.com/hillarycoover/" rel="noopener noreferrer" target="_blank">🇺🇸 Hillary Coover, Washington, DC ↗</a></p><p> Meta, the parent company of Facebook, has successfully dismantled a massive Chinese disinformation campaign known as Spamouflage. It was the largest cross-platform covert influence operation they've ever encountered.&nbsp;</p><h3><strong>Adversaries say, "Show me the Money!"</strong></h3><p><a href="https://505updates.com/markmiller/" rel="noopener noreferrer" target="_blank">🇺🇸 Mark Miller, New York City↗</a></p><p>One of the iconic scenes in Jerry McGuire is Cuba Gooding Jr. forcing Tom Cruise to scream, "Show me the money. Show me the money!" I was reminded of the scene as I was reading Hazel Burton's update on how Cisco Talos found clues of post authentication adversaries who left tracks that said, "show" me. Yeah, literally, "show" me.&nbsp;</p><h3><strong>This Day, August 30, in Tech History</strong></h3><p><a href="https://505updates.com/marcelbrown/" rel="noopener noreferrer" target="_blank"><strong>🇺🇸</strong> Marcel Brown, St. Louis, Missouri ↗</a></p><p>August 30th, 1963. A direct line of communication between the leaders of the US and the Soviet Union dubbed the Hotline, begins operation today. It was most famously represented as a red phone.&nbsp;</p><p>From Sourced Network Production in New York city, it's 5 0 5. I'm Pokie Huang. Today's Wednesday, August 30th, 2023. Here's the full story behind today's cybersecurity and open source headlines.&nbsp;</p>]]></description><content:encoded><![CDATA[<p>🎙️ Free, ungated access to all 200+ episodes of “It’s 5:05!” on your favorite podcast platforms: https://bit.ly/505-updates. ♻️ You’re welcome to 𝗿𝗲𝗽𝗼𝘀𝘁 if your followers will find this of value.</p><h3><strong>Data Stealing Libraries Found in Rust Registry</strong></h3><p><a href="https://505updates.com/edwinkwan/" rel="noopener noreferrer" target="_blank">🇦🇺 Edwin Kwan, Sydney, Australia ↗</a></p><p>Early this month, malicious libraries were discovered in the RUST programming language 's crate registry. It is suspected that the libraries were discovered in the early stages of a campaign. It is unclear what the goal of the attackers were.&nbsp;</p><h3><strong>Lazarus Group NK RATs</strong></h3><p><a href="https://505updates.com/katycraig/" rel="noopener noreferrer" target="_blank">🇺🇸 Katy Craig, San Diego, California ↗</a></p><p>Let's talk CollectionRAT. This one is the new kid on the block, but don't underestimate it. It gathers data, reads and writes files, and even has its own tricks to avoid detection. This ain't no one trick pony.&nbsp;</p><h3><strong>Spamouflage</strong></h3><p><a href="http://505updates.com/hillarycoover/" rel="noopener noreferrer" target="_blank">🇺🇸 Hillary Coover, Washington, DC ↗</a></p><p> Meta, the parent company of Facebook, has successfully dismantled a massive Chinese disinformation campaign known as Spamouflage. It was the largest cross-platform covert influence operation they've ever encountered.&nbsp;</p><h3><strong>Adversaries say, "Show me the Money!"</strong></h3><p><a href="https://505updates.com/markmiller/" rel="noopener noreferrer" target="_blank">🇺🇸 Mark Miller, New York City↗</a></p><p>One of the iconic scenes in Jerry McGuire is Cuba Gooding Jr. forcing Tom Cruise to scream, "Show me the money. Show me the money!" I was reminded of the scene as I was reading Hazel Burton's update on how Cisco Talos found clues of post authentication adversaries who left tracks that said, "show" me. Yeah, literally, "show" me.&nbsp;</p><h3><strong>This Day, August 30, in Tech History</strong></h3><p><a href="https://505updates.com/marcelbrown/" rel="noopener noreferrer" target="_blank"><strong>🇺🇸</strong> Marcel Brown, St. Louis, Missouri ↗</a></p><p>August 30th, 1963. A direct line of communication between the leaders of the US and the Soviet Union dubbed the Hotline, begins operation today. It was most famously represented as a red phone.&nbsp;</p><p>From Sourced Network Production in New York city, it's 5 0 5. I'm Pokie Huang. Today's Wednesday, August 30th, 2023. Here's the full story behind today's cybersecurity and open source headlines.&nbsp;</p>]]></content:encoded><link><![CDATA[https://3zozb9fxlbueipjyapmaas.captivate.fm/episode/episode-128-data-stealing-libraries-found-in-rust-registry-lazarus-group-nk-rats-spamouflage-adversaries-say-show-me-the-money-this-day-in-tech-history]]></link><guid isPermaLink="false">b62fc162-bf99-47d0-995b-f09f58005333</guid><itunes:image href="https://artwork.captivate.fm/33e2a4e7-a936-4ef5-905a-3a72363cfbe4/BkhMbfQsRHQi9QFk9GvnUJSv.png"/><dc:creator><![CDATA[Contributors from Around the World]]></dc:creator><pubDate>Wed, 30 Aug 2023 16:45:00 -0400</pubDate><enclosure url="https://dts.podtrac.com/redirect.mp3/podcasts.captivate.fm/media/60d45cc5-a154-4f1b-95ce-29d19f6b16be/2023-08-30-505-Episdoe-128-converted.mp3" length="8957601" type="audio/mpeg"/><itunes:duration>12:26</itunes:duration><itunes:explicit>false</itunes:explicit><itunes:episodeType>full</itunes:episodeType><itunes:season>1</itunes:season><itunes:episode>218</itunes:episode><itunes:season>1</itunes:season><podcast:episode>218</podcast:episode><podcast:season>1</podcast:season><itunes:author>Contributors from Around the World</itunes:author></item><item><title>Episode #127: Risks of Public Wi-Fi; 10 Tasks Slowing Down Security Professionals; Response to Surging Healthcare Cyberattacks; The &quot;Holy Grail&quot; of on-device AI</title><itunes:title>Episode #127: Risks of Public Wi-Fi; 10 Tasks Slowing Down Security Professionals; Response to Surging Healthcare Cyberattacks; The &quot;Holy Grail&quot; of on-device AI</itunes:title><description><![CDATA[<p>🎙️ Free, ungated access to all 200+ episodes of “It’s 5:05!” on your favorite podcast platforms: https://bit.ly/505-updates. ♻️ You’re welcome to 𝗿𝗲𝗽𝗼𝘀𝘁 if your followers will find this of value.</p><h3><strong>Risks of Public Wi-Fi</strong></h3><p><a href="https://505updates.com/edwinkwan/" rel="noopener noreferrer" target="_blank">🇦🇺 Edwin Kwan, Sydney, Australia ↗</a></p><p>The convenience of public Wi-Fi may come at a price, with attackers trying to steal sensitive information using approaches like Man-In-The-Middle attacks, eavesdropping, using rogue hotspots, spoofing, session hijacking, malware distribution, and login page phishing.</p><h3><strong>Part Two: 10 Tasks Slowing Down Security Professionals</strong></h3><p><a href="https://505updates.com/iangarrett/" rel="noopener noreferrer" target="_blank"><strong>🇺🇸 </strong>Ian Garrett, Arlington, Virginia ↗</a></p><p>Have you ever wondered what challenges security teams face due to budgetary and staffing constraints? Today's part two of a three-part series where we explore the 10 common tasks that often bog down cybersecurity professionals and discuss strategies employed by security leaders to overcome these hurdles.</p><h3><strong>Response to Surging Healthcare Cyberattacks</strong></h3><p><a href="http://505updates.com/hillarycoover/" rel="noopener noreferrer" target="_blank">🇺🇸 Hillary Coover, Washington, DC ↗</a></p><p> Curious about how innovators can help shield the US healthcare system from cyber threats? The Biden-Harris Administration's Advanced Research Projects Agency for Health is rolling out the Digital Health Security (DIGIHEALS) project and providing essential funding. </p><p><br></p><h3><strong>The "Holy Grail" of on-device AI</strong></h3><p><a href="https://505updates.com/katycraig/" rel="noopener noreferrer" target="_blank">🇺🇸 Katy Craig, San Diego, California ↗</a></p><p>Hold onto your smartphones because they're about to get a whole lot smarter.  Imagine your phone not just correcting your typos, but also generating personalized solutions based on your data, like driving patterns, restaurant searches, and more. Qualcomm is set to introduce generative AI into its next-gen premium chips.</p><h3><strong>This Day, August 29, in Tech History</strong></h3><p><a href="https://505updates.com/marcelbrown/" rel="noopener noreferrer" target="_blank"><strong>🇺🇸</strong> Marcel Brown, St. Louis, Missouri ↗</a></p><p>  August 29th, 1831. English scientist, Michael Faraday, discovers electromagnetic induction. Electromagnetic induction is the primary principle behind electric motors and electric generators, two very important inventions that power and drive our electronic technology of today.</p><p><br></p><p> From Sourced Network Productions in Washington, DC, it's 5:05. I'm Hillary Coover. Today is Tuesday, August 29th, 2023. Listen to the full story behind today's cybersecurity and open source headlines.</p><p><br></p>]]></description><content:encoded><![CDATA[<p>🎙️ Free, ungated access to all 200+ episodes of “It’s 5:05!” on your favorite podcast platforms: https://bit.ly/505-updates. ♻️ You’re welcome to 𝗿𝗲𝗽𝗼𝘀𝘁 if your followers will find this of value.</p><h3><strong>Risks of Public Wi-Fi</strong></h3><p><a href="https://505updates.com/edwinkwan/" rel="noopener noreferrer" target="_blank">🇦🇺 Edwin Kwan, Sydney, Australia ↗</a></p><p>The convenience of public Wi-Fi may come at a price, with attackers trying to steal sensitive information using approaches like Man-In-The-Middle attacks, eavesdropping, using rogue hotspots, spoofing, session hijacking, malware distribution, and login page phishing.</p><h3><strong>Part Two: 10 Tasks Slowing Down Security Professionals</strong></h3><p><a href="https://505updates.com/iangarrett/" rel="noopener noreferrer" target="_blank"><strong>🇺🇸 </strong>Ian Garrett, Arlington, Virginia ↗</a></p><p>Have you ever wondered what challenges security teams face due to budgetary and staffing constraints? Today's part two of a three-part series where we explore the 10 common tasks that often bog down cybersecurity professionals and discuss strategies employed by security leaders to overcome these hurdles.</p><h3><strong>Response to Surging Healthcare Cyberattacks</strong></h3><p><a href="http://505updates.com/hillarycoover/" rel="noopener noreferrer" target="_blank">🇺🇸 Hillary Coover, Washington, DC ↗</a></p><p> Curious about how innovators can help shield the US healthcare system from cyber threats? The Biden-Harris Administration's Advanced Research Projects Agency for Health is rolling out the Digital Health Security (DIGIHEALS) project and providing essential funding. </p><p><br></p><h3><strong>The "Holy Grail" of on-device AI</strong></h3><p><a href="https://505updates.com/katycraig/" rel="noopener noreferrer" target="_blank">🇺🇸 Katy Craig, San Diego, California ↗</a></p><p>Hold onto your smartphones because they're about to get a whole lot smarter.  Imagine your phone not just correcting your typos, but also generating personalized solutions based on your data, like driving patterns, restaurant searches, and more. Qualcomm is set to introduce generative AI into its next-gen premium chips.</p><h3><strong>This Day, August 29, in Tech History</strong></h3><p><a href="https://505updates.com/marcelbrown/" rel="noopener noreferrer" target="_blank"><strong>🇺🇸</strong> Marcel Brown, St. Louis, Missouri ↗</a></p><p>  August 29th, 1831. English scientist, Michael Faraday, discovers electromagnetic induction. Electromagnetic induction is the primary principle behind electric motors and electric generators, two very important inventions that power and drive our electronic technology of today.</p><p><br></p><p> From Sourced Network Productions in Washington, DC, it's 5:05. I'm Hillary Coover. Today is Tuesday, August 29th, 2023. Listen to the full story behind today's cybersecurity and open source headlines.</p><p><br></p>]]></content:encoded><link><![CDATA[https://3zozb9fxlbueipjyapmaas.captivate.fm/episode/episode-127-risks-of-public-wi-fi-10-tasks-slowing-down-security-professionals-response-to-surging-healthcare-cyberattacks-the-holy-grail-of-on-device-ai]]></link><guid isPermaLink="false">f1ae7975-a587-494d-a8ee-ebb7f5b310bd</guid><itunes:image href="https://artwork.captivate.fm/33e2a4e7-a936-4ef5-905a-3a72363cfbe4/BkhMbfQsRHQi9QFk9GvnUJSv.png"/><dc:creator><![CDATA[Contributors from Around the World]]></dc:creator><pubDate>Tue, 29 Aug 2023 16:45:00 -0400</pubDate><enclosure url="https://dts.podtrac.com/redirect.mp3/podcasts.captivate.fm/media/c5fe3309-7acf-4201-b69c-38e7e87a5a3f/505-2023-08-29-Tuesday-Episode-217-Final-converted.mp3" length="10731303" type="audio/mpeg"/><itunes:duration>11:11</itunes:duration><itunes:explicit>false</itunes:explicit><itunes:episodeType>full</itunes:episodeType><itunes:season>1</itunes:season><itunes:episode>217</itunes:episode><itunes:season>1</itunes:season><podcast:episode>217</podcast:episode><podcast:season>1</podcast:season><itunes:author>Contributors from Around the World</itunes:author></item><item><title>Episode #216: Medibank Data Breach May Reach $80M; Poland Railway Disrupted by $30 Hack; Cloud Account Takeovers on the Rise;</title><itunes:title>Episode #216: Medibank Data Breach May Reach $80M; Poland Railway Disrupted by $30 Hack; Cloud Account Takeovers on the Rise;</itunes:title><description><![CDATA[<p>🎙️ Free, ungated access to all 200+ episodes of “It’s 5:05!” on your favorite podcast platforms: https://bit.ly/505-updates. ♻️ You’re welcome to 𝗿𝗲𝗽𝗼𝘀𝘁 if your followers will find this of value.</p><h3><strong>Financial Effects of Medibank Data Breach May Reach $80M</strong></h3><p><a href="https://505updates.com/edwinkwan/" rel="noopener noreferrer" target="_blank">🇦🇺 Edwin Kwan, Sydney, Australia ↗</a></p><p>The 2022 data breach of Medibank is set to cost the health insurer $35 million in 2024.    The data breach had cost them $46.4 million in the 2022 to 2023 financial year.   They forecast that the total cost by next year could pass $80 million. </p><h3><strong>Poland Railway Disrupted by $30 Hack</strong></h3><p><a href="http://505updates.com/hillarycoover/" rel="noopener noreferrer" target="_blank">🇺🇸 Hillary Coover, Washington, DC ↗</a></p><p>Could a $30 radio hack bring a nation's railway system to a standstill? Saboteurs disrupted Poland's railway system by using a basic "radio-stop" command that could be transmitted with inexpensive equipment- costing around $30. </p><h3><strong>Cloud Account Takeovers on the Rise</strong></h3><p><a href="https://505updates.com/katycraig/" rel="noopener noreferrer" target="_blank">🇺🇸 Katy Craig, San Diego, California ↗</a></p><p> Cloud account takeover incidents have witnessed a sharp rise in recent times, The past six months have seen an astonishing 100% surge in successful breaches.  Paradoxically, despite the widespread adoption of MFA by organizations, instances of account takeovers have risen significantly. It's startling that nearly 35% of compromised users had MFA enabled. </p><h3><strong>This Day, August 27 and 28, in Tech History</strong></h3><p><a href="https://505updates.com/marcelbrown/" rel="noopener noreferrer" target="_blank"><strong>🇺🇸</strong> Marcel Brown, St. Louis, Missouri ↗</a></p><p>August 27th, 2003. The city of Fairbanks, Alaska connected to what was at the time the world's largest battery backup. Designed to help prevent serious blackouts that plagued the city every two to three years,  it was reported that in the first two years of operation, the battery system prevented at least 81 power failures.</p><p>-----------</p><p> From Sourced Network Productions in Washington, DC., It's 5:05. I'm Hillary Coover. Today is Monday, August 28th, 2023. Here's the full story behind today's cybersecurity and open source headlines... </p>]]></description><content:encoded><![CDATA[<p>🎙️ Free, ungated access to all 200+ episodes of “It’s 5:05!” on your favorite podcast platforms: https://bit.ly/505-updates. ♻️ You’re welcome to 𝗿𝗲𝗽𝗼𝘀𝘁 if your followers will find this of value.</p><h3><strong>Financial Effects of Medibank Data Breach May Reach $80M</strong></h3><p><a href="https://505updates.com/edwinkwan/" rel="noopener noreferrer" target="_blank">🇦🇺 Edwin Kwan, Sydney, Australia ↗</a></p><p>The 2022 data breach of Medibank is set to cost the health insurer $35 million in 2024.    The data breach had cost them $46.4 million in the 2022 to 2023 financial year.   They forecast that the total cost by next year could pass $80 million. </p><h3><strong>Poland Railway Disrupted by $30 Hack</strong></h3><p><a href="http://505updates.com/hillarycoover/" rel="noopener noreferrer" target="_blank">🇺🇸 Hillary Coover, Washington, DC ↗</a></p><p>Could a $30 radio hack bring a nation's railway system to a standstill? Saboteurs disrupted Poland's railway system by using a basic "radio-stop" command that could be transmitted with inexpensive equipment- costing around $30. </p><h3><strong>Cloud Account Takeovers on the Rise</strong></h3><p><a href="https://505updates.com/katycraig/" rel="noopener noreferrer" target="_blank">🇺🇸 Katy Craig, San Diego, California ↗</a></p><p> Cloud account takeover incidents have witnessed a sharp rise in recent times, The past six months have seen an astonishing 100% surge in successful breaches.  Paradoxically, despite the widespread adoption of MFA by organizations, instances of account takeovers have risen significantly. It's startling that nearly 35% of compromised users had MFA enabled. </p><h3><strong>This Day, August 27 and 28, in Tech History</strong></h3><p><a href="https://505updates.com/marcelbrown/" rel="noopener noreferrer" target="_blank"><strong>🇺🇸</strong> Marcel Brown, St. Louis, Missouri ↗</a></p><p>August 27th, 2003. The city of Fairbanks, Alaska connected to what was at the time the world's largest battery backup. Designed to help prevent serious blackouts that plagued the city every two to three years,  it was reported that in the first two years of operation, the battery system prevented at least 81 power failures.</p><p>-----------</p><p> From Sourced Network Productions in Washington, DC., It's 5:05. I'm Hillary Coover. Today is Monday, August 28th, 2023. Here's the full story behind today's cybersecurity and open source headlines... </p>]]></content:encoded><link><![CDATA[https://3zozb9fxlbueipjyapmaas.captivate.fm/episode/episode-216-medibank-data-breach-may-reach-80m-poland-railway-disrupted-by-30-hack-cloud-account-takeovers-on-the-rise-]]></link><guid isPermaLink="false">abc23093-9091-4901-b2a7-283a606123b2</guid><itunes:image href="https://artwork.captivate.fm/33e2a4e7-a936-4ef5-905a-3a72363cfbe4/BkhMbfQsRHQi9QFk9GvnUJSv.png"/><dc:creator><![CDATA[Contributors from Around the World]]></dc:creator><pubDate>Mon, 28 Aug 2023 16:45:00 -0400</pubDate><enclosure url="https://dts.podtrac.com/redirect.mp3/podcasts.captivate.fm/media/cf3e897e-c3b7-4dbb-adcf-20e39a62dd88/505-2023-08-28-Monday-Episode-216-Final-converted.mp3" length="9908340" type="audio/mpeg"/><itunes:duration>10:19</itunes:duration><itunes:explicit>false</itunes:explicit><itunes:episodeType>full</itunes:episodeType><itunes:season>1</itunes:season><itunes:episode>216</itunes:episode><itunes:season>1</itunes:season><podcast:episode>216</podcast:episode><podcast:season>1</podcast:season><itunes:author>Contributors from Around the World</itunes:author></item><item><title>Episode #215: Smart Bulb Vulnerabilities; No way to stop LLM adversaries; Security Lapse Reveals Locations of Artworks; Steve Jobs retires</title><itunes:title>Episode #215: Smart Bulb Vulnerabilities; No way to stop LLM adversaries; Security Lapse Reveals Locations of Artworks; Steve Jobs retires</itunes:title><description><![CDATA[<p>🎙️ Free, ungated access to all 200+ episodes of “It’s 5:05!” on your favorite podcast platforms: https://bit.ly/505-updates. ♻️ You’re welcome to 𝗿𝗲𝗽𝗼𝘀𝘁 if your followers will find this of value.</p><h3><strong>This Day, August 24, 25 and 26 in Tech History</strong></h3><p><a href="https://505updates.com/marcelbrown/" rel="noopener noreferrer" target="_blank"><strong>🇺🇸</strong> Marcel Brown, St. Louis, Missouri ↗</a></p><p>"I have always said if there ever came a day when I could no longer meet my duties and expectations as Apple's CEO, I would be the first to let you know. Unfortunately, that day has come." Steve Jobs, August 24th, 2011.</p><h3><strong>Smart Bulb Vulnerabilities Allow Homes to Be Hacked</strong></h3><p><a href="https://505updates.com/edwinkwan/" rel="noopener noreferrer" target="_blank">🇦🇺 Edwin Kwan, Sydney, Australia ↗</a></p><p>Researchers from universities in Italy and the UK have released a paper disclosing four vulnerabilities in a popular smart bulb . The vulnerabilities allow hackers to control other smart home devices and gain access to the wifi network.</p><h3><strong>There’s no way to stop LLM adversaries. None.</strong></h3><p><a href="https://505updates.com/markmiller/" rel="noopener noreferrer" target="_blank">🇺🇸 Mark Miller, New York City↗</a></p><p>From the research paper, " Universal and Transferable Adversarial Attacks on Aligned Language Models",  the research team at CMU describe how they created adversarial prompts for the public interfaces to ChatGPT, Bard, and Claude, as well as open source LLMs, such as LLaMA-2-Chat, Pythia, Falcon, and others.</p><h3><strong>Security Lapse Reveals Locations of Artworks</strong></h3><p><a href="https://505updates.com/katycraig/" rel="noopener noreferrer" target="_blank">🇺🇸 Katy Craig, San Diego, California ↗</a></p><p>On a recent Wednesday evening, a university professor in western Germany prepared paintings for auction at Christie's  . Using his iPhone, he snapped pictures of these artworks intending to upload them to Christie's website. As the images were uploaded, their GPS coordinates were unknowingly revealed to anyone who viewed them online. </p><h3><strong>Hillary Coover, Host of It's 5:05</strong></h3><p>From Sourced Network Productions in Washington, DC, it's 5:05. I'm Hillary Coover. Today is Friday, August 25th, 2023. Here's the full story behind today's cybersecurity and open source headlines.</p>]]></description><content:encoded><![CDATA[<p>🎙️ Free, ungated access to all 200+ episodes of “It’s 5:05!” on your favorite podcast platforms: https://bit.ly/505-updates. ♻️ You’re welcome to 𝗿𝗲𝗽𝗼𝘀𝘁 if your followers will find this of value.</p><h3><strong>This Day, August 24, 25 and 26 in Tech History</strong></h3><p><a href="https://505updates.com/marcelbrown/" rel="noopener noreferrer" target="_blank"><strong>🇺🇸</strong> Marcel Brown, St. Louis, Missouri ↗</a></p><p>"I have always said if there ever came a day when I could no longer meet my duties and expectations as Apple's CEO, I would be the first to let you know. Unfortunately, that day has come." Steve Jobs, August 24th, 2011.</p><h3><strong>Smart Bulb Vulnerabilities Allow Homes to Be Hacked</strong></h3><p><a href="https://505updates.com/edwinkwan/" rel="noopener noreferrer" target="_blank">🇦🇺 Edwin Kwan, Sydney, Australia ↗</a></p><p>Researchers from universities in Italy and the UK have released a paper disclosing four vulnerabilities in a popular smart bulb . The vulnerabilities allow hackers to control other smart home devices and gain access to the wifi network.</p><h3><strong>There’s no way to stop LLM adversaries. None.</strong></h3><p><a href="https://505updates.com/markmiller/" rel="noopener noreferrer" target="_blank">🇺🇸 Mark Miller, New York City↗</a></p><p>From the research paper, " Universal and Transferable Adversarial Attacks on Aligned Language Models",  the research team at CMU describe how they created adversarial prompts for the public interfaces to ChatGPT, Bard, and Claude, as well as open source LLMs, such as LLaMA-2-Chat, Pythia, Falcon, and others.</p><h3><strong>Security Lapse Reveals Locations of Artworks</strong></h3><p><a href="https://505updates.com/katycraig/" rel="noopener noreferrer" target="_blank">🇺🇸 Katy Craig, San Diego, California ↗</a></p><p>On a recent Wednesday evening, a university professor in western Germany prepared paintings for auction at Christie's  . Using his iPhone, he snapped pictures of these artworks intending to upload them to Christie's website. As the images were uploaded, their GPS coordinates were unknowingly revealed to anyone who viewed them online. </p><h3><strong>Hillary Coover, Host of It's 5:05</strong></h3><p>From Sourced Network Productions in Washington, DC, it's 5:05. I'm Hillary Coover. Today is Friday, August 25th, 2023. Here's the full story behind today's cybersecurity and open source headlines.</p>]]></content:encoded><link><![CDATA[https://3zozb9fxlbueipjyapmaas.captivate.fm/episode/episode-215-smart-bulb-vulnerabilities-no-way-to-stop-llm-adversaries-security-lapse-reveals-locations-of-artworks-steve-jobs-retires]]></link><guid isPermaLink="false">2142502e-4536-4991-8a66-1b39cf19cdf9</guid><itunes:image href="https://artwork.captivate.fm/33e2a4e7-a936-4ef5-905a-3a72363cfbe4/BkhMbfQsRHQi9QFk9GvnUJSv.png"/><dc:creator><![CDATA[Contributors from Around the World]]></dc:creator><pubDate>Fri, 25 Aug 2023 16:45:00 -0400</pubDate><enclosure url="https://dts.podtrac.com/redirect.mp3/podcasts.captivate.fm/media/5604c5b4-b114-42bb-840d-2c825da1ac0d/505-2023-08-25-Friday-Episode-215-Final-converted.mp3" length="9810537" type="audio/mpeg"/><itunes:duration>10:13</itunes:duration><itunes:explicit>false</itunes:explicit><itunes:episodeType>full</itunes:episodeType><itunes:season>1</itunes:season><itunes:episode>215</itunes:episode><itunes:season>1</itunes:season><podcast:episode>215</podcast:episode><podcast:season>1</podcast:season><itunes:author>Contributors from Around the World</itunes:author></item><item><title>Episode #214: Drama at Terraform: Just fork it!; Is YouTube Targeting Your Kids? ; Australian Charities Suffer Data Breach; 10 Tasks Slowing Down Security Professionals;</title><itunes:title>Episode #214: Drama at Terraform: Just fork it!; Is YouTube Targeting Your Kids? ; Australian Charities Suffer Data Breach; 10 Tasks Slowing Down Security Professionals;</itunes:title><description><![CDATA[<p>🎙️ Free, ungated access to all 200+ episodes of “It’s 5:05!” on your favorite podcast platforms: https://bit.ly/505-updates. ♻️ You’re welcome to 𝗿𝗲𝗽𝗼𝘀𝘁 if your followers will find this of value.</p><h1>HEADLINES FROM TODAY'S UPDATES</h1><h2>Marcel Brown: This Day in Tech History</h2><p> August 24th, 1993. Perhaps the most famous lawsuit in technology history is decided for Microsoft. Apple claimed that Microsoft's Windows violated their copyrights on the so-called visual displays of the Macintosh. The judge in the case ruled that most of the claims were covered by a 1985 licensing agreement. </p><h2>Edwin Kwan: Australian Charities Suffer Data Breach</h2><p>Thousands of donors to Australian charities have had their personal information stolen after a telemarketing company suffered a data breach. The stolen data has been published  and  includes full names, date of births, addresses, email addresses, and phone numbers. </p><h2>Ian Garrett: Part One - 10 Tasks Slowing Down Security Professionals</h2><p>Have you ever wondered what challenges security teams face due to budgetary and staffing constraints? Today is part one of a three part series where we explore the 10 common tasks that often bog down cybersecurity professionals and discuss strategies employed by security leaders to overcome these hurdles.</p><h2>Katy Craig: Drama at Terraform...Just fork it!</h2><p>After nearly nine years under the Mozilla public license MPL version 2.0, Terraform has transitioned to the business source license BSL version 1.1, a non-open source license. For dedicated supporters of open source principles, the business source license doesn't align well with their values. </p><h2>Hillary Coover: Is YouTube Targeting Your Kids? Of course they are!</h2><p>A recent report highlights concerns over YouTube's advertising practices on children's channels, potentially leading to the tracking of children's online activities. A Canadian bank's ad campaign illustrates how ads meant for adults ended up on a children's video resulting in viewers being tracked by various tech companies.</p><h2>Mark Miller, Executive Producer</h2><p>From Sourced Network Productions in New York City, It's 5:05. I'm Mark Miller, standing in this week for Hillary Coover. Today is Thursday, August 24th, 2023. Here's the full story behind today's cybersecurity and open source headlines...</p>]]></description><content:encoded><![CDATA[<p>🎙️ Free, ungated access to all 200+ episodes of “It’s 5:05!” on your favorite podcast platforms: https://bit.ly/505-updates. ♻️ You’re welcome to 𝗿𝗲𝗽𝗼𝘀𝘁 if your followers will find this of value.</p><h1>HEADLINES FROM TODAY'S UPDATES</h1><h2>Marcel Brown: This Day in Tech History</h2><p> August 24th, 1993. Perhaps the most famous lawsuit in technology history is decided for Microsoft. Apple claimed that Microsoft's Windows violated their copyrights on the so-called visual displays of the Macintosh. The judge in the case ruled that most of the claims were covered by a 1985 licensing agreement. </p><h2>Edwin Kwan: Australian Charities Suffer Data Breach</h2><p>Thousands of donors to Australian charities have had their personal information stolen after a telemarketing company suffered a data breach. The stolen data has been published  and  includes full names, date of births, addresses, email addresses, and phone numbers. </p><h2>Ian Garrett: Part One - 10 Tasks Slowing Down Security Professionals</h2><p>Have you ever wondered what challenges security teams face due to budgetary and staffing constraints? Today is part one of a three part series where we explore the 10 common tasks that often bog down cybersecurity professionals and discuss strategies employed by security leaders to overcome these hurdles.</p><h2>Katy Craig: Drama at Terraform...Just fork it!</h2><p>After nearly nine years under the Mozilla public license MPL version 2.0, Terraform has transitioned to the business source license BSL version 1.1, a non-open source license. For dedicated supporters of open source principles, the business source license doesn't align well with their values. </p><h2>Hillary Coover: Is YouTube Targeting Your Kids? Of course they are!</h2><p>A recent report highlights concerns over YouTube's advertising practices on children's channels, potentially leading to the tracking of children's online activities. A Canadian bank's ad campaign illustrates how ads meant for adults ended up on a children's video resulting in viewers being tracked by various tech companies.</p><h2>Mark Miller, Executive Producer</h2><p>From Sourced Network Productions in New York City, It's 5:05. I'm Mark Miller, standing in this week for Hillary Coover. Today is Thursday, August 24th, 2023. Here's the full story behind today's cybersecurity and open source headlines...</p>]]></content:encoded><link><![CDATA[https://3zozb9fxlbueipjyapmaas.captivate.fm/episode/episode-214-drama-at-terraform-just-fork-it-is-youtube-targeting-your-kids-australian-charities-suffer-data-breach-10-tasks-slowing-down-security-professionals-]]></link><guid isPermaLink="false">663259ba-edb8-4795-9237-e3ac2fff0af8</guid><itunes:image href="https://artwork.captivate.fm/33e2a4e7-a936-4ef5-905a-3a72363cfbe4/BkhMbfQsRHQi9QFk9GvnUJSv.png"/><dc:creator><![CDATA[Contributors from Around the World]]></dc:creator><pubDate>Thu, 24 Aug 2023 16:45:00 -0400</pubDate><enclosure url="https://dts.podtrac.com/redirect.mp3/podcasts.captivate.fm/media/0c5ddf32-2f26-419f-a6c2-62b9ba28f1fc/505-2023-08-24-Thursday-Episode-214-Final-converted.mp3" length="13090265" type="audio/mpeg"/><itunes:duration>13:38</itunes:duration><itunes:explicit>false</itunes:explicit><itunes:episodeType>full</itunes:episodeType><itunes:season>1</itunes:season><itunes:episode>214</itunes:episode><itunes:season>1</itunes:season><podcast:episode>214</podcast:episode><podcast:season>1</podcast:season><itunes:author>Contributors from Around the World</itunes:author></item><item><title>Episode #213: Remote Code Execution Vulnerability;Remember Cold Fusion?  So do Adversaries; Binding Operational  Directive 22-01; Live Facial Recognition;</title><itunes:title>Episode #213: Remote Code Execution Vulnerability;Remember Cold Fusion?  So do Adversaries; Binding Operational  Directive 22-01; Live Facial Recognition;</itunes:title><description><![CDATA[<p>🎙️ Free, ungated access to all 200+ episodes of “It’s 5:05!” on your favorite podcast platforms: https://bit.ly/505-updates. ♻️ You’re welcome to 𝗿𝗲𝗽𝗼𝘀𝘁 if your followers will find this of value.</p><h1>Today's Headlines</h1><h2><strong>Edwin Kwan</strong>: Remote Code Execution Vulnerability in Popular Windows Software</h2><p>A popular Windows file archive and compression tool has a high-severity zero-day vulnerability that could allow attackers to gain control of your computer. A specially-crafted RAR file, when open, could give remote attackers the ability to conduct remote code execution on the target system.</p><h2><strong>Katy Craig</strong>:  Binding Operational Directive 22-01</h2><p>Today we dive into the realm of cybersecurity that unfolded some time ago. It’s with concern that we must address the actions of certain malicious actors who seek to exploit vulnerabilities in our digital infrastructure.</p><h2><strong>Olimpiu Pop</strong>: Remember Cold Fusion? So do Hackers</h2><p> Not long ago Adobe disclosed three vulnerabilities, each of them with a various degree of criticality from high to very critical. The 120,000 small- to medium-sized organizations from the US that still use it might be more vulnerable than bigger companies with bigger paychecks.</p><h2><strong>Hillary Coover</strong>: Live Facial Recognition Facing Scrutiny in UK</h2><p>Live Facial Recognition (LFR) technology is ” facing” scrutiny in the UK as police forces conduct trials. As facial recognition technology strides forward, so does the dialogue on its responsible integration.</p>]]></description><content:encoded><![CDATA[<p>🎙️ Free, ungated access to all 200+ episodes of “It’s 5:05!” on your favorite podcast platforms: https://bit.ly/505-updates. ♻️ You’re welcome to 𝗿𝗲𝗽𝗼𝘀𝘁 if your followers will find this of value.</p><h1>Today's Headlines</h1><h2><strong>Edwin Kwan</strong>: Remote Code Execution Vulnerability in Popular Windows Software</h2><p>A popular Windows file archive and compression tool has a high-severity zero-day vulnerability that could allow attackers to gain control of your computer. A specially-crafted RAR file, when open, could give remote attackers the ability to conduct remote code execution on the target system.</p><h2><strong>Katy Craig</strong>:  Binding Operational Directive 22-01</h2><p>Today we dive into the realm of cybersecurity that unfolded some time ago. It’s with concern that we must address the actions of certain malicious actors who seek to exploit vulnerabilities in our digital infrastructure.</p><h2><strong>Olimpiu Pop</strong>: Remember Cold Fusion? So do Hackers</h2><p> Not long ago Adobe disclosed three vulnerabilities, each of them with a various degree of criticality from high to very critical. The 120,000 small- to medium-sized organizations from the US that still use it might be more vulnerable than bigger companies with bigger paychecks.</p><h2><strong>Hillary Coover</strong>: Live Facial Recognition Facing Scrutiny in UK</h2><p>Live Facial Recognition (LFR) technology is ” facing” scrutiny in the UK as police forces conduct trials. As facial recognition technology strides forward, so does the dialogue on its responsible integration.</p>]]></content:encoded><link><![CDATA[https://3zozb9fxlbueipjyapmaas.captivate.fm/episode/episode-213-remote-code-execution-vulnerability-remember-cold-fusion-so-do-adversaries-binding-operational-directive-22-01-live-facial-recognition-]]></link><guid isPermaLink="false">b823162a-ba1a-4280-b746-51207fa34f38</guid><itunes:image href="https://artwork.captivate.fm/33e2a4e7-a936-4ef5-905a-3a72363cfbe4/BkhMbfQsRHQi9QFk9GvnUJSv.png"/><dc:creator><![CDATA[Contributors from Around the World]]></dc:creator><pubDate>Wed, 23 Aug 2023 16:45:00 -0400</pubDate><enclosure url="https://dts.podtrac.com/redirect.mp3/podcasts.captivate.fm/media/b51d468f-bcdd-45a2-ad74-8d79a9058645/505-2023-08-22-Wednesday-Episode-213-Final-converted.mp3" length="9390909" type="audio/mpeg"/><itunes:duration>09:47</itunes:duration><itunes:explicit>false</itunes:explicit><itunes:episodeType>full</itunes:episodeType><itunes:season>1</itunes:season><itunes:episode>213</itunes:episode><itunes:season>1</itunes:season><podcast:episode>213</podcast:episode><podcast:season>1</podcast:season><itunes:author>Contributors from Around the World</itunes:author></item><item><title>Episode #122: Australian Infrastructure Suffers Data Breach; Generative AI is Biggest CyberThreat; Ad Agency Exploits Data Dominance; Amazon&apos;s Google Ad Dives into Microsoft Scam</title><itunes:title>Episode #122: Australian Infrastructure Suffers Data Breach; Generative AI is Biggest CyberThreat; Ad Agency Exploits Data Dominance; Amazon&apos;s Google Ad Dives into Microsoft Scam</itunes:title><description><![CDATA[<p>🎙️ Free, ungated access to all 200+ episodes of “It’s 5:05!” on your favorite podcast platforms: https://bit.ly/505-updates. ♻️ You’re welcome to 𝗿𝗲𝗽𝗼𝘀𝘁 if your followers will find this of value.</p><h3><strong>Australian Critical Infrastructure Suffers Data Breach</strong></h3><p><a href="https://505updates.com/edwinkwan/" rel="noopener noreferrer" target="_blank">🇦🇺 Edwin Kwan, Sydney, Australia ↗</a></p><p>AUDA might have suffered a data breach. The hackers claim to have access to 15 gigabytes of data, which includes powers of attorney and legal documents, passport information, personal data, medical records, loan repayment information, death certificates, and customer bank account details.</p><h3><strong>Mandiant: Generative AI is Biggest CyberThreat</strong></h3><p><a href="https://505updates.com/katycraig/" rel="noopener noreferrer" target="_blank">🇺🇸 Katy Craig, San Diego, California ↗</a></p><p>Mandiant found that threat actors are eyeing AI and they're not just twiddling their thumbs. Social engineering cases might have seen the lowest AI usage, but when it comes to spreading disinformation using AI generated imagery and video, the game changes.</p><h3><strong>Goliath Ad Agency Exploits Data Dominance in Bid to Undermine California Privacy Bill</strong></h3><p><a href="http://505updates.com/hillarycoover/" rel="noopener noreferrer" target="_blank">🇺🇸 Hillary Coover, Washington, DC ↗</a></p><p>The Interpublic Group, IPG, one of the world's largest advertising firms, is orchestrating a campaign to counter a California bill known as SB-362 or the Delete Act. Emails obtained by Politico reveal that IPG is actively coordinating efforts against the bill. </p><h3><strong>Amazon's Google Ad Dives into Microsoft Scam</strong></h3><p><a href="https://505updates.com/iangarrett/" rel="noopener noreferrer" target="_blank"><strong>🇺🇸 </strong>Ian Garrett, Arlington, Virginia ↗</a></p><p>A recent attack impersonates Amazon and Microsoft, while leveraging Google ads to scam unsuspecting users. Today's sneaky tactic and elaborate scheme acts as a legitimate looking Amazon ad in Google search results that takes an unexpected twist by leading unsuspecting users into a Microsoft support scam. </p><h3><strong>This Day, August 22, in Tech History</strong></h3><p><a href="https://505updates.com/marcelbrown/" rel="noopener noreferrer" target="_blank"><strong>🇺🇸</strong> Marcel Brown, St. Louis, Missouri ↗</a></p><p>August 22nd, 1987. The Legend of Zelda is released for the NES in North America. Considered one of the most influential games of all time, it was the forerunner of the role-playing video game genre and spawned one of the most successful series in video game history. </p>]]></description><content:encoded><![CDATA[<p>🎙️ Free, ungated access to all 200+ episodes of “It’s 5:05!” on your favorite podcast platforms: https://bit.ly/505-updates. ♻️ You’re welcome to 𝗿𝗲𝗽𝗼𝘀𝘁 if your followers will find this of value.</p><h3><strong>Australian Critical Infrastructure Suffers Data Breach</strong></h3><p><a href="https://505updates.com/edwinkwan/" rel="noopener noreferrer" target="_blank">🇦🇺 Edwin Kwan, Sydney, Australia ↗</a></p><p>AUDA might have suffered a data breach. The hackers claim to have access to 15 gigabytes of data, which includes powers of attorney and legal documents, passport information, personal data, medical records, loan repayment information, death certificates, and customer bank account details.</p><h3><strong>Mandiant: Generative AI is Biggest CyberThreat</strong></h3><p><a href="https://505updates.com/katycraig/" rel="noopener noreferrer" target="_blank">🇺🇸 Katy Craig, San Diego, California ↗</a></p><p>Mandiant found that threat actors are eyeing AI and they're not just twiddling their thumbs. Social engineering cases might have seen the lowest AI usage, but when it comes to spreading disinformation using AI generated imagery and video, the game changes.</p><h3><strong>Goliath Ad Agency Exploits Data Dominance in Bid to Undermine California Privacy Bill</strong></h3><p><a href="http://505updates.com/hillarycoover/" rel="noopener noreferrer" target="_blank">🇺🇸 Hillary Coover, Washington, DC ↗</a></p><p>The Interpublic Group, IPG, one of the world's largest advertising firms, is orchestrating a campaign to counter a California bill known as SB-362 or the Delete Act. Emails obtained by Politico reveal that IPG is actively coordinating efforts against the bill. </p><h3><strong>Amazon's Google Ad Dives into Microsoft Scam</strong></h3><p><a href="https://505updates.com/iangarrett/" rel="noopener noreferrer" target="_blank"><strong>🇺🇸 </strong>Ian Garrett, Arlington, Virginia ↗</a></p><p>A recent attack impersonates Amazon and Microsoft, while leveraging Google ads to scam unsuspecting users. Today's sneaky tactic and elaborate scheme acts as a legitimate looking Amazon ad in Google search results that takes an unexpected twist by leading unsuspecting users into a Microsoft support scam. </p><h3><strong>This Day, August 22, in Tech History</strong></h3><p><a href="https://505updates.com/marcelbrown/" rel="noopener noreferrer" target="_blank"><strong>🇺🇸</strong> Marcel Brown, St. Louis, Missouri ↗</a></p><p>August 22nd, 1987. The Legend of Zelda is released for the NES in North America. Considered one of the most influential games of all time, it was the forerunner of the role-playing video game genre and spawned one of the most successful series in video game history. </p>]]></content:encoded><link><![CDATA[https://3zozb9fxlbueipjyapmaas.captivate.fm/episode/episode-122-australian-infrastructure-suffers-data-breach-generative-ai-is-biggest-cyberthreat-ad-agency-exploits-data-dominance-amazons-google-ad-dives-into-microsoft-scam]]></link><guid isPermaLink="false">7a83036c-4a74-4937-9777-b2baf0e1d8d6</guid><itunes:image href="https://artwork.captivate.fm/33e2a4e7-a936-4ef5-905a-3a72363cfbe4/BkhMbfQsRHQi9QFk9GvnUJSv.png"/><dc:creator><![CDATA[Contributors from Around the World]]></dc:creator><pubDate>Tue, 22 Aug 2023 16:45:00 -0400</pubDate><enclosure url="https://dts.podtrac.com/redirect.mp3/podcasts.captivate.fm/media/cffb37fb-ff96-40c6-ae05-721b20109c68/505-2023-08-22-Tuesday-Episode-212-Final-converted.mp3" length="11685921" type="audio/mpeg"/><itunes:duration>12:10</itunes:duration><itunes:explicit>false</itunes:explicit><itunes:episodeType>full</itunes:episodeType><itunes:season>1</itunes:season><itunes:episode>212</itunes:episode><itunes:season>1</itunes:season><podcast:episode>212</podcast:episode><podcast:season>1</podcast:season><itunes:author>Contributors from Around the World</itunes:author></item><item><title>Episode #211: Chrome to Get Quantum Resistant Encryption; Google’s AI Life Coach; Navigating Vulnerabilities Amid Rising China-US Tensions;</title><itunes:title>Episode #211: Chrome to Get Quantum Resistant Encryption; Google’s AI Life Coach; Navigating Vulnerabilities Amid Rising China-US Tensions;</itunes:title><description><![CDATA[<p>Full episode available on your favorite podcast platform: <a href="https://bit.ly/505-updates" rel="noopener noreferrer" target="_blank">https://bit.ly/505-updates</a> 📌</p><p>From Sourced Network Productions in Washington, DC, it's 5:05. I'm Hillary Coover. Today is Monday, August 21st, 2023. Here's the full story behind today's cyber security and open source headlines  </p><h3><strong>Chrome to Get Quantum Resistant Encryption and Other Security Features</strong></h3><p><a href="https://505updates.com/edwinkwan/" rel="noopener noreferrer" target="_blank">🇦🇺 Edwin Kwan, Sydney, Australia ↗</a></p><p>Google has announced plans for three new security features in upcoming versions of the Chrome web browser. These three security features are expected to be available by mid-September 2023.</p><h3><strong>Google’s AI Life Coach</strong></h3><p><a href="https://505updates.com/katycraig/" rel="noopener noreferrer" target="_blank">🇺🇸 Katy Craig, San Diego, California ↗</a></p><p>Picture this: AI, the latest tech darling, is now on a mission to guide you through life's twists and turns. The goal? To make AI not just smart, but also your trusted confidant and advisor. </p><h3><strong>Tech's Tightrope: Navigating Vulnerabilities Amid Rising China-US Tensions</strong></h3><p><a href="http://505updates.com/hillarycoover/" rel="noopener noreferrer" target="_blank">🇺🇸 Hillary Coover, Washington, DC ↗</a></p><p>The growing tensions between US and China in the tech sector could expose vulnerabilities in the coming years. The recent executive order bans US investments in Chinese firms working on advanced semiconductors and quantum computers.  </p><h3><strong>This Day, August 21, in Tech History</strong></h3><p><a href="https://505updates.com/marcelbrown/" rel="noopener noreferrer" target="_blank"><strong>🇺🇸</strong> Marcel Brown, St. Louis, Missouri ↗</a></p><p>August 21st, 1993. NASA loses contact with the Mars Observer spacecraft, three days before it was to enter into orbit around Mars. The reason for the loss of contact was never definitively determined, but the most probable cause was a rupture of a fuel tank.   </p>]]></description><content:encoded><![CDATA[<p>Full episode available on your favorite podcast platform: <a href="https://bit.ly/505-updates" rel="noopener noreferrer" target="_blank">https://bit.ly/505-updates</a> 📌</p><p>From Sourced Network Productions in Washington, DC, it's 5:05. I'm Hillary Coover. Today is Monday, August 21st, 2023. Here's the full story behind today's cyber security and open source headlines  </p><h3><strong>Chrome to Get Quantum Resistant Encryption and Other Security Features</strong></h3><p><a href="https://505updates.com/edwinkwan/" rel="noopener noreferrer" target="_blank">🇦🇺 Edwin Kwan, Sydney, Australia ↗</a></p><p>Google has announced plans for three new security features in upcoming versions of the Chrome web browser. These three security features are expected to be available by mid-September 2023.</p><h3><strong>Google’s AI Life Coach</strong></h3><p><a href="https://505updates.com/katycraig/" rel="noopener noreferrer" target="_blank">🇺🇸 Katy Craig, San Diego, California ↗</a></p><p>Picture this: AI, the latest tech darling, is now on a mission to guide you through life's twists and turns. The goal? To make AI not just smart, but also your trusted confidant and advisor. </p><h3><strong>Tech's Tightrope: Navigating Vulnerabilities Amid Rising China-US Tensions</strong></h3><p><a href="http://505updates.com/hillarycoover/" rel="noopener noreferrer" target="_blank">🇺🇸 Hillary Coover, Washington, DC ↗</a></p><p>The growing tensions between US and China in the tech sector could expose vulnerabilities in the coming years. The recent executive order bans US investments in Chinese firms working on advanced semiconductors and quantum computers.  </p><h3><strong>This Day, August 21, in Tech History</strong></h3><p><a href="https://505updates.com/marcelbrown/" rel="noopener noreferrer" target="_blank"><strong>🇺🇸</strong> Marcel Brown, St. Louis, Missouri ↗</a></p><p>August 21st, 1993. NASA loses contact with the Mars Observer spacecraft, three days before it was to enter into orbit around Mars. The reason for the loss of contact was never definitively determined, but the most probable cause was a rupture of a fuel tank.   </p>]]></content:encoded><link><![CDATA[https://3zozb9fxlbueipjyapmaas.captivate.fm/episode/episode-211-chrome-to-get-quantum-resistant-encryption-googles-ai-life-coach-navigating-vulnerabilities-amid-rising-china-us-tensions-]]></link><guid isPermaLink="false">e15194c4-8f3c-433c-a156-1e5264478e27</guid><itunes:image href="https://artwork.captivate.fm/33e2a4e7-a936-4ef5-905a-3a72363cfbe4/BkhMbfQsRHQi9QFk9GvnUJSv.png"/><dc:creator><![CDATA[Contributors from Around the World]]></dc:creator><pubDate>Mon, 21 Aug 2023 16:45:00 -0400</pubDate><enclosure url="https://dts.podtrac.com/redirect.mp3/podcasts.captivate.fm/media/7e7bb804-ddc6-4857-a6c0-06c1fd1e58b2/505-2023-08-23-Monday-Episode-211-Final-converted.mp3" length="8129088" type="audio/mpeg"/><itunes:duration>08:28</itunes:duration><itunes:explicit>false</itunes:explicit><itunes:episodeType>full</itunes:episodeType><itunes:season>1</itunes:season><itunes:episode>211</itunes:episode><itunes:season>1</itunes:season><podcast:episode>211</podcast:episode><podcast:season>1</podcast:season><itunes:author>Contributors from Around the World</itunes:author></item><item><title>Episode #210: LinkedIn Account Takeover Campaign; Amazon&apos;s palm-scanning tech - an entire universe of possibilities?; CRA: Save Open Source!;Cyber Resiliency Act: Impacts on Open Source; CRA: Why You Should Care</title><itunes:title>Episode #210: LinkedIn Account Takeover Campaign; Amazon&apos;s palm-scanning tech - an entire universe of possibilities?; CRA: Save Open Source!;Cyber Resiliency Act: Impacts on Open Source; CRA: Why You Should Care</itunes:title><description><![CDATA[<p>🎙️ Free access to “It’s 5:05!” on your favorite podcast platforms: bit.ly/505-updates 📌</p><h3><strong>LinkedIn Account Takeover Campaign</strong></h3><p><a href="https://505updates.com/edwinkwan/" rel="noopener noreferrer" target="_blank">🇦🇺 Edwin Kwan, Sydney, Australia ↗</a></p><p>Security Research Company, Cyberint, has observed an ongoing and successful hacking campaign targeting LinkedIn accounts. This has resulted in victims being pressured into paying to regain control of their account or facing permanent deletion. </p><h3><strong>Can Amazon's palm-scanning tech unlock an entire universe of identity possibilities?</strong></h3><p><a href="http://505updates.com/hillarycoover/" rel="noopener noreferrer" target="_blank">🇺🇸 Hillary Coover, Washington, DC ↗</a></p><p>Can Amazon's palm scanning tech unlock an entire universe of identity possibilities? By the end of this year, Amazon's biometric technology, known as Amazon One, will enable you to scan your palm at over 500 locations for payments and access. </p><h3><br></h3><h3><strong>This Day, August 18, in Tech History</strong></h3><p><a href="https://505updates.com/marcelbrown/" rel="noopener noreferrer" target="_blank"><strong>🇺🇸</strong> Marcel Brown, St. Louis, Missouri ↗</a></p><p>August 19th, 2004. Google holds its Initial Public Offering, selling over 22 million shares at a starting price of $85. Google shares closed that day at $100.34, and the IPO created many instant millionaires and a few billionaires.&nbsp;</p><p><br></p><p><strong><em>From host Hillary Coover</em></strong><em>: It's 'Point of View Friday' where our team of journalists give us their take on one of the week's most important stories. Today, Trac Bannon, Olimpiu Pop and Katy Craig will explore Evaluating the Proposed Cyber Resilience Act, and how it could affect the open source community.</em></p><p><em><span class="ql-cursor">﻿</span></em></p><h3><strong>Cyber Resiliency Act: Impacts on Open Source</strong></h3><p><a href="https://505updates.com/tracbannon/" rel="noopener noreferrer" target="_blank"><strong>🇺🇸</strong> Tracy (Trac) Bannon, Camp Hill, Pennsylvania↗</a></p><p>The concept of crowdsourcing software development seems solid and altruistic at the surface. When open source is leveraged by for-profit corporations and commercial entities, who bears the burden for cyber resiliency?</p><p><br></p><h3><strong>Cyber Resiliency Act: Save Open Source!</strong></h3><p><a href="https://505updates.com/katycraig/" rel="noopener noreferrer" target="_blank">🇺🇸 Katy Craig, San Diego, California ↗</a></p><p>The European Union is currently advancing the Cyber Resilience Act (CRA). As the Act advances, it's critical for the open source community to engage with policymakers to strike a balance between security measures and the principles that underpin open source collaboration.</p><p><br></p><h3><strong>Cyber Resiliency Act: Why You Should Care</strong></h3><p><a href="http://505updates.com/olimpiupop/" rel="noopener noreferrer" target="_blank">🇷🇴 Olimpiu Pop, Transylvania, Romania ↗</a></p><p>Open source software is today's boiler waiting to explode. Why do we care? Because we understand that open source, it's so much more than some library for geeks to play in their free time. Because we understand that modern society relies on it, and part of most advancements are partly due to open source.</p><p><br></p><p><br></p>]]></description><content:encoded><![CDATA[<p>🎙️ Free access to “It’s 5:05!” on your favorite podcast platforms: bit.ly/505-updates 📌</p><h3><strong>LinkedIn Account Takeover Campaign</strong></h3><p><a href="https://505updates.com/edwinkwan/" rel="noopener noreferrer" target="_blank">🇦🇺 Edwin Kwan, Sydney, Australia ↗</a></p><p>Security Research Company, Cyberint, has observed an ongoing and successful hacking campaign targeting LinkedIn accounts. This has resulted in victims being pressured into paying to regain control of their account or facing permanent deletion. </p><h3><strong>Can Amazon's palm-scanning tech unlock an entire universe of identity possibilities?</strong></h3><p><a href="http://505updates.com/hillarycoover/" rel="noopener noreferrer" target="_blank">🇺🇸 Hillary Coover, Washington, DC ↗</a></p><p>Can Amazon's palm scanning tech unlock an entire universe of identity possibilities? By the end of this year, Amazon's biometric technology, known as Amazon One, will enable you to scan your palm at over 500 locations for payments and access. </p><h3><br></h3><h3><strong>This Day, August 18, in Tech History</strong></h3><p><a href="https://505updates.com/marcelbrown/" rel="noopener noreferrer" target="_blank"><strong>🇺🇸</strong> Marcel Brown, St. Louis, Missouri ↗</a></p><p>August 19th, 2004. Google holds its Initial Public Offering, selling over 22 million shares at a starting price of $85. Google shares closed that day at $100.34, and the IPO created many instant millionaires and a few billionaires.&nbsp;</p><p><br></p><p><strong><em>From host Hillary Coover</em></strong><em>: It's 'Point of View Friday' where our team of journalists give us their take on one of the week's most important stories. Today, Trac Bannon, Olimpiu Pop and Katy Craig will explore Evaluating the Proposed Cyber Resilience Act, and how it could affect the open source community.</em></p><p><em><span class="ql-cursor">﻿</span></em></p><h3><strong>Cyber Resiliency Act: Impacts on Open Source</strong></h3><p><a href="https://505updates.com/tracbannon/" rel="noopener noreferrer" target="_blank"><strong>🇺🇸</strong> Tracy (Trac) Bannon, Camp Hill, Pennsylvania↗</a></p><p>The concept of crowdsourcing software development seems solid and altruistic at the surface. When open source is leveraged by for-profit corporations and commercial entities, who bears the burden for cyber resiliency?</p><p><br></p><h3><strong>Cyber Resiliency Act: Save Open Source!</strong></h3><p><a href="https://505updates.com/katycraig/" rel="noopener noreferrer" target="_blank">🇺🇸 Katy Craig, San Diego, California ↗</a></p><p>The European Union is currently advancing the Cyber Resilience Act (CRA). As the Act advances, it's critical for the open source community to engage with policymakers to strike a balance between security measures and the principles that underpin open source collaboration.</p><p><br></p><h3><strong>Cyber Resiliency Act: Why You Should Care</strong></h3><p><a href="http://505updates.com/olimpiupop/" rel="noopener noreferrer" target="_blank">🇷🇴 Olimpiu Pop, Transylvania, Romania ↗</a></p><p>Open source software is today's boiler waiting to explode. Why do we care? Because we understand that open source, it's so much more than some library for geeks to play in their free time. Because we understand that modern society relies on it, and part of most advancements are partly due to open source.</p><p><br></p><p><br></p>]]></content:encoded><link><![CDATA[https://3zozb9fxlbueipjyapmaas.captivate.fm/episode/episode-210-linkedin-account-takeover-campaign-amazons-palm-scanning-tech-an-entire-universe-of-possibilities-cra-save-open-source-cyber-resiliency-act-impacts-on-open-source-cra-why-you-should-care]]></link><guid isPermaLink="false">c43f4d95-7b52-4e27-8671-a9032b237108</guid><itunes:image href="https://artwork.captivate.fm/33e2a4e7-a936-4ef5-905a-3a72363cfbe4/BkhMbfQsRHQi9QFk9GvnUJSv.png"/><dc:creator><![CDATA[Contributors from Around the World]]></dc:creator><pubDate>Fri, 18 Aug 2023 16:45:00 -0400</pubDate><enclosure url="https://dts.podtrac.com/redirect.mp3/podcasts.captivate.fm/media/291266e2-63dd-4807-bef4-ed60629cd2d4/505-2023-08-18-Friday-Episode-210-Final-converted.mp3" length="13862652" type="audio/mpeg"/><itunes:duration>14:26</itunes:duration><itunes:explicit>false</itunes:explicit><itunes:episodeType>full</itunes:episodeType><itunes:season>1</itunes:season><itunes:episode>210</itunes:episode><itunes:season>1</itunes:season><podcast:episode>210</podcast:episode><podcast:season>1</podcast:season><itunes:author>Contributors from Around the World</itunes:author></item><item><title>Episode #209: Cybercrime Forums Selling Personal Information of Hackers; Follow up to AI Red Team Hacking at Defcon; Zero-day in File Transfer Software Leaves Health Data Exposed;  LinkedIn Compromised with Account Takeover Campaign</title><itunes:title>Episode #209: Cybercrime Forums Selling Personal Information of Hackers; Follow up to AI Red Team Hacking at Defcon; Zero-day in File Transfer Software Leaves Health Data Exposed;  LinkedIn Compromised with Account Takeover Campaign</itunes:title><description><![CDATA[<p>Full episode available on your favorite podcast platform: /bit.ly/505-updates📌</p><h3><strong>Cybercrime Forums Selling Personal Information of Hackers</strong></h3><p><a href="https://505updates.com/edwinkwan/" rel="noopener noreferrer" target="_blank">🇦🇺 Edwin Kwan, Sydney, Australia ↗</a></p><p> Info-stealing malware does not discriminate when stealing personal information. Hackers are humans too, and some of them fell prey and installed info-stealing malware. </p><h3><strong>Follow up to AI Red Team Hacking at Defcon</strong></h3><p><a href="https://505updates.com/katycraig/" rel="noopener noreferrer" target="_blank">🇺🇸 Katy Craig, San Diego, California ↗</a></p><p> People are becoming increasingly worried about AI. A recent report from LLM-attacks.org shows that even super smart AIs from Google and OpenAI can mess up if you ask them the right leading questions.</p><h3><strong>Zero-day in File Transfer Software Leaves Health Data Exposed</strong></h3><p><a href="https://505updates.com/iangarrett/" rel="noopener noreferrer" target="_blank"><strong>🇺🇸 </strong>Ian Garrett, Arlington, Virginia ↗</a></p><p>That awkward moment when your data transfer solution is transferring a little too well... In this case, a zero-day in the file transfer software, MOVEit, allowed hackers to breach millions of records of sensitive health information. </p><p><br></p><h3><strong>LinkedIn Compromised with Account Takeover Campaign</strong></h3><p><a href="https://505updates.com/markmiller/" rel="noopener noreferrer" target="_blank">🇺🇸 Mark Miller, New York City↗</a></p><p>Just when you thought it was safe to go back in the water... hackers using a Russian internet portal and email provider Rambler.ru are using brute force attacks to compromise LinkedIn accounts.</p>]]></description><content:encoded><![CDATA[<p>Full episode available on your favorite podcast platform: /bit.ly/505-updates📌</p><h3><strong>Cybercrime Forums Selling Personal Information of Hackers</strong></h3><p><a href="https://505updates.com/edwinkwan/" rel="noopener noreferrer" target="_blank">🇦🇺 Edwin Kwan, Sydney, Australia ↗</a></p><p> Info-stealing malware does not discriminate when stealing personal information. Hackers are humans too, and some of them fell prey and installed info-stealing malware. </p><h3><strong>Follow up to AI Red Team Hacking at Defcon</strong></h3><p><a href="https://505updates.com/katycraig/" rel="noopener noreferrer" target="_blank">🇺🇸 Katy Craig, San Diego, California ↗</a></p><p> People are becoming increasingly worried about AI. A recent report from LLM-attacks.org shows that even super smart AIs from Google and OpenAI can mess up if you ask them the right leading questions.</p><h3><strong>Zero-day in File Transfer Software Leaves Health Data Exposed</strong></h3><p><a href="https://505updates.com/iangarrett/" rel="noopener noreferrer" target="_blank"><strong>🇺🇸 </strong>Ian Garrett, Arlington, Virginia ↗</a></p><p>That awkward moment when your data transfer solution is transferring a little too well... In this case, a zero-day in the file transfer software, MOVEit, allowed hackers to breach millions of records of sensitive health information. </p><p><br></p><h3><strong>LinkedIn Compromised with Account Takeover Campaign</strong></h3><p><a href="https://505updates.com/markmiller/" rel="noopener noreferrer" target="_blank">🇺🇸 Mark Miller, New York City↗</a></p><p>Just when you thought it was safe to go back in the water... hackers using a Russian internet portal and email provider Rambler.ru are using brute force attacks to compromise LinkedIn accounts.</p>]]></content:encoded><link><![CDATA[https://3zozb9fxlbueipjyapmaas.captivate.fm/episode/episode-209-cybercrime-forums-selling-personal-information-of-hackers-follow-up-to-ai-red-team-hacking-at-defcon-zero-day-in-file-transfer-software-leaves-health-data-exposed-linkedin-compromised-with-account-takeover-campaign]]></link><guid isPermaLink="false">e6f4b0fe-3262-4eff-90ac-ab0709225541</guid><itunes:image href="https://artwork.captivate.fm/33e2a4e7-a936-4ef5-905a-3a72363cfbe4/BkhMbfQsRHQi9QFk9GvnUJSv.png"/><dc:creator><![CDATA[Contributors from Around the World]]></dc:creator><pubDate>Thu, 17 Aug 2023 16:45:00 -0400</pubDate><enclosure url="https://dts.podtrac.com/redirect.mp3/podcasts.captivate.fm/media/7193452d-7e65-419f-bd13-f5cbeef26b09/505-2023-08-17-Thursday-Episode-209-Final-converted.mp3" length="8949544" type="audio/mpeg"/><itunes:duration>09:19</itunes:duration><itunes:explicit>false</itunes:explicit><itunes:episodeType>full</itunes:episodeType><itunes:season>1</itunes:season><itunes:episode>209</itunes:episode><itunes:season>1</itunes:season><podcast:episode>209</podcast:episode><podcast:season>1</podcast:season><itunes:author>Contributors from Around the World</itunes:author></item><item><title>Episode #208: How Leaky is your VPN?; Microsoft stops renewing licenses for Russian companies; Fortinet Critical Flaw; Microsoft ProxyShell; Hackers Need Jira Too</title><itunes:title>Episode #208: How Leaky is your VPN?; Microsoft stops renewing licenses for Russian companies; Fortinet Critical Flaw; Microsoft ProxyShell; Hackers Need Jira Too</itunes:title><description><![CDATA[<p>200 episodes available for free on your favorite podcast platform: /bit.ly/505-updates📌</p><h2>August 16, 2023, Episode #208 - Wednesday</h2><h3><strong>How Leaky is your VPN?</strong></h3><p><a href="https://505updates.com/edwinkwan/" rel="noopener noreferrer" target="_blank">🇦🇺 Edwin Kwan, Sydney, Australia ↗</a></p><p>https://papers.mathyvanhoef.com/usenix2023-tunnelcrack.pdf</p><p>https://github.com/vanhoefm/vpnleaks</p><p>https://www.theregister.com/2023/08/10/tunnelcrack_vpn/</p><h3><strong>Microsoft stops renewing licenses for Russian companies</strong></h3><p><a href="http://505updates.com/hillarycoover/" rel="noopener noreferrer" target="_blank">🇺🇸 Hillary Coover, Washington, DC ↗</a></p><p><a href="https://www.svoboda.org/a/microsoft-prekratit-prodlevatj-litsenzii-rossiyskim-kompaniyam/32543000.html" rel="noopener noreferrer" target="_blank">https://www.svoboda.org/a/microsoft-prekratit-prodlevatj-litsenzii-rossiyskim-kompaniyam/32543000.html</a></p><p><a href="https://www.rferl.org/a/russia-microsoft-suspends-licenses/32543751.html" rel="noopener noreferrer" target="_blank">https://www.rferl.org/a/russia-microsoft-suspends-licenses/32543751.html</a></p><p><br></p><h3><strong>Fortinet Critical Flaw</strong></h3><p><a href="https://505updates.com/katycraig/" rel="noopener noreferrer" target="_blank">🇺🇸 Katy Craig, San Diego, California ↗</a></p><p>https://www.cisa.gov/news-events/cybersecurity-advisories/aa23-215a</p><p><a href="https://nvd.nist.gov/vuln/detail/CVE-2018-13379#vulnCurrentDescriptionTitle" rel="noopener noreferrer" target="_blank">https://nvd.nist.gov/vuln/detail/CVE-2018-13379#vulnCurrentDescriptionTitle</a></p><p><a href="https://www.fortiguard.com/psirt/FG-IR-20-233" rel="noopener noreferrer" target="_blank">https://www.fortiguard.com/psirt/FG-IR-20-233</a></p><p><a href="https://www.fortiguard.com/psirt/FG-IR-18-384" rel="noopener noreferrer" target="_blank">https://www.fortiguard.com/psirt/FG-IR-18-384</a></p><p><br></p><h3><strong>Trac Bannon: Break out of the Chains: Microsoft ProxyShell</strong></h3><p><a href="https://505updates.com/tracbannon/" rel="noopener noreferrer" target="_blank"><strong>🇺🇸</strong> Tracy (Trac) Bannon, Camp Hill, Pennsylvania↗</a></p><p><a href="https://www.cisa.gov/news-events/cybersecurity-advisories/aa23-215a" rel="noopener noreferrer" target="_blank">https://www.cisa.gov/news-events/cybersecurity-advisories/aa23-215a</a></p><p><a href="https://nvd.nist.gov/vuln/detail/CVE-2021-34473" rel="noopener noreferrer" target="_blank">https://nvd.nist.gov/vuln/detail/CVE-2021-34473</a></p><p><a href="https://nvd.nist.gov/vuln/detail/CVE-2021-31207" rel="noopener noreferrer" target="_blank">https://nvd.nist.gov/vuln/detail/CVE-2021-31207</a>&nbsp;</p><p><a href="https://nvd.nist.gov/vuln/detail/CVE-2021-34523" rel="noopener noreferrer" target="_blank">https://nvd.nist.gov/vuln/detail/CVE-2021-34523</a></p><p><br></p><h3><strong>Hackers Need Jira Too</strong></h3><p><a href="http://505updates.com/olimpiupop/" rel="noopener noreferrer" target="_blank">🇷🇴 Olimpiu Pop, Transylvania, Romania ↗</a></p><p><a href="https://www.cisa.gov/news-events/cybersecurity-advisories/aa23-215a" rel="noopener noreferrer" target="_blank">https://www.cisa.gov/news-events/cybersecurity-advisories/aa23-215a</a></p><p><a href="https://nvd.nist.gov/vuln/detail/CVE-2022-26134" rel="noopener noreferrer" target="_blank">https://nvd.nist.gov/vuln/detail/CVE-2022-26134</a></p><p><a href="https://nvd.nist.gov/vuln/detail/CVE-2021-26084" rel="noopener noreferrer" target="_blank">https://nvd.nist.gov/vuln/detail/CVE-2021-26084</a></p><p><br></p><h3><strong>This Day in Tech History</strong></h3><p><a href="https://505updates.com/marcelbrown/" rel="noopener noreferrer" target="_blank"><strong>🇺🇸</strong> Marcel Brown, St. Louis, Missouri ↗</a></p><p><a href="http://thisdayintechhistory.com/08/16" rel="noopener noreferrer" target="_blank">http://thisdayintechhistory.com/08/16</a></p>]]></description><content:encoded><![CDATA[<p>200 episodes available for free on your favorite podcast platform: /bit.ly/505-updates📌</p><h2>August 16, 2023, Episode #208 - Wednesday</h2><h3><strong>How Leaky is your VPN?</strong></h3><p><a href="https://505updates.com/edwinkwan/" rel="noopener noreferrer" target="_blank">🇦🇺 Edwin Kwan, Sydney, Australia ↗</a></p><p>https://papers.mathyvanhoef.com/usenix2023-tunnelcrack.pdf</p><p>https://github.com/vanhoefm/vpnleaks</p><p>https://www.theregister.com/2023/08/10/tunnelcrack_vpn/</p><h3><strong>Microsoft stops renewing licenses for Russian companies</strong></h3><p><a href="http://505updates.com/hillarycoover/" rel="noopener noreferrer" target="_blank">🇺🇸 Hillary Coover, Washington, DC ↗</a></p><p><a href="https://www.svoboda.org/a/microsoft-prekratit-prodlevatj-litsenzii-rossiyskim-kompaniyam/32543000.html" rel="noopener noreferrer" target="_blank">https://www.svoboda.org/a/microsoft-prekratit-prodlevatj-litsenzii-rossiyskim-kompaniyam/32543000.html</a></p><p><a href="https://www.rferl.org/a/russia-microsoft-suspends-licenses/32543751.html" rel="noopener noreferrer" target="_blank">https://www.rferl.org/a/russia-microsoft-suspends-licenses/32543751.html</a></p><p><br></p><h3><strong>Fortinet Critical Flaw</strong></h3><p><a href="https://505updates.com/katycraig/" rel="noopener noreferrer" target="_blank">🇺🇸 Katy Craig, San Diego, California ↗</a></p><p>https://www.cisa.gov/news-events/cybersecurity-advisories/aa23-215a</p><p><a href="https://nvd.nist.gov/vuln/detail/CVE-2018-13379#vulnCurrentDescriptionTitle" rel="noopener noreferrer" target="_blank">https://nvd.nist.gov/vuln/detail/CVE-2018-13379#vulnCurrentDescriptionTitle</a></p><p><a href="https://www.fortiguard.com/psirt/FG-IR-20-233" rel="noopener noreferrer" target="_blank">https://www.fortiguard.com/psirt/FG-IR-20-233</a></p><p><a href="https://www.fortiguard.com/psirt/FG-IR-18-384" rel="noopener noreferrer" target="_blank">https://www.fortiguard.com/psirt/FG-IR-18-384</a></p><p><br></p><h3><strong>Trac Bannon: Break out of the Chains: Microsoft ProxyShell</strong></h3><p><a href="https://505updates.com/tracbannon/" rel="noopener noreferrer" target="_blank"><strong>🇺🇸</strong> Tracy (Trac) Bannon, Camp Hill, Pennsylvania↗</a></p><p><a href="https://www.cisa.gov/news-events/cybersecurity-advisories/aa23-215a" rel="noopener noreferrer" target="_blank">https://www.cisa.gov/news-events/cybersecurity-advisories/aa23-215a</a></p><p><a href="https://nvd.nist.gov/vuln/detail/CVE-2021-34473" rel="noopener noreferrer" target="_blank">https://nvd.nist.gov/vuln/detail/CVE-2021-34473</a></p><p><a href="https://nvd.nist.gov/vuln/detail/CVE-2021-31207" rel="noopener noreferrer" target="_blank">https://nvd.nist.gov/vuln/detail/CVE-2021-31207</a>&nbsp;</p><p><a href="https://nvd.nist.gov/vuln/detail/CVE-2021-34523" rel="noopener noreferrer" target="_blank">https://nvd.nist.gov/vuln/detail/CVE-2021-34523</a></p><p><br></p><h3><strong>Hackers Need Jira Too</strong></h3><p><a href="http://505updates.com/olimpiupop/" rel="noopener noreferrer" target="_blank">🇷🇴 Olimpiu Pop, Transylvania, Romania ↗</a></p><p><a href="https://www.cisa.gov/news-events/cybersecurity-advisories/aa23-215a" rel="noopener noreferrer" target="_blank">https://www.cisa.gov/news-events/cybersecurity-advisories/aa23-215a</a></p><p><a href="https://nvd.nist.gov/vuln/detail/CVE-2022-26134" rel="noopener noreferrer" target="_blank">https://nvd.nist.gov/vuln/detail/CVE-2022-26134</a></p><p><a href="https://nvd.nist.gov/vuln/detail/CVE-2021-26084" rel="noopener noreferrer" target="_blank">https://nvd.nist.gov/vuln/detail/CVE-2021-26084</a></p><p><br></p><h3><strong>This Day in Tech History</strong></h3><p><a href="https://505updates.com/marcelbrown/" rel="noopener noreferrer" target="_blank"><strong>🇺🇸</strong> Marcel Brown, St. Louis, Missouri ↗</a></p><p><a href="http://thisdayintechhistory.com/08/16" rel="noopener noreferrer" target="_blank">http://thisdayintechhistory.com/08/16</a></p>]]></content:encoded><link><![CDATA[https://3zozb9fxlbueipjyapmaas.captivate.fm/episode/episode-208-microsoft-stops-renewing-licenses-for-russian-companies-fortinet-critical-flaw-microsoft-proxyshell-hackers-need-jira-too]]></link><guid isPermaLink="false">ec6bb24c-bafa-4cc6-a18a-fdd032cf2553</guid><itunes:image href="https://artwork.captivate.fm/33e2a4e7-a936-4ef5-905a-3a72363cfbe4/BkhMbfQsRHQi9QFk9GvnUJSv.png"/><dc:creator><![CDATA[Contributors from Around the World]]></dc:creator><pubDate>Wed, 16 Aug 2023 16:45:00 -0400</pubDate><enclosure url="https://dts.podtrac.com/redirect.mp3/podcasts.captivate.fm/media/379b9fe5-1e31-4630-aa99-948b918b1989/505-2023-08-16-Wednesday-Episode-208-Final-converted.mp3" length="12847850" type="audio/mpeg"/><itunes:duration>13:23</itunes:duration><itunes:explicit>false</itunes:explicit><itunes:episodeType>full</itunes:episodeType><itunes:season>1</itunes:season><itunes:episode>208</itunes:episode><itunes:season>1</itunes:season><podcast:episode>208</podcast:episode><podcast:season>1</podcast:season><itunes:author>Contributors from Around the World</itunes:author></item><item><title>Episode #207: Popular Open Source Software Breaks Users&apos; Trust; Goodbye Passwords;  Rapid Growth in Attacks Against Identity-based Security; DARPA Wants to Know What Role AI will Play in Cybersecurity</title><itunes:title>Episode #207: Popular Open Source Software Breaks Users&apos; Trust; Goodbye Passwords;  Rapid Growth in Attacks Against Identity-based Security; DARPA Wants to Know What Role AI will Play in Cybersecurity</itunes:title><description><![CDATA[<h1>August 15, 2023, Episode #207 - Tuesday</h1><p>Full episode available on your favorite podcast platform: /bit.ly/505-updates📌</p><h3><strong>Edwin Kwan: Popular Open Source Software Breaks Users' Trust</strong></h3><p>Popular open source software, Moq, has broken user trust by quietly making changes that collect user email addresses. The popular software has been downloaded over 476 million times. </p><p><a href="https://505updates.com/edwinkwan/" rel="noopener noreferrer" target="_blank">🇦🇺 Edwin Kwan, Sydney, Australia ↗</a></p><p>https://www.bleepingcomputer.com/news/security/popular-open-source-project-moq-criticized-for-quietly-collecting-data/</p><p>https://www.bleepingcomputer.com/news/security/amazon-aws-distances-itself-from-moq-amid-data-collection-controversy/</p><h3><strong>Katy Craig: Goodbye Passwords</strong></h3><p>Soon passwords could be history. With passwordless tech, logging in will be safer and simple. Say goodbye to forgotten passwords, email phishing campaigns, and hello to a better online world.</p><p><a href="https://505updates.com/katycraig/" rel="noopener noreferrer" target="_blank">🇺🇸 Katy Craig, San Diego, California ↗</a></p><p><a href="https://www.axiad.com/newsroom/axiad-and-esg-survey-82-of-respondents-indicate-passwordless-authentication-is-a-top-five-priority/" rel="noopener noreferrer" target="_blank">https://www.axiad.com/newsroom/axiad-and-esg-survey-82-of-respondents-indicate-passwordless-authentication-is-a-top-five-priority/</a></p><p><a href="https://www.csoonline.com/article/649083/10-passwordless-authentication-solutions.html" rel="noopener noreferrer" target="_blank">https://www.csoonline.com/article/649083/10-passwordless-authentication-solutions.html</a></p><h3><strong>Ian Garrett: Rapid Growth in Attacks Against Identity-based Security</strong></h3><p>A recent report shows a rapid growth of identity-based security threats. Cyber criminals are evolving their tactics, making them harder to detect by gaining legitimate access to target systems. </p><p><a href="https://505updates.com/iangarrett/" rel="noopener noreferrer" target="_blank"><strong>🇺🇸 </strong>Ian Garrett, Arlington, Virginia ↗</a></p><p><a href="https://www.csoonline.com/article/648894/identity-based-security-threats-are-growing-rapidly-report.html" rel="noopener noreferrer" target="_blank">https://www.csoonline.com/article/648894/identity-based-security-threats-are-growing-rapidly-report.html</a></p><p><br></p><h3><strong>Hillary Coover: DARPA Wants to Know What Role AI will Play in Cybersecurity</strong></h3><p>What role will AI play in cybersecurity? The Defense Advanced Research Projects Agency, DARPA,  will award a cumulative $18.5 million in prizes to winning teams and will fund up to seven small businesses with up to $1 million each to compete.</p><p><a href="http://505updates.com/hillarycoover/" rel="noopener noreferrer" target="_blank">🇺🇸 Hillary Coover, Washington, DC ↗</a></p><p><a href="https://www.darpa.mil/news-events/2023-08-09" rel="noopener noreferrer" target="_blank">https://www.darpa.mil/news-events/2023-08-09</a></p><p><br></p><p>Full transcript and links to resources available at 505updates.com</p>]]></description><content:encoded><![CDATA[<h1>August 15, 2023, Episode #207 - Tuesday</h1><p>Full episode available on your favorite podcast platform: /bit.ly/505-updates📌</p><h3><strong>Edwin Kwan: Popular Open Source Software Breaks Users' Trust</strong></h3><p>Popular open source software, Moq, has broken user trust by quietly making changes that collect user email addresses. The popular software has been downloaded over 476 million times. </p><p><a href="https://505updates.com/edwinkwan/" rel="noopener noreferrer" target="_blank">🇦🇺 Edwin Kwan, Sydney, Australia ↗</a></p><p>https://www.bleepingcomputer.com/news/security/popular-open-source-project-moq-criticized-for-quietly-collecting-data/</p><p>https://www.bleepingcomputer.com/news/security/amazon-aws-distances-itself-from-moq-amid-data-collection-controversy/</p><h3><strong>Katy Craig: Goodbye Passwords</strong></h3><p>Soon passwords could be history. With passwordless tech, logging in will be safer and simple. Say goodbye to forgotten passwords, email phishing campaigns, and hello to a better online world.</p><p><a href="https://505updates.com/katycraig/" rel="noopener noreferrer" target="_blank">🇺🇸 Katy Craig, San Diego, California ↗</a></p><p><a href="https://www.axiad.com/newsroom/axiad-and-esg-survey-82-of-respondents-indicate-passwordless-authentication-is-a-top-five-priority/" rel="noopener noreferrer" target="_blank">https://www.axiad.com/newsroom/axiad-and-esg-survey-82-of-respondents-indicate-passwordless-authentication-is-a-top-five-priority/</a></p><p><a href="https://www.csoonline.com/article/649083/10-passwordless-authentication-solutions.html" rel="noopener noreferrer" target="_blank">https://www.csoonline.com/article/649083/10-passwordless-authentication-solutions.html</a></p><h3><strong>Ian Garrett: Rapid Growth in Attacks Against Identity-based Security</strong></h3><p>A recent report shows a rapid growth of identity-based security threats. Cyber criminals are evolving their tactics, making them harder to detect by gaining legitimate access to target systems. </p><p><a href="https://505updates.com/iangarrett/" rel="noopener noreferrer" target="_blank"><strong>🇺🇸 </strong>Ian Garrett, Arlington, Virginia ↗</a></p><p><a href="https://www.csoonline.com/article/648894/identity-based-security-threats-are-growing-rapidly-report.html" rel="noopener noreferrer" target="_blank">https://www.csoonline.com/article/648894/identity-based-security-threats-are-growing-rapidly-report.html</a></p><p><br></p><h3><strong>Hillary Coover: DARPA Wants to Know What Role AI will Play in Cybersecurity</strong></h3><p>What role will AI play in cybersecurity? The Defense Advanced Research Projects Agency, DARPA,  will award a cumulative $18.5 million in prizes to winning teams and will fund up to seven small businesses with up to $1 million each to compete.</p><p><a href="http://505updates.com/hillarycoover/" rel="noopener noreferrer" target="_blank">🇺🇸 Hillary Coover, Washington, DC ↗</a></p><p><a href="https://www.darpa.mil/news-events/2023-08-09" rel="noopener noreferrer" target="_blank">https://www.darpa.mil/news-events/2023-08-09</a></p><p><br></p><p>Full transcript and links to resources available at 505updates.com</p>]]></content:encoded><link><![CDATA[https://3zozb9fxlbueipjyapmaas.captivate.fm/episode/episode-207-popular-open-source-software-breaks-users-trust-goodbye-passwords-rapid-growth-in-attacks-against-identity-based-security-darpa-wants-to-know-what-role-ai-will-play-in-cybersecurity]]></link><guid isPermaLink="false">e322dd72-1c3e-4ad9-a52c-232313c9386a</guid><itunes:image href="https://artwork.captivate.fm/33e2a4e7-a936-4ef5-905a-3a72363cfbe4/BkhMbfQsRHQi9QFk9GvnUJSv.png"/><dc:creator><![CDATA[Contributors from Around the World]]></dc:creator><pubDate>Tue, 15 Aug 2023 16:45:00 -0400</pubDate><enclosure url="https://dts.podtrac.com/redirect.mp3/podcasts.captivate.fm/media/7bee9667-5821-4983-8b1c-43d0e02d2794/505-2023-08-15-Tuesday-Episode-207-Final-converted.mp3" length="7778839" type="audio/mpeg"/><itunes:duration>08:06</itunes:duration><itunes:explicit>false</itunes:explicit><itunes:episodeType>full</itunes:episodeType><itunes:season>1</itunes:season><itunes:episode>207</itunes:episode><itunes:season>1</itunes:season><podcast:episode>207</podcast:episode><podcast:season>1</podcast:season><itunes:author>Contributors from Around the World</itunes:author></item><item><title>Episode #206: LF Open Source Maintainers Report; MS Discloses OT Vulnerabilities; 4 Step Guidance for Using ChatGPT; This Day in Tech History</title><itunes:title>Episode #206: LF Open Source Maintainers Report; MS Discloses OT Vulnerabilities; 4 Step Guidance for Using ChatGPT; This Day in Tech History</itunes:title><description><![CDATA[<p>Full episode available on your favorite podcast platform: /bit.ly/505-updates📌</p><h3><strong>Edwin Kwan: The LF Open Source Maintainers Report</strong></h3><p><a href="https://505updates.com/edwinkwan/" rel="noopener noreferrer" target="_blank">🇦🇺 Edwin Kwan, Sydney, Australia ↗</a></p><p><a href="https://www.linuxfoundation.org/research/open-source-maintainers" rel="noopener noreferrer" target="_blank">https://www.linuxfoundation.org/research/open-source-maintainers</a></p><p>Linux Foundation research found that our technology infrastructure relies heavily on a few hundred open source projects. The maintainers of those projects bear a tremendous burden, as their projects are responsible for much of the global economy and disruptions to their project can cause massive problems and outages.</p><h3><strong>Katy Craig: Microsoft Discloses OT Vulnerabilities</strong></h3><p><a href="https://505updates.com/katycraig/" rel="noopener noreferrer" target="_blank">🇺🇸 Katy Craig, San Diego, California ↗</a></p><p><a href="https://www.microsoft.com/en-us/security/blog/2023/08/10/multiple-high-severity-vulnerabilities-in-codesys-v3-sdk-could-lead-to-rce-or-dos/" rel="noopener noreferrer" target="_blank">https://www.microsoft.com/en-us/security/blog/2023/08/10/multiple-high-severity-vulnerabilities-in-codesys-v3-sdk-could-lead-to-rce-or-dos/</a></p><p>Germany-based industrial automation software provider, Codesys, faces a security crisis. Microsoft researchers have uncovered over a dozen vulnerabilities in its products that could lead to remote takeover or denial of service for millions of industrial control systems.</p><h3><strong>Hillary Coover: 4 Step Guidance for Using ChatGPT</strong></h3><p><a href="http://505updates.com/hillarycoover/" rel="noopener noreferrer" target="_blank">🇺🇸 Hillary Coover, Washington, DC ↗</a></p><p><a href="https://www.reuters.com/technology/chatgpt-fever-spreads-us-workplace-sounding-alarm-some-2023-08-11/" rel="noopener noreferrer" target="_blank">https://www.reuters.com/technology/chatgpt-fever-spreads-us-workplace-sounding-alarm-some-2023-08-11/</a></p><p>According to a recent Reuters poll, 28% of American workers claim to use ChatGPT regularly for work. Chatbot input data is similar to browser history data in that both are discoverable and, with the right datasets correlated, can be deanonymized.</p><p><br></p><h3><strong>Marcel Brown: This Day, August 13, 14, in Tech History</strong></h3><p><a href="https://505updates.com/marcelbrown/" rel="noopener noreferrer" target="_blank"><strong>🇺🇸</strong> Marcel Brown, St. Louis, Missouri ↗</a></p><p><a href="http://thisdayintechhistory.com/08/11" rel="noopener noreferrer" target="_blank">http://thisdayintechhistory.com/08/13</a></p><p><a href="http://thisdayintechhistory.com/08/12" rel="noopener noreferrer" target="_blank">http://thisdayintechhistory.com/08/14</a></p><p>August 13th, 1993. The Super NES version brought Street Fighter II into the home and uh, college dorm rooms where certain people spent many hours smacking down their dorm mates. I still have this game, so if anyone is feeling saucy, the smack downs can resume at any time.</p>]]></description><content:encoded><![CDATA[<p>Full episode available on your favorite podcast platform: /bit.ly/505-updates📌</p><h3><strong>Edwin Kwan: The LF Open Source Maintainers Report</strong></h3><p><a href="https://505updates.com/edwinkwan/" rel="noopener noreferrer" target="_blank">🇦🇺 Edwin Kwan, Sydney, Australia ↗</a></p><p><a href="https://www.linuxfoundation.org/research/open-source-maintainers" rel="noopener noreferrer" target="_blank">https://www.linuxfoundation.org/research/open-source-maintainers</a></p><p>Linux Foundation research found that our technology infrastructure relies heavily on a few hundred open source projects. The maintainers of those projects bear a tremendous burden, as their projects are responsible for much of the global economy and disruptions to their project can cause massive problems and outages.</p><h3><strong>Katy Craig: Microsoft Discloses OT Vulnerabilities</strong></h3><p><a href="https://505updates.com/katycraig/" rel="noopener noreferrer" target="_blank">🇺🇸 Katy Craig, San Diego, California ↗</a></p><p><a href="https://www.microsoft.com/en-us/security/blog/2023/08/10/multiple-high-severity-vulnerabilities-in-codesys-v3-sdk-could-lead-to-rce-or-dos/" rel="noopener noreferrer" target="_blank">https://www.microsoft.com/en-us/security/blog/2023/08/10/multiple-high-severity-vulnerabilities-in-codesys-v3-sdk-could-lead-to-rce-or-dos/</a></p><p>Germany-based industrial automation software provider, Codesys, faces a security crisis. Microsoft researchers have uncovered over a dozen vulnerabilities in its products that could lead to remote takeover or denial of service for millions of industrial control systems.</p><h3><strong>Hillary Coover: 4 Step Guidance for Using ChatGPT</strong></h3><p><a href="http://505updates.com/hillarycoover/" rel="noopener noreferrer" target="_blank">🇺🇸 Hillary Coover, Washington, DC ↗</a></p><p><a href="https://www.reuters.com/technology/chatgpt-fever-spreads-us-workplace-sounding-alarm-some-2023-08-11/" rel="noopener noreferrer" target="_blank">https://www.reuters.com/technology/chatgpt-fever-spreads-us-workplace-sounding-alarm-some-2023-08-11/</a></p><p>According to a recent Reuters poll, 28% of American workers claim to use ChatGPT regularly for work. Chatbot input data is similar to browser history data in that both are discoverable and, with the right datasets correlated, can be deanonymized.</p><p><br></p><h3><strong>Marcel Brown: This Day, August 13, 14, in Tech History</strong></h3><p><a href="https://505updates.com/marcelbrown/" rel="noopener noreferrer" target="_blank"><strong>🇺🇸</strong> Marcel Brown, St. Louis, Missouri ↗</a></p><p><a href="http://thisdayintechhistory.com/08/11" rel="noopener noreferrer" target="_blank">http://thisdayintechhistory.com/08/13</a></p><p><a href="http://thisdayintechhistory.com/08/12" rel="noopener noreferrer" target="_blank">http://thisdayintechhistory.com/08/14</a></p><p>August 13th, 1993. The Super NES version brought Street Fighter II into the home and uh, college dorm rooms where certain people spent many hours smacking down their dorm mates. I still have this game, so if anyone is feeling saucy, the smack downs can resume at any time.</p>]]></content:encoded><link><![CDATA[https://3zozb9fxlbueipjyapmaas.captivate.fm/episode/episode-126-lf-open-source-maintainers-report-ms-discloses-ot-vulnerabilities-4-step-guidance-for-using-chatgpt-this-day-in-tech-history]]></link><guid isPermaLink="false">cfbfd050-3ace-4011-bb36-17d63f95393f</guid><itunes:image href="https://artwork.captivate.fm/33e2a4e7-a936-4ef5-905a-3a72363cfbe4/BkhMbfQsRHQi9QFk9GvnUJSv.png"/><dc:creator><![CDATA[Contributors from Around the World]]></dc:creator><pubDate>Mon, 14 Aug 2023 16:45:00 -0400</pubDate><enclosure url="https://dts.podtrac.com/redirect.mp3/podcasts.captivate.fm/media/a2066479-7068-4c3d-9c84-baac3f2b223f/505-2023-08-14-Monday-Episode-206-Final-converted.mp3" length="7655958" type="audio/mpeg"/><itunes:duration>07:58</itunes:duration><itunes:explicit>false</itunes:explicit><itunes:episodeType>full</itunes:episodeType><itunes:season>1</itunes:season><itunes:episode>206</itunes:episode><itunes:season>1</itunes:season><podcast:episode>206</podcast:episode><podcast:season>1</podcast:season><itunes:author>Contributors from Around the World</itunes:author></item><item><title>Episode #205: Veilid launch; Keystroke Logging to Measure Employee Productivity; OWASP Releases Top 10 Threats LLM V1.0</title><itunes:title>Episode #205: Veilid launch; Keystroke Logging to Measure Employee Productivity; OWASP Releases Top 10 Threats LLM V1.0</itunes:title><description><![CDATA[<h3><strong>Kadi McKean: Veilid launch with Paul Miller at BlackHat 2023</strong></h3><h3><a href="https://505updates.com/kadigrigg/" rel="noopener noreferrer" target="_blank">🇺🇸 Kadi McKean, Alexandria, Virginia </a>↗</h3><h3>Guest speaker: Paul Miller, Sr. Manager at VmWare Carbon Black</h3><h3>​​<a href="https://www.linkedin.com/in/paulm3319/" rel="noopener noreferrer" target="_blank">https://www.linkedin.com/in/paulm3319/</a></h3><h3><a href="https://veilid.com/" rel="noopener noreferrer" target="_blank">Veilid</a></h3><p><a href="https://gizmodo.com/cult-of-the-dead-cow-launches-veilid-encryption-project-1850699803" rel="noopener noreferrer" target="_blank">Cult of the Dead Cow Launches Encryption Protocol Veilid</a></p><p><a href="https://twitter.com/VeilidNetwork?ref_src=twsrc%5Egoogle%7Ctwcamp%5Eserp%7Ctwgr%5Eauthor" rel="noopener noreferrer" target="_blank">https://twitter.com/VeilidNetwork?ref_src=twsrc%5Egoogle%7Ctwcamp%5Eserp%7Ctwgr%5Eauthor</a>&nbsp;</p><h3><strong>Edwin Kwan: Company using Keystroke Logging to Measure Employee Productivity</strong></h3><p><a href="https://505updates.com/edwinkwan/" rel="noopener noreferrer" target="_blank">🇦🇺 Edwin Kwan, Sydney, Australia ↗</a></p><p>https://www.itnews.com.au/news/iag-used-keystroke-logging-to-investigate-productivity-of-remote-worker-598692</p><p><a href="http://www.austlii.edu.au/cgi-bin/viewdoc/au/cases/cth/FWC/2023/1792.html" rel="noopener noreferrer" target="_blank">http://www.austlii.edu.au/cgi-bin/viewdoc/au/cases/cth/FWC/2023/1792.html</a></p><h3><strong>Olimpiu Pop: OWASP Releases Top 10 Threats LLM V1.0</strong></h3><p><a href="http://505updates.com/olimpiupop/" rel="noopener noreferrer" target="_blank">🇷🇴 Olimpiu Pop, Transylvania, Romania ↗</a></p><p><a href="https://owasp.org/www-project-top-10-for-large-language-model-applications/assets/PDF/OWASP-Top-10-for-LLMs-2023-slides-v1_0.pdf" rel="noopener noreferrer" target="_blank">https://owasp.org/www-project-top-10-for-large-language-model-applications/assets/PDF/OWASP-Top-10-for-LLMs-2023-slides-v1_0.pdf</a></p><p><br></p><h3><strong>Trac Bannon: Help is on the way: OWASP Releases Top 10 LLM Threats</strong></h3><p><a href="https://505updates.com/tracbannon/" rel="noopener noreferrer" target="_blank"><strong>🇺🇸</strong> Tracy (Trac) Bannon, Camp Hill, Pennsylvania↗</a></p><p><a href="https://owasp.org/www-project-top-10-for-large-language-model-applications/assets/PDF/OWASP-Top-10-for-LLMs-2023-v09.pdf" rel="noopener noreferrer" target="_blank">OWASP Top 10 for LLM</a></p><p><a href="https://github.com/OWASP/www-project-top-10-for-large-language-model-applications/wiki" rel="noopener noreferrer" target="_blank">https://github.com/OWASP/www-project-top-10-for-large-language-model-applications/wiki</a>&nbsp;</p><p><a href="https://owasp.org/www-project-top-10-for-large-language-model-applications/" rel="noopener noreferrer" target="_blank">OWASP Top 10 for Large Language Model Applications | OWASP Foundation</a></p><p><a href="https://www.linkedin.com/pulse/official-release-owasp-top-10-large-language-model-v10-steve-wilson/" rel="noopener noreferrer" target="_blank">Official Release: The OWASP Top 10 for Large Language Model Applications v1.0</a></p><p><br></p><h3><strong>Katy Craig: OWASP 4 LLM</strong></h3><p><a href="https://505updates.com/katycraig/" rel="noopener noreferrer" target="_blank">🇺🇸 Katy Craig, San Diego, California ↗</a></p><p><a href="https://owasp.org/www-project-top-10-for-large-language-model-applications/" rel="noopener noreferrer" target="_blank">OWASP Top 10 for Large Language Model Applications | OWASP Foundation</a></p><p><a href="https://www.linkedin.com/pulse/official-release-owasp-top-10-large-language-model-v10-steve-wilson/" rel="noopener noreferrer" target="_blank">Official Release: The OWASP Top 10 for Large Language Model Applications v1.0</a></p><p><br></p><h3><strong>Marcel Brown: This Day, August 11, 12 in Tech History</strong></h3><p><a...]]></description><content:encoded><![CDATA[<h3><strong>Kadi McKean: Veilid launch with Paul Miller at BlackHat 2023</strong></h3><h3><a href="https://505updates.com/kadigrigg/" rel="noopener noreferrer" target="_blank">🇺🇸 Kadi McKean, Alexandria, Virginia </a>↗</h3><h3>Guest speaker: Paul Miller, Sr. Manager at VmWare Carbon Black</h3><h3>​​<a href="https://www.linkedin.com/in/paulm3319/" rel="noopener noreferrer" target="_blank">https://www.linkedin.com/in/paulm3319/</a></h3><h3><a href="https://veilid.com/" rel="noopener noreferrer" target="_blank">Veilid</a></h3><p><a href="https://gizmodo.com/cult-of-the-dead-cow-launches-veilid-encryption-project-1850699803" rel="noopener noreferrer" target="_blank">Cult of the Dead Cow Launches Encryption Protocol Veilid</a></p><p><a href="https://twitter.com/VeilidNetwork?ref_src=twsrc%5Egoogle%7Ctwcamp%5Eserp%7Ctwgr%5Eauthor" rel="noopener noreferrer" target="_blank">https://twitter.com/VeilidNetwork?ref_src=twsrc%5Egoogle%7Ctwcamp%5Eserp%7Ctwgr%5Eauthor</a>&nbsp;</p><h3><strong>Edwin Kwan: Company using Keystroke Logging to Measure Employee Productivity</strong></h3><p><a href="https://505updates.com/edwinkwan/" rel="noopener noreferrer" target="_blank">🇦🇺 Edwin Kwan, Sydney, Australia ↗</a></p><p>https://www.itnews.com.au/news/iag-used-keystroke-logging-to-investigate-productivity-of-remote-worker-598692</p><p><a href="http://www.austlii.edu.au/cgi-bin/viewdoc/au/cases/cth/FWC/2023/1792.html" rel="noopener noreferrer" target="_blank">http://www.austlii.edu.au/cgi-bin/viewdoc/au/cases/cth/FWC/2023/1792.html</a></p><h3><strong>Olimpiu Pop: OWASP Releases Top 10 Threats LLM V1.0</strong></h3><p><a href="http://505updates.com/olimpiupop/" rel="noopener noreferrer" target="_blank">🇷🇴 Olimpiu Pop, Transylvania, Romania ↗</a></p><p><a href="https://owasp.org/www-project-top-10-for-large-language-model-applications/assets/PDF/OWASP-Top-10-for-LLMs-2023-slides-v1_0.pdf" rel="noopener noreferrer" target="_blank">https://owasp.org/www-project-top-10-for-large-language-model-applications/assets/PDF/OWASP-Top-10-for-LLMs-2023-slides-v1_0.pdf</a></p><p><br></p><h3><strong>Trac Bannon: Help is on the way: OWASP Releases Top 10 LLM Threats</strong></h3><p><a href="https://505updates.com/tracbannon/" rel="noopener noreferrer" target="_blank"><strong>🇺🇸</strong> Tracy (Trac) Bannon, Camp Hill, Pennsylvania↗</a></p><p><a href="https://owasp.org/www-project-top-10-for-large-language-model-applications/assets/PDF/OWASP-Top-10-for-LLMs-2023-v09.pdf" rel="noopener noreferrer" target="_blank">OWASP Top 10 for LLM</a></p><p><a href="https://github.com/OWASP/www-project-top-10-for-large-language-model-applications/wiki" rel="noopener noreferrer" target="_blank">https://github.com/OWASP/www-project-top-10-for-large-language-model-applications/wiki</a>&nbsp;</p><p><a href="https://owasp.org/www-project-top-10-for-large-language-model-applications/" rel="noopener noreferrer" target="_blank">OWASP Top 10 for Large Language Model Applications | OWASP Foundation</a></p><p><a href="https://www.linkedin.com/pulse/official-release-owasp-top-10-large-language-model-v10-steve-wilson/" rel="noopener noreferrer" target="_blank">Official Release: The OWASP Top 10 for Large Language Model Applications v1.0</a></p><p><br></p><h3><strong>Katy Craig: OWASP 4 LLM</strong></h3><p><a href="https://505updates.com/katycraig/" rel="noopener noreferrer" target="_blank">🇺🇸 Katy Craig, San Diego, California ↗</a></p><p><a href="https://owasp.org/www-project-top-10-for-large-language-model-applications/" rel="noopener noreferrer" target="_blank">OWASP Top 10 for Large Language Model Applications | OWASP Foundation</a></p><p><a href="https://www.linkedin.com/pulse/official-release-owasp-top-10-large-language-model-v10-steve-wilson/" rel="noopener noreferrer" target="_blank">Official Release: The OWASP Top 10 for Large Language Model Applications v1.0</a></p><p><br></p><h3><strong>Marcel Brown: This Day, August 11, 12 in Tech History</strong></h3><p><a href="https://505updates.com/marcelbrown/" rel="noopener noreferrer" target="_blank"><strong>🇺🇸</strong> Marcel Brown, St. Louis, Missouri ↗</a></p><p><a href="http://thisdayintechhistory.com/08/11" rel="noopener noreferrer" target="_blank">http://thisdayintechhistory.com/08/11</a></p><p><a href="http://thisdayintechhistory.com/08/12" rel="noopener noreferrer" target="_blank">http://thisdayintechhistory.com/08/12</a></p>]]></content:encoded><link><![CDATA[https://3zozb9fxlbueipjyapmaas.captivate.fm/episode/episode-205-]]></link><guid isPermaLink="false">602f8112-fcbe-46d0-b634-94702b6f96f8</guid><itunes:image href="https://artwork.captivate.fm/33e2a4e7-a936-4ef5-905a-3a72363cfbe4/BkhMbfQsRHQi9QFk9GvnUJSv.png"/><dc:creator><![CDATA[Contributors from Around the World]]></dc:creator><pubDate>Fri, 11 Aug 2023 16:45:00 -0400</pubDate><enclosure url="https://dts.podtrac.com/redirect.mp3/podcasts.captivate.fm/media/9baac5c5-04e3-42bb-96b6-dcb6df13b4d5/505-2023-08-11-Episode-205-Final-converted.mp3" length="13909881" type="audio/mpeg"/><itunes:duration>14:29</itunes:duration><itunes:explicit>false</itunes:explicit><itunes:episodeType>full</itunes:episodeType><itunes:season>1</itunes:season><itunes:episode>205</itunes:episode><itunes:season>1</itunes:season><podcast:episode>205</podcast:episode><podcast:season>1</podcast:season><itunes:author>Contributors from Around the World</itunes:author></item><item><title>Episode #204: Getting Malware onto Android Devices; Critical Shortage of Cybersecurity Talent; Ransomware 2.0 Pivots; AI Red Teaming;</title><itunes:title>Episode #204: Getting Malware onto Android Devices; Critical Shortage of Cybersecurity Talent; Ransomware 2.0 Pivots; AI Red Teaming;</itunes:title><description><![CDATA[<p>🎙️ Free access to “It’s 5:05!” on your favorite podcast platforms: bit.ly/505-updates 📌</p><p><span class="ql-size-large">Today's Cybersecurity Briefing:</span></p><p><strong>Marcel Brown:</strong></p><p> August 10th, 1966. The first lunar orbiter, creatively named Lunar Orbiter I, is launched. Its primary mission is to photograph potential landing sites for future Apollo missions. </p><p><br></p><p><strong>Edwin Kwan:</strong></p><p>How are malicious apps getting past Google's Play Store's review process and their rigorous, potentially harmful application screening? Well, they're using a technique called versioning, which is sneaky and hard to detect. </p><p><br></p><p><strong>Hillary Coover:</strong></p><p>Amidst this year's conference, one of the most prominent and pressing topics under discussion continues to be the critical shortage of cybersecurity talent. While companies have introduced innovative recruitment techniques to broaden their cyber talent pools, the size of the pool remains constrained.</p><p><br></p><p><strong>Ian Garrett:</strong></p><p>Ransomware has had a glow up. As organizations have become increasingly resilient to traditional ransomware techniques, malicious actors have been exploiting more zero-day vulnerabilities and are also targeting the exfiltration of critical files, raising the stakes for victims and organizations alike.</p><p><br></p><p><strong>Katy Craig:</strong></p><p> Medical Secrets. Bank heist blueprints. Racial bias. What happens when red teams go after generative AI? A web of fabricated tales emerge. One even suggesting Justin Bieber's hand in Selena Gomez's grisly death. And for each transgression, a cause for celebration in this strange twist of artificial intelligence. </p><p><br></p><p><strong>Hillary Coover:</strong></p><p>From Sourced Network Productions, reporting from Las Vegas, Nevada at Black Hat, It's 5:05. I'm Hillary Coover. Today is Thursday, August 10th, 2023. Here's the full story behind today's cybersecurity and open source headlines</p><p><br></p>]]></description><content:encoded><![CDATA[<p>🎙️ Free access to “It’s 5:05!” on your favorite podcast platforms: bit.ly/505-updates 📌</p><p><span class="ql-size-large">Today's Cybersecurity Briefing:</span></p><p><strong>Marcel Brown:</strong></p><p> August 10th, 1966. The first lunar orbiter, creatively named Lunar Orbiter I, is launched. Its primary mission is to photograph potential landing sites for future Apollo missions. </p><p><br></p><p><strong>Edwin Kwan:</strong></p><p>How are malicious apps getting past Google's Play Store's review process and their rigorous, potentially harmful application screening? Well, they're using a technique called versioning, which is sneaky and hard to detect. </p><p><br></p><p><strong>Hillary Coover:</strong></p><p>Amidst this year's conference, one of the most prominent and pressing topics under discussion continues to be the critical shortage of cybersecurity talent. While companies have introduced innovative recruitment techniques to broaden their cyber talent pools, the size of the pool remains constrained.</p><p><br></p><p><strong>Ian Garrett:</strong></p><p>Ransomware has had a glow up. As organizations have become increasingly resilient to traditional ransomware techniques, malicious actors have been exploiting more zero-day vulnerabilities and are also targeting the exfiltration of critical files, raising the stakes for victims and organizations alike.</p><p><br></p><p><strong>Katy Craig:</strong></p><p> Medical Secrets. Bank heist blueprints. Racial bias. What happens when red teams go after generative AI? A web of fabricated tales emerge. One even suggesting Justin Bieber's hand in Selena Gomez's grisly death. And for each transgression, a cause for celebration in this strange twist of artificial intelligence. </p><p><br></p><p><strong>Hillary Coover:</strong></p><p>From Sourced Network Productions, reporting from Las Vegas, Nevada at Black Hat, It's 5:05. I'm Hillary Coover. Today is Thursday, August 10th, 2023. Here's the full story behind today's cybersecurity and open source headlines</p><p><br></p>]]></content:encoded><link><![CDATA[https://3zozb9fxlbueipjyapmaas.captivate.fm/episode/episode-204-getting-malware-onto-android-devices-critical-shortage-of-cybersecurity-talent-ransomware-2-0-pivots-ai-red-teaming-]]></link><guid isPermaLink="false">609ed053-d254-4332-baf2-7aba908cfd9b</guid><itunes:image href="https://artwork.captivate.fm/33e2a4e7-a936-4ef5-905a-3a72363cfbe4/BkhMbfQsRHQi9QFk9GvnUJSv.png"/><dc:creator><![CDATA[Contributors from Around the World]]></dc:creator><pubDate>Thu, 10 Aug 2023 16:45:00 -0400</pubDate><enclosure url="https://dts.podtrac.com/redirect.mp3/podcasts.captivate.fm/media/54448dfd-439f-4e9a-a53a-c51d4d4d9760/505-2023-08-10-Episode-204-Final-converted.mp3" length="10312091" type="audio/mpeg"/><itunes:duration>10:44</itunes:duration><itunes:explicit>false</itunes:explicit><itunes:episodeType>full</itunes:episodeType><itunes:season>1</itunes:season><itunes:episode>204</itunes:episode><itunes:season>1</itunes:season><podcast:episode>204</podcast:episode><podcast:season>1</podcast:season><itunes:author>Contributors from Around the World</itunes:author></item><item><title>Episode #203: Top Vulnerabilities: Why don’t we learn?; Review of 2022 Vulnerabilities; Log4j Still Dangerous Two Years Later;</title><itunes:title>Episode #203: Top Vulnerabilities: Why don’t we learn?; Review of 2022 Vulnerabilities; Log4j Still Dangerous Two Years Later;</itunes:title><description><![CDATA[<p>Free access to “It’s 5:05!” on your favorite podcast platforms:&nbsp;<a href="http://bit.ly/its505-free-access-on-all-podcast-platforms" rel="noopener noreferrer" target="_blank">bit.ly/its505-free-access-on-all-podcast-platforms</a>&nbsp;</p><p><strong>Edwin Kwan: Highly Accurate Acoustic Keylogger Attack</strong></p><p><a href="https://505updates.com/edwinkwan/" rel="noopener noreferrer" target="_blank">🇦🇺 Edwin Kwan, Sydney, Australia ↗</a></p><p>Academic researchers from British universities have developed a deep learning side channel attack that can be used to steal data from keyboard strokes that are recorded using a microphone with an accuracy of up to 95%.</p><p><strong>Trac Bannon: Top Vulnerabilities: Why don’t we learn?</strong></p><p><a href="https://505updates.com/tracbannon/" rel="noopener noreferrer" target="_blank"><strong>🇺🇸</strong>&nbsp;Tracy (Trac) Bannon, Camp Hill, Pennsylvania</a></p><p>Cybersecurity agencies from around the world have co-authored an alert that is peppered with words like “routinely” and “frequently”. It’s interesting to note the distribution of vendors involved in the Top 12 routinely exploited CVEs and CWEs.</p><p><strong>Katy Craig: Review of 2022 Vulnerabilities</strong></p><p><a href="https://505updates.com/katycraig/" rel="noopener noreferrer" target="_blank">🇺🇸 Katy Craig, San Diego, California</a></p><p>The world of cybercrime mirrors, the laws of nature; adapt or perish. The choice of targets heavily influence the selection of vulnerabilities. Cyber actors with precision akin to surgeons opt for vulnerabilities more rampant within the network landscape of their targets.</p><p><strong>Olimpiu Pop: Vulnerabilities PoV - Log4j Still Dangerous Two Years Later</strong></p><p><a href="http://505updates.com/olimpiupop/" rel="noopener noreferrer" target="_blank">🇷🇴 Olimpiu Pop, Transylvania, Romania</a></p><p>According to Sonatype, around a third of the related downloads from Maven Center are vulnerable. The main reason this happens is due to the shaky software supply chain. The report provides a couple of advices on how to decrease the risk of supply chain attacks.</p><p><strong>Marcel Brown: This Day, August&nbsp;9 in Tech History</strong></p><p><a href="https://505updates.com/marcelbrown/" rel="noopener noreferrer" target="_blank"><strong>🇺🇸</strong>&nbsp;Marcel Brown, St. Louis, Missouri</a>August 9th, 1991. Astronauts aboard the Space Shuttle Atlantis, Mission STS43, use an Apple Macintosh portable computer to send what is considered the first email from space.</p>]]></description><content:encoded><![CDATA[<p>Free access to “It’s 5:05!” on your favorite podcast platforms:&nbsp;<a href="http://bit.ly/its505-free-access-on-all-podcast-platforms" rel="noopener noreferrer" target="_blank">bit.ly/its505-free-access-on-all-podcast-platforms</a>&nbsp;</p><p><strong>Edwin Kwan: Highly Accurate Acoustic Keylogger Attack</strong></p><p><a href="https://505updates.com/edwinkwan/" rel="noopener noreferrer" target="_blank">🇦🇺 Edwin Kwan, Sydney, Australia ↗</a></p><p>Academic researchers from British universities have developed a deep learning side channel attack that can be used to steal data from keyboard strokes that are recorded using a microphone with an accuracy of up to 95%.</p><p><strong>Trac Bannon: Top Vulnerabilities: Why don’t we learn?</strong></p><p><a href="https://505updates.com/tracbannon/" rel="noopener noreferrer" target="_blank"><strong>🇺🇸</strong>&nbsp;Tracy (Trac) Bannon, Camp Hill, Pennsylvania</a></p><p>Cybersecurity agencies from around the world have co-authored an alert that is peppered with words like “routinely” and “frequently”. It’s interesting to note the distribution of vendors involved in the Top 12 routinely exploited CVEs and CWEs.</p><p><strong>Katy Craig: Review of 2022 Vulnerabilities</strong></p><p><a href="https://505updates.com/katycraig/" rel="noopener noreferrer" target="_blank">🇺🇸 Katy Craig, San Diego, California</a></p><p>The world of cybercrime mirrors, the laws of nature; adapt or perish. The choice of targets heavily influence the selection of vulnerabilities. Cyber actors with precision akin to surgeons opt for vulnerabilities more rampant within the network landscape of their targets.</p><p><strong>Olimpiu Pop: Vulnerabilities PoV - Log4j Still Dangerous Two Years Later</strong></p><p><a href="http://505updates.com/olimpiupop/" rel="noopener noreferrer" target="_blank">🇷🇴 Olimpiu Pop, Transylvania, Romania</a></p><p>According to Sonatype, around a third of the related downloads from Maven Center are vulnerable. The main reason this happens is due to the shaky software supply chain. The report provides a couple of advices on how to decrease the risk of supply chain attacks.</p><p><strong>Marcel Brown: This Day, August&nbsp;9 in Tech History</strong></p><p><a href="https://505updates.com/marcelbrown/" rel="noopener noreferrer" target="_blank"><strong>🇺🇸</strong>&nbsp;Marcel Brown, St. Louis, Missouri</a>August 9th, 1991. Astronauts aboard the Space Shuttle Atlantis, Mission STS43, use an Apple Macintosh portable computer to send what is considered the first email from space.</p>]]></content:encoded><link><![CDATA[https://3zozb9fxlbueipjyapmaas.captivate.fm/episode/episode-203-top-vulnerabilities-why-dont-we-learn-review-of-2022-vulnerabilities-log4j-still-dangerous-two-years-later-]]></link><guid isPermaLink="false">e8ccb82a-77df-4c05-9287-8bec032c5c04</guid><itunes:image href="https://artwork.captivate.fm/33e2a4e7-a936-4ef5-905a-3a72363cfbe4/BkhMbfQsRHQi9QFk9GvnUJSv.png"/><dc:creator><![CDATA[Contributors from Around the World]]></dc:creator><pubDate>Wed, 09 Aug 2023 16:45:00 -0400</pubDate><enclosure url="https://dts.podtrac.com/redirect.mp3/podcasts.captivate.fm/media/a2ad97d5-c615-40c9-abbb-af8a821f34e9/505-2023-08-09-Episode-203-Final-converted.mp3" length="12152365" type="audio/mpeg"/><itunes:duration>12:40</itunes:duration><itunes:explicit>false</itunes:explicit><itunes:episodeType>full</itunes:episodeType><itunes:season>1</itunes:season><itunes:episode>203</itunes:episode><itunes:season>1</itunes:season><podcast:episode>203</podcast:episode><podcast:season>1</podcast:season><itunes:author>Contributors from Around the World</itunes:author></item><item><title>Episode #202 - Frequently Exploited Vulnerabilities in 2022; North Korean Hackers Versus Russian Missile Makers; Volt Typhoon creeps into Texas; Regulation China FR</title><itunes:title>Episode #202 - Frequently Exploited Vulnerabilities in 2022; North Korean Hackers Versus Russian Missile Makers; Volt Typhoon creeps into Texas; Regulation China FR</itunes:title><description><![CDATA[<p>🎙️ Free access to “It’s 5:05!” on your favorite podcast platforms: bit.ly/its505-free-access-on-all-podcast-platforms 📌</p><h3>Edwin Kwan: Frequently Exploited Vulnerabilities in 2022</h3><p><a href="https://505updates.com/edwinkwan/" rel="noopener noreferrer" target="_blank">🇦🇺 Edwin Kwan, Sydney, Australia ↗</a></p><p>A number of cybersecurity agencies have co-authored a joint Cybersecurity Advisory (CSA) on frequently exploited vulnerabilities in 2022. The advisory provides details on CVEs routinely and frequently exploited by cyber criminals.&nbsp;</p><h3>Ian Garrett: North Korean Hackers Versus Russian Missile Makers</h3><p><a href="https://505updates.com/iangarrett/" rel="noopener noreferrer" target="_blank"><strong>🇺🇸 </strong>Ian Garrett, Arlington, Virginia ↗</a></p><p>North Korean hackers and Russian missile makers sound like an excellent start to a movie. The North Korean Hacking Group known as ScarCruft has made headlines once again- this time for breaching the IT infrastructure and email server of a prominent Russian space rocket designer  and intercontinental ballistic missile engineering organization.</p><h3>Katy Craig: Volt Typhoon creeps into Texas</h3><p><a href="https://505updates.com/katycraig/" rel="noopener noreferrer" target="_blank">🇺🇸 Katy Craig, San Diego, California ↗</a></p><p>Brace yourselves for a grave cybersecurity threat lurking right at our doorstep. A notorious Chinese advanced persistent threat known as Volt Typhoon, has plans to sabotage the utilities and communication systems powering US military bases. And they've got their eyes on Texas</p><h3>Hillary Coover: Regulation China FR</h3><p><a href="http://505updates.com/hillarycoover/" rel="noopener noreferrer" target="_blank">🇺🇸 Hillary Coover, Washington, DC ↗</a></p><p>China responds to mounting privacy concerns by drafting stringent rules for facial recognition technology, demanding purpose, necessity, and consent in its use while curbing its application in sensitive spaces. </p>]]></description><content:encoded><![CDATA[<p>🎙️ Free access to “It’s 5:05!” on your favorite podcast platforms: bit.ly/its505-free-access-on-all-podcast-platforms 📌</p><h3>Edwin Kwan: Frequently Exploited Vulnerabilities in 2022</h3><p><a href="https://505updates.com/edwinkwan/" rel="noopener noreferrer" target="_blank">🇦🇺 Edwin Kwan, Sydney, Australia ↗</a></p><p>A number of cybersecurity agencies have co-authored a joint Cybersecurity Advisory (CSA) on frequently exploited vulnerabilities in 2022. The advisory provides details on CVEs routinely and frequently exploited by cyber criminals.&nbsp;</p><h3>Ian Garrett: North Korean Hackers Versus Russian Missile Makers</h3><p><a href="https://505updates.com/iangarrett/" rel="noopener noreferrer" target="_blank"><strong>🇺🇸 </strong>Ian Garrett, Arlington, Virginia ↗</a></p><p>North Korean hackers and Russian missile makers sound like an excellent start to a movie. The North Korean Hacking Group known as ScarCruft has made headlines once again- this time for breaching the IT infrastructure and email server of a prominent Russian space rocket designer  and intercontinental ballistic missile engineering organization.</p><h3>Katy Craig: Volt Typhoon creeps into Texas</h3><p><a href="https://505updates.com/katycraig/" rel="noopener noreferrer" target="_blank">🇺🇸 Katy Craig, San Diego, California ↗</a></p><p>Brace yourselves for a grave cybersecurity threat lurking right at our doorstep. A notorious Chinese advanced persistent threat known as Volt Typhoon, has plans to sabotage the utilities and communication systems powering US military bases. And they've got their eyes on Texas</p><h3>Hillary Coover: Regulation China FR</h3><p><a href="http://505updates.com/hillarycoover/" rel="noopener noreferrer" target="_blank">🇺🇸 Hillary Coover, Washington, DC ↗</a></p><p>China responds to mounting privacy concerns by drafting stringent rules for facial recognition technology, demanding purpose, necessity, and consent in its use while curbing its application in sensitive spaces. </p>]]></content:encoded><link><![CDATA[https://3zozb9fxlbueipjyapmaas.captivate.fm/episode/episode-202-frequently-exploited-vulnerabilities-in-2022-north-korean-hackers-versus-russian-missile-makers-volt-typhoon-creeps-into-texas-regulation-china-fr]]></link><guid isPermaLink="false">2916904f-b4f0-4817-a142-82f4d9def162</guid><itunes:image href="https://artwork.captivate.fm/641a485e-1b3d-4680-aa21-14a10588cf17/rx7nVX9gMCiyzyuncmH6TpuK.png"/><dc:creator><![CDATA[Contributors from Around the World]]></dc:creator><pubDate>Tue, 08 Aug 2023 16:45:00 -0400</pubDate><enclosure url="https://dts.podtrac.com/redirect.mp3/podcasts.captivate.fm/media/988e4c6a-e06a-49f0-ace1-353a92640faf/2023-08-08-Episode-202-converted.mp3" length="6305649" type="audio/mpeg"/><itunes:duration>08:45</itunes:duration><itunes:explicit>false</itunes:explicit><itunes:episodeType>full</itunes:episodeType><itunes:season>1</itunes:season><itunes:episode>202</itunes:episode><itunes:season>1</itunes:season><podcast:episode>202</podcast:episode><podcast:season>1</podcast:season><itunes:author>Contributors from Around the World</itunes:author></item><item><title>Episode #201 - Tax Refund Scams costing Australian Tax Office Over Half a Billion Dollars; Close that IDOR!; FraudGPT; Building Social Resilience</title><itunes:title>Episode #201 - Tax Refund Scams costing Australian Tax Office Over Half a Billion Dollars; Close that IDOR!; FraudGPT; Building Social Resilience</itunes:title><description><![CDATA[<p>🎙️ Free access to “It’s 5:05!” on your favorite podcast platforms: bit.ly/its505-free-access-on-all-podcast-platforms 📌</p><h3>Edwin Kwan: Tax Refund Scams costing Australian Tax Office Over Half a Billion Dollars</h3><p><a href="https://505updates.com/edwinkwan/" rel="noopener noreferrer" target="_blank">🇦🇺 Edwin Kwan, Sydney, Australia ↗</a></p><p>Cyber criminals have scammed the Australian Tax Office of more than half a billion dollars. They have done so by exploiting a weakness in the identification system used by the myGov online portal. The weakness allows them to redirect other people's tax refund to their own bank accounts.</p><p><strong>Julie Chatman: Close that IDOR!</strong></p><p><a href="https://505updates.com/juliechatman/" rel="noopener noreferrer" target="_blank"><strong>🇺🇸</strong> Julie Chatman, Washington, DC ↗</a></p><p>Do you remember a major breach from 2019 involving 800 million financial files, including bank account statements and mortgage payment documents? It happened due to a specific security flaw known as Insecure Direct Object References, or IDORs.&nbsp;&nbsp;</p><h3>Katy Craig: FraudGPT</h3><p><a href="https://505updates.com/katycraig/" rel="noopener noreferrer" target="_blank">🇺🇸 Katy Craig, San Diego, California ↗</a></p><p>Recently spotted in various dark web marketplaces and telegram channels, FraudGPT is not to be taken lightly. If the experts are right, this AI-powered bot is exclusively designed for offensive purposes.&nbsp; Think spear phishing emails, stealthy, malware creation, carding, and more.&nbsp;</p><h3>Hillary Coover: Building Social Resilience</h3><p><a href="http://505updates.com/hillarycoover/" rel="noopener noreferrer" target="_blank">🇺🇸 Hillary Coover, Washington, DC ↗</a></p><p>Amidst the rise of AI-powered disinformation and deep fakes, the world's upcoming elections in the US, UK, and India present a high-stakes battleground, where the fate of information integrity hangs in the balance. </p>]]></description><content:encoded><![CDATA[<p>🎙️ Free access to “It’s 5:05!” on your favorite podcast platforms: bit.ly/its505-free-access-on-all-podcast-platforms 📌</p><h3>Edwin Kwan: Tax Refund Scams costing Australian Tax Office Over Half a Billion Dollars</h3><p><a href="https://505updates.com/edwinkwan/" rel="noopener noreferrer" target="_blank">🇦🇺 Edwin Kwan, Sydney, Australia ↗</a></p><p>Cyber criminals have scammed the Australian Tax Office of more than half a billion dollars. They have done so by exploiting a weakness in the identification system used by the myGov online portal. The weakness allows them to redirect other people's tax refund to their own bank accounts.</p><p><strong>Julie Chatman: Close that IDOR!</strong></p><p><a href="https://505updates.com/juliechatman/" rel="noopener noreferrer" target="_blank"><strong>🇺🇸</strong> Julie Chatman, Washington, DC ↗</a></p><p>Do you remember a major breach from 2019 involving 800 million financial files, including bank account statements and mortgage payment documents? It happened due to a specific security flaw known as Insecure Direct Object References, or IDORs.&nbsp;&nbsp;</p><h3>Katy Craig: FraudGPT</h3><p><a href="https://505updates.com/katycraig/" rel="noopener noreferrer" target="_blank">🇺🇸 Katy Craig, San Diego, California ↗</a></p><p>Recently spotted in various dark web marketplaces and telegram channels, FraudGPT is not to be taken lightly. If the experts are right, this AI-powered bot is exclusively designed for offensive purposes.&nbsp; Think spear phishing emails, stealthy, malware creation, carding, and more.&nbsp;</p><h3>Hillary Coover: Building Social Resilience</h3><p><a href="http://505updates.com/hillarycoover/" rel="noopener noreferrer" target="_blank">🇺🇸 Hillary Coover, Washington, DC ↗</a></p><p>Amidst the rise of AI-powered disinformation and deep fakes, the world's upcoming elections in the US, UK, and India present a high-stakes battleground, where the fate of information integrity hangs in the balance. </p>]]></content:encoded><link><![CDATA[https://3zozb9fxlbueipjyapmaas.captivate.fm/episode/episode-201-tax-refund-scams-costing-australian-tax-office-over-half-a-billion-dollars-close-that-idor-fraudgpt-building-social-resilience]]></link><guid isPermaLink="false">479d1ecc-cb29-4b96-af76-fb8f25c763c7</guid><itunes:image href="https://artwork.captivate.fm/0560c241-272f-4f9c-8aa7-a1181a379233/4YGZoRt8Ndi4FA5638cGzxDB.png"/><dc:creator><![CDATA[Contributors from Around the World]]></dc:creator><pubDate>Mon, 07 Aug 2023 16:45:00 -0400</pubDate><enclosure url="https://dts.podtrac.com/redirect.mp3/podcasts.captivate.fm/media/5aeea873-16dd-4498-a6f3-18d0069252fc/2023-08-07-505-Episode-201-converted.mp3" length="7746667" type="audio/mpeg"/><itunes:duration>10:46</itunes:duration><itunes:explicit>false</itunes:explicit><itunes:episodeType>full</itunes:episodeType><itunes:season>1</itunes:season><itunes:episode>201</itunes:episode><itunes:season>1</itunes:season><podcast:episode>201</podcast:episode><podcast:season>1</podcast:season><itunes:author>Contributors from Around the World</itunes:author></item><item><title>Episode #200 - Potential WeChat Ban on Australian Government Devices, NATO Tech Funding, Apple Kernel Flaw CVE 2023-38606, New Apple Vulnerability: Device Owner Call To Action, Apple CVE, Operation Triangulation Take Two - Apple Gadgets Exploited in Data Stealing Operation?,  This Day, August 4, 5 in Tech History</title><itunes:title>Episode #200 - Potential WeChat Ban on Australian Government Devices, NATO Tech Funding, Apple Kernel Flaw CVE 2023-38606, New Apple Vulnerability: Device Owner Call To Action, Apple CVE, Operation Triangulation Take Two - Apple Gadgets Exploited in Data Stealing Operation?,  This Day, August 4, 5 in Tech History</itunes:title><description><![CDATA[<p>🎙️ Free access to “It’s 5:05!” on your favorite podcast platforms: bit.ly/its505-free-access-on-all-podcast-platforms 📌</p><p>Today is August 4th and it's our 200th episode at "It's 5:05". So we have something special planned. This is Executive Producer, Mark Miller. In addition to our regular format, we are extending the show today to include "The Story of the Week", where four of our journalists examine the same topic from different viewpoints.&nbsp;</p><p>With Apple's announcement of a critical exploit in it's kernel prior to 15.7.1, Tracy Bannon, Katy Craig, Olimpiu Pop, and Marcel Brown will give you their individual takes on this known vulnerability and what you can do about it.&nbsp;</p><p>It's a new format for us, so let us know what you think.&nbsp;</p><p>Thanks for joining us for our 200th episode. Here's to the next 200.&nbsp; </p><h3>Marcel Brown: This Day, August 4, 5 in Tech History</h3><p><a href="https://505updates.com/marcelbrown/" rel="noopener noreferrer" target="_blank"><strong>🇺🇸</strong> Marcel Brown, St. Louis, Missouri ↗</a></p><p>August 4th, 2007. NASA launches the Mars Phoenix lander. Phoenix would become the first spacecraft to land on the Martian arctic surface. Its mission was to dig for ice and assess if the Martian arctic ever had conditions that could have supported life.</p><h3>Edwin Kwan: Potential WeChat Ban on Australian Government Devices</h3><p><a href="https://505updates.com/edwinkwan/" rel="noopener noreferrer" target="_blank">🇦🇺 Edwin Kwan, Sydney, Australia ↗</a></p><p>A senate committee investigating interference in Australia by foreign powers through social media have released a report this week, which found that TikTok and WeChat could be the country's biggest security risk.&nbsp;</p><h3>Hillary Coover: NATO Tech Funding</h3><p><a href="http://505updates.com/hillarycoover/" rel="noopener noreferrer" target="_blank">🇺🇸 Hillary Coover, Washington, DC ↗</a></p><p> NATO just launched a €1 billion fund to support defense and security startups, benefiting its member countries during the ongoing Ukraine conflict.  </p><h3>Katy Craig: Apple Kernel Flaw CVE 2023-38606</h3><p><a href="https://505updates.com/katycraig/" rel="noopener noreferrer" target="_blank">🇺🇸 Katy Craig, San Diego, California ↗</a></p><h3>Trac Bannon: New Apple Vulnerability: Device Owner Call To Action</h3><p><a href="https://505updates.com/tracbannon/" rel="noopener noreferrer" target="_blank"><strong>🇺🇸</strong> Tracy (Trac) Bannon, Camp Hill, Pennsylvania↗</a></p><h3>Marcel Brown: Apple CVE</h3><p><a href="https://505updates.com/marcelbrown/" rel="noopener noreferrer" target="_blank"><strong>🇺🇸</strong> Marcel Brown, St. Louis, Missouri ↗</a></p><h3>Olimpiu Pop: Apple Gadgets Exploited in Data Stealing Operations</h3><p><a href="http://505updates.com/olimpiupop/" rel="noopener noreferrer" target="_blank">🇷🇴 Olimpiu Pop, Transylvania, Romania ↗</a></p><p><br></p>]]></description><content:encoded><![CDATA[<p>🎙️ Free access to “It’s 5:05!” on your favorite podcast platforms: bit.ly/its505-free-access-on-all-podcast-platforms 📌</p><p>Today is August 4th and it's our 200th episode at "It's 5:05". So we have something special planned. This is Executive Producer, Mark Miller. In addition to our regular format, we are extending the show today to include "The Story of the Week", where four of our journalists examine the same topic from different viewpoints.&nbsp;</p><p>With Apple's announcement of a critical exploit in it's kernel prior to 15.7.1, Tracy Bannon, Katy Craig, Olimpiu Pop, and Marcel Brown will give you their individual takes on this known vulnerability and what you can do about it.&nbsp;</p><p>It's a new format for us, so let us know what you think.&nbsp;</p><p>Thanks for joining us for our 200th episode. Here's to the next 200.&nbsp; </p><h3>Marcel Brown: This Day, August 4, 5 in Tech History</h3><p><a href="https://505updates.com/marcelbrown/" rel="noopener noreferrer" target="_blank"><strong>🇺🇸</strong> Marcel Brown, St. Louis, Missouri ↗</a></p><p>August 4th, 2007. NASA launches the Mars Phoenix lander. Phoenix would become the first spacecraft to land on the Martian arctic surface. Its mission was to dig for ice and assess if the Martian arctic ever had conditions that could have supported life.</p><h3>Edwin Kwan: Potential WeChat Ban on Australian Government Devices</h3><p><a href="https://505updates.com/edwinkwan/" rel="noopener noreferrer" target="_blank">🇦🇺 Edwin Kwan, Sydney, Australia ↗</a></p><p>A senate committee investigating interference in Australia by foreign powers through social media have released a report this week, which found that TikTok and WeChat could be the country's biggest security risk.&nbsp;</p><h3>Hillary Coover: NATO Tech Funding</h3><p><a href="http://505updates.com/hillarycoover/" rel="noopener noreferrer" target="_blank">🇺🇸 Hillary Coover, Washington, DC ↗</a></p><p> NATO just launched a €1 billion fund to support defense and security startups, benefiting its member countries during the ongoing Ukraine conflict.  </p><h3>Katy Craig: Apple Kernel Flaw CVE 2023-38606</h3><p><a href="https://505updates.com/katycraig/" rel="noopener noreferrer" target="_blank">🇺🇸 Katy Craig, San Diego, California ↗</a></p><h3>Trac Bannon: New Apple Vulnerability: Device Owner Call To Action</h3><p><a href="https://505updates.com/tracbannon/" rel="noopener noreferrer" target="_blank"><strong>🇺🇸</strong> Tracy (Trac) Bannon, Camp Hill, Pennsylvania↗</a></p><h3>Marcel Brown: Apple CVE</h3><p><a href="https://505updates.com/marcelbrown/" rel="noopener noreferrer" target="_blank"><strong>🇺🇸</strong> Marcel Brown, St. Louis, Missouri ↗</a></p><h3>Olimpiu Pop: Apple Gadgets Exploited in Data Stealing Operations</h3><p><a href="http://505updates.com/olimpiupop/" rel="noopener noreferrer" target="_blank">🇷🇴 Olimpiu Pop, Transylvania, Romania ↗</a></p><p><br></p>]]></content:encoded><link><![CDATA[https://3zozb9fxlbueipjyapmaas.captivate.fm/episode/episode-200-potential-wechat-ban-on-australian-government-devices-nato-tech-funding-apple-kernel-flaw-cve-2023-38606-new-apple-vulnerability-device-owner-call-to-action-apple-cve-operation-triangulation-take-two-apple-gadgets-exploited-in-data-stealing...]]></link><guid isPermaLink="false">8e128dab-6a9b-4ebd-9248-2a3a25b46490</guid><itunes:image href="https://artwork.captivate.fm/626c2b85-87d6-4330-91db-71cdc86dba9e/p4t_EApVRSkGUucnd4I5udgP.png"/><dc:creator><![CDATA[Contributors from Around the World]]></dc:creator><pubDate>Fri, 04 Aug 2023 16:45:00 -0400</pubDate><enclosure url="https://dts.podtrac.com/redirect.mp3/podcasts.captivate.fm/media/4aa50183-11f4-450f-9014-42c644522b30/2023-08-04-505-Episode-200-converted.mp3" length="10492031" type="audio/mpeg"/><itunes:duration>14:34</itunes:duration><itunes:explicit>false</itunes:explicit><itunes:episodeType>full</itunes:episodeType><itunes:season>1</itunes:season><itunes:episode>200</itunes:episode><itunes:season>1</itunes:season><podcast:episode>200</podcast:episode><podcast:season>1</podcast:season><itunes:author>Contributors from Around the World</itunes:author></item><item><title>Episode #199 - Don&apos;t Let Your Printer Compromise Your Network; Space Pirates Attack Across Russia and Serbia; Worldcoin says it will share its data; Apple and UK; UK Ambulance Patient Records Hauled Offline Cyber Attack Probe; This Day, August  3 in Tech History</title><itunes:title>Episode #199 - Don&apos;t Let Your Printer Compromise Your Network; Space Pirates Attack Across Russia and Serbia; Worldcoin says it will share its data; Apple and UK; UK Ambulance Patient Records Hauled Offline Cyber Attack Probe; This Day, August  3 in Tech History</itunes:title><description><![CDATA[<p>🎙️ Free access to “It’s 5:05!” on your favorite podcast platforms: bit.ly/its505-free-access-on-all-podcast-platforms 📌</p><h3>Marcel Brown: This Day, August&nbsp; 3 in Tech History</h3><p><a href="https://505updates.com/marcelbrown/" rel="noopener noreferrer" target="_blank"><strong>🇺🇸</strong> Marcel Brown, St. Louis, Missouri ↗</a></p><p>August 3rd, 1977. Radio Shack introduces their first computer, the TRS80. Originally forecasting sales of just 3000 to 5,000 per year, the TRS80 sold over 10,000 units in the first month and a half of sales. and 200,000 over the lifetime of the product.&nbsp;&nbsp;</p><h3>Edwin Kwan: Don't Let Your Printer Compromise Your Network</h3><p><a href="https://505updates.com/edwinkwan/" rel="noopener noreferrer" target="_blank">🇦🇺 Edwin Kwan, Sydney, Australia ↗</a></p><p>Canon recently released a security advisory stating that Wi-Fi connection information does not get wiped on some of their inkjet printers during initialization. The Wi-Fi connection information includes wifi network,&nbsp; SSID,&nbsp; password, network type, such as WPA3 or WEP,&nbsp; assigned IP address, MAC address, and network profile.&nbsp;</p><h3>Ian Garrett: Space Pirates Attack Across Russia and Serbia</h3><p><a href="https://505updates.com/iangarrett/" rel="noopener noreferrer" target="_blank"><strong>🇺🇸 </strong>Ian Garrett, Arlington, Virginia ↗</a></p><p>First aliens and now Space Pirates? In this case, it's the notorious threat actor known as Space Pirates, and they've launched attacks across Russia and Serbia using novel tactics targeting various sectors, from government agencies and educational institutions, to aerospace manufacturers and healthcare firms.</p><h3>Olimpiu Pop: Break the Silos to Achieve Cyberresillience</h3><p><a href="http://505updates.com/olimpiupop/" rel="noopener noreferrer" target="_blank">🇷🇴 Olimpiu Pop, Transylvania, Romania ↗</a></p><p>The expected investment in cybersecurity is estimated at $1.75 trillion by 2025- equivalent to the GDP of the ninth largest economy in the world, Canada. What beats that? The projected cost of global cybercrime- $10.5 trillion- about half of the GDP of the largest economy, the US.</p><h3>Katy Craig: Worldcoin says it will share its data</h3><p><a href="https://505updates.com/katycraig/" rel="noopener noreferrer" target="_blank">🇺🇸 Katy Craig, San Diego, California ↗</a></p><p>Worldcoin, the brainchild of OpenAI's Sam Altman, keeps making headlines with its iris-scanning orb. Worldcoin's ambition goes beyond just offering free crypto tokens.&nbsp;</p><h3>Marcel Brown: Apple and UK</h3><p><a href="https://505updates.com/marcelbrown/" rel="noopener noreferrer" target="_blank"><strong>🇺🇸</strong> Marcel Brown, St. Louis, Missouri ↗</a></p><p>The UK government is attempting to update the Investigatory Powers Act of 2016, in order to force message providers to provide back doors into their encrypted messaging systems. Apple has joined WhatsApp and Signal in basically stating&nbsp; their only option will be to remove their services if these laws are passed.</p><h3>Olimpiu Pop: UK Ambulance Patient Records Hauled Offline Cyber Attack Probe</h3><p><a href="http://505updates.com/olimpiupop/" rel="noopener noreferrer" target="_blank">🇷🇴 Olimpiu Pop, Transylvania, Romania ↗</a></p><p>Ambulance patients from cities such as Bristol or Oxfordshire, and regions of Cornwall and Devon were impacted by a cyber attack targeted against health software company Ortivus, based in Sweden. </p>]]></description><content:encoded><![CDATA[<p>🎙️ Free access to “It’s 5:05!” on your favorite podcast platforms: bit.ly/its505-free-access-on-all-podcast-platforms 📌</p><h3>Marcel Brown: This Day, August&nbsp; 3 in Tech History</h3><p><a href="https://505updates.com/marcelbrown/" rel="noopener noreferrer" target="_blank"><strong>🇺🇸</strong> Marcel Brown, St. Louis, Missouri ↗</a></p><p>August 3rd, 1977. Radio Shack introduces their first computer, the TRS80. Originally forecasting sales of just 3000 to 5,000 per year, the TRS80 sold over 10,000 units in the first month and a half of sales. and 200,000 over the lifetime of the product.&nbsp;&nbsp;</p><h3>Edwin Kwan: Don't Let Your Printer Compromise Your Network</h3><p><a href="https://505updates.com/edwinkwan/" rel="noopener noreferrer" target="_blank">🇦🇺 Edwin Kwan, Sydney, Australia ↗</a></p><p>Canon recently released a security advisory stating that Wi-Fi connection information does not get wiped on some of their inkjet printers during initialization. The Wi-Fi connection information includes wifi network,&nbsp; SSID,&nbsp; password, network type, such as WPA3 or WEP,&nbsp; assigned IP address, MAC address, and network profile.&nbsp;</p><h3>Ian Garrett: Space Pirates Attack Across Russia and Serbia</h3><p><a href="https://505updates.com/iangarrett/" rel="noopener noreferrer" target="_blank"><strong>🇺🇸 </strong>Ian Garrett, Arlington, Virginia ↗</a></p><p>First aliens and now Space Pirates? In this case, it's the notorious threat actor known as Space Pirates, and they've launched attacks across Russia and Serbia using novel tactics targeting various sectors, from government agencies and educational institutions, to aerospace manufacturers and healthcare firms.</p><h3>Olimpiu Pop: Break the Silos to Achieve Cyberresillience</h3><p><a href="http://505updates.com/olimpiupop/" rel="noopener noreferrer" target="_blank">🇷🇴 Olimpiu Pop, Transylvania, Romania ↗</a></p><p>The expected investment in cybersecurity is estimated at $1.75 trillion by 2025- equivalent to the GDP of the ninth largest economy in the world, Canada. What beats that? The projected cost of global cybercrime- $10.5 trillion- about half of the GDP of the largest economy, the US.</p><h3>Katy Craig: Worldcoin says it will share its data</h3><p><a href="https://505updates.com/katycraig/" rel="noopener noreferrer" target="_blank">🇺🇸 Katy Craig, San Diego, California ↗</a></p><p>Worldcoin, the brainchild of OpenAI's Sam Altman, keeps making headlines with its iris-scanning orb. Worldcoin's ambition goes beyond just offering free crypto tokens.&nbsp;</p><h3>Marcel Brown: Apple and UK</h3><p><a href="https://505updates.com/marcelbrown/" rel="noopener noreferrer" target="_blank"><strong>🇺🇸</strong> Marcel Brown, St. Louis, Missouri ↗</a></p><p>The UK government is attempting to update the Investigatory Powers Act of 2016, in order to force message providers to provide back doors into their encrypted messaging systems. Apple has joined WhatsApp and Signal in basically stating&nbsp; their only option will be to remove their services if these laws are passed.</p><h3>Olimpiu Pop: UK Ambulance Patient Records Hauled Offline Cyber Attack Probe</h3><p><a href="http://505updates.com/olimpiupop/" rel="noopener noreferrer" target="_blank">🇷🇴 Olimpiu Pop, Transylvania, Romania ↗</a></p><p>Ambulance patients from cities such as Bristol or Oxfordshire, and regions of Cornwall and Devon were impacted by a cyber attack targeted against health software company Ortivus, based in Sweden. </p>]]></content:encoded><link><![CDATA[https://3zozb9fxlbueipjyapmaas.captivate.fm/episode/episode-199-dont-let-your-printer-compromise-your-network-space-pirates-attack-across-russia-and-serbia-worldcoin-says-it-will-share-its-data-apple-and-uk-uk-ambulance-patient-records-hauled-offline-cyber-attack-probe-this-day-august-3-in-tech-history]]></link><guid isPermaLink="false">89b7e312-b400-4990-8cfa-e80db0ed8479</guid><itunes:image href="https://artwork.captivate.fm/bceab8a3-cf69-413e-9256-b8441b03c7f9/EyDtyqEuW6GHYbZUbnqFIv_u.png"/><dc:creator><![CDATA[Contributors from Around the World]]></dc:creator><pubDate>Thu, 03 Aug 2023 16:45:00 -0400</pubDate><enclosure url="https://dts.podtrac.com/redirect.mp3/podcasts.captivate.fm/media/f8605772-07ae-4b51-a0e6-ae271f53d706/2023-08-03-505-episode-199-converted.mp3" length="10741973" type="audio/mpeg"/><itunes:duration>12:47</itunes:duration><itunes:explicit>false</itunes:explicit><itunes:episodeType>full</itunes:episodeType><itunes:season>1</itunes:season><itunes:episode>199</itunes:episode><itunes:season>1</itunes:season><podcast:episode>199</podcast:episode><podcast:season>1</podcast:season><itunes:author>Contributors from Around the World</itunes:author></item><item><title>Episode #198 - Australian Government Initiative to Improve Cyber Security Suffers Data Leak; What the fork?; Break the Silos to Achieve Cyberresillience; Connected Cars; This Day, August  2 in Tech History</title><itunes:title>Episode #198 - Australian Government Initiative to Improve Cyber Security Suffers Data Leak; What the fork?; Break the Silos to Achieve Cyberresillience; Connected Cars; This Day, August  2 in Tech History</itunes:title><description><![CDATA[<p>🎙️ Free access to “It’s 5:05!” on your favorite podcast platforms: bit.ly/its505-free-access-on-all-podcast-platforms 📌</p><h3>Marcel Brown: This Day, August&nbsp; 2 in Tech History</h3><p><a href="https://505updates.com/marcelbrown/" rel="noopener noreferrer" target="_blank"><strong>🇺🇸</strong> Marcel Brown, St. Louis, Missouri ↗</a></p><p>August 2nd, 1873. The Clay Street Railroad begins operation, making it the first cable car in San Francisco's now famous cable car system. And for many of us growing up in the 1980's, cable cars also became synonymous with Rice-A-Roni®, the San Francisco treat.</p><h3>Edwin Kwan: Australian Government Initiative to Improve Cyber Security Suffers Data Leak</h3><p><a href="https://505updates.com/edwinkwan/" rel="noopener noreferrer" target="_blank">🇦🇺 Edwin Kwan, Sydney, Australia ↗</a></p><p>The Home Affairs Department suffered a data leak when they accidentally published personal information of more than 50 small businesses who participated in a cybersecurity survey.</p><h3>Kadi Grigg: What the fork?</h3><p><a href="https://505updates.com/kadigrigg/" rel="noopener noreferrer" target="_blank">🇺🇸 Kadi Grigg,Alexandria, Virginia </a>↗</p><p>As of July 11th, SUSE publicly announced its intention to fork the open source version of Red Hat Enterprise Linux, also known as RHEL, and will be developing and maintaining that code in compatible distribution that will be available without any restrictions as per the announcement.</p><h3>Olimpiu Pop: Break the Silos to Achieve Cyberresillience</h3><p><a href="http://505updates.com/olimpiupop/" rel="noopener noreferrer" target="_blank">🇷🇴 Olimpiu Pop, Transylvania, Romania ↗</a></p><p>The expected investment in cybersecurity is estimated at $1.75 trillion by 2025- equivalent to the GDP of the ninth largest economy in the world, Canada. What beats that? The projected cost of global cybercrime- $10.5 trillion- about half of the GDP of the largest economy, the US.</p><h3>Katy Craig: Connected Cars</h3><p><a href="https://505updates.com/katycraig/" rel="noopener noreferrer" target="_blank">🇺🇸 Katy Craig, San Diego, California ↗</a></p><p> In today's digital age, it seems our cars aren't just for driving anymore. They're another frontier in the quest for privacy.&nbsp;</p>]]></description><content:encoded><![CDATA[<p>🎙️ Free access to “It’s 5:05!” on your favorite podcast platforms: bit.ly/its505-free-access-on-all-podcast-platforms 📌</p><h3>Marcel Brown: This Day, August&nbsp; 2 in Tech History</h3><p><a href="https://505updates.com/marcelbrown/" rel="noopener noreferrer" target="_blank"><strong>🇺🇸</strong> Marcel Brown, St. Louis, Missouri ↗</a></p><p>August 2nd, 1873. The Clay Street Railroad begins operation, making it the first cable car in San Francisco's now famous cable car system. And for many of us growing up in the 1980's, cable cars also became synonymous with Rice-A-Roni®, the San Francisco treat.</p><h3>Edwin Kwan: Australian Government Initiative to Improve Cyber Security Suffers Data Leak</h3><p><a href="https://505updates.com/edwinkwan/" rel="noopener noreferrer" target="_blank">🇦🇺 Edwin Kwan, Sydney, Australia ↗</a></p><p>The Home Affairs Department suffered a data leak when they accidentally published personal information of more than 50 small businesses who participated in a cybersecurity survey.</p><h3>Kadi Grigg: What the fork?</h3><p><a href="https://505updates.com/kadigrigg/" rel="noopener noreferrer" target="_blank">🇺🇸 Kadi Grigg,Alexandria, Virginia </a>↗</p><p>As of July 11th, SUSE publicly announced its intention to fork the open source version of Red Hat Enterprise Linux, also known as RHEL, and will be developing and maintaining that code in compatible distribution that will be available without any restrictions as per the announcement.</p><h3>Olimpiu Pop: Break the Silos to Achieve Cyberresillience</h3><p><a href="http://505updates.com/olimpiupop/" rel="noopener noreferrer" target="_blank">🇷🇴 Olimpiu Pop, Transylvania, Romania ↗</a></p><p>The expected investment in cybersecurity is estimated at $1.75 trillion by 2025- equivalent to the GDP of the ninth largest economy in the world, Canada. What beats that? The projected cost of global cybercrime- $10.5 trillion- about half of the GDP of the largest economy, the US.</p><h3>Katy Craig: Connected Cars</h3><p><a href="https://505updates.com/katycraig/" rel="noopener noreferrer" target="_blank">🇺🇸 Katy Craig, San Diego, California ↗</a></p><p> In today's digital age, it seems our cars aren't just for driving anymore. They're another frontier in the quest for privacy.&nbsp;</p>]]></content:encoded><link><![CDATA[https://3zozb9fxlbueipjyapmaas.captivate.fm/episode/episode-198-australian-government-initiative-to-improve-cyber-security-suffers-data-leak-what-the-fork-break-the-silos-to-achieve-cyberresillience-connected-cars-this-day-august-2-in-tech-history]]></link><guid isPermaLink="false">e48fbd2d-86e6-4991-9143-dc422c09306b</guid><itunes:image href="https://artwork.captivate.fm/7894c849-4ced-40ff-9967-9f8831ade53f/67GgUkuVPPIOzIjKhKEEvT-S.png"/><dc:creator><![CDATA[Contributors from Around the World]]></dc:creator><pubDate>Wed, 02 Aug 2023 16:45:00 -0400</pubDate><enclosure url="https://dts.podtrac.com/redirect.mp3/podcasts.captivate.fm/media/d53984db-6100-47fa-9a20-b70777af04bb/2023-08-02-505-Episode-198-converted.mp3" length="7790869" type="audio/mpeg"/><itunes:duration>10:49</itunes:duration><itunes:explicit>false</itunes:explicit><itunes:episodeType>full</itunes:episodeType><itunes:season>1</itunes:season><itunes:episode>198</itunes:episode><itunes:season>1</itunes:season><podcast:episode>198</podcast:episode><podcast:season>1</podcast:season><itunes:author>Contributors from Around the World</itunes:author></item><item><title>Episode #197 - Déjà vu-lnerability - What is Old can be a Zero-day Again; Android Messaging Spyware App Steals Signal and WhatsApp Data; France balks at Worldcoin; China Misinformation; This Day, August  1 in Tech History</title><itunes:title>Episode #197 - Déjà vu-lnerability - What is Old can be a Zero-day Again; Android Messaging Spyware App Steals Signal and WhatsApp Data; France balks at Worldcoin; China Misinformation; This Day, August  1 in Tech History</itunes:title><description><![CDATA[<p>🎙️ Free access to “It’s 5:05!” on your favorite podcast platforms: bit.ly/its505-free-access-on-all-podcast-platforms 📌</p><h3>Marcel Brown: This Day, August&nbsp; 1 in Tech History</h3><p><a href="https://505updates.com/marcelbrown/" rel="noopener noreferrer" target="_blank"><strong>🇺🇸</strong> Marcel Brown, St. Louis, Missouri ↗</a></p><p>August 1st, 1981. MTV, presumably standing for "Music Television," launches on cable TV. As most people know, after the introduction sequence, the first video played was "Video Killed the Radio Star" by The Buggles. However, a bit of trivia is that the second song played was "You Better Run" by Pat Benatar.</p><h3>Edwin Kwan: Déjà vu-lnerability - What is Old can be a Zero-day Again</h3><p><a href="https://505updates.com/edwinkwan/" rel="noopener noreferrer" target="_blank">🇦🇺 Edwin Kwan, Sydney, Australia ↗</a></p><p>Researchers from Google's Threat Analysis Group released a review report of zero-day vulnerabilities that were exploited in the wild in 2022. A total of 41&nbsp; zero-day vulnerabilities were detected and disclosed that year. This is a 40% decrease from the previous year, which had 69 detected zero-day vulnerabilities.</p><h3>Ian Garrett: Android Messaging Spyware App Steals Signal and WhatsApp Data</h3><p><a href="https://505updates.com/iangarrett/" rel="noopener noreferrer" target="_blank"><strong>🇺🇸 </strong>Ian Garrett, Arlington, Virginia ↗</a></p><p>SafeChat is anything but safe. The spyware app is being used by hackers to steal sensitive user data. Researchers at CYFIRMA have discovered that this malicious app is suspected to be a variant of the infamous " Coverlm" spyware, known for targeting popular communication apps like Signal, WhatsApp, and Telegram.</p><h3>Katy Craig: France balks at Worldcoin</h3><p><a href="https://505updates.com/katycraig/" rel="noopener noreferrer" target="_blank">🇺🇸 Katy Craig, San Diego, California ↗</a></p><p>Imagine walking into a sign-up location and encountering a shiny, futuristic sphere scanning your face like something out of Star Trek. That's exactly what's happening at various Worldcoin locations across the globe.&nbsp; It seems to be working, as they've already attracted 2.1 million users.&nbsp;</p><p>But not everything is smooth sailing for Worldcoin.</p><h3>Hillary Coover: China Misinformation</h3><p><a href="http://505updates.com/hillarycoover/" rel="noopener noreferrer" target="_blank">🇺🇸 Hillary Coover, Washington, DC ↗</a></p><p>A Chinese marketing firm with connections to Chinese government actors has been involved in an influence campaign aimed at improving Beijing's image abroad. Who cares? Doesn't every government do this? </p>]]></description><content:encoded><![CDATA[<p>🎙️ Free access to “It’s 5:05!” on your favorite podcast platforms: bit.ly/its505-free-access-on-all-podcast-platforms 📌</p><h3>Marcel Brown: This Day, August&nbsp; 1 in Tech History</h3><p><a href="https://505updates.com/marcelbrown/" rel="noopener noreferrer" target="_blank"><strong>🇺🇸</strong> Marcel Brown, St. Louis, Missouri ↗</a></p><p>August 1st, 1981. MTV, presumably standing for "Music Television," launches on cable TV. As most people know, after the introduction sequence, the first video played was "Video Killed the Radio Star" by The Buggles. However, a bit of trivia is that the second song played was "You Better Run" by Pat Benatar.</p><h3>Edwin Kwan: Déjà vu-lnerability - What is Old can be a Zero-day Again</h3><p><a href="https://505updates.com/edwinkwan/" rel="noopener noreferrer" target="_blank">🇦🇺 Edwin Kwan, Sydney, Australia ↗</a></p><p>Researchers from Google's Threat Analysis Group released a review report of zero-day vulnerabilities that were exploited in the wild in 2022. A total of 41&nbsp; zero-day vulnerabilities were detected and disclosed that year. This is a 40% decrease from the previous year, which had 69 detected zero-day vulnerabilities.</p><h3>Ian Garrett: Android Messaging Spyware App Steals Signal and WhatsApp Data</h3><p><a href="https://505updates.com/iangarrett/" rel="noopener noreferrer" target="_blank"><strong>🇺🇸 </strong>Ian Garrett, Arlington, Virginia ↗</a></p><p>SafeChat is anything but safe. The spyware app is being used by hackers to steal sensitive user data. Researchers at CYFIRMA have discovered that this malicious app is suspected to be a variant of the infamous " Coverlm" spyware, known for targeting popular communication apps like Signal, WhatsApp, and Telegram.</p><h3>Katy Craig: France balks at Worldcoin</h3><p><a href="https://505updates.com/katycraig/" rel="noopener noreferrer" target="_blank">🇺🇸 Katy Craig, San Diego, California ↗</a></p><p>Imagine walking into a sign-up location and encountering a shiny, futuristic sphere scanning your face like something out of Star Trek. That's exactly what's happening at various Worldcoin locations across the globe.&nbsp; It seems to be working, as they've already attracted 2.1 million users.&nbsp;</p><p>But not everything is smooth sailing for Worldcoin.</p><h3>Hillary Coover: China Misinformation</h3><p><a href="http://505updates.com/hillarycoover/" rel="noopener noreferrer" target="_blank">🇺🇸 Hillary Coover, Washington, DC ↗</a></p><p>A Chinese marketing firm with connections to Chinese government actors has been involved in an influence campaign aimed at improving Beijing's image abroad. Who cares? Doesn't every government do this? </p>]]></content:encoded><link><![CDATA[https://3zozb9fxlbueipjyapmaas.captivate.fm/episode/episode-197-deja-vu-lnerability-what-is-old-can-be-a-zero-day-again-android-messaging-spyware-app-steals-signal-and-whatsapp-data-france-balks-at-worldcoin-chin-misinformation-this-day-august-1-in-tech-history]]></link><guid isPermaLink="false">e4e56ee1-2aa3-4d9d-b004-5e6cdbf786b5</guid><itunes:image href="https://artwork.captivate.fm/6c48a270-f90f-4f78-9449-c6a4e1bed405/6uButQEeGwknOuknsTtGZKPP.png"/><dc:creator><![CDATA[Contributors from Around the World]]></dc:creator><pubDate>Tue, 01 Aug 2023 16:45:00 -0400</pubDate><enclosure url="https://dts.podtrac.com/redirect.mp3/podcasts.captivate.fm/media/da7c2dcb-8d71-478f-a0a5-1eb7ff630b98/2023-08-01-505-Episode-197-converted.mp3" length="7930047" type="audio/mpeg"/><itunes:duration>11:01</itunes:duration><itunes:explicit>false</itunes:explicit><itunes:episodeType>full</itunes:episodeType><itunes:season>1</itunes:season><itunes:episode>197</itunes:episode><itunes:season>1</itunes:season><podcast:episode>197</podcast:episode><podcast:season>1</podcast:season><itunes:author>Contributors from Around the World</itunes:author></item><item><title>Episode #196 - Easy to Exploit Vulnerabilities Affecting 40% of Ubuntu Systems; CRA Moves Into Negotiations With The Council; Hackers unleash ZIP Domains; Smart Car Data; This Day, July 30 &amp; 31 in Tech History</title><itunes:title>Episode #196 - Easy to Exploit Vulnerabilities Affecting 40% of Ubuntu Systems; CRA Moves Into Negotiations With The Council; Hackers unleash ZIP Domains; Smart Car Data; This Day, July 30 &amp; 31 in Tech History</itunes:title><description><![CDATA[<p>🎙️ Free access to “It’s 5:05!” on your favorite podcast platforms: bit.ly/its505-free-access-on-all-podcast-platforms 📌</p><h3>Easy to Exploit Vulnerabilities Affecting 40% of Ubuntu Systems</h3><p><a href="https://505updates.com/edwinkwan/" rel="noopener noreferrer" target="_blank">🇦🇺 Edwin Kwan, Sydney, Australia ↗</a></p><p>40% of Ubuntu cloud workloads are affected by two easy-to-exploit privilege escalation vulnerabilities. Ubuntu has an approximate user base of over 40 million.</p><p><strong>CRA Moves Into Negotiations With The Council</strong></p><p><a href="http://505updates.com/olimpiupop/" rel="noopener noreferrer" target="_blank">🇷🇴 Olimpiu Pop, Transylvania, Romania ↗</a></p><p>The Cyber Resilience Act, a significant piece of legislation, has caused a stir among the foundations backing open source software. The endorsement from the Industry, Research, and Energy Committee of the EU has only added fuel to the fire.&nbsp;</p><h3>Hackers unleash ZIP Domains</h3><p><a href="https://505updates.com/katycraig/" rel="noopener noreferrer" target="_blank">🇺🇸 Katy Craig, San Diego, California ↗</a></p><p>Phishing attacks are getting sneakier, my cyber-savvy friends. The bad guys have found a new trick by exploiting the newly introduced '.ZIP' Top-Level Domain. You know, those final bits of a website, address like '.COM,' or '.ORG.'&nbsp;</p><h3>Hillary Coover: Smart Car Data</h3><p><a href="http://505updates.com/hillarycoover/" rel="noopener noreferrer" target="_blank">🇺🇸 Hillary Coover, Washington, DC ↗</a></p><p>Connected cars can gather a wealth of information through free built-in apps, sensors, and cameras, raising concerns about who controls this data. Do you know how valuable you are as a product or how your data is being used?&nbsp;</p><h3>Marcel Brown: This Day, July 30 &amp; 31 in Tech History</h3><p><a href="https://505updates.com/marcelbrown/" rel="noopener noreferrer" target="_blank"><strong>🇺🇸</strong> Marcel Brown, St. Louis, Missouri ↗</a></p><p>July 31st, 1971. Using the battery-powered Lunar Roving Vehicle, Astronaut David Scott of the Apollo 15 mission becomes the first person to drive a vehicle on the Moon.</p>]]></description><content:encoded><![CDATA[<p>🎙️ Free access to “It’s 5:05!” on your favorite podcast platforms: bit.ly/its505-free-access-on-all-podcast-platforms 📌</p><h3>Easy to Exploit Vulnerabilities Affecting 40% of Ubuntu Systems</h3><p><a href="https://505updates.com/edwinkwan/" rel="noopener noreferrer" target="_blank">🇦🇺 Edwin Kwan, Sydney, Australia ↗</a></p><p>40% of Ubuntu cloud workloads are affected by two easy-to-exploit privilege escalation vulnerabilities. Ubuntu has an approximate user base of over 40 million.</p><p><strong>CRA Moves Into Negotiations With The Council</strong></p><p><a href="http://505updates.com/olimpiupop/" rel="noopener noreferrer" target="_blank">🇷🇴 Olimpiu Pop, Transylvania, Romania ↗</a></p><p>The Cyber Resilience Act, a significant piece of legislation, has caused a stir among the foundations backing open source software. The endorsement from the Industry, Research, and Energy Committee of the EU has only added fuel to the fire.&nbsp;</p><h3>Hackers unleash ZIP Domains</h3><p><a href="https://505updates.com/katycraig/" rel="noopener noreferrer" target="_blank">🇺🇸 Katy Craig, San Diego, California ↗</a></p><p>Phishing attacks are getting sneakier, my cyber-savvy friends. The bad guys have found a new trick by exploiting the newly introduced '.ZIP' Top-Level Domain. You know, those final bits of a website, address like '.COM,' or '.ORG.'&nbsp;</p><h3>Hillary Coover: Smart Car Data</h3><p><a href="http://505updates.com/hillarycoover/" rel="noopener noreferrer" target="_blank">🇺🇸 Hillary Coover, Washington, DC ↗</a></p><p>Connected cars can gather a wealth of information through free built-in apps, sensors, and cameras, raising concerns about who controls this data. Do you know how valuable you are as a product or how your data is being used?&nbsp;</p><h3>Marcel Brown: This Day, July 30 &amp; 31 in Tech History</h3><p><a href="https://505updates.com/marcelbrown/" rel="noopener noreferrer" target="_blank"><strong>🇺🇸</strong> Marcel Brown, St. Louis, Missouri ↗</a></p><p>July 31st, 1971. Using the battery-powered Lunar Roving Vehicle, Astronaut David Scott of the Apollo 15 mission becomes the first person to drive a vehicle on the Moon.</p>]]></content:encoded><link><![CDATA[https://3zozb9fxlbueipjyapmaas.captivate.fm/episode/episode-196-easy-to-exploit-vulnerabilities-affecting-40-of-ubuntu-systems-cra-moves-into-negotiations-with-the-council-hackers-unleash-zip-domains-smart-car-data-this-day-july-30-31-in-tech-history]]></link><guid isPermaLink="false">acc23726-00b5-4382-a2a0-47f7ac9558af</guid><itunes:image href="https://artwork.captivate.fm/e754e254-6291-4472-88a5-21eb38cf6e9f/d06V9h7-yH4pjf6H4tlYtIO-.png"/><dc:creator><![CDATA[Contributors from Around the World]]></dc:creator><pubDate>Mon, 31 Jul 2023 16:45:00 -0400</pubDate><enclosure url="https://dts.podtrac.com/redirect.mp3/podcasts.captivate.fm/media/d4db56e6-167c-48bc-b558-98fbcdbdddef/2023-07-31-505-Episode-196-converted.mp3" length="7487427" type="audio/mpeg"/><itunes:duration>10:24</itunes:duration><itunes:explicit>false</itunes:explicit><itunes:episodeType>full</itunes:episodeType><itunes:season>1</itunes:season><itunes:episode>196</itunes:episode><itunes:season>1</itunes:season><podcast:episode>196</podcast:episode><podcast:season>1</podcast:season><itunes:author>Contributors from Around the World</itunes:author></item><item><title>Episode #195 - Dear Jen, Merrick, and Lina. What&apos;s up with Microsoft?; Call of Duty? Watch out for the malware in the lobby; Here’s looking at you, Worldcoin!; 9mm smart gun? What took you so long; This Day, July 28 &amp; 29 in Tech History</title><itunes:title>Episode #195 - Dear Jen, Merrick, and Lina. What&apos;s up with Microsoft?; Call of Duty? Watch out for the malware in the lobby; Here’s looking at you, Worldcoin!; 9mm smart gun? What took you so long; This Day, July 28 &amp; 29 in Tech History</itunes:title><description><![CDATA[<p>🎙️ Free access to “It’s 5:05!” on your favorite podcast platforms: bit.ly/its505-free-access-on-all-podcast-platforms 📌</p><h3>Dear Jen, Merrick, and Lina. What's up with Microsoft?</h3><p><a href="https://505updates.com/markmiller/" rel="noopener noreferrer" target="_blank">🇺🇸 Mark Miller, New York City↗</a></p><p>"Dear Director Easterly, Attorney General Garland, and Chair Khan. I write to request that your agencies take action to hold Microsoft responsible for its negligent cybersecurity practices."&nbsp; That's the beginning of a letter from Senator Ron Wyden, Democrat from Oregon. What set this off for Wyden? Why is he asking for Microsoft's head on a platter?&nbsp;&nbsp;</p><h3>Call of Duty? Watch out for the malware in the lobby.</h3><p><a href="https://505updates.com/edwinkwan/" rel="noopener noreferrer" target="_blank">🇦🇺 Edwin Kwan, Sydney, Australia ↗</a></p><p>Call of Duty game players are getting infected by a self-spreading malware. The malware, which is also a worm, spreads to other users who are online and in the game lobby. It does this automatically from one infected player to another.</p><h3>Here’s looking at you, Worldcoin!</h3><p><a href="https://505updates.com/katycraig/" rel="noopener noreferrer" target="_blank">🇺🇸 Katy Craig, San Diego, California ↗</a></p><p>Step right up, folks, and get your eyeballs scanned by a mysterious silver orb! Welcome to the fascinating world of Worldcoin, a cryptocurrency project with the twist- biometric verification.&nbsp;</p><h3>9mm smart gun? What took you so long.</h3><p><a href="http://505updates.com/hillarycoover/" rel="noopener noreferrer" target="_blank">🇺🇸 Hillary Coover, Washington, DC ↗</a></p><p>The Wall Street Journal recently covered an emerging innovation in firearm safety- smart gun technology. My question is, what took so long to develop this? According to research, 37% of accidental deaths could have been prevented with this type of technology.</p><h3>This Day, July 28 &amp; 29 in Tech History</h3><p><a href="https://505updates.com/marcelbrown/" rel="noopener noreferrer" target="_blank"><strong>🇺🇸</strong> Marcel Brown, St. Louis, Missouri ↗</a></p><p>July 29th, 1914. The first test call is made on the newly completed transcontinental telephone line taking place between New York and San Francisco. The last pole was erected and the line completed two days earlier on July 27th, but commercial service did not start until January 25th of the next year.</p>]]></description><content:encoded><![CDATA[<p>🎙️ Free access to “It’s 5:05!” on your favorite podcast platforms: bit.ly/its505-free-access-on-all-podcast-platforms 📌</p><h3>Dear Jen, Merrick, and Lina. What's up with Microsoft?</h3><p><a href="https://505updates.com/markmiller/" rel="noopener noreferrer" target="_blank">🇺🇸 Mark Miller, New York City↗</a></p><p>"Dear Director Easterly, Attorney General Garland, and Chair Khan. I write to request that your agencies take action to hold Microsoft responsible for its negligent cybersecurity practices."&nbsp; That's the beginning of a letter from Senator Ron Wyden, Democrat from Oregon. What set this off for Wyden? Why is he asking for Microsoft's head on a platter?&nbsp;&nbsp;</p><h3>Call of Duty? Watch out for the malware in the lobby.</h3><p><a href="https://505updates.com/edwinkwan/" rel="noopener noreferrer" target="_blank">🇦🇺 Edwin Kwan, Sydney, Australia ↗</a></p><p>Call of Duty game players are getting infected by a self-spreading malware. The malware, which is also a worm, spreads to other users who are online and in the game lobby. It does this automatically from one infected player to another.</p><h3>Here’s looking at you, Worldcoin!</h3><p><a href="https://505updates.com/katycraig/" rel="noopener noreferrer" target="_blank">🇺🇸 Katy Craig, San Diego, California ↗</a></p><p>Step right up, folks, and get your eyeballs scanned by a mysterious silver orb! Welcome to the fascinating world of Worldcoin, a cryptocurrency project with the twist- biometric verification.&nbsp;</p><h3>9mm smart gun? What took you so long.</h3><p><a href="http://505updates.com/hillarycoover/" rel="noopener noreferrer" target="_blank">🇺🇸 Hillary Coover, Washington, DC ↗</a></p><p>The Wall Street Journal recently covered an emerging innovation in firearm safety- smart gun technology. My question is, what took so long to develop this? According to research, 37% of accidental deaths could have been prevented with this type of technology.</p><h3>This Day, July 28 &amp; 29 in Tech History</h3><p><a href="https://505updates.com/marcelbrown/" rel="noopener noreferrer" target="_blank"><strong>🇺🇸</strong> Marcel Brown, St. Louis, Missouri ↗</a></p><p>July 29th, 1914. The first test call is made on the newly completed transcontinental telephone line taking place between New York and San Francisco. The last pole was erected and the line completed two days earlier on July 27th, but commercial service did not start until January 25th of the next year.</p>]]></content:encoded><link><![CDATA[https://3zozb9fxlbueipjyapmaas.captivate.fm/episode/episode-195-dear-jen-merrick-and-lina-whats-up-with-microsoft-call-of-duty-watch-out-for-the-malware-in-the-lobby-heres-looking-at-you-worldcoin-9mm-smart-gun-what-took-you-so-long-this-day-july-28-29-in-tech-history]]></link><guid isPermaLink="false">7a52a04b-8572-4ed6-b741-96704dbf3f98</guid><itunes:image href="https://artwork.captivate.fm/6d62d190-3bd0-4706-8f7c-a74ad9634d27/uixy5ObAsq6NdqQ9AdN0Nex-.png"/><dc:creator><![CDATA[Contributors from Around the World]]></dc:creator><pubDate>Fri, 28 Jul 2023 16:45:00 -0400</pubDate><enclosure url="https://dts.podtrac.com/redirect.mp3/podcasts.captivate.fm/media/f4b7e18a-5c77-4c30-a4ac-eba634b18629/2023-07-28-505-Episode-195-converted.mp3" length="8460123" type="audio/mpeg"/><itunes:duration>11:45</itunes:duration><itunes:explicit>false</itunes:explicit><itunes:episodeType>full</itunes:episodeType><itunes:season>1</itunes:season><itunes:episode>195</itunes:episode><itunes:season>1</itunes:season><podcast:episode>195</podcast:episode><podcast:season>1</podcast:season><itunes:author>Contributors from Around the World</itunes:author></item><item><title>Episode #194 - Microsoft Makes Access to Cloud Logging Free After Criticisms from Storm-0558 Breach; Cybersecurity Crisis: Citrix Vulnerability Exposes US Infrastructure; Cyber Implementation Plan; This Day, July 26, July 27 in Tech History</title><itunes:title>Episode #194 - Microsoft Makes Access to Cloud Logging Free After Criticisms from Storm-0558 Breach; Cybersecurity Crisis: Citrix Vulnerability Exposes US Infrastructure; Cyber Implementation Plan; This Day, July 26, July 27 in Tech History</itunes:title><description><![CDATA[<p>🎙️ Free access to “It’s 5:05!” on your favorite podcast platforms: bit.ly/its505-free-access-on-all-podcast-platforms 📌</p><h3>Microsoft Makes Access to Cloud Logging Free After Criticisms from Storm-0558 Breach</h3><p><a href="https://505updates.com/edwinkwan/" rel="noopener noreferrer" target="_blank">🇦🇺 Edwin Kwan, Sydney, Australia ↗</a></p><p>Microsoft is expanding access to cloud logging to all customers for free, with more becoming available in September, 2023. This came after they received strong criticisms as a result of the Storm-055 8 breach on July 11th.&nbsp;</p><h3>Cybersecurity Crisis: Citrix Vulnerability Exposes US Infrastructure</h3><p><a href="https://505updates.com/iangarrett/" rel="noopener noreferrer" target="_blank"><strong>🇺🇸 </strong>Ian Garrett, Arlington, Virginia ↗</a></p><p>Thousands of companies are at risk from a recently discovered Citrix zero-day exploit that has already targeted a critical infrastructure organization in the United States. The vulnerability affects some devices that are widely used for secure application delivery and VPN connectivity.&nbsp;</p><h3>Cyber Implementation Plan</h3><p><a href="https://505updates.com/katycraig/" rel="noopener noreferrer" target="_blank">🇺🇸 Katy Craig, San Diego, California ↗</a></p><p>The White House has crafted a plan to beef up the nation's cyber defenses called the Cybersecurity Implementation Plan, but now comes the tricky part: actually making it happen.&nbsp;</p><h3>This Day, July 26, July 27 in Tech History</h3><p><a href="https://505updates.com/marcelbrown/" rel="noopener noreferrer" target="_blank"><strong>🇺🇸</strong> Marcel Brown, St. Louis, Missouri ↗</a></p><p>July 26th, 1963. Syncom 2, the world's first geosynchronous satellite is launched. Syncom 1 was intended to be the first geosynchronous satellite, but an electronics failure rendered the satellite inoperable during the ascent to orbit.</p>]]></description><content:encoded><![CDATA[<p>🎙️ Free access to “It’s 5:05!” on your favorite podcast platforms: bit.ly/its505-free-access-on-all-podcast-platforms 📌</p><h3>Microsoft Makes Access to Cloud Logging Free After Criticisms from Storm-0558 Breach</h3><p><a href="https://505updates.com/edwinkwan/" rel="noopener noreferrer" target="_blank">🇦🇺 Edwin Kwan, Sydney, Australia ↗</a></p><p>Microsoft is expanding access to cloud logging to all customers for free, with more becoming available in September, 2023. This came after they received strong criticisms as a result of the Storm-055 8 breach on July 11th.&nbsp;</p><h3>Cybersecurity Crisis: Citrix Vulnerability Exposes US Infrastructure</h3><p><a href="https://505updates.com/iangarrett/" rel="noopener noreferrer" target="_blank"><strong>🇺🇸 </strong>Ian Garrett, Arlington, Virginia ↗</a></p><p>Thousands of companies are at risk from a recently discovered Citrix zero-day exploit that has already targeted a critical infrastructure organization in the United States. The vulnerability affects some devices that are widely used for secure application delivery and VPN connectivity.&nbsp;</p><h3>Cyber Implementation Plan</h3><p><a href="https://505updates.com/katycraig/" rel="noopener noreferrer" target="_blank">🇺🇸 Katy Craig, San Diego, California ↗</a></p><p>The White House has crafted a plan to beef up the nation's cyber defenses called the Cybersecurity Implementation Plan, but now comes the tricky part: actually making it happen.&nbsp;</p><h3>This Day, July 26, July 27 in Tech History</h3><p><a href="https://505updates.com/marcelbrown/" rel="noopener noreferrer" target="_blank"><strong>🇺🇸</strong> Marcel Brown, St. Louis, Missouri ↗</a></p><p>July 26th, 1963. Syncom 2, the world's first geosynchronous satellite is launched. Syncom 1 was intended to be the first geosynchronous satellite, but an electronics failure rendered the satellite inoperable during the ascent to orbit.</p>]]></content:encoded><link><![CDATA[https://3zozb9fxlbueipjyapmaas.captivate.fm/episode/episode-194-microsoft-makes-access-to-cloud-logging-free-after-criticisms-from-storm-0558-breach-cybersecurity-crisis-citrix-vulnerability-exposes-us-infrastructure-cyber-implementation-plan-this-day-july-26-july-27-in-tech-history]]></link><guid isPermaLink="false">67226dfb-ceeb-4b58-8a4e-bf9b42d6b3b5</guid><itunes:image href="https://artwork.captivate.fm/35b81b9a-2f29-48dc-8d1d-e37f876bb9ad/Pe8_2zke7C3D9TxM1C1DxNmq.png"/><dc:creator><![CDATA[Contributors from Around the World]]></dc:creator><pubDate>Thu, 27 Jul 2023 16:45:00 -0400</pubDate><enclosure url="https://dts.podtrac.com/redirect.mp3/podcasts.captivate.fm/media/ae482178-ea29-4da9-ba67-35e8cefdc2b4/2023-07-27-505-Episode-194-converted.mp3" length="5865225" type="audio/mpeg"/><itunes:duration>08:09</itunes:duration><itunes:explicit>false</itunes:explicit><itunes:episodeType>full</itunes:episodeType><itunes:season>1</itunes:season><itunes:episode>194</itunes:episode><itunes:season>1</itunes:season><podcast:episode>194</podcast:episode><podcast:season>1</podcast:season><itunes:author>Contributors from Around the World</itunes:author></item><item><title>Episode #193 - Unintentional Data Leak by VirusTotal Exposes 5,600 Account Details; Death of Twitter Info Sec;  CT License Plate Scans; CITRIX Pwned</title><itunes:title>Episode #193 - Unintentional Data Leak by VirusTotal Exposes 5,600 Account Details; Death of Twitter Info Sec;  CT License Plate Scans; CITRIX Pwned</itunes:title><description><![CDATA[<p>🎙️ Free access to “It’s 5:05!” on your favorite podcast platforms: bit.ly/its505-free-access-on-all-podcast-platforms 📌</p><h3>Unintentional Data Leak by VirusTotal Exposes 5,600 Account Details</h3><p><a href="https://505updates.com/edwinkwan/" rel="noopener noreferrer" target="_blank">🇦🇺 Edwin Kwan, Sydney, Australia ↗</a></p><p>VirusTotal has suffered a data leak. The popular online service was launched in 2004 and is used to analyze suspicious files and URLs to detect malicious content or malware. The data leak involved a database with 5,600 registered customer names and email addresses.</p><h3>Death of Twitter Info Sec</h3><p><a href="http://505updates.com/olimpiupop/" rel="noopener noreferrer" target="_blank">🇷🇴 Olimpiu Pop, Transylvania, Romania ↗</a></p><p>Twitter was the information source for many technologist; security experts included. The Cyentia Institute wanted to know the size of what they called " InfoSec Twitter." Under this umbrella, they followed all information related to CVEs posted on the platform.&nbsp;</p><h3>&nbsp;CT License Plate Scans</h3><p><a href="http://505updates.com/hillarycoover/" rel="noopener noreferrer" target="_blank">🇺🇸 Hillary Coover, Washington, DC ↗</a></p><p>License plate readers are becoming more common on Connecticut roads, raising privacy concerns. However, the readers, which scan and record license plates, are not really an infringement of privacy since vehicle registration data are publicly available.</p><h3>&nbsp;CITRIX Pwned</h3><p><a href="https://505updates.com/katycraig/" rel="noopener noreferrer" target="_blank">🇺🇸 Katy Craig, San Diego, California ↗</a></p><p>In a cybersecurity cat-and-mouse-game, attackers are taking advantage of a critical Remote Code Execution (RCE) vulnerability in Citrix's NetScaler ADC and NetScaler Gateway Technologies. The scary part? No authentication is needed for the exploit. </p>]]></description><content:encoded><![CDATA[<p>🎙️ Free access to “It’s 5:05!” on your favorite podcast platforms: bit.ly/its505-free-access-on-all-podcast-platforms 📌</p><h3>Unintentional Data Leak by VirusTotal Exposes 5,600 Account Details</h3><p><a href="https://505updates.com/edwinkwan/" rel="noopener noreferrer" target="_blank">🇦🇺 Edwin Kwan, Sydney, Australia ↗</a></p><p>VirusTotal has suffered a data leak. The popular online service was launched in 2004 and is used to analyze suspicious files and URLs to detect malicious content or malware. The data leak involved a database with 5,600 registered customer names and email addresses.</p><h3>Death of Twitter Info Sec</h3><p><a href="http://505updates.com/olimpiupop/" rel="noopener noreferrer" target="_blank">🇷🇴 Olimpiu Pop, Transylvania, Romania ↗</a></p><p>Twitter was the information source for many technologist; security experts included. The Cyentia Institute wanted to know the size of what they called " InfoSec Twitter." Under this umbrella, they followed all information related to CVEs posted on the platform.&nbsp;</p><h3>&nbsp;CT License Plate Scans</h3><p><a href="http://505updates.com/hillarycoover/" rel="noopener noreferrer" target="_blank">🇺🇸 Hillary Coover, Washington, DC ↗</a></p><p>License plate readers are becoming more common on Connecticut roads, raising privacy concerns. However, the readers, which scan and record license plates, are not really an infringement of privacy since vehicle registration data are publicly available.</p><h3>&nbsp;CITRIX Pwned</h3><p><a href="https://505updates.com/katycraig/" rel="noopener noreferrer" target="_blank">🇺🇸 Katy Craig, San Diego, California ↗</a></p><p>In a cybersecurity cat-and-mouse-game, attackers are taking advantage of a critical Remote Code Execution (RCE) vulnerability in Citrix's NetScaler ADC and NetScaler Gateway Technologies. The scary part? No authentication is needed for the exploit. </p>]]></content:encoded><link><![CDATA[https://3zozb9fxlbueipjyapmaas.captivate.fm/episode/episode-193-unintentional-data-leak-by-virustotal-exposes-5-600-account-details-death-of-twitter-info-sec-ct-license-plate-scans-citrix-pwned]]></link><guid isPermaLink="false">7d25d566-946e-4183-9b45-40b0fb2c6c88</guid><itunes:image href="https://artwork.captivate.fm/6549f627-3dd0-4bc0-9f8c-f6a36628ce7e/agfzPzqfdGno9oMxQLcQ1g0G.png"/><dc:creator><![CDATA[Contributors from Around the World]]></dc:creator><pubDate>Wed, 26 Jul 2023 16:45:00 -0400</pubDate><enclosure url="https://dts.podtrac.com/redirect.mp3/podcasts.captivate.fm/media/e2f28eae-6aaa-4ccf-a200-85c70fbc2c7f/2023-07-26-505-Episode-193-converted.mp3" length="5918203" type="audio/mpeg"/><itunes:duration>08:13</itunes:duration><itunes:explicit>false</itunes:explicit><itunes:episodeType>full</itunes:episodeType><itunes:season>1</itunes:season><itunes:episode>193</itunes:episode><itunes:season>1</itunes:season><podcast:episode>193</podcast:episode><podcast:season>1</podcast:season><itunes:author>Contributors from Around the World</itunes:author></item><item><title>Episode #192 - Australian Cyber Crime Reporting Resource; Casualties of ChatGPT; Coast to Coast - The Rise of State Data Privacy Laws in 2023; Cloud Wars; This Day, July 25, in Tech History</title><itunes:title>Episode #192 - Australian Cyber Crime Reporting Resource; Casualties of ChatGPT; Coast to Coast - The Rise of State Data Privacy Laws in 2023; Cloud Wars; This Day, July 25, in Tech History</itunes:title><description><![CDATA[<p>🎙️ Free access to “It’s 5:05!” on your favorite podcast platforms: bit.ly/its505-free-access-on-all-podcast-platforms 📌</p><h3>Australian Cyber Crime Reporting Resource</h3><p><a href="https://505updates.com/edwinkwan/" rel="noopener noreferrer" target="_blank">🇦🇺 Edwin Kwan, Sydney, Australia ↗</a></p><p>The Australian Cybersecurity Centre, ACSC, is urging all Australians to report cyber crimes using their easy online service. The reporting can be done anonymously and reports by individuals will be referred directly to the relevant state or territory law enforcement agency.</p><h3>Casualties of ChatGPT</h3><p><a href="http://505updates.com/hillarycoover/" rel="noopener noreferrer" target="_blank">🇺🇸 Hillary Coover, Washington, DC ↗</a></p><p>ChatGPT and other cutting-edge AI chatbots are revolutionizing industries with the potential to replace human jobs from customer service representatives to screenwriters. However, behind the scenes, the technology relies on a disturbing form of human labor.&nbsp;</p><h3>Coast to Coast - The Rise of State Data Privacy Laws in 2023</h3><p><a href="https://505updates.com/iangarrett/" rel="noopener noreferrer" target="_blank"><strong>🇺🇸 </strong>Ian Garrett, Arlington, Virginia ↗</a></p><p><br></p><p>2023 has been the year for state privacy laws to take off. While California has long been at the forefront of the privacy conversation, this year, several other states are joining the ranks with their own regulations. Organizations doing business in Virginia, Colorado, Utah, and Connecticut are facing new compliance challenges, and the cost of data breaches is taking on a whole new dimension.</p><h3>Cloud Wars</h3><p><a href="https://505updates.com/katycraig/" rel="noopener noreferrer" target="_blank">🇺🇸 Katy Craig, San Diego, California ↗</a></p><p><br></p><p>Google is side-eyeing Microsoft's Office 365, alleging it's been used to coax Azure adoption. Salesforce, owner of Slack, is alleging Microsoft is using its Office suite to unfairly bundle Teams.&nbsp;</p><h3>This Day, July 25, in Tech History</h3><p><a href="https://505updates.com/marcelbrown/" rel="noopener noreferrer" target="_blank"><strong>🇺🇸</strong> Marcel Brown, St. Louis, Missouri ↗</a></p><p>July 25th, 2008. The FCC approves the merger of the two satellite radio companies, Sirius and XM, now known as SiriusXM. The development of the internet and streaming mobile radio has diminished the competitive advantages of satellite radio.&nbsp;</p>]]></description><content:encoded><![CDATA[<p>🎙️ Free access to “It’s 5:05!” on your favorite podcast platforms: bit.ly/its505-free-access-on-all-podcast-platforms 📌</p><h3>Australian Cyber Crime Reporting Resource</h3><p><a href="https://505updates.com/edwinkwan/" rel="noopener noreferrer" target="_blank">🇦🇺 Edwin Kwan, Sydney, Australia ↗</a></p><p>The Australian Cybersecurity Centre, ACSC, is urging all Australians to report cyber crimes using their easy online service. The reporting can be done anonymously and reports by individuals will be referred directly to the relevant state or territory law enforcement agency.</p><h3>Casualties of ChatGPT</h3><p><a href="http://505updates.com/hillarycoover/" rel="noopener noreferrer" target="_blank">🇺🇸 Hillary Coover, Washington, DC ↗</a></p><p>ChatGPT and other cutting-edge AI chatbots are revolutionizing industries with the potential to replace human jobs from customer service representatives to screenwriters. However, behind the scenes, the technology relies on a disturbing form of human labor.&nbsp;</p><h3>Coast to Coast - The Rise of State Data Privacy Laws in 2023</h3><p><a href="https://505updates.com/iangarrett/" rel="noopener noreferrer" target="_blank"><strong>🇺🇸 </strong>Ian Garrett, Arlington, Virginia ↗</a></p><p><br></p><p>2023 has been the year for state privacy laws to take off. While California has long been at the forefront of the privacy conversation, this year, several other states are joining the ranks with their own regulations. Organizations doing business in Virginia, Colorado, Utah, and Connecticut are facing new compliance challenges, and the cost of data breaches is taking on a whole new dimension.</p><h3>Cloud Wars</h3><p><a href="https://505updates.com/katycraig/" rel="noopener noreferrer" target="_blank">🇺🇸 Katy Craig, San Diego, California ↗</a></p><p><br></p><p>Google is side-eyeing Microsoft's Office 365, alleging it's been used to coax Azure adoption. Salesforce, owner of Slack, is alleging Microsoft is using its Office suite to unfairly bundle Teams.&nbsp;</p><h3>This Day, July 25, in Tech History</h3><p><a href="https://505updates.com/marcelbrown/" rel="noopener noreferrer" target="_blank"><strong>🇺🇸</strong> Marcel Brown, St. Louis, Missouri ↗</a></p><p>July 25th, 2008. The FCC approves the merger of the two satellite radio companies, Sirius and XM, now known as SiriusXM. The development of the internet and streaming mobile radio has diminished the competitive advantages of satellite radio.&nbsp;</p>]]></content:encoded><link><![CDATA[https://3zozb9fxlbueipjyapmaas.captivate.fm/episode/episode-192-australian-cyber-crime-reporting-resource-casualties-of-chatgpt-coast-to-coast-the-rise-of-state-data-privacy-laws-in-2023-cloud-wars-this-day-july-25-in-tech-history]]></link><guid isPermaLink="false">031cac68-7ec5-4262-9373-de422ea6b1e8</guid><itunes:image href="https://artwork.captivate.fm/cb5eedad-1143-423c-8055-c8c87213f04c/_DgmONQaEvm2PE-OmfvX3PhR.png"/><dc:creator><![CDATA[Contributors from Around the World]]></dc:creator><pubDate>Tue, 25 Jul 2023 16:45:00 -0400</pubDate><enclosure url="https://dts.podtrac.com/redirect.mp3/podcasts.captivate.fm/media/a9d079bc-b673-407e-989a-1c11c9883b50/2023-07-25-505-Episode-192-converted.mp3" length="7743218" type="audio/mpeg"/><itunes:duration>10:45</itunes:duration><itunes:explicit>false</itunes:explicit><itunes:episodeType>full</itunes:episodeType><itunes:season>1</itunes:season><itunes:episode>192</itunes:episode><itunes:season>1</itunes:season><podcast:episode>192</podcast:episode><podcast:season>1</podcast:season><itunes:author>Contributors from Around the World</itunes:author></item><item><title>Episode #191 - Cloud Build Vulnerable to Supply Chain Attacks; Cloud Shared Responsibility Model: Time for an (R)Evolution?; Microsoft Breach May Expose Deeper Problems; This Day, July 24, in Tech History</title><itunes:title>Episode #191 - Cloud Build Vulnerable to Supply Chain Attacks; Cloud Shared Responsibility Model: Time for an (R)Evolution?; Microsoft Breach May Expose Deeper Problems; This Day, July 24, in Tech History</itunes:title><description><![CDATA[<p>🎙️ Free access to “It’s 5:05!” on your favorite podcast platforms: bit.ly/505-updates 📌</p><h3>Cloud Build Vulnerable to Supply Chain Attacks</h3><p><a href="https://505updates.com/edwinkwan/" rel="noopener noreferrer" target="_blank">🇦🇺 Edwin Kwan, Sydney, Australia ↗</a></p><p>Security researchers have discovered a design flaw in Google Cloud Build, which can allow for supply chain attacks.&nbsp;</p><h3>Cloud Shared Responsibility Model: Time for an (R)Evolution?</h3><h3><a href="https://505updates.com/chrishughes/" rel="noopener noreferrer" target="_blank">🇺🇸 Chris Hughes, Virginia Beach, Virginia ↗</a></h3><p>This week, we have an update around the discussion of the Cloud Shared Responsibility Model. The past week and a half, we've seen a compromise with the Microsoft Azure Cloud environment, and we've seen an incident disclosed by Microsoft and CISA that has attributed to a Chinese threat actor named Storm-0558.</p><h3>Microsoft Breach May Expose Deeper Problems</h3><p><a href="https://505updates.com/tracbannon/" rel="noopener noreferrer" target="_blank"><strong>🇺🇸</strong> Tracy (Trac) Bannon, Camp Hill, Pennsylvania↗</a></p><p>On July 12th, Redmond revealed that Chinese hackers had breached Exchange Online and Azure Active Directory by exploiting a zero-day validation flaw. Government agencies in the US and Western Europe were affected, including the US Department of State and the Commerce Department.&nbsp;</p><h3>This Day, July 24, in Tech History</h3><p><a href="https://505updates.com/marcelbrown/" rel="noopener noreferrer" target="_blank"><strong>🇺🇸</strong> Marcel Brown, St. Louis, Missouri ↗</a></p><p>July 23rd, 1903. Ford sells its first Model A car to Ernest Pfennig of Chicago, Illinois. This was Henry Ford's third attempt at creating a company that manufactured cars. </p>]]></description><content:encoded><![CDATA[<p>🎙️ Free access to “It’s 5:05!” on your favorite podcast platforms: bit.ly/505-updates 📌</p><h3>Cloud Build Vulnerable to Supply Chain Attacks</h3><p><a href="https://505updates.com/edwinkwan/" rel="noopener noreferrer" target="_blank">🇦🇺 Edwin Kwan, Sydney, Australia ↗</a></p><p>Security researchers have discovered a design flaw in Google Cloud Build, which can allow for supply chain attacks.&nbsp;</p><h3>Cloud Shared Responsibility Model: Time for an (R)Evolution?</h3><h3><a href="https://505updates.com/chrishughes/" rel="noopener noreferrer" target="_blank">🇺🇸 Chris Hughes, Virginia Beach, Virginia ↗</a></h3><p>This week, we have an update around the discussion of the Cloud Shared Responsibility Model. The past week and a half, we've seen a compromise with the Microsoft Azure Cloud environment, and we've seen an incident disclosed by Microsoft and CISA that has attributed to a Chinese threat actor named Storm-0558.</p><h3>Microsoft Breach May Expose Deeper Problems</h3><p><a href="https://505updates.com/tracbannon/" rel="noopener noreferrer" target="_blank"><strong>🇺🇸</strong> Tracy (Trac) Bannon, Camp Hill, Pennsylvania↗</a></p><p>On July 12th, Redmond revealed that Chinese hackers had breached Exchange Online and Azure Active Directory by exploiting a zero-day validation flaw. Government agencies in the US and Western Europe were affected, including the US Department of State and the Commerce Department.&nbsp;</p><h3>This Day, July 24, in Tech History</h3><p><a href="https://505updates.com/marcelbrown/" rel="noopener noreferrer" target="_blank"><strong>🇺🇸</strong> Marcel Brown, St. Louis, Missouri ↗</a></p><p>July 23rd, 1903. Ford sells its first Model A car to Ernest Pfennig of Chicago, Illinois. This was Henry Ford's third attempt at creating a company that manufactured cars. </p>]]></content:encoded><link><![CDATA[https://3zozb9fxlbueipjyapmaas.captivate.fm/episode/episode-191-cloud-build-vulnerable-to-supply-chain-attacks-cloud-shared-responsibility-model-time-for-an-revolution-microsoft-breach-may-expose-deeper-problems-this-day-july-24-in-tech-history]]></link><guid isPermaLink="false">fd02108d-1ec8-4478-9ea1-5f4f6007f020</guid><itunes:image href="https://artwork.captivate.fm/ca3093b9-73a4-4891-b963-6ed341db8698/hOdTvaamlKgFLabQ_SdAbDVo.png"/><dc:creator><![CDATA[Contributors from Around the World]]></dc:creator><pubDate>Mon, 24 Jul 2023 16:45:00 -0400</pubDate><enclosure url="https://dts.podtrac.com/redirect.mp3/podcasts.captivate.fm/media/108327f7-9ab2-4542-ae28-e823f0b0122d/2023-07-24-505-Episode-191-converted.mp3" length="8033774" type="audio/mpeg"/><itunes:duration>11:09</itunes:duration><itunes:explicit>false</itunes:explicit><itunes:episodeType>full</itunes:episodeType><itunes:season>1</itunes:season><itunes:episode>191</itunes:episode><itunes:season>1</itunes:season><podcast:episode>191</podcast:episode><podcast:season>1</podcast:season><itunes:author>Contributors from Around the World</itunes:author></item><item><title>Episode #190 - Thousands of Container Images Leaking Secrets; Google DeepMind; US Office of Management and Budget gathers software attestation letters; This Day, July 21, in Tech History</title><itunes:title>Episode #190 - Thousands of Container Images Leaking Secrets; Google DeepMind; US Office of Management and Budget gathers software attestation letters; This Day, July 21, in Tech History</itunes:title><description><![CDATA[<p>🎙️ Free access to “It’s 5:05!” on your favorite podcast platforms: bit.ly/its505-free-access-on-all-podcast-platforms 📌</p><h3>Thousands of Container Images Leaking Secrets</h3><p><a href="https://505updates.com/edwinkwan/" rel="noopener noreferrer" target="_blank">🇦🇺 Edwin Kwan, Sydney, Australia ↗</a></p><p>Researchers from a German university recently published a paper revealing that tens of thousands of container images hosted on Docker Hub contained confidential secrets.</p><h3>Google DeepMind</h3><p><a href="http://505updates.com/hillarycoover/" rel="noopener noreferrer" target="_blank">🇺🇸 Hillary Coover, Washington, DC ↗</a></p><p>Google DeepMind just made a game-changing AI discovery for designing computer chips, and it's got some major national security implications. They've come up with a way to create faster and more specialized chips, which means a big boost in AI capabilities for businesses and government uses.</p><h3>US Office of Management and Budget gathers software attestation letters</h3><p><a href="http://505updates.com/olimpiupop/" rel="noopener noreferrer" target="_blank">🇷🇴 Olimpiu Pop, Transylvania, Romania ↗</a></p><p>May 12th, 2021. President Biden signed the executive order 14028. The intent was to improve the nation's cybersecurity in the aftermath of the Log4Shell tsunami.&nbsp;</p><h3>This Day, July 21, in Tech History</h3><p><a href="https://505updates.com/marcelbrown/" rel="noopener noreferrer" target="_blank"><strong>🇺🇸</strong> Marcel Brown, St. Louis, Missouri ↗</a></p><p>July 21st, 1999. Apple introduces the iBook laptop, the first mainstream computer designed and sold with built-in wireless networking.&nbsp;</p>]]></description><content:encoded><![CDATA[<p>🎙️ Free access to “It’s 5:05!” on your favorite podcast platforms: bit.ly/its505-free-access-on-all-podcast-platforms 📌</p><h3>Thousands of Container Images Leaking Secrets</h3><p><a href="https://505updates.com/edwinkwan/" rel="noopener noreferrer" target="_blank">🇦🇺 Edwin Kwan, Sydney, Australia ↗</a></p><p>Researchers from a German university recently published a paper revealing that tens of thousands of container images hosted on Docker Hub contained confidential secrets.</p><h3>Google DeepMind</h3><p><a href="http://505updates.com/hillarycoover/" rel="noopener noreferrer" target="_blank">🇺🇸 Hillary Coover, Washington, DC ↗</a></p><p>Google DeepMind just made a game-changing AI discovery for designing computer chips, and it's got some major national security implications. They've come up with a way to create faster and more specialized chips, which means a big boost in AI capabilities for businesses and government uses.</p><h3>US Office of Management and Budget gathers software attestation letters</h3><p><a href="http://505updates.com/olimpiupop/" rel="noopener noreferrer" target="_blank">🇷🇴 Olimpiu Pop, Transylvania, Romania ↗</a></p><p>May 12th, 2021. President Biden signed the executive order 14028. The intent was to improve the nation's cybersecurity in the aftermath of the Log4Shell tsunami.&nbsp;</p><h3>This Day, July 21, in Tech History</h3><p><a href="https://505updates.com/marcelbrown/" rel="noopener noreferrer" target="_blank"><strong>🇺🇸</strong> Marcel Brown, St. Louis, Missouri ↗</a></p><p>July 21st, 1999. Apple introduces the iBook laptop, the first mainstream computer designed and sold with built-in wireless networking.&nbsp;</p>]]></content:encoded><link><![CDATA[https://3zozb9fxlbueipjyapmaas.captivate.fm/episode/episode-190-thousands-of-container-images-leaking-secrets-google-deepmind-us-office-of-management-and-budget-gathers-software-attestation-letters-this-day-july-21-in-tech-history]]></link><guid isPermaLink="false">90c3c1a2-0500-463b-8601-d93cd6488a56</guid><itunes:image href="https://artwork.captivate.fm/f1a6129e-e796-455a-a9fb-6e00ee7e3c00/3AYKWtbklxsMrPgTHygYI_kU.png"/><dc:creator><![CDATA[Contributors from Around the World]]></dc:creator><pubDate>Fri, 21 Jul 2023 16:45:00 -0400</pubDate><enclosure url="https://dts.podtrac.com/redirect.mp3/podcasts.captivate.fm/media/4782d8f0-16eb-4bc8-ae2b-9b546ff29e42/2023-07-21-505-Episode-190-converted.mp3" length="5945755" type="audio/mpeg"/><itunes:duration>08:15</itunes:duration><itunes:explicit>false</itunes:explicit><itunes:episodeType>full</itunes:episodeType><itunes:season>1</itunes:season><itunes:episode>190</itunes:episode><itunes:season>1</itunes:season><podcast:episode>190</podcast:episode><podcast:season>1</podcast:season><itunes:author>Contributors from Around the World</itunes:author></item><item><title>Episode #189 - What&apos;s Your Social Media OpSec?; The Dark Side of Generative AI; Typo Leak Sends Email to Mali; Microsoft expanding access to AI</title><itunes:title>Episode #189 - What&apos;s Your Social Media OpSec?; The Dark Side of Generative AI; Typo Leak Sends Email to Mali; Microsoft expanding access to AI</itunes:title><description><![CDATA[<p>🎙️ Free access to “It’s 5:05!” on your favorite podcast platforms: bit.ly/its505-free-access-on-all-podcast-platforms 📌</p><h3><strong>What's Your Social Media OpSec?</strong></h3><p><a href="https://505updates.com/edwinkwan/" rel="noopener noreferrer" target="_blank">🇦🇺 Edwin Kwan, Sydney, Australia ↗</a></p><p>Sharing on social media is a good way to keep in touch with friends, but sometimes that can get you in trouble. A Russian neighbor officer was recently killed near his home and it was believed that he may have been tracked on the Strava app. </p><h3><strong>The Dark Side of Generative AI</strong></h3><p><a href="https://505updates.com/iangarrett/" rel="noopener noreferrer" target="_blank"><strong>🇺🇸 </strong>Ian Garrett, Arlington, Virginia ↗</a></p><p>You can't throw a stone without another company releasing a capability powered by the rise of large language models, otherwise known as LLMs. Did you ever wonder if there were problems with the underlying APIs or dependencies?</p><h3><strong>Typo Leak Sends Email to Mali</strong></h3><p><a href="https://505updates.com/katycraig/" rel="noopener noreferrer" target="_blank">🇺🇸 Katy Craig, San Diego, California ↗</a></p><p>In a blunder of epic proportions, a spelling mistake sent millions of US military emails to the country domain for Mali, Africa.</p><h3><strong>Microsoft expanding access to AI</strong></h3><p><a href="http://505updates.com/hillarycoover/" rel="noopener noreferrer" target="_blank">🇺🇸 Hillary Coover, Washington, DC ↗</a></p><p>Microsoft just announced their new Office 365 artificial intelligence subscription service, and people are going nuts. The stock market responded with a bang, pushing Microsoft's shares to an all-time high. </p><p><br></p><h3><strong>This Day, July 20, in Tech History</strong></h3><p><a href="https://505updates.com/marcelbrown/" rel="noopener noreferrer" target="_blank"><strong>🇺🇸</strong> Marcel Brown, St. Louis, Missouri ↗</a></p><p>July 20th, 1969. Eagle, the Apollo 11 Lunar module, successfully lands in the area of the moon known as the Sea of Tranquility. Upon landing, Neil Armstrong utters the now famous phrase, "The Eagle has landed."</p>]]></description><content:encoded><![CDATA[<p>🎙️ Free access to “It’s 5:05!” on your favorite podcast platforms: bit.ly/its505-free-access-on-all-podcast-platforms 📌</p><h3><strong>What's Your Social Media OpSec?</strong></h3><p><a href="https://505updates.com/edwinkwan/" rel="noopener noreferrer" target="_blank">🇦🇺 Edwin Kwan, Sydney, Australia ↗</a></p><p>Sharing on social media is a good way to keep in touch with friends, but sometimes that can get you in trouble. A Russian neighbor officer was recently killed near his home and it was believed that he may have been tracked on the Strava app. </p><h3><strong>The Dark Side of Generative AI</strong></h3><p><a href="https://505updates.com/iangarrett/" rel="noopener noreferrer" target="_blank"><strong>🇺🇸 </strong>Ian Garrett, Arlington, Virginia ↗</a></p><p>You can't throw a stone without another company releasing a capability powered by the rise of large language models, otherwise known as LLMs. Did you ever wonder if there were problems with the underlying APIs or dependencies?</p><h3><strong>Typo Leak Sends Email to Mali</strong></h3><p><a href="https://505updates.com/katycraig/" rel="noopener noreferrer" target="_blank">🇺🇸 Katy Craig, San Diego, California ↗</a></p><p>In a blunder of epic proportions, a spelling mistake sent millions of US military emails to the country domain for Mali, Africa.</p><h3><strong>Microsoft expanding access to AI</strong></h3><p><a href="http://505updates.com/hillarycoover/" rel="noopener noreferrer" target="_blank">🇺🇸 Hillary Coover, Washington, DC ↗</a></p><p>Microsoft just announced their new Office 365 artificial intelligence subscription service, and people are going nuts. The stock market responded with a bang, pushing Microsoft's shares to an all-time high. </p><p><br></p><h3><strong>This Day, July 20, in Tech History</strong></h3><p><a href="https://505updates.com/marcelbrown/" rel="noopener noreferrer" target="_blank"><strong>🇺🇸</strong> Marcel Brown, St. Louis, Missouri ↗</a></p><p>July 20th, 1969. Eagle, the Apollo 11 Lunar module, successfully lands in the area of the moon known as the Sea of Tranquility. Upon landing, Neil Armstrong utters the now famous phrase, "The Eagle has landed."</p>]]></content:encoded><link><![CDATA[https://3zozb9fxlbueipjyapmaas.captivate.fm/episode/episode-188-whats-your-social-media-opsec-the-dark-side-of-generative-ai-typo-leak-sends-email-to-mali-microsoft-expanding-access-to-ai]]></link><guid isPermaLink="false">43c7aa4f-e4d6-4b13-b5d1-5243e7e13635</guid><itunes:image href="https://artwork.captivate.fm/33e2a4e7-a936-4ef5-905a-3a72363cfbe4/BkhMbfQsRHQi9QFk9GvnUJSv.png"/><dc:creator><![CDATA[Contributors from Around the World]]></dc:creator><pubDate>Thu, 20 Jul 2023 16:45:00 -0400</pubDate><enclosure url="https://dts.podtrac.com/redirect.mp3/podcasts.captivate.fm/media/5c195ac7-045a-4d15-8541-e1ef10af776e/505-Episode-189-2023-07-20-converted.mp3" length="8699185" type="audio/mpeg"/><itunes:duration>09:04</itunes:duration><itunes:explicit>false</itunes:explicit><itunes:episodeType>full</itunes:episodeType><itunes:season>1</itunes:season><itunes:episode>189</itunes:episode><itunes:season>1</itunes:season><podcast:episode>189</podcast:episode><podcast:season>1</podcast:season><itunes:author>Contributors from Around the World</itunes:author></item><item><title>Episode #188 - Spike in Attacks Using Infected USB Drives; European Spyware Banned; Just - a language-agnostic build automation tool written in Rust; ChatGPT has an evil twin?  WormGPT; Cyber Trust Mark; Today in Tech History</title><itunes:title>Episode #188 - Spike in Attacks Using Infected USB Drives; European Spyware Banned; Just - a language-agnostic build automation tool written in Rust; ChatGPT has an evil twin?  WormGPT; Cyber Trust Mark; Today in Tech History</itunes:title><description><![CDATA[<p>Listen to the full episode on your favorite streaming platform: https://bit.ly/available-on-all-platforms📌. </p><p><strong>Edwin Kwan: Spike in Attacks Using Infected USB Drives</strong></p><p>Do using USB drivers as an initial infection vector still work today? Well, what is old is new again. Security researchers at Mandiant have observed a threefold increase in the number of attacks using infected USB drives to steal secrets.</p><p><strong>Hillary Coover: European Spyware Banned</strong></p><p>The Biden administration has taken a significant step to address global concerns over digital privacy and security. It's added two foreign technology companies, Intellexa and Cytrox, to its export prohibition list.</p><p><strong>Olimpiu Pop: Just - a language-agnostic build automation tool written in Rust</strong></p><p>Just do it! And this is exactly what Just does. It executes commands. Just is a command runner tool that is designed to save and run project specific commands stored in files called "justfile".</p><p><strong>Trac Bannon: ChatGPT has an evil twin?&nbsp; WormGPT</strong></p><p>If you have used the wildly popular ChatGPT, you may have run into different rules and guardrails that can be frustrating. As someone who researches cybersecurity and the impact of AI on the software industry, ChatGPT sometimes classifies my questions as off limits. What if there was a large language model with no guardrails and no restrictions?</p><p><strong>Katy Craig: Cyber Trust Mark</strong></p><p>Let's talk cyber stickers. Get ready to see shiny new Shield logo on your routers and IoT devices starting in 2024. The White House and the FCC are rolling out the US Cyber Trust Mark, a voluntary cybersecurity labeling program that screams, "pick me, I'm secure."</p><p><strong>Marcel Brown: Today in Tech History</strong></p><p>July 19th, 2000. Apple introduces the G4 "Cube" Power Macintosh. At the time of introduction, it was one of the smallest desktop computers ever produced. While not considered a commercial success, it did find a small, dedicated following, and it was a foreshadowing of future Apple designs.&nbsp;</p><p>Full show notes, resources and transcript available at 505updates.com </p>]]></description><content:encoded><![CDATA[<p>Listen to the full episode on your favorite streaming platform: https://bit.ly/available-on-all-platforms📌. </p><p><strong>Edwin Kwan: Spike in Attacks Using Infected USB Drives</strong></p><p>Do using USB drivers as an initial infection vector still work today? Well, what is old is new again. Security researchers at Mandiant have observed a threefold increase in the number of attacks using infected USB drives to steal secrets.</p><p><strong>Hillary Coover: European Spyware Banned</strong></p><p>The Biden administration has taken a significant step to address global concerns over digital privacy and security. It's added two foreign technology companies, Intellexa and Cytrox, to its export prohibition list.</p><p><strong>Olimpiu Pop: Just - a language-agnostic build automation tool written in Rust</strong></p><p>Just do it! And this is exactly what Just does. It executes commands. Just is a command runner tool that is designed to save and run project specific commands stored in files called "justfile".</p><p><strong>Trac Bannon: ChatGPT has an evil twin?&nbsp; WormGPT</strong></p><p>If you have used the wildly popular ChatGPT, you may have run into different rules and guardrails that can be frustrating. As someone who researches cybersecurity and the impact of AI on the software industry, ChatGPT sometimes classifies my questions as off limits. What if there was a large language model with no guardrails and no restrictions?</p><p><strong>Katy Craig: Cyber Trust Mark</strong></p><p>Let's talk cyber stickers. Get ready to see shiny new Shield logo on your routers and IoT devices starting in 2024. The White House and the FCC are rolling out the US Cyber Trust Mark, a voluntary cybersecurity labeling program that screams, "pick me, I'm secure."</p><p><strong>Marcel Brown: Today in Tech History</strong></p><p>July 19th, 2000. Apple introduces the G4 "Cube" Power Macintosh. At the time of introduction, it was one of the smallest desktop computers ever produced. While not considered a commercial success, it did find a small, dedicated following, and it was a foreshadowing of future Apple designs.&nbsp;</p><p>Full show notes, resources and transcript available at 505updates.com </p>]]></content:encoded><link><![CDATA[https://3zozb9fxlbueipjyapmaas.captivate.fm/episode/episode-188-spike-in-attacks-using-infected-usb-drives-european-spyware-banned-just-a-language-agnostic-build-automation-tool-written-in-rust-chatgpt-has-an-evil-twin-wormgpt-cyber-trust-mark-today-in-tech-history]]></link><guid isPermaLink="false">42a0a1b2-5488-4333-a6fa-2a35cbbe8404</guid><itunes:image href="https://artwork.captivate.fm/e2bb557b-ff55-4e84-b629-84b171478298/1Px7htgo8coBuJUm_wRbndkQ.png"/><dc:creator><![CDATA[Contributors from Around the World]]></dc:creator><pubDate>Wed, 19 Jul 2023 16:45:00 -0400</pubDate><enclosure url="https://dts.podtrac.com/redirect.mp3/podcasts.captivate.fm/media/fc469ce9-38fd-4fa7-bf43-6e50e3429223/2023-07-19-505-Episode-188-converted.mp3" length="10534636" type="audio/mpeg"/><itunes:duration>14:38</itunes:duration><itunes:explicit>false</itunes:explicit><itunes:episodeType>full</itunes:episodeType><itunes:season>1</itunes:season><itunes:episode>188</itunes:episode><itunes:season>1</itunes:season><podcast:episode>188</podcast:episode><podcast:season>1</podcast:season><itunes:author>Contributors from Around the World</itunes:author></item><item><title>Episode #187 - Account Takeovers using Evil QR; SIM swap attacks on the rise; Crypto scams have dropped faster than Twitter’s user base; Navy Unveils New Cyber Operations Roles; This Day in Tech History</title><itunes:title>Episode #187 - Account Takeovers using Evil QR; SIM swap attacks on the rise; Crypto scams have dropped faster than Twitter’s user base; Navy Unveils New Cyber Operations Roles; This Day in Tech History</itunes:title><description><![CDATA[<p>Listen to the full episode on your favorite streaming platform: https://bit.ly/available-on-all-platforms📌. </p><p><strong>Edwin Kwan: Account Takeovers using Evil QR</strong></p><p>Logging in via QR code is something that more websites are starting to embrace. Security researcher. Kuba Gretzky, from breakdev.org, published an article demonstrating how attackers could take over accounts by convincing users to scan supplied QR codes using phishing techniques.</p><p><strong>Julie Chatman: SIM swap attacks on the rise</strong></p><p>Imagine waking up one day to find that your smartphone is not working. You can't make calls, send text messages, or access your bank account, and it's not because you forgot to charge your phone overnight or because the internet is down. It is due to a SIM swap attack.&nbsp;</p><p><strong>Olimpiu Pop: Crypto scams have dropped faster than Twitter’s user base</strong></p><p>Crypto scams have dropped faster than Twitter's user base, going from $4.3 billion in the first half of 2022 to a mere $1 billion in 2023. In the scamming business, the bear market came early.&nbsp;</p><p><strong>Katy Craig: Navy Unveils New Cyber Operations Roles</strong></p><p>Remember those days when the Navy was the only kid in school without a dedicated cyber role? Those days are history. The Navy unveiled new cyberspace operations roles for officers and enlisted personnel with a little prodding from Congress.&nbsp;</p><p><strong>Marcel Brown: Today in Tech History</strong></p><p>July 18th, 1968. Robert Noyce, Andy Grove and Gordon Moore incorporate Intel in Santa Clara, California to build microprocessors. Their first processor, the 4004, was released in 1971 for use in calculators.</p><p>Full show notes, resources and transcript available at 505updates.com </p>]]></description><content:encoded><![CDATA[<p>Listen to the full episode on your favorite streaming platform: https://bit.ly/available-on-all-platforms📌. </p><p><strong>Edwin Kwan: Account Takeovers using Evil QR</strong></p><p>Logging in via QR code is something that more websites are starting to embrace. Security researcher. Kuba Gretzky, from breakdev.org, published an article demonstrating how attackers could take over accounts by convincing users to scan supplied QR codes using phishing techniques.</p><p><strong>Julie Chatman: SIM swap attacks on the rise</strong></p><p>Imagine waking up one day to find that your smartphone is not working. You can't make calls, send text messages, or access your bank account, and it's not because you forgot to charge your phone overnight or because the internet is down. It is due to a SIM swap attack.&nbsp;</p><p><strong>Olimpiu Pop: Crypto scams have dropped faster than Twitter’s user base</strong></p><p>Crypto scams have dropped faster than Twitter's user base, going from $4.3 billion in the first half of 2022 to a mere $1 billion in 2023. In the scamming business, the bear market came early.&nbsp;</p><p><strong>Katy Craig: Navy Unveils New Cyber Operations Roles</strong></p><p>Remember those days when the Navy was the only kid in school without a dedicated cyber role? Those days are history. The Navy unveiled new cyberspace operations roles for officers and enlisted personnel with a little prodding from Congress.&nbsp;</p><p><strong>Marcel Brown: Today in Tech History</strong></p><p>July 18th, 1968. Robert Noyce, Andy Grove and Gordon Moore incorporate Intel in Santa Clara, California to build microprocessors. Their first processor, the 4004, was released in 1971 for use in calculators.</p><p>Full show notes, resources and transcript available at 505updates.com </p>]]></content:encoded><link><![CDATA[https://3zozb9fxlbueipjyapmaas.captivate.fm/episode/episode-187-account-takeovers-using-evil-qr-sim-swap-attacks-on-the-rise-crypto-scams-have-dropped-faster-than-twitters-user-base-navy-unveils-new-cyber-operations-roles-this-day-in-tech-history]]></link><guid isPermaLink="false">31f4839e-fb10-43e3-86ca-a5c0d10f0d86</guid><itunes:image href="https://artwork.captivate.fm/c3da0128-c4de-4af3-a4c1-cbf047eb33f5/bTxodm9NsVDt351excAFmiep.png"/><dc:creator><![CDATA[Contributors from Around the World]]></dc:creator><pubDate>Tue, 18 Jul 2023 16:45:00 -0400</pubDate><enclosure url="https://dts.podtrac.com/redirect.mp3/podcasts.captivate.fm/media/b675d34e-01d9-446e-85c7-4fc70ab77e19/2023-07-18-505-Episdoe-187-converted.mp3" length="8490163" type="audio/mpeg"/><itunes:duration>11:48</itunes:duration><itunes:explicit>false</itunes:explicit><itunes:episodeType>full</itunes:episodeType><itunes:season>1</itunes:season><itunes:episode>187</itunes:episode><itunes:season>1</itunes:season><podcast:episode>187</podcast:episode><podcast:season>1</podcast:season><itunes:author>Contributors from Around the World</itunes:author></item><item><title>Episode #186 - Ghostscript allows remote code access; FTC takes on OpenAI; Tax services playing fast and loose with client data</title><itunes:title>Episode #186 - Ghostscript allows remote code access; FTC takes on OpenAI; Tax services playing fast and loose with client data</itunes:title><description><![CDATA[<p>Listen to the full episode on your favorite streaming platform: https://bit.ly/available-on-all-platforms📌. </p><p><strong>Edwin Kwan: Ghostscript allows remote code access</strong></p><p>Popular open source PDF library, Ghostscript, has been discovered to have a critical vulnerability that allows for remote code execution. The vulnerability can be exploited upon opening a malicious file.</p><p><strong>Katy Craig: Tax services playing fast and loose with client data</strong></p><p>Taxes and data privacy- two things we all love to hear about, right? Well, it appears our favorite tax preparation services, TaxAct, H&amp;R Block and Tax Layer have been playing a little fast and loose with our personal data.</p><p><strong>Mark Miller: FTC Takes on ChatGPT</strong></p><p>Al Capone was brought down almost a hundred years ago. It was evasion of taxes that got him, completely unrelated to what he was actually being pursued for. Friday's filing of a Civil Investigative Demand by the FTC against OpenAI reminds me a lot of that process. </p><p><strong>Marcel Brown: Today in Tech History</strong></p><p>July 16th, 1969. Apollo 11 is launched from Cape Kennedy, Florida on the way to becoming the first space mission to land men on the moon. Stay tuned this week for more Apollo 11 technology history.</p><p>Full show notes, resources and transcript available at 505updates.com</p>]]></description><content:encoded><![CDATA[<p>Listen to the full episode on your favorite streaming platform: https://bit.ly/available-on-all-platforms📌. </p><p><strong>Edwin Kwan: Ghostscript allows remote code access</strong></p><p>Popular open source PDF library, Ghostscript, has been discovered to have a critical vulnerability that allows for remote code execution. The vulnerability can be exploited upon opening a malicious file.</p><p><strong>Katy Craig: Tax services playing fast and loose with client data</strong></p><p>Taxes and data privacy- two things we all love to hear about, right? Well, it appears our favorite tax preparation services, TaxAct, H&amp;R Block and Tax Layer have been playing a little fast and loose with our personal data.</p><p><strong>Mark Miller: FTC Takes on ChatGPT</strong></p><p>Al Capone was brought down almost a hundred years ago. It was evasion of taxes that got him, completely unrelated to what he was actually being pursued for. Friday's filing of a Civil Investigative Demand by the FTC against OpenAI reminds me a lot of that process. </p><p><strong>Marcel Brown: Today in Tech History</strong></p><p>July 16th, 1969. Apollo 11 is launched from Cape Kennedy, Florida on the way to becoming the first space mission to land men on the moon. Stay tuned this week for more Apollo 11 technology history.</p><p>Full show notes, resources and transcript available at 505updates.com</p>]]></content:encoded><link><![CDATA[https://3zozb9fxlbueipjyapmaas.captivate.fm/episode/episode-186-ghostscript-allows-remote-code-access-ftc-takes-on-openai-tax-services-playing-fast-and-loose-with-client-data]]></link><guid isPermaLink="false">6eba77e2-0504-40cf-895d-d92c927554d8</guid><itunes:image href="https://artwork.captivate.fm/33e2a4e7-a936-4ef5-905a-3a72363cfbe4/BkhMbfQsRHQi9QFk9GvnUJSv.png"/><dc:creator><![CDATA[Contributors from Around the World]]></dc:creator><pubDate>Mon, 17 Jul 2023 16:45:00 -0400</pubDate><enclosure url="https://dts.podtrac.com/redirect.mp3/podcasts.captivate.fm/media/efa64a1f-0077-4726-9db0-37ff4882a138/It-s-505-Monday-July-17-2023-converted.mp3" length="11537095" type="audio/mpeg"/><itunes:duration>12:01</itunes:duration><itunes:explicit>false</itunes:explicit><itunes:episodeType>full</itunes:episodeType><itunes:season>1</itunes:season><itunes:episode>186</itunes:episode><itunes:season>1</itunes:season><podcast:episode>186</podcast:episode><podcast:season>1</podcast:season><itunes:author>Contributors from Around the World</itunes:author></item><item><title>Episode #185 - Critical Infrastructure Service Firm Takes Key System Offline Due to Cyber Attack; Ransomware gang targets US cancer center; Chinese Hackers Breach US Government; AI Junk is Starting to Pollute the Internet</title><itunes:title>Episode #185 - Critical Infrastructure Service Firm Takes Key System Offline Due to Cyber Attack; Ransomware gang targets US cancer center; Chinese Hackers Breach US Government; AI Junk is Starting to Pollute the Internet</itunes:title><description><![CDATA[<p>Resources for this episode available at <a href="https://505updates.com/" rel="noopener noreferrer" target="_blank">505updates.com</a>. </p><p><strong>From Edwin Kwan in Sydney, Australia</strong>: Early this week, critical infrastructure service provider Ventia took some of its key systems offline to contain a cyber incident. The company provides management, maintenance and operation services for critical infrastructure to more than 400 sites across defense, electricity, water, and gas industries in Australia and New Zealand.</p><p><strong>From Olimpiu Pop in Transylvania, Romania</strong>: THT - TimișoaraHackerTeam. A somewhat obscure ransom group recently disrupted operations of a US cancer center, potentially putting patient data at risk.&nbsp;</p><p><strong>From Katy Craig in San Diego, California</strong>:<strong> </strong>&nbsp;A breach of Microsoft-hosted US government email servers by a Chinese hacking group was detected and fixed " fairly rapidly," according to National Security Advisor, Jake Sullivan. The group, known as Storm-0558, was caught forging digital authentication tokens to access federal government email servers hosted on Microsoft's Outlook platform.</p><p><strong>From Hillary Coover in Washington, DC:</strong> The Wall Street Journal reports that as AI tools become more accessible, we'll see a disturbing trend of fake news and what they call "AI junk" flooding the internet. This has some serious implications for spreading misinformation and all of the risks that come with that.</p><p><strong>From Sourced Network Production in New York City.</strong> "It's 5:05". I'm Pokie Huang. Today is Friday, July 14th. Here's the full story behind today's cyber security and open source headlines...</p>]]></description><content:encoded><![CDATA[<p>Resources for this episode available at <a href="https://505updates.com/" rel="noopener noreferrer" target="_blank">505updates.com</a>. </p><p><strong>From Edwin Kwan in Sydney, Australia</strong>: Early this week, critical infrastructure service provider Ventia took some of its key systems offline to contain a cyber incident. The company provides management, maintenance and operation services for critical infrastructure to more than 400 sites across defense, electricity, water, and gas industries in Australia and New Zealand.</p><p><strong>From Olimpiu Pop in Transylvania, Romania</strong>: THT - TimișoaraHackerTeam. A somewhat obscure ransom group recently disrupted operations of a US cancer center, potentially putting patient data at risk.&nbsp;</p><p><strong>From Katy Craig in San Diego, California</strong>:<strong> </strong>&nbsp;A breach of Microsoft-hosted US government email servers by a Chinese hacking group was detected and fixed " fairly rapidly," according to National Security Advisor, Jake Sullivan. The group, known as Storm-0558, was caught forging digital authentication tokens to access federal government email servers hosted on Microsoft's Outlook platform.</p><p><strong>From Hillary Coover in Washington, DC:</strong> The Wall Street Journal reports that as AI tools become more accessible, we'll see a disturbing trend of fake news and what they call "AI junk" flooding the internet. This has some serious implications for spreading misinformation and all of the risks that come with that.</p><p><strong>From Sourced Network Production in New York City.</strong> "It's 5:05". I'm Pokie Huang. Today is Friday, July 14th. Here's the full story behind today's cyber security and open source headlines...</p>]]></content:encoded><link><![CDATA[https://3zozb9fxlbueipjyapmaas.captivate.fm/episode/episode-185-critical-infrastructure-service-firm-takes-key-system-offline-due-to-cyber-attack-ransomware-gang-targets-us-cancer-center-chinese-hackers-breach-us-government-ai-junk-is-starting-to-pollute-the-internet]]></link><guid isPermaLink="false">cfed1f7b-66b6-41a4-8308-2f5cd98eb7af</guid><itunes:image href="https://artwork.captivate.fm/a324c7c1-868a-40e5-8468-989fd55e0f3e/E_6ujWxzPZ43u9qwT1TFQNxR.png"/><dc:creator><![CDATA[Contributors from Around the World]]></dc:creator><pubDate>Fri, 14 Jul 2023 16:45:00 -0400</pubDate><enclosure url="https://dts.podtrac.com/redirect.mp3/podcasts.captivate.fm/media/98610dd6-548e-4af5-ba26-70ebf23d285c/2023-07-14-505-Episode-185-converted.mp3" length="5763293" type="audio/mpeg"/><itunes:duration>08:00</itunes:duration><itunes:explicit>false</itunes:explicit><itunes:episodeType>full</itunes:episodeType><itunes:season>1</itunes:season><itunes:episode>185</itunes:episode><itunes:season>1</itunes:season><podcast:episode>185</podcast:episode><podcast:season>1</podcast:season><itunes:author>Contributors from Around the World</itunes:author></item><item><title>Episode #184 - Gambling trial suffers cyber attack; Try Google Bard? Not in the EU!; Fluhorse malware targeting users in Eastern Asia; 200 organizations victimized by MOVEit bug</title><itunes:title>Episode #184 - Gambling trial suffers cyber attack; Try Google Bard? Not in the EU!; Fluhorse malware targeting users in Eastern Asia; 200 organizations victimized by MOVEit bug</itunes:title><description><![CDATA[<p>Resources for this episode available at <a href="https://505updates.com/" rel="noopener noreferrer" target="_blank">505updates.com</a>. </p><p><strong>From Edwin Kwan in Sydney, Australia</strong>: The New South Wales cashless gambling trial suffered a cyber attack. The state's gaming minister said that it would soon announce an oversight panel, which among other focuses, will also be looking into the data security and data privacy of trial participants.</p><p><strong>From Olimpiu Pop in Transylvania, Romania</strong>: The other week, I decided that ChatGPT is obsolete. I wanted to try Google Bard. Whoops. It doesn't work. According to the site, it's not available in the EU. Does it have something to do with the new European AI Act?&nbsp;</p><p><strong>From Kadi Grigg in Alexandria, Virginia</strong>: The Android Malware family now has a new member: Fluhorse, a dangerous android malware that is targeting users in Eastern Asia.&nbsp;</p><p><strong>From Katy Craig in San Diego, California</strong>:<strong> </strong>Brett Callow, a threat analyst at Emsisoft, reports that over 200 organizations have fallen victim to the MOVEit bug exploitation. This led to 33 breach disclosures affecting the personal information of more than seventeen and a half million people. The scale of the breach is staggering.&nbsp;</p><p><strong>From Sourced Network Production in New York City.</strong> "It's 5:05". I'm Pokie Huang. Today is Thursday, July 13th. Here's the full story behind today's cyber security and open source headlines...</p>]]></description><content:encoded><![CDATA[<p>Resources for this episode available at <a href="https://505updates.com/" rel="noopener noreferrer" target="_blank">505updates.com</a>. </p><p><strong>From Edwin Kwan in Sydney, Australia</strong>: The New South Wales cashless gambling trial suffered a cyber attack. The state's gaming minister said that it would soon announce an oversight panel, which among other focuses, will also be looking into the data security and data privacy of trial participants.</p><p><strong>From Olimpiu Pop in Transylvania, Romania</strong>: The other week, I decided that ChatGPT is obsolete. I wanted to try Google Bard. Whoops. It doesn't work. According to the site, it's not available in the EU. Does it have something to do with the new European AI Act?&nbsp;</p><p><strong>From Kadi Grigg in Alexandria, Virginia</strong>: The Android Malware family now has a new member: Fluhorse, a dangerous android malware that is targeting users in Eastern Asia.&nbsp;</p><p><strong>From Katy Craig in San Diego, California</strong>:<strong> </strong>Brett Callow, a threat analyst at Emsisoft, reports that over 200 organizations have fallen victim to the MOVEit bug exploitation. This led to 33 breach disclosures affecting the personal information of more than seventeen and a half million people. The scale of the breach is staggering.&nbsp;</p><p><strong>From Sourced Network Production in New York City.</strong> "It's 5:05". I'm Pokie Huang. Today is Thursday, July 13th. Here's the full story behind today's cyber security and open source headlines...</p>]]></content:encoded><link><![CDATA[https://3zozb9fxlbueipjyapmaas.captivate.fm/episode/episode-184-gambling-trial-suffers-cyber-attack-try-google-bard-not-in-the-eu-fluhorse-malware-targeting-users-in-eastern-asia-200-organizations-victimized-by-moveit-bug]]></link><guid isPermaLink="false">35503679-96c3-45bd-a5b8-f95fc06632d1</guid><itunes:image href="https://artwork.captivate.fm/e269f318-c433-4856-b100-cbf80cd75601/Fa_VA1KNquCR-F9GgdF_z4YY.png"/><dc:creator><![CDATA[Contributors from Around the World]]></dc:creator><pubDate>Thu, 13 Jul 2023 16:45:00 -0400</pubDate><enclosure url="https://dts.podtrac.com/redirect.mp3/podcasts.captivate.fm/media/a173ec87-8ccb-4014-bbb5-7289822ec4b1/2023-07-13-505-Episode-184-converted.mp3" length="6662009" type="audio/mpeg"/><itunes:duration>09:15</itunes:duration><itunes:explicit>false</itunes:explicit><itunes:episodeType>full</itunes:episodeType><itunes:season>1</itunes:season><itunes:episode>184</itunes:episode><itunes:season>1</itunes:season><podcast:episode>184</podcast:episode><podcast:season>1</podcast:season><itunes:author>Contributors from Around the World</itunes:author></item><item><title>Episode #183 - Solar System Compromising Home Network; EU’s AI Act; Hacking Water Facility; Discord Family Center; This Day in Tech History</title><itunes:title>Episode #183 - Solar System Compromising Home Network; EU’s AI Act; Hacking Water Facility; Discord Family Center; This Day in Tech History</itunes:title><description><![CDATA[<p>Resources for this episode available at <a href="https://505updates.com/" rel="noopener noreferrer" target="_blank">505updates.com</a>. </p><p><strong>From Edwin Kwan in Sydney, Australia</strong>: As small households embrace green energy and install solar panels, they could unknowingly be exposing their home networks. Your home solar system could be connecting to the manufacturer's servers to send data that is displayed on the app.</p><p><strong>From Olimpiu Pop in Transylvania, Romania</strong>: The European AI Act is the first of its kind in the world. Being the first, it creates a precedent and a benchmark for those that will follow, but it also imposes explicit obligations on foundational model providers like OpenAI and Google.&nbsp;</p><p><strong>From Katy Craig in San Diego, California</strong>: In a bizarre case of unauthorized access, a 53-year-old man from California has been charged for meddling with a water treatment facility's critical software.</p><p><strong>From Hillary Coover in Washington, DC: </strong>Today, WIRED released an article discussing Discord's new "Family Center" safety settings designed for teens. Discord launched the Family Center, aiming to strike a balance between safety and teen privacy.</p><p><strong>From Marcel Brown in St. Louis, Missouri</strong>: &nbsp;July 12th, 1990. Nintendo releases the original Final Fantasy video game for it's Nintendo Entertainment System in North America. Final Fantasy helped to popularize the genre and has gone on to spawn one of the most well-known RPG franchises in history.</p><p><strong>From Sourced Network Production in New York City.</strong> "It's 5:05". I'm Pokie Huang. Today is Wednesday, July 12th. Here's the full story behind today's cyber security and open source headlines...</p>]]></description><content:encoded><![CDATA[<p>Resources for this episode available at <a href="https://505updates.com/" rel="noopener noreferrer" target="_blank">505updates.com</a>. </p><p><strong>From Edwin Kwan in Sydney, Australia</strong>: As small households embrace green energy and install solar panels, they could unknowingly be exposing their home networks. Your home solar system could be connecting to the manufacturer's servers to send data that is displayed on the app.</p><p><strong>From Olimpiu Pop in Transylvania, Romania</strong>: The European AI Act is the first of its kind in the world. Being the first, it creates a precedent and a benchmark for those that will follow, but it also imposes explicit obligations on foundational model providers like OpenAI and Google.&nbsp;</p><p><strong>From Katy Craig in San Diego, California</strong>: In a bizarre case of unauthorized access, a 53-year-old man from California has been charged for meddling with a water treatment facility's critical software.</p><p><strong>From Hillary Coover in Washington, DC: </strong>Today, WIRED released an article discussing Discord's new "Family Center" safety settings designed for teens. Discord launched the Family Center, aiming to strike a balance between safety and teen privacy.</p><p><strong>From Marcel Brown in St. Louis, Missouri</strong>: &nbsp;July 12th, 1990. Nintendo releases the original Final Fantasy video game for it's Nintendo Entertainment System in North America. Final Fantasy helped to popularize the genre and has gone on to spawn one of the most well-known RPG franchises in history.</p><p><strong>From Sourced Network Production in New York City.</strong> "It's 5:05". I'm Pokie Huang. Today is Wednesday, July 12th. Here's the full story behind today's cyber security and open source headlines...</p>]]></content:encoded><link><![CDATA[https://3zozb9fxlbueipjyapmaas.captivate.fm/episode/episode-183-solar-system-compromising-home-network-eus-ai-act-hacking-water-facility-discord-family-center-this-day-in-tech-history]]></link><guid isPermaLink="false">5d34fec2-6eeb-43f4-9cd0-b54a60730792</guid><itunes:image href="https://artwork.captivate.fm/62e27118-2d3a-4c1b-b345-ff8eab4959e5/eXJXRb7ZOjKgGuX1D9zaEnJj.png"/><dc:creator><![CDATA[Contributors from Around the World]]></dc:creator><pubDate>Wed, 12 Jul 2023 16:45:00 -0400</pubDate><enclosure url="https://dts.podtrac.com/redirect.mp3/podcasts.captivate.fm/media/86cf49c4-7d84-4e0a-9e5d-0f7ef605248e/2023-07-12-505-Episode-183-converted.mp3" length="7397095" type="audio/mpeg"/><itunes:duration>10:16</itunes:duration><itunes:explicit>false</itunes:explicit><itunes:episodeType>full</itunes:episodeType><itunes:season>1</itunes:season><itunes:episode>183</itunes:episode><itunes:season>1</itunes:season><podcast:episode>183</podcast:episode><podcast:season>1</podcast:season><itunes:author>Contributors from Around the World</itunes:author></item><item><title>Episode #182 - Spyware in Google Play Store Stealing Users&apos; Data; Crypto Rug Pulls; Massachusetts Bans Location Data Sales and Transfers; Venture Funding in Cybersecurity - From Boom to Bust; This Day in Tech History</title><itunes:title>Episode #182 - Spyware in Google Play Store Stealing Users&apos; Data; Crypto Rug Pulls; Massachusetts Bans Location Data Sales and Transfers; Venture Funding in Cybersecurity - From Boom to Bust; This Day in Tech History</itunes:title><description><![CDATA[<p>Resources for this episode available at <a href="https://505updates.com/" rel="noopener noreferrer" target="_blank">505updates.com</a>. </p><p><strong>From Edwin Kwan in Sydney, Australia</strong>: Security researchers have discovered two spyware in the Google Play Store that have been installed by up to 1.5 million users. Both apps have similar malicious behaviors, such as launching silently without any user interaction.</p><p><strong>From Katy Craig in San Diego, California</strong>: In a jaw dropping twist, approximately $126 million worth of crypto assets has vanished from Multichain's accounts in what could be a classic case of a rug pull. The incident left experts scratching their heads and investors clutching their virtual wallets.&nbsp;</p><p><strong>From Hillary Coover in Washington, DC: </strong>Massachusetts is considering a groundbreaking law that would ban the sale of location data collected from mobile phones used within the state. The proposed Location Shield Act would also require law enforcement to obtain a warrant before accessing such data.</p><p><strong>From Ian Garrett in Arlington, Virginia: </strong>Even recession-proof industries are feeling the squeeze when it comes to funding. While cybersecurity has traditionally been shielded from downward funding trends, it is now seeing a major shift from investors. With that, you may be wondering how bad is the decline.&nbsp;</p><p><strong>From Marcel Brown in St. Louis, Missouri</strong>: July 11th, 2008. Apple's second iPhone, the iPhone 3G goes on sale. The higher speed 3G data capability certainly helped the iPhone solidify its status as the premier smartphone of the time.&nbsp;</p><p><strong>From Sourced Network Production in New York City.</strong> "It's 5:05". I'm Pokie Huang. Today is Tuesday, July 11th. Here's the full story behind today's cyber security and open source headlines...</p>]]></description><content:encoded><![CDATA[<p>Resources for this episode available at <a href="https://505updates.com/" rel="noopener noreferrer" target="_blank">505updates.com</a>. </p><p><strong>From Edwin Kwan in Sydney, Australia</strong>: Security researchers have discovered two spyware in the Google Play Store that have been installed by up to 1.5 million users. Both apps have similar malicious behaviors, such as launching silently without any user interaction.</p><p><strong>From Katy Craig in San Diego, California</strong>: In a jaw dropping twist, approximately $126 million worth of crypto assets has vanished from Multichain's accounts in what could be a classic case of a rug pull. The incident left experts scratching their heads and investors clutching their virtual wallets.&nbsp;</p><p><strong>From Hillary Coover in Washington, DC: </strong>Massachusetts is considering a groundbreaking law that would ban the sale of location data collected from mobile phones used within the state. The proposed Location Shield Act would also require law enforcement to obtain a warrant before accessing such data.</p><p><strong>From Ian Garrett in Arlington, Virginia: </strong>Even recession-proof industries are feeling the squeeze when it comes to funding. While cybersecurity has traditionally been shielded from downward funding trends, it is now seeing a major shift from investors. With that, you may be wondering how bad is the decline.&nbsp;</p><p><strong>From Marcel Brown in St. Louis, Missouri</strong>: July 11th, 2008. Apple's second iPhone, the iPhone 3G goes on sale. The higher speed 3G data capability certainly helped the iPhone solidify its status as the premier smartphone of the time.&nbsp;</p><p><strong>From Sourced Network Production in New York City.</strong> "It's 5:05". I'm Pokie Huang. Today is Tuesday, July 11th. Here's the full story behind today's cyber security and open source headlines...</p>]]></content:encoded><link><![CDATA[https://3zozb9fxlbueipjyapmaas.captivate.fm/episode/episode-182-spyware-in-google-play-store-stealing-users-data-crypto-rug-pulls-massachusetts-bans-location-data-sales-and-transfers-venture-funding-in-cybersecurity-from-boom-to-bust-this-day-in-tech-history]]></link><guid isPermaLink="false">f0fc92e2-69eb-42f6-84fc-9c28183a7fb7</guid><itunes:image href="https://artwork.captivate.fm/907e4251-5e2c-44a4-899f-76c7e6755fb8/Xk3gGX9zQZ3BO-BYGhsvS3TK.png"/><dc:creator><![CDATA[Contributors from Around the World]]></dc:creator><pubDate>Tue, 11 Jul 2023 16:45:00 -0400</pubDate><enclosure url="https://dts.podtrac.com/redirect.mp3/podcasts.captivate.fm/media/6d4d121f-e020-467c-9d26-90f4e84ffdac/2023-07-11-505-Episode-182-converted.mp3" length="7175159" type="audio/mpeg"/><itunes:duration>09:58</itunes:duration><itunes:explicit>false</itunes:explicit><itunes:episodeType>full</itunes:episodeType><itunes:season>1</itunes:season><itunes:episode>182</itunes:episode><itunes:season>1</itunes:season><podcast:episode>182</podcast:episode><podcast:season>1</podcast:season><itunes:author>Contributors from Around the World</itunes:author></item><item><title>Episode #181 - Mastodon Addresses TootRoot Hijacking Vulnerability; Natural Language the sharpest weapon to attack LLM Backed AIs?; Truebot Malware; This Day in Tech History</title><itunes:title>Episode #181 - Mastodon Addresses TootRoot Hijacking Vulnerability; Natural Language the sharpest weapon to attack LLM Backed AIs?; Truebot Malware; This Day in Tech History</itunes:title><description><![CDATA[<p>Resources for this episode available at <a href="https://505updates.com/" rel="noopener noreferrer" target="_blank">505updates.com</a>. </p><p><strong>From Edwin Kwan in Sydney, Australia</strong>: Mastadon has recently patched for vulnerabilities. One of those vulnerabilities is TootRoot. Attackers can exploit the vulnerability by using media files on Toots to perform attacks like denial of service and arbitrary remote code execution.&nbsp;</p><p><strong>From Olimpiu Pop in Transylvania, Romania</strong>: Natural language is the primary means of attack for LLM powered AI systems. It can be used to attack components throughout the stack.</p><p><strong>From Katy Craig in San Diego, California</strong>: US and Canadian cybersecurity agencies have issued a joint alert warning about the resurgence of Truebot malware. Operated by the Silence cybercrime group, Truebot serves as an initial infection point for delivering secondary payloads on compromised systems.</p><p><strong>From Marcel Brown in St. Louis, Missouri</strong>: July 9th, 1981. The game that launched two of the most famous characters in video game history is released for sale. Donkey Kong was created by Nintendo, a Japanese playing card and toy company turned fledgling video game developer who was trying to create a hit game for the North American market.</p><p><strong>From Sourced Network Production in New York City.</strong> "It's 5:05". I'm Pokie Huang. Today is Monday, July 10th. Here's the full story behind today's cyber security and open source headlines...</p>]]></description><content:encoded><![CDATA[<p>Resources for this episode available at <a href="https://505updates.com/" rel="noopener noreferrer" target="_blank">505updates.com</a>. </p><p><strong>From Edwin Kwan in Sydney, Australia</strong>: Mastadon has recently patched for vulnerabilities. One of those vulnerabilities is TootRoot. Attackers can exploit the vulnerability by using media files on Toots to perform attacks like denial of service and arbitrary remote code execution.&nbsp;</p><p><strong>From Olimpiu Pop in Transylvania, Romania</strong>: Natural language is the primary means of attack for LLM powered AI systems. It can be used to attack components throughout the stack.</p><p><strong>From Katy Craig in San Diego, California</strong>: US and Canadian cybersecurity agencies have issued a joint alert warning about the resurgence of Truebot malware. Operated by the Silence cybercrime group, Truebot serves as an initial infection point for delivering secondary payloads on compromised systems.</p><p><strong>From Marcel Brown in St. Louis, Missouri</strong>: July 9th, 1981. The game that launched two of the most famous characters in video game history is released for sale. Donkey Kong was created by Nintendo, a Japanese playing card and toy company turned fledgling video game developer who was trying to create a hit game for the North American market.</p><p><strong>From Sourced Network Production in New York City.</strong> "It's 5:05". I'm Pokie Huang. Today is Monday, July 10th. Here's the full story behind today's cyber security and open source headlines...</p>]]></content:encoded><link><![CDATA[https://3zozb9fxlbueipjyapmaas.captivate.fm/episode/episode-181-mastodon-addresses-tootroot-hijacking-vulnerability-natural-language-the-sharpest-weapon-to-attack-llm-backed-ais-truebot-malware-this-day-in-tech-history]]></link><guid isPermaLink="false">3588670a-4a05-45e2-b85a-a1ce4350496f</guid><itunes:image href="https://artwork.captivate.fm/6f80c7dc-36eb-4a95-9a03-cf93530be256/knemqGIcqXHHfsJBwLBRL2Ax.png"/><dc:creator><![CDATA[Contributors from Around the World]]></dc:creator><pubDate>Mon, 10 Jul 2023 16:45:00 -0400</pubDate><enclosure url="https://dts.podtrac.com/redirect.mp3/podcasts.captivate.fm/media/1cd7b990-a64e-4cc4-9cb5-8528642e8ce9/2023-07-10-505-Episdoe-181-converted.mp3" length="8050365" type="audio/mpeg"/><itunes:duration>11:11</itunes:duration><itunes:explicit>false</itunes:explicit><itunes:episodeType>full</itunes:episodeType><itunes:season>1</itunes:season><itunes:episode>181</itunes:episode><itunes:season>1</itunes:season><podcast:episode>181</podcast:episode><podcast:season>1</podcast:season><itunes:author>Contributors from Around the World</itunes:author></item><item><title>Episode #180 - Proof of Concept Program for Microsoft Teams Malware Delivery; OWASP Releases version 0.5 of Top 10 LLMs Risks; Shift Left is a Myth; Inflight Internet Access Systems; This Day in Tech History</title><itunes:title>Episode #180 - Proof of Concept Program for Microsoft Teams Malware Delivery; OWASP Releases version 0.5 of Top 10 LLMs Risks; Shift Left is a Myth; Inflight Internet Access Systems; This Day in Tech History</itunes:title><description><![CDATA[<p>Resources for this episode available at 505updates.com. </p><p>From Edwin Kwan in Sydney, Australia: A proof of concept program has been recently published that exploits an unresolved security vulnerability in Microsoft Teams. The program allows the bypass of Microsoft Teams file sending restraints to deliver malware from an external account.</p><p>From Olimpiu Pop in Transylvania, Romania: OWASP moves fast. In late May, they initiated the Top 10 Security Risks for LLM applications project. Version 0.5 was released this week and they are aiming to release version 1.0 by the end of the month.&nbsp;</p><p>From Katy Craig in San Diego, California: In a thought-provoking blog post, Mark Curphy challenges the effectiveness of shifting left in software security. In fact, he says that shifting left is a myth.&nbsp;</p><p>From Hillary Coover in Washington, DC: In-flight wifi is a convenience, but also potentially a vulnerability to flight safety. According to CSOOnline, commercial airliners are more vulnerable to cyber threats originating from in-flight internet access systems than from avionics.</p><p>From Marcel Brown in St. Lous, Missouri: July 7th, 1936. Several US patents are issued for the Phillips head screw and screwdriver to inventor Henry F. Phillips. Phillips founded the Phillips Screw Company to license his patents.</p><p>From Sourced Network Production in New York city. "It's 5:05". I'm Pokie Huang. Today is Friday, July 7th. Here's the full story behind today's cyber security and open source headlines...</p>]]></description><content:encoded><![CDATA[<p>Resources for this episode available at 505updates.com. </p><p>From Edwin Kwan in Sydney, Australia: A proof of concept program has been recently published that exploits an unresolved security vulnerability in Microsoft Teams. The program allows the bypass of Microsoft Teams file sending restraints to deliver malware from an external account.</p><p>From Olimpiu Pop in Transylvania, Romania: OWASP moves fast. In late May, they initiated the Top 10 Security Risks for LLM applications project. Version 0.5 was released this week and they are aiming to release version 1.0 by the end of the month.&nbsp;</p><p>From Katy Craig in San Diego, California: In a thought-provoking blog post, Mark Curphy challenges the effectiveness of shifting left in software security. In fact, he says that shifting left is a myth.&nbsp;</p><p>From Hillary Coover in Washington, DC: In-flight wifi is a convenience, but also potentially a vulnerability to flight safety. According to CSOOnline, commercial airliners are more vulnerable to cyber threats originating from in-flight internet access systems than from avionics.</p><p>From Marcel Brown in St. Lous, Missouri: July 7th, 1936. Several US patents are issued for the Phillips head screw and screwdriver to inventor Henry F. Phillips. Phillips founded the Phillips Screw Company to license his patents.</p><p>From Sourced Network Production in New York city. "It's 5:05". I'm Pokie Huang. Today is Friday, July 7th. Here's the full story behind today's cyber security and open source headlines...</p>]]></content:encoded><link><![CDATA[https://3zozb9fxlbueipjyapmaas.captivate.fm/episode/episode-180-proof-of-concept-program-for-microsoft-teams-malware-delivery-owasp-releases-version-0-5-of-top-10-llms-risks-shift-left-is-a-myth-inflight-internet-access-systems-this-day-in-tech-history]]></link><guid isPermaLink="false">d3d8a517-070f-4543-b03f-edcf4de73064</guid><itunes:image href="https://artwork.captivate.fm/ee537953-46de-4f86-bc65-0e59cf5f4415/gQitWPiMs0Jf-o65d5H6eynf.png"/><dc:creator><![CDATA[Contributors from Around the World]]></dc:creator><pubDate>Fri, 07 Jul 2023 16:45:00 -0400</pubDate><enclosure url="https://dts.podtrac.com/redirect.mp3/podcasts.captivate.fm/media/00827b2b-2488-424b-a1ad-b413c06c8db2/2023-07-07-505-Episode-180-converted.mp3" length="8402078" type="audio/mpeg"/><itunes:duration>11:40</itunes:duration><itunes:explicit>false</itunes:explicit><itunes:episodeType>full</itunes:episodeType><itunes:season>1</itunes:season><itunes:episode>180</itunes:episode><itunes:season>1</itunes:season><podcast:episode>180</podcast:episode><podcast:season>1</podcast:season><itunes:author>Contributors from Around the World</itunes:author></item><item><title>Episode #179 - CWE Top 25 Most Dangerous Software Weaknesses; Robotaxis are Fire Hazard; This Day in Tech History</title><itunes:title>Episode #179 - CWE Top 25 Most Dangerous Software Weaknesses; Robotaxis are Fire Hazard; This Day in Tech History</itunes:title><description><![CDATA[<p>Resources for this episode available at 505updates.com. </p><p>From Edwin Kwan in Sydney, Australia: Mitre has recently released their CWE Top 25 Most Dangerous Software Weaknesses list for 2023. This list demonstrates the currently most common and impactful software weaknesses.&nbsp;</p><p>From Katy Craig in San Diego, California: Driverless cars may be the future, but are they ready for prime time? According to the fire chief in San Francisco, the answer is a resounding no.&nbsp;</p><p>From Marcel Brown in St. Louis, Missouri: July 6th, 1996. America Online settles 11 class action lawsuits alleging misleading billing practices. Who here remembers that point in time when this pricing change caused AOL to have such a huge spike in new users, that for a time it was almost impossible to connect to AOL due to the busy signals.</p><p>From Sourced Network Production in New York city. "It's 5:05". I'm Pokie Huang. Today is Thursday, July 6th. Here's the full story behind today's cyber security and open source headlines...</p>]]></description><content:encoded><![CDATA[<p>Resources for this episode available at 505updates.com. </p><p>From Edwin Kwan in Sydney, Australia: Mitre has recently released their CWE Top 25 Most Dangerous Software Weaknesses list for 2023. This list demonstrates the currently most common and impactful software weaknesses.&nbsp;</p><p>From Katy Craig in San Diego, California: Driverless cars may be the future, but are they ready for prime time? According to the fire chief in San Francisco, the answer is a resounding no.&nbsp;</p><p>From Marcel Brown in St. Louis, Missouri: July 6th, 1996. America Online settles 11 class action lawsuits alleging misleading billing practices. Who here remembers that point in time when this pricing change caused AOL to have such a huge spike in new users, that for a time it was almost impossible to connect to AOL due to the busy signals.</p><p>From Sourced Network Production in New York city. "It's 5:05". I'm Pokie Huang. Today is Thursday, July 6th. Here's the full story behind today's cyber security and open source headlines...</p>]]></content:encoded><link><![CDATA[https://3zozb9fxlbueipjyapmaas.captivate.fm/episode/episode-179-cwe-top-25-most-dangerous-software-weaknesses-robotaxis-are-fire-hazard-this-day-in-tech-history]]></link><guid isPermaLink="false">52bfe0b5-67f1-4226-8e43-255e12f1e7cb</guid><itunes:image href="https://artwork.captivate.fm/71e89c41-6ae6-4f6d-a6c5-0488d33dd47e/L21czgclBkrtCJVjpudqzInv.png"/><dc:creator><![CDATA[Contributors from Around the World]]></dc:creator><pubDate>Thu, 06 Jul 2023 16:45:00 -0400</pubDate><enclosure url="https://dts.podtrac.com/redirect.mp3/podcasts.captivate.fm/media/faee10c2-c4ac-4e5b-8628-61858cdac4cc/2023-07-06-505-Episode-179-converted.mp3" length="5791530" type="audio/mpeg"/><itunes:duration>08:03</itunes:duration><itunes:explicit>false</itunes:explicit><itunes:episodeType>full</itunes:episodeType><itunes:season>1</itunes:season><itunes:episode>179</itunes:episode><itunes:season>1</itunes:season><podcast:episode>179</podcast:episode><podcast:season>1</podcast:season><itunes:author>Contributors from Around the World</itunes:author></item><item><title>Episode #178 - Ultimate Member Plugin Allows Ultimate Website Access; Army Soldiers and Nefarious Smartwatches; Biometric Airport Security; China curbs metal exports to slow US chip making; This Day in Tech History</title><itunes:title>Episode #178 - Ultimate Member Plugin Allows Ultimate Website Access; Army Soldiers and Nefarious Smartwatches; Biometric Airport Security; China curbs metal exports to slow US chip making; This Day in Tech History</itunes:title><description><![CDATA[<p>Resources for this episode available at 505updates.com. </p><p>From Edwin Kwan in Sydney, Australia: WordPress plugin, Ultimate Member, is vulnerable to a privileged escalation vulnerability that allows attackers to gain administrator access to the WordPress site.&nbsp;</p><p>From Trac Bannon in Salem, Massachusetts: Over the past few weeks, a number of US soldiers opened their mail and found a pretty cool gift, a free smartwatch. What could be so bad about that?&nbsp;</p><p>From Hillary Coover in Washington, DC: In a pilot project conducted by the Transportation Security Administration at 16 airports across the United States, facial recognition technology is being used to enhance air airport security and streamline procedures.&nbsp;</p><p>From Katy Craig in San Diego, California: The US has been actively curbing China's access to advanced microprocessors and other critical technologies. The semiconductor industry has become a focal point in the intense rivalry between the two largest economies.</p><p>From Marcel Brown in St. Louis, Missouri: July 4th, 1956. MIT's whirlwind, which had been completed five years earlier, becomes the first computer in the world to allow its users to enter commands through a keyboard. Previously, all input was accomplished through dials, switches, and or punch cards.&nbsp;</p><p>From Sourced Network Production in New York city. "It's 5:05". I'm Pokie Huang. Today is Wednesday, July 5th. Here's the full story behind today's cyber security and open source headlines...</p>]]></description><content:encoded><![CDATA[<p>Resources for this episode available at 505updates.com. </p><p>From Edwin Kwan in Sydney, Australia: WordPress plugin, Ultimate Member, is vulnerable to a privileged escalation vulnerability that allows attackers to gain administrator access to the WordPress site.&nbsp;</p><p>From Trac Bannon in Salem, Massachusetts: Over the past few weeks, a number of US soldiers opened their mail and found a pretty cool gift, a free smartwatch. What could be so bad about that?&nbsp;</p><p>From Hillary Coover in Washington, DC: In a pilot project conducted by the Transportation Security Administration at 16 airports across the United States, facial recognition technology is being used to enhance air airport security and streamline procedures.&nbsp;</p><p>From Katy Craig in San Diego, California: The US has been actively curbing China's access to advanced microprocessors and other critical technologies. The semiconductor industry has become a focal point in the intense rivalry between the two largest economies.</p><p>From Marcel Brown in St. Louis, Missouri: July 4th, 1956. MIT's whirlwind, which had been completed five years earlier, becomes the first computer in the world to allow its users to enter commands through a keyboard. Previously, all input was accomplished through dials, switches, and or punch cards.&nbsp;</p><p>From Sourced Network Production in New York city. "It's 5:05". I'm Pokie Huang. Today is Wednesday, July 5th. Here's the full story behind today's cyber security and open source headlines...</p>]]></content:encoded><link><![CDATA[https://3zozb9fxlbueipjyapmaas.captivate.fm/episode/episode-178-ultimate-member-plugin-allows-ultimate-website-access-army-soldiers-and-nefarious-smartwatches-biometric-airport-security-china-curbs-metal-exports-to-slow-us-chip-making-this-day-in-tech-history]]></link><guid isPermaLink="false">2df977a4-0b59-4a9f-8beb-3cf12126bb6d</guid><itunes:image href="https://artwork.captivate.fm/01448bc0-36b7-4f46-a182-3dd29e005518/ceWXIPXyjyux9RmjO8hp3oP-.png"/><dc:creator><![CDATA[Contributors from Around the World]]></dc:creator><pubDate>Wed, 05 Jul 2023 16:45:00 -0400</pubDate><enclosure url="https://dts.podtrac.com/redirect.mp3/podcasts.captivate.fm/media/fb444763-0602-4549-9329-3a20a82f3394/2023-07-05-505-Episode-178-converted.mp3" length="8477938" type="audio/mpeg"/><itunes:duration>11:46</itunes:duration><itunes:explicit>false</itunes:explicit><itunes:episodeType>full</itunes:episodeType><itunes:season>1</itunes:season><itunes:episode>178</itunes:episode><itunes:season>1</itunes:season><podcast:episode>178</podcast:episode><podcast:season>1</podcast:season><itunes:author>Contributors from Around the World</itunes:author></item><item><title>Episode #177 - How Not To Do A Force Password Reset; Facial Recognition Explained; Online Age Checks</title><itunes:title>Episode #177 - How Not To Do A Force Password Reset; Facial Recognition Explained; Online Age Checks</itunes:title><description><![CDATA[<p>Resources for this episode available at 505updates.com. </p><p>From Edwin Kwan in Sydney, Australia: A high school in Illinois recently demonstrated how not to do a false password reset. The high school decided to set all the students' passwords to be change me exclamation mark. That's right. They changed all the students' password to the same password.&nbsp;</p><p>From Hillary Coover in Washington, DC: When searching social media sites for known child exploitation images, law enforcement agencies and organizations use databases of face prints associated with identified victims or offenders. They take those known face prints and they compare them to those pulled from social media platforms.</p><p>From Katy Craig in San Diego, California: Have you ever encountered an age check, those popups that ask you for your ID or some other form of verification to confirm your age? They're becoming increasingly common online, all in the name of protecting children's safety.&nbsp;</p><p>From Sourced Network Production in New York city. "It's 5:05". I'm Pokie Huang. Today is Tuesday, July 4th. Here's the full story behind today's cyber security and open source headlines...</p>]]></description><content:encoded><![CDATA[<p>Resources for this episode available at 505updates.com. </p><p>From Edwin Kwan in Sydney, Australia: A high school in Illinois recently demonstrated how not to do a false password reset. The high school decided to set all the students' passwords to be change me exclamation mark. That's right. They changed all the students' password to the same password.&nbsp;</p><p>From Hillary Coover in Washington, DC: When searching social media sites for known child exploitation images, law enforcement agencies and organizations use databases of face prints associated with identified victims or offenders. They take those known face prints and they compare them to those pulled from social media platforms.</p><p>From Katy Craig in San Diego, California: Have you ever encountered an age check, those popups that ask you for your ID or some other form of verification to confirm your age? They're becoming increasingly common online, all in the name of protecting children's safety.&nbsp;</p><p>From Sourced Network Production in New York city. "It's 5:05". I'm Pokie Huang. Today is Tuesday, July 4th. Here's the full story behind today's cyber security and open source headlines...</p>]]></content:encoded><link><![CDATA[https://3zozb9fxlbueipjyapmaas.captivate.fm/episode/episode-177-how-not-to-do-a-force-password-reset-facial-recognition-explained-online-age-checks]]></link><guid isPermaLink="false">9c4c056a-1178-49e9-a7b3-fa33c744e4a7</guid><itunes:image href="https://artwork.captivate.fm/3d6422ee-2fa4-4258-8c34-6ab4be6019e2/5SRHAOOOe7glcjxalB_qCPyM.png"/><dc:creator><![CDATA[Contributors from Around the World]]></dc:creator><pubDate>Tue, 04 Jul 2023 16:45:00 -0400</pubDate><enclosure url="https://dts.podtrac.com/redirect.mp3/podcasts.captivate.fm/media/14a60c67-82da-49f5-b452-76282e2c6798/2023-07-04-505-Episode-177-converted.mp3" length="4850156" type="audio/mpeg"/><itunes:duration>06:44</itunes:duration><itunes:explicit>false</itunes:explicit><itunes:episodeType>full</itunes:episodeType><itunes:season>1</itunes:season><itunes:episode>177</itunes:episode><itunes:season>1</itunes:season><podcast:episode>177</podcast:episode><podcast:season>1</podcast:season><itunes:author>Contributors from Around the World</itunes:author></item><item><title>Episode #176 - American Tech Used by Chinese to Spy on Americans; Stalkerware App Suffers Data Breach; US Cyber Command’s “Under Advisement”; Real or Fake? It’s up to you to decide</title><itunes:title>Episode #176 - American Tech Used by Chinese to Spy on Americans; Stalkerware App Suffers Data Breach; US Cyber Command’s “Under Advisement”; Real or Fake? It’s up to you to decide</itunes:title><description><![CDATA[<p>Resources for this episode available at 505updates.com. </p><p>From Hillary Coover in Washington, DC: Many of you might be thinking enough with the Chinese balloon story, but did you know it was fitted with American technology?</p><p>From Edwin Kwan in Sydney, Australia: It's bad enough when apps you use suffers a data breach. It's worse when apps you didn't know you have gets breached.&nbsp;</p><p>From Katy Craig in San Diego, California: US Cyber Command's team of tech savvy military and civilian experts known as "Under Advisement", is set to double in size over the next year. Under Advisement's role complements the Cybersecurity and Infrastructure Security Agencies Joint Cyber Defense Collaborative.</p><p>From Mark Miller in New York City: Last week an article in the New York Times evaluated the accuracy of a set of five AI detection tools for evaluating images. In the best case scenario, 20% incorrectly identified whether an image was AI generated or not. In the worst case, all evaluation engines were incorrect.&nbsp;</p><p>From Sourced Network Production in New York city. "It's 5:05". I'm Pokie Huang. Today is Monday, July 3rd. Here's the full story behind today's cyber security and open source headlines...</p>]]></description><content:encoded><![CDATA[<p>Resources for this episode available at 505updates.com. </p><p>From Hillary Coover in Washington, DC: Many of you might be thinking enough with the Chinese balloon story, but did you know it was fitted with American technology?</p><p>From Edwin Kwan in Sydney, Australia: It's bad enough when apps you use suffers a data breach. It's worse when apps you didn't know you have gets breached.&nbsp;</p><p>From Katy Craig in San Diego, California: US Cyber Command's team of tech savvy military and civilian experts known as "Under Advisement", is set to double in size over the next year. Under Advisement's role complements the Cybersecurity and Infrastructure Security Agencies Joint Cyber Defense Collaborative.</p><p>From Mark Miller in New York City: Last week an article in the New York Times evaluated the accuracy of a set of five AI detection tools for evaluating images. In the best case scenario, 20% incorrectly identified whether an image was AI generated or not. In the worst case, all evaluation engines were incorrect.&nbsp;</p><p>From Sourced Network Production in New York city. "It's 5:05". I'm Pokie Huang. Today is Monday, July 3rd. Here's the full story behind today's cyber security and open source headlines...</p>]]></content:encoded><link><![CDATA[https://3zozb9fxlbueipjyapmaas.captivate.fm/episode/episode-176-american-tech-used-by-chinese-to-spy-on-americans-stalkerware-app-suffers-data-breach-us-cyber-commands-under-advisement-real-or-fake-its-up-to-you-to-decide]]></link><guid isPermaLink="false">7f275eb6-1f19-4886-bd0d-d5392a939a63</guid><itunes:image href="https://artwork.captivate.fm/b1ad4426-e99b-483d-9287-7857f186569d/g53qeVBGakmOai6uimsgczFW.png"/><dc:creator><![CDATA[Contributors from Around the World]]></dc:creator><pubDate>Mon, 03 Jul 2023 16:45:00 -0400</pubDate><enclosure url="https://dts.podtrac.com/redirect.mp3/podcasts.captivate.fm/media/e8a30508-38d3-4624-b4cf-6378e942b0b7/2023-07-03-505-Episode-176-converted.mp3" length="6832238" type="audio/mpeg"/><itunes:duration>09:29</itunes:duration><itunes:explicit>false</itunes:explicit><itunes:episodeType>full</itunes:episodeType><itunes:season>1</itunes:season><itunes:episode>176</itunes:episode><itunes:season>1</itunes:season><podcast:episode>176</podcast:episode><podcast:season>1</podcast:season><itunes:author>Contributors from Around the World</itunes:author></item><item><title>Episode #175 - Proton Launches Password Manager with Email Aliases; Soldiers get free smartwatches with malware; Balance Privacy and National Security; This Day in Tech History</title><itunes:title>Episode #175 - Proton Launches Password Manager with Email Aliases; Soldiers get free smartwatches with malware; Balance Privacy and National Security; This Day in Tech History</itunes:title><description><![CDATA[<p>Resources for this episode available at 505updates.com. </p><p>From Edwin Kwan in Sydney, Australia: Everyone deserves privacy by default. That's Proton's slogan. This week they announced the global launch of their password manager, Proton Pass.&nbsp;</p><p>From Katy Craig in San Diego, California: The US Army's Criminal Investigation Division (CID) is sounding the alarm advising soldiers who received unsolicited D18 smartwatches in the mail not to turn them on over concerns that these devices might be carrying some nasty malware.&nbsp;</p><p>From Hillary Coover in Washington, DC: There's a big debate going on among lawmakers in the United States about government surveillance. They're trying to figure out whether the FBI should be required to get a warrant before searching a database of foreign intelligence that might have information on American citizens.</p><p>From Marcel Brown in St. Lous, Missouri: July 1st, 1979. The first Sony Walkman, the TPS L2, goes on sale in Japan. By allowing owners to carry their personal music with them, the Walkman and their iconic headphones introduce a revolution in listening habits and popular culture at large.&nbsp;</p><p>From Sourced Network Production in New York city. "It's 5:05". I'm Pokie Huang. Today is Friday, June 30th. Here's the full story behind today's cyber security and open source headlines...</p>]]></description><content:encoded><![CDATA[<p>Resources for this episode available at 505updates.com. </p><p>From Edwin Kwan in Sydney, Australia: Everyone deserves privacy by default. That's Proton's slogan. This week they announced the global launch of their password manager, Proton Pass.&nbsp;</p><p>From Katy Craig in San Diego, California: The US Army's Criminal Investigation Division (CID) is sounding the alarm advising soldiers who received unsolicited D18 smartwatches in the mail not to turn them on over concerns that these devices might be carrying some nasty malware.&nbsp;</p><p>From Hillary Coover in Washington, DC: There's a big debate going on among lawmakers in the United States about government surveillance. They're trying to figure out whether the FBI should be required to get a warrant before searching a database of foreign intelligence that might have information on American citizens.</p><p>From Marcel Brown in St. Lous, Missouri: July 1st, 1979. The first Sony Walkman, the TPS L2, goes on sale in Japan. By allowing owners to carry their personal music with them, the Walkman and their iconic headphones introduce a revolution in listening habits and popular culture at large.&nbsp;</p><p>From Sourced Network Production in New York city. "It's 5:05". I'm Pokie Huang. Today is Friday, June 30th. Here's the full story behind today's cyber security and open source headlines...</p>]]></content:encoded><link><![CDATA[https://3zozb9fxlbueipjyapmaas.captivate.fm/episode/episode-175-proton-launches-password-manager-with-email-aliases-soldiers-get-free-smartwatches-with-malware-balance-privacy-and-national-security-this-day-in-tech-history]]></link><guid isPermaLink="false">0051cd95-8aec-4dce-b232-355c6eafa2ee</guid><itunes:image href="https://artwork.captivate.fm/86f6802d-185e-4f99-8d21-4ec690ac69aa/NlGGwAjFPwAFCyTItTIUo_Xt.png"/><dc:creator><![CDATA[Contributors from Around the World]]></dc:creator><pubDate>Fri, 30 Jun 2023 16:45:00 -0400</pubDate><enclosure url="https://dts.podtrac.com/redirect.mp3/podcasts.captivate.fm/media/631d53d0-db26-4a7e-9da7-6917a80e6851/2023-06-30-505-Episode-175-converted.mp3" length="5952004" type="audio/mpeg"/><itunes:duration>08:16</itunes:duration><itunes:explicit>false</itunes:explicit><itunes:episodeType>full</itunes:episodeType><itunes:season>1</itunes:season><itunes:episode>175</itunes:episode><itunes:season>1</itunes:season><podcast:episode>175</podcast:episode><podcast:season>1</podcast:season><itunes:author>Contributors from Around the World</itunes:author></item><item><title>Episode #174 - JavaScript NPM Registry Exposed to Manifest Confusion Vulnerability; Sysmon&apos;s Latest Features Unveiled; Mockingjay Process Injection; This Day in Tech History</title><itunes:title>Episode #174 - JavaScript NPM Registry Exposed to Manifest Confusion Vulnerability; Sysmon&apos;s Latest Features Unveiled; Mockingjay Process Injection; This Day in Tech History</itunes:title><description><![CDATA[<p>Resources for this episode available at 505updates.com. </p><p>From Edwin Kwan in Sydney, Australia: The JavaScript NPM registry has a manifest confusion vulnerability which can allow the installation and execution of malicious files without the user's knowledge.&nbsp;</p><p>From Ian Garrett in Arlington, Virginia: Microsoft Sysmon just got a beefy upgrade. Sysmon is a free Microsoft Sysinternals tool that can monitor and block malicious or suspicious activity and log events to the Windows event log.</p><p>From Katy Craig in San Diego, California: There's a new process injection technique that could give threat actors a way to bypass security solutions and wreak havoc on compromised systems.&nbsp;</p><p>From Marcel Brown in St. Lous, Missouri: The iPhone turned out to be the computing device that we all wished we had, yet didn't know what we were missing until we had one. It has literally impacted nearly every aspect of our society, and it is no stretch to say that the iPhone has changed the world.</p><p>From Sourced Network Production in New York city. "It's 5:05". I'm Pokie Huang. Today is Thursday, June 29th. Here's the full story behind today's cyber security and open source headlines...</p>]]></description><content:encoded><![CDATA[<p>Resources for this episode available at 505updates.com. </p><p>From Edwin Kwan in Sydney, Australia: The JavaScript NPM registry has a manifest confusion vulnerability which can allow the installation and execution of malicious files without the user's knowledge.&nbsp;</p><p>From Ian Garrett in Arlington, Virginia: Microsoft Sysmon just got a beefy upgrade. Sysmon is a free Microsoft Sysinternals tool that can monitor and block malicious or suspicious activity and log events to the Windows event log.</p><p>From Katy Craig in San Diego, California: There's a new process injection technique that could give threat actors a way to bypass security solutions and wreak havoc on compromised systems.&nbsp;</p><p>From Marcel Brown in St. Lous, Missouri: The iPhone turned out to be the computing device that we all wished we had, yet didn't know what we were missing until we had one. It has literally impacted nearly every aspect of our society, and it is no stretch to say that the iPhone has changed the world.</p><p>From Sourced Network Production in New York city. "It's 5:05". I'm Pokie Huang. Today is Thursday, June 29th. Here's the full story behind today's cyber security and open source headlines...</p>]]></content:encoded><link><![CDATA[https://3zozb9fxlbueipjyapmaas.captivate.fm/episode/episode-174-javascript-npm-registry-exposed-to-manifest-confusion-vulnerability-sysmons-latest-features-unveiled-mockingjay-process-injection-this-day-in-tech-history]]></link><guid isPermaLink="false">7d35912f-855c-4f3c-9120-30d3d4535ec4</guid><itunes:image href="https://artwork.captivate.fm/eb2b5272-9af5-432a-a62b-a3e32a8f30c3/s1H6oC9YoIxby9-Paa0YFzWk.png"/><dc:creator><![CDATA[Contributors from Around the World]]></dc:creator><pubDate>Thu, 29 Jun 2023 16:45:00 -0400</pubDate><enclosure url="https://dts.podtrac.com/redirect.mp3/podcasts.captivate.fm/media/b363ea83-2f41-445f-99d9-d13c2a2f5010/2023-06-29-505-Episode-174-converted.mp3" length="6304344" type="audio/mpeg"/><itunes:duration>08:45</itunes:duration><itunes:explicit>false</itunes:explicit><itunes:episodeType>full</itunes:episodeType><itunes:season>1</itunes:season><itunes:episode>174</itunes:episode><itunes:season>1</itunes:season><podcast:episode>174</podcast:episode><podcast:season>1</podcast:season><itunes:author>Contributors from Around the World</itunes:author></item><item><title>Episode #173 - Super Mario 3: Malware Edition; North Korean Hackers Tap Mics; YouTube Demands Invidious.io Cease and Desist; This Day in Tech History</title><itunes:title>Episode #173 - Super Mario 3: Malware Edition; North Korean Hackers Tap Mics; YouTube Demands Invidious.io Cease and Desist; This Day in Tech History</itunes:title><description><![CDATA[<p>Resources for this episode available at 505updates.com. </p><p>From Edwin Kwan in Sydney, Australia: There is a new version of Super Mario 3 making its way on gaming forums and social media groups. It's a Trojanized version.</p><p>From Katy Craig in San Diego, California: APT37 is taking surveillance to a whole new level. They're using a Go-based backdoor to exploit a real-time data transform platform called Ably.&nbsp;</p><p>From Hillary Coover in Washington, DC: Three weeks ago, YouTube sent a cease and desist letter to Invidious, an open source alternative front end for YouTube that allows users to watch videos without data tracking.&nbsp;</p><p>From Marcel Brown in St. Lous, Missouri: June 28th, 1955. The HMTS Monarch, the largest cable lane ship in the world at the time, launches from Clarenville, Newfoundland to begin laying TAT-1, the first transatlantic telephone cable.&nbsp;</p><p>From Sourced Network Production in New York city. "It's 5:05". I'm Pokie Huang. Today is Wednesday, June 28th. Here's the full story behind today's cyber security and open source headlines...</p>]]></description><content:encoded><![CDATA[<p>Resources for this episode available at 505updates.com. </p><p>From Edwin Kwan in Sydney, Australia: There is a new version of Super Mario 3 making its way on gaming forums and social media groups. It's a Trojanized version.</p><p>From Katy Craig in San Diego, California: APT37 is taking surveillance to a whole new level. They're using a Go-based backdoor to exploit a real-time data transform platform called Ably.&nbsp;</p><p>From Hillary Coover in Washington, DC: Three weeks ago, YouTube sent a cease and desist letter to Invidious, an open source alternative front end for YouTube that allows users to watch videos without data tracking.&nbsp;</p><p>From Marcel Brown in St. Lous, Missouri: June 28th, 1955. The HMTS Monarch, the largest cable lane ship in the world at the time, launches from Clarenville, Newfoundland to begin laying TAT-1, the first transatlantic telephone cable.&nbsp;</p><p>From Sourced Network Production in New York city. "It's 5:05". I'm Pokie Huang. Today is Wednesday, June 28th. Here's the full story behind today's cyber security and open source headlines...</p>]]></content:encoded><link><![CDATA[https://3zozb9fxlbueipjyapmaas.captivate.fm/episode/episode-173-super-mario-3-malware-edition-north-korean-hackers-tap-mics-youtube-demands-invidious-io-cease-and-desist-this-day-in-tech-history]]></link><guid isPermaLink="false">d6826068-f23a-4ed7-bd48-a618bae092bd</guid><itunes:image href="https://artwork.captivate.fm/bf67015a-a804-4bac-823f-d55ea60eeb64/PbqwwkJ8VJnRJuXzcsEfoRXs.png"/><dc:creator><![CDATA[Contributors from Around the World]]></dc:creator><pubDate>Wed, 28 Jun 2023 16:45:00 -0400</pubDate><enclosure url="https://dts.podtrac.com/redirect.mp3/podcasts.captivate.fm/media/2e185951-c41c-4c10-b5b8-d4667576ea5e/2023-06-28-Episode-173-converted.mp3" length="5828196" type="audio/mpeg"/><itunes:duration>08:06</itunes:duration><itunes:explicit>false</itunes:explicit><itunes:episodeType>full</itunes:episodeType><itunes:season>1</itunes:season><itunes:episode>173</itunes:episode><itunes:season>1</itunes:season><podcast:episode>173</podcast:episode><podcast:season>1</podcast:season><itunes:author>Contributors from Around the World</itunes:author></item><item><title>Episode #172 - AI Chatbot Used for Sex; Medibank Nightmare Continues; He&apos;s not stupid... he&apos;s lazy; Today in Tech History</title><itunes:title>Episode #172 - AI Chatbot Used for Sex; Medibank Nightmare Continues; He&apos;s not stupid... he&apos;s lazy; Today in Tech History</itunes:title><description><![CDATA[<p>Resources for this episode available at 5:05updates.com. </p><p>From Katy Craig in San Diego, California: Get ready for an AI showdown folks. Meta's new open source AI chatbots were just offered up to people and they're using them for sex. </p><p>From Edwin Kwan in Sydney, Australia: Medibank Private, a health insurance provider, suffered a data breach in October, 2022, and that resulted in the compromise of 9.7 million current and former customers.</p><p>From Mark Miller in New York City: He professes that he was tricked by ChatGPT, that he had no idea that the output could be generated from non-existent cases. If we are to believe him, and I do actually believe him, that doesn't make him stupid. It makes him lazy. </p><p>From Marcel Brown in St. Louis, Missouri: June 27th, 1972. The iconic video game company Atari is founded by Nolan Bushnell in Ted Dabney. Their first video game Pong was the first commercially successful video game and led to the start of the video game industry.</p><p>From Sourced Network Productions in New York City. I’m Mark Miller. Today is Tuesday, June 27. Here’s the full story behind each of our headlines...</p><p> </p>]]></description><content:encoded><![CDATA[<p>Resources for this episode available at 5:05updates.com. </p><p>From Katy Craig in San Diego, California: Get ready for an AI showdown folks. Meta's new open source AI chatbots were just offered up to people and they're using them for sex. </p><p>From Edwin Kwan in Sydney, Australia: Medibank Private, a health insurance provider, suffered a data breach in October, 2022, and that resulted in the compromise of 9.7 million current and former customers.</p><p>From Mark Miller in New York City: He professes that he was tricked by ChatGPT, that he had no idea that the output could be generated from non-existent cases. If we are to believe him, and I do actually believe him, that doesn't make him stupid. It makes him lazy. </p><p>From Marcel Brown in St. Louis, Missouri: June 27th, 1972. The iconic video game company Atari is founded by Nolan Bushnell in Ted Dabney. Their first video game Pong was the first commercially successful video game and led to the start of the video game industry.</p><p>From Sourced Network Productions in New York City. I’m Mark Miller. Today is Tuesday, June 27. Here’s the full story behind each of our headlines...</p><p> </p>]]></content:encoded><link><![CDATA[https://3zozb9fxlbueipjyapmaas.captivate.fm/episode/episode-172-ai-chatbot-used-for-sex-medibank-nightmare-continues-hes-not-stupid-hes-lazy-today-in-tech-history]]></link><guid isPermaLink="false">78213ee2-65f9-440b-afc5-7e131e42ee64</guid><itunes:image href="https://artwork.captivate.fm/33e2a4e7-a936-4ef5-905a-3a72363cfbe4/BkhMbfQsRHQi9QFk9GvnUJSv.png"/><dc:creator><![CDATA[Contributors from Around the World]]></dc:creator><pubDate>Tue, 27 Jun 2023 16:45:00 -0400</pubDate><enclosure url="https://dts.podtrac.com/redirect.mp3/podcasts.captivate.fm/media/75e7ef3c-242f-4186-90dc-0cf64acfb9a3/2023-06-27-Full-Episode-v01-converted.mp3" length="10895946" type="audio/mpeg"/><itunes:duration>11:21</itunes:duration><itunes:explicit>false</itunes:explicit><itunes:episodeType>full</itunes:episodeType><itunes:season>1</itunes:season><itunes:episode>172</itunes:episode><itunes:season>1</itunes:season><podcast:episode>172</podcast:episode><podcast:season>1</podcast:season><itunes:author>Contributors from Around the World</itunes:author></item><item><title>Episode #171 - Australia&apos;s First Cyber Security Coordinator, SBOBS are a security staple in the software supply chain, UPS Breach, Follow the Money</title><itunes:title>Episode #171 - Australia&apos;s First Cyber Security Coordinator, SBOBS are a security staple in the software supply chain, UPS Breach, Follow the Money</itunes:title><description><![CDATA[<p><strong>It's 5:05 on Monday, June 26th, 2023. </strong>From the Sourced Podcast Network in New York city, this is Pokie Huang. Stories in today's episode come from <strong>Edwin Kwan</strong> in Sydney, Australia, <strong>Julie Chatman</strong> in Washington, DC, <strong>Katy Craig</strong> in San Diego, California, <strong>Hillary Coover</strong> in Washington, DC, and <strong>Marcel Brown</strong> in St. Louis, Missouri.</p><p>Let's get to it!</p><h3><br></h3><h3>Australia's First Cyber Security Coordinator Announced</h3><p><a href="https://505updates.com/edwinkwan/" rel="noopener noreferrer" target="_blank">🇦🇺 Edwin Kwan, Sydney, Australia ↗</a></p><p><a href="https://www.smh.com.au/politics/federal/air-force-commander-to-take-on-hackers-as-australia-s-first-cybersecurity-boss-20230622-p5diia.html" rel="noopener noreferrer" target="_blank">Air Force commander to take on hackers as Australia's first cybersecurity boss</a></p><p><a href="https://www.abc.net.au/news/2023-06-23/cyber-security-coordinator-appointed-ebsworth-breach/102514454" rel="noopener noreferrer" target="_blank">Nation's first cyber security coordinator appointed, as government reckons with HWL Ebsworth breach - ABC News</a></p><h3>SBOMS are a security staple in the software supply chain</h3><p><a href="https://505updates.com/juliechatman/" rel="noopener noreferrer" target="_blank"><strong>🇺🇸</strong> Julie Chatman, Washington, DC ↗</a></p><p><a href="https://www.theregister.com/2023/03/05/sboms_supply_chain_security/" rel="noopener noreferrer" target="_blank">SBOMs become a security staple for the software supply chain • The Register</a></p><p><a href="https://www.activestate.com/blog/why-the-us-government-is-mandating-software-bill-of-materials-sbom/" rel="noopener noreferrer" target="_blank">Why The US Government Is Mandating Software Bill Of Materials (SBOM)</a></p><p><br></p><h3>UPS Breach</h3><p><a href="https://505updates.com/katycraig/" rel="noopener noreferrer" target="_blank">🇺🇸 Katy Craig, San Diego, California ↗</a></p><p><a href="https://www.bleepingcomputer.com/news/security/ups-discloses-data-breach-after-exposed-customer-info-used-in-sms-phishing/" rel="noopener noreferrer" target="_blank">UPS discloses data breach after exposed customer info used in SMS phishing</a></p><h3><br></h3><h3>Follow the Money&nbsp;</h3><p><a href="http://505updates.com/hillarycoover/" rel="noopener noreferrer" target="_blank">🇺🇸 Hillary Coover, Washington, DC ↗</a></p><p><a href="https://www.nytimes.com/2023/06/26/business/dealbook/prigozhins-wagner-money.html" rel="noopener noreferrer" target="_blank">The Money Behind Yevgeny Prigozhin and the Wagner Group - The New York Times</a></p><h3><br></h3><h3>This Day in Tech History&nbsp;</h3><p><a href="https://505updates.com/marcelbrown/" rel="noopener noreferrer" target="_blank"><strong>🇺🇸</strong> Marcel Brown, St. Louis, Missouri ↗</a></p><p><a href="https://thisdayintechhistory.com/06/25" rel="noopener noreferrer" target="_blank">https://thisdayintechhistory.com/06/25</a></p><p><a href="https://thisdayintechhistory.com/06/26" rel="noopener noreferrer" target="_blank">https://thisdayintechhistory.com/06/26</a></p>]]></description><content:encoded><![CDATA[<p><strong>It's 5:05 on Monday, June 26th, 2023. </strong>From the Sourced Podcast Network in New York city, this is Pokie Huang. Stories in today's episode come from <strong>Edwin Kwan</strong> in Sydney, Australia, <strong>Julie Chatman</strong> in Washington, DC, <strong>Katy Craig</strong> in San Diego, California, <strong>Hillary Coover</strong> in Washington, DC, and <strong>Marcel Brown</strong> in St. Louis, Missouri.</p><p>Let's get to it!</p><h3><br></h3><h3>Australia's First Cyber Security Coordinator Announced</h3><p><a href="https://505updates.com/edwinkwan/" rel="noopener noreferrer" target="_blank">🇦🇺 Edwin Kwan, Sydney, Australia ↗</a></p><p><a href="https://www.smh.com.au/politics/federal/air-force-commander-to-take-on-hackers-as-australia-s-first-cybersecurity-boss-20230622-p5diia.html" rel="noopener noreferrer" target="_blank">Air Force commander to take on hackers as Australia's first cybersecurity boss</a></p><p><a href="https://www.abc.net.au/news/2023-06-23/cyber-security-coordinator-appointed-ebsworth-breach/102514454" rel="noopener noreferrer" target="_blank">Nation's first cyber security coordinator appointed, as government reckons with HWL Ebsworth breach - ABC News</a></p><h3>SBOMS are a security staple in the software supply chain</h3><p><a href="https://505updates.com/juliechatman/" rel="noopener noreferrer" target="_blank"><strong>🇺🇸</strong> Julie Chatman, Washington, DC ↗</a></p><p><a href="https://www.theregister.com/2023/03/05/sboms_supply_chain_security/" rel="noopener noreferrer" target="_blank">SBOMs become a security staple for the software supply chain • The Register</a></p><p><a href="https://www.activestate.com/blog/why-the-us-government-is-mandating-software-bill-of-materials-sbom/" rel="noopener noreferrer" target="_blank">Why The US Government Is Mandating Software Bill Of Materials (SBOM)</a></p><p><br></p><h3>UPS Breach</h3><p><a href="https://505updates.com/katycraig/" rel="noopener noreferrer" target="_blank">🇺🇸 Katy Craig, San Diego, California ↗</a></p><p><a href="https://www.bleepingcomputer.com/news/security/ups-discloses-data-breach-after-exposed-customer-info-used-in-sms-phishing/" rel="noopener noreferrer" target="_blank">UPS discloses data breach after exposed customer info used in SMS phishing</a></p><h3><br></h3><h3>Follow the Money&nbsp;</h3><p><a href="http://505updates.com/hillarycoover/" rel="noopener noreferrer" target="_blank">🇺🇸 Hillary Coover, Washington, DC ↗</a></p><p><a href="https://www.nytimes.com/2023/06/26/business/dealbook/prigozhins-wagner-money.html" rel="noopener noreferrer" target="_blank">The Money Behind Yevgeny Prigozhin and the Wagner Group - The New York Times</a></p><h3><br></h3><h3>This Day in Tech History&nbsp;</h3><p><a href="https://505updates.com/marcelbrown/" rel="noopener noreferrer" target="_blank"><strong>🇺🇸</strong> Marcel Brown, St. Louis, Missouri ↗</a></p><p><a href="https://thisdayintechhistory.com/06/25" rel="noopener noreferrer" target="_blank">https://thisdayintechhistory.com/06/25</a></p><p><a href="https://thisdayintechhistory.com/06/26" rel="noopener noreferrer" target="_blank">https://thisdayintechhistory.com/06/26</a></p>]]></content:encoded><link><![CDATA[https://3zozb9fxlbueipjyapmaas.captivate.fm/episode/episode-171-australias-first-cyber-security-coordinator-sbobs-are-a-security-staple-in-the-software-supply-chain-ups-breach-follow-the-money]]></link><guid isPermaLink="false">3173cef5-f034-4e3a-baf9-4c0d55923a96</guid><itunes:image href="https://artwork.captivate.fm/57333014-0a64-4e28-bf21-ec1fcd3cad7d/P3NLTpl3695UXIdpf0w5Mh8F.png"/><dc:creator><![CDATA[Contributors from Around the World]]></dc:creator><pubDate>Mon, 26 Jun 2023 16:45:00 -0400</pubDate><enclosure url="https://dts.podtrac.com/redirect.mp3/podcasts.captivate.fm/media/4a8658b5-a8aa-4535-b67f-c3618e495cb2/2023-06-26-505-Episode-171-converted.mp3" length="7641879" type="audio/mpeg"/><itunes:duration>10:37</itunes:duration><itunes:explicit>false</itunes:explicit><itunes:episodeType>full</itunes:episodeType><itunes:season>1</itunes:season><itunes:episode>171</itunes:episode><itunes:season>1</itunes:season><podcast:episode>171</podcast:episode><podcast:season>1</podcast:season><itunes:author>Contributors from Around the World</itunes:author></item><item><title>Episode #170 - ChatGPT Accounts Stolen, China in Cuba, Google Pledges to Cyber Clinics, Safari needs patching too</title><itunes:title>Episode #170 - ChatGPT Accounts Stolen, China in Cuba, Google Pledges to Cyber Clinics, Safari needs patching too</itunes:title><description><![CDATA[<p><strong>It's 5:05 on Friday, June 23rd, 2023. </strong>From the source podcast network in New York city. This is Pokie Huang. Stories in today's episode come from <strong>Edwin Kwan</strong> in Sydney, Australia, <strong>Hillary Coover</strong> in Washington, DC, <strong>Katy Craig</strong> in San Diego, California, <strong>Olimpiu Pop</strong> in Transylvania, Romania and <strong>Marcel Brown</strong> in St. Louis, Missouri.</p><p>Let’s get to it!</p><h3><strong>Over 100,000 ChatGPT Accounts Stolen Via Malware For Sale on Dark Web</strong></h3><p><a href="https://505updates.com/edwinkwan/" rel="noopener noreferrer" target="_blank">🇦🇺 Edwin Kwan, Sydney, Australia ↗</a></p><p><a href="https://thehackernews.com/2023/06/over-100000-stolen-chatgpt-account.html" rel="noopener noreferrer" target="_blank">Over 100,000 Stolen ChatGPT Account Credentials Sold on Dark Web Marketplaces</a></p><p><a href="https://www.bleepingcomputer.com/news/security/over-100-000-chatgpt-accounts-stolen-via-info-stealing-malware/" rel="noopener noreferrer" target="_blank">Over 100,000 ChatGPT accounts stolen via info-stealing malware</a></p><p><a href="https://www.group-ib.com/media-center/press-releases/stealers-chatgpt-credentials/" rel="noopener noreferrer" target="_blank">Group-IB Discovers 100K+ Compromised ChatGPT Accounts on Dark Web Marketplaces; Asia-Pacific region tops the list</a></p><h3><strong>China in Cuba</strong></h3><p><a href="http://505updates.com/hillarycoover/" rel="noopener noreferrer" target="_blank">🇺🇸 Hillary Coover, Washington, DC ↗</a></p><h3><strong>Google pledges $20M to Cyber Clinics</strong></h3><p><a href="https://505updates.com/katycraig/" rel="noopener noreferrer" target="_blank">🇺🇸 Katy Craig, San Diego, California ↗</a></p><p><a href="https://apnews.com/article/google-cybersecurity-clinics-sundar-pichai-d6a35d463e2f4743daa5a00ad8e70a11" rel="noopener noreferrer" target="_blank">Google backs creation of cybersecurity clinics with $20 million donation | AP News</a></p><h3><strong>Safari needs patching too: Apple products affected by sophisticated implant</strong></h3><p><a href="http://505updates.com/olimpiupop/" rel="noopener noreferrer" target="_blank">🇷🇴 Olimpiu Pop, Transylvania, Romania ↗</a></p><p><a href="https://www.csa.gov.sg/alerts-advisories/alerts/2023/al-2023-083" rel="noopener noreferrer" target="_blank">https://www.csa.gov.sg/alerts-advisories/alerts/2023/al-2023-083</a></p><p><a href="https://support.apple.com/en-us/HT201222" rel="noopener noreferrer" target="_blank">https://support.apple.com/en-us/HT201222</a></p><p><a href="https://nvd.nist.gov/vuln/detail/CVE-2023-32434" rel="noopener noreferrer" target="_blank">https://nvd.nist.gov/vuln/detail/CVE-2023-32434</a></p><p><a href="https://nvd.nist.gov/vuln/detail/CVE-2023-32435" rel="noopener noreferrer" target="_blank">https://nvd.nist.gov/vuln/detail/CVE-2023-32435</a></p><p><a href="https://nvd.nist.gov/vuln/detail/CVE-2023-32439" rel="noopener noreferrer" target="_blank">https://nvd.nist.gov/vuln/detail/CVE-2023-32439</a></p><p><a href="https://thehackernews.com/2023/06/new-zero-click-hack-targets-ios-users.html" rel="noopener noreferrer" target="_blank">https://thehackernews.com/2023/06/new-zero-click-hack-targets-ios-users.html</a></p><p><a href="https://thehackernews.com/2023/06/new-report-exposes-operation.html" rel="noopener noreferrer" target="_blank">https://thehackernews.com/2023/06/new-report-exposes-operation.html</a></p><h3><strong>This Day in Tech History&nbsp;</strong></h3><p><a href="https://505updates.com/marcelbrown/" rel="noopener noreferrer" target="_blank"><strong>🇺🇸</strong>&nbsp;Marcel Brown, St. Louis, Missouri ↗</a></p><p><a href="https://thisdayintechhistory.com/06/23" rel="noopener noreferrer" target="_blank">https://thisdayintechhistory.com/06/23</a></p><p><a href="https://thisdayintechhistory.com/06/24" rel="noopener noreferrer" target="_blank">https://thisdayintechhistory.com/06/24</a></p>]]></description><content:encoded><![CDATA[<p><strong>It's 5:05 on Friday, June 23rd, 2023. </strong>From the source podcast network in New York city. This is Pokie Huang. Stories in today's episode come from <strong>Edwin Kwan</strong> in Sydney, Australia, <strong>Hillary Coover</strong> in Washington, DC, <strong>Katy Craig</strong> in San Diego, California, <strong>Olimpiu Pop</strong> in Transylvania, Romania and <strong>Marcel Brown</strong> in St. Louis, Missouri.</p><p>Let’s get to it!</p><h3><strong>Over 100,000 ChatGPT Accounts Stolen Via Malware For Sale on Dark Web</strong></h3><p><a href="https://505updates.com/edwinkwan/" rel="noopener noreferrer" target="_blank">🇦🇺 Edwin Kwan, Sydney, Australia ↗</a></p><p><a href="https://thehackernews.com/2023/06/over-100000-stolen-chatgpt-account.html" rel="noopener noreferrer" target="_blank">Over 100,000 Stolen ChatGPT Account Credentials Sold on Dark Web Marketplaces</a></p><p><a href="https://www.bleepingcomputer.com/news/security/over-100-000-chatgpt-accounts-stolen-via-info-stealing-malware/" rel="noopener noreferrer" target="_blank">Over 100,000 ChatGPT accounts stolen via info-stealing malware</a></p><p><a href="https://www.group-ib.com/media-center/press-releases/stealers-chatgpt-credentials/" rel="noopener noreferrer" target="_blank">Group-IB Discovers 100K+ Compromised ChatGPT Accounts on Dark Web Marketplaces; Asia-Pacific region tops the list</a></p><h3><strong>China in Cuba</strong></h3><p><a href="http://505updates.com/hillarycoover/" rel="noopener noreferrer" target="_blank">🇺🇸 Hillary Coover, Washington, DC ↗</a></p><h3><strong>Google pledges $20M to Cyber Clinics</strong></h3><p><a href="https://505updates.com/katycraig/" rel="noopener noreferrer" target="_blank">🇺🇸 Katy Craig, San Diego, California ↗</a></p><p><a href="https://apnews.com/article/google-cybersecurity-clinics-sundar-pichai-d6a35d463e2f4743daa5a00ad8e70a11" rel="noopener noreferrer" target="_blank">Google backs creation of cybersecurity clinics with $20 million donation | AP News</a></p><h3><strong>Safari needs patching too: Apple products affected by sophisticated implant</strong></h3><p><a href="http://505updates.com/olimpiupop/" rel="noopener noreferrer" target="_blank">🇷🇴 Olimpiu Pop, Transylvania, Romania ↗</a></p><p><a href="https://www.csa.gov.sg/alerts-advisories/alerts/2023/al-2023-083" rel="noopener noreferrer" target="_blank">https://www.csa.gov.sg/alerts-advisories/alerts/2023/al-2023-083</a></p><p><a href="https://support.apple.com/en-us/HT201222" rel="noopener noreferrer" target="_blank">https://support.apple.com/en-us/HT201222</a></p><p><a href="https://nvd.nist.gov/vuln/detail/CVE-2023-32434" rel="noopener noreferrer" target="_blank">https://nvd.nist.gov/vuln/detail/CVE-2023-32434</a></p><p><a href="https://nvd.nist.gov/vuln/detail/CVE-2023-32435" rel="noopener noreferrer" target="_blank">https://nvd.nist.gov/vuln/detail/CVE-2023-32435</a></p><p><a href="https://nvd.nist.gov/vuln/detail/CVE-2023-32439" rel="noopener noreferrer" target="_blank">https://nvd.nist.gov/vuln/detail/CVE-2023-32439</a></p><p><a href="https://thehackernews.com/2023/06/new-zero-click-hack-targets-ios-users.html" rel="noopener noreferrer" target="_blank">https://thehackernews.com/2023/06/new-zero-click-hack-targets-ios-users.html</a></p><p><a href="https://thehackernews.com/2023/06/new-report-exposes-operation.html" rel="noopener noreferrer" target="_blank">https://thehackernews.com/2023/06/new-report-exposes-operation.html</a></p><h3><strong>This Day in Tech History&nbsp;</strong></h3><p><a href="https://505updates.com/marcelbrown/" rel="noopener noreferrer" target="_blank"><strong>🇺🇸</strong>&nbsp;Marcel Brown, St. Louis, Missouri ↗</a></p><p><a href="https://thisdayintechhistory.com/06/23" rel="noopener noreferrer" target="_blank">https://thisdayintechhistory.com/06/23</a></p><p><a href="https://thisdayintechhistory.com/06/24" rel="noopener noreferrer" target="_blank">https://thisdayintechhistory.com/06/24</a></p>]]></content:encoded><link><![CDATA[https://3zozb9fxlbueipjyapmaas.captivate.fm/episode/episode-170-chatgpt-accounts-stolen-china-in-cuba-google-pledges-to-cyber-clinics-safari-needs-patching-too]]></link><guid isPermaLink="false">01007b8e-a826-4888-b67c-296405698b02</guid><itunes:image href="https://artwork.captivate.fm/439ca790-423e-42e3-9488-e235138e6433/bLVUhrQV5iMYdJ0scqckAAsG.png"/><dc:creator><![CDATA[Contributors from Around the World]]></dc:creator><pubDate>Fri, 23 Jun 2023 16:45:00 -0400</pubDate><enclosure url="https://dts.podtrac.com/redirect.mp3/podcasts.captivate.fm/media/40ed90d2-b750-4824-a23b-e6a3d06d9a2c/2023-06-23-505-Episode-170-converted.mp3" length="7297688" type="audio/mpeg"/><itunes:duration>10:08</itunes:duration><itunes:explicit>false</itunes:explicit><itunes:episodeType>full</itunes:episodeType><itunes:season>1</itunes:season><itunes:episode>170</itunes:episode><itunes:season>1</itunes:season><podcast:episode>170</podcast:episode><podcast:season>1</podcast:season><itunes:author>Contributors from Around the World</itunes:author></item><item><title>Episode #169 - Apple releases a patch addressing three zero-day vulnerabilities, BlackCat (ALPHV) just won’t leave reddit alone, Part 3 - What You Should Know About Location Records, Edge Browser, This Day in Tech History</title><itunes:title>Episode #169 - Apple releases a patch addressing three zero-day vulnerabilities, BlackCat (ALPHV) just won’t leave reddit alone, Part 3 - What You Should Know About Location Records, Edge Browser, This Day in Tech History</itunes:title><description><![CDATA[<p><strong>It's 5:05 on Thursday, June 22nd, 2023.</strong> From the source podcast network in New York city. This is Pokie Huang. Stories in today's episode come from <strong>Edwin Kwan</strong> in Sydney, Australia, <strong>Katy Craig</strong> in San Diego, California, <strong>Hillary Coover</strong> in Washington, DC, <strong>Olimpiu Pop</strong> in Transylvania, Romania and <strong>Marcel Brown</strong> in St. Louis, Missouri.</p><p>Let’s get to it!</p><h3><strong>Apple releases a patch addressing three zero-day vulnerabilities</strong></h3><p><a href="https://505updates.com/edwinkwan/" rel="noopener noreferrer" target="_blank">🇦🇺 Edwin Kwan, Sydney, Australia ↗"</a></p><p><a href="https://www.itnews.com.au/news/apple-rushes-out-patches-for-exploited-zero-day-bugs-597199" rel="noopener noreferrer" target="_blank">Apple rushes out patches for exploited zero day bugs - Security - iTnews</a></p><p><a href="https://www.bleepingcomputer.com/news/apple/apple-fixes-zero-days-used-to-deploy-triangulation-spyware-via-imessage/" rel="noopener noreferrer" target="_blank">Apple fixes zero-days used to deploy Triangulation spyware via iMessage</a></p><p><a href="https://securelist.com/triangledb-triangulation-implant/110050/" rel="noopener noreferrer" target="_blank">Dissecting TriangleDB, a Triangulation spyware implant | Securelist</a></p><h3><strong>BlackCat (ALPHV) just won’t leave reddit alone</strong></h3><p><a href="https://505updates.com/katycraig/" rel="noopener noreferrer" target="_blank">🇺🇸 Katy Craig, San Diego, California ↗</a></p><p><a href="https://techcrunch.com/2023/06/19/hackers-threaten-to-leak-80gb-of-confidential-data-stolen-from-reddit" rel="noopener noreferrer" target="_blank">Hackers threaten to leak 80GB of confidential data stolen from Reddit | TechCrunch</a></p><p><a href="https://techcrunch.com/2023/02/10/reddit-says-hackers-accessed-internal-data-following-employee-phishing-attack/" rel="noopener noreferrer" target="_blank">Reddit says hackers accessed employee data following phishing attack | TechCrunch</a></p><h3><strong>Part 3 - What You Should Know About Location Records</strong></h3><p><a href="http://505updates.com/hillarycoover/" rel="noopener noreferrer" target="_blank">🇺🇸 Hillary Coover, Washington, DC ↗</a></p><p><a href="https://news.bloomberglaw.com/privacy-and-data-security/washington-shields-abortion-data-in-first-in-nation-privacy-law" rel="noopener noreferrer" target="_blank">Washington Shields Abortion Data in First-in-Nation Privacy Law</a></p><h3><strong>Edge added to browser list of zero-day vulnerability</strong></h3><p><a href="http://505updates.com/olimpiupop/" rel="noopener noreferrer" target="_blank">🇷🇴 Olimpiu Pop, Transylvania, Romania ↗</a></p><p><a href="https://learn.microsoft.com/en-us/deployedge/microsoft-edge-relnotes-security#june-5-2023" rel="noopener noreferrer" target="_blank">Release notes for Microsoft Edge Security Update</a></p><p><a href="https://learn.microsoft.com/en-us/deployedge/microsoft-edge-relnotes-security#june-6-2023" rel="noopener noreferrer" target="_blank">Release notes for Microsoft Edge Security Updates</a></p><p><a href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-29345" rel="noopener noreferrer" target="_blank">https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-29345</a></p><p><a href="https://nvd.nist.gov/vuln/detail/CVE-2023-33145" rel="noopener noreferrer" target="_blank">NVD - CVE-2023-33145</a></p><p><a href="https://nvd.nist.gov/vuln/detail/CVE-2023-33143" rel="noopener noreferrer" target="_blank">NVD - CVE-2023-33143</a></p><h3><strong>This Day in Tech History&nbsp;</strong></h3><p><a href="https://505updates.com/marcelbrown/" rel="noopener noreferrer" target="_blank"><strong>🇺🇸</strong>&nbsp;Marcel Brown, St. Louis, Missouri ↗</a></p><p><a href="http://thisdayintechhistory.com/06/22" rel="noopener noreferrer" target="_blank">http://thisdayintechhistory.com/06/22</a></p>]]></description><content:encoded><![CDATA[<p><strong>It's 5:05 on Thursday, June 22nd, 2023.</strong> From the source podcast network in New York city. This is Pokie Huang. Stories in today's episode come from <strong>Edwin Kwan</strong> in Sydney, Australia, <strong>Katy Craig</strong> in San Diego, California, <strong>Hillary Coover</strong> in Washington, DC, <strong>Olimpiu Pop</strong> in Transylvania, Romania and <strong>Marcel Brown</strong> in St. Louis, Missouri.</p><p>Let’s get to it!</p><h3><strong>Apple releases a patch addressing three zero-day vulnerabilities</strong></h3><p><a href="https://505updates.com/edwinkwan/" rel="noopener noreferrer" target="_blank">🇦🇺 Edwin Kwan, Sydney, Australia ↗"</a></p><p><a href="https://www.itnews.com.au/news/apple-rushes-out-patches-for-exploited-zero-day-bugs-597199" rel="noopener noreferrer" target="_blank">Apple rushes out patches for exploited zero day bugs - Security - iTnews</a></p><p><a href="https://www.bleepingcomputer.com/news/apple/apple-fixes-zero-days-used-to-deploy-triangulation-spyware-via-imessage/" rel="noopener noreferrer" target="_blank">Apple fixes zero-days used to deploy Triangulation spyware via iMessage</a></p><p><a href="https://securelist.com/triangledb-triangulation-implant/110050/" rel="noopener noreferrer" target="_blank">Dissecting TriangleDB, a Triangulation spyware implant | Securelist</a></p><h3><strong>BlackCat (ALPHV) just won’t leave reddit alone</strong></h3><p><a href="https://505updates.com/katycraig/" rel="noopener noreferrer" target="_blank">🇺🇸 Katy Craig, San Diego, California ↗</a></p><p><a href="https://techcrunch.com/2023/06/19/hackers-threaten-to-leak-80gb-of-confidential-data-stolen-from-reddit" rel="noopener noreferrer" target="_blank">Hackers threaten to leak 80GB of confidential data stolen from Reddit | TechCrunch</a></p><p><a href="https://techcrunch.com/2023/02/10/reddit-says-hackers-accessed-internal-data-following-employee-phishing-attack/" rel="noopener noreferrer" target="_blank">Reddit says hackers accessed employee data following phishing attack | TechCrunch</a></p><h3><strong>Part 3 - What You Should Know About Location Records</strong></h3><p><a href="http://505updates.com/hillarycoover/" rel="noopener noreferrer" target="_blank">🇺🇸 Hillary Coover, Washington, DC ↗</a></p><p><a href="https://news.bloomberglaw.com/privacy-and-data-security/washington-shields-abortion-data-in-first-in-nation-privacy-law" rel="noopener noreferrer" target="_blank">Washington Shields Abortion Data in First-in-Nation Privacy Law</a></p><h3><strong>Edge added to browser list of zero-day vulnerability</strong></h3><p><a href="http://505updates.com/olimpiupop/" rel="noopener noreferrer" target="_blank">🇷🇴 Olimpiu Pop, Transylvania, Romania ↗</a></p><p><a href="https://learn.microsoft.com/en-us/deployedge/microsoft-edge-relnotes-security#june-5-2023" rel="noopener noreferrer" target="_blank">Release notes for Microsoft Edge Security Update</a></p><p><a href="https://learn.microsoft.com/en-us/deployedge/microsoft-edge-relnotes-security#june-6-2023" rel="noopener noreferrer" target="_blank">Release notes for Microsoft Edge Security Updates</a></p><p><a href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-29345" rel="noopener noreferrer" target="_blank">https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-29345</a></p><p><a href="https://nvd.nist.gov/vuln/detail/CVE-2023-33145" rel="noopener noreferrer" target="_blank">NVD - CVE-2023-33145</a></p><p><a href="https://nvd.nist.gov/vuln/detail/CVE-2023-33143" rel="noopener noreferrer" target="_blank">NVD - CVE-2023-33143</a></p><h3><strong>This Day in Tech History&nbsp;</strong></h3><p><a href="https://505updates.com/marcelbrown/" rel="noopener noreferrer" target="_blank"><strong>🇺🇸</strong>&nbsp;Marcel Brown, St. Louis, Missouri ↗</a></p><p><a href="http://thisdayintechhistory.com/06/22" rel="noopener noreferrer" target="_blank">http://thisdayintechhistory.com/06/22</a></p>]]></content:encoded><link><![CDATA[https://3zozb9fxlbueipjyapmaas.captivate.fm/episode/episode-169-apple-releases-a-patch-addressing-three-zero-day-vulnerabilities-blackcat-alphv-just-wont-leave-reddit-alone-part-3-what-you-should-know-about-location-records-edge-browser-this-day-in-tech-history]]></link><guid isPermaLink="false">d07f45da-1d45-4b0e-a204-07dd3aa0f460</guid><itunes:image href="https://artwork.captivate.fm/33e2a4e7-a936-4ef5-905a-3a72363cfbe4/BkhMbfQsRHQi9QFk9GvnUJSv.png"/><dc:creator><![CDATA[Contributors from Around the World]]></dc:creator><pubDate>Thu, 22 Jun 2023 16:45:00 -0400</pubDate><enclosure url="https://dts.podtrac.com/redirect.mp3/podcasts.captivate.fm/media/1164394c-d01c-4bfa-bb68-11a6a539fb02/2023-06-22-505-Episode-169-converted.mp3" length="7626521" type="audio/mpeg"/><itunes:duration>10:36</itunes:duration><itunes:explicit>false</itunes:explicit><itunes:episodeType>full</itunes:episodeType><itunes:season>1</itunes:season><itunes:episode>169</itunes:episode><itunes:season>1</itunes:season><podcast:episode>169</podcast:episode><podcast:season>1</podcast:season><itunes:author>Contributors from Around the World</itunes:author></item><item><title>Episode #168 - Part 2 - What You Should Know About Location Records, Australian Government Data Found on Dark Web, Mystic Stealer, Hacker’s gonna hack</title><itunes:title>Episode #168 - Part 2 - What You Should Know About Location Records, Australian Government Data Found on Dark Web, Mystic Stealer, Hacker’s gonna hack</itunes:title><description><![CDATA[<p><strong>It's 5:05 on Wednesday, June 21st, 2023.</strong> From the Sourced Podcast Network in New York city, this is your host, Pokie Huang. Stories in today's episode come from <strong>Hillary Coover</strong> in Washington, DC, <strong>Edwin Kwan</strong> in Sydney, Australia, <strong>Katy Craig</strong> in San Diego, California, <strong>Olimpiu Pop</strong> in Transylvania, Romania and <strong>Marcel Brown</strong> in St. Louis, Missouri.</p><p>Let’s get to it!</p><h3><strong>Part 2 - What You Should Know About Location Records</strong></h3><p><a href="http://505updates.com/hillarycoover/" rel="noopener noreferrer" target="_blank">🇺🇸 Hillary Coover, Washington, DC ↗</a></p><p><a href="https://news.bloomberglaw.com/privacy-and-data-security/washington-shields-abortion-data-in-first-in-nation-privacy-law" rel="noopener noreferrer" target="_blank">Washington Shields Abortion Data in First-in-Nation Privacy Law</a></p><h3><strong>Australian Government Data Found on Dark Web</strong></h3><p><a href="https://505updates.com/edwinkwan/" rel="noopener noreferrer" target="_blank">🇦🇺 Edwin Kwan, Sydney, Australia ↗</a></p><p><a href="https://www.theregister.com/2023/06/20/hwl_ebsworth_cyber_incident/" rel="noopener noreferrer" target="_blank">Data leak at Australian law firm spooks government, business • The Register</a></p><p><a href="https://hwlebsworth.com.au/cyber-incident/" rel="noopener noreferrer" target="_blank">Cyber Incident - HWL Ebsworth Lawyers</a></p><h3><strong>Mystic Stealer: Credential Stealing Malware in Your Browser</strong></h3><p><a href="https://505updates.com/katycraig/" rel="noopener noreferrer" target="_blank">🇺🇸 Katy Craig, San Diego, California ↗</a></p><p><a href="https://www.msn.com/en-us/news/technology/this-new-malware-is-proving-quite-popular-and-dangerous/ar-AA1cJGzQ?ocid=msedgdhp&amp;pc=U531&amp;cvid=a591cdbc39e448b8b6f59801a3680517&amp;ei=8" rel="noopener noreferrer" target="_blank">https://www.msn.com/en-us/news/technology/this-new-malware-is-proving-quite-popular-and-dangerous/ar-AA1cJGzQ?ocid=msedgdhp&amp;pc=U531&amp;cvid=a591cdbc39e448b8b6f59801a3680517&amp;ei=8</a></p><p><a href="https://www.zscaler.com/blogs/security-research/mystic-stealer" rel="noopener noreferrer" target="_blank">Mystic Stealer | Zscaler</a></p><p><a href="https://inquest.net/blog/2023/06/15/mystic-stealer-new-kid-block" rel="noopener noreferrer" target="_blank">Mystic Stealer: The New Kid on the Block</a></p><h3><strong>Hacker’s gonna hack… it’s the job</strong></h3><p><a href="http://505updates.com/olimpiupop/" rel="noopener noreferrer" target="_blank">🇷🇴 Olimpiu Pop, Transylvania, Romania ↗</a></p><p><a href="https://www.bleepingcomputer.com/news/security/google-fixes-new-chrome-zero-day-flaw-with-exploit-in-the-wild/" rel="noopener noreferrer" target="_blank">Google fixes new Chrome zero-day flaw with exploit in the wild</a></p><p><a href="https://chromereleases.googleblog.com/2023/06/stable-channel-update-for-desktop.html" rel="noopener noreferrer" target="_blank">Chrome Releases: Stable Channel Update for Desktop</a></p><p><a href="https://sites.google.com/a/chromium.org/dev/Home/chromium-security" rel="noopener noreferrer" target="_blank">Chromium Security</a></p><p><a href="https://nvd.nist.gov/vuln/detail/CVE-2023-3079" rel="noopener noreferrer" target="_blank">NVD - CVE-2023-3079</a></p><h3><strong>This Day in Tech History&nbsp;</strong></h3><p><a href="https://505updates.com/marcelbrown/" rel="noopener noreferrer" target="_blank"><strong>🇺🇸</strong>&nbsp;Marcel Brown, St. Louis, Missouri ↗</a></p><p><a href="http://thisdayintechhistory.com/06/21" rel="noopener noreferrer" target="_blank">http://thisdayintechhistory.com/06/21</a></p>]]></description><content:encoded><![CDATA[<p><strong>It's 5:05 on Wednesday, June 21st, 2023.</strong> From the Sourced Podcast Network in New York city, this is your host, Pokie Huang. Stories in today's episode come from <strong>Hillary Coover</strong> in Washington, DC, <strong>Edwin Kwan</strong> in Sydney, Australia, <strong>Katy Craig</strong> in San Diego, California, <strong>Olimpiu Pop</strong> in Transylvania, Romania and <strong>Marcel Brown</strong> in St. Louis, Missouri.</p><p>Let’s get to it!</p><h3><strong>Part 2 - What You Should Know About Location Records</strong></h3><p><a href="http://505updates.com/hillarycoover/" rel="noopener noreferrer" target="_blank">🇺🇸 Hillary Coover, Washington, DC ↗</a></p><p><a href="https://news.bloomberglaw.com/privacy-and-data-security/washington-shields-abortion-data-in-first-in-nation-privacy-law" rel="noopener noreferrer" target="_blank">Washington Shields Abortion Data in First-in-Nation Privacy Law</a></p><h3><strong>Australian Government Data Found on Dark Web</strong></h3><p><a href="https://505updates.com/edwinkwan/" rel="noopener noreferrer" target="_blank">🇦🇺 Edwin Kwan, Sydney, Australia ↗</a></p><p><a href="https://www.theregister.com/2023/06/20/hwl_ebsworth_cyber_incident/" rel="noopener noreferrer" target="_blank">Data leak at Australian law firm spooks government, business • The Register</a></p><p><a href="https://hwlebsworth.com.au/cyber-incident/" rel="noopener noreferrer" target="_blank">Cyber Incident - HWL Ebsworth Lawyers</a></p><h3><strong>Mystic Stealer: Credential Stealing Malware in Your Browser</strong></h3><p><a href="https://505updates.com/katycraig/" rel="noopener noreferrer" target="_blank">🇺🇸 Katy Craig, San Diego, California ↗</a></p><p><a href="https://www.msn.com/en-us/news/technology/this-new-malware-is-proving-quite-popular-and-dangerous/ar-AA1cJGzQ?ocid=msedgdhp&amp;pc=U531&amp;cvid=a591cdbc39e448b8b6f59801a3680517&amp;ei=8" rel="noopener noreferrer" target="_blank">https://www.msn.com/en-us/news/technology/this-new-malware-is-proving-quite-popular-and-dangerous/ar-AA1cJGzQ?ocid=msedgdhp&amp;pc=U531&amp;cvid=a591cdbc39e448b8b6f59801a3680517&amp;ei=8</a></p><p><a href="https://www.zscaler.com/blogs/security-research/mystic-stealer" rel="noopener noreferrer" target="_blank">Mystic Stealer | Zscaler</a></p><p><a href="https://inquest.net/blog/2023/06/15/mystic-stealer-new-kid-block" rel="noopener noreferrer" target="_blank">Mystic Stealer: The New Kid on the Block</a></p><h3><strong>Hacker’s gonna hack… it’s the job</strong></h3><p><a href="http://505updates.com/olimpiupop/" rel="noopener noreferrer" target="_blank">🇷🇴 Olimpiu Pop, Transylvania, Romania ↗</a></p><p><a href="https://www.bleepingcomputer.com/news/security/google-fixes-new-chrome-zero-day-flaw-with-exploit-in-the-wild/" rel="noopener noreferrer" target="_blank">Google fixes new Chrome zero-day flaw with exploit in the wild</a></p><p><a href="https://chromereleases.googleblog.com/2023/06/stable-channel-update-for-desktop.html" rel="noopener noreferrer" target="_blank">Chrome Releases: Stable Channel Update for Desktop</a></p><p><a href="https://sites.google.com/a/chromium.org/dev/Home/chromium-security" rel="noopener noreferrer" target="_blank">Chromium Security</a></p><p><a href="https://nvd.nist.gov/vuln/detail/CVE-2023-3079" rel="noopener noreferrer" target="_blank">NVD - CVE-2023-3079</a></p><h3><strong>This Day in Tech History&nbsp;</strong></h3><p><a href="https://505updates.com/marcelbrown/" rel="noopener noreferrer" target="_blank"><strong>🇺🇸</strong>&nbsp;Marcel Brown, St. Louis, Missouri ↗</a></p><p><a href="http://thisdayintechhistory.com/06/21" rel="noopener noreferrer" target="_blank">http://thisdayintechhistory.com/06/21</a></p>]]></content:encoded><link><![CDATA[https://3zozb9fxlbueipjyapmaas.captivate.fm/episode/episode-168-part-2-what-you-should-know-about-location-records-australian-government-data-found-on-dark-web-mystic-stealer-hackers-gonna-hack]]></link><guid isPermaLink="false">7ce37e4a-44f1-4e84-85cc-96d1c76684b5</guid><itunes:image href="https://artwork.captivate.fm/12f54ac1-35d5-409a-80bb-4ef76677d5ba/Ut2VZbSWqO3e9FRI3k149NNa.png"/><dc:creator><![CDATA[Contributors from Around the World]]></dc:creator><pubDate>Wed, 21 Jun 2023 16:45:00 -0400</pubDate><enclosure url="https://dts.podtrac.com/redirect.mp3/podcasts.captivate.fm/media/8c2ab4ea-b0cb-4042-9d87-9fb0af1e5466/2023-06-21-505-Episode-168-converted.mp3" length="7801751" type="audio/mpeg"/><itunes:duration>10:50</itunes:duration><itunes:explicit>false</itunes:explicit><itunes:episodeType>full</itunes:episodeType><itunes:season>1</itunes:season><itunes:episode>168</itunes:episode><itunes:season>1</itunes:season><podcast:episode>168</podcast:episode><podcast:season>1</podcast:season><itunes:author>Contributors from Around the World</itunes:author></item><item><title>Episode #167 - Medibank hit again, What you should know about location records, including Apple’s and Google’s new policies, BlackCat clawing at reddit’s door, Gigabyte Systems exposes secret backdoor, US Government offers $10M reward for info on CL0P</title><itunes:title>Episode #167 - Medibank hit again, What you should know about location records, including Apple’s and Google’s new policies, BlackCat clawing at reddit’s door, Gigabyte Systems exposes secret backdoor, US Government offers $10M reward for info on CL0P</itunes:title><description><![CDATA[<p><strong>It's 5:05 on Tuesday, June 20th, 2023</strong>. From the Sourced Podcast Network in New York city, this is your host Pokie Huang. Stories in today's episode come from <strong>Edwin Kwan</strong> in Sydney, Australia, <strong>Hillary Coover</strong> in Washington, DC, <strong>Ian Garrett</strong> in Arlington, Virginia, <strong>Katy Craig</strong> in San Diego, California, <strong>Olimpiu Pop</strong> in Transylvania, Romania, <strong>Marcel Brown</strong> in St. Louis, Missouri.</p><p>Let’s get to it.</p><h3><strong>Medibank hit again… this time with MOVEit</strong></h3><p><a href="https://505updates.com/edwinkwan/" rel="noopener noreferrer" target="_blank">🇦🇺 Edwin Kwan, Sydney, Australia ↗</a></p><p><a href="https://www.afr.com/companies/healthcare-and-fitness/medibank-staff-details-taken-after-building-manager-gets-hacked-20230620-p5dhy6" rel="noopener noreferrer" target="_blank">Medibank staff details taken after building manager gets hacked</a></p><h3><strong>What you should know about location records, including Apple’s and Google’s new policies</strong></h3><p><a href="http://505updates.com/hillarycoover/" rel="noopener noreferrer" target="_blank">🇺🇸 Hillary Coover, Washington, DC ↗</a></p><p><a href="https://news.bloomberglaw.com/privacy-and-data-security/washington-shields-abortion-data-in-first-in-nation-privacy-law" rel="noopener noreferrer" target="_blank">Washington Shields Abortion Data in First-in-Nation Privacy Law</a></p><h3><strong>BlackCat clawing at reddit’s door</strong></h3><p><a href="https://505updates.com/iangarrett/" rel="noopener noreferrer" target="_blank"><strong>🇺🇸&nbsp;</strong>Ian Garrett, Arlington, Virginia ↗</a></p><p><a href="https://www.theverge.com/2023/6/19/23765895/reddit-hack-phishing-leak-api-pricing-steve-huffman" rel="noopener noreferrer" target="_blank">Reddit hackers demand $4.5 million ransom and API pricing changes - The Verge</a></p><h3><strong>Gigabyte Systems exposes secret backdoor</strong></h3><p><a href="https://505updates.com/katycraig/" rel="noopener noreferrer" target="_blank">🇺🇸 Katy Craig, San Diego, California ↗</a></p><p><a href="https://eclypsium.com/blog/supply-chain-risk-from-gigabyte-app-center-backdoor/" rel="noopener noreferrer" target="_blank">Supply Chain Risk from Gigabyte App Center Backdoor - Eclypsium</a></p><p><a href="https://www.gigabyte.com/Press/News/2091" rel="noopener noreferrer" target="_blank">GIGABYTE Fortifies System Security with Latest BIOS Updates and Enhanced Verification | News</a></p><h3><strong>US Government offers $10M reward for info on CL0P</strong></h3><p><a href="http://505updates.com/olimpiupop/" rel="noopener noreferrer" target="_blank">🇷🇴 Olimpiu Pop, Transylvania, Romania ↗</a></p><p><a href="https://twitter.com/RFJ_USA/status/1669740545403437056" rel="noopener noreferrer" target="_blank">https://twitter.com/RFJ_USA/status/1669740545403437056</a></p><p><a href="https://www.bleepingcomputer.com/news/security/us-govt-offers-10-million-bounty-for-info-on-clop-ransomware/" rel="noopener noreferrer" target="_blank">US govt offers $10 million bounty for info on Clop ransomware</a></p><h3><strong>This Day in Tech History&nbsp;</strong></h3><p><a href="https://505updates.com/marcelbrown/" rel="noopener noreferrer" target="_blank"><strong>🇺🇸</strong>&nbsp;Marcel Brown, St. Louis, Missouri ↗</a></p><p><a href="http://thisdayintechhistory.com/06/18/" rel="noopener noreferrer" target="_blank">http://thisdayintechhistory.com/06/18/</a></p><p><a href="http://thisdayintechhistory.com/06/19/" rel="noopener noreferrer" target="_blank">http://thisdayintechhistory.com/06/19/</a></p><p><a href="http://thisdayintechhistory.com/06/20/" rel="noopener noreferrer" target="_blank">http://thisdayintechhistory.com/06/20/</a></p>]]></description><content:encoded><![CDATA[<p><strong>It's 5:05 on Tuesday, June 20th, 2023</strong>. From the Sourced Podcast Network in New York city, this is your host Pokie Huang. Stories in today's episode come from <strong>Edwin Kwan</strong> in Sydney, Australia, <strong>Hillary Coover</strong> in Washington, DC, <strong>Ian Garrett</strong> in Arlington, Virginia, <strong>Katy Craig</strong> in San Diego, California, <strong>Olimpiu Pop</strong> in Transylvania, Romania, <strong>Marcel Brown</strong> in St. Louis, Missouri.</p><p>Let’s get to it.</p><h3><strong>Medibank hit again… this time with MOVEit</strong></h3><p><a href="https://505updates.com/edwinkwan/" rel="noopener noreferrer" target="_blank">🇦🇺 Edwin Kwan, Sydney, Australia ↗</a></p><p><a href="https://www.afr.com/companies/healthcare-and-fitness/medibank-staff-details-taken-after-building-manager-gets-hacked-20230620-p5dhy6" rel="noopener noreferrer" target="_blank">Medibank staff details taken after building manager gets hacked</a></p><h3><strong>What you should know about location records, including Apple’s and Google’s new policies</strong></h3><p><a href="http://505updates.com/hillarycoover/" rel="noopener noreferrer" target="_blank">🇺🇸 Hillary Coover, Washington, DC ↗</a></p><p><a href="https://news.bloomberglaw.com/privacy-and-data-security/washington-shields-abortion-data-in-first-in-nation-privacy-law" rel="noopener noreferrer" target="_blank">Washington Shields Abortion Data in First-in-Nation Privacy Law</a></p><h3><strong>BlackCat clawing at reddit’s door</strong></h3><p><a href="https://505updates.com/iangarrett/" rel="noopener noreferrer" target="_blank"><strong>🇺🇸&nbsp;</strong>Ian Garrett, Arlington, Virginia ↗</a></p><p><a href="https://www.theverge.com/2023/6/19/23765895/reddit-hack-phishing-leak-api-pricing-steve-huffman" rel="noopener noreferrer" target="_blank">Reddit hackers demand $4.5 million ransom and API pricing changes - The Verge</a></p><h3><strong>Gigabyte Systems exposes secret backdoor</strong></h3><p><a href="https://505updates.com/katycraig/" rel="noopener noreferrer" target="_blank">🇺🇸 Katy Craig, San Diego, California ↗</a></p><p><a href="https://eclypsium.com/blog/supply-chain-risk-from-gigabyte-app-center-backdoor/" rel="noopener noreferrer" target="_blank">Supply Chain Risk from Gigabyte App Center Backdoor - Eclypsium</a></p><p><a href="https://www.gigabyte.com/Press/News/2091" rel="noopener noreferrer" target="_blank">GIGABYTE Fortifies System Security with Latest BIOS Updates and Enhanced Verification | News</a></p><h3><strong>US Government offers $10M reward for info on CL0P</strong></h3><p><a href="http://505updates.com/olimpiupop/" rel="noopener noreferrer" target="_blank">🇷🇴 Olimpiu Pop, Transylvania, Romania ↗</a></p><p><a href="https://twitter.com/RFJ_USA/status/1669740545403437056" rel="noopener noreferrer" target="_blank">https://twitter.com/RFJ_USA/status/1669740545403437056</a></p><p><a href="https://www.bleepingcomputer.com/news/security/us-govt-offers-10-million-bounty-for-info-on-clop-ransomware/" rel="noopener noreferrer" target="_blank">US govt offers $10 million bounty for info on Clop ransomware</a></p><h3><strong>This Day in Tech History&nbsp;</strong></h3><p><a href="https://505updates.com/marcelbrown/" rel="noopener noreferrer" target="_blank"><strong>🇺🇸</strong>&nbsp;Marcel Brown, St. Louis, Missouri ↗</a></p><p><a href="http://thisdayintechhistory.com/06/18/" rel="noopener noreferrer" target="_blank">http://thisdayintechhistory.com/06/18/</a></p><p><a href="http://thisdayintechhistory.com/06/19/" rel="noopener noreferrer" target="_blank">http://thisdayintechhistory.com/06/19/</a></p><p><a href="http://thisdayintechhistory.com/06/20/" rel="noopener noreferrer" target="_blank">http://thisdayintechhistory.com/06/20/</a></p>]]></content:encoded><link><![CDATA[https://3zozb9fxlbueipjyapmaas.captivate.fm/episode/episode-166-medibank-hit-again-what-you-should-know-about-location-records-including-apples-and-googles-new-policies-blackcat-clawing-at-reddits-door-gigabyte-systems-exposes-secret-backdoor-us-government-offers-10m-reward-for-info-on-cl0p]]></link><guid isPermaLink="false">58f99c51-1be6-4ea6-be8d-df4863a12693</guid><itunes:image href="https://artwork.captivate.fm/9e824917-1a18-480b-96c2-398807b13bab/FFJdepJ8aKkUoxctC7NeoUFK.png"/><dc:creator><![CDATA[Contributors from Around the World]]></dc:creator><pubDate>Tue, 20 Jun 2023 16:45:00 -0400</pubDate><enclosure url="https://dts.podtrac.com/redirect.mp3/podcasts.captivate.fm/media/b555de75-731f-4acd-9617-e1ee8049f228/2023-06-20-505-Episode-167-converted.mp3" length="9480691" type="audio/mpeg"/><itunes:duration>13:10</itunes:duration><itunes:explicit>false</itunes:explicit><itunes:episodeType>full</itunes:episodeType><itunes:season>1</itunes:season><itunes:episode>167</itunes:episode><itunes:season>1</itunes:season><podcast:episode>167</podcast:episode><podcast:season>1</podcast:season><itunes:author>Contributors from Around the World</itunes:author></item><item><title>Episode #166 - Fake Proof of Concept for Zero Day Exploits, The Third SQL Vulnerability Related to Moveit Clop Ransomware Campaign Disclosed, Barracuda hack is the Chinese</title><itunes:title>Episode #166 - Fake Proof of Concept for Zero Day Exploits, The Third SQL Vulnerability Related to Moveit Clop Ransomware Campaign Disclosed, Barracuda hack is the Chinese</itunes:title><description><![CDATA[<p><strong>It's 5:05 on Monday, June 19th, 2023.</strong> From the Sourced Podcast Network in New York city, this is your host, Pokie Huang. Stories in today's episode come from <strong>Edwin Kwan</strong> in Sydney, Australia, <strong>Olimpiu Pop</strong> in Transylvania, Romania, <strong>Katy Craig</strong> in San Diego, California, Marcel Brown in St. Louis, Missouri.&nbsp;</p><p>Let's get to it.&nbsp;</p><h3>Fake Proof of Concept for Zero Day Exploits used to Deliver Malware</h3><p><a href="https://505updates.com/edwinkwan/" rel="noopener noreferrer" target="_blank">🇦🇺 Edwin Kwan, Sydney, Australia ↗</a></p><p><a href="https://www.bleepingcomputer.com/news/security/fake-zero-day-poc-exploits-on-github-push-windows-linux-malware/" rel="noopener noreferrer" target="_blank">Fake zero-day PoC exploits on GitHub push Windows, Linux malware</a></p><p><br></p><p><br></p><h3>The Third SQL Vulnerability Related to Moveit Clop Ransomware Campaign Disclosed</h3><p><a href="http://505updates.com/olimpiupop/" rel="noopener noreferrer" target="_blank">🇷🇴 Olimpiu Pop, Transylvania, Romania ↗</a></p><p><a href="https://www.darkreading.com/vulnerabilities-threats/third-moveit-transfer-vulnerability-progress-software" rel="noopener noreferrer" target="_blank">Third MOVEit Transfer Vulnerability Disclosed by Progress Software</a></p><p><a href="https://edition.cnn.com/2023/06/15/politics/us-government-hit-cybeattack/index.html" rel="noopener noreferrer" target="_blank">Exclusive: US government agencies hit in global cyberattack</a></p><p><a href="https://www.darkreading.com/application-security/mass-exploitation-0-day-bug-imoveit-file-transfer-underway" rel="noopener noreferrer" target="_blank">Mass Exploitation of Zero-Day Bug in MOVEit File Transfer Underway</a></p><p><a href="https://www.darkreading.com/vulnerabilities-threats/brand-new-security-bugs-affect-all-moveit-transfer-versions" rel="noopener noreferrer" target="_blank">Brand-New Security Bugs Affect All MOVEit Transfer Versions</a></p><p><a href="https://community.progress.com/s/article/MOVEit-Transfer-Critical-Vulnerability-15June2023" rel="noopener noreferrer" target="_blank">MOVEit Transfer Critical Vulnerability – CVE Pending (June 15, 2023) - Progress Community</a></p><p><br></p><p><br></p><h3>Barracuda hack is the Chinese</h3><p><a href="https://505updates.com/katycraig/" rel="noopener noreferrer" target="_blank">🇺🇸 Katy Craig, San Diego, California ↗</a></p><p><a href="https://www.crn.com/news/security/barracuda-customers-must-replace-impacted-email-security-devices-immediately-" rel="noopener noreferrer" target="_blank">Barracuda: Customers Must Replace Impacted Email Security Devices ‘Immediately’ | CRN</a></p><p><a href="https://www.mandiant.com/resources/blog/barracuda-esg-exploited-globally" rel="noopener noreferrer" target="_blank">Barracuda ESG Zero-Day Vulnerability (CVE-2023-2868) Exploited Globally by Aggressive and Skilled Actor, Suspected Links to China | Mandiant</a></p><p><a href="https://abcnews.go.com/Business/wireStory/security-firm-chinese-hackers-broke-email-security-appliance-100104286" rel="noopener noreferrer" target="_blank">Chinese spies breached hundreds of public, private networks, security firm says - ABC News</a></p><p><br></p>]]></description><content:encoded><![CDATA[<p><strong>It's 5:05 on Monday, June 19th, 2023.</strong> From the Sourced Podcast Network in New York city, this is your host, Pokie Huang. Stories in today's episode come from <strong>Edwin Kwan</strong> in Sydney, Australia, <strong>Olimpiu Pop</strong> in Transylvania, Romania, <strong>Katy Craig</strong> in San Diego, California, Marcel Brown in St. Louis, Missouri.&nbsp;</p><p>Let's get to it.&nbsp;</p><h3>Fake Proof of Concept for Zero Day Exploits used to Deliver Malware</h3><p><a href="https://505updates.com/edwinkwan/" rel="noopener noreferrer" target="_blank">🇦🇺 Edwin Kwan, Sydney, Australia ↗</a></p><p><a href="https://www.bleepingcomputer.com/news/security/fake-zero-day-poc-exploits-on-github-push-windows-linux-malware/" rel="noopener noreferrer" target="_blank">Fake zero-day PoC exploits on GitHub push Windows, Linux malware</a></p><p><br></p><p><br></p><h3>The Third SQL Vulnerability Related to Moveit Clop Ransomware Campaign Disclosed</h3><p><a href="http://505updates.com/olimpiupop/" rel="noopener noreferrer" target="_blank">🇷🇴 Olimpiu Pop, Transylvania, Romania ↗</a></p><p><a href="https://www.darkreading.com/vulnerabilities-threats/third-moveit-transfer-vulnerability-progress-software" rel="noopener noreferrer" target="_blank">Third MOVEit Transfer Vulnerability Disclosed by Progress Software</a></p><p><a href="https://edition.cnn.com/2023/06/15/politics/us-government-hit-cybeattack/index.html" rel="noopener noreferrer" target="_blank">Exclusive: US government agencies hit in global cyberattack</a></p><p><a href="https://www.darkreading.com/application-security/mass-exploitation-0-day-bug-imoveit-file-transfer-underway" rel="noopener noreferrer" target="_blank">Mass Exploitation of Zero-Day Bug in MOVEit File Transfer Underway</a></p><p><a href="https://www.darkreading.com/vulnerabilities-threats/brand-new-security-bugs-affect-all-moveit-transfer-versions" rel="noopener noreferrer" target="_blank">Brand-New Security Bugs Affect All MOVEit Transfer Versions</a></p><p><a href="https://community.progress.com/s/article/MOVEit-Transfer-Critical-Vulnerability-15June2023" rel="noopener noreferrer" target="_blank">MOVEit Transfer Critical Vulnerability – CVE Pending (June 15, 2023) - Progress Community</a></p><p><br></p><p><br></p><h3>Barracuda hack is the Chinese</h3><p><a href="https://505updates.com/katycraig/" rel="noopener noreferrer" target="_blank">🇺🇸 Katy Craig, San Diego, California ↗</a></p><p><a href="https://www.crn.com/news/security/barracuda-customers-must-replace-impacted-email-security-devices-immediately-" rel="noopener noreferrer" target="_blank">Barracuda: Customers Must Replace Impacted Email Security Devices ‘Immediately’ | CRN</a></p><p><a href="https://www.mandiant.com/resources/blog/barracuda-esg-exploited-globally" rel="noopener noreferrer" target="_blank">Barracuda ESG Zero-Day Vulnerability (CVE-2023-2868) Exploited Globally by Aggressive and Skilled Actor, Suspected Links to China | Mandiant</a></p><p><a href="https://abcnews.go.com/Business/wireStory/security-firm-chinese-hackers-broke-email-security-appliance-100104286" rel="noopener noreferrer" target="_blank">Chinese spies breached hundreds of public, private networks, security firm says - ABC News</a></p><p><br></p>]]></content:encoded><link><![CDATA[https://3zozb9fxlbueipjyapmaas.captivate.fm/episode/episode-166-fake-proof-of-concept-for-zero-day-exploits-the-third-sql-vulnerability-related-to-moveit-clop-ransomware-campaign-disclosed-barracuda-hack-is-the-chinese]]></link><guid isPermaLink="false">03e5296b-e1b0-4905-881d-221ea5bc28e5</guid><itunes:image href="https://artwork.captivate.fm/0d23b679-2e9c-42b8-a436-8f86169bf437/0Ar1_eqSPj6Oj3uICbgCn2uJ.png"/><dc:creator><![CDATA[Contributors from Around the World]]></dc:creator><pubDate>Mon, 19 Jun 2023 16:45:00 -0400</pubDate><enclosure url="https://dts.podtrac.com/redirect.mp3/podcasts.captivate.fm/media/1b84b6ce-f332-4223-9236-b40606026d00/2023-06-19-505-Episode-166-converted.mp3" length="4840082" type="audio/mpeg"/><itunes:duration>06:43</itunes:duration><itunes:explicit>false</itunes:explicit><itunes:episodeType>full</itunes:episodeType><itunes:season>1</itunes:season><itunes:episode>166</itunes:episode><itunes:season>1</itunes:season><podcast:episode>166</podcast:episode><podcast:season>1</podcast:season><itunes:author>Contributors from Around the World</itunes:author></item><item><title>Episode #165 - Sweeping attack on US Government, New Sextortion Scheme Using Deepfakes, CISA orders Feds to harden devices, The Limitations of Real-Time Social Media Tools, The freedom fighters that want to bring EU Commission back to its senses about open-source</title><itunes:title>Episode #165 - Sweeping attack on US Government, New Sextortion Scheme Using Deepfakes, CISA orders Feds to harden devices, The Limitations of Real-Time Social Media Tools, The freedom fighters that want to bring EU Commission back to its senses about open-source</itunes:title><description><![CDATA[<p><strong>It's 5:05 on Friday, June 16th. 2023.</strong> From the Sourced Podcast Network in New York City, this is your host, Pokie Huang. Stories in today's episode come from <strong>Trac Bannon</strong> in Camp Hill, Pennsylvania, <strong>Edwin Kwan</strong> in Sydney, Australia, <strong>Hillary Coover</strong> in Washington, DC, <strong>Katy Craig</strong> in San Diego, California, <strong>Olimpiu Pop</strong> in Transylvania, Romania, <strong>Marcel Brown</strong> in St. Louis, Missouri.&nbsp;</p><p>Let's get to it.</p><p><strong>Breaking News: Sweeping attack on US Government</strong></p><p><a href="https://505updates.com/tracbannon/" rel="noopener noreferrer" target="_blank"><strong>🇺🇸</strong> Tracy (Trac) Bannon, Camp Hill, Pennsylvania↗</a></p><p><a href="https://amp-cnn-com.cdn.ampproject.org/c/s/amp.cnn.com/cnn/2023/06/15/politics/us-government-hit-cybeattack/index.html" rel="noopener noreferrer" target="_blank">https://amp-cnn-com.cdn.ampproject.org/c/s/amp.cnn.com/cnn/2023/06/15/politics/us-government-hit-cybeattack/index.html</a></p><p><a href="https://www.reuters.com/world/us/us-government-agencies-hit-global-cyber-attack-cnn-2023-06-15/" rel="noopener noreferrer" target="_blank">US energy department, other agencies hit in global hacking spree | Reuters</a></p><h3>New Sextortion Scheme Using Deepfakes</h3><p><a href="https://505updates.com/edwinkwan/" rel="noopener noreferrer" target="_blank">🇦🇺 Edwin Kwan, Sydney, Australia ↗</a></p><p><a href="https://therecord.media/deepfakes-involved-in-sextortion-schemes?_hsmi=261868737" rel="noopener noreferrer" target="_blank">https://therecord.media/deepfakes-involved-in-sextortion-schemes?_hsmi=261868737</a></p><p><a href="https://www.bleepingcomputer.com/news/security/sextortionists-are-making-ai-nudes-from-your-social-media-images/" rel="noopener noreferrer" target="_blank">Sextortionists are making AI nudes from your social media images</a></p><h3>CISA orders Feds to harden devices</h3><p><a href="https://505updates.com/katycraig/" rel="noopener noreferrer" target="_blank">🇺🇸 Katy Craig, San Diego, California ↗</a></p><p><a href="https://www.cisa.gov/news-events/directives/binding-operational-directive-23-02" rel="noopener noreferrer" target="_blank">Binding Operational Directive 23-02 | CISA</a></p><h3>The Limitations of Real-Time Social Media Tools</h3><p><a href="http://505updates.com/hillarycoover/" rel="noopener noreferrer" target="_blank">🇺🇸 Hillary Coover, Washington, DC ↗</a></p><p>No link - general opinion on conversation about social media surveillance concerns&nbsp;</p><h3>The freedom fighters that want to bring EU Commission back to its senses about open-source</h3><h3><a href="http://505updates.com/olimpiupop/" rel="noopener noreferrer" target="_blank">🇷🇴 Olimpiu Pop, Transylvania, Romania ↗</a></h3><h3><a href="https://ec.europa.eu/info/law/better-regulation/have-your-say/initiatives/13410-Cyber-resilience-act-new-cybersecurity-rules-for-digital-products-and-ancillary-services/F3376663_en" rel="noopener noreferrer" target="_blank">Feedback from: OpenForum Europe</a></h3><h3><br></h3><h3>This Day in Tech History&nbsp;</h3><p><a href="https://505updates.com/marcelbrown/" rel="noopener noreferrer" target="_blank"><strong>🇺🇸</strong> Marcel Brown, St. Louis, Missouri ↗</a></p><p><a href="http://thisdayintechhistory.com/06/16" rel="noopener noreferrer" target="_blank">http://thisdayintechhistory.com/06/16</a></p><p><a href="http://thisdayintechhistory.com/06/17" rel="noopener noreferrer" target="_blank">http://thisdayintechhistory.com/06/17</a></p>]]></description><content:encoded><![CDATA[<p><strong>It's 5:05 on Friday, June 16th. 2023.</strong> From the Sourced Podcast Network in New York City, this is your host, Pokie Huang. Stories in today's episode come from <strong>Trac Bannon</strong> in Camp Hill, Pennsylvania, <strong>Edwin Kwan</strong> in Sydney, Australia, <strong>Hillary Coover</strong> in Washington, DC, <strong>Katy Craig</strong> in San Diego, California, <strong>Olimpiu Pop</strong> in Transylvania, Romania, <strong>Marcel Brown</strong> in St. Louis, Missouri.&nbsp;</p><p>Let's get to it.</p><p><strong>Breaking News: Sweeping attack on US Government</strong></p><p><a href="https://505updates.com/tracbannon/" rel="noopener noreferrer" target="_blank"><strong>🇺🇸</strong> Tracy (Trac) Bannon, Camp Hill, Pennsylvania↗</a></p><p><a href="https://amp-cnn-com.cdn.ampproject.org/c/s/amp.cnn.com/cnn/2023/06/15/politics/us-government-hit-cybeattack/index.html" rel="noopener noreferrer" target="_blank">https://amp-cnn-com.cdn.ampproject.org/c/s/amp.cnn.com/cnn/2023/06/15/politics/us-government-hit-cybeattack/index.html</a></p><p><a href="https://www.reuters.com/world/us/us-government-agencies-hit-global-cyber-attack-cnn-2023-06-15/" rel="noopener noreferrer" target="_blank">US energy department, other agencies hit in global hacking spree | Reuters</a></p><h3>New Sextortion Scheme Using Deepfakes</h3><p><a href="https://505updates.com/edwinkwan/" rel="noopener noreferrer" target="_blank">🇦🇺 Edwin Kwan, Sydney, Australia ↗</a></p><p><a href="https://therecord.media/deepfakes-involved-in-sextortion-schemes?_hsmi=261868737" rel="noopener noreferrer" target="_blank">https://therecord.media/deepfakes-involved-in-sextortion-schemes?_hsmi=261868737</a></p><p><a href="https://www.bleepingcomputer.com/news/security/sextortionists-are-making-ai-nudes-from-your-social-media-images/" rel="noopener noreferrer" target="_blank">Sextortionists are making AI nudes from your social media images</a></p><h3>CISA orders Feds to harden devices</h3><p><a href="https://505updates.com/katycraig/" rel="noopener noreferrer" target="_blank">🇺🇸 Katy Craig, San Diego, California ↗</a></p><p><a href="https://www.cisa.gov/news-events/directives/binding-operational-directive-23-02" rel="noopener noreferrer" target="_blank">Binding Operational Directive 23-02 | CISA</a></p><h3>The Limitations of Real-Time Social Media Tools</h3><p><a href="http://505updates.com/hillarycoover/" rel="noopener noreferrer" target="_blank">🇺🇸 Hillary Coover, Washington, DC ↗</a></p><p>No link - general opinion on conversation about social media surveillance concerns&nbsp;</p><h3>The freedom fighters that want to bring EU Commission back to its senses about open-source</h3><h3><a href="http://505updates.com/olimpiupop/" rel="noopener noreferrer" target="_blank">🇷🇴 Olimpiu Pop, Transylvania, Romania ↗</a></h3><h3><a href="https://ec.europa.eu/info/law/better-regulation/have-your-say/initiatives/13410-Cyber-resilience-act-new-cybersecurity-rules-for-digital-products-and-ancillary-services/F3376663_en" rel="noopener noreferrer" target="_blank">Feedback from: OpenForum Europe</a></h3><h3><br></h3><h3>This Day in Tech History&nbsp;</h3><p><a href="https://505updates.com/marcelbrown/" rel="noopener noreferrer" target="_blank"><strong>🇺🇸</strong> Marcel Brown, St. Louis, Missouri ↗</a></p><p><a href="http://thisdayintechhistory.com/06/16" rel="noopener noreferrer" target="_blank">http://thisdayintechhistory.com/06/16</a></p><p><a href="http://thisdayintechhistory.com/06/17" rel="noopener noreferrer" target="_blank">http://thisdayintechhistory.com/06/17</a></p>]]></content:encoded><link><![CDATA[https://3zozb9fxlbueipjyapmaas.captivate.fm/episode/episode-165-sweeping-attack-on-us-government-new-sextortion-scheme-using-deepfakes-cisa-orders-feds-to-harden-devices-the-limitations-of-real-time-social-media-tools-the-freedom-fighters-that-want-to-bring-eu-commission-back-to-its-senses-about-open-so...]]></link><guid isPermaLink="false">a49068e5-0e7b-4c01-bd7e-bd76bcac63dd</guid><itunes:image href="https://artwork.captivate.fm/29bd0488-ae6d-4cce-b8bb-49420a6c5100/qm09S5LYfdhWlK75pSgYH3mM.png"/><dc:creator><![CDATA[Contributors from Around the World]]></dc:creator><pubDate>Fri, 16 Jun 2023 16:45:00 -0400</pubDate><enclosure url="https://dts.podtrac.com/redirect.mp3/podcasts.captivate.fm/media/38e2bfb7-4650-4cf3-b62e-54285a9af40d/2023-06-16-505-Episode-165-converted.mp3" length="10180981" type="audio/mpeg"/><itunes:duration>14:08</itunes:duration><itunes:explicit>false</itunes:explicit><itunes:episodeType>full</itunes:episodeType><itunes:season>1</itunes:season><itunes:episode>165</itunes:episode><itunes:season>1</itunes:season><podcast:episode>165</podcast:episode><podcast:season>1</podcast:season><itunes:author>Contributors from Around the World</itunes:author></item><item><title>Episode #164 - Hunter Valley Bus Tragedy Scams Spotted, Striking a balance, protecting national security and privacy in the age of commercial data, CISA warns of sabotage from Chinese hackers, PassGPT</title><itunes:title>Episode #164 - Hunter Valley Bus Tragedy Scams Spotted, Striking a balance, protecting national security and privacy in the age of commercial data, CISA warns of sabotage from Chinese hackers, PassGPT</itunes:title><description><![CDATA[<p><strong>Hey, it's 5:05 on Thursday, June 15th, 2023.</strong> From the Sourced Podcast Network in New York City, this is your host, Pokie Huang. Stories in today's episode come from <strong>Edwin Kwan</strong> in Sydney, Australia, <strong>Hillary Coover</strong> in Washington, DC, <strong>Katy Craig</strong> in San Diego, California, <strong>Olimpiu Pop</strong> in Transylvania, Romania, <strong>Marcel Brown</strong> in St. Louis, Missouri.&nbsp;</p><p>Let's get to it.</p><h3>Hunter Valley Bus Tragedy Scams Spotted</h3><p><a href="https://505updates.com/edwinkwan/" rel="noopener noreferrer" target="_blank">🇦🇺 Edwin Kwan, Sydney, Australia ↗</a></p><p><a href="https://www.cybersecurityconnect.com.au/strategy/9185-scammers-set-up-fake-gofundme-pages-to-exploit-hunter-valley-bus-tragedy" rel="noopener noreferrer" target="_blank">Scammers allegedly set up GoFundMe pages to exploit Hunter Valley bus tragedy - Cyber Security Connect</a></p><h3>Striking a balance, protecting national security and privacy in the age of commercial data.</h3><p><a href="http://505updates.com/hillarycoover/" rel="noopener noreferrer" target="_blank">🇺🇸 Hillary Coover, Washington, DC ↗</a></p><p>Declassified Report on Commercial Available Information <a href="https://www.dni.gov/files/ODNI/documents/assessments/ODNI-Declassified-Report-on-CAI-January2022.pdf" rel="noopener noreferrer" target="_blank">https://www.dni.gov/files/ODNI/documents/assessments/ODNI-Declassified-Report-on-CAI-January2022.pdf</a></p><h3>CISA warns of sabotage from Chinese hackers</h3><p><a href="https://505updates.com/katycraig/" rel="noopener noreferrer" target="_blank">🇺🇸 Katy Craig, San Diego, California ↗</a></p><p><a href="https://www.reuters.com/world/americans-should-prepare-cyber-sabotage-chinese-hackers-us-official-warns-2023-06-12/" rel="noopener noreferrer" target="_blank">Americans should prepare for cyber sabotage from Chinese hackers, US official warns | Reuters</a></p><h3>PassGPT is an AI Model That Generates 20% unseen passwords by learning from RockYou2021 - the biggest password leak in history</h3><p><a href="http://505updates.com/olimpiupop/" rel="noopener noreferrer" target="_blank">🇷🇴 Olimpiu Pop, Transylvania, Romania ↗</a></p><p><a href="https://decrypt.co/144004/meet-passgpt-ai-trained-millions-leaked-passwords" rel="noopener noreferrer" target="_blank">Meet PassGPT, the AI Trained on Millions of Leaked Passwords - Decrypt</a></p><p><a href="https://javirandor.github.io/assets/pdf/passgpt2023rando.pdf" rel="noopener noreferrer" target="_blank">PassGPT: Password Modeling and (Guided) Generation with Large Language Models</a></p><p><a href="https://t.co/xV3wr4NGCs" rel="noopener noreferrer" target="_blank">[2306.01545] PassGPT: Password Modeling and (Guided) Generation with Large Language Models</a></p><p><a href="https://twitter.com/javi_rando/status/1666073708127977472?ref_src=twsrc%5Etfw%7Ctwcamp%5Etweetembed%7Ctwterm%5E1666073708127977472%7Ctwgr%5E51bf72d07b238f52f92187d45c5e2039f8692040%7Ctwcon%5Es1_&amp;ref_url=https%3A%2F%2Fdecrypt.co%2F144004%2Fmeet-passgpt-ai-trained-millions-leaked-passwords" rel="noopener noreferrer" target="_blank">https://twitter.com/javi_rando/status/1666073708127977472?ref_src=twsrc%5Etfw%7Ctwcamp%5Etweetembed%7Ctwterm%5E1666073708127977472%7Ctwgr%5E51bf72d07b238f52f92187d45c5e2039f8692040%7Ctwcon%5Es1_&amp;ref_url=https%3A%2F%2Fdecrypt.co%2F144004%2Fmeet-passgpt-ai-trained-millions-leaked-passwords</a></p><p><a href="https://cybernews.com/security/rockyou2021-alltime-largest-password-compilation-leaked/" rel="noopener noreferrer" target="_blank">RockYou2021: Largest Ever Password Compilation Leaked | Cybernews</a></p><h3>This Day in Tech History&nbsp;</h3><p><a href="https://505updates.com/marcelbrown/" rel="noopener noreferrer" target="_blank"><strong>🇺🇸</strong> Marcel Brown, St. Louis, Missouri ↗</a></p><p><a href="http://thisdayintechhistory.com/06/15" rel="noopener noreferrer"...]]></description><content:encoded><![CDATA[<p><strong>Hey, it's 5:05 on Thursday, June 15th, 2023.</strong> From the Sourced Podcast Network in New York City, this is your host, Pokie Huang. Stories in today's episode come from <strong>Edwin Kwan</strong> in Sydney, Australia, <strong>Hillary Coover</strong> in Washington, DC, <strong>Katy Craig</strong> in San Diego, California, <strong>Olimpiu Pop</strong> in Transylvania, Romania, <strong>Marcel Brown</strong> in St. Louis, Missouri.&nbsp;</p><p>Let's get to it.</p><h3>Hunter Valley Bus Tragedy Scams Spotted</h3><p><a href="https://505updates.com/edwinkwan/" rel="noopener noreferrer" target="_blank">🇦🇺 Edwin Kwan, Sydney, Australia ↗</a></p><p><a href="https://www.cybersecurityconnect.com.au/strategy/9185-scammers-set-up-fake-gofundme-pages-to-exploit-hunter-valley-bus-tragedy" rel="noopener noreferrer" target="_blank">Scammers allegedly set up GoFundMe pages to exploit Hunter Valley bus tragedy - Cyber Security Connect</a></p><h3>Striking a balance, protecting national security and privacy in the age of commercial data.</h3><p><a href="http://505updates.com/hillarycoover/" rel="noopener noreferrer" target="_blank">🇺🇸 Hillary Coover, Washington, DC ↗</a></p><p>Declassified Report on Commercial Available Information <a href="https://www.dni.gov/files/ODNI/documents/assessments/ODNI-Declassified-Report-on-CAI-January2022.pdf" rel="noopener noreferrer" target="_blank">https://www.dni.gov/files/ODNI/documents/assessments/ODNI-Declassified-Report-on-CAI-January2022.pdf</a></p><h3>CISA warns of sabotage from Chinese hackers</h3><p><a href="https://505updates.com/katycraig/" rel="noopener noreferrer" target="_blank">🇺🇸 Katy Craig, San Diego, California ↗</a></p><p><a href="https://www.reuters.com/world/americans-should-prepare-cyber-sabotage-chinese-hackers-us-official-warns-2023-06-12/" rel="noopener noreferrer" target="_blank">Americans should prepare for cyber sabotage from Chinese hackers, US official warns | Reuters</a></p><h3>PassGPT is an AI Model That Generates 20% unseen passwords by learning from RockYou2021 - the biggest password leak in history</h3><p><a href="http://505updates.com/olimpiupop/" rel="noopener noreferrer" target="_blank">🇷🇴 Olimpiu Pop, Transylvania, Romania ↗</a></p><p><a href="https://decrypt.co/144004/meet-passgpt-ai-trained-millions-leaked-passwords" rel="noopener noreferrer" target="_blank">Meet PassGPT, the AI Trained on Millions of Leaked Passwords - Decrypt</a></p><p><a href="https://javirandor.github.io/assets/pdf/passgpt2023rando.pdf" rel="noopener noreferrer" target="_blank">PassGPT: Password Modeling and (Guided) Generation with Large Language Models</a></p><p><a href="https://t.co/xV3wr4NGCs" rel="noopener noreferrer" target="_blank">[2306.01545] PassGPT: Password Modeling and (Guided) Generation with Large Language Models</a></p><p><a href="https://twitter.com/javi_rando/status/1666073708127977472?ref_src=twsrc%5Etfw%7Ctwcamp%5Etweetembed%7Ctwterm%5E1666073708127977472%7Ctwgr%5E51bf72d07b238f52f92187d45c5e2039f8692040%7Ctwcon%5Es1_&amp;ref_url=https%3A%2F%2Fdecrypt.co%2F144004%2Fmeet-passgpt-ai-trained-millions-leaked-passwords" rel="noopener noreferrer" target="_blank">https://twitter.com/javi_rando/status/1666073708127977472?ref_src=twsrc%5Etfw%7Ctwcamp%5Etweetembed%7Ctwterm%5E1666073708127977472%7Ctwgr%5E51bf72d07b238f52f92187d45c5e2039f8692040%7Ctwcon%5Es1_&amp;ref_url=https%3A%2F%2Fdecrypt.co%2F144004%2Fmeet-passgpt-ai-trained-millions-leaked-passwords</a></p><p><a href="https://cybernews.com/security/rockyou2021-alltime-largest-password-compilation-leaked/" rel="noopener noreferrer" target="_blank">RockYou2021: Largest Ever Password Compilation Leaked | Cybernews</a></p><h3>This Day in Tech History&nbsp;</h3><p><a href="https://505updates.com/marcelbrown/" rel="noopener noreferrer" target="_blank"><strong>🇺🇸</strong> Marcel Brown, St. Louis, Missouri ↗</a></p><p><a href="http://thisdayintechhistory.com/06/15" rel="noopener noreferrer" target="_blank">http://thisdayintechhistory.com/06/15</a></p>]]></content:encoded><link><![CDATA[https://3zozb9fxlbueipjyapmaas.captivate.fm/episode/episode-164-hunter-valley-bus-tragedy-scams-spotted-striking-a-balance-protecting-national-security-and-privacy-in-the-age-of-commercial-data-cisa-warns-of-sabotage-from-chinese-hackers-passgpt]]></link><guid isPermaLink="false">bca99219-e046-4a22-978d-5546528a067a</guid><itunes:image href="https://artwork.captivate.fm/bd00151f-af3b-4930-93dd-b1898a5bde2c/S0iXNuETPyjbTQ_dj_rmAKqt.png"/><dc:creator><![CDATA[Contributors from Around the World]]></dc:creator><pubDate>Thu, 15 Jun 2023 16:45:00 -0400</pubDate><enclosure url="https://dts.podtrac.com/redirect.mp3/podcasts.captivate.fm/media/51fb6a66-54e5-44f7-b352-c5f9a84c3415/2023-06-15-505-Episode-164-converted.mp3" length="7876983" type="audio/mpeg"/><itunes:duration>10:56</itunes:duration><itunes:explicit>false</itunes:explicit><itunes:episodeType>full</itunes:episodeType><itunes:season>1</itunes:season><itunes:episode>164</itunes:episode><itunes:season>1</itunes:season><podcast:episode>164</podcast:episode><podcast:season>1</podcast:season><itunes:author>Contributors from Around the World</itunes:author></item><item><title>Episode #163 - Babel X, Using ChatGPT To Solve Secure Programming Challenges, Unmasking the False Claim of a Quantum Processor, OpenInfra Open EU and Asian Hub, Ex Samsung Exec Stole Trade Secrets for China</title><itunes:title>Episode #163 - Babel X, Using ChatGPT To Solve Secure Programming Challenges, Unmasking the False Claim of a Quantum Processor, OpenInfra Open EU and Asian Hub, Ex Samsung Exec Stole Trade Secrets for China</itunes:title><description><![CDATA[<p><strong>It's 5:05 on Wednesday, June 14th, 2023.</strong> From the Sourced Podcast Network in New York City, this is your host, Pokie Huang. Stories in today's episode come from <strong>Kadi Grigg</strong> in Alexandria, Virginia, <strong>Edwin Kwan</strong> in Sydney, Australia, <strong>Ian Garrett</strong> in Arlington, Virginia, <strong>Olimpiu Pop</strong> in Transylvania, Romania, <strong>Katy Craig</strong> in San Diego, California, and <strong>Marcel Brown</strong> in St. Louis, Missouri.&nbsp;</p><p>Let's get to it.</p><h3><strong>Babel X is Looking at Your Social Media</strong></h3><p><a href="https://505updates.com/kadigrigg/" rel="noopener noreferrer" target="_blank">🇺🇸 Kadi Grigg,Alexandria, Virginia&nbsp;</a>↗</p><p><a href="https://www.vice.com/en/article/m7bge3/dhs-uses-ai-tool-babel-x-babel-street-social-media-citizens-refugees" rel="noopener noreferrer" target="_blank">Homeland Security Uses AI Tool to Analyze Social Media of U.S. Citizens and Refugees</a></p><h3><strong>Using ChatGPT To Solve Secure Programming Challenges</strong></h3><p><a href="https://505updates.com/edwinkwan/" rel="noopener noreferrer" target="_blank">🇦🇺 Edwin Kwan, Sydney, Australia ↗</a></p><p><a href="https://discuss.secdim.com/t/evaluating-chatgpt-s-effectiveness-in-passing-a-secure-programming-challenge/660" rel="noopener noreferrer" target="_blank">Evaluating ChatGPT’s Effectiveness in Passing A Secure Programming Challenge - AppSec &amp; DevSecOps - Discuss</a></p><h3><strong>Unmasking the False Claim of a Quantum Processor</strong></h3><p><a href="https://505updates.com/iangarrett/" rel="noopener noreferrer" target="_blank"><strong>🇺🇸&nbsp;</strong>Ian Garrett, Arlington, Virginia ↗</a></p><p><a href="https://www.pcgamer.com/irans-quantum-processor-turned-out-to-be-a-dollar600-dev-board" rel="noopener noreferrer" target="_blank">Iran's 'quantum processor' turned out to be a $600 dev board | PC Gamer</a></p><h3><strong>Following Public Position Against The Current Form Of The EU Cyber Resilience Act, OpenInfra Open EU and Asian Hub</strong></h3><p><a href="http://505updates.com/olimpiupop/" rel="noopener noreferrer" target="_blank">🇷🇴 Olimpiu Pop, Transylvania, Romania ↗</a></p><p><a href="https://techcrunch.com/2023/06/13/openinfra-foundation-opens-regional-hubs-in-europe-and-asia" rel="noopener noreferrer" target="_blank">https://techcrunch.com/2023/06/13/openinfra-foundation-opens-regional-hubs-in-europe-and-asia</a></p><p><a href="https://openinfra.dev/blog/openinfra-foundation-cyber-resilience-act" rel="noopener noreferrer" target="_blank">OpenInfra Foundation Expresses Concern over Proposed EU Cyber Resilience Act | Blog</a></p><h3><strong>Ex Samsung Exec Stole Trade Secrets for China</strong></h3><p><a href="https://505updates.com/katycraig/" rel="noopener noreferrer" target="_blank">🇺🇸 Katy Craig, San Diego, California ↗</a></p><p><a href="https://www.ft.com/content/959f3392-df66-440d-93c1-32dec1dc2b4a" rel="noopener noreferrer" target="_blank">Ex-Samsung executive alleged to have stolen tech to recreate chip plant in China | Financial Times</a></p><p><a href="https://asia.nikkei.com/Business/Tech/Semiconductors/Ex-Samsung-executive-indicted-for-stealing-trade-secrets-for-China" rel="noopener noreferrer" target="_blank">Ex-Samsung executive indicted for stealing trade secrets for China - Nikkei Asia</a></p><h3><strong>This Day in Tech History&nbsp;</strong></h3><p><a href="https://505updates.com/marcelbrown/" rel="noopener noreferrer" target="_blank"><strong>🇺🇸</strong>&nbsp;Marcel Brown, St. Louis, Missouri ↗</a></p><p><a href="http://thisdayintechhistory.com/06/14" rel="noopener noreferrer" target="_blank">http://thisdayintechhistory.com/06/14</a></p>]]></description><content:encoded><![CDATA[<p><strong>It's 5:05 on Wednesday, June 14th, 2023.</strong> From the Sourced Podcast Network in New York City, this is your host, Pokie Huang. Stories in today's episode come from <strong>Kadi Grigg</strong> in Alexandria, Virginia, <strong>Edwin Kwan</strong> in Sydney, Australia, <strong>Ian Garrett</strong> in Arlington, Virginia, <strong>Olimpiu Pop</strong> in Transylvania, Romania, <strong>Katy Craig</strong> in San Diego, California, and <strong>Marcel Brown</strong> in St. Louis, Missouri.&nbsp;</p><p>Let's get to it.</p><h3><strong>Babel X is Looking at Your Social Media</strong></h3><p><a href="https://505updates.com/kadigrigg/" rel="noopener noreferrer" target="_blank">🇺🇸 Kadi Grigg,Alexandria, Virginia&nbsp;</a>↗</p><p><a href="https://www.vice.com/en/article/m7bge3/dhs-uses-ai-tool-babel-x-babel-street-social-media-citizens-refugees" rel="noopener noreferrer" target="_blank">Homeland Security Uses AI Tool to Analyze Social Media of U.S. Citizens and Refugees</a></p><h3><strong>Using ChatGPT To Solve Secure Programming Challenges</strong></h3><p><a href="https://505updates.com/edwinkwan/" rel="noopener noreferrer" target="_blank">🇦🇺 Edwin Kwan, Sydney, Australia ↗</a></p><p><a href="https://discuss.secdim.com/t/evaluating-chatgpt-s-effectiveness-in-passing-a-secure-programming-challenge/660" rel="noopener noreferrer" target="_blank">Evaluating ChatGPT’s Effectiveness in Passing A Secure Programming Challenge - AppSec &amp; DevSecOps - Discuss</a></p><h3><strong>Unmasking the False Claim of a Quantum Processor</strong></h3><p><a href="https://505updates.com/iangarrett/" rel="noopener noreferrer" target="_blank"><strong>🇺🇸&nbsp;</strong>Ian Garrett, Arlington, Virginia ↗</a></p><p><a href="https://www.pcgamer.com/irans-quantum-processor-turned-out-to-be-a-dollar600-dev-board" rel="noopener noreferrer" target="_blank">Iran's 'quantum processor' turned out to be a $600 dev board | PC Gamer</a></p><h3><strong>Following Public Position Against The Current Form Of The EU Cyber Resilience Act, OpenInfra Open EU and Asian Hub</strong></h3><p><a href="http://505updates.com/olimpiupop/" rel="noopener noreferrer" target="_blank">🇷🇴 Olimpiu Pop, Transylvania, Romania ↗</a></p><p><a href="https://techcrunch.com/2023/06/13/openinfra-foundation-opens-regional-hubs-in-europe-and-asia" rel="noopener noreferrer" target="_blank">https://techcrunch.com/2023/06/13/openinfra-foundation-opens-regional-hubs-in-europe-and-asia</a></p><p><a href="https://openinfra.dev/blog/openinfra-foundation-cyber-resilience-act" rel="noopener noreferrer" target="_blank">OpenInfra Foundation Expresses Concern over Proposed EU Cyber Resilience Act | Blog</a></p><h3><strong>Ex Samsung Exec Stole Trade Secrets for China</strong></h3><p><a href="https://505updates.com/katycraig/" rel="noopener noreferrer" target="_blank">🇺🇸 Katy Craig, San Diego, California ↗</a></p><p><a href="https://www.ft.com/content/959f3392-df66-440d-93c1-32dec1dc2b4a" rel="noopener noreferrer" target="_blank">Ex-Samsung executive alleged to have stolen tech to recreate chip plant in China | Financial Times</a></p><p><a href="https://asia.nikkei.com/Business/Tech/Semiconductors/Ex-Samsung-executive-indicted-for-stealing-trade-secrets-for-China" rel="noopener noreferrer" target="_blank">Ex-Samsung executive indicted for stealing trade secrets for China - Nikkei Asia</a></p><h3><strong>This Day in Tech History&nbsp;</strong></h3><p><a href="https://505updates.com/marcelbrown/" rel="noopener noreferrer" target="_blank"><strong>🇺🇸</strong>&nbsp;Marcel Brown, St. Louis, Missouri ↗</a></p><p><a href="http://thisdayintechhistory.com/06/14" rel="noopener noreferrer" target="_blank">http://thisdayintechhistory.com/06/14</a></p>]]></content:encoded><link><![CDATA[https://3zozb9fxlbueipjyapmaas.captivate.fm/episode/episode-163-babel-x-using-chatgpt-to-solve-secure-programming-challenges-unmasking-the-false-claim-of-a-quantum-processor-openinfra-open-eu-and-asian-hub-ex-samsung-exec-stole-trade-secrets-for-china]]></link><guid isPermaLink="false">8f4f23ea-71c5-40dc-a7ad-de5273e1f8b6</guid><itunes:image href="https://artwork.captivate.fm/80540475-0a98-4f12-8e25-43f2336293ad/Ct-EsCP5SN7V8sHrkvf37g6x.png"/><dc:creator><![CDATA[Contributors from Around the World]]></dc:creator><pubDate>Wed, 14 Jun 2023 16:45:00 -0400</pubDate><enclosure url="https://dts.podtrac.com/redirect.mp3/podcasts.captivate.fm/media/57852865-537c-4302-973b-c5d97eecda15/2023-06-14-505-Episode-163-converted.mp3" length="9263459" type="audio/mpeg"/><itunes:duration>12:52</itunes:duration><itunes:explicit>false</itunes:explicit><itunes:episodeType>full</itunes:episodeType><itunes:season>1</itunes:season><itunes:episode>163</itunes:episode><itunes:season>1</itunes:season><podcast:episode>163</podcast:episode><podcast:season>1</podcast:season><itunes:author>Contributors from Around the World</itunes:author></item><item><title>Episode #162 - Gmail Flaw Gives Phishing Emails the Blue Tick, Activity Based Intelligence - Cuba, Russian Hacker Drains Security Services Bitcoin Wallets, PyPi Subpoena for Data Of Users</title><itunes:title>Episode #162 - Gmail Flaw Gives Phishing Emails the Blue Tick, Activity Based Intelligence - Cuba, Russian Hacker Drains Security Services Bitcoin Wallets, PyPi Subpoena for Data Of Users</itunes:title><description><![CDATA[<h1>Reports in this episode:</h1><p><strong>Gmail Flaw Gives Phishing Emails the Blue Tick</strong></p><p><a href="https://505updates.com/edwinkwan/" rel="noopener noreferrer" target="_blank">🇦🇺 Edwin Kwan, Sydney, Australia ↗</a></p><p><a href="https://www.theregister.com/2023/06/09/google_bimi_email_authentication/" rel="noopener noreferrer" target="_blank">https://www.theregister.com/2023/06/09/google_bimi_email_authentication/</a></p><p><br></p><p><strong>Activity Based Intelligence - Cuba</strong></p><p><a href="http://505updates.com/hillarycoover/" rel="noopener noreferrer" target="_blank"><strong>🇺🇸</strong> Hillary Coover, Washington, DC ↗</a></p><p><br></p><p><strong>Russian Hacker Drains Security Services Bitcoin Wallets</strong></p><p><a href="https://505updates.com/katycraig/" rel="noopener noreferrer" target="_blank">🇺🇸 Katy Craig, San Diego, California ↗</a></p><p><a href="https://www.coindesk.com/business/2023/04/27/russian-bitcoin-wallets-allegedly-exposed-by-apparent-hacker/" rel="noopener noreferrer" target="_blank">https://www.coindesk.com/business/2023/04/27/russian-bitcoin-wallets-allegedly-exposed-by-apparent-hacker/</a></p><p><a href="https://news.yahoo.com/hacker-drains-russian-special-services-121400918.html" rel="noopener noreferrer" target="_blank">https://news.yahoo.com/hacker-drains-russian-special-services-121400918.html</a></p><p><br></p><p><strong>PyPi Subpoena Data Of Users</strong></p><h3><a href="http://505updates.com/olimpiupop/" rel="noopener noreferrer" target="_blank"><strong>🇷🇴 Olimpiu Pop, Transylvania, Romania ↗</strong></a></h3><h3><a href="https://blog.pypi.org/posts/2023-05-24-pypi-was-subpoenaed/" rel="noopener noreferrer" target="_blank"><strong>https://blog.pypi.org/posts/2023-05-24-pypi-was-subpoenaed/</strong></a></h3><p><br></p><p><strong>This Day in Tech History&nbsp;</strong></p><p><a href="https://505updates.com/marcelbrown/" rel="noopener noreferrer" target="_blank"><strong>🇺🇸</strong> Marcel Brown, St. Louis, Missouri ↗</a></p><p><a href="http://thisdayintechhistory.com/06/13/" rel="noopener noreferrer" target="_blank">http://thisdayintechhistory.com/06/13/</a></p>]]></description><content:encoded><![CDATA[<h1>Reports in this episode:</h1><p><strong>Gmail Flaw Gives Phishing Emails the Blue Tick</strong></p><p><a href="https://505updates.com/edwinkwan/" rel="noopener noreferrer" target="_blank">🇦🇺 Edwin Kwan, Sydney, Australia ↗</a></p><p><a href="https://www.theregister.com/2023/06/09/google_bimi_email_authentication/" rel="noopener noreferrer" target="_blank">https://www.theregister.com/2023/06/09/google_bimi_email_authentication/</a></p><p><br></p><p><strong>Activity Based Intelligence - Cuba</strong></p><p><a href="http://505updates.com/hillarycoover/" rel="noopener noreferrer" target="_blank"><strong>🇺🇸</strong> Hillary Coover, Washington, DC ↗</a></p><p><br></p><p><strong>Russian Hacker Drains Security Services Bitcoin Wallets</strong></p><p><a href="https://505updates.com/katycraig/" rel="noopener noreferrer" target="_blank">🇺🇸 Katy Craig, San Diego, California ↗</a></p><p><a href="https://www.coindesk.com/business/2023/04/27/russian-bitcoin-wallets-allegedly-exposed-by-apparent-hacker/" rel="noopener noreferrer" target="_blank">https://www.coindesk.com/business/2023/04/27/russian-bitcoin-wallets-allegedly-exposed-by-apparent-hacker/</a></p><p><a href="https://news.yahoo.com/hacker-drains-russian-special-services-121400918.html" rel="noopener noreferrer" target="_blank">https://news.yahoo.com/hacker-drains-russian-special-services-121400918.html</a></p><p><br></p><p><strong>PyPi Subpoena Data Of Users</strong></p><h3><a href="http://505updates.com/olimpiupop/" rel="noopener noreferrer" target="_blank"><strong>🇷🇴 Olimpiu Pop, Transylvania, Romania ↗</strong></a></h3><h3><a href="https://blog.pypi.org/posts/2023-05-24-pypi-was-subpoenaed/" rel="noopener noreferrer" target="_blank"><strong>https://blog.pypi.org/posts/2023-05-24-pypi-was-subpoenaed/</strong></a></h3><p><br></p><p><strong>This Day in Tech History&nbsp;</strong></p><p><a href="https://505updates.com/marcelbrown/" rel="noopener noreferrer" target="_blank"><strong>🇺🇸</strong> Marcel Brown, St. Louis, Missouri ↗</a></p><p><a href="http://thisdayintechhistory.com/06/13/" rel="noopener noreferrer" target="_blank">http://thisdayintechhistory.com/06/13/</a></p>]]></content:encoded><link><![CDATA[https://3zozb9fxlbueipjyapmaas.captivate.fm/episode/episode-162-gmail-flaw-gives-phishing-emails-the-blue-tick-activity-based-intelligence-cuba-russian-hacker-drains-security-services-bitcoin-wallets-pypi-subpoena-for-data-of-users]]></link><guid isPermaLink="false">266eee64-36d7-4948-bd04-04c4d5343494</guid><itunes:image href="https://artwork.captivate.fm/33e2a4e7-a936-4ef5-905a-3a72363cfbe4/BkhMbfQsRHQi9QFk9GvnUJSv.png"/><dc:creator><![CDATA[Contributors from Around the World]]></dc:creator><pubDate>Tue, 13 Jun 2023 16:45:00 -0400</pubDate><enclosure url="https://dts.podtrac.com/redirect.mp3/podcasts.captivate.fm/media/a7efaf7c-1a94-4f25-99a3-ca3024fca6a6/2023-06-13-Tuesday-505-Final-converted.mp3" length="10809011" type="audio/mpeg"/><itunes:duration>11:16</itunes:duration><itunes:explicit>false</itunes:explicit><itunes:episodeType>full</itunes:episodeType><itunes:season>1</itunes:season><itunes:episode>162</itunes:episode><itunes:season>1</itunes:season><podcast:episode>162</podcast:episode><podcast:season>1</podcast:season><itunes:author>Contributors from Around the World</itunes:author></item><item><title>Episode #161 - Journalist Impresonation Steal Cryptocurrency, 2023 National Cybersecurity Strategy for Software Developers, First EU AI Legislation in the World, US targets investments in China Chip, Ai and Quantum Industries</title><itunes:title>Episode #161 - Journalist Impresonation Steal Cryptocurrency, 2023 National Cybersecurity Strategy for Software Developers, First EU AI Legislation in the World, US targets investments in China Chip, Ai and Quantum Industries</itunes:title><description><![CDATA[<p><strong>Hey, it's 5:05 on Monday. June 12th, 2023.</strong> From the Sourced Podcast Network in New York City, this is your host, Pokie Huang. Stories in today's episode come from <strong>Edwin Kwan</strong> in Sydney, Australia, <strong>JulieChatman</strong> in Washington, DC, <strong>Olimpiu Pop </strong>in Transylvania, Romania, <strong>Katy Craig</strong> in San Diego, California, and <strong>Marcel Brown</strong> in St. Louis, Missouri.&nbsp;</p><p>Let's get to it.</p><h3><strong>Journalist Impersonation Phishing Attacks to Steal Cryptocurrency</strong></h3><p><a href="https://505updates.com/edwinkwan/" rel="noopener noreferrer" target="_blank">🇦🇺 Edwin Kwan, Sydney, Australia ↗</a></p><p><a href="https://www.bleepingcomputer.com/news/cryptocurrency/hackers-steal-3-million-by-impersonating-crypto-news-journalists/" rel="noopener noreferrer" target="_blank">Hackers steal $3 million by impersonating crypto news journalists</a></p><h3><strong>What does the 2023 National Cybersecurity Strategy mean for software developers?</strong></h3><p><a href="https://505updates.com/juliechatman/" rel="noopener noreferrer" target="_blank"><strong>🇺🇸</strong>&nbsp;Julie Chatman, Washington, DC&nbsp;↗</a></p><p><a href="https://about.gitlab.com/blog/2023/03/07/national-cyber-strategy-response/" rel="noopener noreferrer" target="_blank">Is the National Cybersecurity Strategy a wake-up call for software developers? | GitLab</a></p><h3><strong>EU Is the First One At Something: Drafting the First AI Legislation in the World</strong></h3><p><a href="http://505updates.com/olimpiupop/" rel="noopener noreferrer" target="_blank">🇷🇴 Olimpiu Pop, Transylvania, Romania ↗</a></p><p><a href="https://www.europarl.europa.eu/news/en/press-room/20230505IPR84904/ai-act-a-step-closer-to-the-first-rules-on-artificial-intelligence" rel="noopener noreferrer" target="_blank">AI Act: a step closer to the first rules on Artificial Intelligence | News | European Parliament</a></p><p><a href="https://www.europarl.europa.eu/resources/library/media/20230516RES90302/20230516RES90302.pdf" rel="noopener noreferrer" target="_blank">https://www.europarl.europa.eu/resources/library/media/20230516RES90302/20230516RES90302.pdf</a></p><h3><strong>US targets investments in China’s Chip, AI, Quantum industries</strong></h3><p><a href="https://505updates.com/katycraig/" rel="noopener noreferrer" target="_blank">🇺🇸 Katy Craig, San Diego, California ↗</a></p><p><a href="https://www.asiafinancial.com/us-to-target-investment-in-china-chips-ai-quantum-computing" rel="noopener noreferrer" target="_blank">US to Target Investment in China Chips, AI, Quantum Computing</a></p><p><a href="https://www.asiafinancial.com/new-us-export-rules-seek-to-contain-chinas-chip-sector" rel="noopener noreferrer" target="_blank">New US Export Rules Seek to Contain China's Chip Sector</a></p><h3><strong>This Day in Tech History&nbsp;</strong></h3><p><a href="https://505updates.com/marcelbrown/" rel="noopener noreferrer" target="_blank"><strong>🇺🇸</strong>&nbsp;Marcel Brown, St. Louis, Missouri ↗</a></p><p><a href="http://thisdayintechhistory.com/06/11" rel="noopener noreferrer" target="_blank">http://thisdayintechhistory.com/06/11</a></p><p><a href="http://thisdayintechhistory.com/06/12" rel="noopener noreferrer" target="_blank">http://thisdayintechhistory.com/06/12</a></p>]]></description><content:encoded><![CDATA[<p><strong>Hey, it's 5:05 on Monday. June 12th, 2023.</strong> From the Sourced Podcast Network in New York City, this is your host, Pokie Huang. Stories in today's episode come from <strong>Edwin Kwan</strong> in Sydney, Australia, <strong>JulieChatman</strong> in Washington, DC, <strong>Olimpiu Pop </strong>in Transylvania, Romania, <strong>Katy Craig</strong> in San Diego, California, and <strong>Marcel Brown</strong> in St. Louis, Missouri.&nbsp;</p><p>Let's get to it.</p><h3><strong>Journalist Impersonation Phishing Attacks to Steal Cryptocurrency</strong></h3><p><a href="https://505updates.com/edwinkwan/" rel="noopener noreferrer" target="_blank">🇦🇺 Edwin Kwan, Sydney, Australia ↗</a></p><p><a href="https://www.bleepingcomputer.com/news/cryptocurrency/hackers-steal-3-million-by-impersonating-crypto-news-journalists/" rel="noopener noreferrer" target="_blank">Hackers steal $3 million by impersonating crypto news journalists</a></p><h3><strong>What does the 2023 National Cybersecurity Strategy mean for software developers?</strong></h3><p><a href="https://505updates.com/juliechatman/" rel="noopener noreferrer" target="_blank"><strong>🇺🇸</strong>&nbsp;Julie Chatman, Washington, DC&nbsp;↗</a></p><p><a href="https://about.gitlab.com/blog/2023/03/07/national-cyber-strategy-response/" rel="noopener noreferrer" target="_blank">Is the National Cybersecurity Strategy a wake-up call for software developers? | GitLab</a></p><h3><strong>EU Is the First One At Something: Drafting the First AI Legislation in the World</strong></h3><p><a href="http://505updates.com/olimpiupop/" rel="noopener noreferrer" target="_blank">🇷🇴 Olimpiu Pop, Transylvania, Romania ↗</a></p><p><a href="https://www.europarl.europa.eu/news/en/press-room/20230505IPR84904/ai-act-a-step-closer-to-the-first-rules-on-artificial-intelligence" rel="noopener noreferrer" target="_blank">AI Act: a step closer to the first rules on Artificial Intelligence | News | European Parliament</a></p><p><a href="https://www.europarl.europa.eu/resources/library/media/20230516RES90302/20230516RES90302.pdf" rel="noopener noreferrer" target="_blank">https://www.europarl.europa.eu/resources/library/media/20230516RES90302/20230516RES90302.pdf</a></p><h3><strong>US targets investments in China’s Chip, AI, Quantum industries</strong></h3><p><a href="https://505updates.com/katycraig/" rel="noopener noreferrer" target="_blank">🇺🇸 Katy Craig, San Diego, California ↗</a></p><p><a href="https://www.asiafinancial.com/us-to-target-investment-in-china-chips-ai-quantum-computing" rel="noopener noreferrer" target="_blank">US to Target Investment in China Chips, AI, Quantum Computing</a></p><p><a href="https://www.asiafinancial.com/new-us-export-rules-seek-to-contain-chinas-chip-sector" rel="noopener noreferrer" target="_blank">New US Export Rules Seek to Contain China's Chip Sector</a></p><h3><strong>This Day in Tech History&nbsp;</strong></h3><p><a href="https://505updates.com/marcelbrown/" rel="noopener noreferrer" target="_blank"><strong>🇺🇸</strong>&nbsp;Marcel Brown, St. Louis, Missouri ↗</a></p><p><a href="http://thisdayintechhistory.com/06/11" rel="noopener noreferrer" target="_blank">http://thisdayintechhistory.com/06/11</a></p><p><a href="http://thisdayintechhistory.com/06/12" rel="noopener noreferrer" target="_blank">http://thisdayintechhistory.com/06/12</a></p>]]></content:encoded><link><![CDATA[https://3zozb9fxlbueipjyapmaas.captivate.fm/episode/episode-161-journalist-impresonation-steal-cryptocurrency-2023-national-cybersecurity-strategy-for-software-developers-first-eu-ai-legislation-in-the-world-us-targets-investments-in-china-chip-ai-and-quantum-industries]]></link><guid isPermaLink="false">44c3c13f-deae-4a5a-9c41-79700e51fce7</guid><itunes:image href="https://artwork.captivate.fm/d225920a-6030-44c0-aeb8-e84b16e81891/lblBsgz-pFpz6A5U8Mxt_2K8.png"/><dc:creator><![CDATA[Contributors from Around the World]]></dc:creator><pubDate>Mon, 12 Jun 2023 16:45:00 -0400</pubDate><enclosure url="https://dts.podtrac.com/redirect.mp3/podcasts.captivate.fm/media/5370fc59-f4a3-4672-94b1-75214ea48612/2023-06-12-505-Episode-161-converted.mp3" length="8446791" type="audio/mpeg"/><itunes:duration>11:44</itunes:duration><itunes:explicit>false</itunes:explicit><itunes:episodeType>full</itunes:episodeType><itunes:season>1</itunes:season><itunes:episode>161</itunes:episode><itunes:season>1</itunes:season><podcast:episode>161</podcast:episode><podcast:season>1</podcast:season><itunes:author>Contributors from Around the World</itunes:author></item><item><title>Episode #160 - Microsoft Compromised, Google Chrome Zero Day Exploited, TikTok Updates</title><itunes:title>Episode #160 - Microsoft Compromised, Google Chrome Zero Day Exploited, TikTok Updates</itunes:title><description><![CDATA[<p><strong>Hey, it's 5:05 on Friday, June 9th, 2023.</strong> From the Sourced Podcast Network in New York City, this is your host, Pokie Huang. Stories in today's episode come from <strong>Trac Bannon</strong> in Camp Hill, Pennsylvania, <strong>Edwin Kwon</strong> in Sydney, Australia, <strong>Katy Craig</strong> in San Diego, California, <strong>Marcel Brown</strong> in St. Louis, Missouri.&nbsp;</p><p>Let's get to it.</p><h3>Breaking news: Microsoft Compromised!&nbsp; OneDrive Services Targeted</h3><p><a href="https://505updates.com/tracbannon/" rel="noopener noreferrer" target="_blank"><strong>🇺🇸</strong> Tracy (Trac) Bannon, Camp Hill, Pennsylvania↗</a></p><p><a href="https://www-bleepingcomputer-com.cdn.ampproject.org/c/s/www.bleepingcomputer.com/news/microsoft/microsoft-onedrive-down-worldwide-following-claims-of-ddos-attacks/amp/" rel="noopener noreferrer" target="_blank">https://www-bleepingcomputer-com.cdn.ampproject.org/c/s/www.bleepingcomputer.com/news/microsoft/microsoft-onedrive-down-worldwide-following-claims-of-ddos-attacks/amp/</a></p><p><a href="https://portal.office.com/servicestatus" rel="noopener noreferrer" target="_blank">Service Status</a></p><p><a href="https://www.computing.co.uk/news/4117607/onedrive-outage-investigated-microsoft" rel="noopener noreferrer" target="_blank">OneDrive outage investigated by Microsoft</a>&nbsp;</p><p><a href="https://www.crn.com/news/cloud/microsoft-investigating-onedrive-outage" rel="noopener noreferrer" target="_blank">Microsoft Investigating OneDrive Outage | CRN</a><a href="https://www.csoonline.com/article/3676148/guilty-verdict-in-the-uber-breach-case-makes-personal-liability-real-for-cisos.html" rel="noopener noreferrer" target="_blank">e</a></p><h3>Google Chrome Zero Day Actively Being Exploited</h3><p><a href="https://505updates.com/edwinkwan/" rel="noopener noreferrer" target="_blank">🇦🇺 Edwin Kwan, Sydney, Australia ↗</a></p><p><a href="https://cybersecuritynews.com/new-google-chrome-zero-day-bug-actively-exploited/" rel="noopener noreferrer" target="_blank">New Google Chrome Zero-Day Bug Actively Exploited in Wild– Emergency Update!</a></p><p><br></p><h3>TikTok Updates</h3><p><a href="https://505updates.com/katycraig/" rel="noopener noreferrer" target="_blank">🇺🇸 Katy Craig, San Diego, California ↗</a></p><p><a href="https://fedscoop.com/tiktok-ban-on-federal-devices-formalized/" rel="noopener noreferrer" target="_blank">TikTok ban on federal devices formalized with update to Federal Acquisition Regulation | FedScoop</a></p><p><a href="https://link.sbstck.com/redirect/26cfd414-d5b8-42ad-8249-d59d71a5cefc?j=eyJ1IjoiMXhwcWMyIn0.IQpUt14np8pH0R2a4ewYZIIodjJIaiu0f9Gh-l72XQQ" rel="noopener noreferrer" target="_blank">https://link.sbstck.com/redirect/26cfd414-d5b8-42ad-8249-d59d71a5cefc?j=eyJ1IjoiMXhwcWMyIn0.IQpUt14np8pH0R2a4ewYZIIodjJIaiu0f9Gh-l72XQQ</a></p><p><br></p><h3>This Day in Tech History&nbsp;</h3><p><a href="https://505updates.com/marcelbrown/" rel="noopener noreferrer" target="_blank"><strong>🇺🇸</strong> Marcel Brown, St. Louis, Missouri ↗</a></p><p><a href="http://thisdayintechhistory.com/06/09" rel="noopener noreferrer" target="_blank">http://thisdayintechhistory.com/06/09</a></p><p><a href="http://thisdayintechhistory.com/06/10" rel="noopener noreferrer" target="_blank">http://thisdayintechhistory.com/06/10</a></p><p><br></p>]]></description><content:encoded><![CDATA[<p><strong>Hey, it's 5:05 on Friday, June 9th, 2023.</strong> From the Sourced Podcast Network in New York City, this is your host, Pokie Huang. Stories in today's episode come from <strong>Trac Bannon</strong> in Camp Hill, Pennsylvania, <strong>Edwin Kwon</strong> in Sydney, Australia, <strong>Katy Craig</strong> in San Diego, California, <strong>Marcel Brown</strong> in St. Louis, Missouri.&nbsp;</p><p>Let's get to it.</p><h3>Breaking news: Microsoft Compromised!&nbsp; OneDrive Services Targeted</h3><p><a href="https://505updates.com/tracbannon/" rel="noopener noreferrer" target="_blank"><strong>🇺🇸</strong> Tracy (Trac) Bannon, Camp Hill, Pennsylvania↗</a></p><p><a href="https://www-bleepingcomputer-com.cdn.ampproject.org/c/s/www.bleepingcomputer.com/news/microsoft/microsoft-onedrive-down-worldwide-following-claims-of-ddos-attacks/amp/" rel="noopener noreferrer" target="_blank">https://www-bleepingcomputer-com.cdn.ampproject.org/c/s/www.bleepingcomputer.com/news/microsoft/microsoft-onedrive-down-worldwide-following-claims-of-ddos-attacks/amp/</a></p><p><a href="https://portal.office.com/servicestatus" rel="noopener noreferrer" target="_blank">Service Status</a></p><p><a href="https://www.computing.co.uk/news/4117607/onedrive-outage-investigated-microsoft" rel="noopener noreferrer" target="_blank">OneDrive outage investigated by Microsoft</a>&nbsp;</p><p><a href="https://www.crn.com/news/cloud/microsoft-investigating-onedrive-outage" rel="noopener noreferrer" target="_blank">Microsoft Investigating OneDrive Outage | CRN</a><a href="https://www.csoonline.com/article/3676148/guilty-verdict-in-the-uber-breach-case-makes-personal-liability-real-for-cisos.html" rel="noopener noreferrer" target="_blank">e</a></p><h3>Google Chrome Zero Day Actively Being Exploited</h3><p><a href="https://505updates.com/edwinkwan/" rel="noopener noreferrer" target="_blank">🇦🇺 Edwin Kwan, Sydney, Australia ↗</a></p><p><a href="https://cybersecuritynews.com/new-google-chrome-zero-day-bug-actively-exploited/" rel="noopener noreferrer" target="_blank">New Google Chrome Zero-Day Bug Actively Exploited in Wild– Emergency Update!</a></p><p><br></p><h3>TikTok Updates</h3><p><a href="https://505updates.com/katycraig/" rel="noopener noreferrer" target="_blank">🇺🇸 Katy Craig, San Diego, California ↗</a></p><p><a href="https://fedscoop.com/tiktok-ban-on-federal-devices-formalized/" rel="noopener noreferrer" target="_blank">TikTok ban on federal devices formalized with update to Federal Acquisition Regulation | FedScoop</a></p><p><a href="https://link.sbstck.com/redirect/26cfd414-d5b8-42ad-8249-d59d71a5cefc?j=eyJ1IjoiMXhwcWMyIn0.IQpUt14np8pH0R2a4ewYZIIodjJIaiu0f9Gh-l72XQQ" rel="noopener noreferrer" target="_blank">https://link.sbstck.com/redirect/26cfd414-d5b8-42ad-8249-d59d71a5cefc?j=eyJ1IjoiMXhwcWMyIn0.IQpUt14np8pH0R2a4ewYZIIodjJIaiu0f9Gh-l72XQQ</a></p><p><br></p><h3>This Day in Tech History&nbsp;</h3><p><a href="https://505updates.com/marcelbrown/" rel="noopener noreferrer" target="_blank"><strong>🇺🇸</strong> Marcel Brown, St. Louis, Missouri ↗</a></p><p><a href="http://thisdayintechhistory.com/06/09" rel="noopener noreferrer" target="_blank">http://thisdayintechhistory.com/06/09</a></p><p><a href="http://thisdayintechhistory.com/06/10" rel="noopener noreferrer" target="_blank">http://thisdayintechhistory.com/06/10</a></p><p><br></p>]]></content:encoded><link><![CDATA[https://3zozb9fxlbueipjyapmaas.captivate.fm/episode/episode-160-microsoft-compromised-google-chrome-zero-day-exploited-tiktok-updates]]></link><guid isPermaLink="false">ac7bb275-1dd7-4e48-b756-dd3685aa726d</guid><itunes:image href="https://artwork.captivate.fm/0a9cabc7-4569-489f-acfb-bc88f37859a5/ukKz7YGq0WklNi_x_KlUSs51.png"/><dc:creator><![CDATA[Contributors from Around the World]]></dc:creator><pubDate>Fri, 09 Jun 2023 16:45:00 -0400</pubDate><enclosure url="https://dts.podtrac.com/redirect.mp3/podcasts.captivate.fm/media/1102e849-7c75-49e8-a05a-6e1de4d91f63/2023-06-09-505-Episode-160-converted.mp3" length="7485458" type="audio/mpeg"/><itunes:duration>10:24</itunes:duration><itunes:explicit>false</itunes:explicit><itunes:episodeType>full</itunes:episodeType><itunes:season>1</itunes:season><itunes:episode>160</itunes:episode><itunes:season>1</itunes:season><podcast:episode>160</podcast:episode><podcast:season>1</podcast:season><itunes:author>Contributors from Around the World</itunes:author></item><item><title>Episode #159 - Email Account Signups for Criminals, Security Risk in Hacking Solar Panels, Spotting Deepfakes</title><itunes:title>Episode #159 - Email Account Signups for Criminals, Security Risk in Hacking Solar Panels, Spotting Deepfakes</itunes:title><description><![CDATA[<p><strong>Hey, it's 5:05 on Thursday, June 8th, 2023.</strong> From the Sourced Podcast Network in New York City, this is your host, Pokie Huang. Stories in today's episode come from <strong>Edwin Kwon</strong> in Sydney, Australia, <strong>Olimpiu Pop</strong> in Transylvania, Romania, <strong>Katy Craig</strong> in San Diego, California, <strong>Marcel Brown</strong> in St. Louis, Missouri. </p><p>Let's get to it.&nbsp;</p><h3>Email Account Signups for Criminals As A Service</h3><p><a href="https://505updates.com/edwinkwan/" rel="noopener noreferrer" target="_blank">🇦🇺 Edwin Kwan, Sydney, Australia ↗</a></p><p><a href="https://krebsonsecurity.com/2023/06/service-rents-email-addresses-for-account-signups/" rel="noopener noreferrer" target="_blank">Service Rents Email Addresses for Account Signups – Krebs on Security</a></p><h3>RDI - the Dutch Cyber Watchdog Sees Major Security Risk in Hacking Solar Panels</h3><p><a href="http://505updates.com/olimpiupop/" rel="noopener noreferrer" target="_blank">🇷🇴 Olimpiu Pop, Transylvania, Romania ↗</a></p><p><a href="https://nos.nl/artikel/2477039-zonnepanelen-gevoelig-voor-hacks-en-storingen-hack-stroomnet-is-realistisch" rel="noopener noreferrer" target="_blank">Zonnepanelen gevoelig voor hacks en storingen: 'Hack stroomnet is realistisch'</a></p><p><a href="https://www.dutchnews.nl/2023/05/solar-panels-vulnerable-to-hackers-concern-for-network-security/" rel="noopener noreferrer" target="_blank">Solar panels vulnerable to hackers, concern for network security - DutchNews.nl</a></p><h3>Spotting Deepfakes</h3><p><a href="https://505updates.com/katycraig/" rel="noopener noreferrer" target="_blank">🇺🇸 Katy Craig, San Diego, California ↗</a></p><p><a href="https://www.jumio.com/2023-identity-study/" rel="noopener noreferrer" target="_blank">2023 Online Identity Consumer Study Jumio Global Research</a></p><p><a href="https://twitter.com/CommunityNotes/status/1663609484051111936" rel="noopener noreferrer" target="_blank">Community Notes</a></p><p><br></p><h3>This Day in Tech History&nbsp;</h3><p><a href="https://505updates.com/marcelbrown/" rel="noopener noreferrer" target="_blank"><strong>🇺🇸</strong> Marcel Brown, St. Louis, Missouri ↗</a></p><p><a href="http://thisdayintechhistory.com/06/08" rel="noopener noreferrer" target="_blank">http://thisdayintechhistory.com/06/08</a></p>]]></description><content:encoded><![CDATA[<p><strong>Hey, it's 5:05 on Thursday, June 8th, 2023.</strong> From the Sourced Podcast Network in New York City, this is your host, Pokie Huang. Stories in today's episode come from <strong>Edwin Kwon</strong> in Sydney, Australia, <strong>Olimpiu Pop</strong> in Transylvania, Romania, <strong>Katy Craig</strong> in San Diego, California, <strong>Marcel Brown</strong> in St. Louis, Missouri. </p><p>Let's get to it.&nbsp;</p><h3>Email Account Signups for Criminals As A Service</h3><p><a href="https://505updates.com/edwinkwan/" rel="noopener noreferrer" target="_blank">🇦🇺 Edwin Kwan, Sydney, Australia ↗</a></p><p><a href="https://krebsonsecurity.com/2023/06/service-rents-email-addresses-for-account-signups/" rel="noopener noreferrer" target="_blank">Service Rents Email Addresses for Account Signups – Krebs on Security</a></p><h3>RDI - the Dutch Cyber Watchdog Sees Major Security Risk in Hacking Solar Panels</h3><p><a href="http://505updates.com/olimpiupop/" rel="noopener noreferrer" target="_blank">🇷🇴 Olimpiu Pop, Transylvania, Romania ↗</a></p><p><a href="https://nos.nl/artikel/2477039-zonnepanelen-gevoelig-voor-hacks-en-storingen-hack-stroomnet-is-realistisch" rel="noopener noreferrer" target="_blank">Zonnepanelen gevoelig voor hacks en storingen: 'Hack stroomnet is realistisch'</a></p><p><a href="https://www.dutchnews.nl/2023/05/solar-panels-vulnerable-to-hackers-concern-for-network-security/" rel="noopener noreferrer" target="_blank">Solar panels vulnerable to hackers, concern for network security - DutchNews.nl</a></p><h3>Spotting Deepfakes</h3><p><a href="https://505updates.com/katycraig/" rel="noopener noreferrer" target="_blank">🇺🇸 Katy Craig, San Diego, California ↗</a></p><p><a href="https://www.jumio.com/2023-identity-study/" rel="noopener noreferrer" target="_blank">2023 Online Identity Consumer Study Jumio Global Research</a></p><p><a href="https://twitter.com/CommunityNotes/status/1663609484051111936" rel="noopener noreferrer" target="_blank">Community Notes</a></p><p><br></p><h3>This Day in Tech History&nbsp;</h3><p><a href="https://505updates.com/marcelbrown/" rel="noopener noreferrer" target="_blank"><strong>🇺🇸</strong> Marcel Brown, St. Louis, Missouri ↗</a></p><p><a href="http://thisdayintechhistory.com/06/08" rel="noopener noreferrer" target="_blank">http://thisdayintechhistory.com/06/08</a></p>]]></content:encoded><link><![CDATA[https://3zozb9fxlbueipjyapmaas.captivate.fm/episode/episode-158-email-account-signups-for-criminals-security-risk-in-hacking-solar-panels-spotting-deepfakes]]></link><guid isPermaLink="false">9f403345-2900-4384-9a88-c2ac198e5b16</guid><itunes:image href="https://artwork.captivate.fm/87606d03-a44b-4b84-9485-bddcccb3d3b3/MXZsBNrTjk5b5-LsHFXph0-G.png"/><dc:creator><![CDATA[Contributors from Around the World]]></dc:creator><pubDate>Thu, 08 Jun 2023 16:45:00 -0400</pubDate><enclosure url="https://dts.podtrac.com/redirect.mp3/podcasts.captivate.fm/media/c4fa7bf2-6c2c-4e25-9376-5dca2531f262/2023-06-08-505-Episode-159-converted.mp3" length="7307409" type="audio/mpeg"/><itunes:duration>10:09</itunes:duration><itunes:explicit>false</itunes:explicit><itunes:episodeType>full</itunes:episodeType><itunes:season>1</itunes:season><itunes:episode>159</itunes:episode><itunes:season>1</itunes:season><podcast:episode>159</podcast:episode><podcast:season>1</podcast:season><itunes:author>Contributors from Around the World</itunes:author></item><item><title>Episode #158 - KeePass Releases Vulnerability Fix, CISA Orders MOVEit Bug Patch, ChatGPT, Can I Trust You?</title><itunes:title>Episode #158 - KeePass Releases Vulnerability Fix, CISA Orders MOVEit Bug Patch, ChatGPT, Can I Trust You?</itunes:title><description><![CDATA[<p><strong>Hey, it's 5:05 on Wednesday. June 7th, 2023.</strong> From the Sourced Podcast Network in New York City, this is your host, Pokie Huang. Stories in today's episode come from <strong>Edwin Kwon</strong> in Sydney, Australia, <strong>Katy Craig</strong> in San Diego, California, <strong>Shannon Lietz</strong> in San Diego, California, <strong>Marcel Brown</strong> in St. Louis, Missouri.&nbsp;</p><p>Let's get to it.</p><h3>KeePass Releases Fix for Master Password Compromise Vulnerability</h3><p><a href="https://505updates.com/edwinkwan/" rel="noopener noreferrer" target="_blank">🇦🇺 Edwin Kwan, Sydney, Australia ↗</a></p><p><a href="https://www.bleepingcomputer.com/news/security/keepass-v254-fixes-bug-that-leaked-cleartext-master-password/" rel="noopener noreferrer" target="_blank">KeePass v2.54 fixes bug that leaked cleartext master password</a></p><h3>CISA Orders Patch for MOVEit bug</h3><p><a href="https://505updates.com/katycraig/" rel="noopener noreferrer" target="_blank">🇺🇸 Katy Craig, San Diego, California ↗</a></p><p><a href="https://www.cisa.gov/known-exploited-vulnerabilities-catalog" rel="noopener noreferrer" target="_blank">Known Exploited Vulnerabilities Catalog | CISA</a></p><p><a href="https://www.bleepingcomputer.com/news/security/cisa-orders-govt-agencies-to-patch-moveit-bug-used-for-data-theft/" rel="noopener noreferrer" target="_blank">CISA orders govt agencies to patch MOVEit bug used for data theft</a></p><p><br></p><h3>Hey ChatGPT, can I really trust you?</h3><p><a href="https://505updates.com/shannonlietz/" rel="noopener noreferrer" target="_blank"><strong>🇺🇸</strong> Shannon Lietz, San Diego, California ↗</a></p><p><a href="https://medium.com/softwaretrust/chatgpt-can-i-trust-you-c5ff865a95bf" rel="noopener noreferrer" target="_blank">https://medium.com/softwaretrust/chatgpt-can-i-trust-you-c5ff865a95bf</a> </p><p><a href="https://www.reuters.com/legal/transactional/lawyer-used-chatgpt-cite-bogus-cases-what-are-ethics-2023-05-30/#:~:text=Steven%20Schwartz%20of%20Levidow%2C%20Levidow,six%20non%2Dexistent%20court%20decisions" rel="noopener noreferrer" target="_blank">EU lawmakers' committees agree tougher draft AI rules | Reuters</a></p><p><br></p><h3>This Day in Tech History&nbsp;</h3><p><a href="https://505updates.com/marcelbrown/" rel="noopener noreferrer" target="_blank"><strong>🇺🇸</strong> Marcel Brown, St. Louis, Missouri ↗</a></p><p><a href="http://thisdayintechhistory.com/06/07/" rel="noopener noreferrer" target="_blank">http://thisdayintechhistory.com/06/07/</a></p>]]></description><content:encoded><![CDATA[<p><strong>Hey, it's 5:05 on Wednesday. June 7th, 2023.</strong> From the Sourced Podcast Network in New York City, this is your host, Pokie Huang. Stories in today's episode come from <strong>Edwin Kwon</strong> in Sydney, Australia, <strong>Katy Craig</strong> in San Diego, California, <strong>Shannon Lietz</strong> in San Diego, California, <strong>Marcel Brown</strong> in St. Louis, Missouri.&nbsp;</p><p>Let's get to it.</p><h3>KeePass Releases Fix for Master Password Compromise Vulnerability</h3><p><a href="https://505updates.com/edwinkwan/" rel="noopener noreferrer" target="_blank">🇦🇺 Edwin Kwan, Sydney, Australia ↗</a></p><p><a href="https://www.bleepingcomputer.com/news/security/keepass-v254-fixes-bug-that-leaked-cleartext-master-password/" rel="noopener noreferrer" target="_blank">KeePass v2.54 fixes bug that leaked cleartext master password</a></p><h3>CISA Orders Patch for MOVEit bug</h3><p><a href="https://505updates.com/katycraig/" rel="noopener noreferrer" target="_blank">🇺🇸 Katy Craig, San Diego, California ↗</a></p><p><a href="https://www.cisa.gov/known-exploited-vulnerabilities-catalog" rel="noopener noreferrer" target="_blank">Known Exploited Vulnerabilities Catalog | CISA</a></p><p><a href="https://www.bleepingcomputer.com/news/security/cisa-orders-govt-agencies-to-patch-moveit-bug-used-for-data-theft/" rel="noopener noreferrer" target="_blank">CISA orders govt agencies to patch MOVEit bug used for data theft</a></p><p><br></p><h3>Hey ChatGPT, can I really trust you?</h3><p><a href="https://505updates.com/shannonlietz/" rel="noopener noreferrer" target="_blank"><strong>🇺🇸</strong> Shannon Lietz, San Diego, California ↗</a></p><p><a href="https://medium.com/softwaretrust/chatgpt-can-i-trust-you-c5ff865a95bf" rel="noopener noreferrer" target="_blank">https://medium.com/softwaretrust/chatgpt-can-i-trust-you-c5ff865a95bf</a> </p><p><a href="https://www.reuters.com/legal/transactional/lawyer-used-chatgpt-cite-bogus-cases-what-are-ethics-2023-05-30/#:~:text=Steven%20Schwartz%20of%20Levidow%2C%20Levidow,six%20non%2Dexistent%20court%20decisions" rel="noopener noreferrer" target="_blank">EU lawmakers' committees agree tougher draft AI rules | Reuters</a></p><p><br></p><h3>This Day in Tech History&nbsp;</h3><p><a href="https://505updates.com/marcelbrown/" rel="noopener noreferrer" target="_blank"><strong>🇺🇸</strong> Marcel Brown, St. Louis, Missouri ↗</a></p><p><a href="http://thisdayintechhistory.com/06/07/" rel="noopener noreferrer" target="_blank">http://thisdayintechhistory.com/06/07/</a></p>]]></content:encoded><link><![CDATA[https://3zozb9fxlbueipjyapmaas.captivate.fm/episode/episode-158-keepass-releases-vulnerability-fix-cisa-orders-moveit-bug-patch-chatgpt-can-i-trust-you]]></link><guid isPermaLink="false">aeeda195-26b2-4767-8cd9-93a463a24b11</guid><itunes:image href="https://artwork.captivate.fm/e37568fb-f437-4689-98ab-3d1ca01f2f3f/Uih1if13Bcp3cWSOlTTHdOLo.png"/><dc:creator><![CDATA[Contributors from Around the World]]></dc:creator><pubDate>Wed, 07 Jun 2023 16:45:00 -0400</pubDate><enclosure url="https://dts.podtrac.com/redirect.mp3/podcasts.captivate.fm/media/a7478aa4-ad4c-4eeb-b42d-6d4200530cbd/2023-06-07-505-Episode-158-converted.mp3" length="6732193" type="audio/mpeg"/><itunes:duration>09:21</itunes:duration><itunes:explicit>false</itunes:explicit><itunes:episodeType>full</itunes:episodeType><itunes:season>1</itunes:season><itunes:episode>158</itunes:episode><itunes:season>1</itunes:season><podcast:episode>158</podcast:episode><podcast:season>1</podcast:season><itunes:author>Contributors from Around the World</itunes:author></item><item><title>Episode #157 - End of passwords? The Illusion of Verification, FSB Accuses NSA Hacking iPhones</title><itunes:title>Episode #157 - End of passwords? The Illusion of Verification, FSB Accuses NSA Hacking iPhones</itunes:title><description><![CDATA[<p><strong>Hey, it's 5:05 on Tuesday, June 6th, 2023.</strong> From the Sourced Podcast Network in New York City, this is your host, Pokie Huang. Stories in today's episode come from <strong>Edwin Kwon</strong> in Sydney, Australia, <strong>Ian Garrett</strong> in Arlington, Virginia, <strong>Katy Craig</strong> in San Diego, California, <strong>Marcel Brown</strong> in St. Louis, Missouri.&nbsp;</p><p>Let's get to it.</p><h3><strong>Is this the End of Passwords?</strong></h3><p><a href="https://505updates.com/edwinkwan/" rel="noopener noreferrer" target="_blank">🇦🇺 Edwin Kwan, Sydney, Australia ↗</a></p><p><a href="https://www.techrepublic.com/article/1password-enables-passkeys/" rel="noopener noreferrer" target="_blank">1Password enables passkeys — a new option from passwords</a></p><h3><strong>The Illusion of Verification: How Gmail’s Checkmark System Fools Users</strong></h3><p><a href="https://505updates.com/iangarrett/" rel="noopener noreferrer" target="_blank"><strong>🇺🇸&nbsp;</strong>Ian Garrett, Arlington, Virginia ↗</a></p><p><a href="https://www.forbes.com/sites/gordonkelly/2023/06/05/google-gmail-problem-new-security-warning-sender-verification" rel="noopener noreferrer" target="_blank">https://www.forbes.com/sites/gordonkelly/2023/06/05/google-gmail-problem-new-security-warning-sender-verification</a></p><h3><strong>FSB accuses NSA of Hacking iPhones</strong></h3><p><a href="https://505updates.com/katycraig/" rel="noopener noreferrer" target="_blank">🇺🇸 Katy Craig, San Diego, California ↗</a></p><p><a href="https://securelist.com/operation-triangulation/109842/" rel="noopener noreferrer" target="_blank">Operation Triangulation: iOS devices targeted with previously unknown malware | Securelist</a></p><h3><strong>This Day in Tech History&nbsp;</strong></h3><p><a href="https://505updates.com/marcelbrown/" rel="noopener noreferrer" target="_blank"><strong>🇺🇸</strong>&nbsp;Marcel Brown, St. Louis, Missouri ↗</a></p><p><a href="http://thisdayintechhistory.com/06/06" rel="noopener noreferrer" target="_blank">http://thisdayintechhistory.com/06/06</a></p>]]></description><content:encoded><![CDATA[<p><strong>Hey, it's 5:05 on Tuesday, June 6th, 2023.</strong> From the Sourced Podcast Network in New York City, this is your host, Pokie Huang. Stories in today's episode come from <strong>Edwin Kwon</strong> in Sydney, Australia, <strong>Ian Garrett</strong> in Arlington, Virginia, <strong>Katy Craig</strong> in San Diego, California, <strong>Marcel Brown</strong> in St. Louis, Missouri.&nbsp;</p><p>Let's get to it.</p><h3><strong>Is this the End of Passwords?</strong></h3><p><a href="https://505updates.com/edwinkwan/" rel="noopener noreferrer" target="_blank">🇦🇺 Edwin Kwan, Sydney, Australia ↗</a></p><p><a href="https://www.techrepublic.com/article/1password-enables-passkeys/" rel="noopener noreferrer" target="_blank">1Password enables passkeys — a new option from passwords</a></p><h3><strong>The Illusion of Verification: How Gmail’s Checkmark System Fools Users</strong></h3><p><a href="https://505updates.com/iangarrett/" rel="noopener noreferrer" target="_blank"><strong>🇺🇸&nbsp;</strong>Ian Garrett, Arlington, Virginia ↗</a></p><p><a href="https://www.forbes.com/sites/gordonkelly/2023/06/05/google-gmail-problem-new-security-warning-sender-verification" rel="noopener noreferrer" target="_blank">https://www.forbes.com/sites/gordonkelly/2023/06/05/google-gmail-problem-new-security-warning-sender-verification</a></p><h3><strong>FSB accuses NSA of Hacking iPhones</strong></h3><p><a href="https://505updates.com/katycraig/" rel="noopener noreferrer" target="_blank">🇺🇸 Katy Craig, San Diego, California ↗</a></p><p><a href="https://securelist.com/operation-triangulation/109842/" rel="noopener noreferrer" target="_blank">Operation Triangulation: iOS devices targeted with previously unknown malware | Securelist</a></p><h3><strong>This Day in Tech History&nbsp;</strong></h3><p><a href="https://505updates.com/marcelbrown/" rel="noopener noreferrer" target="_blank"><strong>🇺🇸</strong>&nbsp;Marcel Brown, St. Louis, Missouri ↗</a></p><p><a href="http://thisdayintechhistory.com/06/06" rel="noopener noreferrer" target="_blank">http://thisdayintechhistory.com/06/06</a></p>]]></content:encoded><link><![CDATA[https://3zozb9fxlbueipjyapmaas.captivate.fm/episode/episode-157-end-of-passwords-the-illusion-of-verification-fsb-accuses-nsa-hacking-iphones]]></link><guid isPermaLink="false">db340c84-4823-422b-b316-41d9f6a73f9f</guid><itunes:image href="https://artwork.captivate.fm/61ad4cc7-3b24-4764-8666-53cfa0b3aff0/wBNDH73nU6DKoNOxkSJpNC-m.png"/><dc:creator><![CDATA[Contributors from Around the World]]></dc:creator><pubDate>Tue, 06 Jun 2023 16:45:00 -0400</pubDate><enclosure url="https://dts.podtrac.com/redirect.mp3/podcasts.captivate.fm/media/9902d247-95de-4327-b8a7-da5fbc859657/2023-06-06-505-Episode-157-converted.mp3" length="7958170" type="audio/mpeg"/><itunes:duration>11:03</itunes:duration><itunes:explicit>false</itunes:explicit><itunes:episodeType>full</itunes:episodeType><itunes:season>1</itunes:season><itunes:episode>157</itunes:episode><itunes:season>1</itunes:season><podcast:episode>157</podcast:episode><podcast:season>1</podcast:season><itunes:author>Contributors from Around the World</itunes:author></item><item><title>Episode #156 - AI Regulation by the Australian Government, Positive Development for the Evolving Digital Ecosystem, Alexa and COPPA</title><itunes:title>Episode #156 - AI Regulation by the Australian Government, Positive Development for the Evolving Digital Ecosystem, Alexa and COPPA</itunes:title><description><![CDATA[<p><strong>Hey, it's 5:05 on Monday, June 5th, 2023.</strong> From the Sourced Podcast Network in New York City, this is your host, Pokie Huang. Stories in today's episode come from <strong>Edwin Kwon</strong> in Sydney, Australia, <strong>Julie Chatman</strong> in Washington, DC, <strong>Katy Craig</strong> in San Diego, California, <strong>Marcel Brown</strong> in St. Louis, Missouri. </p><p>Let's get to it.</p><h3>AI Regulation by the Australian Government</h3><p><a href="https://505updates.com/edwinkwan/" rel="noopener noreferrer" target="_blank">🇦🇺 Edwin Kwan, Sydney, Australia ↗</a></p><p><a href="https://www.abc.net.au/news/2023-06-01/ai-government-regulation-risk-classification-plan/102417294" rel="noopener noreferrer" target="_blank">Artificial intelligence technologies could be classified by risk, as government consults on AI regulation - ABC News</a></p><p><a href="https://apo.org.au/node/322938" rel="noopener noreferrer" target="_blank">Safe and responsible AI in Australia</a></p><p><a href="https://www.chiefscientist.gov.au/sites/default/files/2023-05/Rapid%20Response%20Information%20Report%20-%20Generative%20AI.pdf" rel="noopener noreferrer" target="_blank">Rapid Response Information Report: Generative AI</a></p><h3>A Positive Development For the Evolving Digital Ecosystem</h3><p><a href="https://505updates.com/juliechatman/" rel="noopener noreferrer" target="_blank"><strong>🇺🇸</strong> Julie Chatman, Washington, DC ↗</a></p><p><a href="https://www.infosecurity-magazine.com/news/cisa-manufacturers-prioritize/" rel="noopener noreferrer" target="_blank">CISA Asks Manufacturers to Prioritize Cybersecurity in Product Design - Infosecurity Magazine</a></p><p><a href="https://www.cisa.gov/sites/default/files/2023-04/principles_approaches_for_security-by-design-default_508_0.pdf" rel="noopener noreferrer" target="_blank">Shifting the Balance of Cybersecurity Risk: Principles and Approaches for Security-by-Design and -Default</a></p><p><br></p><h3>Alexa and COPPA</h3><p><a href="https://505updates.com/katycraig/" rel="noopener noreferrer" target="_blank">🇺🇸 Katy Craig, San Diego, California ↗</a></p><p><a href="https://www.ftc.gov/news-events/news/press-releases/2023/05/ftc-doj-charge-amazon-violating-childrens-privacy-law-keeping-kids-alexa-voice-recordings-forever?utm_source=govdelivery" rel="noopener noreferrer" target="_blank">FTC and DOJ Charge Amazon with Violating Children’s Privacy Law by Keeping Kids’ Alexa Voice Recordings Forever and Undermining Parents’ Deletion Requests</a></p><p><a href="https://www.nytimes.com/2023/05/31/technology/amazon-25-million-childrens-privacy.html" rel="noopener noreferrer" target="_blank">Amazon to Pay $25 Million to Settle Children’s Privacy Charges - The New York Times</a></p><p><br></p><h3>This Day in Tech History&nbsp;</h3><p><a href="https://505updates.com/marcelbrown/" rel="noopener noreferrer" target="_blank"><strong>🇺🇸</strong> Marcel Brown, St. Louis, Missouri ↗</a></p><p><a href="http://thisdayintechhistory.com/06/04/" rel="noopener noreferrer" target="_blank">http://thisdayintechhistory.com/06/04/</a></p><p><a href="http://thisdayintechhistory.com/06/05/" rel="noopener noreferrer" target="_blank">http://thisdayintechhistory.com/06/05/</a></p>]]></description><content:encoded><![CDATA[<p><strong>Hey, it's 5:05 on Monday, June 5th, 2023.</strong> From the Sourced Podcast Network in New York City, this is your host, Pokie Huang. Stories in today's episode come from <strong>Edwin Kwon</strong> in Sydney, Australia, <strong>Julie Chatman</strong> in Washington, DC, <strong>Katy Craig</strong> in San Diego, California, <strong>Marcel Brown</strong> in St. Louis, Missouri. </p><p>Let's get to it.</p><h3>AI Regulation by the Australian Government</h3><p><a href="https://505updates.com/edwinkwan/" rel="noopener noreferrer" target="_blank">🇦🇺 Edwin Kwan, Sydney, Australia ↗</a></p><p><a href="https://www.abc.net.au/news/2023-06-01/ai-government-regulation-risk-classification-plan/102417294" rel="noopener noreferrer" target="_blank">Artificial intelligence technologies could be classified by risk, as government consults on AI regulation - ABC News</a></p><p><a href="https://apo.org.au/node/322938" rel="noopener noreferrer" target="_blank">Safe and responsible AI in Australia</a></p><p><a href="https://www.chiefscientist.gov.au/sites/default/files/2023-05/Rapid%20Response%20Information%20Report%20-%20Generative%20AI.pdf" rel="noopener noreferrer" target="_blank">Rapid Response Information Report: Generative AI</a></p><h3>A Positive Development For the Evolving Digital Ecosystem</h3><p><a href="https://505updates.com/juliechatman/" rel="noopener noreferrer" target="_blank"><strong>🇺🇸</strong> Julie Chatman, Washington, DC ↗</a></p><p><a href="https://www.infosecurity-magazine.com/news/cisa-manufacturers-prioritize/" rel="noopener noreferrer" target="_blank">CISA Asks Manufacturers to Prioritize Cybersecurity in Product Design - Infosecurity Magazine</a></p><p><a href="https://www.cisa.gov/sites/default/files/2023-04/principles_approaches_for_security-by-design-default_508_0.pdf" rel="noopener noreferrer" target="_blank">Shifting the Balance of Cybersecurity Risk: Principles and Approaches for Security-by-Design and -Default</a></p><p><br></p><h3>Alexa and COPPA</h3><p><a href="https://505updates.com/katycraig/" rel="noopener noreferrer" target="_blank">🇺🇸 Katy Craig, San Diego, California ↗</a></p><p><a href="https://www.ftc.gov/news-events/news/press-releases/2023/05/ftc-doj-charge-amazon-violating-childrens-privacy-law-keeping-kids-alexa-voice-recordings-forever?utm_source=govdelivery" rel="noopener noreferrer" target="_blank">FTC and DOJ Charge Amazon with Violating Children’s Privacy Law by Keeping Kids’ Alexa Voice Recordings Forever and Undermining Parents’ Deletion Requests</a></p><p><a href="https://www.nytimes.com/2023/05/31/technology/amazon-25-million-childrens-privacy.html" rel="noopener noreferrer" target="_blank">Amazon to Pay $25 Million to Settle Children’s Privacy Charges - The New York Times</a></p><p><br></p><h3>This Day in Tech History&nbsp;</h3><p><a href="https://505updates.com/marcelbrown/" rel="noopener noreferrer" target="_blank"><strong>🇺🇸</strong> Marcel Brown, St. Louis, Missouri ↗</a></p><p><a href="http://thisdayintechhistory.com/06/04/" rel="noopener noreferrer" target="_blank">http://thisdayintechhistory.com/06/04/</a></p><p><a href="http://thisdayintechhistory.com/06/05/" rel="noopener noreferrer" target="_blank">http://thisdayintechhistory.com/06/05/</a></p>]]></content:encoded><link><![CDATA[https://3zozb9fxlbueipjyapmaas.captivate.fm/episode/episode-156-ai-regulation-by-the-australian-government-positive-development-for-the-evolving-digital-ecosystem-alexa-and-coppa]]></link><guid isPermaLink="false">6112d13c-41a5-41c6-84bf-2ef67e30e5d5</guid><itunes:image href="https://artwork.captivate.fm/01ab1938-284c-4d61-8cb7-4f9ee2bf63b4/aYOVnj4nqhfGl8BANaKooLlw.png"/><dc:creator><![CDATA[Contributors from Around the World]]></dc:creator><pubDate>Mon, 05 Jun 2023 16:45:00 -0400</pubDate><enclosure url="https://dts.podtrac.com/redirect.mp3/podcasts.captivate.fm/media/8ae89f0f-9c76-4027-9ef2-5a3c287923fa/2023-06-05-505-Episode-156-converted.mp3" length="7170420" type="audio/mpeg"/><itunes:duration>09:58</itunes:duration><itunes:explicit>false</itunes:explicit><itunes:episodeType>full</itunes:episodeType><itunes:season>1</itunes:season><itunes:episode>156</itunes:episode><itunes:season>1</itunes:season><podcast:episode>156</podcast:episode><podcast:season>1</podcast:season><itunes:author>Contributors from Around the World</itunes:author></item><item><title>Episode #155 - Exploitation of MOVEit Transfer Zero Day, iOS Triangulation Cyberattack, BrutePrinting</title><itunes:title>Episode #155 - Exploitation of MOVEit Transfer Zero Day, iOS Triangulation Cyberattack, BrutePrinting</itunes:title><description><![CDATA[<p>Hey. It's 5:05 on Friday, June 2nd, 2023. From the Sourced Podcast Network in New York City, this is your host, Pokie Huang. Stories in today's episode come from Edwin Kwon in Sydney, Australia, Mark Miller in Ann Arbor, Michigan, Katy Craig in San Diego, California, Marcel Brown in St. Louis, Missouri.&nbsp;</p><p>Let's get to it.</p><h3>Active Exploitation of MOVEit Transfer Zero Day</h3><p><a href="https://505updates.com/edwinkwan/" rel="noopener noreferrer" target="_blank">🇦🇺 Edwin Kwan, Sydney, Australia ↗</a></p><p><a href="https://community.progress.com/s/article/MOVEit-Transfer-Critical-Vulnerability-31May2023" rel="noopener noreferrer" target="_blank">MOVEit Transfer Critical Vulnerability (May 2023) - Progress Community</a></p><p><a href="https://www.bleepingcomputer.com/news/security/new-moveit-transfer-zero-day-mass-exploited-in-data-theft-attacks/" rel="noopener noreferrer" target="_blank">New MOVEit Transfer zero-day mass-exploited in data theft attacks</a></p><p><a href="https://www.rapid7.com/blog/post/2023/06/01/rapid7-observed-exploitation-of-critical-moveit-transfer-vulnerability/" rel="noopener noreferrer" target="_blank">Rapid7 Observed Exploitation of Critical MOVEit Transfer Vulnerability</a></p><h3>iOS Triangulation Cyberattack</h3><p><a href="https://505updates.com/markmiller/" rel="noopener noreferrer" target="_blank">🇺🇸 Mark Miller, Ann Arbor, Michigan↗</a></p><p>Eugene Kasperskey on Twitter: <a href="https://twitter.com/e_kaspersky/status/1664263801490014208" rel="noopener noreferrer" target="_blank">https://twitter.com/e_kaspersky/status/1664263801490014208</a></p><p>Operation Triangulation: <a href="https://securelist.com/operation-triangulation/109842/" rel="noopener noreferrer" target="_blank">Operation Triangulation: iOS devices targeted with previously unknown malware | Securelist</a></p><p><br></p><h3>BrutePrinting</h3><p><a href="https://505updates.com/katycraig/" rel="noopener noreferrer" target="_blank">🇺🇸 Katy Craig, San Diego, California ↗</a></p><p><a href="https://arxiv.org/abs/2305.10791" rel="noopener noreferrer" target="_blank">[2305.10791] BrutePrint: Expose Smartphone Fingerprint Authentication to Brute-force Attack</a></p><p><a href="https://thehackernews.com/2023/05/new-bruteprint-attack-lets-attackers.html" rel="noopener noreferrer" target="_blank">New BrutePrint Attack Lets Attackers Unlock Smartphones with Fingerprint Brute-Force</a></p><p><br></p><p><strong>This Day in Tech History&nbsp;</strong></p><p><a href="https://505updates.com/marcelbrown/" rel="noopener noreferrer" target="_blank"><strong>🇺🇸</strong> Marcel Brown, St. Louis, Missouri ↗</a></p><p><a href="http://thisdayintechhistory.com/06/02/" rel="noopener noreferrer" target="_blank">http://thisdayintechhistory.com/06/02/</a></p><p><a href="http://thisdayintechhistory.com/06/03/" rel="noopener noreferrer" target="_blank">http://thisdayintechhistory.com/06/03/</a></p>]]></description><content:encoded><![CDATA[<p>Hey. It's 5:05 on Friday, June 2nd, 2023. From the Sourced Podcast Network in New York City, this is your host, Pokie Huang. Stories in today's episode come from Edwin Kwon in Sydney, Australia, Mark Miller in Ann Arbor, Michigan, Katy Craig in San Diego, California, Marcel Brown in St. Louis, Missouri.&nbsp;</p><p>Let's get to it.</p><h3>Active Exploitation of MOVEit Transfer Zero Day</h3><p><a href="https://505updates.com/edwinkwan/" rel="noopener noreferrer" target="_blank">🇦🇺 Edwin Kwan, Sydney, Australia ↗</a></p><p><a href="https://community.progress.com/s/article/MOVEit-Transfer-Critical-Vulnerability-31May2023" rel="noopener noreferrer" target="_blank">MOVEit Transfer Critical Vulnerability (May 2023) - Progress Community</a></p><p><a href="https://www.bleepingcomputer.com/news/security/new-moveit-transfer-zero-day-mass-exploited-in-data-theft-attacks/" rel="noopener noreferrer" target="_blank">New MOVEit Transfer zero-day mass-exploited in data theft attacks</a></p><p><a href="https://www.rapid7.com/blog/post/2023/06/01/rapid7-observed-exploitation-of-critical-moveit-transfer-vulnerability/" rel="noopener noreferrer" target="_blank">Rapid7 Observed Exploitation of Critical MOVEit Transfer Vulnerability</a></p><h3>iOS Triangulation Cyberattack</h3><p><a href="https://505updates.com/markmiller/" rel="noopener noreferrer" target="_blank">🇺🇸 Mark Miller, Ann Arbor, Michigan↗</a></p><p>Eugene Kasperskey on Twitter: <a href="https://twitter.com/e_kaspersky/status/1664263801490014208" rel="noopener noreferrer" target="_blank">https://twitter.com/e_kaspersky/status/1664263801490014208</a></p><p>Operation Triangulation: <a href="https://securelist.com/operation-triangulation/109842/" rel="noopener noreferrer" target="_blank">Operation Triangulation: iOS devices targeted with previously unknown malware | Securelist</a></p><p><br></p><h3>BrutePrinting</h3><p><a href="https://505updates.com/katycraig/" rel="noopener noreferrer" target="_blank">🇺🇸 Katy Craig, San Diego, California ↗</a></p><p><a href="https://arxiv.org/abs/2305.10791" rel="noopener noreferrer" target="_blank">[2305.10791] BrutePrint: Expose Smartphone Fingerprint Authentication to Brute-force Attack</a></p><p><a href="https://thehackernews.com/2023/05/new-bruteprint-attack-lets-attackers.html" rel="noopener noreferrer" target="_blank">New BrutePrint Attack Lets Attackers Unlock Smartphones with Fingerprint Brute-Force</a></p><p><br></p><p><strong>This Day in Tech History&nbsp;</strong></p><p><a href="https://505updates.com/marcelbrown/" rel="noopener noreferrer" target="_blank"><strong>🇺🇸</strong> Marcel Brown, St. Louis, Missouri ↗</a></p><p><a href="http://thisdayintechhistory.com/06/02/" rel="noopener noreferrer" target="_blank">http://thisdayintechhistory.com/06/02/</a></p><p><a href="http://thisdayintechhistory.com/06/03/" rel="noopener noreferrer" target="_blank">http://thisdayintechhistory.com/06/03/</a></p>]]></content:encoded><link><![CDATA[https://3zozb9fxlbueipjyapmaas.captivate.fm/episode/episode-155-exploitation-of-moveit-transfer-zero-day-ios-triangulation-cyberattack-bruteprinting]]></link><guid isPermaLink="false">f20a8b8a-b75e-44a5-aca5-15a0b7d3e2bd</guid><itunes:image href="https://artwork.captivate.fm/a737a776-eb71-437b-897c-6d674f813120/DCwNpVJHwCN8bT4dsbEwLmrr.png"/><dc:creator><![CDATA[Contributors from Around the World]]></dc:creator><pubDate>Fri, 02 Jun 2023 16:45:00 -0400</pubDate><enclosure url="https://dts.podtrac.com/redirect.mp3/podcasts.captivate.fm/media/3bf62a12-04eb-40f4-a833-3ff4791bdd6d/2023-06-02-505-Episode-155-converted.mp3" length="6074210" type="audio/mpeg"/><itunes:duration>08:26</itunes:duration><itunes:explicit>false</itunes:explicit><itunes:episodeType>full</itunes:episodeType><itunes:season>1</itunes:season><itunes:episode>155</itunes:episode><itunes:season>1</itunes:season><podcast:episode>155</podcast:episode><podcast:season>1</podcast:season><itunes:author>Contributors from Around the World</itunes:author></item><item><title>Episode #154 - Ring and Alexa Privacy Violation Charges, Battle Under the Waves, Toyota Customer Data Exposed, Tessa Offline</title><itunes:title>Episode #154 - Ring and Alexa Privacy Violation Charges, Battle Under the Waves, Toyota Customer Data Exposed, Tessa Offline</itunes:title><description><![CDATA[<p><strong>Hey, it's 5:05 on Thursday, June 1st, 2023.</strong> From the Sourced Podcast Network in New York City, this is your host, Pokie Huang. Stories in today's episode come from <strong>Edwin Kwon</strong> in Sydney, Australia, <strong>Katy Craig</strong> in San Diego, California, <strong>Ian Garrett</strong> in Arlington, Virginia, <strong>Kadi Grigg</strong> in Alexandria, Virginia, <strong>Marcel Brown</strong> in St. Louis, Missouri.&nbsp;</p><p>Let's get to it.</p><h3>Amazon Faces Ring and Alexa Privacy Violation Charges</h3><p><a href="https://505updates.com/edwinkwan/" rel="noopener noreferrer" target="_blank">🇦🇺 Edwin Kwan, Sydney, Australia ↗</a></p><p><a href="https://www.bleepingcomputer.com/news/technology/amazon-faces-30-million-fine-over-ring-alexa-privacy-violations/" rel="noopener noreferrer" target="_blank">Amazon faces $30 million fine over Ring, Alexa privacy violations</a></p><h3>Battle Under The Waves: Undersea Cables</h3><p><a href="https://505updates.com/katycraig/" rel="noopener noreferrer" target="_blank">🇺🇸 Katy Craig, San Diego, California ↗</a></p><p><a href="https://www.reuters.com/world/china/china-plans-500-mln-subsea-internet-cable-rival-us-backed-project-2023-04-06/" rel="noopener noreferrer" target="_blank">Exclusive: China plans $500 million subsea internet cable to rival US-backed project | Reuters</a></p><p><a href="https://www.reuters.com/investigates/special-report/us-china-tech-cables/" rel="noopener noreferrer" target="_blank">U.S. and China wage war beneath the waves - over internet cables</a></p><p><br></p><h3>Cloud Service Misconfigurations Expose Toyota Customer Data</h3><p><a href="https://505updates.com/iangarrett/" rel="noopener noreferrer" target="_blank"><strong>🇺🇸 </strong>Ian Garrett, Arlington, Virginia ↗</a></p><p><a href="https://www.bleepingcomputer.com/news/security/toyota-finds-more-misconfigured-servers-leaking-customer-info/" rel="noopener noreferrer" target="_blank">Toyota finds more misconfigured servers leaking customer info</a></p><p><br></p><h3>Tessa Now Offline</h3><p><a href="https://505updates.com/kadigrigg/" rel="noopener noreferrer" target="_blank">🇺🇸 Kadi Grigg,Alexandria, Virginia </a>↗</p><p><a href="https://www.theguardian.com/technology/2023/may/31/eating-disorder-hotline-union-ai-chatbot-harm" rel="noopener noreferrer" target="_blank">US eating disorder helpline takes down AI chatbot over harmful advice | Artificial intelligence (AI) | The Guardian</a></p><p><a href="https://www.instagram.com/p/Cs1jp1pPkOs/" rel="noopener noreferrer" target="_blank">Sharon Maxwell on Instagram: “It is beyond time for NEDA to step aside. If I had accessed this chatbot when I was in the throes of my eating disorder, I would NOT have…”</a></p><p><br></p><h3>This Day in Tech History&nbsp;</h3><p><a href="https://505updates.com/marcelbrown/" rel="noopener noreferrer" target="_blank"><strong>🇺🇸</strong> Marcel Brown, St. Louis, Missouri ↗</a></p><p><a href="http://thisdayintechhistory.com/06/01" rel="noopener noreferrer" target="_blank">http://thisdayintechhistory.com/06/01</a></p><p><br></p>]]></description><content:encoded><![CDATA[<p><strong>Hey, it's 5:05 on Thursday, June 1st, 2023.</strong> From the Sourced Podcast Network in New York City, this is your host, Pokie Huang. Stories in today's episode come from <strong>Edwin Kwon</strong> in Sydney, Australia, <strong>Katy Craig</strong> in San Diego, California, <strong>Ian Garrett</strong> in Arlington, Virginia, <strong>Kadi Grigg</strong> in Alexandria, Virginia, <strong>Marcel Brown</strong> in St. Louis, Missouri.&nbsp;</p><p>Let's get to it.</p><h3>Amazon Faces Ring and Alexa Privacy Violation Charges</h3><p><a href="https://505updates.com/edwinkwan/" rel="noopener noreferrer" target="_blank">🇦🇺 Edwin Kwan, Sydney, Australia ↗</a></p><p><a href="https://www.bleepingcomputer.com/news/technology/amazon-faces-30-million-fine-over-ring-alexa-privacy-violations/" rel="noopener noreferrer" target="_blank">Amazon faces $30 million fine over Ring, Alexa privacy violations</a></p><h3>Battle Under The Waves: Undersea Cables</h3><p><a href="https://505updates.com/katycraig/" rel="noopener noreferrer" target="_blank">🇺🇸 Katy Craig, San Diego, California ↗</a></p><p><a href="https://www.reuters.com/world/china/china-plans-500-mln-subsea-internet-cable-rival-us-backed-project-2023-04-06/" rel="noopener noreferrer" target="_blank">Exclusive: China plans $500 million subsea internet cable to rival US-backed project | Reuters</a></p><p><a href="https://www.reuters.com/investigates/special-report/us-china-tech-cables/" rel="noopener noreferrer" target="_blank">U.S. and China wage war beneath the waves - over internet cables</a></p><p><br></p><h3>Cloud Service Misconfigurations Expose Toyota Customer Data</h3><p><a href="https://505updates.com/iangarrett/" rel="noopener noreferrer" target="_blank"><strong>🇺🇸 </strong>Ian Garrett, Arlington, Virginia ↗</a></p><p><a href="https://www.bleepingcomputer.com/news/security/toyota-finds-more-misconfigured-servers-leaking-customer-info/" rel="noopener noreferrer" target="_blank">Toyota finds more misconfigured servers leaking customer info</a></p><p><br></p><h3>Tessa Now Offline</h3><p><a href="https://505updates.com/kadigrigg/" rel="noopener noreferrer" target="_blank">🇺🇸 Kadi Grigg,Alexandria, Virginia </a>↗</p><p><a href="https://www.theguardian.com/technology/2023/may/31/eating-disorder-hotline-union-ai-chatbot-harm" rel="noopener noreferrer" target="_blank">US eating disorder helpline takes down AI chatbot over harmful advice | Artificial intelligence (AI) | The Guardian</a></p><p><a href="https://www.instagram.com/p/Cs1jp1pPkOs/" rel="noopener noreferrer" target="_blank">Sharon Maxwell on Instagram: “It is beyond time for NEDA to step aside. If I had accessed this chatbot when I was in the throes of my eating disorder, I would NOT have…”</a></p><p><br></p><h3>This Day in Tech History&nbsp;</h3><p><a href="https://505updates.com/marcelbrown/" rel="noopener noreferrer" target="_blank"><strong>🇺🇸</strong> Marcel Brown, St. Louis, Missouri ↗</a></p><p><a href="http://thisdayintechhistory.com/06/01" rel="noopener noreferrer" target="_blank">http://thisdayintechhistory.com/06/01</a></p><p><br></p>]]></content:encoded><link><![CDATA[https://3zozb9fxlbueipjyapmaas.captivate.fm/episode/episode-154-ring-and-alexa-privacy-violation-charges-battle-under-the-waves-toyota-customer-data-exposed-tessa-offline]]></link><guid isPermaLink="false">7037b71a-02cb-47bd-8b6c-dcf7827e4c03</guid><itunes:image href="https://artwork.captivate.fm/dd48caac-abca-4d14-a45b-671f9b0dbde9/9l9cj1NcpgKZYwlA5tebG4Ag.png"/><dc:creator><![CDATA[Contributors from Around the World]]></dc:creator><pubDate>Thu, 01 Jun 2023 16:45:00 -0400</pubDate><enclosure url="https://dts.podtrac.com/redirect.mp3/podcasts.captivate.fm/media/98de251e-e9e2-4d2c-a789-3e7ab1a732eb/2023-06-01-505-Episode-154-converted.mp3" length="9200372" type="audio/mpeg"/><itunes:duration>12:47</itunes:duration><itunes:explicit>false</itunes:explicit><itunes:episodeType>full</itunes:episodeType><itunes:season>1</itunes:season><itunes:episode>154</itunes:episode><itunes:season>1</itunes:season><podcast:episode>154</podcast:episode><podcast:season>1</podcast:season><itunes:author>Contributors from Around the World</itunes:author></item><item><title>Episode #153 - 22 Words to Scare the Crap out of You, Malicious Android Spyware, DOD Cyber Strategy, Today in Tech History</title><itunes:title>Episode #153 - 22 Words to Scare the Crap out of You, Malicious Android Spyware, DOD Cyber Strategy, Today in Tech History</itunes:title><description><![CDATA[<p>From Sourced Network Productions in New York City,<strong> “It's 5:05” on Wednesday, May 31st, 2023. </strong>This is your host, Mark Miller, sitting in for Pokie Huang.</p><p>Stories in today's episode come from <strong>Edwin Kwan</strong> in Sydney, Australia, <strong>Katy Craig</strong> in San Diego, California, <strong>Marcel Brown</strong> in St. Louis, Missouri and <strong>me</strong>, this week calling in from Ann Arbor Michigan.</p><p>Get the transcript and links to all resources in this episode at 505updates.com.</p><h3><strong>22 Words that should Scare the Crap out of you</strong></h3><p><a href="https://505updates.com/markmiller/" rel="noopener noreferrer" target="_blank">🇺🇸 Mark Miller, Ann Arbor, Michigan ↗</a></p><p>Statement on AI Risk: <a href="https://www.safe.ai/statement-on-ai-risk" rel="noopener noreferrer" target="_blank">https://www.safe.ai/statement-on-ai-risk</a></p><h3><strong>Malicious Android Spyware Downloaded 421 Million Times</strong></h3><p><a href="https://505updates.com/edwinkwan/" rel="noopener noreferrer" target="_blank">🇦🇺 Edwin Kwan, Sydney, Australia ↗</a></p><p>https://www.bleepingcomputer.com/news/security/android-apps-with-spyware-installed-421-million-times-from-google-play/</p><p><a href="https://news.drweb.com/show/?i=14705&amp;lng=en" rel="noopener noreferrer" target="_blank">https://news.drweb.com/show/?i=14705&amp;lng=en</a></p><p><br></p><h3><strong>DOD Cyber Strategy</strong></h3><p><a href="https://505updates.com/katycraig/" rel="noopener noreferrer" target="_blank">🇺🇸 Katy Craig, San Diego, California ↗</a></p><p><a href="https://www.defense.gov/News/Releases/Release/Article/3408707/dod-transmits-2023-cyber-strategy/" rel="noopener noreferrer" target="_blank">https://www.defense.gov/News/Releases/Release/Article/3408707/dod-transmits-2023-cyber-strategy/</a>&nbsp;</p><p><a href="https://media.defense.gov/2023/May/26/2003231006/-1/-1/1/2023-DOD-CYBER-STRATEGY-FACT-SHEET.PDF" rel="noopener noreferrer" target="_blank">https://media.defense.gov/2023/May/26/2003231006/-1/-1/1/2023-DOD-CYBER-STRATEGY-FACT-SHEET.PDF</a></p><p><br></p><h3><strong>This Day, May 31, in Tech History&nbsp;</strong></h3><p><a href="https://505updates.com/marcelbrown/" rel="noopener noreferrer" target="_blank"><strong>🇺🇸</strong> Marcel Brown, St. Louis, Missouri ↗</a></p><p><a href="http://thisdayintechhistory.com/05/30" rel="noopener noreferrer" target="_blank">http://thisdayintechhistory.com/05/30</a></p>]]></description><content:encoded><![CDATA[<p>From Sourced Network Productions in New York City,<strong> “It's 5:05” on Wednesday, May 31st, 2023. </strong>This is your host, Mark Miller, sitting in for Pokie Huang.</p><p>Stories in today's episode come from <strong>Edwin Kwan</strong> in Sydney, Australia, <strong>Katy Craig</strong> in San Diego, California, <strong>Marcel Brown</strong> in St. Louis, Missouri and <strong>me</strong>, this week calling in from Ann Arbor Michigan.</p><p>Get the transcript and links to all resources in this episode at 505updates.com.</p><h3><strong>22 Words that should Scare the Crap out of you</strong></h3><p><a href="https://505updates.com/markmiller/" rel="noopener noreferrer" target="_blank">🇺🇸 Mark Miller, Ann Arbor, Michigan ↗</a></p><p>Statement on AI Risk: <a href="https://www.safe.ai/statement-on-ai-risk" rel="noopener noreferrer" target="_blank">https://www.safe.ai/statement-on-ai-risk</a></p><h3><strong>Malicious Android Spyware Downloaded 421 Million Times</strong></h3><p><a href="https://505updates.com/edwinkwan/" rel="noopener noreferrer" target="_blank">🇦🇺 Edwin Kwan, Sydney, Australia ↗</a></p><p>https://www.bleepingcomputer.com/news/security/android-apps-with-spyware-installed-421-million-times-from-google-play/</p><p><a href="https://news.drweb.com/show/?i=14705&amp;lng=en" rel="noopener noreferrer" target="_blank">https://news.drweb.com/show/?i=14705&amp;lng=en</a></p><p><br></p><h3><strong>DOD Cyber Strategy</strong></h3><p><a href="https://505updates.com/katycraig/" rel="noopener noreferrer" target="_blank">🇺🇸 Katy Craig, San Diego, California ↗</a></p><p><a href="https://www.defense.gov/News/Releases/Release/Article/3408707/dod-transmits-2023-cyber-strategy/" rel="noopener noreferrer" target="_blank">https://www.defense.gov/News/Releases/Release/Article/3408707/dod-transmits-2023-cyber-strategy/</a>&nbsp;</p><p><a href="https://media.defense.gov/2023/May/26/2003231006/-1/-1/1/2023-DOD-CYBER-STRATEGY-FACT-SHEET.PDF" rel="noopener noreferrer" target="_blank">https://media.defense.gov/2023/May/26/2003231006/-1/-1/1/2023-DOD-CYBER-STRATEGY-FACT-SHEET.PDF</a></p><p><br></p><h3><strong>This Day, May 31, in Tech History&nbsp;</strong></h3><p><a href="https://505updates.com/marcelbrown/" rel="noopener noreferrer" target="_blank"><strong>🇺🇸</strong> Marcel Brown, St. Louis, Missouri ↗</a></p><p><a href="http://thisdayintechhistory.com/05/30" rel="noopener noreferrer" target="_blank">http://thisdayintechhistory.com/05/30</a></p>]]></content:encoded><link><![CDATA[https://3zozb9fxlbueipjyapmaas.captivate.fm/episode/episode-153-22-words-to-scare-the-crap-out-of-you-malicious-android-spyware-dod-cyber-strategy-today-in-tech-history]]></link><guid isPermaLink="false">072ea47d-853f-4261-9c12-bdd5ea63232d</guid><itunes:image href="https://artwork.captivate.fm/33e2a4e7-a936-4ef5-905a-3a72363cfbe4/BkhMbfQsRHQi9QFk9GvnUJSv.png"/><dc:creator><![CDATA[Contributors from Around the World]]></dc:creator><pubDate>Wed, 31 May 2023 16:45:00 -0400</pubDate><enclosure url="https://dts.podtrac.com/redirect.mp3/podcasts.captivate.fm/media/8e50c925-ca79-441b-b6e0-1215233a743a/2023-05-31-505-Episode-153-converted.mp3" length="8382341" type="audio/mpeg"/><itunes:duration>08:44</itunes:duration><itunes:explicit>false</itunes:explicit><itunes:episodeType>full</itunes:episodeType><itunes:season>1</itunes:season><itunes:episode>153</itunes:episode><itunes:season>1</itunes:season><podcast:episode>153</podcast:episode><podcast:season>1</podcast:season><itunes:author>Contributors from Around the World</itunes:author></item><item><title>Episode #152 - Latitude Financial Data Breach, Android Legit App Stealing Data, Tessa to Replace Human at NEDA</title><itunes:title>Episode #152 - Latitude Financial Data Breach, Android Legit App Stealing Data, Tessa to Replace Human at NEDA</itunes:title><description><![CDATA[<p><strong>Hey, it's 5:05 on Tuesday, May 30th. 2023. </strong>From the Sourced Podcast Network in New York City, this is your host, Pokie Huang. Stories in today's episode come from <strong>Edwin Kwon</strong> in Sydney, Australia, <strong>Kadi Grigg</strong> in Alexandria, Virginia, <strong>Katy Craig</strong> in San Diego, California, <strong>Marcel Brown</strong> in St. Louis, Missouri.</p><p>Let’s get to it!</p><h3>Latitude Financial Forecast $100 million Loss from Data Breach</h3><p><a href="https://505updates.com/edwinkwan/" rel="noopener noreferrer" target="_blank">🇦🇺 Edwin Kwan, Sydney, Australia ↗</a></p><p><a href="https://www.itnews.com.au/news/latitude-financial-counts-the-cost-of-cyber-attack-596270" rel="noopener noreferrer" target="_blank">Latitude Financial counts the cost of cyber attack - Finance - Security - iTnews</a></p><p><a href="https://announcements.asx.com.au/asxpdf/20230526/pdf/05q23pr11qt3z2.pdf" rel="noopener noreferrer" target="_blank">https://announcements.asx.com.au/asxpdf/20230526/pdf/05q23pr11qt3z2.pdf</a></p><h3>Legit app starts stealing data</h3><p><a href="https://505updates.com/katycraig/" rel="noopener noreferrer" target="_blank">🇺🇸 Katy Craig, San Diego, California ↗</a></p><p><a href="https://www.msn.com/en-us/money/other/an-android-app-started-secretly-recording-users-almost-a-year-after-it-was-listed-on-google-play/ar-AA1bEnwG?ocid=msedgntp&amp;cvid=36f4a019146c4cecb0042428271a6079&amp;ei=16" rel="noopener noreferrer" target="_blank">https://www.msn.com/en-us/money/other/an-android-app-started-secretly-recording-users-almost-a-year-after-it-was-listed-on-google-play/ar-AA1bEnwG?ocid=msedgntp&amp;cvid=36f4a019146c4cecb0042428271a6079&amp;ei=16</a></p><p><a href="https://arstechnica.com/information-technology/2023/05/app-with-50000-google-play-installs-sent-attackers-mic-recordings-every-15-minutes/" rel="noopener noreferrer" target="_blank">Legit app in Google Play turns malicious and sends mic recordings every 15 minutes | Ars Technica</a></p><p><br></p><h3>Tessa to Replace Human Staff at NEDA</h3><p><a href="https://505updates.com/kadigrigg/" rel="noopener noreferrer" target="_blank">🇺🇸 Kadi Grigg,Alexandria, Virginia </a>↗</p><p><a href="https://www.wired.com/story/mental-health-chatbots/" rel="noopener noreferrer" target="_blank">The Problem With Mental Health Bots | WIRED</a></p><p><a href="https://www.npr.org/sections/health-shots/2023/01/19/1147081115/therapy-by-chatbot-the-promise-and-challenges-in-using-ai-for-mental-health" rel="noopener noreferrer" target="_blank">Therapy by chatbot? The promise and challenges in using AI for mental health</a>&nbsp;</p><p><a href="https://www.statnews.com/2023/01/23/mental-health-chatbot-chatgpt/" rel="noopener noreferrer" target="_blank">Chatbots are creating thorny ethical questions about transparency in mental health care</a></p><p><a href="https://www.goodtherapy.org/for-professionals/personal-development/become-a-therapist/is-there-shortage-of-mental-health-professionals-in-america" rel="noopener noreferrer" target="_blank">Is There a Shortage of Mental Health Professionals in America?</a></p><p><br></p><h3>This Day in Tech History&nbsp;</h3><p><a href="https://505updates.com/marcelbrown/" rel="noopener noreferrer" target="_blank"><strong>🇺🇸</strong> Marcel Brown, St. Louis, Missouri ↗</a></p><p><a href="http://thisdayintechhistory.com/05/30" rel="noopener noreferrer" target="_blank">http://thisdayintechhistory.com/05/30</a></p><p><br></p>]]></description><content:encoded><![CDATA[<p><strong>Hey, it's 5:05 on Tuesday, May 30th. 2023. </strong>From the Sourced Podcast Network in New York City, this is your host, Pokie Huang. Stories in today's episode come from <strong>Edwin Kwon</strong> in Sydney, Australia, <strong>Kadi Grigg</strong> in Alexandria, Virginia, <strong>Katy Craig</strong> in San Diego, California, <strong>Marcel Brown</strong> in St. Louis, Missouri.</p><p>Let’s get to it!</p><h3>Latitude Financial Forecast $100 million Loss from Data Breach</h3><p><a href="https://505updates.com/edwinkwan/" rel="noopener noreferrer" target="_blank">🇦🇺 Edwin Kwan, Sydney, Australia ↗</a></p><p><a href="https://www.itnews.com.au/news/latitude-financial-counts-the-cost-of-cyber-attack-596270" rel="noopener noreferrer" target="_blank">Latitude Financial counts the cost of cyber attack - Finance - Security - iTnews</a></p><p><a href="https://announcements.asx.com.au/asxpdf/20230526/pdf/05q23pr11qt3z2.pdf" rel="noopener noreferrer" target="_blank">https://announcements.asx.com.au/asxpdf/20230526/pdf/05q23pr11qt3z2.pdf</a></p><h3>Legit app starts stealing data</h3><p><a href="https://505updates.com/katycraig/" rel="noopener noreferrer" target="_blank">🇺🇸 Katy Craig, San Diego, California ↗</a></p><p><a href="https://www.msn.com/en-us/money/other/an-android-app-started-secretly-recording-users-almost-a-year-after-it-was-listed-on-google-play/ar-AA1bEnwG?ocid=msedgntp&amp;cvid=36f4a019146c4cecb0042428271a6079&amp;ei=16" rel="noopener noreferrer" target="_blank">https://www.msn.com/en-us/money/other/an-android-app-started-secretly-recording-users-almost-a-year-after-it-was-listed-on-google-play/ar-AA1bEnwG?ocid=msedgntp&amp;cvid=36f4a019146c4cecb0042428271a6079&amp;ei=16</a></p><p><a href="https://arstechnica.com/information-technology/2023/05/app-with-50000-google-play-installs-sent-attackers-mic-recordings-every-15-minutes/" rel="noopener noreferrer" target="_blank">Legit app in Google Play turns malicious and sends mic recordings every 15 minutes | Ars Technica</a></p><p><br></p><h3>Tessa to Replace Human Staff at NEDA</h3><p><a href="https://505updates.com/kadigrigg/" rel="noopener noreferrer" target="_blank">🇺🇸 Kadi Grigg,Alexandria, Virginia </a>↗</p><p><a href="https://www.wired.com/story/mental-health-chatbots/" rel="noopener noreferrer" target="_blank">The Problem With Mental Health Bots | WIRED</a></p><p><a href="https://www.npr.org/sections/health-shots/2023/01/19/1147081115/therapy-by-chatbot-the-promise-and-challenges-in-using-ai-for-mental-health" rel="noopener noreferrer" target="_blank">Therapy by chatbot? The promise and challenges in using AI for mental health</a>&nbsp;</p><p><a href="https://www.statnews.com/2023/01/23/mental-health-chatbot-chatgpt/" rel="noopener noreferrer" target="_blank">Chatbots are creating thorny ethical questions about transparency in mental health care</a></p><p><a href="https://www.goodtherapy.org/for-professionals/personal-development/become-a-therapist/is-there-shortage-of-mental-health-professionals-in-america" rel="noopener noreferrer" target="_blank">Is There a Shortage of Mental Health Professionals in America?</a></p><p><br></p><h3>This Day in Tech History&nbsp;</h3><p><a href="https://505updates.com/marcelbrown/" rel="noopener noreferrer" target="_blank"><strong>🇺🇸</strong> Marcel Brown, St. Louis, Missouri ↗</a></p><p><a href="http://thisdayintechhistory.com/05/30" rel="noopener noreferrer" target="_blank">http://thisdayintechhistory.com/05/30</a></p><p><br></p>]]></content:encoded><link><![CDATA[https://3zozb9fxlbueipjyapmaas.captivate.fm/episode/episode-152-latitude-financial-data-breach-android-legit-app-stealing-data-tessa-to-replace-human-at-neda]]></link><guid isPermaLink="false">9aa2271b-4ba3-46c8-ab37-7c6ec67b8a13</guid><itunes:image href="https://artwork.captivate.fm/59f099bd-1170-45fa-9a63-adb1dce2e722/SkvKpGKoStpImP1qaLU1xte2.png"/><dc:creator><![CDATA[Contributors from Around the World]]></dc:creator><pubDate>Tue, 30 May 2023 16:45:00 -0400</pubDate><enclosure url="https://dts.podtrac.com/redirect.mp3/podcasts.captivate.fm/media/a3790361-a58a-44dc-bf72-05f6ff856bd5/2023-05-30-505-Episode-152-converted.mp3" length="6430934" type="audio/mpeg"/><itunes:duration>08:56</itunes:duration><itunes:explicit>false</itunes:explicit><itunes:episodeType>full</itunes:episodeType><itunes:season>1</itunes:season><itunes:episode>152</itunes:episode><itunes:season>1</itunes:season><podcast:episode>152</podcast:episode><podcast:season>1</podcast:season><itunes:author>Contributors from Around the World</itunes:author></item><item><title>Episode #151 - PyPI 2FA, CSO&apos;s Blues, Volt Typhoon</title><itunes:title>Episode #151 - PyPI 2FA, CSO&apos;s Blues, Volt Typhoon</itunes:title><description><![CDATA[<p><strong>Hey, it's 5:05 Monday, May 29th. 2023.</strong> From the Sourced Podcast Network in New York City, this is your host, Pokie Huang. Stories in today's episode come from <strong>Edwin Kwon</strong> in Sydney, Australia, <strong>Trac Bannon</strong> in Camp Hill, Pennsylvania, <strong>Katy Craig</strong> in San Diego, California, <strong>Marcel Brown</strong> in St. Louis, Missouri.&nbsp;</p><p>Let's get to it.</p><h3>Mandatory 2FA Coming to PyPI</h3><p><a href="https://505updates.com/edwinkwan/" rel="noopener noreferrer" target="_blank">🇦🇺 Edwin Kwan, Sydney, Australia ↗</a></p><p><a href="https://blog.pypi.org/posts/2023-05-25-securing-pypi-with-2fa/" rel="noopener noreferrer" target="_blank">Securing PyPI accounts via Two-Factor Authentication - The Python Package Index</a></p><h3>CSO’s Blues</h3><p><a href="https://505updates.com/tracbannon/" rel="noopener noreferrer" target="_blank"><strong>🇺🇸</strong> Tracy (Trac) Bannon, Camp Hill, Pennsylvania↗</a></p><p><a href="https://www.csoonline.com/article/3697136/former-uber-cso-joe-sullivan-and-lessons-learned-from-the-infamous-2016-uber-breach.html" rel="noopener noreferrer" target="_blank">Former Uber CSO Joe Sullivan and lessons learned from the infamous 2016 Uber breach | CSO Online</a></p><p><a href="https://www.darkreading.com/vulnerabilities-threats/us-it-pros-data-breaches-keep-quiet-data-breaches" rel="noopener noreferrer" target="_blank">Majority of US IT Pros Told to Keep Quiet About Data Breaches</a></p><p><a href="https://www.csoonline.com/article/3676148/guilty-verdict-in-the-uber-breach-case-makes-personal-liability-real-for-cisos.html" rel="noopener noreferrer" target="_blank">Guilty verdict in the Uber breach case makes personal liability real for CISOs | CSO Online</a></p><p><br></p><h3>Volt Typhoon in US Critical Infrastructure</h3><p><a href="https://505updates.com/katycraig/" rel="noopener noreferrer" target="_blank">🇺🇸 Katy Craig, San Diego, California ↗</a></p><p><a href="https://www.microsoft.com/en-us/security/blog/2023/05/24/volt-typhoon-targets-us-critical-infrastructure-with-living-off-the-land-techniques/" rel="noopener noreferrer" target="_blank">Volt Typhoon targets US critical infrastructure with living-off-the-land techniques | Microsoft Security Blog</a></p><p><br></p><h3>This Day in Tech History&nbsp;</h3><p><a href="https://505updates.com/marcelbrown/" rel="noopener noreferrer" target="_blank"><strong>🇺🇸</strong> Marcel Brown, St. Louis, Missouri ↗</a></p><p><a href="http://thisdayintechhistory.com/05/27" rel="noopener noreferrer" target="_blank">http://thisdayintechhistory.com/05/27</a></p><p><a href="http://thisdayintechhistory.com/05/28" rel="noopener noreferrer" target="_blank">http://thisdayintechhistory.com/05/28</a></p><p><a href="http://thisdayintechhistory.com/05/29" rel="noopener noreferrer" target="_blank">http://thisdayintechhistory.com/05/29</a></p><p><br></p>]]></description><content:encoded><![CDATA[<p><strong>Hey, it's 5:05 Monday, May 29th. 2023.</strong> From the Sourced Podcast Network in New York City, this is your host, Pokie Huang. Stories in today's episode come from <strong>Edwin Kwon</strong> in Sydney, Australia, <strong>Trac Bannon</strong> in Camp Hill, Pennsylvania, <strong>Katy Craig</strong> in San Diego, California, <strong>Marcel Brown</strong> in St. Louis, Missouri.&nbsp;</p><p>Let's get to it.</p><h3>Mandatory 2FA Coming to PyPI</h3><p><a href="https://505updates.com/edwinkwan/" rel="noopener noreferrer" target="_blank">🇦🇺 Edwin Kwan, Sydney, Australia ↗</a></p><p><a href="https://blog.pypi.org/posts/2023-05-25-securing-pypi-with-2fa/" rel="noopener noreferrer" target="_blank">Securing PyPI accounts via Two-Factor Authentication - The Python Package Index</a></p><h3>CSO’s Blues</h3><p><a href="https://505updates.com/tracbannon/" rel="noopener noreferrer" target="_blank"><strong>🇺🇸</strong> Tracy (Trac) Bannon, Camp Hill, Pennsylvania↗</a></p><p><a href="https://www.csoonline.com/article/3697136/former-uber-cso-joe-sullivan-and-lessons-learned-from-the-infamous-2016-uber-breach.html" rel="noopener noreferrer" target="_blank">Former Uber CSO Joe Sullivan and lessons learned from the infamous 2016 Uber breach | CSO Online</a></p><p><a href="https://www.darkreading.com/vulnerabilities-threats/us-it-pros-data-breaches-keep-quiet-data-breaches" rel="noopener noreferrer" target="_blank">Majority of US IT Pros Told to Keep Quiet About Data Breaches</a></p><p><a href="https://www.csoonline.com/article/3676148/guilty-verdict-in-the-uber-breach-case-makes-personal-liability-real-for-cisos.html" rel="noopener noreferrer" target="_blank">Guilty verdict in the Uber breach case makes personal liability real for CISOs | CSO Online</a></p><p><br></p><h3>Volt Typhoon in US Critical Infrastructure</h3><p><a href="https://505updates.com/katycraig/" rel="noopener noreferrer" target="_blank">🇺🇸 Katy Craig, San Diego, California ↗</a></p><p><a href="https://www.microsoft.com/en-us/security/blog/2023/05/24/volt-typhoon-targets-us-critical-infrastructure-with-living-off-the-land-techniques/" rel="noopener noreferrer" target="_blank">Volt Typhoon targets US critical infrastructure with living-off-the-land techniques | Microsoft Security Blog</a></p><p><br></p><h3>This Day in Tech History&nbsp;</h3><p><a href="https://505updates.com/marcelbrown/" rel="noopener noreferrer" target="_blank"><strong>🇺🇸</strong> Marcel Brown, St. Louis, Missouri ↗</a></p><p><a href="http://thisdayintechhistory.com/05/27" rel="noopener noreferrer" target="_blank">http://thisdayintechhistory.com/05/27</a></p><p><a href="http://thisdayintechhistory.com/05/28" rel="noopener noreferrer" target="_blank">http://thisdayintechhistory.com/05/28</a></p><p><a href="http://thisdayintechhistory.com/05/29" rel="noopener noreferrer" target="_blank">http://thisdayintechhistory.com/05/29</a></p><p><br></p>]]></content:encoded><link><![CDATA[https://3zozb9fxlbueipjyapmaas.captivate.fm/episode/episode-151-pypi-2fa-csos-blues-volt-typhoon]]></link><guid isPermaLink="false">670ef62f-0f34-4b31-ba68-f49708f3b241</guid><itunes:image href="https://artwork.captivate.fm/f8653ddc-db6e-4c6a-9b8d-b71a64220a22/5Umgo_Rot2gSiqtnREGOOZTp.png"/><dc:creator><![CDATA[Contributors from Around the World]]></dc:creator><pubDate>Mon, 29 May 2023 16:45:00 -0400</pubDate><enclosure url="https://dts.podtrac.com/redirect.mp3/podcasts.captivate.fm/media/b94b1200-38f5-4b0f-b581-bb96e4f04619/2023-05-29-505-Episode-151-converted.mp3" length="8654377" type="audio/mpeg"/><itunes:duration>12:01</itunes:duration><itunes:explicit>false</itunes:explicit><itunes:episodeType>full</itunes:episodeType><itunes:season>1</itunes:season><itunes:episode>151</itunes:episode><itunes:season>1</itunes:season><podcast:episode>151</podcast:episode><podcast:season>1</podcast:season><itunes:author>Contributors from Around the World</itunes:author></item><item><title>Episode #150 - 150th Episode, Business Email Compromise, GUI-Vil, EU AI Act</title><itunes:title>Episode #150 - 150th Episode, Business Email Compromise, GUI-Vil, EU AI Act</itunes:title><description><![CDATA[<p><strong>Hey, it's 5:05 on Friday, May 26th, 2023.</strong> From the Sourced Podcast Network in New York City, this is your host, Pokie Huang. Stories in today's episode come from <strong>Mark Miller</strong> in Albuquerque, New Mexico, <strong>Edwin Kwon</strong> in Sydney, Australia, <strong>Katy Craig</strong> in San Diego, California, <strong>Olimpiu Pop</strong> in Transylvania, Romania, <strong>Marcel Brown</strong> in St. Louis, Missouri.</p><p>Let's get to it.</p><h3>150th Episode</h3><p><a href="https://505updates.com/markmiller/" rel="noopener noreferrer" target="_blank">🇺🇸 Mark Miller, Albuquerque, New Mexico↗</a></p><p><a href="https://505updates.com/" rel="noopener noreferrer" target="_blank">https://505updates.com</a></p><h3>Surge in Business Email Compromise</h3><p><a href="https://505updates.com/edwinkwan/" rel="noopener noreferrer" target="_blank">🇦🇺 Edwin Kwan, Sydney, Australia ↗</a></p><p><a href="https://www.microsoft.com/en-us/security/blog/2023/05/19/cyber-signals-shifting-tactics-fuel-surge-in-business-email-compromise/" rel="noopener noreferrer" target="_blank">Cyber Signals: Shifting tactics show surge in business email compromise | Microsoft Security Blog</a></p><p><a href="https://query.prod.cms.rt.microsoft.com/cms/api/am/binary/RW14o4H" rel="noopener noreferrer" target="_blank">https://query.prod.cms.rt.microsoft.com/cms/api/am/binary/RW14o4H</a></p><p><br></p><h3>Introducing GUI-Vil</h3><p><a href="https://505updates.com/katycraig/" rel="noopener noreferrer" target="_blank">🇺🇸 Katy Craig, San Diego, California ↗</a></p><p><a href="https://permiso.io/blog/s/unmasking-guivil-new-cloud-threat-actor/" rel="noopener noreferrer" target="_blank">Blog | Unmasking GUI-Vil: Financially Motivated Cloud Threat Actor</a>&nbsp;</p><p><a href="https://thehackernews.com/2023/05/indonesian-cybercriminals-exploit-aws.html" rel="noopener noreferrer" target="_blank">Indonesian Cybercriminals Exploit AWS for Profitable Crypto Mining Operations</a></p><p><br></p><h3>The EU AI Act Enters the next phase</h3><p><a href="http://505updates.com/olimpiupop/" rel="noopener noreferrer" target="_blank">🇷🇴 Olimpiu Pop, Transylvania, Romania ↗</a></p><p><a href="https://www.reuters.com/technology/eu-lawmakers-committee-reaches-deal-artificial-intelligence-act-2023-04-27/" rel="noopener noreferrer" target="_blank">EU proposes new copyright rules for generative AI | Reuters</a></p><p><br></p><h3>This Day in Tech History&nbsp;</h3><p><a href="https://505updates.com/marcelbrown/" rel="noopener noreferrer" target="_blank"><strong>🇺🇸</strong> Marcel Brown, St. Louis, Missouri ↗</a></p><p><a href="http://thisdayintechhistory.com/05/24/" rel="noopener noreferrer" target="_blank">http://thisdayintechhistory.com/05/24/</a></p><p><a href="http://thisdayintechhistory.com/05/25/" rel="noopener noreferrer" target="_blank">http://thisdayintechhistory.com/05/25/</a></p><p><a href="http://thisdayintechhistory.com/05/26/" rel="noopener noreferrer" target="_blank">http://thisdayintechhistory.com/05/26/</a></p>]]></description><content:encoded><![CDATA[<p><strong>Hey, it's 5:05 on Friday, May 26th, 2023.</strong> From the Sourced Podcast Network in New York City, this is your host, Pokie Huang. Stories in today's episode come from <strong>Mark Miller</strong> in Albuquerque, New Mexico, <strong>Edwin Kwon</strong> in Sydney, Australia, <strong>Katy Craig</strong> in San Diego, California, <strong>Olimpiu Pop</strong> in Transylvania, Romania, <strong>Marcel Brown</strong> in St. Louis, Missouri.</p><p>Let's get to it.</p><h3>150th Episode</h3><p><a href="https://505updates.com/markmiller/" rel="noopener noreferrer" target="_blank">🇺🇸 Mark Miller, Albuquerque, New Mexico↗</a></p><p><a href="https://505updates.com/" rel="noopener noreferrer" target="_blank">https://505updates.com</a></p><h3>Surge in Business Email Compromise</h3><p><a href="https://505updates.com/edwinkwan/" rel="noopener noreferrer" target="_blank">🇦🇺 Edwin Kwan, Sydney, Australia ↗</a></p><p><a href="https://www.microsoft.com/en-us/security/blog/2023/05/19/cyber-signals-shifting-tactics-fuel-surge-in-business-email-compromise/" rel="noopener noreferrer" target="_blank">Cyber Signals: Shifting tactics show surge in business email compromise | Microsoft Security Blog</a></p><p><a href="https://query.prod.cms.rt.microsoft.com/cms/api/am/binary/RW14o4H" rel="noopener noreferrer" target="_blank">https://query.prod.cms.rt.microsoft.com/cms/api/am/binary/RW14o4H</a></p><p><br></p><h3>Introducing GUI-Vil</h3><p><a href="https://505updates.com/katycraig/" rel="noopener noreferrer" target="_blank">🇺🇸 Katy Craig, San Diego, California ↗</a></p><p><a href="https://permiso.io/blog/s/unmasking-guivil-new-cloud-threat-actor/" rel="noopener noreferrer" target="_blank">Blog | Unmasking GUI-Vil: Financially Motivated Cloud Threat Actor</a>&nbsp;</p><p><a href="https://thehackernews.com/2023/05/indonesian-cybercriminals-exploit-aws.html" rel="noopener noreferrer" target="_blank">Indonesian Cybercriminals Exploit AWS for Profitable Crypto Mining Operations</a></p><p><br></p><h3>The EU AI Act Enters the next phase</h3><p><a href="http://505updates.com/olimpiupop/" rel="noopener noreferrer" target="_blank">🇷🇴 Olimpiu Pop, Transylvania, Romania ↗</a></p><p><a href="https://www.reuters.com/technology/eu-lawmakers-committee-reaches-deal-artificial-intelligence-act-2023-04-27/" rel="noopener noreferrer" target="_blank">EU proposes new copyright rules for generative AI | Reuters</a></p><p><br></p><h3>This Day in Tech History&nbsp;</h3><p><a href="https://505updates.com/marcelbrown/" rel="noopener noreferrer" target="_blank"><strong>🇺🇸</strong> Marcel Brown, St. Louis, Missouri ↗</a></p><p><a href="http://thisdayintechhistory.com/05/24/" rel="noopener noreferrer" target="_blank">http://thisdayintechhistory.com/05/24/</a></p><p><a href="http://thisdayintechhistory.com/05/25/" rel="noopener noreferrer" target="_blank">http://thisdayintechhistory.com/05/25/</a></p><p><a href="http://thisdayintechhistory.com/05/26/" rel="noopener noreferrer" target="_blank">http://thisdayintechhistory.com/05/26/</a></p>]]></content:encoded><link><![CDATA[https://3zozb9fxlbueipjyapmaas.captivate.fm/episode/episode-150-150th-episode-business-email-compromise-gui-vil-eu-ai-act]]></link><guid isPermaLink="false">a7f849fd-69b9-4d11-8fc8-380dd32239d9</guid><itunes:image href="https://artwork.captivate.fm/942d77a1-85fb-4aa8-9d3c-b13125478f58/5IQJpjTzUoseK6Ndeky8frxT.png"/><dc:creator><![CDATA[Contributors from Around the World]]></dc:creator><pubDate>Fri, 26 May 2023 16:45:00 -0400</pubDate><enclosure url="https://dts.podtrac.com/redirect.mp3/podcasts.captivate.fm/media/f00729aa-11a2-4500-a32b-416b6dda87d8/2023-05-26-505-Episode-150-converted.mp3" length="9891641" type="audio/mpeg"/><itunes:duration>13:44</itunes:duration><itunes:explicit>false</itunes:explicit><itunes:episodeType>full</itunes:episodeType><itunes:season>1</itunes:season><itunes:episode>150</itunes:episode><itunes:season>1</itunes:season><podcast:episode>150</podcast:episode><podcast:season>1</podcast:season><itunes:author>Contributors from Around the World</itunes:author></item><item><title>Episode #149 - Apple Bans ChatGPT, TikTok Sues Montana, China Targets US Infrastructure, Fentanyl on the open market</title><itunes:title>Episode #149 - Apple Bans ChatGPT, TikTok Sues Montana, China Targets US Infrastructure, Fentanyl on the open market</itunes:title><description><![CDATA[<p>From Sourced Network Productions in New York City, it's 5:05 on Thursday, May 25th, 2023. This is your host Mark Miller sitting in for Pokie Huang. Stories in today's episode come from Edwin Kwan in Sydney, Australia, Trac Bannon in Camp Hill, Pennsylvania, Katy Craig in San Diego, California, and me ,this week calling in from Albuquerque New Mexico. </p><p>As Pokie likes to say. "Let's get to it." </p><h2>Resources mentioned in this episode:</h2><h3><strong>Apple Bans Employees from using ChatGPT</strong></h3><p><a href="https://505updates.com/edwinkwan/" rel="noopener noreferrer" target="_blank">🇦🇺 Edwin Kwan, Sydney, Australia ↗</a></p><p><a href="https://www.macrumors.com/2023/05/19/apple-bans-employees-from-using-chatgpt/" rel="noopener noreferrer" target="_blank">Apple Bans Employees From Using ChatGPT Amid Its Own AI Efforts - MacRumors</a></p><p><br></p><h3><strong>TikTok sues Montana</strong></h3><p><a href="https://505updates.com/katycraig/" rel="noopener noreferrer" target="_blank">🇺🇸 Katy Craig, San Diego, California ↗</a></p><p><a href="https://storage.courtlistener.com/recap/gov.uscourts.mtd.73544/gov.uscourts.mtd.73544.1.0.pdf" rel="noopener noreferrer" target="_blank">https://storage.courtlistener.com/recap/gov.uscourts.mtd.73544/gov.uscourts.mtd.73544.1.0.pdf</a></p><p><a href="https://www.aclu.org/press-releases/aclu-slams-montanas-unconstitutional-tiktok-ban-as-governor-signs-law" rel="noopener noreferrer" target="_blank">ACLU Slams Montana's Unconstitutional TikTok Ban as Governor Signs Law</a></p><p><br></p><h3>China Targets US Infrastructure </h3><p><a href="https://505updates.com/tracbannon/" rel="noopener noreferrer" target="_blank"><strong>🇺🇸</strong> Tracy (Trac) Bannon, Camp Hill, Pennsylvania↗</a></p><p><a href="https://www.microsoft.com/en-us/security/blog/2023/05/24/volt-typhoon-targets-us-critical-infrastructure-with-living-off-the-land-techniques/" rel="noopener noreferrer" target="_blank">Volt Typhoon targets US critical infrastructure with living-off-the-land techniques | Microsoft Security Blog</a></p><p><a href="https://www.engadget.com/microsoft-says-china-installed-malware-in-us-systems-in-guam-195805235.html?guccounter=1" rel="noopener noreferrer" target="_blank">Microsoft says China installed malware in US systems in Guam | Engadget</a></p><p><a href="https://www.microsoft.com/en-us/security/blog/2018/09/27/out-of-sight-but-not-invisible-defeating-fileless-malware-with-behavior-monitoring-amsi-and-next-gen-av/" rel="noopener noreferrer" target="_blank">Out of sight but not invisible: Defeating fileless malware with behavior monitoring, AMSI, and next-gen AV | Microsoft Security Blog</a>&nbsp;</p><p><a href="https://media.defense.gov/2023/May/24/2003229517/-1/-1/0/CSA_Living_off_the_Land.PDF" rel="noopener noreferrer" target="_blank">Joint Cybersecurity Advisory People's Republic of China State-Sponsored Cyber Actor Living off the Land to Evade Detection</a>&nbsp;</p><p><br></p><h3>Fentanyl on the open market?? Yep.  </h3><p><a href="https://505updates.com/markmiller/" rel="noopener noreferrer" target="_blank">🇺🇸 Mark Miller, Albuquerque, New Mexico↗</a></p><p>Andy Greenberg: <a href="https://www.wired.com/author/andy-greenberg/" rel="noopener noreferrer" target="_blank">Andy Greenberg | WIRED</a></p><p>Wired: <a href="https://www.wired.com/story/fentanyl-ingredients-chinese-labs-cryptocurrency/" rel="noopener noreferrer" target="_blank">Chinese Labs Are Selling Fentanyl Ingredients for Millions in Crypto | WIRED</a></p><p>Chainanalysis: <a href="https://blog.chainalysis.com/reports/cryptocurrency-fentanyl-analysis-2023/" rel="noopener noreferrer" target="_blank">Crypto and the Opioid Crisis: What Blockchain Analysis Reveals About Global Fentanyl Sales - Chainalysis</a></p><p>Elliptic: <a href="https://www.elliptic.co/blog/chinese-businesses-fueling-the-fentanyl-epidemic-receive-millions-in-cryptocurrency-payments" rel="noopener noreferrer" target="_blank">Chinese Businesses]]></description><content:encoded><![CDATA[<p>From Sourced Network Productions in New York City, it's 5:05 on Thursday, May 25th, 2023. This is your host Mark Miller sitting in for Pokie Huang. Stories in today's episode come from Edwin Kwan in Sydney, Australia, Trac Bannon in Camp Hill, Pennsylvania, Katy Craig in San Diego, California, and me ,this week calling in from Albuquerque New Mexico. </p><p>As Pokie likes to say. "Let's get to it." </p><h2>Resources mentioned in this episode:</h2><h3><strong>Apple Bans Employees from using ChatGPT</strong></h3><p><a href="https://505updates.com/edwinkwan/" rel="noopener noreferrer" target="_blank">🇦🇺 Edwin Kwan, Sydney, Australia ↗</a></p><p><a href="https://www.macrumors.com/2023/05/19/apple-bans-employees-from-using-chatgpt/" rel="noopener noreferrer" target="_blank">Apple Bans Employees From Using ChatGPT Amid Its Own AI Efforts - MacRumors</a></p><p><br></p><h3><strong>TikTok sues Montana</strong></h3><p><a href="https://505updates.com/katycraig/" rel="noopener noreferrer" target="_blank">🇺🇸 Katy Craig, San Diego, California ↗</a></p><p><a href="https://storage.courtlistener.com/recap/gov.uscourts.mtd.73544/gov.uscourts.mtd.73544.1.0.pdf" rel="noopener noreferrer" target="_blank">https://storage.courtlistener.com/recap/gov.uscourts.mtd.73544/gov.uscourts.mtd.73544.1.0.pdf</a></p><p><a href="https://www.aclu.org/press-releases/aclu-slams-montanas-unconstitutional-tiktok-ban-as-governor-signs-law" rel="noopener noreferrer" target="_blank">ACLU Slams Montana's Unconstitutional TikTok Ban as Governor Signs Law</a></p><p><br></p><h3>China Targets US Infrastructure </h3><p><a href="https://505updates.com/tracbannon/" rel="noopener noreferrer" target="_blank"><strong>🇺🇸</strong> Tracy (Trac) Bannon, Camp Hill, Pennsylvania↗</a></p><p><a href="https://www.microsoft.com/en-us/security/blog/2023/05/24/volt-typhoon-targets-us-critical-infrastructure-with-living-off-the-land-techniques/" rel="noopener noreferrer" target="_blank">Volt Typhoon targets US critical infrastructure with living-off-the-land techniques | Microsoft Security Blog</a></p><p><a href="https://www.engadget.com/microsoft-says-china-installed-malware-in-us-systems-in-guam-195805235.html?guccounter=1" rel="noopener noreferrer" target="_blank">Microsoft says China installed malware in US systems in Guam | Engadget</a></p><p><a href="https://www.microsoft.com/en-us/security/blog/2018/09/27/out-of-sight-but-not-invisible-defeating-fileless-malware-with-behavior-monitoring-amsi-and-next-gen-av/" rel="noopener noreferrer" target="_blank">Out of sight but not invisible: Defeating fileless malware with behavior monitoring, AMSI, and next-gen AV | Microsoft Security Blog</a>&nbsp;</p><p><a href="https://media.defense.gov/2023/May/24/2003229517/-1/-1/0/CSA_Living_off_the_Land.PDF" rel="noopener noreferrer" target="_blank">Joint Cybersecurity Advisory People's Republic of China State-Sponsored Cyber Actor Living off the Land to Evade Detection</a>&nbsp;</p><p><br></p><h3>Fentanyl on the open market?? Yep.  </h3><p><a href="https://505updates.com/markmiller/" rel="noopener noreferrer" target="_blank">🇺🇸 Mark Miller, Albuquerque, New Mexico↗</a></p><p>Andy Greenberg: <a href="https://www.wired.com/author/andy-greenberg/" rel="noopener noreferrer" target="_blank">Andy Greenberg | WIRED</a></p><p>Wired: <a href="https://www.wired.com/story/fentanyl-ingredients-chinese-labs-cryptocurrency/" rel="noopener noreferrer" target="_blank">Chinese Labs Are Selling Fentanyl Ingredients for Millions in Crypto | WIRED</a></p><p>Chainanalysis: <a href="https://blog.chainalysis.com/reports/cryptocurrency-fentanyl-analysis-2023/" rel="noopener noreferrer" target="_blank">Crypto and the Opioid Crisis: What Blockchain Analysis Reveals About Global Fentanyl Sales - Chainalysis</a></p><p>Elliptic: <a href="https://www.elliptic.co/blog/chinese-businesses-fueling-the-fentanyl-epidemic-receive-millions-in-cryptocurrency-payments" rel="noopener noreferrer" target="_blank">Chinese Businesses Fueling the Fentanyl Epidemic Receive Tens of Millions in Crypto Payments</a></p><p><br></p><p><br></p><p><br></p>]]></content:encoded><link><![CDATA[https://3zozb9fxlbueipjyapmaas.captivate.fm/episode/episode-149-apple-bans-chatgpt-tiktok-sues-montana-china-targets-us-infrastructure-fentanyl-on-the-open-market]]></link><guid isPermaLink="false">a5b2d328-de42-4fdc-8864-468d58382f5e</guid><itunes:image href="https://artwork.captivate.fm/33e2a4e7-a936-4ef5-905a-3a72363cfbe4/BkhMbfQsRHQi9QFk9GvnUJSv.png"/><dc:creator><![CDATA[Contributors from Around the World]]></dc:creator><pubDate>Thu, 25 May 2023 16:45:00 -0400</pubDate><enclosure url="https://dts.podtrac.com/redirect.mp3/podcasts.captivate.fm/media/4312b2d3-7b56-4c34-b87e-21ef4ebbfafd/2023-05-25-505-Final-Edit-converted.mp3" length="7695625" type="audio/mpeg"/><itunes:duration>08:01</itunes:duration><itunes:explicit>false</itunes:explicit><itunes:episodeType>full</itunes:episodeType><itunes:season>1</itunes:season><itunes:episode>149</itunes:episode><itunes:season>1</itunes:season><podcast:episode>149</podcast:episode><podcast:season>1</podcast:season><itunes:author>Contributors from Around the World</itunes:author></item><item><title>Episode #148 - Samsung Exploit, Telco Snitch Scammers, Employees Sharing Sensitive Data</title><itunes:title>Episode #148 - Samsung Exploit, Telco Snitch Scammers, Employees Sharing Sensitive Data</itunes:title><description><![CDATA[<p><strong>Hey, it's 5:05 on Wednesday, May 24th, 2023.</strong> From the Sourced Postcast Network in New York City, this is your host, Pokie Huang. Stories in today's episode come from <strong>Katy Craig</strong> in San Diego, California, <strong>Edwin Kwan</strong> in Sydney, Australia, <strong>Trac Bannon</strong> in Camp Hill, Pennsylvania.&nbsp;</p><p>Let's get to it.</p><h3>Samsung exploit</h3><p><a href="https://505updates.com/katycraig/" rel="noopener noreferrer" target="_blank">🇺🇸 Katy Craig, San Diego, California ↗</a></p><p><a href="https://security.samsungmobile.com/securityUpdate.smsb" rel="noopener noreferrer" target="_blank">Security Updates Firmware Updates | Samsung Mobile Security</a></p><p><a href="https://docs.google.com/spreadsheets/d/1lkNJ0uQwbeC1ZTRrxdtuPLCIl7mlUreoKfSIgajnSyY/view#gid=1746868651" rel="noopener noreferrer" target="_blank">0day "In the Wild"</a></p><h3>Australia Telco Launches Initiative to Snitch Scammers</h3><p><a href="https://505updates.com/edwinkwan/" rel="noopener noreferrer" target="_blank">🇦🇺 Edwin Kwan, Sydney, Australia ↗</a></p><p><a href="https://exchange.telstra.com.au/7226-scam-sms-reporting/" rel="noopener noreferrer" target="_blank">Snitch a scammer: our new reporting number to help customers fight SMS and MMS scams</a></p><p><br></p><h3>Security Concerns Soar with Employees Sharing Sensitive Data</h3><p><a href="https://505updates.com/tracbannon/" rel="noopener noreferrer" target="_blank"><strong>🇺🇸</strong> Tracy (Trac) Bannon, Camp Hill, </a>Pennsylvania↗</p><p><a href="https://www.darkreading.com/risk/employees-feeding-sensitive-business-data-chatgpt-raising-security-fears" rel="noopener noreferrer" target="_blank">Employees Are Feeding Sensitive Biz Data to ChatGPT, Raising Security Fears</a></p><p><br></p>]]></description><content:encoded><![CDATA[<p><strong>Hey, it's 5:05 on Wednesday, May 24th, 2023.</strong> From the Sourced Postcast Network in New York City, this is your host, Pokie Huang. Stories in today's episode come from <strong>Katy Craig</strong> in San Diego, California, <strong>Edwin Kwan</strong> in Sydney, Australia, <strong>Trac Bannon</strong> in Camp Hill, Pennsylvania.&nbsp;</p><p>Let's get to it.</p><h3>Samsung exploit</h3><p><a href="https://505updates.com/katycraig/" rel="noopener noreferrer" target="_blank">🇺🇸 Katy Craig, San Diego, California ↗</a></p><p><a href="https://security.samsungmobile.com/securityUpdate.smsb" rel="noopener noreferrer" target="_blank">Security Updates Firmware Updates | Samsung Mobile Security</a></p><p><a href="https://docs.google.com/spreadsheets/d/1lkNJ0uQwbeC1ZTRrxdtuPLCIl7mlUreoKfSIgajnSyY/view#gid=1746868651" rel="noopener noreferrer" target="_blank">0day "In the Wild"</a></p><h3>Australia Telco Launches Initiative to Snitch Scammers</h3><p><a href="https://505updates.com/edwinkwan/" rel="noopener noreferrer" target="_blank">🇦🇺 Edwin Kwan, Sydney, Australia ↗</a></p><p><a href="https://exchange.telstra.com.au/7226-scam-sms-reporting/" rel="noopener noreferrer" target="_blank">Snitch a scammer: our new reporting number to help customers fight SMS and MMS scams</a></p><p><br></p><h3>Security Concerns Soar with Employees Sharing Sensitive Data</h3><p><a href="https://505updates.com/tracbannon/" rel="noopener noreferrer" target="_blank"><strong>🇺🇸</strong> Tracy (Trac) Bannon, Camp Hill, </a>Pennsylvania↗</p><p><a href="https://www.darkreading.com/risk/employees-feeding-sensitive-business-data-chatgpt-raising-security-fears" rel="noopener noreferrer" target="_blank">Employees Are Feeding Sensitive Biz Data to ChatGPT, Raising Security Fears</a></p><p><br></p>]]></content:encoded><link><![CDATA[https://3zozb9fxlbueipjyapmaas.captivate.fm/episode/episode-148-samsung-exploit-telco-snitch-scammers-employees-sharing-sensitive-data]]></link><guid isPermaLink="false">46c84209-6309-4ec6-9e7b-9f50ce825b48</guid><itunes:image href="https://artwork.captivate.fm/d9fe8376-a0e9-41ca-978c-d094d1745ff2/AQUGjmKHF7QDVPKSalECZiBp.png"/><dc:creator><![CDATA[Contributors from Around the World]]></dc:creator><pubDate>Wed, 24 May 2023 16:45:00 -0400</pubDate><enclosure url="https://dts.podtrac.com/redirect.mp3/podcasts.captivate.fm/media/db4c133e-aade-4db4-9786-404ae9e987bb/2023-05-24-505-Episode-148-converted.mp3" length="6232210" type="audio/mpeg"/><itunes:duration>08:39</itunes:duration><itunes:explicit>false</itunes:explicit><itunes:episodeType>full</itunes:episodeType><itunes:season>1</itunes:season><itunes:episode>148</itunes:episode><itunes:season>1</itunes:season><podcast:episode>148</podcast:episode><podcast:season>1</podcast:season><itunes:author>Contributors from Around the World</itunes:author></item><item><title>Episode #147 - Password Manager, AI-Generated Images, PreInfected Android Phones</title><itunes:title>Episode #147 - Password Manager, AI-Generated Images, PreInfected Android Phones</itunes:title><description><![CDATA[<p><strong>Hey, it's 5:05 on Tuesday, May 23rd, 2023.</strong> From the Sourced Podcast Network in New York city, this is your host, Pokie Huang. Stories in today's episode come from <strong>Edwin Kwan</strong> in Sydney. Australia, <strong>Ian Garrett</strong> in Arlington, Virginia, <strong>Katy Craig</strong> in San Diego, California, <strong>Marcel brown</strong> in St. Louis, Missouri.&nbsp;</p><p>Let's get to it.</p><h3>Password Manager Vulnerable to Master Password Compromise</h3><p><a href="https://505updates.com/edwinkwan/" rel="noopener noreferrer" target="_blank">🇦🇺 Edwin Kwan, Sydney, Australia ↗</a></p><p><a href="https://github.com/vdohney/keepass-password-dumper" rel="noopener noreferrer" target="_blank">GitHub - vdohney/keepass-password-dumper: Original PoC for CVE-2023-32784</a></p><p><a href="https://www.bleepingcomputer.com/news/security/keepass-exploit-helps-retrieve-cleartext-master-password-fix-coming-soon/" rel="noopener noreferrer" target="_blank">KeePass exploit helps retrieve cleartext master password, fix coming soon</a></p><p><br></p><h3>The Impact of AI-Generated Images in the Pentagon Explosion Hoax</h3><p><a href="https://505updates.com/iangarrett/" rel="noopener noreferrer" target="_blank"><strong>🇺🇸 </strong>Ian Garrett, Arlington, Virginia ↗</a></p><p><a href="https://www.bleepingcomputer.com/news/security/pentagon-explosion-hoax-goes-viral-after-verified-twitter-accounts-push/" rel="noopener noreferrer" target="_blank">Pentagon explosion hoax goes viral after verified Twitter accounts push</a></p><p><br></p><h3>PreInfected Android Phones</h3><p><a href="https://505updates.com/katycraig/" rel="noopener noreferrer" target="_blank">🇺🇸 Katy Craig, San Diego, California ↗</a></p><p><a href="https://riskybiznews.substack.com/p/risky-biz-news-almost-9-million-android" rel="noopener noreferrer" target="_blank">Risky Biz News: Almost 9 million Android phones sold pre-infected with malware</a></p><p><a href="https://www.trendmicro.com/en_us/research/23/e/lemon-group-cybercriminal-businesses-built-on-preinfected-devices.html" rel="noopener noreferrer" target="_blank">Lemon Group’s Cybercriminal Businesses Built on Preinfected Devices</a></p><p><br></p><h3>This Day in Tech History&nbsp;</h3><p><a href="https://505updates.com/marcelbrown/" rel="noopener noreferrer" target="_blank"><strong>🇺🇸</strong> Marcel Brown, St. Louis, Missouri ↗</a></p><p><a href="http://thisdayintechhistory.com/05/23" rel="noopener noreferrer" target="_blank">http://thisdayintechhistory.com/05/23</a></p>]]></description><content:encoded><![CDATA[<p><strong>Hey, it's 5:05 on Tuesday, May 23rd, 2023.</strong> From the Sourced Podcast Network in New York city, this is your host, Pokie Huang. Stories in today's episode come from <strong>Edwin Kwan</strong> in Sydney. Australia, <strong>Ian Garrett</strong> in Arlington, Virginia, <strong>Katy Craig</strong> in San Diego, California, <strong>Marcel brown</strong> in St. Louis, Missouri.&nbsp;</p><p>Let's get to it.</p><h3>Password Manager Vulnerable to Master Password Compromise</h3><p><a href="https://505updates.com/edwinkwan/" rel="noopener noreferrer" target="_blank">🇦🇺 Edwin Kwan, Sydney, Australia ↗</a></p><p><a href="https://github.com/vdohney/keepass-password-dumper" rel="noopener noreferrer" target="_blank">GitHub - vdohney/keepass-password-dumper: Original PoC for CVE-2023-32784</a></p><p><a href="https://www.bleepingcomputer.com/news/security/keepass-exploit-helps-retrieve-cleartext-master-password-fix-coming-soon/" rel="noopener noreferrer" target="_blank">KeePass exploit helps retrieve cleartext master password, fix coming soon</a></p><p><br></p><h3>The Impact of AI-Generated Images in the Pentagon Explosion Hoax</h3><p><a href="https://505updates.com/iangarrett/" rel="noopener noreferrer" target="_blank"><strong>🇺🇸 </strong>Ian Garrett, Arlington, Virginia ↗</a></p><p><a href="https://www.bleepingcomputer.com/news/security/pentagon-explosion-hoax-goes-viral-after-verified-twitter-accounts-push/" rel="noopener noreferrer" target="_blank">Pentagon explosion hoax goes viral after verified Twitter accounts push</a></p><p><br></p><h3>PreInfected Android Phones</h3><p><a href="https://505updates.com/katycraig/" rel="noopener noreferrer" target="_blank">🇺🇸 Katy Craig, San Diego, California ↗</a></p><p><a href="https://riskybiznews.substack.com/p/risky-biz-news-almost-9-million-android" rel="noopener noreferrer" target="_blank">Risky Biz News: Almost 9 million Android phones sold pre-infected with malware</a></p><p><a href="https://www.trendmicro.com/en_us/research/23/e/lemon-group-cybercriminal-businesses-built-on-preinfected-devices.html" rel="noopener noreferrer" target="_blank">Lemon Group’s Cybercriminal Businesses Built on Preinfected Devices</a></p><p><br></p><h3>This Day in Tech History&nbsp;</h3><p><a href="https://505updates.com/marcelbrown/" rel="noopener noreferrer" target="_blank"><strong>🇺🇸</strong> Marcel Brown, St. Louis, Missouri ↗</a></p><p><a href="http://thisdayintechhistory.com/05/23" rel="noopener noreferrer" target="_blank">http://thisdayintechhistory.com/05/23</a></p>]]></content:encoded><link><![CDATA[https://3zozb9fxlbueipjyapmaas.captivate.fm/episode/episode-147-password-manager-ai-generated-images-preinfected-android-phones]]></link><guid isPermaLink="false">cd8a00bf-2d13-4e09-b051-d48c7072b0cc</guid><itunes:image href="https://artwork.captivate.fm/ac46e072-d5e5-4f18-9bec-d3d98cb8e53b/YI8hjPAItY4J-xxd84xenWSt.png"/><dc:creator><![CDATA[Contributors from Around the World]]></dc:creator><pubDate>Tue, 23 May 2023 16:45:00 -0400</pubDate><enclosure url="https://dts.podtrac.com/redirect.mp3/podcasts.captivate.fm/media/e50f0e27-7493-43fb-92b6-ebcfd1c02953/2023-05-23-505-Episode-147-converted.mp3" length="6493328" type="audio/mpeg"/><itunes:duration>09:01</itunes:duration><itunes:explicit>false</itunes:explicit><itunes:episodeType>full</itunes:episodeType><itunes:season>1</itunes:season><itunes:episode>147</itunes:episode><itunes:season>1</itunes:season><podcast:episode>147</podcast:episode><podcast:season>1</podcast:season><itunes:author>Contributors from Around the World</itunes:author></item><item><title>Episode #146 - PyPi, FIN7 and Clop Ransomware, AI Patch</title><itunes:title>Episode #146 - PyPi, FIN7 and Clop Ransomware, AI Patch</itunes:title><description><![CDATA[<p><strong>Hey, it's 5:05 on Monday, May 22nd, 2023.</strong> From the Sourced Podcast Network in New York city, this is your host, Pokie Huang. Stories in today's episode come from <strong>Edwin Kwan</strong> in Sydney, Australia, <strong>Derek Weeks</strong> in Bethesda, Maryland, <strong>Kadi Grigg</strong> in Alexandria, Virginia, <strong>Katy Craig</strong> in San Diego, California, <strong>Marcel Brown</strong> in St. Louis, Missouri.&nbsp;</p><p>Let's get to it.</p><h3>PyPI Struggling with High Volume of Malware</h3><p><a href="https://505updates.com/edwinkwan/" rel="noopener noreferrer" target="_blank">🇦🇺 Edwin Kwan, Sydney, Australia ↗</a></p><p>https://status.python.org/incidents/qy2t9mjjcc7g</p><p><a href="https://www.bleepingcomputer.com/news/security/pypi-temporarily-pauses-new-users-projects-amid-high-volume-of-malware/" rel="noopener noreferrer" target="_blank">PyPI temporarily pauses new users, projects amid high volume of malware</a></p><h3>PyPi disrupted</h3><p><a href="https://505updates.com/derekweeks/" rel="noopener noreferrer" target="_blank"><strong>🇺🇸</strong> Derek Weeks, Bethesda Maryland ↗</a></p><p><a href="https://www.computing.co.uk/news/4116081/pypi-repository-restored-temporarily-suspending-activity" rel="noopener noreferrer" target="_blank">PyPI repository restored after temporarily suspending new activity</a></p><p><a href="https://thehackernews.com/2023/05/pypi-repository-under-attack-user-sign.html" rel="noopener noreferrer" target="_blank">PyPI Repository Under Attack: User Sign-Ups and Package Uploads Temporarily Halted</a></p><h3>FIN7 and Clop ransomware</h3><p><a href="https://505updates.com/kadigrigg/" rel="noopener noreferrer" target="_blank">🇺🇸 Kadi Grigg,Alexandria, Virginia </a>↗</p><p><a href="https://thehackernews.com/2023/05/notorious-cyber-gang-fin7-returns-cl0p.html" rel="noopener noreferrer" target="_blank">Notorious Cyber Gang FIN7 Returns With Cl0p Ransomware in New Wave of Attacks</a></p><p><a href="https://www.bleepingcomputer.com/news/security/microsoft-notorious-fin7-hackers-return-in-clop-ransomware-attacks/" rel="noopener noreferrer" target="_blank">Microsoft: Notorious FIN7 hackers return in Clop ransomware attacks</a></p><p><br></p><h3>AI Patch Management</h3><p><a href="https://505updates.com/katycraig/" rel="noopener noreferrer" target="_blank">🇺🇸 Katy Craig, San Diego, California ↗</a></p><p><a href="https://venturebeat.com/security/5-ways-ai-driven-patch-management-is-driving-the-future-of-cybersecurity/" rel="noopener noreferrer" target="_blank">5 ways AI-driven patch management is driving the future of cybersecurity | VentureBeat</a></p><p><a href="https://www.crowdstrike.com/global-threat-report/" rel="noopener noreferrer" target="_blank">CrowdStrike 2023 Global Threat Report</a></p><p><br></p><h3>This Day in Tech History&nbsp;</h3><p><a href="https://505updates.com/marcelbrown/" rel="noopener noreferrer" target="_blank"><strong>🇺🇸</strong> Marcel Brown, St. Louis, Missouri ↗</a></p><p><a href="http://thisdayintechhistory.com/05/21" rel="noopener noreferrer" target="_blank">http://thisdayintechhistory.com/05/21</a></p><p><a href="http://thisdayintechhistory.com/05/22" rel="noopener noreferrer" target="_blank">http://thisdayintechhistory.com/05/22</a></p>]]></description><content:encoded><![CDATA[<p><strong>Hey, it's 5:05 on Monday, May 22nd, 2023.</strong> From the Sourced Podcast Network in New York city, this is your host, Pokie Huang. Stories in today's episode come from <strong>Edwin Kwan</strong> in Sydney, Australia, <strong>Derek Weeks</strong> in Bethesda, Maryland, <strong>Kadi Grigg</strong> in Alexandria, Virginia, <strong>Katy Craig</strong> in San Diego, California, <strong>Marcel Brown</strong> in St. Louis, Missouri.&nbsp;</p><p>Let's get to it.</p><h3>PyPI Struggling with High Volume of Malware</h3><p><a href="https://505updates.com/edwinkwan/" rel="noopener noreferrer" target="_blank">🇦🇺 Edwin Kwan, Sydney, Australia ↗</a></p><p>https://status.python.org/incidents/qy2t9mjjcc7g</p><p><a href="https://www.bleepingcomputer.com/news/security/pypi-temporarily-pauses-new-users-projects-amid-high-volume-of-malware/" rel="noopener noreferrer" target="_blank">PyPI temporarily pauses new users, projects amid high volume of malware</a></p><h3>PyPi disrupted</h3><p><a href="https://505updates.com/derekweeks/" rel="noopener noreferrer" target="_blank"><strong>🇺🇸</strong> Derek Weeks, Bethesda Maryland ↗</a></p><p><a href="https://www.computing.co.uk/news/4116081/pypi-repository-restored-temporarily-suspending-activity" rel="noopener noreferrer" target="_blank">PyPI repository restored after temporarily suspending new activity</a></p><p><a href="https://thehackernews.com/2023/05/pypi-repository-under-attack-user-sign.html" rel="noopener noreferrer" target="_blank">PyPI Repository Under Attack: User Sign-Ups and Package Uploads Temporarily Halted</a></p><h3>FIN7 and Clop ransomware</h3><p><a href="https://505updates.com/kadigrigg/" rel="noopener noreferrer" target="_blank">🇺🇸 Kadi Grigg,Alexandria, Virginia </a>↗</p><p><a href="https://thehackernews.com/2023/05/notorious-cyber-gang-fin7-returns-cl0p.html" rel="noopener noreferrer" target="_blank">Notorious Cyber Gang FIN7 Returns With Cl0p Ransomware in New Wave of Attacks</a></p><p><a href="https://www.bleepingcomputer.com/news/security/microsoft-notorious-fin7-hackers-return-in-clop-ransomware-attacks/" rel="noopener noreferrer" target="_blank">Microsoft: Notorious FIN7 hackers return in Clop ransomware attacks</a></p><p><br></p><h3>AI Patch Management</h3><p><a href="https://505updates.com/katycraig/" rel="noopener noreferrer" target="_blank">🇺🇸 Katy Craig, San Diego, California ↗</a></p><p><a href="https://venturebeat.com/security/5-ways-ai-driven-patch-management-is-driving-the-future-of-cybersecurity/" rel="noopener noreferrer" target="_blank">5 ways AI-driven patch management is driving the future of cybersecurity | VentureBeat</a></p><p><a href="https://www.crowdstrike.com/global-threat-report/" rel="noopener noreferrer" target="_blank">CrowdStrike 2023 Global Threat Report</a></p><p><br></p><h3>This Day in Tech History&nbsp;</h3><p><a href="https://505updates.com/marcelbrown/" rel="noopener noreferrer" target="_blank"><strong>🇺🇸</strong> Marcel Brown, St. Louis, Missouri ↗</a></p><p><a href="http://thisdayintechhistory.com/05/21" rel="noopener noreferrer" target="_blank">http://thisdayintechhistory.com/05/21</a></p><p><a href="http://thisdayintechhistory.com/05/22" rel="noopener noreferrer" target="_blank">http://thisdayintechhistory.com/05/22</a></p>]]></content:encoded><link><![CDATA[https://3zozb9fxlbueipjyapmaas.captivate.fm/episode/episode-146-pypi-fin7-and-clop-ransomware-ai-patch]]></link><guid isPermaLink="false">dd2ca223-d1be-434b-a3d0-0951bf970b94</guid><itunes:image href="https://artwork.captivate.fm/a83857c0-4c20-4f31-80bd-dad1d8194eb0/JSjDSDphF7iyJAt7KYy36gAu.png"/><dc:creator><![CDATA[Contributors from Around the World]]></dc:creator><pubDate>Mon, 22 May 2023 16:45:00 -0400</pubDate><enclosure url="https://dts.podtrac.com/redirect.mp3/podcasts.captivate.fm/media/7e5dd743-faef-4a33-a168-c9f569c48885/2023-05-22-Episode-146-converted.mp3" length="10746779" type="audio/mpeg"/><itunes:duration>14:56</itunes:duration><itunes:explicit>false</itunes:explicit><itunes:episodeType>full</itunes:episodeType><itunes:season>1</itunes:season><itunes:episode>146</itunes:episode><itunes:season>1</itunes:season><podcast:episode>146</podcast:episode><podcast:season>1</podcast:season><itunes:author>Contributors from Around the World</itunes:author></item><item><title>Episode #145 - Apple Zero Day Fix, Apple App Store Transparency, Unmasking Cyber Resilience, Bounty for Russian Cybercriminal, FleeceGPT</title><itunes:title>Episode #145 - Apple Zero Day Fix, Apple App Store Transparency, Unmasking Cyber Resilience, Bounty for Russian Cybercriminal, FleeceGPT</itunes:title><description><![CDATA[<p><strong>From the Sourced Network Production you New York city, it's 5:05, on Friday, May 19th, 2023.</strong> This is your host, Pokie Huang. Stories in today's episode come from <strong>Edwin Kwan</strong> in Sydney, Australia, <strong>Shannon Lietz</strong> in San Diego, California, <strong>Ian Garrett</strong> in Arlington, Virginia, <strong>Olimpiu Pop</strong> in Transylvania, Romania, <strong>Katy Craig</strong> in San Diego, California and <strong>Marcel Brown</strong> in St. Louis, Missouri.&nbsp;</p><p>Let's get to it.&nbsp;</p><h3>Apple Releases Fixes for Three Zero Days</h3><p><a href="https://505updates.com/edwinkwan/" rel="noopener noreferrer" target="_blank">🇦🇺 Edwin Kwan, Sydney, Australia ↗</a></p><p><a href="https://www.bleepingcomputer.com/news/apple/apple-fixes-three-new-zero-days-exploited-to-hack-iphones-macs/" rel="noopener noreferrer" target="_blank">Apple fixes three new zero-days exploited to hack iPhones, Macs</a></p><p><a href="https://isc.sans.edu/diary/rss/29860" rel="noopener noreferrer" target="_blank">Apple Updates Everything</a></p><h3>Check out this Bleeping transparency for the Apple App Store</h3><p><a href="https://505updates.com/shannonlietz/" rel="noopener noreferrer" target="_blank"><strong>🇺🇸</strong> Shannon Lietz, San Diego, California ↗</a></p><p><a href="https://www.bleepingcomputer.com/news/apple/apple-blocked-17-million-apps-for-privacy-security-issues-in-2022/" rel="noopener noreferrer" target="_blank">Apple blocked 1.7 million apps for privacy, security issues in 2022</a></p><p><a href="https://www.statista.com/statistics/268251/number-of-apps-in-the-itunes-app-store-since-2008/" rel="noopener noreferrer" target="_blank">Number of apps from the Apple App Store 2022 | Statista</a>&nbsp;</p><p><a href="https://en.wikipedia.org/wiki/App_Store_(iOS/iPadOS)" rel="noopener noreferrer" target="_blank">App Store (iOS/iPadOS) - Wikipedia</a></p><p><br></p><h3>Unmasking Cyber Resilience: The Hidden Gaps That Leave Organizations Vulnerable</h3><p><a href="https://505updates.com/iangarrett/" rel="noopener noreferrer" target="_blank"><strong>🇺🇸 </strong>Ian Garrett, Arlington, Virginia ↗</a></p><p><a href="https://www.csoonline.com/article/3696932/organizations-reporting-cyber-resilience-are-hardly-resilient-study.html" rel="noopener noreferrer" target="_blank">Organizations reporting cyber resilience are hardly resilient: Study | CSO Online</a></p><p><br></p><h3>DOJ Offers Up To $10M Bounty For Russian Cybercriminal That Attacked Hospitals, Police Stations and Civilians in US and Across the World</h3><p><a href="http://505updates.com/olimpiupop/" rel="noopener noreferrer" target="_blank">🇷🇴 Olimpiu Pop, Transylvania, Romania ↗</a></p><p><a href="https://edition.cnn.com/2023/05/16/politics/us-reward-russian-hacker/index.html" rel="noopener noreferrer" target="_blank">CNN Article On Reward for Russian Hacker</a></p><p><a href="https://www.fbi.gov/wanted/cyber/mikhail-pavlovich-matveev" rel="noopener noreferrer" target="_blank">FBI Official Page Of Mikhail Pavlovich Matveev</a></p><p><a href="https://www.justice.gov/opa/pr/russian-national-charged-ransomware-attacks-against-critical-infrastructure#:~:text=Matveev%20is%20charged%20with%20conspiring,over%2020%20years%20in%20prison" rel="noopener noreferrer" target="_blank">The US DOJs official press release about the bounty</a></p><p><a href="https://news.yahoo.com/russian-national-charged-cyberattacks-critical-172513940.html" rel="noopener noreferrer" target="_blank">Yahoo New Article</a></p><p><br></p><h3>FleeceGPT</h3><p><a href="https://505updates.com/katycraig/" rel="noopener noreferrer" target="_blank">🇺🇸 Katy Craig, San Diego, California ↗</a></p><p><a href="https://news.sophos.com/en-us/2023/05/17/fleecegpt-mobile-apps-target-ai-curious-to-rake-in-cash/" rel="noopener noreferrer" target="_blank">“FleeceGPT” mobile apps target AI-curious to rake in cash – Sophos News</a></p><p><a...]]></description><content:encoded><![CDATA[<p><strong>From the Sourced Network Production you New York city, it's 5:05, on Friday, May 19th, 2023.</strong> This is your host, Pokie Huang. Stories in today's episode come from <strong>Edwin Kwan</strong> in Sydney, Australia, <strong>Shannon Lietz</strong> in San Diego, California, <strong>Ian Garrett</strong> in Arlington, Virginia, <strong>Olimpiu Pop</strong> in Transylvania, Romania, <strong>Katy Craig</strong> in San Diego, California and <strong>Marcel Brown</strong> in St. Louis, Missouri.&nbsp;</p><p>Let's get to it.&nbsp;</p><h3>Apple Releases Fixes for Three Zero Days</h3><p><a href="https://505updates.com/edwinkwan/" rel="noopener noreferrer" target="_blank">🇦🇺 Edwin Kwan, Sydney, Australia ↗</a></p><p><a href="https://www.bleepingcomputer.com/news/apple/apple-fixes-three-new-zero-days-exploited-to-hack-iphones-macs/" rel="noopener noreferrer" target="_blank">Apple fixes three new zero-days exploited to hack iPhones, Macs</a></p><p><a href="https://isc.sans.edu/diary/rss/29860" rel="noopener noreferrer" target="_blank">Apple Updates Everything</a></p><h3>Check out this Bleeping transparency for the Apple App Store</h3><p><a href="https://505updates.com/shannonlietz/" rel="noopener noreferrer" target="_blank"><strong>🇺🇸</strong> Shannon Lietz, San Diego, California ↗</a></p><p><a href="https://www.bleepingcomputer.com/news/apple/apple-blocked-17-million-apps-for-privacy-security-issues-in-2022/" rel="noopener noreferrer" target="_blank">Apple blocked 1.7 million apps for privacy, security issues in 2022</a></p><p><a href="https://www.statista.com/statistics/268251/number-of-apps-in-the-itunes-app-store-since-2008/" rel="noopener noreferrer" target="_blank">Number of apps from the Apple App Store 2022 | Statista</a>&nbsp;</p><p><a href="https://en.wikipedia.org/wiki/App_Store_(iOS/iPadOS)" rel="noopener noreferrer" target="_blank">App Store (iOS/iPadOS) - Wikipedia</a></p><p><br></p><h3>Unmasking Cyber Resilience: The Hidden Gaps That Leave Organizations Vulnerable</h3><p><a href="https://505updates.com/iangarrett/" rel="noopener noreferrer" target="_blank"><strong>🇺🇸 </strong>Ian Garrett, Arlington, Virginia ↗</a></p><p><a href="https://www.csoonline.com/article/3696932/organizations-reporting-cyber-resilience-are-hardly-resilient-study.html" rel="noopener noreferrer" target="_blank">Organizations reporting cyber resilience are hardly resilient: Study | CSO Online</a></p><p><br></p><h3>DOJ Offers Up To $10M Bounty For Russian Cybercriminal That Attacked Hospitals, Police Stations and Civilians in US and Across the World</h3><p><a href="http://505updates.com/olimpiupop/" rel="noopener noreferrer" target="_blank">🇷🇴 Olimpiu Pop, Transylvania, Romania ↗</a></p><p><a href="https://edition.cnn.com/2023/05/16/politics/us-reward-russian-hacker/index.html" rel="noopener noreferrer" target="_blank">CNN Article On Reward for Russian Hacker</a></p><p><a href="https://www.fbi.gov/wanted/cyber/mikhail-pavlovich-matveev" rel="noopener noreferrer" target="_blank">FBI Official Page Of Mikhail Pavlovich Matveev</a></p><p><a href="https://www.justice.gov/opa/pr/russian-national-charged-ransomware-attacks-against-critical-infrastructure#:~:text=Matveev%20is%20charged%20with%20conspiring,over%2020%20years%20in%20prison" rel="noopener noreferrer" target="_blank">The US DOJs official press release about the bounty</a></p><p><a href="https://news.yahoo.com/russian-national-charged-cyberattacks-critical-172513940.html" rel="noopener noreferrer" target="_blank">Yahoo New Article</a></p><p><br></p><h3>FleeceGPT</h3><p><a href="https://505updates.com/katycraig/" rel="noopener noreferrer" target="_blank">🇺🇸 Katy Craig, San Diego, California ↗</a></p><p><a href="https://news.sophos.com/en-us/2023/05/17/fleecegpt-mobile-apps-target-ai-curious-to-rake-in-cash/" rel="noopener noreferrer" target="_blank">“FleeceGPT” mobile apps target AI-curious to rake in cash – Sophos News</a></p><p><a href="https://www.wired.com/story/chatgpt-scams-apple-app-store-google-play/" rel="noopener noreferrer" target="_blank">ChatGPT Scams Are Infiltrating Apple's App Store and Google Play | WIRED</a></p><p><br></p><h3>This Day in Tech History&nbsp;</h3><p><a href="https://505updates.com/marcelbrown/" rel="noopener noreferrer" target="_blank"><strong>🇺🇸</strong> Marcel Brown, St. Louis, Missouri ↗</a></p><p><a href="http://thisdayintechhistory.com/05/19" rel="noopener noreferrer" target="_blank">http://thisdayintechhistory.com/05/19</a></p><p><a href="http://thisdayintechhistory.com/05/20" rel="noopener noreferrer" target="_blank">http://thisdayintechhistory.com/05/20</a></p>]]></content:encoded><link><![CDATA[https://3zozb9fxlbueipjyapmaas.captivate.fm/episode/episode-145-apple-zero-day-fix-apple-app-store-transparency-unmasking-cyber-resilience-bounty-for-russian-cybercriminal-fleecegpt]]></link><guid isPermaLink="false">3e40ca75-4d60-4d47-b95f-72b0e8b7190d</guid><itunes:image href="https://artwork.captivate.fm/6e3e8a1d-2d07-4a56-adec-622345905dfc/M5Hef4782ORTwaQeTuFonA77.png"/><dc:creator><![CDATA[Contributors from Around the World]]></dc:creator><pubDate>Fri, 19 May 2023 16:45:00 -0400</pubDate><enclosure url="https://dts.podtrac.com/redirect.mp3/podcasts.captivate.fm/media/f7557fbc-ab00-4481-9acf-ca5f9ed24ef4/2023-05-19-505-Episode-145-converted.mp3" length="10531126" type="audio/mpeg"/><itunes:duration>14:38</itunes:duration><itunes:explicit>false</itunes:explicit><itunes:episodeType>full</itunes:episodeType><itunes:season>1</itunes:season><itunes:episode>145</itunes:episode><itunes:season>1</itunes:season><podcast:episode>145</podcast:episode><podcast:season>1</podcast:season><itunes:author>Contributors from Around the World</itunes:author></item><item><title>Episode #144 - BurpGPT, Bad Bots, New Phishing Attacks, This Day in Tech</title><itunes:title>Episode #144 - BurpGPT, Bad Bots, New Phishing Attacks, This Day in Tech</itunes:title><description><![CDATA[<p>From the Sourced Network Productions in New York City, it's 5:05 on Thursday, May 18th, 2023. This is your host Mark Miller calling in from White Rock, New Mexico. </p><p>Stories in today's episode come from Edwin Kwan in Sydney, Australia. Katy Craig in San Diego, California, Olimpiu Pop in Transylvania, Romania and Marcel Brown in St. Louis, Missouri. Let's get to it</p>]]></description><content:encoded><![CDATA[<p>From the Sourced Network Productions in New York City, it's 5:05 on Thursday, May 18th, 2023. This is your host Mark Miller calling in from White Rock, New Mexico. </p><p>Stories in today's episode come from Edwin Kwan in Sydney, Australia. Katy Craig in San Diego, California, Olimpiu Pop in Transylvania, Romania and Marcel Brown in St. Louis, Missouri. Let's get to it</p>]]></content:encoded><link><![CDATA[https://3zozb9fxlbueipjyapmaas.captivate.fm/episode/episode-143-burpgpt-bad-bots-new-phishing-attacks-this-day-in-tech]]></link><guid isPermaLink="false">2338604e-da65-4654-ac37-a6279cf2d711</guid><itunes:image href="https://artwork.captivate.fm/33e2a4e7-a936-4ef5-905a-3a72363cfbe4/BkhMbfQsRHQi9QFk9GvnUJSv.png"/><dc:creator><![CDATA[Contributors from Around the World]]></dc:creator><pubDate>Thu, 18 May 2023 16:45:00 -0400</pubDate><enclosure url="https://dts.podtrac.com/redirect.mp3/podcasts.captivate.fm/media/c9219f1f-cc8b-4eb1-b47c-a5d52199e2fe/2023-05-18-Its-505-converted.mp3" length="9008862" type="audio/mpeg"/><itunes:duration>09:23</itunes:duration><itunes:explicit>false</itunes:explicit><itunes:episodeType>full</itunes:episodeType><itunes:season>1</itunes:season><itunes:episode>144</itunes:episode><itunes:season>1</itunes:season><podcast:episode>144</podcast:episode><podcast:season>1</podcast:season><itunes:author>Contributors from Around the World</itunes:author></item><item><title>Episode #143 - Secure WhatsApp Chat, SBOM Bombshell, AI Threat</title><itunes:title>Episode #143 - Secure WhatsApp Chat, SBOM Bombshell, AI Threat</itunes:title><description><![CDATA[<p><strong>Hey, it's 5:05 on Wednesday. May 17th, 2023.</strong> From the Sourced Podcast Network in New York city, this is your host, Pokie Huang. Stories in today's episode come from <strong>Edwin Kwan</strong> in Sydney, Australia, <strong>Olimpiu Pop</strong> in Transylvania, Romania, <strong>Katy Craig</strong> in San Diego, California, <strong>Marcel Brown</strong> in St. Louis, Missouri.&nbsp;</p><p>Let's get to it.&nbsp;</p><h3>Secure WhatsApp Chat Using Password or Biometrics</h3><p><a href="https://505updates.com/edwinkwan/" rel="noopener noreferrer" target="_blank">🇦🇺 Edwin Kwan, Sydney, Australia ↗</a></p><p><a href="https://www.bleepingcomputer.com/news/security/whatsapp-now-lets-you-lock-chats-with-a-password-or-fingerprint/" rel="noopener noreferrer" target="_blank">WhatsApp now lets you lock chats with a password or fingerprint</a></p><h3>SBOM bombshell - three key take aways you need to take from your SBOMs</h3><p><a href="http://505updates.com/olimpiupop/" rel="noopener noreferrer" target="_blank">🇷🇴 Olimpiu Pop, Transylvania, Romania ↗</a></p><p><a href="https://www-securityweek-com.cdn.ampproject.org/c/s/www.securityweek.com/the-sbom-bombshell/amp/" rel="noopener noreferrer" target="_blank">SBOM bombshell - three key takeaways you should take from your SBOMs</a></p><p><br></p><h3>CISA Says AI Threat is Greatest</h3><p><a href="https://505updates.com/katycraig/" rel="noopener noreferrer" target="_blank">🇺🇸 Katy Craig, San Diego, California ↗</a></p><p><a href="https://cyberscoop.com/easterly-warning-weapons-artificial-intelligence-chatgpt/" rel="noopener noreferrer" target="_blank">Top US cyber official warns AI may be the 'most powerful weapon of our time' | CyberScoop</a></p><p><a href="https://www.vanderbilt.edu/modern-conflict/" rel="noopener noreferrer" target="_blank">Summit on Modern Conflict and Emerging Threats | Vanderbilt University</a></p><p><br></p><h3>This Day in Tech History&nbsp;</h3><p><a href="https://505updates.com/marcelbrown/" rel="noopener noreferrer" target="_blank"><strong>🇺🇸</strong> Marcel Brown, St. Louis, Missouri ↗</a></p><p><a href="http://thisdayintechhistory.com/05/17" rel="noopener noreferrer" target="_blank">http://thisdayintechhistory.com/05/17</a></p>]]></description><content:encoded><![CDATA[<p><strong>Hey, it's 5:05 on Wednesday. May 17th, 2023.</strong> From the Sourced Podcast Network in New York city, this is your host, Pokie Huang. Stories in today's episode come from <strong>Edwin Kwan</strong> in Sydney, Australia, <strong>Olimpiu Pop</strong> in Transylvania, Romania, <strong>Katy Craig</strong> in San Diego, California, <strong>Marcel Brown</strong> in St. Louis, Missouri.&nbsp;</p><p>Let's get to it.&nbsp;</p><h3>Secure WhatsApp Chat Using Password or Biometrics</h3><p><a href="https://505updates.com/edwinkwan/" rel="noopener noreferrer" target="_blank">🇦🇺 Edwin Kwan, Sydney, Australia ↗</a></p><p><a href="https://www.bleepingcomputer.com/news/security/whatsapp-now-lets-you-lock-chats-with-a-password-or-fingerprint/" rel="noopener noreferrer" target="_blank">WhatsApp now lets you lock chats with a password or fingerprint</a></p><h3>SBOM bombshell - three key take aways you need to take from your SBOMs</h3><p><a href="http://505updates.com/olimpiupop/" rel="noopener noreferrer" target="_blank">🇷🇴 Olimpiu Pop, Transylvania, Romania ↗</a></p><p><a href="https://www-securityweek-com.cdn.ampproject.org/c/s/www.securityweek.com/the-sbom-bombshell/amp/" rel="noopener noreferrer" target="_blank">SBOM bombshell - three key takeaways you should take from your SBOMs</a></p><p><br></p><h3>CISA Says AI Threat is Greatest</h3><p><a href="https://505updates.com/katycraig/" rel="noopener noreferrer" target="_blank">🇺🇸 Katy Craig, San Diego, California ↗</a></p><p><a href="https://cyberscoop.com/easterly-warning-weapons-artificial-intelligence-chatgpt/" rel="noopener noreferrer" target="_blank">Top US cyber official warns AI may be the 'most powerful weapon of our time' | CyberScoop</a></p><p><a href="https://www.vanderbilt.edu/modern-conflict/" rel="noopener noreferrer" target="_blank">Summit on Modern Conflict and Emerging Threats | Vanderbilt University</a></p><p><br></p><h3>This Day in Tech History&nbsp;</h3><p><a href="https://505updates.com/marcelbrown/" rel="noopener noreferrer" target="_blank"><strong>🇺🇸</strong> Marcel Brown, St. Louis, Missouri ↗</a></p><p><a href="http://thisdayintechhistory.com/05/17" rel="noopener noreferrer" target="_blank">http://thisdayintechhistory.com/05/17</a></p>]]></content:encoded><link><![CDATA[https://3zozb9fxlbueipjyapmaas.captivate.fm/episode/episode-143-secure-whatsapp-chat-sbom-bombshell-ai-threat]]></link><guid isPermaLink="false">caf41677-9eac-440a-8941-4ec10b5d6012</guid><itunes:image href="https://artwork.captivate.fm/8b838a44-a9d6-4dd8-87cf-70c35fe0ab01/tBP8sE43arwYMjwTZ2wnfn2K.png"/><dc:creator><![CDATA[Contributors from Around the World]]></dc:creator><pubDate>Wed, 17 May 2023 16:45:00 -0400</pubDate><enclosure url="https://dts.podtrac.com/redirect.mp3/podcasts.captivate.fm/media/dd435c88-fd13-4d44-8aa0-dc90e5a4bc90/2023-05-17-505-Episode-143-v2-converted.mp3" length="6038719" type="audio/mpeg"/><itunes:duration>08:23</itunes:duration><itunes:explicit>false</itunes:explicit><itunes:episodeType>full</itunes:episodeType><itunes:season>1</itunes:season><itunes:episode>143</itunes:episode><itunes:season>1</itunes:season><podcast:episode>143</podcast:episode><podcast:season>1</podcast:season><itunes:author>Contributors from Around the World</itunes:author></item><item><title>Episode #142 - AI Content Copyright, QR Code Scams, AI Girlfriend</title><itunes:title>Episode #142 - AI Content Copyright, QR Code Scams, AI Girlfriend</itunes:title><description><![CDATA[<p><strong>Hey, it’s 5:05 on Monday, May 15th, 2023.</strong> From the Sourced Podcast Network in New York city, this is your host, Pokie Huang. Stories in today’s episode come from <strong>Mark Miller</strong> in New York City, <strong>Edwin Kwan</strong> in Sydney, Australia, <strong>Katy Craig</strong> in San Diego, California, <strong>Marcel Brown</strong> in St. Louis, Missouri.&nbsp;</p><p>Let’s get to it.&nbsp;</p><p><br></p><h3>Do You Own Your Own Content Anymore?</h3><p><a href="https://505updates.com/markmiller/" rel="noopener noreferrer" target="_blank">🇺🇸 Mark Miller, New York City↗</a></p><p><a href="https://apps.oyez.org/player/#/roberts13/oral_argument_audio/25397" rel="noopener noreferrer" target="_blank">https://apps.oyez.org/player/#/roberts13/oral_argument_audio/25397</a></p><p><a href="https://whatsinmyeula.com/ai-and-chat-engines/" rel="noopener noreferrer" target="_blank">https://whatsinmyeula.com/ai-and-chat-engines/</a></p><p><br></p><h3>Financial Scams using QR Codes on the Rise</h3><p><a href="https://505updates.com/edwinkwan/" rel="noopener noreferrer" target="_blank">🇦🇺 Edwin Kwan, Sydney, Australia ↗</a></p><p><a href="https://www.bleepingcomputer.com/news/security/qr-codes-used-in-fake-parking-tickets-surveys-to-steal-your-money/" rel="noopener noreferrer" target="_blank">https://www.bleepingcomputer.com/news/security/qr-codes-used-in-fake-parking-tickets-surveys-to-steal-your-money/</a></p><p><br></p><h3>AI Girlfriend Goes Rogue</h3><p><a href="https://505updates.com/katycraig/" rel="noopener noreferrer" target="_blank">🇺🇸 Katy Craig, San Diego, California ↗</a></p><p><a href="https://www.insider.com/carynai-ai-virtual-girlfriend-chat-gpt-rogue-filthy-things-influencer-2023-5" rel="noopener noreferrer" target="_blank">Influencer: AI 'Girlfriend' Gone Rogue, Says Sexually Explicit Things</a></p><p><a href="https://futurism.com/influencer-ai-girlfriend-rent" rel="noopener noreferrer" target="_blank">Influencer Creates AI Version of Herself That You Can Rent as a Girlfriend</a></p><p><a href="https://fortune.com/2023/05/09/snapchat-influencer-launches-carynai-virtual-girlfriend-bot-openai-gpt4/" rel="noopener noreferrer" target="_blank">Snapchat influencer launches CarynAI virtual girlfriend powered by OpenAI tech | Fortune</a></p><p><br></p><h3>This Day in Tech History&nbsp;</h3><p><a href="https://505updates.com/marcelbrown/" rel="noopener noreferrer" target="_blank"><strong>🇺🇸</strong> Marcel Brown, St. Louis, Missouri ↗</a></p><p><a href="http://thisdayintechhistory.com/05/16" rel="noopener noreferrer" target="_blank">http://thisdayintechhistory.com/05/16</a></p><p><br></p>]]></description><content:encoded><![CDATA[<p><strong>Hey, it’s 5:05 on Monday, May 15th, 2023.</strong> From the Sourced Podcast Network in New York city, this is your host, Pokie Huang. Stories in today’s episode come from <strong>Mark Miller</strong> in New York City, <strong>Edwin Kwan</strong> in Sydney, Australia, <strong>Katy Craig</strong> in San Diego, California, <strong>Marcel Brown</strong> in St. Louis, Missouri.&nbsp;</p><p>Let’s get to it.&nbsp;</p><p><br></p><h3>Do You Own Your Own Content Anymore?</h3><p><a href="https://505updates.com/markmiller/" rel="noopener noreferrer" target="_blank">🇺🇸 Mark Miller, New York City↗</a></p><p><a href="https://apps.oyez.org/player/#/roberts13/oral_argument_audio/25397" rel="noopener noreferrer" target="_blank">https://apps.oyez.org/player/#/roberts13/oral_argument_audio/25397</a></p><p><a href="https://whatsinmyeula.com/ai-and-chat-engines/" rel="noopener noreferrer" target="_blank">https://whatsinmyeula.com/ai-and-chat-engines/</a></p><p><br></p><h3>Financial Scams using QR Codes on the Rise</h3><p><a href="https://505updates.com/edwinkwan/" rel="noopener noreferrer" target="_blank">🇦🇺 Edwin Kwan, Sydney, Australia ↗</a></p><p><a href="https://www.bleepingcomputer.com/news/security/qr-codes-used-in-fake-parking-tickets-surveys-to-steal-your-money/" rel="noopener noreferrer" target="_blank">https://www.bleepingcomputer.com/news/security/qr-codes-used-in-fake-parking-tickets-surveys-to-steal-your-money/</a></p><p><br></p><h3>AI Girlfriend Goes Rogue</h3><p><a href="https://505updates.com/katycraig/" rel="noopener noreferrer" target="_blank">🇺🇸 Katy Craig, San Diego, California ↗</a></p><p><a href="https://www.insider.com/carynai-ai-virtual-girlfriend-chat-gpt-rogue-filthy-things-influencer-2023-5" rel="noopener noreferrer" target="_blank">Influencer: AI 'Girlfriend' Gone Rogue, Says Sexually Explicit Things</a></p><p><a href="https://futurism.com/influencer-ai-girlfriend-rent" rel="noopener noreferrer" target="_blank">Influencer Creates AI Version of Herself That You Can Rent as a Girlfriend</a></p><p><a href="https://fortune.com/2023/05/09/snapchat-influencer-launches-carynai-virtual-girlfriend-bot-openai-gpt4/" rel="noopener noreferrer" target="_blank">Snapchat influencer launches CarynAI virtual girlfriend powered by OpenAI tech | Fortune</a></p><p><br></p><h3>This Day in Tech History&nbsp;</h3><p><a href="https://505updates.com/marcelbrown/" rel="noopener noreferrer" target="_blank"><strong>🇺🇸</strong> Marcel Brown, St. Louis, Missouri ↗</a></p><p><a href="http://thisdayintechhistory.com/05/16" rel="noopener noreferrer" target="_blank">http://thisdayintechhistory.com/05/16</a></p><p><br></p>]]></content:encoded><link><![CDATA[https://3zozb9fxlbueipjyapmaas.captivate.fm/episode/episode-142-ai-content-copyright-qr-code-scams-ai-girlfriend]]></link><guid isPermaLink="false">6b3b7dbc-c7c1-44ff-be2f-c2ec47465682</guid><itunes:image href="https://artwork.captivate.fm/a4e88ecc-de3a-4142-946d-6a391833b9f6/4_rAzoqyRvEEfe433_H8-dq_.png"/><dc:creator><![CDATA[Contributors from Around the World]]></dc:creator><pubDate>Tue, 16 May 2023 16:45:00 -0400</pubDate><enclosure url="https://dts.podtrac.com/redirect.mp3/podcasts.captivate.fm/media/cf94769f-828d-4e95-9d94-a5dac96e7b4a/2023-05-16-505-Episode-142-converted.mp3" length="7407718" type="audio/mpeg"/><itunes:duration>10:17</itunes:duration><itunes:explicit>false</itunes:explicit><itunes:episodeType>full</itunes:episodeType><itunes:season>1</itunes:season><itunes:episode>142</itunes:episode><itunes:season>1</itunes:season><podcast:episode>142</podcast:episode><podcast:season>1</podcast:season><itunes:author>Contributors from Around the World</itunes:author></item><item><title>Episode #141 - Trusted News Sources, Staying Under The Radar Online, NextGen Data Breach</title><itunes:title>Episode #141 - Trusted News Sources, Staying Under The Radar Online, NextGen Data Breach</itunes:title><description><![CDATA[<p><strong>Hey, it's 5:05 on Monday, May 15th, 2023.</strong> From the Sourced Podcast Network in New York city, this is your host, Pokie Huang. Stories in today's episode come from <strong>Mark Miller</strong> in New York City, <strong>Katy Craig</strong> in San Diego, California, <strong>Edwin Kwan</strong> in Sydney, Australia, <strong>Marcel Brown</strong> in St. Louis, Missouri.&nbsp;</p><p>Let's get to it.&nbsp;</p><p><br></p><h3>Highlighting trusted news sources</h3><p><a href="https://505updates.com/markmiller/" rel="noopener noreferrer" target="_blank">🇺🇸 Mark Miller, New York City↗</a></p><p><a href="https://www.bleepingcomputer.com/" rel="noopener noreferrer" target="_blank">Bleeping Computer</a></p><p><a href="https://zetter.substack.com/" rel="noopener noreferrer" target="_blank">Zero Day | Kim Zetter | Substack</a></p><p><a href="https://krebsonsecurity.com/" rel="noopener noreferrer" target="_blank">Krebs on Security</a></p><p><a href="https://www.theverge.com/" rel="noopener noreferrer" target="_blank">The Verge</a></p><p><a href="https://slate.com/" rel="noopener noreferrer" target="_blank">Slate Magazine</a></p><p><br></p><h3>5 Simple Strategies for Staying Under The Radar Online</h3><p><a href="https://505updates.com/edwinkwan/" rel="noopener noreferrer" target="_blank">🇦🇺 Edwin Kwan, Sydney, Australia ↗</a></p><p><a href="https://www.welivesecurity.com/2023/05/10/stealth-mode-5-simple-strategies-staying-under-radar-online/" rel="noopener noreferrer" target="_blank">Turning on stealth mode: 5 simple strategies for staying under the radar online | WeLiveSecurity</a></p><p><br></p><h3>NextGen Data Breach</h3><p><a href="https://505updates.com/katycraig/" rel="noopener noreferrer" target="_blank">🇺🇸 Katy Craig, San Diego, California ↗</a></p><p><a href="https://techcrunch.com/2023/05/08/nextgen-healthcare-data-breach/" rel="noopener noreferrer" target="_blank">NextGen Healthcare says hackers accessed personal data of more than 1 million patients | TechCrunch</a></p><p><a href="https://www.darkreading.com/application-security/1m-nextgen-healthcare-patient-records-stolen-" rel="noopener noreferrer" target="_blank">1M NextGen Patient Records Compromised in Data Breach</a></p><p><a href="https://apps.web.maine.gov/online/aeviewer/ME/40/cb1d4654-0ce0-4e59-9eec-24391249e2a8.shtml" rel="noopener noreferrer" target="_blank">Data Breach Notifications</a></p><p><br></p><h3>This Day in Tech History&nbsp;</h3><p><a href="https://505updates.com/marcelbrown/" rel="noopener noreferrer" target="_blank"><strong>🇺🇸</strong> Marcel Brown, St. Louis, Missouri ↗</a></p><p><a href="http://thisdayintechhistory.com/05/14" rel="noopener noreferrer" target="_blank">http://thisdayintechhistory.com/05/14</a></p><p><a href="http://thisdayintechhistory.com/05/15" rel="noopener noreferrer" target="_blank">http://thisdayintechhistory.com/05/15</a></p><p><br></p>]]></description><content:encoded><![CDATA[<p><strong>Hey, it's 5:05 on Monday, May 15th, 2023.</strong> From the Sourced Podcast Network in New York city, this is your host, Pokie Huang. Stories in today's episode come from <strong>Mark Miller</strong> in New York City, <strong>Katy Craig</strong> in San Diego, California, <strong>Edwin Kwan</strong> in Sydney, Australia, <strong>Marcel Brown</strong> in St. Louis, Missouri.&nbsp;</p><p>Let's get to it.&nbsp;</p><p><br></p><h3>Highlighting trusted news sources</h3><p><a href="https://505updates.com/markmiller/" rel="noopener noreferrer" target="_blank">🇺🇸 Mark Miller, New York City↗</a></p><p><a href="https://www.bleepingcomputer.com/" rel="noopener noreferrer" target="_blank">Bleeping Computer</a></p><p><a href="https://zetter.substack.com/" rel="noopener noreferrer" target="_blank">Zero Day | Kim Zetter | Substack</a></p><p><a href="https://krebsonsecurity.com/" rel="noopener noreferrer" target="_blank">Krebs on Security</a></p><p><a href="https://www.theverge.com/" rel="noopener noreferrer" target="_blank">The Verge</a></p><p><a href="https://slate.com/" rel="noopener noreferrer" target="_blank">Slate Magazine</a></p><p><br></p><h3>5 Simple Strategies for Staying Under The Radar Online</h3><p><a href="https://505updates.com/edwinkwan/" rel="noopener noreferrer" target="_blank">🇦🇺 Edwin Kwan, Sydney, Australia ↗</a></p><p><a href="https://www.welivesecurity.com/2023/05/10/stealth-mode-5-simple-strategies-staying-under-radar-online/" rel="noopener noreferrer" target="_blank">Turning on stealth mode: 5 simple strategies for staying under the radar online | WeLiveSecurity</a></p><p><br></p><h3>NextGen Data Breach</h3><p><a href="https://505updates.com/katycraig/" rel="noopener noreferrer" target="_blank">🇺🇸 Katy Craig, San Diego, California ↗</a></p><p><a href="https://techcrunch.com/2023/05/08/nextgen-healthcare-data-breach/" rel="noopener noreferrer" target="_blank">NextGen Healthcare says hackers accessed personal data of more than 1 million patients | TechCrunch</a></p><p><a href="https://www.darkreading.com/application-security/1m-nextgen-healthcare-patient-records-stolen-" rel="noopener noreferrer" target="_blank">1M NextGen Patient Records Compromised in Data Breach</a></p><p><a href="https://apps.web.maine.gov/online/aeviewer/ME/40/cb1d4654-0ce0-4e59-9eec-24391249e2a8.shtml" rel="noopener noreferrer" target="_blank">Data Breach Notifications</a></p><p><br></p><h3>This Day in Tech History&nbsp;</h3><p><a href="https://505updates.com/marcelbrown/" rel="noopener noreferrer" target="_blank"><strong>🇺🇸</strong> Marcel Brown, St. Louis, Missouri ↗</a></p><p><a href="http://thisdayintechhistory.com/05/14" rel="noopener noreferrer" target="_blank">http://thisdayintechhistory.com/05/14</a></p><p><a href="http://thisdayintechhistory.com/05/15" rel="noopener noreferrer" target="_blank">http://thisdayintechhistory.com/05/15</a></p><p><br></p>]]></content:encoded><link><![CDATA[https://3zozb9fxlbueipjyapmaas.captivate.fm/episode/episode-141-trusted-news-sources-staying-under-the-radar-online-nextgen-data-breach]]></link><guid isPermaLink="false">1ef02a0c-0fed-4bb4-9d1a-f55593d2a1f2</guid><itunes:image href="https://artwork.captivate.fm/4d498241-b176-432c-b853-3cf5192ccc1a/Dnb2bqMVaauQ6JUMxk_PfQk8.png"/><dc:creator><![CDATA[Contributors from Around the World]]></dc:creator><pubDate>Mon, 15 May 2023 16:45:00 -0400</pubDate><enclosure url="https://dts.podtrac.com/redirect.mp3/podcasts.captivate.fm/media/9e308182-8d04-4034-a3ac-8fdd81dcd4c2/2023-05-15-505-Episode-141-converted.mp3" length="7084139" type="audio/mpeg"/><itunes:duration>09:50</itunes:duration><itunes:explicit>false</itunes:explicit><itunes:episodeType>full</itunes:episodeType><itunes:season>1</itunes:season><itunes:episode>141</itunes:episode><itunes:season>1</itunes:season><podcast:episode>141</podcast:episode><podcast:season>1</podcast:season><itunes:author>Contributors from Around the World</itunes:author></item><item><title>Episode #140 - Gmail Dark Web Monitoring, RSAC Interview - Anil Karmel, Dragos Breach</title><itunes:title>Episode #140 - Gmail Dark Web Monitoring, RSAC Interview - Anil Karmel, Dragos Breach</itunes:title><description><![CDATA[<p><strong>Hey, it's 5:05 on Friday, May 12th, 2023.</strong> From the Sourced Podcast Network in New York City this is your host, Pokie Huang. Stories in today's episode come from <strong>Edwin Kwan</strong> in Sydney, Australia, <strong>Katy Craig</strong> in San Diego, California, <strong>Derek Weeks</strong> in Bethesda, Maryland, <strong>Marcel Brown</strong> in St. Louis, Missouri.&nbsp;</p><p>Let’s get to it.&nbsp;</p><h3>Dark Web Monitoring for US Based Gmail Users</h3><p><a href="https://505updates.com/edwinkwan/" rel="noopener noreferrer" target="_blank">🇦🇺 Edwin Kwan, Sydney, Australia ↗</a></p><p><a href="https://www.bleepingcomputer.com/news/google/google-brings-dark-web-monitoring-to-all-us-gmail-users/" rel="noopener noreferrer" target="_blank">Google brings dark web monitoring to all U.S. Gmail users</a></p><h3>RSAC Interview: Anil Karmel&nbsp;</h3><p><a href="https://505updates.com/katycraig/" rel="noopener noreferrer" target="_blank">🇺🇸 Katy Craig, San Diego, California ↗</a></p><h3>Dragos Breach</h3><p><a href="https://505updates.com/derekweeks/" rel="noopener noreferrer" target="_blank"><strong>🇺🇸</strong> Derek Weeks, Bethesda Maryland ↗</a></p><p><a href="https://www.dragos.com/blog/deconstructing-a-cybersecurity-event/" rel="noopener noreferrer" target="_blank">Deconstructing a Cybersecurity Event | Dragos</a></p><h3>This Day in Tech History&nbsp;</h3><p><a href="https://505updates.com/marcelbrown/" rel="noopener noreferrer" target="_blank"><strong>🇺🇸</strong> Marcel Brown, St. Louis, Missouri ↗</a></p><p><a href="http://thisdayintechhistory.com/05/12" rel="noopener noreferrer" target="_blank">http://thisdayintechhistory.com/05/12</a></p><p><a href="http://thisdayintechhistory.com/05/13" rel="noopener noreferrer" target="_blank">http://thisdayintechhistory.com/05/13</a></p>]]></description><content:encoded><![CDATA[<p><strong>Hey, it's 5:05 on Friday, May 12th, 2023.</strong> From the Sourced Podcast Network in New York City this is your host, Pokie Huang. Stories in today's episode come from <strong>Edwin Kwan</strong> in Sydney, Australia, <strong>Katy Craig</strong> in San Diego, California, <strong>Derek Weeks</strong> in Bethesda, Maryland, <strong>Marcel Brown</strong> in St. Louis, Missouri.&nbsp;</p><p>Let’s get to it.&nbsp;</p><h3>Dark Web Monitoring for US Based Gmail Users</h3><p><a href="https://505updates.com/edwinkwan/" rel="noopener noreferrer" target="_blank">🇦🇺 Edwin Kwan, Sydney, Australia ↗</a></p><p><a href="https://www.bleepingcomputer.com/news/google/google-brings-dark-web-monitoring-to-all-us-gmail-users/" rel="noopener noreferrer" target="_blank">Google brings dark web monitoring to all U.S. Gmail users</a></p><h3>RSAC Interview: Anil Karmel&nbsp;</h3><p><a href="https://505updates.com/katycraig/" rel="noopener noreferrer" target="_blank">🇺🇸 Katy Craig, San Diego, California ↗</a></p><h3>Dragos Breach</h3><p><a href="https://505updates.com/derekweeks/" rel="noopener noreferrer" target="_blank"><strong>🇺🇸</strong> Derek Weeks, Bethesda Maryland ↗</a></p><p><a href="https://www.dragos.com/blog/deconstructing-a-cybersecurity-event/" rel="noopener noreferrer" target="_blank">Deconstructing a Cybersecurity Event | Dragos</a></p><h3>This Day in Tech History&nbsp;</h3><p><a href="https://505updates.com/marcelbrown/" rel="noopener noreferrer" target="_blank"><strong>🇺🇸</strong> Marcel Brown, St. Louis, Missouri ↗</a></p><p><a href="http://thisdayintechhistory.com/05/12" rel="noopener noreferrer" target="_blank">http://thisdayintechhistory.com/05/12</a></p><p><a href="http://thisdayintechhistory.com/05/13" rel="noopener noreferrer" target="_blank">http://thisdayintechhistory.com/05/13</a></p>]]></content:encoded><link><![CDATA[https://3zozb9fxlbueipjyapmaas.captivate.fm/episode/episode-140-gmail-dark-web-monitoring-rsac-interview-anil-karmel-dragos-breach]]></link><guid isPermaLink="false">985f283c-6a23-466a-ba55-fd89433d7243</guid><itunes:image href="https://artwork.captivate.fm/47d16ba6-37ff-4358-b135-231ef3a79922/wz3gsxFME7CO_sx7fymRkOuK.png"/><dc:creator><![CDATA[Contributors from Around the World]]></dc:creator><pubDate>Fri, 12 May 2023 16:45:00 -0400</pubDate><enclosure url="https://dts.podtrac.com/redirect.mp3/podcasts.captivate.fm/media/2eae5169-83c9-45b7-8156-0cc31cf35d84/2023-05-12-505-Episode-140-converted.mp3" length="9805367" type="audio/mpeg"/><itunes:duration>13:37</itunes:duration><itunes:explicit>false</itunes:explicit><itunes:episodeType>full</itunes:episodeType><itunes:season>1</itunes:season><itunes:episode>140</itunes:episode><itunes:season>1</itunes:season><podcast:episode>140</podcast:episode><podcast:season>1</podcast:season><itunes:author>Contributors from Around the World</itunes:author></item><item><title>Episode #139 - Twitter Leaks Private Tweets, Github Protects Secrets, Zero Trust API</title><itunes:title>Episode #139 - Twitter Leaks Private Tweets, Github Protects Secrets, Zero Trust API</itunes:title><description><![CDATA[<p><strong>Hey, it's 5:05 on Thursday, May 11th, 2023.</strong> From the Sourced Podcast Network in New York city, this is your host, Pokie Huang.&nbsp;Stories in today's episode come from <strong>Edwin Kwan</strong> in Sydney, Australia, <strong>Chris Hughes</strong> in Virginia Beach, Virginia, <strong>Katy Craig</strong> in San Diego, California and <strong>Marcel brown</strong> in St. Louis, Missouri.&nbsp;</p><p>Let's get to it.&nbsp;</p><h3>Twitter Security Incident Results in Data Leak of Private Tweets</h3><p><a href="https://505updates.com/edwinkwan/" rel="noopener noreferrer" target="_blank">🇦🇺 Edwin Kwan, Sydney, Australia ↗</a></p><p><a href="https://www.businessinsider.com/twitter-circle-security-incident-made-private-tweets-public-2023-5" rel="noopener noreferrer" target="_blank">Twitter admits some private Circle tweets were accidentally made public due to 'security incident'</a></p><h3>GitHub Automatically Protects Secrets</h3><p><a href="https://505updates.com/chrishughes/" rel="noopener noreferrer" target="_blank">🇺🇸 Chris Hughes, Virginia Beach, Virginia ↗</a></p><p><a href="https://www.bleepingcomputer.com/news/security/github-now-auto-blocks-token-and-api-key-leaks-for-all-repos/amp/" rel="noopener noreferrer" target="_blank">GitHub now auto-blocks token and API key leaks for all repos</a></p><h3>Zero Trust API Access</h3><p><a href="https://505updates.com/katycraig/" rel="noopener noreferrer" target="_blank">🇺🇸 Katy Craig, San Diego, California ↗</a></p><p><a href="https://www.traceable.ai/" rel="noopener noreferrer" target="_blank">https://www.traceable.ai/</a></p><h3>This Day in Tech History&nbsp;</h3><p><a href="https://505updates.com/marcelbrown/" rel="noopener noreferrer" target="_blank"><strong>🇺🇸</strong> Marcel Brown, St. Louis, Missouri ↗</a></p><p><a href="http://thisdayintechhistory.com/05/11" rel="noopener noreferrer" target="_blank">http://thisdayintechhistory.com/05/11</a></p>]]></description><content:encoded><![CDATA[<p><strong>Hey, it's 5:05 on Thursday, May 11th, 2023.</strong> From the Sourced Podcast Network in New York city, this is your host, Pokie Huang.&nbsp;Stories in today's episode come from <strong>Edwin Kwan</strong> in Sydney, Australia, <strong>Chris Hughes</strong> in Virginia Beach, Virginia, <strong>Katy Craig</strong> in San Diego, California and <strong>Marcel brown</strong> in St. Louis, Missouri.&nbsp;</p><p>Let's get to it.&nbsp;</p><h3>Twitter Security Incident Results in Data Leak of Private Tweets</h3><p><a href="https://505updates.com/edwinkwan/" rel="noopener noreferrer" target="_blank">🇦🇺 Edwin Kwan, Sydney, Australia ↗</a></p><p><a href="https://www.businessinsider.com/twitter-circle-security-incident-made-private-tweets-public-2023-5" rel="noopener noreferrer" target="_blank">Twitter admits some private Circle tweets were accidentally made public due to 'security incident'</a></p><h3>GitHub Automatically Protects Secrets</h3><p><a href="https://505updates.com/chrishughes/" rel="noopener noreferrer" target="_blank">🇺🇸 Chris Hughes, Virginia Beach, Virginia ↗</a></p><p><a href="https://www.bleepingcomputer.com/news/security/github-now-auto-blocks-token-and-api-key-leaks-for-all-repos/amp/" rel="noopener noreferrer" target="_blank">GitHub now auto-blocks token and API key leaks for all repos</a></p><h3>Zero Trust API Access</h3><p><a href="https://505updates.com/katycraig/" rel="noopener noreferrer" target="_blank">🇺🇸 Katy Craig, San Diego, California ↗</a></p><p><a href="https://www.traceable.ai/" rel="noopener noreferrer" target="_blank">https://www.traceable.ai/</a></p><h3>This Day in Tech History&nbsp;</h3><p><a href="https://505updates.com/marcelbrown/" rel="noopener noreferrer" target="_blank"><strong>🇺🇸</strong> Marcel Brown, St. Louis, Missouri ↗</a></p><p><a href="http://thisdayintechhistory.com/05/11" rel="noopener noreferrer" target="_blank">http://thisdayintechhistory.com/05/11</a></p>]]></content:encoded><link><![CDATA[https://3zozb9fxlbueipjyapmaas.captivate.fm/episode/episode-139-twitter-leaks-private-tweets-github-protects-secrets-zero-trust-api]]></link><guid isPermaLink="false">9b51ee96-f019-43c5-8ddc-73083e6322a4</guid><itunes:image href="https://artwork.captivate.fm/0d3c378e-a64f-4c89-8dd4-e030b6766258/ISbJLpjpPZ-9Fosf1qgCGJFa.png"/><dc:creator><![CDATA[Contributors from Around the World]]></dc:creator><pubDate>Thu, 11 May 2023 16:45:00 -0400</pubDate><enclosure url="https://dts.podtrac.com/redirect.mp3/podcasts.captivate.fm/media/27ca1c46-42ce-4ac5-940b-99b4ecad7883/2023-05-11-505-Episode-139-converted.mp3" length="7111490" type="audio/mpeg"/><itunes:duration>09:53</itunes:duration><itunes:explicit>false</itunes:explicit><itunes:episodeType>full</itunes:episodeType><itunes:season>1</itunes:season><itunes:episode>139</itunes:episode><itunes:season>1</itunes:season><podcast:episode>139</podcast:episode><podcast:season>1</podcast:season><itunes:author>Contributors from Around the World</itunes:author></item><item><title>Episode #138 - Sydney Cancer Treatment Center Data Breach, AI Hacking Skills, Spot Dog, AST</title><itunes:title>Episode #138 - Sydney Cancer Treatment Center Data Breach, AI Hacking Skills, Spot Dog, AST</itunes:title><description><![CDATA[<p><strong>Hey, it's 5:05 on Wednesday, May 10th, 2023</strong>. From the Sourced Podcast Network in New York city, this is your host, Pokie Huang. Stories in today's episode come from <strong>Edwin Kwan</strong> in Sydney, Australia, <strong>Shannon Lietz</strong> in San Diego, California, <strong>Katy Craig</strong> in San Diego, California, <strong>Olimpiu Pop</strong>, in Transylvania, Romania, and <strong>Marcel brown</strong> in St. Louis, Missouri.&nbsp;</p><p>Let's get to it.</p><h3>Sydney Cancer Treatment Center Suffers Data Breach</h3><p><a href="https://505updates.com/edwinkwan/" rel="noopener noreferrer" target="_blank">🇦🇺 Edwin Kwan, Sydney, Australia ↗</a></p><p><a href="https://www.abc.net.au/news/2023-05-04/crown-princess-mary-cancer-centre-being-hacked/102305996" rel="noopener noreferrer" target="_blank">Crown Princess Mary Cancer Centre in Westmead Hospital in cyber attack, hackers threatening to release stolen data - ABC News</a></p><h3>It’s Time To Brush Up On Your AI Hacking Skills</h3><p><a href="https://505updates.com/shannonlietz/" rel="noopener noreferrer" target="_blank"><strong>🇺🇸</strong> Shannon Lietz, San Diego, California ↗</a></p><p><a href="https://www.whitehouse.gov/briefing-room/statements-releases/2023/05/04/fact-sheet-biden-harris-administration-announces-new-actions-to-promote-responsible-ai-innovation-that-protects-americans-rights-and-safety/" rel="noopener noreferrer" target="_blank">FACT SHEET: Biden-Harris Administration Announces New Actions to Promote Responsible AI Innovation that Protects Americans’ Rights and Safety | The White House</a></p><h3>Spot Gets a GPT Upgrade</h3><p><a href="https://505updates.com/katycraig/" rel="noopener noreferrer" target="_blank">🇺🇸 Katy Craig, San Diego, California ↗</a></p><p><a href="https://twitter.com/svpino/status/1650832349008125952" rel="noopener noreferrer" target="_blank">We integrated ChatGPT with our robots. We had a ton of fun building this! Read on for the details</a></p><p><a href="https://www.fastcompany.com/90889271/boston-dynamics-spot-chatgpt-brains" rel="noopener noreferrer" target="_blank">Boston Dynamics robodog just got a ChatGPT brain. May it have mercy upon our souls</a></p><h3>AST Which One Should Use To Protect Your System?</h3><p><a href="http://505updates.com/olimpiupop/" rel="noopener noreferrer" target="_blank">🇷🇴 Olimpiu Pop, Transylvania, Romania ↗</a></p><p><a href="https://blog.sonatype.com/the-impact-of-security-testing-on-an-organization" rel="noopener noreferrer" target="_blank">The Impact of Security Testing on an Organization</a></p><h3>This Day in Tech History&nbsp;</h3><p><a href="https://505updates.com/marcelbrown/" rel="noopener noreferrer" target="_blank"><strong>🇺🇸</strong> Marcel Brown, St. Louis, Missouri ↗</a></p><p><a href="http://thisdayintechhistory.com/05/09" rel="noopener noreferrer" target="_blank">http://thisdayintechhistory.com/05/09</a></p><p><a href="http://thisdayintechhistory.com/05/10" rel="noopener noreferrer" target="_blank">http://thisdayintechhistory.com/05/10</a></p>]]></description><content:encoded><![CDATA[<p><strong>Hey, it's 5:05 on Wednesday, May 10th, 2023</strong>. From the Sourced Podcast Network in New York city, this is your host, Pokie Huang. Stories in today's episode come from <strong>Edwin Kwan</strong> in Sydney, Australia, <strong>Shannon Lietz</strong> in San Diego, California, <strong>Katy Craig</strong> in San Diego, California, <strong>Olimpiu Pop</strong>, in Transylvania, Romania, and <strong>Marcel brown</strong> in St. Louis, Missouri.&nbsp;</p><p>Let's get to it.</p><h3>Sydney Cancer Treatment Center Suffers Data Breach</h3><p><a href="https://505updates.com/edwinkwan/" rel="noopener noreferrer" target="_blank">🇦🇺 Edwin Kwan, Sydney, Australia ↗</a></p><p><a href="https://www.abc.net.au/news/2023-05-04/crown-princess-mary-cancer-centre-being-hacked/102305996" rel="noopener noreferrer" target="_blank">Crown Princess Mary Cancer Centre in Westmead Hospital in cyber attack, hackers threatening to release stolen data - ABC News</a></p><h3>It’s Time To Brush Up On Your AI Hacking Skills</h3><p><a href="https://505updates.com/shannonlietz/" rel="noopener noreferrer" target="_blank"><strong>🇺🇸</strong> Shannon Lietz, San Diego, California ↗</a></p><p><a href="https://www.whitehouse.gov/briefing-room/statements-releases/2023/05/04/fact-sheet-biden-harris-administration-announces-new-actions-to-promote-responsible-ai-innovation-that-protects-americans-rights-and-safety/" rel="noopener noreferrer" target="_blank">FACT SHEET: Biden-Harris Administration Announces New Actions to Promote Responsible AI Innovation that Protects Americans’ Rights and Safety | The White House</a></p><h3>Spot Gets a GPT Upgrade</h3><p><a href="https://505updates.com/katycraig/" rel="noopener noreferrer" target="_blank">🇺🇸 Katy Craig, San Diego, California ↗</a></p><p><a href="https://twitter.com/svpino/status/1650832349008125952" rel="noopener noreferrer" target="_blank">We integrated ChatGPT with our robots. We had a ton of fun building this! Read on for the details</a></p><p><a href="https://www.fastcompany.com/90889271/boston-dynamics-spot-chatgpt-brains" rel="noopener noreferrer" target="_blank">Boston Dynamics robodog just got a ChatGPT brain. May it have mercy upon our souls</a></p><h3>AST Which One Should Use To Protect Your System?</h3><p><a href="http://505updates.com/olimpiupop/" rel="noopener noreferrer" target="_blank">🇷🇴 Olimpiu Pop, Transylvania, Romania ↗</a></p><p><a href="https://blog.sonatype.com/the-impact-of-security-testing-on-an-organization" rel="noopener noreferrer" target="_blank">The Impact of Security Testing on an Organization</a></p><h3>This Day in Tech History&nbsp;</h3><p><a href="https://505updates.com/marcelbrown/" rel="noopener noreferrer" target="_blank"><strong>🇺🇸</strong> Marcel Brown, St. Louis, Missouri ↗</a></p><p><a href="http://thisdayintechhistory.com/05/09" rel="noopener noreferrer" target="_blank">http://thisdayintechhistory.com/05/09</a></p><p><a href="http://thisdayintechhistory.com/05/10" rel="noopener noreferrer" target="_blank">http://thisdayintechhistory.com/05/10</a></p>]]></content:encoded><link><![CDATA[https://3zozb9fxlbueipjyapmaas.captivate.fm/episode/episode-138-sydney-cancer-treatment-center-data-breach-ai-hacking-skills-spot-dog-ast]]></link><guid isPermaLink="false">5d27cc3d-0dff-4e26-a24b-8a33eee25595</guid><itunes:image href="https://artwork.captivate.fm/b5b0f740-43c4-4f8e-b2c7-b01cd7a01582/rK6HkuLy_fkhxr01q4QPp1vM.png"/><dc:creator><![CDATA[Contributors from Around the World]]></dc:creator><pubDate>Wed, 10 May 2023 16:45:00 -0400</pubDate><enclosure url="https://dts.podtrac.com/redirect.mp3/podcasts.captivate.fm/media/47fb5375-c8fc-4287-bf17-a778c5c26054/2023-05-10-505-Episode-138-converted.mp3" length="8875382" type="audio/mpeg"/><itunes:duration>12:20</itunes:duration><itunes:explicit>false</itunes:explicit><itunes:episodeType>full</itunes:episodeType><itunes:season>1</itunes:season><itunes:episode>138</itunes:episode><itunes:season>1</itunes:season><podcast:episode>138</podcast:episode><podcast:season>1</podcast:season><itunes:author>Contributors from Around the World</itunes:author></item><item><title>Episode #137 - Sister Podcasts, Paying Ransom to Hackers, Torvalds first RC for Linux 6.4, MSI Cyber Attack</title><itunes:title>Episode #137 - Sister Podcasts, Paying Ransom to Hackers, Torvalds first RC for Linux 6.4, MSI Cyber Attack</itunes:title><description><![CDATA[<p><strong>Hey, it's 5:05 on Tuesday, May 9th, 2023</strong>. From the Sourced Podcast Network in New York City, this is your host, Pokie Huang. Stories into this episode come from <strong>Edwin Kwan</strong> in Sydney, Australia, <strong>Olimpiu Pop</strong> in Transylvania, Romania, <strong>Ian Garrett</strong> in Arlington, Virginia. And we will start with a message from the Executive Producer, <strong>Mark Miller.&nbsp;</strong></p><p>Let's get to it.&nbsp;</p><h3>Three podcasts you might find interesting</h3><p><a href="https://505updates.com/markmiller/" rel="noopener noreferrer" target="_blank">🇺🇸 Mark Miller, New York City↗</a></p><p><a href="https://dabom.show/" rel="noopener noreferrer" target="_blank">https://dabom.show/</a></p><p><a href="https://realtechnologists.org/" rel="noopener noreferrer" target="_blank">https://realtechnologists.org/</a></p><p><a href="https://whatsinmyeula.com/" rel="noopener noreferrer" target="_blank">https://whatsinmyeula.com/</a></p><p><br></p><h3>Should Companies Consider Paying Ransom to Hackers</h3><p><a href="https://505updates.com/edwinkwan/" rel="noopener noreferrer" target="_blank">🇦🇺 Edwin Kwan, Sydney, Australia ↗</a></p><p><a href="https://www.abc.net.au/news/2023-05-04/some-company-bosses-considering-paying-hackers/102302856" rel="noopener noreferrer" target="_blank">Some company bosses are considering paying hackers ransoms - ABC News</a></p><p><br></p><h3>MSI Cyber Attack Leaks Code Signing Keys</h3><p><a href="https://505updates.com/iangarrett/" rel="noopener noreferrer" target="_blank"><strong>🇺🇸 </strong>Ian Garrett, Arlington, Virginia ↗</a></p><p><a href="https://www.pcmag.com/news/hackers-leak-private-keys-for-msi-products-making-it-easier-to-attack-them" rel="noopener noreferrer" target="_blank">Hackers Leak Private Keys for MSI Products, Making It Easier to Attack Them | PCMag</a></p><p><a href="https://www.bleepingcomputer.com/news/security/msi-confirms-security-breach-following-ransomware-attack-claims/" rel="noopener noreferrer" target="_blank">MSI confirms security breach following ransomware attack claims</a></p><p><br></p><h3>Torvalds announces the first RC for Linux 6.4</h3><p><a href="http://505updates.com/olimpiupop/" rel="noopener noreferrer" target="_blank">🇷🇴 Olimpiu Pop, Transylvania, Romania ↗</a></p><p><a href="https://lkml.org/lkml/2023/5/7/206" rel="noopener noreferrer" target="_blank">LKML: Linus Torvalds: Linux 6.4-rc1</a></p><p><a href="https://9to5linux.com/linus-torvalds-announces-first-linux-kernel-6-4-release-candidate" rel="noopener noreferrer" target="_blank">Linus Torvalds Announces First Linux Kernel 6.4 Release Candidate - 9to5Linux</a></p><p><a href="https://git.kernel.org/pub/scm/linux/kernel/git/torvalds/linux.git/snapshot/linux-6.4-rc1.tar.gz" rel="noopener noreferrer" target="_blank">https://git.kernel.org/pub/scm/linux/kernel/git/torvalds/linux.git/snapshot/linux-6.4-rc1.tar.gz</a></p><p><a href="https://kernel.org/" rel="noopener noreferrer" target="_blank">https://kernel.org</a></p><p><a href="https://linux.slashdot.org/story/23/05/06/1945250/linus-torvalds-cleaned-up-the-intel-lam-code-for-linux-64" rel="noopener noreferrer" target="_blank">Linus Torvalds Cleaned Up the Intel LAM Code for Linux 6.4 - Slashdot</a></p><p><br></p>]]></description><content:encoded><![CDATA[<p><strong>Hey, it's 5:05 on Tuesday, May 9th, 2023</strong>. From the Sourced Podcast Network in New York City, this is your host, Pokie Huang. Stories into this episode come from <strong>Edwin Kwan</strong> in Sydney, Australia, <strong>Olimpiu Pop</strong> in Transylvania, Romania, <strong>Ian Garrett</strong> in Arlington, Virginia. And we will start with a message from the Executive Producer, <strong>Mark Miller.&nbsp;</strong></p><p>Let's get to it.&nbsp;</p><h3>Three podcasts you might find interesting</h3><p><a href="https://505updates.com/markmiller/" rel="noopener noreferrer" target="_blank">🇺🇸 Mark Miller, New York City↗</a></p><p><a href="https://dabom.show/" rel="noopener noreferrer" target="_blank">https://dabom.show/</a></p><p><a href="https://realtechnologists.org/" rel="noopener noreferrer" target="_blank">https://realtechnologists.org/</a></p><p><a href="https://whatsinmyeula.com/" rel="noopener noreferrer" target="_blank">https://whatsinmyeula.com/</a></p><p><br></p><h3>Should Companies Consider Paying Ransom to Hackers</h3><p><a href="https://505updates.com/edwinkwan/" rel="noopener noreferrer" target="_blank">🇦🇺 Edwin Kwan, Sydney, Australia ↗</a></p><p><a href="https://www.abc.net.au/news/2023-05-04/some-company-bosses-considering-paying-hackers/102302856" rel="noopener noreferrer" target="_blank">Some company bosses are considering paying hackers ransoms - ABC News</a></p><p><br></p><h3>MSI Cyber Attack Leaks Code Signing Keys</h3><p><a href="https://505updates.com/iangarrett/" rel="noopener noreferrer" target="_blank"><strong>🇺🇸 </strong>Ian Garrett, Arlington, Virginia ↗</a></p><p><a href="https://www.pcmag.com/news/hackers-leak-private-keys-for-msi-products-making-it-easier-to-attack-them" rel="noopener noreferrer" target="_blank">Hackers Leak Private Keys for MSI Products, Making It Easier to Attack Them | PCMag</a></p><p><a href="https://www.bleepingcomputer.com/news/security/msi-confirms-security-breach-following-ransomware-attack-claims/" rel="noopener noreferrer" target="_blank">MSI confirms security breach following ransomware attack claims</a></p><p><br></p><h3>Torvalds announces the first RC for Linux 6.4</h3><p><a href="http://505updates.com/olimpiupop/" rel="noopener noreferrer" target="_blank">🇷🇴 Olimpiu Pop, Transylvania, Romania ↗</a></p><p><a href="https://lkml.org/lkml/2023/5/7/206" rel="noopener noreferrer" target="_blank">LKML: Linus Torvalds: Linux 6.4-rc1</a></p><p><a href="https://9to5linux.com/linus-torvalds-announces-first-linux-kernel-6-4-release-candidate" rel="noopener noreferrer" target="_blank">Linus Torvalds Announces First Linux Kernel 6.4 Release Candidate - 9to5Linux</a></p><p><a href="https://git.kernel.org/pub/scm/linux/kernel/git/torvalds/linux.git/snapshot/linux-6.4-rc1.tar.gz" rel="noopener noreferrer" target="_blank">https://git.kernel.org/pub/scm/linux/kernel/git/torvalds/linux.git/snapshot/linux-6.4-rc1.tar.gz</a></p><p><a href="https://kernel.org/" rel="noopener noreferrer" target="_blank">https://kernel.org</a></p><p><a href="https://linux.slashdot.org/story/23/05/06/1945250/linus-torvalds-cleaned-up-the-intel-lam-code-for-linux-64" rel="noopener noreferrer" target="_blank">Linus Torvalds Cleaned Up the Intel LAM Code for Linux 6.4 - Slashdot</a></p><p><br></p>]]></content:encoded><link><![CDATA[https://3zozb9fxlbueipjyapmaas.captivate.fm/episode/episode-137-sister-podcasts-paying-ransom-to-hackers-torvalds-first-rc-for-linux-6-4-msi-cyber-attack]]></link><guid isPermaLink="false">29e8c0e8-a22b-4ddf-830a-1783e918ec76</guid><itunes:image href="https://artwork.captivate.fm/86f5e6fe-2e75-4ee7-bddc-d70821e81131/shbOUFtCn-1EHESjNuXJZ1-3.png"/><dc:creator><![CDATA[Contributors from Around the World]]></dc:creator><pubDate>Tue, 09 May 2023 16:45:00 -0400</pubDate><enclosure url="https://dts.podtrac.com/redirect.mp3/podcasts.captivate.fm/media/0a3e1b21-2cb1-4322-ae31-b186bd07dfa3/2023-05-09-505-Episode-137-converted.mp3" length="6629609" type="audio/mpeg"/><itunes:duration>09:12</itunes:duration><itunes:explicit>false</itunes:explicit><itunes:episodeType>full</itunes:episodeType><itunes:season>1</itunes:season><itunes:episode>137</itunes:episode><itunes:season>1</itunes:season><podcast:episode>137</podcast:episode><podcast:season>1</podcast:season><itunes:author>Contributors from Around the World</itunes:author></item><item><title>Episode #136 - New Privacy Commissioner in Australia, RSAC Misses the Mark, The 124 hour gift, Software Supply Chain Attack</title><itunes:title>Episode #136 - New Privacy Commissioner in Australia, RSAC Misses the Mark, The 124 hour gift, Software Supply Chain Attack</itunes:title><description><![CDATA[<p><strong>Hey, it's 5:05 on Monday, May 8th, 2023.</strong> From the Sourced Podcast Network in New York City, this is your host, Pokie Huang. Stories in today's episode come from, <strong>Edwin Kwan</strong> in Sydney, Australia, <strong>Trac Bannon</strong> in Camp Hill, Pennsylvania, <strong>Derek Weeks</strong> in Bethesda, Maryland, <strong>Shannon Lietz</strong> in San Diego, California and <strong>Marcel brown</strong> in St. Louis, Missouri. </p><p>Let's get to it.&nbsp;</p><h3>Australia to Have New Privacy Commissioner</h3><p><a href="https://505updates.com/edwinkwan/" rel="noopener noreferrer" target="_blank">🇦🇺 Edwin Kwan, Sydney, Australia ↗</a></p><p><a href="https://www.news.com.au/national/politics/new-privacy-commissioner-to-ensure-personal-data-protection/news-story/328b48e0d53e41d8abb068dea24ad83b" rel="noopener noreferrer" target="_blank">New privacy commissioner to ensure personal data protection</a></p><h3>RSAC Misses the Mark: The Need for Being Secure by Design</h3><p><a href="https://505updates.com/tracbannon/" rel="noopener noreferrer" target="_blank"><strong>🇺🇸</strong> Tracy (Trac) Bannon, Camp Hill, </a>Pennsylvania↗</p><p><a href="https://www.cisa.gov/securebydesign" rel="noopener noreferrer" target="_blank">Secure by Design, Secure by Default | CISA</a></p><p><a href="https://www.sei.cmu.edu/" rel="noopener noreferrer" target="_blank">Software Engineering Institute</a>&nbsp;&nbsp;</p><p><a href="https://www.linkedin.com/in/hasanyasar/" rel="noopener noreferrer" target="_blank">https://www.linkedin.com/in/hasanyasar/</a>&nbsp;</p><p><a href="https://www.rsaconference.com/usa" rel="noopener noreferrer" target="_blank">https://www.rsaconference.com/us</a></p><h3>The 124 hour gift</h3><p><a href="https://505updates.com/derekweeks/" rel="noopener noreferrer" target="_blank"><strong>🇺🇸</strong> Derek Weeks, Bethesda Maryland ↗</a></p><p><a href="https://www.linkedin.com/feed/update/urn:li:activity:7061313345387196416/" rel="noopener noreferrer" target="_blank">https://www.linkedin.com/feed/update/urn:li:activity:7061313345387196416/</a></p><h3>The Untold Story of a distributed Software Supply Chain Attack</h3><p><a href="https://505updates.com/shannonlietz/" rel="noopener noreferrer" target="_blank"><strong>🇺🇸</strong> Shannon Lietz, San Diego, California ↗</a></p><h3>This Day in Tech History&nbsp;</h3><p><a href="https://505updates.com/marcelbrown/" rel="noopener noreferrer" target="_blank"><strong>🇺🇸</strong> Marcel Brown, St. Louis, Missouri ↗</a></p><p><a href="http://thisdayintechhistory.com/05/07" rel="noopener noreferrer" target="_blank">http://thisdayintechhistory.com/05/07</a></p><p><a href="http://thisdayintechhistory.com/05/08" rel="noopener noreferrer" target="_blank">http://thisdayintechhistory.com/05/08</a></p><p><br></p><p><br></p>]]></description><content:encoded><![CDATA[<p><strong>Hey, it's 5:05 on Monday, May 8th, 2023.</strong> From the Sourced Podcast Network in New York City, this is your host, Pokie Huang. Stories in today's episode come from, <strong>Edwin Kwan</strong> in Sydney, Australia, <strong>Trac Bannon</strong> in Camp Hill, Pennsylvania, <strong>Derek Weeks</strong> in Bethesda, Maryland, <strong>Shannon Lietz</strong> in San Diego, California and <strong>Marcel brown</strong> in St. Louis, Missouri. </p><p>Let's get to it.&nbsp;</p><h3>Australia to Have New Privacy Commissioner</h3><p><a href="https://505updates.com/edwinkwan/" rel="noopener noreferrer" target="_blank">🇦🇺 Edwin Kwan, Sydney, Australia ↗</a></p><p><a href="https://www.news.com.au/national/politics/new-privacy-commissioner-to-ensure-personal-data-protection/news-story/328b48e0d53e41d8abb068dea24ad83b" rel="noopener noreferrer" target="_blank">New privacy commissioner to ensure personal data protection</a></p><h3>RSAC Misses the Mark: The Need for Being Secure by Design</h3><p><a href="https://505updates.com/tracbannon/" rel="noopener noreferrer" target="_blank"><strong>🇺🇸</strong> Tracy (Trac) Bannon, Camp Hill, </a>Pennsylvania↗</p><p><a href="https://www.cisa.gov/securebydesign" rel="noopener noreferrer" target="_blank">Secure by Design, Secure by Default | CISA</a></p><p><a href="https://www.sei.cmu.edu/" rel="noopener noreferrer" target="_blank">Software Engineering Institute</a>&nbsp;&nbsp;</p><p><a href="https://www.linkedin.com/in/hasanyasar/" rel="noopener noreferrer" target="_blank">https://www.linkedin.com/in/hasanyasar/</a>&nbsp;</p><p><a href="https://www.rsaconference.com/usa" rel="noopener noreferrer" target="_blank">https://www.rsaconference.com/us</a></p><h3>The 124 hour gift</h3><p><a href="https://505updates.com/derekweeks/" rel="noopener noreferrer" target="_blank"><strong>🇺🇸</strong> Derek Weeks, Bethesda Maryland ↗</a></p><p><a href="https://www.linkedin.com/feed/update/urn:li:activity:7061313345387196416/" rel="noopener noreferrer" target="_blank">https://www.linkedin.com/feed/update/urn:li:activity:7061313345387196416/</a></p><h3>The Untold Story of a distributed Software Supply Chain Attack</h3><p><a href="https://505updates.com/shannonlietz/" rel="noopener noreferrer" target="_blank"><strong>🇺🇸</strong> Shannon Lietz, San Diego, California ↗</a></p><h3>This Day in Tech History&nbsp;</h3><p><a href="https://505updates.com/marcelbrown/" rel="noopener noreferrer" target="_blank"><strong>🇺🇸</strong> Marcel Brown, St. Louis, Missouri ↗</a></p><p><a href="http://thisdayintechhistory.com/05/07" rel="noopener noreferrer" target="_blank">http://thisdayintechhistory.com/05/07</a></p><p><a href="http://thisdayintechhistory.com/05/08" rel="noopener noreferrer" target="_blank">http://thisdayintechhistory.com/05/08</a></p><p><br></p><p><br></p>]]></content:encoded><link><![CDATA[https://3zozb9fxlbueipjyapmaas.captivate.fm/episode/episode-136-new-privacy-commissioner-in-australia-rsac-misses-the-mark-the-124-hour-gift-software-supply-chain-attack]]></link><guid isPermaLink="false">ac398353-26ac-4c32-953c-a07b183eb504</guid><itunes:image href="https://artwork.captivate.fm/22ccc714-94c7-4161-8a49-bb7ace2c042b/DJSphllMFOlNQbquVR5BNpsT.png"/><dc:creator><![CDATA[Contributors from Around the World]]></dc:creator><pubDate>Mon, 08 May 2023 16:45:00 -0400</pubDate><enclosure url="https://dts.podtrac.com/redirect.mp3/podcasts.captivate.fm/media/46cbc158-856e-4541-b1ee-f118e00d9d0e/2023-05-08-505-Episode-136-converted.mp3" length="9510782" type="audio/mpeg"/><itunes:duration>13:13</itunes:duration><itunes:explicit>false</itunes:explicit><itunes:episodeType>full</itunes:episodeType><itunes:season>1</itunes:season><itunes:episode>136</itunes:episode><itunes:season>1</itunes:season><podcast:episode>136</podcast:episode><podcast:season>1</podcast:season><itunes:author>Contributors from Around the World</itunes:author></item><item><title>Episode #135 - Grimes and AI Voice, Passwordless Sign-in, ChatGPT MaaS, This Day in Tech</title><itunes:title>Episode #135 - Grimes and AI Voice, Passwordless Sign-in, ChatGPT MaaS, This Day in Tech</itunes:title><description><![CDATA[<p>From Sourced Network Productions in New York City,<strong> “It's 5:05” on Friday, the fifth of May, a day of celebration of the Mexican army’s 1862 victory over France at the Battle of Puebla during the Franco-Mexican War.</strong></p><p>This is your host, Mark Miller, standing in for Pokie Huang.</p><p>Stories in today's episode come from <strong>Edwin Kwan</strong> in Sydney, Australia, <strong>Katy Craig </strong>in San Diego, California, <strong>Marcel Brown</strong> in St. Louis, Missouri, and me, calling in today from Houston, Texas to talk about the most brilliant use of AI that I’ve seen yet.</p><p>Let's get to it.</p>]]></description><content:encoded><![CDATA[<p>From Sourced Network Productions in New York City,<strong> “It's 5:05” on Friday, the fifth of May, a day of celebration of the Mexican army’s 1862 victory over France at the Battle of Puebla during the Franco-Mexican War.</strong></p><p>This is your host, Mark Miller, standing in for Pokie Huang.</p><p>Stories in today's episode come from <strong>Edwin Kwan</strong> in Sydney, Australia, <strong>Katy Craig </strong>in San Diego, California, <strong>Marcel Brown</strong> in St. Louis, Missouri, and me, calling in today from Houston, Texas to talk about the most brilliant use of AI that I’ve seen yet.</p><p>Let's get to it.</p>]]></content:encoded><link><![CDATA[https://3zozb9fxlbueipjyapmaas.captivate.fm/episode/episode-135-grimes-and-ai-voice-passwordless-sign-in-chatgpt-maas-this-day-in-tech]]></link><guid isPermaLink="false">d849988a-d2ee-439c-897d-6ddb70c8740f</guid><itunes:image href="https://artwork.captivate.fm/33e2a4e7-a936-4ef5-905a-3a72363cfbe4/BkhMbfQsRHQi9QFk9GvnUJSv.png"/><dc:creator><![CDATA[Contributors from Around the World]]></dc:creator><pubDate>Fri, 05 May 2023 16:45:00 -0400</pubDate><enclosure url="https://dts.podtrac.com/redirect.mp3/podcasts.captivate.fm/media/ece8e159-9427-4c87-9953-aff24d2a14e6/2023-05-05-505-Final-Edit-converted.mp3" length="9957707" type="audio/mpeg"/><itunes:duration>10:22</itunes:duration><itunes:explicit>false</itunes:explicit><itunes:episodeType>full</itunes:episodeType><itunes:season>1</itunes:season><itunes:episode>135</itunes:episode><itunes:season>1</itunes:season><podcast:episode>135</podcast:episode><podcast:season>1</podcast:season><itunes:author>Contributors from Around the World</itunes:author></item><item><title>Episode #134 - Chrome Removes Secure Website Lock Icon, Algorithmic Surveillance, AI Job Loss, Edge Leaks URLs, Software Supply Chain</title><itunes:title>Episode #134 - Chrome Removes Secure Website Lock Icon, Algorithmic Surveillance, AI Job Loss, Edge Leaks URLs, Software Supply Chain</itunes:title><description><![CDATA[<p><strong>Hey, it's 5:05 on Thursday, May 4th, 2023</strong>. From the Sourced Podcast Network in New York city, this is your host Pokie Huang. Stories in today's episode come from <strong>Edwin Kwan</strong> in Sydney. Australia. <strong>Olimpiu Pop</strong> in Transylvania, Romania, <strong>Trac Bannon</strong> in Camp Hill, Pennsylvania, <strong>Katy Craig</strong> in San Diego, California, <strong>Derek Weeks</strong> in Bethesda, Maryland and <strong>Marcel brown</strong> in St. Louis, Missouri.&nbsp;</p><p>Let's get to it.</p><h3>Secure Website Lock Icon to Be Removed From Chrome</h3><p><a href="https://505updates.com/edwinkwan/" rel="noopener noreferrer" target="_blank">🇦🇺 Edwin Kwan, Sydney, Australia ↗</a></p><p><a href="https://www.bleepingcomputer.com/news/google/google-will-remove-secure-website-indicators-in-chrome-117/" rel="noopener noreferrer" target="_blank">Google will remove secure website indicators in Chrome 117</a></p><h3>The French National Assembly Opens Pandora's Box Of Algorithmic Surveillance</h3><p><a href="http://505updates.com/olimpiupop/" rel="noopener noreferrer" target="_blank">🇷🇴 Olimpiu Pop, Transylvania, Romania ↗</a></p><p><a href="https://www.rfi.fr/en/france/20230329-france-approves-smart-video-surveillance-to-safeguard-olympics" rel="noopener noreferrer" target="_blank">France approves algorithmic video surveillance to safeguard Olympics</a></p><p><a href="https://www.france24.com/en/europe/20230323-french-mps-battle-over-ai-video-surveillance-cameras-at-paris-olympics" rel="noopener noreferrer" target="_blank">French MPs battle over AI video surveillance cameras at Paris Olympics</a></p><p><a href="https://www.amnesty.org/en/latest/news/2023/03/france-intrusive-olympics-surveillance-technologies-could-usher-in-a-dystopian-future/" rel="noopener noreferrer" target="_blank">France: Intrusive Olympics surveillance technologies could usher in a dystopian future - Amnesty International</a></p><h3>Rationalizing AI Job Loss Projections</h3><p><a href="https://505updates.com/tracbannon/" rel="noopener noreferrer" target="_blank"><strong>🇺🇸</strong> Tracy (Trac) Bannon, Camp Hill, </a>Pennsylvania↗</p><p><a href="https://www.zerohedge.com/markets/ibm-stop-hiring-roles-can-be-replaced-ai-nearly-8000-workers-be-replaced-automation" rel="noopener noreferrer" target="_blank">IBM To Stop Hiring For Roles That Can Be Replaced By AI</a>&nbsp;</p><p><a href="https://www.theverge.com/2023/4/27/23700629/dropbox-laying-off-500-people-pivoting-ai" rel="noopener noreferrer" target="_blank">Dropbox is laying off 500 people and pivoting to AI - The Verge</a></p><h3>Edge leaks URLs to Bing</h3><p><a href="https://505updates.com/katycraig/" rel="noopener noreferrer" target="_blank">🇺🇸 Katy Craig, San Diego, California ↗</a></p><p><a href="https://www.reddit.com/r/browsers/comments/12u9y5g/what_is_causing_edge_to_leak_all_visited_urls/?utm_source=share&amp;utm_medium=ios_app&amp;utm_name=iossmf&amp;utm_content=1&amp;utm_term=15" rel="noopener noreferrer" target="_blank">https://www.reddit.com/r/browsers/comments/12u9y5g/what_is_causing_edge_to_leak_all_visited_urls/?utm_source=share&amp;utm_medium=ios_app&amp;utm_name=iossmf&amp;utm_content=1&amp;utm_term=15</a></p><p><a href="https://www.theverge.com/2023/4/25/23697532/microsoft-edge-browser-url-leak-bing-privacy" rel="noopener noreferrer" target="_blank">Microsoft Edge is leaking the sites you visit to Bing - The Verge</a></p><h3>Map Out Your Software Supply Chain</h3><p><a href="https://505updates.com/derekweeks/" rel="noopener noreferrer" target="_blank"><strong>🇺🇸</strong> Derek Weeks, Bethesda Maryland ↗</a></p><p><a href="https://www.securitymagazine.com/articles/99283-9-out-of-10-companies-detected-software-supply-chain-security-risks" rel="noopener noreferrer" target="_blank">9 out of 10 companies detected software supply chain security risks</a></p><p><a...]]></description><content:encoded><![CDATA[<p><strong>Hey, it's 5:05 on Thursday, May 4th, 2023</strong>. From the Sourced Podcast Network in New York city, this is your host Pokie Huang. Stories in today's episode come from <strong>Edwin Kwan</strong> in Sydney. Australia. <strong>Olimpiu Pop</strong> in Transylvania, Romania, <strong>Trac Bannon</strong> in Camp Hill, Pennsylvania, <strong>Katy Craig</strong> in San Diego, California, <strong>Derek Weeks</strong> in Bethesda, Maryland and <strong>Marcel brown</strong> in St. Louis, Missouri.&nbsp;</p><p>Let's get to it.</p><h3>Secure Website Lock Icon to Be Removed From Chrome</h3><p><a href="https://505updates.com/edwinkwan/" rel="noopener noreferrer" target="_blank">🇦🇺 Edwin Kwan, Sydney, Australia ↗</a></p><p><a href="https://www.bleepingcomputer.com/news/google/google-will-remove-secure-website-indicators-in-chrome-117/" rel="noopener noreferrer" target="_blank">Google will remove secure website indicators in Chrome 117</a></p><h3>The French National Assembly Opens Pandora's Box Of Algorithmic Surveillance</h3><p><a href="http://505updates.com/olimpiupop/" rel="noopener noreferrer" target="_blank">🇷🇴 Olimpiu Pop, Transylvania, Romania ↗</a></p><p><a href="https://www.rfi.fr/en/france/20230329-france-approves-smart-video-surveillance-to-safeguard-olympics" rel="noopener noreferrer" target="_blank">France approves algorithmic video surveillance to safeguard Olympics</a></p><p><a href="https://www.france24.com/en/europe/20230323-french-mps-battle-over-ai-video-surveillance-cameras-at-paris-olympics" rel="noopener noreferrer" target="_blank">French MPs battle over AI video surveillance cameras at Paris Olympics</a></p><p><a href="https://www.amnesty.org/en/latest/news/2023/03/france-intrusive-olympics-surveillance-technologies-could-usher-in-a-dystopian-future/" rel="noopener noreferrer" target="_blank">France: Intrusive Olympics surveillance technologies could usher in a dystopian future - Amnesty International</a></p><h3>Rationalizing AI Job Loss Projections</h3><p><a href="https://505updates.com/tracbannon/" rel="noopener noreferrer" target="_blank"><strong>🇺🇸</strong> Tracy (Trac) Bannon, Camp Hill, </a>Pennsylvania↗</p><p><a href="https://www.zerohedge.com/markets/ibm-stop-hiring-roles-can-be-replaced-ai-nearly-8000-workers-be-replaced-automation" rel="noopener noreferrer" target="_blank">IBM To Stop Hiring For Roles That Can Be Replaced By AI</a>&nbsp;</p><p><a href="https://www.theverge.com/2023/4/27/23700629/dropbox-laying-off-500-people-pivoting-ai" rel="noopener noreferrer" target="_blank">Dropbox is laying off 500 people and pivoting to AI - The Verge</a></p><h3>Edge leaks URLs to Bing</h3><p><a href="https://505updates.com/katycraig/" rel="noopener noreferrer" target="_blank">🇺🇸 Katy Craig, San Diego, California ↗</a></p><p><a href="https://www.reddit.com/r/browsers/comments/12u9y5g/what_is_causing_edge_to_leak_all_visited_urls/?utm_source=share&amp;utm_medium=ios_app&amp;utm_name=iossmf&amp;utm_content=1&amp;utm_term=15" rel="noopener noreferrer" target="_blank">https://www.reddit.com/r/browsers/comments/12u9y5g/what_is_causing_edge_to_leak_all_visited_urls/?utm_source=share&amp;utm_medium=ios_app&amp;utm_name=iossmf&amp;utm_content=1&amp;utm_term=15</a></p><p><a href="https://www.theverge.com/2023/4/25/23697532/microsoft-edge-browser-url-leak-bing-privacy" rel="noopener noreferrer" target="_blank">Microsoft Edge is leaking the sites you visit to Bing - The Verge</a></p><h3>Map Out Your Software Supply Chain</h3><p><a href="https://505updates.com/derekweeks/" rel="noopener noreferrer" target="_blank"><strong>🇺🇸</strong> Derek Weeks, Bethesda Maryland ↗</a></p><p><a href="https://www.securitymagazine.com/articles/99283-9-out-of-10-companies-detected-software-supply-chain-security-risks" rel="noopener noreferrer" target="_blank">9 out of 10 companies detected software supply chain security risks</a></p><p><a href="https://webinars.devops.com/malicious-package-trend-analysis?utm_campaign=2023.05.03_Mend_Webinar_DO&amp;utm_source=SproutFacebook" rel="noopener noreferrer" target="_blank">Malicious Package Trend Analysis</a></p><h3>This Day in Tech History&nbsp;</h3><p><a href="https://505updates.com/marcelbrown/" rel="noopener noreferrer" target="_blank"><strong>🇺🇸</strong> Marcel Brown, St. Louis, Missouri ↗</a></p><p><a href="http://thisdayintechhistory.com/05/04" rel="noopener noreferrer" target="_blank">http://thisdayintechhistory.com/05/04</a></p>]]></content:encoded><link><![CDATA[https://3zozb9fxlbueipjyapmaas.captivate.fm/episode/episode-134-chrome-removes-secure-website-lock-icon-algorithmic-surveillance-ai-job-loss-edge-leaks-urls-software-supply-chain]]></link><guid isPermaLink="false">98225d07-dc99-404e-9f74-c34b7c20cba2</guid><itunes:image href="https://artwork.captivate.fm/ddeb164f-d101-405b-9bbf-ac2f9912b68c/o2ZWVRQOpNpGDJ1DAQDToDVS.png"/><dc:creator><![CDATA[Contributors from Around the World]]></dc:creator><pubDate>Thu, 04 May 2023 16:45:00 -0400</pubDate><enclosure url="https://dts.podtrac.com/redirect.mp3/podcasts.captivate.fm/media/25b434dc-9d07-4118-a436-7fe072dd15c7/2023-05-04-505-Episode-134-converted.mp3" length="12391176" type="audio/mpeg"/><itunes:duration>17:13</itunes:duration><itunes:explicit>false</itunes:explicit><itunes:episodeType>full</itunes:episodeType><itunes:season>1</itunes:season><itunes:episode>134</itunes:episode><itunes:season>1</itunes:season><podcast:episode>134</podcast:episode><podcast:season>1</podcast:season><itunes:author>Contributors from Around the World</itunes:author></item><item><title>Episode #133 - MacOS Malware, Tech CEOs discuss AI with VP, Nuclei OSS Tool</title><itunes:title>Episode #133 - MacOS Malware, Tech CEOs discuss AI with VP, Nuclei OSS Tool</itunes:title><description><![CDATA[<p><strong>Hey, it’s 5:05 on Wednesday, May 3rd. 2023.</strong> From The Sourced Podcast network in New York city, this is your host Pokie Huang. Stories in today’s episode come from <strong>Edwin Kwan</strong> in Sydney, Australia, <strong>Katy Craig</strong> in San Diego, California, <strong>Olimpiu Pop</strong> in Transylvania, Romania and <strong>Marcel brown</strong> in St. Louis, Missouri.&nbsp;</p><p>Let’s get to it.</p><h3>MacOS Targeted by Malware</h3><p><a href="https://505updates.com/edwinkwan/" rel="noopener noreferrer" target="_blank">🇦🇺 Edwin Kwan, Sydney, Australia ↗</a></p><p><a href="https://www.bleepingcomputer.com/news/security/new-atomic-macos-info-stealing-malware-targets-50-crypto-wallets/" rel="noopener noreferrer" target="_blank">New Atomic macOS info-stealing malware targets 50 crypto wallets</a></p><h3>Top Tech CEOs Meet with VP Harris to Discuss AI&nbsp;</h3><p><a href="https://505updates.com/katycraig/" rel="noopener noreferrer" target="_blank">🇺🇸 Katy Craig, San Diego, California ↗</a></p><p><br></p><h3>Nuclei OSS Tool For Pentesting</h3><h3><a href="http://505updates.com/olimpiupop/" rel="noopener noreferrer" target="_blank">🇷🇴 Olimpiu Pop, Transylvania, Romania ↗</a></h3><p><a href="https://github.com/projectdiscovery/nuclei" rel="noopener noreferrer" target="_blank">GitHub - projectdiscovery/nuclei: Fast and customizable vulnerability scanner based on simple YAML based DSL.</a></p><p><a href="https://github.com/projectdiscovery/nuclei-templates" rel="noopener noreferrer" target="_blank">GitHub - projectdiscovery/nuclei-templates: Community curated list of templates for the nuclei engine to find security vulnerabilities.</a></p><p><a href="https://latesthackingnews.com/2023/04/29/nuclei-cheatsheet-the-go-to-resource-for-penetration-testers/" rel="noopener noreferrer" target="_blank">Nuclei Cheatsheet: The Go-to Resource for Penetration Testers</a></p><p><a href="https://en.wikipedia.org/wiki/Battle_of_Thermopylae" rel="noopener noreferrer" target="_blank">Battle of Thermopylae - Wikipedia</a></p><p><br></p><h3>This Day in Tech History&nbsp;</h3><p><a href="https://505updates.com/marcelbrown/" rel="noopener noreferrer" target="_blank"><strong>🇺🇸</strong> Marcel Brown, St. Louis, Missouri ↗</a></p><p><a href="http://thisdayintechhistory.com/05/03" rel="noopener noreferrer" target="_blank">http://thisdayintechhistory.com/05/03</a></p><p><br></p>]]></description><content:encoded><![CDATA[<p><strong>Hey, it’s 5:05 on Wednesday, May 3rd. 2023.</strong> From The Sourced Podcast network in New York city, this is your host Pokie Huang. Stories in today’s episode come from <strong>Edwin Kwan</strong> in Sydney, Australia, <strong>Katy Craig</strong> in San Diego, California, <strong>Olimpiu Pop</strong> in Transylvania, Romania and <strong>Marcel brown</strong> in St. Louis, Missouri.&nbsp;</p><p>Let’s get to it.</p><h3>MacOS Targeted by Malware</h3><p><a href="https://505updates.com/edwinkwan/" rel="noopener noreferrer" target="_blank">🇦🇺 Edwin Kwan, Sydney, Australia ↗</a></p><p><a href="https://www.bleepingcomputer.com/news/security/new-atomic-macos-info-stealing-malware-targets-50-crypto-wallets/" rel="noopener noreferrer" target="_blank">New Atomic macOS info-stealing malware targets 50 crypto wallets</a></p><h3>Top Tech CEOs Meet with VP Harris to Discuss AI&nbsp;</h3><p><a href="https://505updates.com/katycraig/" rel="noopener noreferrer" target="_blank">🇺🇸 Katy Craig, San Diego, California ↗</a></p><p><br></p><h3>Nuclei OSS Tool For Pentesting</h3><h3><a href="http://505updates.com/olimpiupop/" rel="noopener noreferrer" target="_blank">🇷🇴 Olimpiu Pop, Transylvania, Romania ↗</a></h3><p><a href="https://github.com/projectdiscovery/nuclei" rel="noopener noreferrer" target="_blank">GitHub - projectdiscovery/nuclei: Fast and customizable vulnerability scanner based on simple YAML based DSL.</a></p><p><a href="https://github.com/projectdiscovery/nuclei-templates" rel="noopener noreferrer" target="_blank">GitHub - projectdiscovery/nuclei-templates: Community curated list of templates for the nuclei engine to find security vulnerabilities.</a></p><p><a href="https://latesthackingnews.com/2023/04/29/nuclei-cheatsheet-the-go-to-resource-for-penetration-testers/" rel="noopener noreferrer" target="_blank">Nuclei Cheatsheet: The Go-to Resource for Penetration Testers</a></p><p><a href="https://en.wikipedia.org/wiki/Battle_of_Thermopylae" rel="noopener noreferrer" target="_blank">Battle of Thermopylae - Wikipedia</a></p><p><br></p><h3>This Day in Tech History&nbsp;</h3><p><a href="https://505updates.com/marcelbrown/" rel="noopener noreferrer" target="_blank"><strong>🇺🇸</strong> Marcel Brown, St. Louis, Missouri ↗</a></p><p><a href="http://thisdayintechhistory.com/05/03" rel="noopener noreferrer" target="_blank">http://thisdayintechhistory.com/05/03</a></p><p><br></p>]]></content:encoded><link><![CDATA[https://3zozb9fxlbueipjyapmaas.captivate.fm/episode/episode-133-macos-malware-tech-ceos-discuss-ai-with-vp-nuclei-oss-tool]]></link><guid isPermaLink="false">e08e482b-1be1-4045-bd17-cb6a1bfb73a5</guid><itunes:image href="https://artwork.captivate.fm/3d2260cb-fa9d-4efd-8187-cf1507e46ce6/6ECH-D-4-I7h-t2HjWqIBz0e.png"/><dc:creator><![CDATA[Contributors from Around the World]]></dc:creator><pubDate>Wed, 03 May 2023 16:45:00 -0400</pubDate><enclosure url="https://dts.podtrac.com/redirect.mp3/podcasts.captivate.fm/media/fb6d8a07-edf1-4a55-9f95-de8f99e4f598/2023-05-03-505-Episdoe-133-converted.mp3" length="6877306" type="audio/mpeg"/><itunes:duration>09:33</itunes:duration><itunes:explicit>false</itunes:explicit><itunes:episodeType>full</itunes:episodeType><itunes:season>1</itunes:season><itunes:episode>133</itunes:episode><itunes:season>1</itunes:season><podcast:episode>133</podcast:episode><podcast:season>1</podcast:season><itunes:author>Contributors from Around the World</itunes:author></item><item><title>Episode #132 - Top 5 Cyberattacks in 2023, Malvertising, Cybereason, ChatGPT Banned</title><itunes:title>Episode #132 - Top 5 Cyberattacks in 2023, Malvertising, Cybereason, ChatGPT Banned</itunes:title><description><![CDATA[<p><strong>Hey, it's 5:05 on Tuesday, May 2nd. 2023. </strong>From The Sourced Podcast network in New York city, this is your host Pokie Huang. Stories in today's episode come from <strong>Edwin Kwan</strong> in Sydney, Australia, <strong>Katy Craig</strong> in San Diego, California, <strong>Ian Garrett</strong> in Arlington, Virginia, <strong>Olimpiu Pop</strong> in Transylvania, Romania and <strong>Marcel brown</strong> in St. Louis, Missouri.&nbsp;</p><p>Let's get to it.&nbsp;</p><h3>Top 5 Most Dangerous New Cyberattacks for 2023</h3><p><a href="https://505updates.com/edwinkwan/" rel="noopener noreferrer" target="_blank">🇦🇺 Edwin Kwan, Sydney, Australia ↗</a></p><p><a href="https://www.darkreading.com/attacks-breaches/sans-lists-top-5-most-dangerous-cyberattacks-in-2023" rel="noopener noreferrer" target="_blank">SANS Reveals Top 5 Most Dangerous Cyberattacks for 2023</a></p><h3>Malvertising on the Rise</h3><p><a href="https://505updates.com/katycraig/" rel="noopener noreferrer" target="_blank">🇺🇸 Katy Craig, San Diego, California ↗</a></p><p><a href="https://thehackernews.com/2023/05/vietnamese-threat-actor-infects-500000.html" rel="noopener noreferrer" target="_blank">Vietnamese Threat Actor Infects 500,000 Devices Using 'Malverposting' Tactics</a></p><h3>Is Cybereason’s Valuation Crash a Cyber Market Indicator?</h3><p><a href="https://505updates.com/iangarrett/" rel="noopener noreferrer" target="_blank"><strong>🇺🇸 </strong>Ian Garrett, Arlington, Virginia ↗</a></p><p><a href="https://www.axios.com/2023/04/24/cybereason-cuts-valuation-loses-unicorn-status" rel="noopener noreferrer" target="_blank">Cybereason cuts valuation by more than 90%, loses unicorn status</a></p><p><a href="https://www.calcalistech.com/ctechnews/article/sk7lt5sxn" rel="noopener noreferrer" target="_blank">From $3 billion to $300 million in one year: Cybereason’s hard landing | Ctech</a></p><h3>Italy Joins China, Iran, North Korea and Russia Into Banning ChatGPT</h3><p><a href="http://505updates.com/olimpiupop/" rel="noopener noreferrer" target="_blank">🇷🇴 Olimpiu Pop, Transylvania, Romania ↗</a></p><p><a href="https://artificialintelligenceact.eu/" rel="noopener noreferrer" target="_blank">The Artificial Intelligence Act |</a></p><p><a href="https://www.euronews.com/next/2023/04/07/after-italy-blocked-access-to-openais-chatgpt-chatbot-will-the-rest-of-europe-follow" rel="noopener noreferrer" target="_blank">After Italy blocked access to OpenAI's ChatGPT chatbot, will the rest of Europe follow? | Euronews</a></p><p><a href="https://www.reuters.com/technology/germany-principle-could-block-chat-gpt-if-needed-data-protection-chief-2023-04-03/" rel="noopener noreferrer" target="_blank">Italy's ChatGPT ban attracts EU privacy regulators | Reuters</a></p><h3>This Day in Tech History&nbsp;</h3><p><a href="https://505updates.com/marcelbrown/" rel="noopener noreferrer" target="_blank"><strong>🇺🇸</strong> Marcel Brown, St. Louis, Missouri ↗</a></p><p><a href="http://thisdayintechhistory.com/05/02" rel="noopener noreferrer" target="_blank">http://thisdayintechhistory.com/05/02</a></p>]]></description><content:encoded><![CDATA[<p><strong>Hey, it's 5:05 on Tuesday, May 2nd. 2023. </strong>From The Sourced Podcast network in New York city, this is your host Pokie Huang. Stories in today's episode come from <strong>Edwin Kwan</strong> in Sydney, Australia, <strong>Katy Craig</strong> in San Diego, California, <strong>Ian Garrett</strong> in Arlington, Virginia, <strong>Olimpiu Pop</strong> in Transylvania, Romania and <strong>Marcel brown</strong> in St. Louis, Missouri.&nbsp;</p><p>Let's get to it.&nbsp;</p><h3>Top 5 Most Dangerous New Cyberattacks for 2023</h3><p><a href="https://505updates.com/edwinkwan/" rel="noopener noreferrer" target="_blank">🇦🇺 Edwin Kwan, Sydney, Australia ↗</a></p><p><a href="https://www.darkreading.com/attacks-breaches/sans-lists-top-5-most-dangerous-cyberattacks-in-2023" rel="noopener noreferrer" target="_blank">SANS Reveals Top 5 Most Dangerous Cyberattacks for 2023</a></p><h3>Malvertising on the Rise</h3><p><a href="https://505updates.com/katycraig/" rel="noopener noreferrer" target="_blank">🇺🇸 Katy Craig, San Diego, California ↗</a></p><p><a href="https://thehackernews.com/2023/05/vietnamese-threat-actor-infects-500000.html" rel="noopener noreferrer" target="_blank">Vietnamese Threat Actor Infects 500,000 Devices Using 'Malverposting' Tactics</a></p><h3>Is Cybereason’s Valuation Crash a Cyber Market Indicator?</h3><p><a href="https://505updates.com/iangarrett/" rel="noopener noreferrer" target="_blank"><strong>🇺🇸 </strong>Ian Garrett, Arlington, Virginia ↗</a></p><p><a href="https://www.axios.com/2023/04/24/cybereason-cuts-valuation-loses-unicorn-status" rel="noopener noreferrer" target="_blank">Cybereason cuts valuation by more than 90%, loses unicorn status</a></p><p><a href="https://www.calcalistech.com/ctechnews/article/sk7lt5sxn" rel="noopener noreferrer" target="_blank">From $3 billion to $300 million in one year: Cybereason’s hard landing | Ctech</a></p><h3>Italy Joins China, Iran, North Korea and Russia Into Banning ChatGPT</h3><p><a href="http://505updates.com/olimpiupop/" rel="noopener noreferrer" target="_blank">🇷🇴 Olimpiu Pop, Transylvania, Romania ↗</a></p><p><a href="https://artificialintelligenceact.eu/" rel="noopener noreferrer" target="_blank">The Artificial Intelligence Act |</a></p><p><a href="https://www.euronews.com/next/2023/04/07/after-italy-blocked-access-to-openais-chatgpt-chatbot-will-the-rest-of-europe-follow" rel="noopener noreferrer" target="_blank">After Italy blocked access to OpenAI's ChatGPT chatbot, will the rest of Europe follow? | Euronews</a></p><p><a href="https://www.reuters.com/technology/germany-principle-could-block-chat-gpt-if-needed-data-protection-chief-2023-04-03/" rel="noopener noreferrer" target="_blank">Italy's ChatGPT ban attracts EU privacy regulators | Reuters</a></p><h3>This Day in Tech History&nbsp;</h3><p><a href="https://505updates.com/marcelbrown/" rel="noopener noreferrer" target="_blank"><strong>🇺🇸</strong> Marcel Brown, St. Louis, Missouri ↗</a></p><p><a href="http://thisdayintechhistory.com/05/02" rel="noopener noreferrer" target="_blank">http://thisdayintechhistory.com/05/02</a></p>]]></content:encoded><link><![CDATA[https://3zozb9fxlbueipjyapmaas.captivate.fm/episode/episode-131-top-5-cyberattacks-in-2023-malvertising-cybereason-chatgpt-banned]]></link><guid isPermaLink="false">cd69a9c2-cb20-41fd-849e-a16d41066365</guid><itunes:image href="https://artwork.captivate.fm/6ffa15ad-33ee-4607-9c3e-24bc1267db2a/S2rYDzgX7RS75iFMNdj1Ol0z.png"/><dc:creator><![CDATA[Contributors from Around the World]]></dc:creator><pubDate>Tue, 02 May 2023 16:45:00 -0400</pubDate><enclosure url="https://dts.podtrac.com/redirect.mp3/podcasts.captivate.fm/media/b6c4ce87-e0d0-4a39-939b-57d69caf83f8/2023-05-02-Episode-132-converted.mp3" length="8769106" type="audio/mpeg"/><itunes:duration>12:11</itunes:duration><itunes:explicit>false</itunes:explicit><itunes:episodeType>full</itunes:episodeType><itunes:season>1</itunes:season><itunes:episode>132</itunes:episode><itunes:season>1</itunes:season><podcast:episode>132</podcast:episode><podcast:season>1</podcast:season><itunes:author>Contributors from Around the World</itunes:author></item><item><title>Episode #131 - TACOS, ChatGPT Outperforms Doctors, End to End Encryption</title><itunes:title>Episode #131 - TACOS, ChatGPT Outperforms Doctors, End to End Encryption</itunes:title><description><![CDATA[<p><strong>Hey, it's 5:05 on Monday, May 1st, 2023.</strong> From The Sourced Podcast Network in New York City, this is your host, Pokie Huang. Stories in today's episode come from <strong>Trac Bannon</strong> in San Francisco, California, <strong>Katy Craig</strong> in San Diego, California, <strong>Edwin Kwan</strong> in Sydney, Australia and <strong>Marcel Brown</strong> in St. Louis, Missouri. </p><p>Let's get to it.</p><h3>Trac Bannon - RSAC - TACOS Attestation OpenSource Framework</h3><p><a href="https://505updates.com/tracbannon/" rel="noopener noreferrer" target="_blank"><strong>🇺🇸</strong> Tracy (Trac) Bannon, San Francisco , California</a> ↗</p><p><a href="https://www.rsaconference.com/usa" rel="noopener noreferrer" target="_blank">https://www.rsaconference.com/us</a></p><p><a href="https://github.com/tacosframework" rel="noopener noreferrer" target="_blank">TACOS Framework · GitHub</a></p><p><a href="https://tidelift.com/" rel="noopener noreferrer" target="_blank">Tidelift</a></p><h3>ChatGPT outperforms Doctors</h3><p><a href="https://505updates.com/katycraig/" rel="noopener noreferrer" target="_blank">🇺🇸 Katy Craig, San Diego, California ↗</a></p><p><a href="https://today.ucsd.edu/story/study-finds-chatgpt-outperforms-physicians-in-high-quality-empathetic-answers-to-patient-questions" rel="noopener noreferrer" target="_blank">Study Finds ChatGPT Outperforms Physicians in High-Quality, Empathetic Answers to Patient Questions</a></p><p><a href="https://jamanetwork.com/journals/jamainternalmedicine/fullarticle/2804309?" rel="noopener noreferrer" target="_blank">Comparing Physician and Chatbot Responses to Patient Questions</a></p><p><a href="https://www.theguardian.com/society/2023/apr/30/artificial-intelligence-tool-identify-cancer-ai" rel="noopener noreferrer" target="_blank">https://www.theguardian.com/society/2023/apr/30/artificial-intelligence-tool-identify-cancer-ai</a></p><p>&nbsp;</p><h3>Is End to End Encryption Good or Bad</h3><p><a href="https://505updates.com/edwinkwan/" rel="noopener noreferrer" target="_blank">🇦🇺 Edwin Kwan, Sydney, Australia ↗</a></p><p><a href="https://www.abc.net.au/radionational/programs/bigideas/is-end-to-end-encryption-good-or-bad/102017112" rel="noopener noreferrer" target="_blank">Is end-to-end encryption good or bad? - ABC Radio National</a></p><p><a href="https://www.gresham.ac.uk/watch-now/problem-encryption" rel="noopener noreferrer" target="_blank">What's The Problem With Encryption? | Gresham College</a></p><p><br></p><h3>This Day in Tech History</h3><p><a href="https://505updates.com/marcelbrown/" rel="noopener noreferrer" target="_blank"><strong>🇺🇸</strong> Marcel Brown, St. Louis, Missouri ↗</a></p><p><a href="http://thisdayintechhistory.com/04/30" rel="noopener noreferrer" target="_blank">http://thisdayintechhistory.com/04/30</a></p><p><a href="http://thisdayintechhistory.com/05/01" rel="noopener noreferrer" target="_blank">http://thisdayintechhistory.com/05/01</a></p>]]></description><content:encoded><![CDATA[<p><strong>Hey, it's 5:05 on Monday, May 1st, 2023.</strong> From The Sourced Podcast Network in New York City, this is your host, Pokie Huang. Stories in today's episode come from <strong>Trac Bannon</strong> in San Francisco, California, <strong>Katy Craig</strong> in San Diego, California, <strong>Edwin Kwan</strong> in Sydney, Australia and <strong>Marcel Brown</strong> in St. Louis, Missouri. </p><p>Let's get to it.</p><h3>Trac Bannon - RSAC - TACOS Attestation OpenSource Framework</h3><p><a href="https://505updates.com/tracbannon/" rel="noopener noreferrer" target="_blank"><strong>🇺🇸</strong> Tracy (Trac) Bannon, San Francisco , California</a> ↗</p><p><a href="https://www.rsaconference.com/usa" rel="noopener noreferrer" target="_blank">https://www.rsaconference.com/us</a></p><p><a href="https://github.com/tacosframework" rel="noopener noreferrer" target="_blank">TACOS Framework · GitHub</a></p><p><a href="https://tidelift.com/" rel="noopener noreferrer" target="_blank">Tidelift</a></p><h3>ChatGPT outperforms Doctors</h3><p><a href="https://505updates.com/katycraig/" rel="noopener noreferrer" target="_blank">🇺🇸 Katy Craig, San Diego, California ↗</a></p><p><a href="https://today.ucsd.edu/story/study-finds-chatgpt-outperforms-physicians-in-high-quality-empathetic-answers-to-patient-questions" rel="noopener noreferrer" target="_blank">Study Finds ChatGPT Outperforms Physicians in High-Quality, Empathetic Answers to Patient Questions</a></p><p><a href="https://jamanetwork.com/journals/jamainternalmedicine/fullarticle/2804309?" rel="noopener noreferrer" target="_blank">Comparing Physician and Chatbot Responses to Patient Questions</a></p><p><a href="https://www.theguardian.com/society/2023/apr/30/artificial-intelligence-tool-identify-cancer-ai" rel="noopener noreferrer" target="_blank">https://www.theguardian.com/society/2023/apr/30/artificial-intelligence-tool-identify-cancer-ai</a></p><p>&nbsp;</p><h3>Is End to End Encryption Good or Bad</h3><p><a href="https://505updates.com/edwinkwan/" rel="noopener noreferrer" target="_blank">🇦🇺 Edwin Kwan, Sydney, Australia ↗</a></p><p><a href="https://www.abc.net.au/radionational/programs/bigideas/is-end-to-end-encryption-good-or-bad/102017112" rel="noopener noreferrer" target="_blank">Is end-to-end encryption good or bad? - ABC Radio National</a></p><p><a href="https://www.gresham.ac.uk/watch-now/problem-encryption" rel="noopener noreferrer" target="_blank">What's The Problem With Encryption? | Gresham College</a></p><p><br></p><h3>This Day in Tech History</h3><p><a href="https://505updates.com/marcelbrown/" rel="noopener noreferrer" target="_blank"><strong>🇺🇸</strong> Marcel Brown, St. Louis, Missouri ↗</a></p><p><a href="http://thisdayintechhistory.com/04/30" rel="noopener noreferrer" target="_blank">http://thisdayintechhistory.com/04/30</a></p><p><a href="http://thisdayintechhistory.com/05/01" rel="noopener noreferrer" target="_blank">http://thisdayintechhistory.com/05/01</a></p>]]></content:encoded><link><![CDATA[https://3zozb9fxlbueipjyapmaas.captivate.fm/episode/episode-131-tacos-chatgpt-outperforms-doctors-end-to-end-encryption]]></link><guid isPermaLink="false">068f6062-a63a-4783-bd38-c07da9dcb3e7</guid><itunes:image href="https://artwork.captivate.fm/3bf1992e-badb-4327-a11b-ce26ee7d4f16/VK6LhcAiEWhQy58I3_wrh6jc.png"/><dc:creator><![CDATA[Contributors from Around the World]]></dc:creator><pubDate>Mon, 01 May 2023 16:45:00 -0400</pubDate><enclosure url="https://dts.podtrac.com/redirect.mp3/podcasts.captivate.fm/media/163e1714-8a5d-4363-a2f4-bd040b56ff22/2023-05-01-505-Episode-131-converted.mp3" length="7700489" type="audio/mpeg"/><itunes:duration>10:42</itunes:duration><itunes:explicit>false</itunes:explicit><itunes:episodeType>full</itunes:episodeType><itunes:season>1</itunes:season><itunes:episode>131</itunes:episode><itunes:season>1</itunes:season><podcast:episode>131</podcast:episode><podcast:season>1</podcast:season><itunes:author>Contributors from Around the World</itunes:author></item><item><title>Episode #130 - RSAC Week In Review, Github, Google vs CyptBot</title><itunes:title>Episode #130 - RSAC Week In Review, Github, Google vs CyptBot</itunes:title><description><![CDATA[<p><strong>Hey, it's 5:05 on Friday, April 28th, 2023.</strong> From The Sourced Podcast Network in New York City, this is your host, Pokie Huang. Stories in today's episode come from <strong>Edwin Kwan</strong> in Sydney, Australia, <strong>Katy Craig</strong> in San Diego, California, <strong>Marcel Brown</strong> in St. Louis, Missouri. We'll begin today's episode with a couple of RSAC review segments from <strong>Trac Bannon, Chris Hughes</strong> and <strong>Mark Miller</strong>. Let's get to it.</p><h3>RSAC, a day after</h3><p><a href="https://505updates.com/markmiller/" rel="noopener noreferrer" target="_blank">🇺🇸 Mark Miller, San Francisco, CA ↗</a></p><h3>Chris Hughes - RSAC Week In Review</h3><p><a href="https://505updates.com/chrishughes/" rel="noopener noreferrer" target="_blank">🇺🇸 Chris Hughes, Virginia Beach, Virginia ↗</a></p><h3><br></h3><h3>Trac Bannon - RSAC Week In Review&nbsp;</h3><p><a href="https://505updates.com/tracbannon/" rel="noopener noreferrer" target="_blank"><strong>🇺🇸</strong> Tracy (Trac) Bannon, San Francisco , California</a> ↗</p><p><a href="https://www.rsaconference.com/usa" rel="noopener noreferrer" target="_blank">https://www.rsaconference.com/usa</a></p><p><br></p><h3>Enable GitHub Private Vulnerability Reporting at Scale</h3><p><a href="https://505updates.com/edwinkwan/" rel="noopener noreferrer" target="_blank">🇦🇺 Edwin Kwan, Sydney, Australia ↗</a></p><p><a href="https://www.bleepingcomputer.com/news/security/github-now-allows-enabling-private-vulnerability-reporting-at-scale/" rel="noopener noreferrer" target="_blank">GitHub now allows enabling private vulnerability reporting at scale</a></p><p><br></p><h3>Google Takes Down CryptBot</h3><p><a href="https://505updates.com/katycraig/" rel="noopener noreferrer" target="_blank">🇺🇸 Katy Craig, San Diego, California ↗</a></p><p><br></p><h3>This Day in Tech History</h3><p><a href="https://505updates.com/marcelbrown/" rel="noopener noreferrer" target="_blank"><strong>🇺🇸</strong> Marcel Brown, St. Louis, Missouri ↗</a></p><p><a href="http://thisdayintechhistory.com/04/28" rel="noopener noreferrer" target="_blank">http://thisdayintechhistory.com/04/28</a></p><p><a href="http://thisdayintechhistory.com/04/29" rel="noopener noreferrer" target="_blank">http://thisdayintechhistory.com/04/29</a></p><p><br></p>]]></description><content:encoded><![CDATA[<p><strong>Hey, it's 5:05 on Friday, April 28th, 2023.</strong> From The Sourced Podcast Network in New York City, this is your host, Pokie Huang. Stories in today's episode come from <strong>Edwin Kwan</strong> in Sydney, Australia, <strong>Katy Craig</strong> in San Diego, California, <strong>Marcel Brown</strong> in St. Louis, Missouri. We'll begin today's episode with a couple of RSAC review segments from <strong>Trac Bannon, Chris Hughes</strong> and <strong>Mark Miller</strong>. Let's get to it.</p><h3>RSAC, a day after</h3><p><a href="https://505updates.com/markmiller/" rel="noopener noreferrer" target="_blank">🇺🇸 Mark Miller, San Francisco, CA ↗</a></p><h3>Chris Hughes - RSAC Week In Review</h3><p><a href="https://505updates.com/chrishughes/" rel="noopener noreferrer" target="_blank">🇺🇸 Chris Hughes, Virginia Beach, Virginia ↗</a></p><h3><br></h3><h3>Trac Bannon - RSAC Week In Review&nbsp;</h3><p><a href="https://505updates.com/tracbannon/" rel="noopener noreferrer" target="_blank"><strong>🇺🇸</strong> Tracy (Trac) Bannon, San Francisco , California</a> ↗</p><p><a href="https://www.rsaconference.com/usa" rel="noopener noreferrer" target="_blank">https://www.rsaconference.com/usa</a></p><p><br></p><h3>Enable GitHub Private Vulnerability Reporting at Scale</h3><p><a href="https://505updates.com/edwinkwan/" rel="noopener noreferrer" target="_blank">🇦🇺 Edwin Kwan, Sydney, Australia ↗</a></p><p><a href="https://www.bleepingcomputer.com/news/security/github-now-allows-enabling-private-vulnerability-reporting-at-scale/" rel="noopener noreferrer" target="_blank">GitHub now allows enabling private vulnerability reporting at scale</a></p><p><br></p><h3>Google Takes Down CryptBot</h3><p><a href="https://505updates.com/katycraig/" rel="noopener noreferrer" target="_blank">🇺🇸 Katy Craig, San Diego, California ↗</a></p><p><br></p><h3>This Day in Tech History</h3><p><a href="https://505updates.com/marcelbrown/" rel="noopener noreferrer" target="_blank"><strong>🇺🇸</strong> Marcel Brown, St. Louis, Missouri ↗</a></p><p><a href="http://thisdayintechhistory.com/04/28" rel="noopener noreferrer" target="_blank">http://thisdayintechhistory.com/04/28</a></p><p><a href="http://thisdayintechhistory.com/04/29" rel="noopener noreferrer" target="_blank">http://thisdayintechhistory.com/04/29</a></p><p><br></p>]]></content:encoded><link><![CDATA[https://3zozb9fxlbueipjyapmaas.captivate.fm/episode/episode-130-rsac-week-in-review-github-google-vs-cyptbot]]></link><guid isPermaLink="false">52c8fb71-75e1-4629-9a41-daddf8ca4b8b</guid><itunes:image href="https://artwork.captivate.fm/3cbdb0b1-8f8b-4742-a1cc-187ec1ebe4a6/DvWgH5BsvVNLEiKOENBJnYD7.png"/><dc:creator><![CDATA[Contributors from Around the World]]></dc:creator><pubDate>Fri, 28 Apr 2023 16:45:00 -0400</pubDate><enclosure url="https://dts.podtrac.com/redirect.mp3/podcasts.captivate.fm/media/ef58ec67-071a-423d-b498-6f2c372800d6/2023-04-28-505-Episode-130-converted.mp3" length="11661175" type="audio/mpeg"/><itunes:duration>16:12</itunes:duration><itunes:explicit>false</itunes:explicit><itunes:episodeType>full</itunes:episodeType><itunes:season>1</itunes:season><itunes:episode>130</itunes:episode><itunes:season>1</itunes:season><podcast:episode>130</podcast:episode><podcast:season>1</podcast:season><itunes:author>Contributors from Around the World</itunes:author></item><item><title>Episode #129 - live at RSAC, Passwordless, Google Authenticator</title><itunes:title>Episode #129 - live at RSAC, Passwordless, Google Authenticator</itunes:title><description><![CDATA[<p>Hey, it's 5:05 on Thursday, April 27th, 2023. From The Sourced Podcast Network in New York City, this is your host, Pokie Huang. We will start our episode today with Kadi Grigg and Trac Bannon reporting live from RSAC in San Francisco and followed by segments from Edwin Kwan in Sydney, Australia, Marcel Brown in St. Louis, Missouri.&nbsp;</p><p>Let's get to it.</p><h3>Kadi Grigg with Curtis Yanko live at RSAC</h3><p><a href="https://505updates.com/kadigrigg/" rel="noopener noreferrer" target="_blank">🇺🇸 Kadi Grigg, San Francisco, CA </a>↗</p><h3>Trac Bannon live at RSAC - A Starting Definition for Passwordless</h3><p><a href="https://505updates.com/tracbannon/" rel="noopener noreferrer" target="_blank"><strong>🇺🇸</strong> Tracy (Trac) Bannon, San Francisco , California</a> ↗</p><p><a href="https://www.secureauth.com/" rel="noopener noreferrer" target="_blank">https://www.secureauth.com/</a></p><p><a href="https://www.rsaconference.com/usa" rel="noopener noreferrer" target="_blank">https://www.rsaconference.com/usa</a></p><p><br></p><h3>Google Authenticator to Get End to End Encryption Following Security Concerns</h3><p><a href="https://505updates.com/edwinkwan/" rel="noopener noreferrer" target="_blank">🇦🇺 Edwin Kwan, Sydney, Australia ↗</a></p><p><a href="https://www.bleepingcomputer.com/news/google/google-will-add-end-to-end-encryption-to-google-authenticator/" rel="noopener noreferrer" target="_blank">Google will add End-to-End encryption to Google Authenticator</a></p><p><br></p><h3>This Day in Tech History</h3><p><a href="https://505updates.com/marcelbrown/" rel="noopener noreferrer" target="_blank"><strong>🇺🇸</strong> Marcel Brown, St. Louis, Missouri ↗</a></p><p><a href="http://thisdayintechhistory.com/04/27" rel="noopener noreferrer" target="_blank">http://thisdayintechhistory.com/04/27</a></p>]]></description><content:encoded><![CDATA[<p>Hey, it's 5:05 on Thursday, April 27th, 2023. From The Sourced Podcast Network in New York City, this is your host, Pokie Huang. We will start our episode today with Kadi Grigg and Trac Bannon reporting live from RSAC in San Francisco and followed by segments from Edwin Kwan in Sydney, Australia, Marcel Brown in St. Louis, Missouri.&nbsp;</p><p>Let's get to it.</p><h3>Kadi Grigg with Curtis Yanko live at RSAC</h3><p><a href="https://505updates.com/kadigrigg/" rel="noopener noreferrer" target="_blank">🇺🇸 Kadi Grigg, San Francisco, CA </a>↗</p><h3>Trac Bannon live at RSAC - A Starting Definition for Passwordless</h3><p><a href="https://505updates.com/tracbannon/" rel="noopener noreferrer" target="_blank"><strong>🇺🇸</strong> Tracy (Trac) Bannon, San Francisco , California</a> ↗</p><p><a href="https://www.secureauth.com/" rel="noopener noreferrer" target="_blank">https://www.secureauth.com/</a></p><p><a href="https://www.rsaconference.com/usa" rel="noopener noreferrer" target="_blank">https://www.rsaconference.com/usa</a></p><p><br></p><h3>Google Authenticator to Get End to End Encryption Following Security Concerns</h3><p><a href="https://505updates.com/edwinkwan/" rel="noopener noreferrer" target="_blank">🇦🇺 Edwin Kwan, Sydney, Australia ↗</a></p><p><a href="https://www.bleepingcomputer.com/news/google/google-will-add-end-to-end-encryption-to-google-authenticator/" rel="noopener noreferrer" target="_blank">Google will add End-to-End encryption to Google Authenticator</a></p><p><br></p><h3>This Day in Tech History</h3><p><a href="https://505updates.com/marcelbrown/" rel="noopener noreferrer" target="_blank"><strong>🇺🇸</strong> Marcel Brown, St. Louis, Missouri ↗</a></p><p><a href="http://thisdayintechhistory.com/04/27" rel="noopener noreferrer" target="_blank">http://thisdayintechhistory.com/04/27</a></p>]]></content:encoded><link><![CDATA[https://3zozb9fxlbueipjyapmaas.captivate.fm/episode/episode-129-live-at-rsac-passwordless-google-authenticator]]></link><guid isPermaLink="false">760ec4c5-2619-4bb9-b2e7-73f132086a56</guid><itunes:image href="https://artwork.captivate.fm/efcc8374-7f9d-4327-9dc8-3a9514c242a2/dsWx51AOY-ZUwcs2CYPV32gs.png"/><dc:creator><![CDATA[Contributors from Around the World]]></dc:creator><pubDate>Thu, 27 Apr 2023 16:45:00 -0400</pubDate><enclosure url="https://dts.podtrac.com/redirect.mp3/podcasts.captivate.fm/media/b6e7d7a6-2597-4546-9880-da60fc04104f/2023-04-27-505-Episode-129-converted.mp3" length="7331222" type="audio/mpeg"/><itunes:duration>10:11</itunes:duration><itunes:explicit>false</itunes:explicit><itunes:episodeType>full</itunes:episodeType><itunes:season>1</itunes:season><itunes:episode>129</itunes:episode><itunes:season>1</itunes:season><podcast:episode>129</podcast:episode><podcast:season>1</podcast:season><itunes:author>Contributors from Around the World</itunes:author></item><item><title>Episode #128 - Live from RSAC, Disclosure Transparency, Google Authenticator</title><itunes:title>Episode #128 - Live from RSAC, Disclosure Transparency, Google Authenticator</itunes:title><description><![CDATA[<p>Hey, it's 5:05 on Wednesday, April 26th, 2023 from the Sourced Podcast Network in New York City, this is your host, Pokie Huang Stories in today's episode, come from Edwin Kwan in Sydney, Australia, Shannon Lietz in San Diego, California, Trac Bannon live at RSAC with DJ Schleen and Kadi Grigg, Mark Miller reporting live at the RSAC floor with Brian Reed.</p><p>Let's get to it.</p><p><br></p><h3>Mark Miller and Brian Reed live at RSAC</h3><p><a href="https://505updates.com/markmiller/" rel="noopener noreferrer" target="_blank"><strong>🇺🇸</strong> Mark Miller, San Francisco, CA ↗</a></p><p><br></p><p><strong>Trac Bannon and DJ Schleen, Kadi Grigg live at RSAC</strong></p><p><a href="https://505updates.com/tracbannon/" rel="noopener noreferrer" target="_blank"><strong>🇺🇸</strong> Tracy (Trac) Bannon, San Francisco , California</a> ↗</p><p><a href="http://505updates.com/djschleen/" rel="noopener noreferrer" target="_blank"><strong>🇺🇸</strong> DJ Schleen, Golden, Colorado ↗</a></p><p><a href="https://505updates.com/kadigrigg/" rel="noopener noreferrer" target="_blank">🇺🇸 Kadi Grigg, San Francisco, CA </a>↗</p><p><br></p><h3>Changing Nature of Disclosure Transparency</h3><p><a href="https://505updates.com/shannonlietz/" rel="noopener noreferrer" target="_blank"><strong>🇺🇸</strong> Shannon Lietz, San Diego, California ↗</a></p><p><br></p><h3>Google Authenticator Now Synchronises to the Cloud. Should You Enable It?</h3><p><a href="https://505updates.com/edwinkwan/" rel="noopener noreferrer" target="_blank">🇦🇺 Edwin Kwan, Sydney, Australia ↗</a></p><p><a href="https://www.techspot.com/news/98437-google-authenticator-introduces-two-factor-access-code-synchronization.html" rel="noopener noreferrer" target="_blank">Google Authenticator introduces two-factor access code synchronization to the cloud | TechSpot</a></p><p><a href="https://defcon.social/@mysk/110262313275622023" rel="noopener noreferrer" target="_blank">Mysk🇨🇦🇩🇪: "Google has just updated its 2F…" - DEF CON Social</a>&nbsp;</p><p><br></p>]]></description><content:encoded><![CDATA[<p>Hey, it's 5:05 on Wednesday, April 26th, 2023 from the Sourced Podcast Network in New York City, this is your host, Pokie Huang Stories in today's episode, come from Edwin Kwan in Sydney, Australia, Shannon Lietz in San Diego, California, Trac Bannon live at RSAC with DJ Schleen and Kadi Grigg, Mark Miller reporting live at the RSAC floor with Brian Reed.</p><p>Let's get to it.</p><p><br></p><h3>Mark Miller and Brian Reed live at RSAC</h3><p><a href="https://505updates.com/markmiller/" rel="noopener noreferrer" target="_blank"><strong>🇺🇸</strong> Mark Miller, San Francisco, CA ↗</a></p><p><br></p><p><strong>Trac Bannon and DJ Schleen, Kadi Grigg live at RSAC</strong></p><p><a href="https://505updates.com/tracbannon/" rel="noopener noreferrer" target="_blank"><strong>🇺🇸</strong> Tracy (Trac) Bannon, San Francisco , California</a> ↗</p><p><a href="http://505updates.com/djschleen/" rel="noopener noreferrer" target="_blank"><strong>🇺🇸</strong> DJ Schleen, Golden, Colorado ↗</a></p><p><a href="https://505updates.com/kadigrigg/" rel="noopener noreferrer" target="_blank">🇺🇸 Kadi Grigg, San Francisco, CA </a>↗</p><p><br></p><h3>Changing Nature of Disclosure Transparency</h3><p><a href="https://505updates.com/shannonlietz/" rel="noopener noreferrer" target="_blank"><strong>🇺🇸</strong> Shannon Lietz, San Diego, California ↗</a></p><p><br></p><h3>Google Authenticator Now Synchronises to the Cloud. Should You Enable It?</h3><p><a href="https://505updates.com/edwinkwan/" rel="noopener noreferrer" target="_blank">🇦🇺 Edwin Kwan, Sydney, Australia ↗</a></p><p><a href="https://www.techspot.com/news/98437-google-authenticator-introduces-two-factor-access-code-synchronization.html" rel="noopener noreferrer" target="_blank">Google Authenticator introduces two-factor access code synchronization to the cloud | TechSpot</a></p><p><a href="https://defcon.social/@mysk/110262313275622023" rel="noopener noreferrer" target="_blank">Mysk🇨🇦🇩🇪: "Google has just updated its 2F…" - DEF CON Social</a>&nbsp;</p><p><br></p>]]></content:encoded><link><![CDATA[https://3zozb9fxlbueipjyapmaas.captivate.fm/episode/episode-128-live-from-rsac-disclosure-transparency-google-authenticator]]></link><guid isPermaLink="false">626a78f5-44c2-4687-bb0a-73b1ef5724e5</guid><itunes:image href="https://artwork.captivate.fm/e617ec79-eb6f-4490-98fc-107bbdf8733d/sAsKFCEv_RKY6tYpD2iP4cZx.png"/><dc:creator><![CDATA[Contributors from Around the World]]></dc:creator><pubDate>Wed, 26 Apr 2023 16:45:00 -0400</pubDate><enclosure url="https://dts.podtrac.com/redirect.mp3/podcasts.captivate.fm/media/47cd9948-a59a-41fd-a761-3cfbdc8e7c27/2023-04-26-505-Episode-128-converted.mp3" length="10562082" type="audio/mpeg"/><itunes:duration>14:40</itunes:duration><itunes:explicit>false</itunes:explicit><itunes:episodeType>full</itunes:episodeType><itunes:season>1</itunes:season><itunes:episode>128</itunes:episode><itunes:season>1</itunes:season><podcast:episode>128</podcast:episode><podcast:season>1</podcast:season><itunes:author>Contributors from Around the World</itunes:author></item><item><title>Episode #127 - RSA, John Willis at RSAC, TAFE South Australia, 3CX Supply Chain Hack, New ECCRI Report</title><itunes:title>Episode #127 - RSA, John Willis at RSAC, TAFE South Australia, 3CX Supply Chain Hack, New ECCRI Report</itunes:title><description><![CDATA[<p><strong>Hey, it's 5:05 on Tuesday, April 25th, 2023.</strong> From the Sourced Podcast Network in New York City, this is your host, Pokie Huang. Stories in today's episode come from <strong>Edwin Kwan</strong> in Sydney, Australia, <strong>Katy Craig</strong> in San Diego, California, <strong>Ian Garrett</strong>, in Arlington, Virginia and <strong>Marcel Brown</strong> in St. Louis, Missouri.</p><p>We'll start with <strong>Kadi Grigg</strong> and <strong>Mark Miller</strong> live from RSA in San Francisco, California.&nbsp;</p><p>Let's get to it.&nbsp;</p><h3>Ready for RSA?</h3><p><a href="https://505updates.com/kadigrigg/" rel="noopener noreferrer" target="_blank">🇺🇸 Kadi Grigg, San Francisco, CA </a>↗</p><h3>John Willis at RSAC</h3><p><a href="https://505updates.com/markmiller/" rel="noopener noreferrer" target="_blank"><strong>🇺🇸</strong> Mark Miller, San Francisco, CA ↗</a></p><p><br></p><h3>TAFE South Australia Suffers Data Breach</h3><p><a href="https://505updates.com/edwinkwan/" rel="noopener noreferrer" target="_blank">🇦🇺 Edwin Kwan, Sydney, Australia ↗</a></p><p><a href="https://www.itnews.com.au/news/tafe-data-breach-uncovered-by-sa-police-592945" rel="noopener noreferrer" target="_blank">TAFE data breach uncovered by SA Police - Security - iTnews</a></p><p><br></p><h3>3CX Supply Chain Hack Summary and Timeline</h3><p><a href="https://505updates.com/katycraig/" rel="noopener noreferrer" target="_blank"><strong>🇺🇸</strong> Katy Craig, San Diego, California ↗</a></p><p><a href="https://zetter.substack.com/p/updates-and-timeline-for-3cx-and" rel="noopener noreferrer" target="_blank">Updates and Timeline for 3CX and X_Trader Hacks (substack.com)</a></p><p><a href="https://zetter.substack.com/p/software-maker-3cx-was-compromised" rel="noopener noreferrer" target="_blank">Software Maker 3CX Was Compromised in First-of-its-Kind Threaded Supply-Chain Hack - Updated</a></p><p><a href="https://www.mandiant.com/resources/blog/3cx-software-supply-chain-compromise" rel="noopener noreferrer" target="_blank">3CX Software Supply Chain Compromise Initiated by a Prior Software Supply Chain Compromise; Suspected North Korean Actor Responsible | Mandiant</a></p><p><br></p><h3>New ECCRI Report and the Unprecedented Dynamics of Russian Cyber Operations</h3><p><a href="🇺🇸 Ian Garrett, Arlington, Virginia ↗" rel="noopener noreferrer" target="_blank">🇺🇸 Ian Garrett, Arlington, Virginia ↗</a></p><p><a href="https://www.ncsc.gov.uk/news/new-analysis-eccri-highlights-ukraine-defence-against-russian-offensive?utm_source=newsletter.returnonsecurity.com&amp;utm_medium=newsletter&amp;utm_campaign=security-funded-90-conference-corn-rsa-innovation-sandbox-and-the-smell-of-the-expo-floor-in-the-morning" rel="noopener noreferrer" target="_blank">New analysis highlights strength of Ukraine's defence against “unprecedented” Russian offensive</a></p><p><a href="https://eccri.eu/wp-content/uploads/2023/04/ECCRI_REPORT_The-Cyber-Dimensions-of-the-Russia-Ukraine-War-19042023.pdf" rel="noopener noreferrer" target="_blank">https://eccri.eu/wp-content/uploads/2023/04/ECCRI_REPORT_The-Cyber-Dimensions-of-the-Russia-Ukraine-War-19042023.pdf</a></p><p><br></p><p><br></p><h3>This Day in Tech History</h3><p><a href="https://505updates.com/marcelbrown/" rel="noopener noreferrer" target="_blank"><strong>🇺🇸</strong> Marcel Brown, St. Louis, Missouri ↗</a></p><p><a href="http://thisdayintechhistory.com/04/25/" rel="noopener noreferrer" target="_blank">http://thisdayintechhistory.com/04/25/</a></p>]]></description><content:encoded><![CDATA[<p><strong>Hey, it's 5:05 on Tuesday, April 25th, 2023.</strong> From the Sourced Podcast Network in New York City, this is your host, Pokie Huang. Stories in today's episode come from <strong>Edwin Kwan</strong> in Sydney, Australia, <strong>Katy Craig</strong> in San Diego, California, <strong>Ian Garrett</strong>, in Arlington, Virginia and <strong>Marcel Brown</strong> in St. Louis, Missouri.</p><p>We'll start with <strong>Kadi Grigg</strong> and <strong>Mark Miller</strong> live from RSA in San Francisco, California.&nbsp;</p><p>Let's get to it.&nbsp;</p><h3>Ready for RSA?</h3><p><a href="https://505updates.com/kadigrigg/" rel="noopener noreferrer" target="_blank">🇺🇸 Kadi Grigg, San Francisco, CA </a>↗</p><h3>John Willis at RSAC</h3><p><a href="https://505updates.com/markmiller/" rel="noopener noreferrer" target="_blank"><strong>🇺🇸</strong> Mark Miller, San Francisco, CA ↗</a></p><p><br></p><h3>TAFE South Australia Suffers Data Breach</h3><p><a href="https://505updates.com/edwinkwan/" rel="noopener noreferrer" target="_blank">🇦🇺 Edwin Kwan, Sydney, Australia ↗</a></p><p><a href="https://www.itnews.com.au/news/tafe-data-breach-uncovered-by-sa-police-592945" rel="noopener noreferrer" target="_blank">TAFE data breach uncovered by SA Police - Security - iTnews</a></p><p><br></p><h3>3CX Supply Chain Hack Summary and Timeline</h3><p><a href="https://505updates.com/katycraig/" rel="noopener noreferrer" target="_blank"><strong>🇺🇸</strong> Katy Craig, San Diego, California ↗</a></p><p><a href="https://zetter.substack.com/p/updates-and-timeline-for-3cx-and" rel="noopener noreferrer" target="_blank">Updates and Timeline for 3CX and X_Trader Hacks (substack.com)</a></p><p><a href="https://zetter.substack.com/p/software-maker-3cx-was-compromised" rel="noopener noreferrer" target="_blank">Software Maker 3CX Was Compromised in First-of-its-Kind Threaded Supply-Chain Hack - Updated</a></p><p><a href="https://www.mandiant.com/resources/blog/3cx-software-supply-chain-compromise" rel="noopener noreferrer" target="_blank">3CX Software Supply Chain Compromise Initiated by a Prior Software Supply Chain Compromise; Suspected North Korean Actor Responsible | Mandiant</a></p><p><br></p><h3>New ECCRI Report and the Unprecedented Dynamics of Russian Cyber Operations</h3><p><a href="🇺🇸 Ian Garrett, Arlington, Virginia ↗" rel="noopener noreferrer" target="_blank">🇺🇸 Ian Garrett, Arlington, Virginia ↗</a></p><p><a href="https://www.ncsc.gov.uk/news/new-analysis-eccri-highlights-ukraine-defence-against-russian-offensive?utm_source=newsletter.returnonsecurity.com&amp;utm_medium=newsletter&amp;utm_campaign=security-funded-90-conference-corn-rsa-innovation-sandbox-and-the-smell-of-the-expo-floor-in-the-morning" rel="noopener noreferrer" target="_blank">New analysis highlights strength of Ukraine's defence against “unprecedented” Russian offensive</a></p><p><a href="https://eccri.eu/wp-content/uploads/2023/04/ECCRI_REPORT_The-Cyber-Dimensions-of-the-Russia-Ukraine-War-19042023.pdf" rel="noopener noreferrer" target="_blank">https://eccri.eu/wp-content/uploads/2023/04/ECCRI_REPORT_The-Cyber-Dimensions-of-the-Russia-Ukraine-War-19042023.pdf</a></p><p><br></p><p><br></p><h3>This Day in Tech History</h3><p><a href="https://505updates.com/marcelbrown/" rel="noopener noreferrer" target="_blank"><strong>🇺🇸</strong> Marcel Brown, St. Louis, Missouri ↗</a></p><p><a href="http://thisdayintechhistory.com/04/25/" rel="noopener noreferrer" target="_blank">http://thisdayintechhistory.com/04/25/</a></p>]]></content:encoded><link><![CDATA[https://3zozb9fxlbueipjyapmaas.captivate.fm/episode/episode-127-rsa-john-willis-at-rsac-tafe-south-australia-3cx-supply-chain-hack-new-eccri-report]]></link><guid isPermaLink="false">a25c9d52-8dc3-4f3d-98d7-15ee0c51cff2</guid><itunes:image href="https://artwork.captivate.fm/2800d701-7029-4376-b13f-a2adf9b3f0ef/4J21FSo4FY3oujo_4XLVnTP0.png"/><dc:creator><![CDATA[Contributors from Around the World]]></dc:creator><pubDate>Tue, 25 Apr 2023 16:45:00 -0400</pubDate><enclosure url="https://dts.podtrac.com/redirect.mp3/podcasts.captivate.fm/media/a9a4a4c7-bf0b-43c0-95e6-8c234352e544/2023-04-25-505-Episode-127-converted.mp3" length="8326418" type="audio/mpeg"/><itunes:duration>11:34</itunes:duration><itunes:explicit>false</itunes:explicit><itunes:episodeType>full</itunes:episodeType><itunes:season>1</itunes:season><itunes:episode>127</itunes:episode><itunes:season>1</itunes:season><podcast:episode>127</podcast:episode><podcast:season>1</podcast:season><itunes:author>Contributors from Around the World</itunes:author></item><item><title>Episode #126 - RSA 2023, RSA Becomes Questionable?, AI Hype, Unmaintained Wordpress Plugin, Kubernetes Report</title><itunes:title>Episode #126 - RSA 2023, RSA Becomes Questionable?, AI Hype, Unmaintained Wordpress Plugin, Kubernetes Report</itunes:title><description><![CDATA[<p><strong>Hey, it's 5:05 on April 24th, 2023. Happy Monday!</strong> Stories in today's episode come from <strong>Trac Bannon</strong> in San Francisco, California, <strong>Katy Craig</strong> in San Diego, California, <strong>Edwin Kwan</strong> in Sydney, Australia, <strong>Shannon Lietz</strong> in San Diego, California and <strong>Marcel Brown</strong> in St. Louis, Missouri. We'll begin our first segment today from our Executive Producer, <strong>Mark Miller</strong> from RSA Conference in San Francisco.</p><p>Let's get to it.</p><h3>RSA 2023</h3><p><a href="https://505updates.com/markmiller/" rel="noopener noreferrer" target="_blank"><strong>🇺🇸</strong> Mark Miller, New York City ↗</a></p><p><strong>Has the RSA Conference Become Questionable??</strong></p><p><a href="https://505updates.com/tracbannon/" rel="noopener noreferrer" target="_blank"><strong>🇺🇸</strong> Tracy (Trac) Bannon, San Francisco , California</a> ↗</p><p><a href="https://www.rsaconference.com/usa/agenda/session/devops-connect-devsecops" rel="noopener noreferrer" target="_blank">DevOps Connect at RSAC: DevOps is Now DevSecOps Presented by Techstrong Group | RSA Conference</a></p><p><br></p><h3>AI Hype</h3><p><a href="https://505updates.com/katycraig/" rel="noopener noreferrer" target="_blank"><strong>🇺🇸</strong> Katy Craig, San Diego, California ↗</a></p><p><a href="https://twitter.com/mmitchell_ai/status/1648029417497853953?s=20" rel="noopener noreferrer" target="_blank">https://twitter.com/mmitchell_ai/status/1648029417497853953?s=20</a></p><p><a href="https://cbsn.ws/3mDTqDL" rel="noopener noreferrer" target="_blank">https://cbsn.ws/3mDTqDL</a></p><p><br></p><h3>Unmaintained WordPress Plugin Used to Compromise Website</h3><p><a href="https://505updates.com/edwinkwan/" rel="noopener noreferrer" target="_blank">🇦🇺 Edwin Kwan, Sydney, Australia ↗</a></p><p><a href="https://www.bleepingcomputer.com/news/security/attackers-use-abandoned-wordpress-plugin-to-backdoor-websites/" rel="noopener noreferrer" target="_blank">Attackers use abandoned WordPress plugin to backdoor websites</a></p><p><a href="https://blog.sucuri.net/2023/04/massive-abuse-of-abandoned-evalphp-wordpress-plugin.html" rel="noopener noreferrer" target="_blank">Massive Abuse of Abandoned Eval PHP WordPress Plugin</a></p><p><br></p><h3>Kubernetes Security Audit Report</h3><p><a href="https://505updates.com/shannonlietz/" rel="noopener noreferrer" target="_blank"><strong>🇺🇸</strong> Shannon Lietz, San Diego, California ↗</a></p><h3><br></h3><h3>This Day in Tech History</h3><p><a href="https://505updates.com/marcelbrown/" rel="noopener noreferrer" target="_blank"><strong>🇺🇸</strong> Marcel Brown, St. Louis, Missouri ↗</a></p><p><a href="http://thisdayintechhistory.com/04/23" rel="noopener noreferrer" target="_blank">http://thisdayintechhistory.com/04/23</a></p><p><a href="http://thisdayintechhistory.com/04/24" rel="noopener noreferrer" target="_blank">http://thisdayintechhistory.com/04/24</a></p>]]></description><content:encoded><![CDATA[<p><strong>Hey, it's 5:05 on April 24th, 2023. Happy Monday!</strong> Stories in today's episode come from <strong>Trac Bannon</strong> in San Francisco, California, <strong>Katy Craig</strong> in San Diego, California, <strong>Edwin Kwan</strong> in Sydney, Australia, <strong>Shannon Lietz</strong> in San Diego, California and <strong>Marcel Brown</strong> in St. Louis, Missouri. We'll begin our first segment today from our Executive Producer, <strong>Mark Miller</strong> from RSA Conference in San Francisco.</p><p>Let's get to it.</p><h3>RSA 2023</h3><p><a href="https://505updates.com/markmiller/" rel="noopener noreferrer" target="_blank"><strong>🇺🇸</strong> Mark Miller, New York City ↗</a></p><p><strong>Has the RSA Conference Become Questionable??</strong></p><p><a href="https://505updates.com/tracbannon/" rel="noopener noreferrer" target="_blank"><strong>🇺🇸</strong> Tracy (Trac) Bannon, San Francisco , California</a> ↗</p><p><a href="https://www.rsaconference.com/usa/agenda/session/devops-connect-devsecops" rel="noopener noreferrer" target="_blank">DevOps Connect at RSAC: DevOps is Now DevSecOps Presented by Techstrong Group | RSA Conference</a></p><p><br></p><h3>AI Hype</h3><p><a href="https://505updates.com/katycraig/" rel="noopener noreferrer" target="_blank"><strong>🇺🇸</strong> Katy Craig, San Diego, California ↗</a></p><p><a href="https://twitter.com/mmitchell_ai/status/1648029417497853953?s=20" rel="noopener noreferrer" target="_blank">https://twitter.com/mmitchell_ai/status/1648029417497853953?s=20</a></p><p><a href="https://cbsn.ws/3mDTqDL" rel="noopener noreferrer" target="_blank">https://cbsn.ws/3mDTqDL</a></p><p><br></p><h3>Unmaintained WordPress Plugin Used to Compromise Website</h3><p><a href="https://505updates.com/edwinkwan/" rel="noopener noreferrer" target="_blank">🇦🇺 Edwin Kwan, Sydney, Australia ↗</a></p><p><a href="https://www.bleepingcomputer.com/news/security/attackers-use-abandoned-wordpress-plugin-to-backdoor-websites/" rel="noopener noreferrer" target="_blank">Attackers use abandoned WordPress plugin to backdoor websites</a></p><p><a href="https://blog.sucuri.net/2023/04/massive-abuse-of-abandoned-evalphp-wordpress-plugin.html" rel="noopener noreferrer" target="_blank">Massive Abuse of Abandoned Eval PHP WordPress Plugin</a></p><p><br></p><h3>Kubernetes Security Audit Report</h3><p><a href="https://505updates.com/shannonlietz/" rel="noopener noreferrer" target="_blank"><strong>🇺🇸</strong> Shannon Lietz, San Diego, California ↗</a></p><h3><br></h3><h3>This Day in Tech History</h3><p><a href="https://505updates.com/marcelbrown/" rel="noopener noreferrer" target="_blank"><strong>🇺🇸</strong> Marcel Brown, St. Louis, Missouri ↗</a></p><p><a href="http://thisdayintechhistory.com/04/23" rel="noopener noreferrer" target="_blank">http://thisdayintechhistory.com/04/23</a></p><p><a href="http://thisdayintechhistory.com/04/24" rel="noopener noreferrer" target="_blank">http://thisdayintechhistory.com/04/24</a></p>]]></content:encoded><link><![CDATA[https://3zozb9fxlbueipjyapmaas.captivate.fm/episode/episode-126-rsa-2023-rsa-becomes-questionable-ai-hype-unmaintained-wordpress-plugin-kubernetes-report]]></link><guid isPermaLink="false">8d0b0a77-c9ab-4461-89c2-28f4da87bb04</guid><itunes:image href="https://artwork.captivate.fm/5291db95-94e6-42a8-a5c0-70c854e5dfd2/o64h5uSBWhiVu_Gp0zLy1nFb.png"/><dc:creator><![CDATA[Contributors from Around the World]]></dc:creator><pubDate>Mon, 24 Apr 2023 16:45:00 -0400</pubDate><enclosure url="https://dts.podtrac.com/redirect.mp3/podcasts.captivate.fm/media/d5030b0b-f095-4a22-93ba-7dfaa5638fda/2023-04-24-505-Episode-126-converted.mp3" length="8293191" type="audio/mpeg"/><itunes:duration>11:31</itunes:duration><itunes:explicit>false</itunes:explicit><itunes:episodeType>full</itunes:episodeType><itunes:season>1</itunes:season><itunes:episode>126</itunes:episode><itunes:season>1</itunes:season><podcast:episode>126</podcast:episode><podcast:season>1</podcast:season><itunes:author>Contributors from Around the World</itunes:author></item><item><title>Episode #125 - LLM Datasets, Securing Supply Chain, Cybersecurity Wins, RBA K8s Exploit</title><itunes:title>Episode #125 - LLM Datasets, Securing Supply Chain, Cybersecurity Wins, RBA K8s Exploit</itunes:title><description><![CDATA[<p>Hey,</p><p><strong>it's 5:05</strong>. Thanks for being here on <strong>Friday,April 21st, 2023</strong> from the Sourced podcast Network in Camp Hill, Pennsylvania. This is your host, Bob Bannon. Stories in today's episode, come from <strong>Edwin Kwan </strong>in Sydney, Australia, <strong>Mark Miller</strong> in New York, <strong>Katy Craig</strong> in San Diego, California, and <strong>Shannon Lietz</strong> in San Diego California. Pokey will be back on Monday, but for now I still have the controls. Let's get to it. </p><h3>LLM Datasets</h3><p><a href="https://505updates.com/katycraig/" rel="noopener noreferrer" target="_blank"><strong>🇺🇸</strong> Katy Craig, San Diego, California ↗</a></p><p><a href="https://www.washingtonpost.com/technology/interactive/2023/ai-chatbot-learning/?itid=cp_CP-6_2" rel="noopener noreferrer" target="_blank">Inside the secret list of websites that make AI like ChatGPT sound smart</a></p><p><a href="https://www.semanticscholar.org/paper/Documenting-the-English-Colossal-Clean-Crawled-Dodge-Sap/40c3327a6ddb0603b6892344509c7f428ab43d81?itid=lk_inline_enhanced-template" rel="noopener noreferrer" target="_blank">[PDF] Documenting the English Colossal Clean Crawled Corpus | Semantic Scholar</a></p><p><br></p><h3>5 Steps for Securing Your Software Supply Chain</h3><p><a href="https://505updates.com/edwinkwan/" rel="noopener noreferrer" target="_blank">🇦🇺 Edwin Kwan, Sydney, Australia ↗</a></p><p><a href="https://www.rsaconference.com/Library/blog/5-steps-for-securing-your-software-supply-chain" rel="noopener noreferrer" target="_blank">5 Steps for Securing Your Software Supply Chain | RSA Conference</a></p><p><br></p><h3>Radical Transparency: Cybersecurity can impact business wins</h3><p><a href="https://505updates.com/shannonlietz/" rel="noopener noreferrer" target="_blank"><strong>🇺🇸</strong> Shannon Lietz, San Diego, California ↗</a></p><p><a href="https://www.prnewswire.com/news-releases/research-highlights-cyber-securitys-underestimated-role-as-a-business-and-revenue-enabler-301776455.html" rel="noopener noreferrer" target="_blank">Research Highlights Cyber Security's Underestimated Role as a Business and Revenue-enabler</a></p><p><a href="https://www.trendmicro.com/explore/risk-reward2023/2031-tl-en-rpt#page=1" rel="noopener noreferrer" target="_blank">https://www.trendmicro.com/explore/risk-reward2023/2031-tl-en-rpt#page=1</a>&nbsp;</p><p><br></p><h3>RBAC exploit in K8s</h3><p><a href="https://505updates.com/markmiller/" rel="noopener noreferrer" target="_blank"><strong>🇺🇸</strong> Mark Miller, New York City ↗</a></p><p><a href="https://blog.aquasec.com/leveraging-kubernetes-rbac-to-backdoor-clusters" rel="noopener noreferrer" target="_blank">First-Ever Attack Leveraging Kubernetes RBAC to Backdoor Clusters</a></p><p><a href="https://www.rsaconference.com/library/Presentation/USA/2023/DevOps%20Connect%20Deconstructing%20DevSecOps" rel="noopener noreferrer" target="_blank">https://www.rsaconference.com/library/Presentation/USA/2023/DevOps%20Connect%20Deconstructing%20DevSecOps</a></p><p><br></p>]]></description><content:encoded><![CDATA[<p>Hey,</p><p><strong>it's 5:05</strong>. Thanks for being here on <strong>Friday,April 21st, 2023</strong> from the Sourced podcast Network in Camp Hill, Pennsylvania. This is your host, Bob Bannon. Stories in today's episode, come from <strong>Edwin Kwan </strong>in Sydney, Australia, <strong>Mark Miller</strong> in New York, <strong>Katy Craig</strong> in San Diego, California, and <strong>Shannon Lietz</strong> in San Diego California. Pokey will be back on Monday, but for now I still have the controls. Let's get to it. </p><h3>LLM Datasets</h3><p><a href="https://505updates.com/katycraig/" rel="noopener noreferrer" target="_blank"><strong>🇺🇸</strong> Katy Craig, San Diego, California ↗</a></p><p><a href="https://www.washingtonpost.com/technology/interactive/2023/ai-chatbot-learning/?itid=cp_CP-6_2" rel="noopener noreferrer" target="_blank">Inside the secret list of websites that make AI like ChatGPT sound smart</a></p><p><a href="https://www.semanticscholar.org/paper/Documenting-the-English-Colossal-Clean-Crawled-Dodge-Sap/40c3327a6ddb0603b6892344509c7f428ab43d81?itid=lk_inline_enhanced-template" rel="noopener noreferrer" target="_blank">[PDF] Documenting the English Colossal Clean Crawled Corpus | Semantic Scholar</a></p><p><br></p><h3>5 Steps for Securing Your Software Supply Chain</h3><p><a href="https://505updates.com/edwinkwan/" rel="noopener noreferrer" target="_blank">🇦🇺 Edwin Kwan, Sydney, Australia ↗</a></p><p><a href="https://www.rsaconference.com/Library/blog/5-steps-for-securing-your-software-supply-chain" rel="noopener noreferrer" target="_blank">5 Steps for Securing Your Software Supply Chain | RSA Conference</a></p><p><br></p><h3>Radical Transparency: Cybersecurity can impact business wins</h3><p><a href="https://505updates.com/shannonlietz/" rel="noopener noreferrer" target="_blank"><strong>🇺🇸</strong> Shannon Lietz, San Diego, California ↗</a></p><p><a href="https://www.prnewswire.com/news-releases/research-highlights-cyber-securitys-underestimated-role-as-a-business-and-revenue-enabler-301776455.html" rel="noopener noreferrer" target="_blank">Research Highlights Cyber Security's Underestimated Role as a Business and Revenue-enabler</a></p><p><a href="https://www.trendmicro.com/explore/risk-reward2023/2031-tl-en-rpt#page=1" rel="noopener noreferrer" target="_blank">https://www.trendmicro.com/explore/risk-reward2023/2031-tl-en-rpt#page=1</a>&nbsp;</p><p><br></p><h3>RBAC exploit in K8s</h3><p><a href="https://505updates.com/markmiller/" rel="noopener noreferrer" target="_blank"><strong>🇺🇸</strong> Mark Miller, New York City ↗</a></p><p><a href="https://blog.aquasec.com/leveraging-kubernetes-rbac-to-backdoor-clusters" rel="noopener noreferrer" target="_blank">First-Ever Attack Leveraging Kubernetes RBAC to Backdoor Clusters</a></p><p><a href="https://www.rsaconference.com/library/Presentation/USA/2023/DevOps%20Connect%20Deconstructing%20DevSecOps" rel="noopener noreferrer" target="_blank">https://www.rsaconference.com/library/Presentation/USA/2023/DevOps%20Connect%20Deconstructing%20DevSecOps</a></p><p><br></p>]]></content:encoded><link><![CDATA[https://3zozb9fxlbueipjyapmaas.captivate.fm/episode/episode-125-llm-datasets-securing-supply-chain-cybersecurity-wins-rba-k8s-exploit]]></link><guid isPermaLink="false">93023c2c-e146-4184-9d2e-bd1be4094f60</guid><itunes:image href="https://artwork.captivate.fm/197376b7-97ad-4ab9-bd19-55a552bd6cd5/dOR-QTkXAzi4HAeaBymzmAFv.png"/><dc:creator><![CDATA[Contributors from Around the World]]></dc:creator><pubDate>Fri, 21 Apr 2023 16:45:00 -0400</pubDate><enclosure url="https://dts.podtrac.com/redirect.mp3/podcasts.captivate.fm/media/45f3e570-7892-4f4d-8b60-8f3ffad88831/2023-04-21-Episode-125-converted.mp3" length="6861430" type="audio/mpeg"/><itunes:duration>09:32</itunes:duration><itunes:explicit>false</itunes:explicit><itunes:episodeType>full</itunes:episodeType><itunes:season>1</itunes:season><itunes:episode>125</itunes:episode><itunes:season>1</itunes:season><podcast:episode>125</podcast:episode><podcast:season>1</podcast:season><itunes:author>Contributors from Around the World</itunes:author></item><item><title>Episode #124 - RSAC SFO 2023, Security Quest, Lazarus North Korea, Attack Records</title><itunes:title>Episode #124 - RSAC SFO 2023, Security Quest, Lazarus North Korea, Attack Records</itunes:title><description><![CDATA[<p>Hey, it's <strong>5:05</strong>. Thanks for tuning in on <strong>Thursday, April 20th, 2023</strong> from the Sourced podcast Network in Camp Hill, Pennsylvania. This is your host, Bob Bannon. Stories in today's episode, come from <strong>Mark Miller</strong> in New York,  <strong>Shannon Lietz</strong> in San Diego, California, <strong>Edwin Kwan</strong> in Sydney, Australia, <strong>Kadi Grigg</strong> in Alexandria, Virginia and <strong>Marcel Brown</strong> in St. Louis, Missouri. A special note today, Our first segment is from Executive Producer Mark Miller, giving a preview of next week’s RSA Conference in San Francisco. Take it away Mark.</p><p>Meet us at RSA Conference 2023</p><p>🇺🇸 Mark Miller</p><p>The Quest to Define Security Metrics</p><p>🇺🇸 Shannon Lietz</p><p>Lazarus</p><p>🇺🇸 Kadi Grigg</p><p>March 2023 Broke Ransomware Attack Records</p><p>🇦🇺 Edwin Kwan</p><p>This Day in Tech History</p><p>🇺🇸 Marcel Brown </p>]]></description><content:encoded><![CDATA[<p>Hey, it's <strong>5:05</strong>. Thanks for tuning in on <strong>Thursday, April 20th, 2023</strong> from the Sourced podcast Network in Camp Hill, Pennsylvania. This is your host, Bob Bannon. Stories in today's episode, come from <strong>Mark Miller</strong> in New York,  <strong>Shannon Lietz</strong> in San Diego, California, <strong>Edwin Kwan</strong> in Sydney, Australia, <strong>Kadi Grigg</strong> in Alexandria, Virginia and <strong>Marcel Brown</strong> in St. Louis, Missouri. A special note today, Our first segment is from Executive Producer Mark Miller, giving a preview of next week’s RSA Conference in San Francisco. Take it away Mark.</p><p>Meet us at RSA Conference 2023</p><p>🇺🇸 Mark Miller</p><p>The Quest to Define Security Metrics</p><p>🇺🇸 Shannon Lietz</p><p>Lazarus</p><p>🇺🇸 Kadi Grigg</p><p>March 2023 Broke Ransomware Attack Records</p><p>🇦🇺 Edwin Kwan</p><p>This Day in Tech History</p><p>🇺🇸 Marcel Brown </p>]]></content:encoded><link><![CDATA[https://3zozb9fxlbueipjyapmaas.captivate.fm/episode/episode-124-rsa-sfo-2023-security-quest-lazarus-north-korea-attack-records]]></link><guid isPermaLink="false">e29f9850-b29f-4965-8882-eac017245259</guid><itunes:image href="https://artwork.captivate.fm/eda2dc36-c79c-42cc-a16e-4800efc90392/1j9iYoWbergz4SbIslAGQ05s.png"/><dc:creator><![CDATA[Contributors from Around the World]]></dc:creator><pubDate>Thu, 20 Apr 2023 16:45:00 -0400</pubDate><enclosure url="https://dts.podtrac.com/redirect.mp3/podcasts.captivate.fm/media/d669427d-5fb0-439a-a6dc-5e0e244caf45/2023-04-20-Episode-124-v2-converted.mp3" length="11363936" type="audio/mpeg"/><itunes:duration>11:50</itunes:duration><itunes:explicit>false</itunes:explicit><itunes:episodeType>full</itunes:episodeType><itunes:season>1</itunes:season><itunes:episode>124</itunes:episode><itunes:season>1</itunes:season><podcast:episode>124</podcast:episode><podcast:season>1</podcast:season><itunes:author>Contributors from Around the World</itunes:author></item><item><title>Episode #123 - Australians Losses Increased, CryptoClippy, Radical Transparency, CyberSecurity Benchmarks</title><itunes:title>Episode #123 - Australians Losses Increased, CryptoClippy, Radical Transparency, CyberSecurity Benchmarks</itunes:title><description><![CDATA[<p>Hey,</p><p>it's 5:05. Thanks for being here on Wednesday, April 19th, 2023 from</p><p>the Sourced podcast Network in Camp Hill, Pennsylvania. This is your</p><p>host, Bob Bannon. Stories in today's episode, come from Edwin Kwan in</p><p>Sydney, Australia. Katy Craig in San Diego, California. Shannon Lietz</p><p>in San Diego, California, Derek Weeks in Bethesda, Maryland and</p><p>Marcel Brown in St. Louis, Missouri. Pokeys on vacation. I have the</p><p>controls. Let's get to it. </p><p>Australians Scam Losses in 2022 increased by 80% Edwin Kwan, Sydney, Australia </p><p>CryptoClippy Katy Craig, San Diego, California</p><p>Radical Transparency Shannon Lietz, San Diego, California</p><p><br></p><p>Focus on CyberSecurity Benchmarks Derek Weeks, Bethesda Maryland </p><p><br></p><p>This day in Tech History Marcel Brown, St Louis, Missouri </p><h3><br></h3>]]></description><content:encoded><![CDATA[<p>Hey,</p><p>it's 5:05. Thanks for being here on Wednesday, April 19th, 2023 from</p><p>the Sourced podcast Network in Camp Hill, Pennsylvania. This is your</p><p>host, Bob Bannon. Stories in today's episode, come from Edwin Kwan in</p><p>Sydney, Australia. Katy Craig in San Diego, California. Shannon Lietz</p><p>in San Diego, California, Derek Weeks in Bethesda, Maryland and</p><p>Marcel Brown in St. Louis, Missouri. Pokeys on vacation. I have the</p><p>controls. Let's get to it. </p><p>Australians Scam Losses in 2022 increased by 80% Edwin Kwan, Sydney, Australia </p><p>CryptoClippy Katy Craig, San Diego, California</p><p>Radical Transparency Shannon Lietz, San Diego, California</p><p><br></p><p>Focus on CyberSecurity Benchmarks Derek Weeks, Bethesda Maryland </p><p><br></p><p>This day in Tech History Marcel Brown, St Louis, Missouri </p><h3><br></h3>]]></content:encoded><link><![CDATA[https://3zozb9fxlbueipjyapmaas.captivate.fm/episode/australians-losses-increased-cryptoclippy-radical-transparency-cybersecurity-benchmarks]]></link><guid isPermaLink="false">e7616b77-6212-4f9b-b84c-a738a9e1d9b1</guid><itunes:image href="https://artwork.captivate.fm/f5705273-d1d5-4bb3-a03c-c0e43fde4dd0/EJQJJSJu02pycxmP5SCQuYcd.png"/><dc:creator><![CDATA[Contributors from Around the World]]></dc:creator><pubDate>Wed, 19 Apr 2023 16:45:00 -0400</pubDate><enclosure url="https://dts.podtrac.com/redirect.mp3/podcasts.captivate.fm/media/af0eb1d2-1f07-4b75-9563-23085c7b93d2/2023-04-19-Episode-123-v2-converted.mp3" length="11016194" type="audio/mpeg"/><itunes:duration>11:28</itunes:duration><itunes:explicit>false</itunes:explicit><itunes:episodeType>full</itunes:episodeType><itunes:season>1</itunes:season><itunes:episode>123</itunes:episode><itunes:season>1</itunes:season><podcast:episode>123</podcast:episode><podcast:season>1</podcast:season><itunes:author>Contributors from Around the World</itunes:author></item><item><title>Episode #122 - Selling Surveillance, New Era Security, Chatty Hacker, $50M Safe Security</title><itunes:title>Episode #122 - Selling Surveillance, New Era Security, Chatty Hacker, $50M Safe Security</itunes:title><description><![CDATA[<p>Hey,</p><p><strong>It's 5:05</strong>. Glad you can be here on <strong>Tuesday, April 18th</strong>, 2023 from the Sourced Podcast Network in Camp Hill, Pennsylvania. This is your host, <strong>Bob Bannon</strong>. Stories in today's episode come from  <strong>Mark Miller </strong>in New York City, Katy Craig in San Diego, California, <strong>Shannon Leitz</strong>, in San Diego, California, <strong>Edwin Kwan</strong> in Sydney, Australia. <strong>Ian Garrett</strong> in Arlington, Virginia. and <strong>Marcel Brown</strong> in St. Louis, Missouri. Pokes on vacation. I have the controls. </p><p>Let's get to it.</p><h3>2023 State of Cyber Assets Report</h3><p><a href="https://505updates.com/markmiller/" rel="noopener noreferrer" target="_blank"><strong>🇺🇸</strong> Mark Miller, New York City ↗</a></p><p>JupiterOne, 2023 State of Cybers Assets Report</p><p><a href="https://info.jupiterone.com/scar-2023" rel="noopener noreferrer" target="_blank">The 2023 State of Cyber Assets Report</a></p><h3>QuaDream secretly selling surveillance platform to governments</h3><p><a href="https://505updates.com/katycraig/" rel="noopener noreferrer" target="_blank"><strong>🇺🇸</strong> Katy Craig, San Diego, California ↗</a></p><p>DEV-0196: QuaDream’s “KingsPawn” malware used to target civil society in Europe, North America, the Middle East, and Southeast Asia</p><p><a href="https://www.microsoft.com/en-us/security/blog/2023/04/11/dev-0196-quadreams-kingspawn-malware-used-to-target-civil-society-in-europe-north-america-the-middle-east-and-southeast-asia/" rel="noopener noreferrer" target="_blank">DEV-0196: QuaDream’s “KingsPawn” malware used to target civil society in Europe, North America, the Middle East, and Southeast Asia - Microsoft Security Blog</a></p><p>Citizen Lab</p><p><a href="https://citizenlab.ca/2023/04/spyware-vendor-quadream-exploits-victims-customers/" rel="noopener noreferrer" target="_blank">A First Look at Spyware Vendor QuaDream’s Exploits, Victims, and Customers - The Citizen Lab</a></p><p><br></p><h3>A new era of software security is upon us</h3><p><a href="https://505updates.com/shannonlietz/" rel="noopener noreferrer" target="_blank"><strong>🇺🇸</strong> Shannon Lietz, San Diego, California ↗</a></p><p>U.S. and International Partners Publish Secure-by-Design and -Default Principles and Approaches  </p><p><a href="https://www.cisa.gov/news-events/news/us-and-international-partners-publish-secure-design-and-default-principles-and-approaches" rel="noopener noreferrer" target="_blank">U.S. and International Partners Publish Secure-by-Design and -Default Principles and Approaches | CISA</a></p><p><br></p><h3>Chatting with a Hacker</h3><p><a href="https://505updates.com/edwinkwan/" rel="noopener noreferrer" target="_blank">🇦🇺 Edwin Kwan, Sydney, Australia ↗</a></p><p>ABC News</p><p><a href="https://www.abc.net.au/news/2023-04-17/cybercrime-hacker-chats-about-medibank-revil-russia-ukraine/102179776" rel="noopener noreferrer" target="_blank">Chatting with a hacker about cybercrime gangs, Medibank and supporting Russia's attacks on Ukraine - ABC News</a></p><p><br></p><h3>Safe Security raises $50M Series B round</h3><p><a href="https://505updates.com/iangarrett/" rel="noopener noreferrer" target="_blank"><strong>🇺🇸 </strong>Ian Garrett, Arlington, Virginia ↗</a></p><p>Yahoo Finance</p><p><a href="https://finance.yahoo.com/news/safe-security-raises-50-million-100000623.html" rel="noopener noreferrer" target="_blank">Safe Security Raises $50 Million Series B Round for AI-Driven Platform to Manage and Mitigate Cyber Risk</a></p><p>PRNews Wire</p><p><a href="https://www.prnewswire.com/news-releases/safe-security-raises-50-million-series-b-round-for-ai-driven-platform-to-manage-and-mitigate-cyber-risk-301799304.html" rel="noopener noreferrer" target="_blank">Safe Security Raises $50 Million Series B Round for AI-Driven Platform to Manage and Mitigate Cyber Risk</a></p><p>Wall Street Journal</p><p><a...]]></description><content:encoded><![CDATA[<p>Hey,</p><p><strong>It's 5:05</strong>. Glad you can be here on <strong>Tuesday, April 18th</strong>, 2023 from the Sourced Podcast Network in Camp Hill, Pennsylvania. This is your host, <strong>Bob Bannon</strong>. Stories in today's episode come from  <strong>Mark Miller </strong>in New York City, Katy Craig in San Diego, California, <strong>Shannon Leitz</strong>, in San Diego, California, <strong>Edwin Kwan</strong> in Sydney, Australia. <strong>Ian Garrett</strong> in Arlington, Virginia. and <strong>Marcel Brown</strong> in St. Louis, Missouri. Pokes on vacation. I have the controls. </p><p>Let's get to it.</p><h3>2023 State of Cyber Assets Report</h3><p><a href="https://505updates.com/markmiller/" rel="noopener noreferrer" target="_blank"><strong>🇺🇸</strong> Mark Miller, New York City ↗</a></p><p>JupiterOne, 2023 State of Cybers Assets Report</p><p><a href="https://info.jupiterone.com/scar-2023" rel="noopener noreferrer" target="_blank">The 2023 State of Cyber Assets Report</a></p><h3>QuaDream secretly selling surveillance platform to governments</h3><p><a href="https://505updates.com/katycraig/" rel="noopener noreferrer" target="_blank"><strong>🇺🇸</strong> Katy Craig, San Diego, California ↗</a></p><p>DEV-0196: QuaDream’s “KingsPawn” malware used to target civil society in Europe, North America, the Middle East, and Southeast Asia</p><p><a href="https://www.microsoft.com/en-us/security/blog/2023/04/11/dev-0196-quadreams-kingspawn-malware-used-to-target-civil-society-in-europe-north-america-the-middle-east-and-southeast-asia/" rel="noopener noreferrer" target="_blank">DEV-0196: QuaDream’s “KingsPawn” malware used to target civil society in Europe, North America, the Middle East, and Southeast Asia - Microsoft Security Blog</a></p><p>Citizen Lab</p><p><a href="https://citizenlab.ca/2023/04/spyware-vendor-quadream-exploits-victims-customers/" rel="noopener noreferrer" target="_blank">A First Look at Spyware Vendor QuaDream’s Exploits, Victims, and Customers - The Citizen Lab</a></p><p><br></p><h3>A new era of software security is upon us</h3><p><a href="https://505updates.com/shannonlietz/" rel="noopener noreferrer" target="_blank"><strong>🇺🇸</strong> Shannon Lietz, San Diego, California ↗</a></p><p>U.S. and International Partners Publish Secure-by-Design and -Default Principles and Approaches  </p><p><a href="https://www.cisa.gov/news-events/news/us-and-international-partners-publish-secure-design-and-default-principles-and-approaches" rel="noopener noreferrer" target="_blank">U.S. and International Partners Publish Secure-by-Design and -Default Principles and Approaches | CISA</a></p><p><br></p><h3>Chatting with a Hacker</h3><p><a href="https://505updates.com/edwinkwan/" rel="noopener noreferrer" target="_blank">🇦🇺 Edwin Kwan, Sydney, Australia ↗</a></p><p>ABC News</p><p><a href="https://www.abc.net.au/news/2023-04-17/cybercrime-hacker-chats-about-medibank-revil-russia-ukraine/102179776" rel="noopener noreferrer" target="_blank">Chatting with a hacker about cybercrime gangs, Medibank and supporting Russia's attacks on Ukraine - ABC News</a></p><p><br></p><h3>Safe Security raises $50M Series B round</h3><p><a href="https://505updates.com/iangarrett/" rel="noopener noreferrer" target="_blank"><strong>🇺🇸 </strong>Ian Garrett, Arlington, Virginia ↗</a></p><p>Yahoo Finance</p><p><a href="https://finance.yahoo.com/news/safe-security-raises-50-million-100000623.html" rel="noopener noreferrer" target="_blank">Safe Security Raises $50 Million Series B Round for AI-Driven Platform to Manage and Mitigate Cyber Risk</a></p><p>PRNews Wire</p><p><a href="https://www.prnewswire.com/news-releases/safe-security-raises-50-million-series-b-round-for-ai-driven-platform-to-manage-and-mitigate-cyber-risk-301799304.html" rel="noopener noreferrer" target="_blank">Safe Security Raises $50 Million Series B Round for AI-Driven Platform to Manage and Mitigate Cyber Risk</a></p><p>Wall Street Journal</p><p><a href="https://www.wsj.com/articles/safe-security-raises-50-million-in-series-b-round-54ac9788" rel="noopener noreferrer" target="_blank">Safe Security Raises $50 Million in Series B Round</a></p><p><br></p><h3>This Day in Tech History</h3><p><a href="https://505updates.com/marcelbrown/" rel="noopener noreferrer" target="_blank"><strong>🇺🇸</strong> Marcel Brown, St. Louis, Missouri ↗</a></p><p><a href="https://thisdayintechhistory.com/04/18" rel="noopener noreferrer" target="_blank">https://thisdayintechhistory.com/04/18</a></p><p><br></p>]]></content:encoded><link><![CDATA[https://3zozb9fxlbueipjyapmaas.captivate.fm/episode/episode-122-selling-surveillance-new-era-security-chatty-hacker-50m-safe-security]]></link><guid isPermaLink="false">c4ad9c12-a1c7-4472-8d94-568e0c512d83</guid><itunes:image href="https://artwork.captivate.fm/c73ed967-57c9-4e03-a3e3-ae880b243d01/bM0h7Hl4-T6ft92YiEt0vogy.png"/><dc:creator><![CDATA[Contributors from Around the World]]></dc:creator><pubDate>Tue, 18 Apr 2023 16:45:00 -0400</pubDate><enclosure url="https://dts.podtrac.com/redirect.mp3/podcasts.captivate.fm/media/3ae15e06-f3d3-4b67-a9bd-18619c68d5e7/2023-04-18-Episode-122-converted.mp3" length="13904292" type="audio/mpeg"/><itunes:duration>14:29</itunes:duration><itunes:explicit>false</itunes:explicit><itunes:episodeType>full</itunes:episodeType><itunes:season>1</itunes:season><itunes:episode>122</itunes:episode><itunes:season>1</itunes:season><podcast:episode>122</podcast:episode><podcast:season>1</podcast:season><itunes:author>Contributors from Around the World</itunes:author></item><item><title>Episode #121 - Chrome Zero-Day Vulnerability, Sci-Fi AutoGPT, FDA Crack Down</title><itunes:title>Episode #121 - Chrome Zero-Day Vulnerability, Sci-Fi AutoGPT, FDA Crack Down</itunes:title><description><![CDATA[<p>Hey,</p><p><strong>it's 5:05</strong>. Glad to have you with us on Monday, <strong>April 17th, 2023</strong> from</p><p>the Sourced Podcast Network in Camp Hill, Pennsylvania. This is your</p><p>host, <strong>Bob Bannon</strong>. Stories in today's episode come from <strong>Edwin Kwan</strong> in</p><p>Sydney, Australia. <strong>Kadi Grigg</strong> in Alexandria, Virginia. <strong>Katy Craig</strong> in</p><p>San Diego, California, and <strong>Marcel Brown</strong> in St. Louis, Missouri. Pokes</p><p>on vacation. I have the controls. Let's get to it.</p><h3>Google Chrome Security Update for Zero-Day Vulnerability</h3><p><a href="https://505updates.com/edwinkwan/" rel="noopener noreferrer" target="_blank">🇦🇺 Edwin Kwan, Sydney, Australia ↗</a></p><p><a href="https://www.bleepingcomputer.com/news/security/google-chrome-emergency-update-fixes-first-zero-day-of-2023/" rel="noopener noreferrer" target="_blank">Google Chrome emergency update fixes first zero-day of 2023</a></p><h3>AutoGPT</h3><p><a href="https://505updates.com/katycraig/" rel="noopener noreferrer" target="_blank"><strong>🇺🇸</strong> Katy Craig, San Diego, California ↗</a></p><p><a href="https://autogpt.net/" rel="noopener noreferrer" target="_blank">AutoGPT</a></p><p><a href="https://autogpt.net/autogpt-the-ai-that-can-self-improve-is-scary/" rel="noopener noreferrer" target="_blank">AutoGPT: The Ai That Can SELF-IMPROVE is SCARY! - AutoGPT</a></p><p><a href="https://autogpt.net/what-is-auto-gpt-and-why-do-we-care/" rel="noopener noreferrer" target="_blank">What is Auto-GPT and Why Do We Care? - AutoGPT</a></p><h3>FDA Cracks Down on Medical Devices and Protecting Patient Data</h3><p><a href="https://505updates.com/kadigrigg/" rel="noopener noreferrer" target="_blank">🇺🇸 Kadi Grigg, Alexandria, Virginia </a>↗</p><p><br></p><p><a href="https://www.scmagazine.com/news/device-security/fda-will-refuse-new-medical-devices-for-cybersecurity-reasons-on-oct-1" rel="noopener noreferrer" target="_blank">FDA will refuse new medical devices for cybersecurity reasons on Oct. 1 | SC Media</a></p><p><a href="https://www.scmagazine.com/feature/risk-management/nothing-is-a-standalone-device-how-a-complex-ecosystem-leaves-medical-security-in-flux" rel="noopener noreferrer" target="_blank">‘Nothing is a standalone device’: How a complex ecosystem leaves medical security in flux | SC Media</a></p><p><a href="https://www.fda.gov/media/166614/download" rel="noopener noreferrer" target="_blank">Cybersecurity in Medical Devices: Refuse to Accept Policy for Cyber Devices and Related Systems Under Section 524B of the FDC Ac</a></p><p><br></p><h3>This Day In Tech History 04-16 &amp; 04/17</h3><p><a href="https://505updates.com/marcelbrown/" rel="noopener noreferrer" target="_blank"><strong>🇺🇸</strong> Marcel Brown, St. Louis, Missouri ↗</a></p><p><a href="http://thisdayintechhistory.com/04/16" rel="noopener noreferrer" target="_blank">http://thisdayintechhistory.com/04/16</a></p><p><a href="http://thisdayintechhistory.com/04/17" rel="noopener noreferrer" target="_blank">http://thisdayintechhistory.com/04/17</a></p>]]></description><content:encoded><![CDATA[<p>Hey,</p><p><strong>it's 5:05</strong>. Glad to have you with us on Monday, <strong>April 17th, 2023</strong> from</p><p>the Sourced Podcast Network in Camp Hill, Pennsylvania. This is your</p><p>host, <strong>Bob Bannon</strong>. Stories in today's episode come from <strong>Edwin Kwan</strong> in</p><p>Sydney, Australia. <strong>Kadi Grigg</strong> in Alexandria, Virginia. <strong>Katy Craig</strong> in</p><p>San Diego, California, and <strong>Marcel Brown</strong> in St. Louis, Missouri. Pokes</p><p>on vacation. I have the controls. Let's get to it.</p><h3>Google Chrome Security Update for Zero-Day Vulnerability</h3><p><a href="https://505updates.com/edwinkwan/" rel="noopener noreferrer" target="_blank">🇦🇺 Edwin Kwan, Sydney, Australia ↗</a></p><p><a href="https://www.bleepingcomputer.com/news/security/google-chrome-emergency-update-fixes-first-zero-day-of-2023/" rel="noopener noreferrer" target="_blank">Google Chrome emergency update fixes first zero-day of 2023</a></p><h3>AutoGPT</h3><p><a href="https://505updates.com/katycraig/" rel="noopener noreferrer" target="_blank"><strong>🇺🇸</strong> Katy Craig, San Diego, California ↗</a></p><p><a href="https://autogpt.net/" rel="noopener noreferrer" target="_blank">AutoGPT</a></p><p><a href="https://autogpt.net/autogpt-the-ai-that-can-self-improve-is-scary/" rel="noopener noreferrer" target="_blank">AutoGPT: The Ai That Can SELF-IMPROVE is SCARY! - AutoGPT</a></p><p><a href="https://autogpt.net/what-is-auto-gpt-and-why-do-we-care/" rel="noopener noreferrer" target="_blank">What is Auto-GPT and Why Do We Care? - AutoGPT</a></p><h3>FDA Cracks Down on Medical Devices and Protecting Patient Data</h3><p><a href="https://505updates.com/kadigrigg/" rel="noopener noreferrer" target="_blank">🇺🇸 Kadi Grigg, Alexandria, Virginia </a>↗</p><p><br></p><p><a href="https://www.scmagazine.com/news/device-security/fda-will-refuse-new-medical-devices-for-cybersecurity-reasons-on-oct-1" rel="noopener noreferrer" target="_blank">FDA will refuse new medical devices for cybersecurity reasons on Oct. 1 | SC Media</a></p><p><a href="https://www.scmagazine.com/feature/risk-management/nothing-is-a-standalone-device-how-a-complex-ecosystem-leaves-medical-security-in-flux" rel="noopener noreferrer" target="_blank">‘Nothing is a standalone device’: How a complex ecosystem leaves medical security in flux | SC Media</a></p><p><a href="https://www.fda.gov/media/166614/download" rel="noopener noreferrer" target="_blank">Cybersecurity in Medical Devices: Refuse to Accept Policy for Cyber Devices and Related Systems Under Section 524B of the FDC Ac</a></p><p><br></p><h3>This Day In Tech History 04-16 &amp; 04/17</h3><p><a href="https://505updates.com/marcelbrown/" rel="noopener noreferrer" target="_blank"><strong>🇺🇸</strong> Marcel Brown, St. Louis, Missouri ↗</a></p><p><a href="http://thisdayintechhistory.com/04/16" rel="noopener noreferrer" target="_blank">http://thisdayintechhistory.com/04/16</a></p><p><a href="http://thisdayintechhistory.com/04/17" rel="noopener noreferrer" target="_blank">http://thisdayintechhistory.com/04/17</a></p>]]></content:encoded><link><![CDATA[https://3zozb9fxlbueipjyapmaas.captivate.fm/episode/episode-121-chrome-zero-day-vulnerability-sci-fiautogpt-fda-crack-down]]></link><guid isPermaLink="false">fb0b0601-01b8-400b-b3ee-648db95b5e03</guid><itunes:image href="https://artwork.captivate.fm/0d9ab7c3-8499-44c8-8836-f77e6be4bdc8/yDti2IYvq9C8UK1Uu6PjAgjA.png"/><dc:creator><![CDATA[Contributors from Around the World]]></dc:creator><pubDate>Mon, 17 Apr 2023 16:45:00 -0400</pubDate><enclosure url="https://dts.podtrac.com/redirect.mp3/podcasts.captivate.fm/media/6100fd70-7249-437d-8ba8-49aae6868cef/2023-04-17-Eposode-121-converted.mp3" length="7843048" type="audio/mpeg"/><itunes:duration>08:10</itunes:duration><itunes:explicit>false</itunes:explicit><itunes:episodeType>full</itunes:episodeType><itunes:season>1</itunes:season><itunes:episode>121</itunes:episode><itunes:season>1</itunes:season><podcast:episode>121</podcast:episode><podcast:season>1</podcast:season><itunes:author>Contributors from Around the World</itunes:author></item><item><title>Episode #120 - Web Security Headers, Elementor Plugin Flaw, Embassy Tech Pros</title><itunes:title>Episode #120 - Web Security Headers, Elementor Plugin Flaw, Embassy Tech Pros</itunes:title><description><![CDATA[<p>Hey, <strong>it's 5:05</strong> thanks for joining us on, <strong>Friday April 14th</strong>, 2023,. From the Sourced Podcast Network in Camp Hill Pennsylvania. This is your host Bob Bannon. Stories in today's episode, come from <strong>Trac Bannon</strong> in Camp Hill Pennsylvania, <strong>Edwin Kwan</strong> in Sydney, Australia, <strong>Katy Craig</strong> in San Diego, California , and <strong>Marcel Brown</strong> in St. Louis, Missouri. Pokie is going on vacation, I have the controls, Let's get to it.</p><h3>Security Headers to Secure Your Web Application</h3><p><a href="https://505updates.com/edwinkwan/" rel="noopener noreferrer" target="_blank">🇦🇺 Edwin Kwan, Sydney, Australia</a></p><p><a href="https://isc.sans.edu/diary/rss/29720" rel="noopener noreferrer" target="_blank">https://isc.sans.edu/diary/rss/29720</a></p><h3>WordPress Elementor Plugin Flaw</h3><p><a href="https://505updates.com/katycraig/" rel="noopener noreferrer" target="_blank"><strong>🇺🇸</strong> Katy Craig, San Diego, California</a></p><p> <a href="https://thehackernews.com/2023/04/hackers-exploiting-wordpress-elementor.html" rel="noopener noreferrer" target="_blank">Hackers Exploiting WordPress Elementor Pro Vulnerability: Millions of Sites at Risk!</a></p><h3>Segment Title: Tech Pros for each US Embassy</h3><p><a href="https://505updates.com/tracbannon/" rel="noopener noreferrer" target="_blank"><strong>🇺🇸</strong> Tracy (Trac) Bannon, Camp Hill, Pennsylvania</a> ↗</p><p><a href="https://federalnewsnetwork.com/cybersecurity/2023/04/state-dept-cyber-bureau-plans-to-add-tech-experts-to-every-embassy-by-next-year/" rel="noopener noreferrer" target="_blank">State Dept cyber bureau plans to add tech experts to every embassy by next year | Federal News Network</a></p><h3>This Day In Tech History 04-14 &amp; 04/15</h3><p><a href="https://505updates.com/marcelbrown/" rel="noopener noreferrer" target="_blank"><strong>🇺🇸</strong> Marcel Brown, St. Louis, Missouri </a></p><p><a href="http://thisdayintechhistory.com/04/14" rel="noopener noreferrer" target="_blank">http://thisdayintechhistory.com/04/14</a></p><p><a href="http://thisdayintechhistory.com/04/15" rel="noopener noreferrer" target="_blank">http://thisdayintechhistory.com/04/15</a></p>]]></description><content:encoded><![CDATA[<p>Hey, <strong>it's 5:05</strong> thanks for joining us on, <strong>Friday April 14th</strong>, 2023,. From the Sourced Podcast Network in Camp Hill Pennsylvania. This is your host Bob Bannon. Stories in today's episode, come from <strong>Trac Bannon</strong> in Camp Hill Pennsylvania, <strong>Edwin Kwan</strong> in Sydney, Australia, <strong>Katy Craig</strong> in San Diego, California , and <strong>Marcel Brown</strong> in St. Louis, Missouri. Pokie is going on vacation, I have the controls, Let's get to it.</p><h3>Security Headers to Secure Your Web Application</h3><p><a href="https://505updates.com/edwinkwan/" rel="noopener noreferrer" target="_blank">🇦🇺 Edwin Kwan, Sydney, Australia</a></p><p><a href="https://isc.sans.edu/diary/rss/29720" rel="noopener noreferrer" target="_blank">https://isc.sans.edu/diary/rss/29720</a></p><h3>WordPress Elementor Plugin Flaw</h3><p><a href="https://505updates.com/katycraig/" rel="noopener noreferrer" target="_blank"><strong>🇺🇸</strong> Katy Craig, San Diego, California</a></p><p> <a href="https://thehackernews.com/2023/04/hackers-exploiting-wordpress-elementor.html" rel="noopener noreferrer" target="_blank">Hackers Exploiting WordPress Elementor Pro Vulnerability: Millions of Sites at Risk!</a></p><h3>Segment Title: Tech Pros for each US Embassy</h3><p><a href="https://505updates.com/tracbannon/" rel="noopener noreferrer" target="_blank"><strong>🇺🇸</strong> Tracy (Trac) Bannon, Camp Hill, Pennsylvania</a> ↗</p><p><a href="https://federalnewsnetwork.com/cybersecurity/2023/04/state-dept-cyber-bureau-plans-to-add-tech-experts-to-every-embassy-by-next-year/" rel="noopener noreferrer" target="_blank">State Dept cyber bureau plans to add tech experts to every embassy by next year | Federal News Network</a></p><h3>This Day In Tech History 04-14 &amp; 04/15</h3><p><a href="https://505updates.com/marcelbrown/" rel="noopener noreferrer" target="_blank"><strong>🇺🇸</strong> Marcel Brown, St. Louis, Missouri </a></p><p><a href="http://thisdayintechhistory.com/04/14" rel="noopener noreferrer" target="_blank">http://thisdayintechhistory.com/04/14</a></p><p><a href="http://thisdayintechhistory.com/04/15" rel="noopener noreferrer" target="_blank">http://thisdayintechhistory.com/04/15</a></p>]]></content:encoded><link><![CDATA[https://3zozb9fxlbueipjyapmaas.captivate.fm/episode/episode-120-web-security-headers-elementor-plugin-flaw-embassy-tech-pros]]></link><guid isPermaLink="false">7f662e31-48f3-4d60-bf66-99c695f45d82</guid><itunes:image href="https://artwork.captivate.fm/09ae5572-bf8d-49d3-8968-53425ff56dd4/ZoaYFfayvQ8WQtmDucrgVn2F.png"/><dc:creator><![CDATA[Contributors from Around the World]]></dc:creator><pubDate>Fri, 14 Apr 2023 16:45:00 -0400</pubDate><enclosure url="https://dts.podtrac.com/redirect.mp3/podcasts.captivate.fm/media/27b9fddf-3a7c-42c5-b0bb-321e7c769726/04-14-2023-episode-120-converted.mp3" length="9854685" type="audio/mpeg"/><itunes:duration>10:16</itunes:duration><itunes:explicit>false</itunes:explicit><itunes:episodeType>full</itunes:episodeType><itunes:season>1</itunes:season><itunes:episode>120</itunes:episode><itunes:season>1</itunes:season><podcast:episode>120</podcast:episode><podcast:season>1</podcast:season><itunes:author>Contributors from Around the World</itunes:author></item><item><title>Episode #119 - FBI Warning , Tasmanian Data Breach, Flipper Zero Ban</title><itunes:title>Episode #119 - FBI Warning , Tasmanian Data Breach, Flipper Zero Ban</itunes:title><description><![CDATA[<p>Hey, it's 5 0 5 on <strong>Thursday, April 13th, 2023</strong>. From the Sourced Podcast Network in New York City, this is your host, Pokie Huang. Stories in today's episode, come from <strong>Kadi Grigg</strong> in Alexandria, Virginia, <strong>Edwin Kwan</strong> in Sydney, Australia, <strong>Katy Craig</strong> in San Diego, California, <strong>Marcel Brown</strong> in St. Louis.  </p><p>Let's get to it.</p><p><strong>FBI Warns of "Juice Jacking"</strong></p><p><strong>🇺🇸</strong> Kadi Grigg, Alexandria, Virginia</p><p><a href="https://www.axios.com/2023/04/10/fbi-warning-charging-stations-juice-jacking" rel="noopener noreferrer" target="_blank">"Juice jacking:" FBI warns against using public charging stations</a></p><p><a href="https://twitter.com/FBIDenver/status/1643947117650538498" rel="noopener noreferrer" target="_blank">https://twitter.com/FBIDenver/status/1643947117650538498</a></p><p><strong>Tasmanian Government Suffers Data Breach</strong></p><p>🇦🇺 Edwin Kwan, Sydney, Australia</p><p><a href="https://www.abc.net.au/news/2023-04-05/tas-cyber-hack-accesses-bank-account-numbers-education-data/102191080" rel="noopener noreferrer" target="_blank">Names, addresses and bank account details potentially at risk after hack, Tasmanian government says - ABC News</a></p><p><a href="https://www.abc.net.au/news/2023-04-07/tasmania-goanywheremft-file-share-data-breach-16k-documents-out/102197658" rel="noopener noreferrer" target="_blank">Minister confirms 16,000 documents released online in Tasmanian data breach, helpline set up - ABC News</a></p><p><a href="https://www.abc.net.au/news/2023-04-11/tastafe-childrens-commissioner-data-tas-goanywheremft-hack/102204736" rel="noopener noreferrer" target="_blank">Tasmanian cyber attack grabs TasTafe, Teachers Registration Board data - ABC News</a></p><p><br></p><p><strong>Flipper Zero Banned by Amazon</strong></p><p><strong>🇺🇸</strong> Katy Craig, San Diego, California</p><p><a href="https://sellercentral.amazon.com/help/hub/reference/external/G200164330" rel="noopener noreferrer" target="_blank">https://sellercentral.amazon.com/help/hub/reference/external/G200164330</a></p><p><a href="https://www.bleepingcomputer.com/news/technology/flipper-zero-banned-by-amazon-for-being-a-card-skimming-device-/" rel="noopener noreferrer" target="_blank">Flipper Zero banned by Amazon for being a ‘card skimming device’</a></p><p><br></p><p><strong>This Day In Tech History 04-132</strong></p><p><strong>🇺🇸</strong> Marcel Brown, St. Louis, Missouri</p><p><a href="http://thisdayintechhistory.com/04/13/" rel="noopener noreferrer" target="_blank">http://thisdayintechhistory.com/04/13/</a></p>]]></description><content:encoded><![CDATA[<p>Hey, it's 5 0 5 on <strong>Thursday, April 13th, 2023</strong>. From the Sourced Podcast Network in New York City, this is your host, Pokie Huang. Stories in today's episode, come from <strong>Kadi Grigg</strong> in Alexandria, Virginia, <strong>Edwin Kwan</strong> in Sydney, Australia, <strong>Katy Craig</strong> in San Diego, California, <strong>Marcel Brown</strong> in St. Louis.  </p><p>Let's get to it.</p><p><strong>FBI Warns of "Juice Jacking"</strong></p><p><strong>🇺🇸</strong> Kadi Grigg, Alexandria, Virginia</p><p><a href="https://www.axios.com/2023/04/10/fbi-warning-charging-stations-juice-jacking" rel="noopener noreferrer" target="_blank">"Juice jacking:" FBI warns against using public charging stations</a></p><p><a href="https://twitter.com/FBIDenver/status/1643947117650538498" rel="noopener noreferrer" target="_blank">https://twitter.com/FBIDenver/status/1643947117650538498</a></p><p><strong>Tasmanian Government Suffers Data Breach</strong></p><p>🇦🇺 Edwin Kwan, Sydney, Australia</p><p><a href="https://www.abc.net.au/news/2023-04-05/tas-cyber-hack-accesses-bank-account-numbers-education-data/102191080" rel="noopener noreferrer" target="_blank">Names, addresses and bank account details potentially at risk after hack, Tasmanian government says - ABC News</a></p><p><a href="https://www.abc.net.au/news/2023-04-07/tasmania-goanywheremft-file-share-data-breach-16k-documents-out/102197658" rel="noopener noreferrer" target="_blank">Minister confirms 16,000 documents released online in Tasmanian data breach, helpline set up - ABC News</a></p><p><a href="https://www.abc.net.au/news/2023-04-11/tastafe-childrens-commissioner-data-tas-goanywheremft-hack/102204736" rel="noopener noreferrer" target="_blank">Tasmanian cyber attack grabs TasTafe, Teachers Registration Board data - ABC News</a></p><p><br></p><p><strong>Flipper Zero Banned by Amazon</strong></p><p><strong>🇺🇸</strong> Katy Craig, San Diego, California</p><p><a href="https://sellercentral.amazon.com/help/hub/reference/external/G200164330" rel="noopener noreferrer" target="_blank">https://sellercentral.amazon.com/help/hub/reference/external/G200164330</a></p><p><a href="https://www.bleepingcomputer.com/news/technology/flipper-zero-banned-by-amazon-for-being-a-card-skimming-device-/" rel="noopener noreferrer" target="_blank">Flipper Zero banned by Amazon for being a ‘card skimming device’</a></p><p><br></p><p><strong>This Day In Tech History 04-132</strong></p><p><strong>🇺🇸</strong> Marcel Brown, St. Louis, Missouri</p><p><a href="http://thisdayintechhistory.com/04/13/" rel="noopener noreferrer" target="_blank">http://thisdayintechhistory.com/04/13/</a></p>]]></content:encoded><link><![CDATA[https://3zozb9fxlbueipjyapmaas.captivate.fm/episode/episode-119-fbi-warning-tasmanian-data-breach-flipper-zero-ban]]></link><guid isPermaLink="false">8efeb480-b9d1-44e2-b5c6-9cdb6762d835</guid><itunes:image href="https://artwork.captivate.fm/87d0655e-a8b2-4df7-86cc-b4021365b834/anKsoXtrYTtBmphxWUP1oxhU.png"/><dc:creator><![CDATA[Contributors from Around the World]]></dc:creator><pubDate>Thu, 13 Apr 2023 16:45:00 -0400</pubDate><enclosure url="https://dts.podtrac.com/redirect.mp3/podcasts.captivate.fm/media/13ed73f1-e5b9-44a0-820a-fe78523fc011/04-13-2023-episode-119-v2-converted.mp3" length="7594362" type="audio/mpeg"/><itunes:duration>07:55</itunes:duration><itunes:explicit>false</itunes:explicit><itunes:episodeType>full</itunes:episodeType><itunes:season>1</itunes:season><itunes:episode>119</itunes:episode><itunes:season>1</itunes:season><podcast:episode>119</podcast:episode><podcast:season>1</podcast:season><itunes:author>Contributors from Around the World</itunes:author></item><item><title>Episode #118 - Latitude Financial Rasom, North Korea Cyber Prowess, CrowdStrike Government Summit</title><itunes:title>Episode #118 - Latitude Financial Rasom, North Korea Cyber Prowess, CrowdStrike Government Summit</itunes:title><description><![CDATA[<p><strong>Hey, it's 5:05 on Wednesday, April 12th, 2023</strong>. From the Sourced Podcast Network in New York City, this is your host, Pokie Huang. Stories in today's episode, come from <strong>Edwin Kwan</strong> in Sydney, Australia, <strong>Derek Weeks</strong> in Bethesda, Maryland, <strong>Katy Craig</strong> in San Diego, California, <strong>Marcel Brown</strong> in St. Louis.&nbsp;</p><p>Let's get to it.</p><p><strong>Latitude Financial Received Ransom Demand</strong></p><p>🇦🇺 Edwin Kwan, Sydney, Australia</p><p><a href="https://investors.latitudefinancial.com.au/DownloadFile.axd?file=/Report/ComNews/20230411/02652931.pdf" rel="noopener noreferrer" target="_blank">https://investors.latitudefinancial.com.au/DownloadFile.axd?file=/Report/ComNews/20230411/02652931.pdf</a></p><p><br></p><p><strong>North Korea's Cyber Prowess</strong></p><p><strong>🇺🇸</strong> Derek Weeks, Bethesda Maryland</p><p>Sources:</p><p><a href="https://www.hrw.org/world-report/2022/country-chapters/north-korea" rel="noopener noreferrer" target="_blank">World Report 2022: North Korea | Human Rights Watch</a></p><p><a href="https://www.axios.com/2023/04/11/north-korea-cybersecurity-hacking-supply-chain" rel="noopener noreferrer" target="_blank">https://www.axios.com/2023/04/11/north-korea-cybersecurity-hacking-supply-chain</a> a&nbsp;</p><p><a href="https://www.justice.gov/opa/pr/north-korean-regime-backed-programmer-charged-conspiracy-conduct-multiple-cyber-attacks-and" rel="noopener noreferrer" target="_blank">North Korean Regime-Backed Programmer Charged With Conspiracy to Conduct Multiple Cyber Attacks and Intrusions | OPA | Department of Justice</a></p><p><a href="https://en.wikipedia.org/wiki/Sony_Pictures_hack" rel="noopener noreferrer" target="_blank">Sony Pictures hack - Wikipedia</a></p><p><a href="https://decrypt.co/119861/fbi-north-korea-lazarus-horizon-harmony-bridge-hack" rel="noopener noreferrer" target="_blank">FBI Confirms North Korea Behind $100 Million Harmony Hack - Decrypt</a></p><p><br></p><p><strong>CrowdStrike Government Summit: Highlights</strong></p><p><strong>🇺🇸</strong> Katy Craig, San Diego, California</p><p><a href="https://govsummit.crowdstrike.com/virtual/" rel="noopener noreferrer" target="_blank">CrowdStrike Government Summit</a></p><p><br></p><p><strong>This Day In Tech History 04-12</strong></p><p><strong>🇺🇸</strong> Marcel Brown, St. Louis, Missouri</p><p><a href="http://thisdayintechhistory.com/04/12" rel="noopener noreferrer" target="_blank">http://thisdayintechhistory.com/</a></p>]]></description><content:encoded><![CDATA[<p><strong>Hey, it's 5:05 on Wednesday, April 12th, 2023</strong>. From the Sourced Podcast Network in New York City, this is your host, Pokie Huang. Stories in today's episode, come from <strong>Edwin Kwan</strong> in Sydney, Australia, <strong>Derek Weeks</strong> in Bethesda, Maryland, <strong>Katy Craig</strong> in San Diego, California, <strong>Marcel Brown</strong> in St. Louis.&nbsp;</p><p>Let's get to it.</p><p><strong>Latitude Financial Received Ransom Demand</strong></p><p>🇦🇺 Edwin Kwan, Sydney, Australia</p><p><a href="https://investors.latitudefinancial.com.au/DownloadFile.axd?file=/Report/ComNews/20230411/02652931.pdf" rel="noopener noreferrer" target="_blank">https://investors.latitudefinancial.com.au/DownloadFile.axd?file=/Report/ComNews/20230411/02652931.pdf</a></p><p><br></p><p><strong>North Korea's Cyber Prowess</strong></p><p><strong>🇺🇸</strong> Derek Weeks, Bethesda Maryland</p><p>Sources:</p><p><a href="https://www.hrw.org/world-report/2022/country-chapters/north-korea" rel="noopener noreferrer" target="_blank">World Report 2022: North Korea | Human Rights Watch</a></p><p><a href="https://www.axios.com/2023/04/11/north-korea-cybersecurity-hacking-supply-chain" rel="noopener noreferrer" target="_blank">https://www.axios.com/2023/04/11/north-korea-cybersecurity-hacking-supply-chain</a> a&nbsp;</p><p><a href="https://www.justice.gov/opa/pr/north-korean-regime-backed-programmer-charged-conspiracy-conduct-multiple-cyber-attacks-and" rel="noopener noreferrer" target="_blank">North Korean Regime-Backed Programmer Charged With Conspiracy to Conduct Multiple Cyber Attacks and Intrusions | OPA | Department of Justice</a></p><p><a href="https://en.wikipedia.org/wiki/Sony_Pictures_hack" rel="noopener noreferrer" target="_blank">Sony Pictures hack - Wikipedia</a></p><p><a href="https://decrypt.co/119861/fbi-north-korea-lazarus-horizon-harmony-bridge-hack" rel="noopener noreferrer" target="_blank">FBI Confirms North Korea Behind $100 Million Harmony Hack - Decrypt</a></p><p><br></p><p><strong>CrowdStrike Government Summit: Highlights</strong></p><p><strong>🇺🇸</strong> Katy Craig, San Diego, California</p><p><a href="https://govsummit.crowdstrike.com/virtual/" rel="noopener noreferrer" target="_blank">CrowdStrike Government Summit</a></p><p><br></p><p><strong>This Day In Tech History 04-12</strong></p><p><strong>🇺🇸</strong> Marcel Brown, St. Louis, Missouri</p><p><a href="http://thisdayintechhistory.com/04/12" rel="noopener noreferrer" target="_blank">http://thisdayintechhistory.com/</a></p>]]></content:encoded><link><![CDATA[https://3zozb9fxlbueipjyapmaas.captivate.fm/episode/episode-118-latitude-financial-rasom-north-korea-cyber-prowess-crowdstrike-government-summit]]></link><guid isPermaLink="false">9f313f76-5f1e-4097-a81f-56198b82f765</guid><itunes:image href="https://artwork.captivate.fm/d03fe052-549f-4509-acb0-d7a8b1a86eb5/2fdo12DoDJIbfa4jDIMlxsNp.png"/><dc:creator><![CDATA[Contributors from Around the World]]></dc:creator><pubDate>Wed, 12 Apr 2023 16:45:00 -0400</pubDate><enclosure url="https://dts.podtrac.com/redirect.mp3/podcasts.captivate.fm/media/2c78b37b-3f66-42e3-8960-2cc72535af39/2023-04-12-Episode-118-v2-converted.mp3" length="8196015" type="audio/mpeg"/><itunes:duration>11:23</itunes:duration><itunes:explicit>false</itunes:explicit><itunes:episodeType>full</itunes:episodeType><itunes:season>1</itunes:season><itunes:episode>118</itunes:episode><itunes:season>1</itunes:season><podcast:episode>118</podcast:episode><podcast:season>1</podcast:season><itunes:author>Contributors from Around the World</itunes:author></item><item><title>Episode #117 - Prompt Injection, Table Top Exercises, AI Attribution</title><itunes:title>Episode #117 - Prompt Injection, Table Top Exercises, AI Attribution</itunes:title><description><![CDATA[<p><strong>Hey, it's 5:05 on Tuesday, April 11th, 2023</strong>. From the Sourced Podcast Network in New York City, this is your host, Pokie Huang. Stories in today's episode come from <strong>Katy Craig</strong> in San Diego, California, <strong>Edwin Kwan</strong> in Sydney, Australia, <strong>Mark Miller</strong> in New York City and <strong>Marcel Brown</strong> in St. Louis.&nbsp;</p><p>Let's get to it.</p><p><strong>﻿Prompt Injection: New Attack Vector</strong></p><p><strong>🇺🇸</strong> Katy Craig, San Diego, California</p><p><a href="https://therecord.media/cisa-director-ai-cyber-threats-the-biggest-of-the-century" rel="noopener noreferrer" target="_blank">CISA director: AI cyber threats the ‘biggest issue we're going to deal with this century'</a></p><p><a href="https://arxiv.org/abs/2302.12173" rel="noopener noreferrer" target="_blank">More than you've asked for: A Comprehensive Analysis of Novel…</a></p><p><strong>Australian Government Running Table Top Exercises for Major Banks</strong></p><p>🇦🇺 Edwin Kwan, Sydney, Australia</p><p><a href="https://www.smh.com.au/politics/federal/consider-what-damage-could-be-caused-government-launches-cyber-war-games-for-major-banks-20230410-p5czbj.html" rel="noopener noreferrer" target="_blank">'Consider what damage could be caused': Government launches cyber 'war games' for major banks</a></p><p><strong>AI engines and Attribution</strong></p><p><strong>🇺🇸</strong> Mark Miller, New York City</p><p><a href="http://perlexity.ai/" rel="noopener noreferrer" target="_blank">Perlexity.ai</a></p><p><strong>This Day In Tech History 04-11</strong></p><p><strong>🇺🇸</strong> Marcel Brown, St. Louis, Missouri</p><p><a href="http://thisdayintechhistory.com/04/11/" rel="noopener noreferrer" target="_blank">http://thisdayintechhistory.com/04/11/</a></p>]]></description><content:encoded><![CDATA[<p><strong>Hey, it's 5:05 on Tuesday, April 11th, 2023</strong>. From the Sourced Podcast Network in New York City, this is your host, Pokie Huang. Stories in today's episode come from <strong>Katy Craig</strong> in San Diego, California, <strong>Edwin Kwan</strong> in Sydney, Australia, <strong>Mark Miller</strong> in New York City and <strong>Marcel Brown</strong> in St. Louis.&nbsp;</p><p>Let's get to it.</p><p><strong>﻿Prompt Injection: New Attack Vector</strong></p><p><strong>🇺🇸</strong> Katy Craig, San Diego, California</p><p><a href="https://therecord.media/cisa-director-ai-cyber-threats-the-biggest-of-the-century" rel="noopener noreferrer" target="_blank">CISA director: AI cyber threats the ‘biggest issue we're going to deal with this century'</a></p><p><a href="https://arxiv.org/abs/2302.12173" rel="noopener noreferrer" target="_blank">More than you've asked for: A Comprehensive Analysis of Novel…</a></p><p><strong>Australian Government Running Table Top Exercises for Major Banks</strong></p><p>🇦🇺 Edwin Kwan, Sydney, Australia</p><p><a href="https://www.smh.com.au/politics/federal/consider-what-damage-could-be-caused-government-launches-cyber-war-games-for-major-banks-20230410-p5czbj.html" rel="noopener noreferrer" target="_blank">'Consider what damage could be caused': Government launches cyber 'war games' for major banks</a></p><p><strong>AI engines and Attribution</strong></p><p><strong>🇺🇸</strong> Mark Miller, New York City</p><p><a href="http://perlexity.ai/" rel="noopener noreferrer" target="_blank">Perlexity.ai</a></p><p><strong>This Day In Tech History 04-11</strong></p><p><strong>🇺🇸</strong> Marcel Brown, St. Louis, Missouri</p><p><a href="http://thisdayintechhistory.com/04/11/" rel="noopener noreferrer" target="_blank">http://thisdayintechhistory.com/04/11/</a></p>]]></content:encoded><link><![CDATA[https://3zozb9fxlbueipjyapmaas.captivate.fm/episode/episode-117-prompt-injection-table-top-exercises-ai-attribution]]></link><guid isPermaLink="false">fc081b85-695c-4aec-8183-c0f05f262620</guid><itunes:image href="https://artwork.captivate.fm/4c6d17d0-03b0-4657-894e-d7bb4f865a5f/5zxLdMJbA4IUPVE7Ronp93hJ.png"/><dc:creator><![CDATA[Contributors from Around the World]]></dc:creator><pubDate>Tue, 11 Apr 2023 16:45:00 -0400</pubDate><enclosure url="https://dts.podtrac.com/redirect.mp3/podcasts.captivate.fm/media/1b38a67a-0a92-4711-ae17-e3bb9e8360db/2023-04-11-505-Episode-117-converted.mp3" length="6629609" type="audio/mpeg"/><itunes:duration>09:12</itunes:duration><itunes:explicit>false</itunes:explicit><itunes:episodeType>full</itunes:episodeType><itunes:season>1</itunes:season><itunes:episode>117</itunes:episode><itunes:season>1</itunes:season><podcast:episode>117</podcast:episode><podcast:season>1</podcast:season><itunes:author>Contributors from Around the World</itunes:author></item><item><title>Episode #116 - Sister Podcasts, Uber Suffered Supply Chain Attack, Apple Patches Exploited Zero Days</title><itunes:title>Episode #116 - Sister Podcasts, Uber Suffered Supply Chain Attack, Apple Patches Exploited Zero Days</itunes:title><description><![CDATA[<p><strong>Hey, it's 5:05 on Monday, April 10th, 2023.</strong> From The Sourced Podcast Network in New York City, this is your host, Pokie Huang. Stories in today's episode come from <strong>Edwin Kwan</strong> in Sydney, Australia, <strong>Katy Craig</strong> in San Diego, California, <strong>Marcel Brown</strong> in St. Louis, Missouri.&nbsp;</p><p>We will start today's episode with a message from our executive producer, <strong>Mark Miller</strong>, live from the streets of New York City.</p><p>Let's get to it.</p><p><strong>Sister Podcasts</strong></p><p><strong>🇺🇸</strong> Mark Miller, New York City</p><p>That’s in my EULA?? with lawyer Joel MacMull</p><p><a href="https://whatsinmyeula.com/" rel="noopener noreferrer" target="_blank">https://whatsinmyeula.com/</a></p><p>Real Technologists with host Tracy Bannon</p><p><a href="https://realtechnologists.org/" rel="noopener noreferrer" target="_blank">https://realtechnologists.org/</a></p><p>daBOM with host DJ Schleen</p><p><a href="https://dabom.show/" rel="noopener noreferrer" target="_blank">https://dabom.show/</a></p><p><br></p><p><strong>Uber Suffered Supply Chain Attack</strong></p><p>🇦🇺 Edwin Kwan, Sydney, Australia</p><p><a href="https://www.techradar.com/news/uber-has-internal-data-stolen-in-yet-another-cyberattack" rel="noopener noreferrer" target="_blank">Uber has internal data stolen in yet another cyberattack | TechRadar</a></p><p><br></p><p><strong>Apple Pushes Urgent Patches for Exploited Zero Days</strong></p><p><strong>🇺🇸</strong> Katy Craig, San Diego, California</p><p><a href="https://support.apple.com/en-us/HT213720" rel="noopener noreferrer" target="_blank">About the security content of iOS 16.4.1 and iPadOS 16.4.1</a></p><p><a href="https://www.securityweek.com/apple-ships-urgent-ios-patch-for-newly-exploited-zero-days/" rel="noopener noreferrer" target="_blank">Apple Ships Urgent iOS Patch for Newly Exploited Zero-Days</a></p><p><br></p><p><strong>This Day In Tech History 04-09 &amp; 04-10</strong></p><p><strong>🇺🇸</strong> Marcel Brown, St. Louis, Missouri</p><p><a href="http://thisdayintechhistory.com/04/09" rel="noopener noreferrer" target="_blank">http://thisdayintechhistory.com/04/09</a></p><p><a href="http://thisdayintechhistory.com/04/10/" rel="noopener noreferrer" target="_blank">http://thisdayintechhistory.com/04/10/</a></p><p><br></p>]]></description><content:encoded><![CDATA[<p><strong>Hey, it's 5:05 on Monday, April 10th, 2023.</strong> From The Sourced Podcast Network in New York City, this is your host, Pokie Huang. Stories in today's episode come from <strong>Edwin Kwan</strong> in Sydney, Australia, <strong>Katy Craig</strong> in San Diego, California, <strong>Marcel Brown</strong> in St. Louis, Missouri.&nbsp;</p><p>We will start today's episode with a message from our executive producer, <strong>Mark Miller</strong>, live from the streets of New York City.</p><p>Let's get to it.</p><p><strong>Sister Podcasts</strong></p><p><strong>🇺🇸</strong> Mark Miller, New York City</p><p>That’s in my EULA?? with lawyer Joel MacMull</p><p><a href="https://whatsinmyeula.com/" rel="noopener noreferrer" target="_blank">https://whatsinmyeula.com/</a></p><p>Real Technologists with host Tracy Bannon</p><p><a href="https://realtechnologists.org/" rel="noopener noreferrer" target="_blank">https://realtechnologists.org/</a></p><p>daBOM with host DJ Schleen</p><p><a href="https://dabom.show/" rel="noopener noreferrer" target="_blank">https://dabom.show/</a></p><p><br></p><p><strong>Uber Suffered Supply Chain Attack</strong></p><p>🇦🇺 Edwin Kwan, Sydney, Australia</p><p><a href="https://www.techradar.com/news/uber-has-internal-data-stolen-in-yet-another-cyberattack" rel="noopener noreferrer" target="_blank">Uber has internal data stolen in yet another cyberattack | TechRadar</a></p><p><br></p><p><strong>Apple Pushes Urgent Patches for Exploited Zero Days</strong></p><p><strong>🇺🇸</strong> Katy Craig, San Diego, California</p><p><a href="https://support.apple.com/en-us/HT213720" rel="noopener noreferrer" target="_blank">About the security content of iOS 16.4.1 and iPadOS 16.4.1</a></p><p><a href="https://www.securityweek.com/apple-ships-urgent-ios-patch-for-newly-exploited-zero-days/" rel="noopener noreferrer" target="_blank">Apple Ships Urgent iOS Patch for Newly Exploited Zero-Days</a></p><p><br></p><p><strong>This Day In Tech History 04-09 &amp; 04-10</strong></p><p><strong>🇺🇸</strong> Marcel Brown, St. Louis, Missouri</p><p><a href="http://thisdayintechhistory.com/04/09" rel="noopener noreferrer" target="_blank">http://thisdayintechhistory.com/04/09</a></p><p><a href="http://thisdayintechhistory.com/04/10/" rel="noopener noreferrer" target="_blank">http://thisdayintechhistory.com/04/10/</a></p><p><br></p>]]></content:encoded><link><![CDATA[https://3zozb9fxlbueipjyapmaas.captivate.fm/episode/episode-116-sister-podcasts-uber-suffered-supply-chain-attack-apple-patches-exploited-zero-days]]></link><guid isPermaLink="false">a1ec2b1d-5de8-49ed-911c-a57d122b2669</guid><itunes:image href="https://artwork.captivate.fm/2dce5d49-4d41-4051-a5d7-5102bb5ce754/v4jw8gVg0iLQViJbjFb79O9I.png"/><dc:creator><![CDATA[Contributors from Around the World]]></dc:creator><pubDate>Mon, 10 Apr 2023 16:45:00 -0400</pubDate><enclosure url="https://dts.podtrac.com/redirect.mp3/podcasts.captivate.fm/media/4cb58452-d738-4e29-afee-b112bdbbc507/2023-04-10-505-Episode-116-converted.mp3" length="5909569" type="audio/mpeg"/><itunes:duration>08:12</itunes:duration><itunes:explicit>false</itunes:explicit><itunes:episodeType>full</itunes:episodeType><itunes:season>1</itunes:season><itunes:episode>116</itunes:episode><itunes:season>1</itunes:season><podcast:episode>116</podcast:episode><podcast:season>1</podcast:season><itunes:author>Contributors from Around the World</itunes:author></item><item><title>Episode #115 - Service NSW Breach, Modern Car Woes, Nations Respond to ChatGPT</title><itunes:title>Episode #115 - Service NSW Breach, Modern Car Woes, Nations Respond to ChatGPT</itunes:title><description><![CDATA[<p><strong>Hey, it's 5:05 on Friday, April 7th, 2023</strong>. From The Sourced Podcast Network in New York City, this is your host, Pokie Huang. Stories in today's episode come from <strong>Edwin Kwan</strong> in Sydney, Australia, <strong>Trac Bannon</strong> in Camp Hill, Pennsylvania, <strong>Katy Craig</strong> in San Diego, California, <strong>Marcel Brown</strong> in St. Louis, Missouri.&nbsp;</p><p>Let's get to it.</p><p><br></p><p><strong>Personal Information Exposed in Service NSW Breach</strong></p><p>🇦🇺 Edwin Kwan, Sydney, Australia</p><p><a href="https://7news.com.au/news/nsw/service-nsw-breach-exposes-personal-data-affecting-thousands-of-customers-c-10240008" rel="noopener noreferrer" target="_blank">Service NSW breach exposes personal data affecting thousands of customers | 7NEWS</a></p><p><br></p><p><strong>Modern Car Woes</strong></p><p><strong>🇺🇸</strong> Katy Craig, San Diego, California</p><p><a href="https://www.engadget.com/tesla-employees-reportedly-shared-videos-captured-by-cameras-on-customers-cars-165703126.html" rel="noopener noreferrer" target="_blank">Tesla employees reportedly shared videos captured by cameras on customers' cars | Engadget</a></p><p><a href="https://www.securityweek.com/thieves-use-can-injection-hack-to-steal-cars/" rel="noopener noreferrer" target="_blank">Thieves Use CAN Injection Hack to Steal Cars</a></p><p><br></p><p><strong>Nations Respond to ChatGPT</strong></p><p><strong>🇺🇸</strong> Tracy (Trac) Bannon, Camp Hill, Pennsylvania</p><p><br></p><p><a href="https://www.cnbc.com/2023/04/04/italy-has-banned-chatgpt-heres-what-other-countries-are-doing.html" rel="noopener noreferrer" target="_blank">Italy has banned ChatGPT. Here's what other countries are doing</a></p><p><a href="https://www.cnbc.com/2023/03/29/with-chatgpt-hype-swirling-uk-government-urges-regulators-to-come-up-with-rules-for-ai.html" rel="noopener noreferrer" target="_blank">With ChatGPT hype swirling, UK government urges regulators to come up with rules for A.I.</a></p><p><a href="https://www.whitehouse.gov/ostp/ai-bill-of-rights/" rel="noopener noreferrer" target="_blank">Blueprint for an AI Bill of Rights | OSTP | The White House</a></p><p><a href="https://au.finance.yahoo.com/news/1-100-notable-signatories-just-060911525.html" rel="noopener noreferrer" target="_blank">1,100+ notable signatories just signed an open letter asking 'all AI labs to immediately pause for at least 6 months'</a></p><p><br></p><p><strong>This Day In Tech History 04-07 &amp; 04-08</strong></p><p><strong>🇺🇸</strong> Marcel Brown, St. Louis, Missouri</p><p><a href="http://thisdayintechhistory.com/04/07/" rel="noopener noreferrer" target="_blank">http://thisdayintechhistory.com/04/07/</a></p><p><a href="http://thisdayintechhistory.com/04/08/" rel="noopener noreferrer" target="_blank">http://thisdayintechhistory.com/04/08/</a></p><p><br></p>]]></description><content:encoded><![CDATA[<p><strong>Hey, it's 5:05 on Friday, April 7th, 2023</strong>. From The Sourced Podcast Network in New York City, this is your host, Pokie Huang. Stories in today's episode come from <strong>Edwin Kwan</strong> in Sydney, Australia, <strong>Trac Bannon</strong> in Camp Hill, Pennsylvania, <strong>Katy Craig</strong> in San Diego, California, <strong>Marcel Brown</strong> in St. Louis, Missouri.&nbsp;</p><p>Let's get to it.</p><p><br></p><p><strong>Personal Information Exposed in Service NSW Breach</strong></p><p>🇦🇺 Edwin Kwan, Sydney, Australia</p><p><a href="https://7news.com.au/news/nsw/service-nsw-breach-exposes-personal-data-affecting-thousands-of-customers-c-10240008" rel="noopener noreferrer" target="_blank">Service NSW breach exposes personal data affecting thousands of customers | 7NEWS</a></p><p><br></p><p><strong>Modern Car Woes</strong></p><p><strong>🇺🇸</strong> Katy Craig, San Diego, California</p><p><a href="https://www.engadget.com/tesla-employees-reportedly-shared-videos-captured-by-cameras-on-customers-cars-165703126.html" rel="noopener noreferrer" target="_blank">Tesla employees reportedly shared videos captured by cameras on customers' cars | Engadget</a></p><p><a href="https://www.securityweek.com/thieves-use-can-injection-hack-to-steal-cars/" rel="noopener noreferrer" target="_blank">Thieves Use CAN Injection Hack to Steal Cars</a></p><p><br></p><p><strong>Nations Respond to ChatGPT</strong></p><p><strong>🇺🇸</strong> Tracy (Trac) Bannon, Camp Hill, Pennsylvania</p><p><br></p><p><a href="https://www.cnbc.com/2023/04/04/italy-has-banned-chatgpt-heres-what-other-countries-are-doing.html" rel="noopener noreferrer" target="_blank">Italy has banned ChatGPT. Here's what other countries are doing</a></p><p><a href="https://www.cnbc.com/2023/03/29/with-chatgpt-hype-swirling-uk-government-urges-regulators-to-come-up-with-rules-for-ai.html" rel="noopener noreferrer" target="_blank">With ChatGPT hype swirling, UK government urges regulators to come up with rules for A.I.</a></p><p><a href="https://www.whitehouse.gov/ostp/ai-bill-of-rights/" rel="noopener noreferrer" target="_blank">Blueprint for an AI Bill of Rights | OSTP | The White House</a></p><p><a href="https://au.finance.yahoo.com/news/1-100-notable-signatories-just-060911525.html" rel="noopener noreferrer" target="_blank">1,100+ notable signatories just signed an open letter asking 'all AI labs to immediately pause for at least 6 months'</a></p><p><br></p><p><strong>This Day In Tech History 04-07 &amp; 04-08</strong></p><p><strong>🇺🇸</strong> Marcel Brown, St. Louis, Missouri</p><p><a href="http://thisdayintechhistory.com/04/07/" rel="noopener noreferrer" target="_blank">http://thisdayintechhistory.com/04/07/</a></p><p><a href="http://thisdayintechhistory.com/04/08/" rel="noopener noreferrer" target="_blank">http://thisdayintechhistory.com/04/08/</a></p><p><br></p>]]></content:encoded><link><![CDATA[https://3zozb9fxlbueipjyapmaas.captivate.fm/episode/episode-115-service-nsw-breach-modern-car-woes-nations-respond-to-chatgpt]]></link><guid isPermaLink="false">c48d33b4-fc56-4293-8c13-1c0582371cf7</guid><itunes:image href="https://artwork.captivate.fm/e6feb143-c8e3-42b8-994d-79a52ae43c3a/QZ_lZ7cmxWUKlQN-kzvtfmsD.png"/><dc:creator><![CDATA[Contributors from Around the World]]></dc:creator><pubDate>Fri, 07 Apr 2023 16:45:00 -0400</pubDate><enclosure url="https://dts.podtrac.com/redirect.mp3/podcasts.captivate.fm/media/30614769-fdf5-4b04-842b-db923dd489c2/2023-04-07-505-Episode-115-converted.mp3" length="11579690" type="audio/mpeg"/><itunes:duration>16:05</itunes:duration><itunes:explicit>false</itunes:explicit><itunes:episodeType>full</itunes:episodeType><itunes:season>1</itunes:season><itunes:episode>115</itunes:episode><itunes:season>1</itunes:season><podcast:episode>115</podcast:episode><podcast:season>1</podcast:season><itunes:author>Contributors from Around the World</itunes:author></item><item><title>Episode #114 - Sourced Network, TikTok Banned, AI Worries</title><itunes:title>Episode #114 - Sourced Network, TikTok Banned, AI Worries</itunes:title><description><![CDATA[<p><strong>Hey, it's 5:05 on Thursday, April 6th, 2023.</strong> From The Sourced Podcast Network in New York City, this is your host, Pokie Huang. Stories in today's episode come from <strong>Mark Miller</strong> in New York City, <strong>Edwin Kwan</strong> in Sydney, Australia, <strong>Katy Craig</strong> in San Diego, California, <strong>Marcel Brown</strong> in St. Louis, Missouri.&nbsp;</p><p>Let's get to it.</p><p><strong>Sourced Network Update</strong></p><p><strong>🇺🇸</strong> Mark Miller, New York City</p><p>That’s in my EULA?? with lawyer Joel MacMull</p><p><a href="https://whatsinmyeula.com/" rel="noopener noreferrer" target="_blank">https://whatsinmyeula.com/</a></p><p>Real Technologists with host Tracy Bannon</p><p><a href="https://realtechnologists.org/" rel="noopener noreferrer" target="_blank">https://realtechnologists.org/</a></p><p>daBOM with host DJ Schleen</p><p><a href="https://dabom.show/" rel="noopener noreferrer" target="_blank">https://dabom.show/</a></p><p><strong>TikTok to be Banned on Australian Government Devices</strong></p><p>🇦🇺 Edwin Kwan, Sydney, Australia</p><p><a href="https://www.news.com.au/technology/online/social/australian-government-bans-tiktok-on-government-devices/news-story/d47cf22069fe79c52e8ca365cb9ecdd6" rel="noopener noreferrer" target="_blank">Australian government bans TikTok on government devices | news.com.au — Australia’s leading news site</a></p><p><strong>Worries About AI</strong></p><p><strong>🇺🇸</strong> Katy Craig, San Diego, California</p><p><a href="https://www.fastcompany.com/90873422/ai-feels-like-a-magic-act-by-2033-it-will-be-a-horror-movie" rel="noopener noreferrer" target="_blank">AI feels like a magic act. By 2033, it will be a horror movie</a></p><p><strong>This Day In Tech History 04-06</strong></p><p><strong>🇺🇸</strong> Marcel Brown, St. Louis, Missouri</p><p><a href="https://thisdayintechhistory.com/04/06" rel="noopener noreferrer" target="_blank">https://thisdayintechhistory.com/04/06</a></p>]]></description><content:encoded><![CDATA[<p><strong>Hey, it's 5:05 on Thursday, April 6th, 2023.</strong> From The Sourced Podcast Network in New York City, this is your host, Pokie Huang. Stories in today's episode come from <strong>Mark Miller</strong> in New York City, <strong>Edwin Kwan</strong> in Sydney, Australia, <strong>Katy Craig</strong> in San Diego, California, <strong>Marcel Brown</strong> in St. Louis, Missouri.&nbsp;</p><p>Let's get to it.</p><p><strong>Sourced Network Update</strong></p><p><strong>🇺🇸</strong> Mark Miller, New York City</p><p>That’s in my EULA?? with lawyer Joel MacMull</p><p><a href="https://whatsinmyeula.com/" rel="noopener noreferrer" target="_blank">https://whatsinmyeula.com/</a></p><p>Real Technologists with host Tracy Bannon</p><p><a href="https://realtechnologists.org/" rel="noopener noreferrer" target="_blank">https://realtechnologists.org/</a></p><p>daBOM with host DJ Schleen</p><p><a href="https://dabom.show/" rel="noopener noreferrer" target="_blank">https://dabom.show/</a></p><p><strong>TikTok to be Banned on Australian Government Devices</strong></p><p>🇦🇺 Edwin Kwan, Sydney, Australia</p><p><a href="https://www.news.com.au/technology/online/social/australian-government-bans-tiktok-on-government-devices/news-story/d47cf22069fe79c52e8ca365cb9ecdd6" rel="noopener noreferrer" target="_blank">Australian government bans TikTok on government devices | news.com.au — Australia’s leading news site</a></p><p><strong>Worries About AI</strong></p><p><strong>🇺🇸</strong> Katy Craig, San Diego, California</p><p><a href="https://www.fastcompany.com/90873422/ai-feels-like-a-magic-act-by-2033-it-will-be-a-horror-movie" rel="noopener noreferrer" target="_blank">AI feels like a magic act. By 2033, it will be a horror movie</a></p><p><strong>This Day In Tech History 04-06</strong></p><p><strong>🇺🇸</strong> Marcel Brown, St. Louis, Missouri</p><p><a href="https://thisdayintechhistory.com/04/06" rel="noopener noreferrer" target="_blank">https://thisdayintechhistory.com/04/06</a></p>]]></content:encoded><link><![CDATA[https://3zozb9fxlbueipjyapmaas.captivate.fm/episode/episode-114-sourced-network-tiktok-banned-ai-worries]]></link><guid isPermaLink="false">109f3dd2-36d3-476e-a4f4-42b063595e12</guid><itunes:image href="https://artwork.captivate.fm/aa0cd898-df5a-4832-973e-f466d72046a1/C4WMlrpMb9v0kj110EJqHJjK.png"/><dc:creator><![CDATA[Contributors from Around the World]]></dc:creator><pubDate>Thu, 06 Apr 2023 16:45:00 -0400</pubDate><enclosure url="https://dts.podtrac.com/redirect.mp3/podcasts.captivate.fm/media/85a2b6cc-a365-40fa-8a31-297339751cc8/2023-04-06-505-Episode-114-converted.mp3" length="7433413" type="audio/mpeg"/><itunes:duration>10:19</itunes:duration><itunes:explicit>false</itunes:explicit><itunes:episodeType>full</itunes:episodeType><itunes:season>1</itunes:season><itunes:episode>114</itunes:episode><itunes:season>1</itunes:season><podcast:episode>114</podcast:episode><podcast:season>1</podcast:season><itunes:author>Contributors from Around the World</itunes:author></item><item><title>Episode #113 - ChatGPT, QCon London, C3X Hack</title><itunes:title>Episode #113 - ChatGPT, QCon London, C3X Hack</itunes:title><description><![CDATA[<p><strong>Hey it's 5:05 on Wednesday, April 5th, 2023.</strong> From the Sourced Podcast Network in New York City, this is your host, Pokie Huang. Stories in today's episode come from <strong>Edwin Kwan</strong> in Sydney, Australia,<strong> Olimpiu Pop</strong> in Transylvania, Romania, <strong>Katy Craig</strong> in San Diego, California, <strong>Marcel Brown</strong> in St. Louis, Missouri.</p><p>Let's get to it.</p><p><strong>Employees Feeding Sensitive Business Data to ChatGPT</strong></p><p>🇦🇺 Edwin Kwan, Sydney, Australia</p><p><a href="https://www.darkreading.com/risk/employees-feeding-sensitive-business-data-chatgpt-raising-security-fears" rel="noopener noreferrer" target="_blank">Employees Are Feeding Sensitive Biz Data to ChatGPT, Raising Security Fears</a></p><p><a href="https://www.cyberhaven.com/blog/4-2-of-workers-have-pasted-company-data-into-chatgpt/" rel="noopener noreferrer" target="_blank">3.1% of workers have pasted confidential company data into ChatGPT - Cyberhaven</a></p><p><strong>Insights gathered in an open discussion from QCon London</strong></p><p><strong>🇷🇴 </strong>Olimpiu Pop, Transylvania, Romania</p><p><a href="https://qconlondon.com/schedule/mar2023" rel="noopener noreferrer" target="_blank">QCon London Software Development Conference | Schedule</a></p><p><br></p><p><strong>C3X Hack: Info for Defenders</strong></p><p><strong>🇺🇸</strong> Katy Craig, San Diego, California</p><p><a href="https://www.bleepingcomputer.com/news/security/hackers-compromise-3cx-desktop-app-in-a-supply-chain-attack/" rel="noopener noreferrer" target="_blank">Hackers compromise 3CX desktop app in a supply chain attack</a></p><p><a href="https://digital.nhs.uk/cyber-alerts/2023/cc-4291" rel="noopener noreferrer" target="_blank">Active Intrusion Campaign Targeting 3CX DesktopApp - NHS Digital</a></p><p><br></p><p><strong>This Day In Tech History 04-05</strong></p><p><strong>🇺🇸</strong> Marcel Brown, St. Louis, Missouri</p><p><a href="https://thisdayintechhistory.com/04/05" rel="noopener noreferrer" target="_blank">https://thisdayintechhistory.com/04/05</a></p>]]></description><content:encoded><![CDATA[<p><strong>Hey it's 5:05 on Wednesday, April 5th, 2023.</strong> From the Sourced Podcast Network in New York City, this is your host, Pokie Huang. Stories in today's episode come from <strong>Edwin Kwan</strong> in Sydney, Australia,<strong> Olimpiu Pop</strong> in Transylvania, Romania, <strong>Katy Craig</strong> in San Diego, California, <strong>Marcel Brown</strong> in St. Louis, Missouri.</p><p>Let's get to it.</p><p><strong>Employees Feeding Sensitive Business Data to ChatGPT</strong></p><p>🇦🇺 Edwin Kwan, Sydney, Australia</p><p><a href="https://www.darkreading.com/risk/employees-feeding-sensitive-business-data-chatgpt-raising-security-fears" rel="noopener noreferrer" target="_blank">Employees Are Feeding Sensitive Biz Data to ChatGPT, Raising Security Fears</a></p><p><a href="https://www.cyberhaven.com/blog/4-2-of-workers-have-pasted-company-data-into-chatgpt/" rel="noopener noreferrer" target="_blank">3.1% of workers have pasted confidential company data into ChatGPT - Cyberhaven</a></p><p><strong>Insights gathered in an open discussion from QCon London</strong></p><p><strong>🇷🇴 </strong>Olimpiu Pop, Transylvania, Romania</p><p><a href="https://qconlondon.com/schedule/mar2023" rel="noopener noreferrer" target="_blank">QCon London Software Development Conference | Schedule</a></p><p><br></p><p><strong>C3X Hack: Info for Defenders</strong></p><p><strong>🇺🇸</strong> Katy Craig, San Diego, California</p><p><a href="https://www.bleepingcomputer.com/news/security/hackers-compromise-3cx-desktop-app-in-a-supply-chain-attack/" rel="noopener noreferrer" target="_blank">Hackers compromise 3CX desktop app in a supply chain attack</a></p><p><a href="https://digital.nhs.uk/cyber-alerts/2023/cc-4291" rel="noopener noreferrer" target="_blank">Active Intrusion Campaign Targeting 3CX DesktopApp - NHS Digital</a></p><p><br></p><p><strong>This Day In Tech History 04-05</strong></p><p><strong>🇺🇸</strong> Marcel Brown, St. Louis, Missouri</p><p><a href="https://thisdayintechhistory.com/04/05" rel="noopener noreferrer" target="_blank">https://thisdayintechhistory.com/04/05</a></p>]]></content:encoded><link><![CDATA[https://3zozb9fxlbueipjyapmaas.captivate.fm/episode/episode-113-chatgpt-qcon-london-c3x-hack]]></link><guid isPermaLink="false">5558dddd-25f5-4641-90f3-50e172c6054f</guid><itunes:image href="https://artwork.captivate.fm/9a18b5d0-52ed-4ffd-a762-2e0542caec1b/hrAu33_gx_BjzVIrw4jYtTtO.png"/><dc:creator><![CDATA[Contributors from Around the World]]></dc:creator><pubDate>Wed, 05 Apr 2023 16:45:00 -0400</pubDate><enclosure url="https://dts.podtrac.com/redirect.mp3/podcasts.captivate.fm/media/edd863a8-2a44-4df0-949d-2c596905c1f1/2023-04-05-505-Episode-113-converted.mp3" length="6097720" type="audio/mpeg"/><itunes:duration>08:28</itunes:duration><itunes:explicit>false</itunes:explicit><itunes:episodeType>full</itunes:episodeType><itunes:season>1</itunes:season><itunes:episode>113</itunes:episode><itunes:season>1</itunes:season><podcast:episode>113</podcast:episode><podcast:season>1</podcast:season><itunes:author>Contributors from Around the World</itunes:author></item><item><title>Episode #112 - Meriton Data Breach, Shopping App Pinduoduo Security Concerns, Softphone C3x Supply Chain Attack, Cyber Force as a New Branch of the Miliary</title><itunes:title>Episode #112 - Meriton Data Breach, Shopping App Pinduoduo Security Concerns, Softphone C3x Supply Chain Attack, Cyber Force as a New Branch of the Miliary</itunes:title><description><![CDATA[<p><strong>Hey, it's 5:05 on Tuesday, April 4th, 2023.</strong> From the Sourced Podcast Network in New York City, this is your host, Pokie Huang. Stories in today's episode come from <strong>Edwin Kwan</strong> in Sydney, Australia, <strong>Dan Whiting</strong> in Washington DC, <strong>Katy Craig</strong> in San Diego, California, <strong>Ian Garrett</strong>, in Arlington, Virginia, <strong>Marcel Brown</strong> in St. Louis, Missouri.&nbsp;</p><p>Let's get to it.</p><p><strong>Meriton Discloses Data Breach</strong></p><p>🇦🇺 Edwin Kwan, Sydney, Australia</p><p><a href="https://www.meritonsuites.com.au/cyber-response/" rel="noopener noreferrer" target="_blank">Cyber Response | Meriton Suites</a></p><p><a href="https://www.smh.com.au/technology/financial-health-contact-information-exposed-in-meriton-data-breach-20230329-p5cw58.html" rel="noopener noreferrer" target="_blank">Private financial, health information exposed in Meriton data breach</a></p><p><strong>Another Chinese App with Security Concerns</strong></p><p><strong>🇺🇸 </strong>Dan Whiting, Washington, DC</p><p><a href="https://www.cnn.com/2023/04/02/tech/china-pinduoduo-malware-cybersecurity-analysis-intl-hnk/index.html" rel="noopener noreferrer" target="_blank">‘I’ve never seen anything like this:’ One of China’s most popular apps has the ability to spy on its users, say experts</a></p><p><a href="https://www.cnn.com/2023/03/21/tech/china-google-pinduoduo-malware-app-intl-hk/index.html" rel="noopener noreferrer" target="_blank">Google suspends Chinese shopping app Pinduoduo over malware</a></p><p><a href="https://www.cnn.com/2023/02/16/tech/temu-shopping-app-us-popularity-intl-hnk/index.html" rel="noopener noreferrer" target="_blank">New online superstore surpasses Amazon and Walmart to become most downloaded app in US</a></p><p><strong>Softphone C3X Supply Chain Attack</strong></p><p><strong>🇺🇸</strong> Katy Craig, San Diego, California</p><p><a href="https://www.bleepingcomputer.com/news/security/hackers-compromise-3cx-desktop-app-in-a-supply-chain-attack/" rel="noopener noreferrer" target="_blank">Hackers compromise 3CX desktop app in a supply chain attack</a></p><p><a href="https://digital.nhs.uk/cyber-alerts/2023/cc-4291" rel="noopener noreferrer" target="_blank">Active Intrusion Campaign Targeting 3CX DesktopApp - NHS Digital</a></p><p><br></p><p><strong>Should Cyber Force be a New Branch of the Military?</strong></p><p><strong>🇺🇸 </strong>Ian Garrett, Arlington, Virginia</p><p><a href="https://federalnewsnetwork.com/defense-news/2023/04/does-the-military-need-a-separate-service-for-cyber-some-lawmakers-think-so-dod-isnt-sure/" rel="noopener noreferrer" target="_blank">Does the military need a separate service for cyber? Some lawmakers think so; DoD isn’t sure | Federal News Network</a></p><p><br></p><p><strong>This Day In Tech History 04-04</strong></p><p><strong>🇺🇸</strong> Marcel Brown, St. Louis, Missouri</p><p><a href="https://thisdayintechhistory.com/04/04" rel="noopener noreferrer" target="_blank">https://thisdayintechhistory.com/04/04</a></p>]]></description><content:encoded><![CDATA[<p><strong>Hey, it's 5:05 on Tuesday, April 4th, 2023.</strong> From the Sourced Podcast Network in New York City, this is your host, Pokie Huang. Stories in today's episode come from <strong>Edwin Kwan</strong> in Sydney, Australia, <strong>Dan Whiting</strong> in Washington DC, <strong>Katy Craig</strong> in San Diego, California, <strong>Ian Garrett</strong>, in Arlington, Virginia, <strong>Marcel Brown</strong> in St. Louis, Missouri.&nbsp;</p><p>Let's get to it.</p><p><strong>Meriton Discloses Data Breach</strong></p><p>🇦🇺 Edwin Kwan, Sydney, Australia</p><p><a href="https://www.meritonsuites.com.au/cyber-response/" rel="noopener noreferrer" target="_blank">Cyber Response | Meriton Suites</a></p><p><a href="https://www.smh.com.au/technology/financial-health-contact-information-exposed-in-meriton-data-breach-20230329-p5cw58.html" rel="noopener noreferrer" target="_blank">Private financial, health information exposed in Meriton data breach</a></p><p><strong>Another Chinese App with Security Concerns</strong></p><p><strong>🇺🇸 </strong>Dan Whiting, Washington, DC</p><p><a href="https://www.cnn.com/2023/04/02/tech/china-pinduoduo-malware-cybersecurity-analysis-intl-hnk/index.html" rel="noopener noreferrer" target="_blank">‘I’ve never seen anything like this:’ One of China’s most popular apps has the ability to spy on its users, say experts</a></p><p><a href="https://www.cnn.com/2023/03/21/tech/china-google-pinduoduo-malware-app-intl-hk/index.html" rel="noopener noreferrer" target="_blank">Google suspends Chinese shopping app Pinduoduo over malware</a></p><p><a href="https://www.cnn.com/2023/02/16/tech/temu-shopping-app-us-popularity-intl-hnk/index.html" rel="noopener noreferrer" target="_blank">New online superstore surpasses Amazon and Walmart to become most downloaded app in US</a></p><p><strong>Softphone C3X Supply Chain Attack</strong></p><p><strong>🇺🇸</strong> Katy Craig, San Diego, California</p><p><a href="https://www.bleepingcomputer.com/news/security/hackers-compromise-3cx-desktop-app-in-a-supply-chain-attack/" rel="noopener noreferrer" target="_blank">Hackers compromise 3CX desktop app in a supply chain attack</a></p><p><a href="https://digital.nhs.uk/cyber-alerts/2023/cc-4291" rel="noopener noreferrer" target="_blank">Active Intrusion Campaign Targeting 3CX DesktopApp - NHS Digital</a></p><p><br></p><p><strong>Should Cyber Force be a New Branch of the Military?</strong></p><p><strong>🇺🇸 </strong>Ian Garrett, Arlington, Virginia</p><p><a href="https://federalnewsnetwork.com/defense-news/2023/04/does-the-military-need-a-separate-service-for-cyber-some-lawmakers-think-so-dod-isnt-sure/" rel="noopener noreferrer" target="_blank">Does the military need a separate service for cyber? Some lawmakers think so; DoD isn’t sure | Federal News Network</a></p><p><br></p><p><strong>This Day In Tech History 04-04</strong></p><p><strong>🇺🇸</strong> Marcel Brown, St. Louis, Missouri</p><p><a href="https://thisdayintechhistory.com/04/04" rel="noopener noreferrer" target="_blank">https://thisdayintechhistory.com/04/04</a></p>]]></content:encoded><link><![CDATA[https://3zozb9fxlbueipjyapmaas.captivate.fm/episode/episode-111-meriton-data-breach-shopping-app-pinduoduo-security-concerns-softphone-c3x-supply-chain-attack-cyber-force-as-a-new-branch-of-the-miliary]]></link><guid isPermaLink="false">cd4da9f6-f530-4872-929c-b1fa9109ed45</guid><itunes:image href="https://artwork.captivate.fm/87c5ab0d-1bc1-4c07-aa6e-1670e66214b4/jJmqUfiuK2CVi1m6pNPjZLEI.png"/><dc:creator><![CDATA[Contributors from Around the World]]></dc:creator><pubDate>Tue, 04 Apr 2023 16:45:00 -0400</pubDate><enclosure url="https://dts.podtrac.com/redirect.mp3/podcasts.captivate.fm/media/b2c28531-7e70-4010-ba4c-0c54496b6f29/2023-04-04-505-Episode-112-converted.mp3" length="8094207" type="audio/mpeg"/><itunes:duration>11:14</itunes:duration><itunes:explicit>false</itunes:explicit><itunes:episodeType>full</itunes:episodeType><itunes:season>1</itunes:season><itunes:episode>112</itunes:episode><itunes:season>1</itunes:season><podcast:episode>112</podcast:episode><podcast:season>1</podcast:season><itunes:author>Contributors from Around the World</itunes:author></item><item><title>Episode #111 - Restrict Act, Microsoft OneNote Blocks Dangerous File Extensions, AI-Generated Text and Future of Phishing</title><itunes:title>Episode #111 - Restrict Act, Microsoft OneNote Blocks Dangerous File Extensions, AI-Generated Text and Future of Phishing</itunes:title><description><![CDATA[<p><strong>Hey, it's 5:05 on Monday, April 3rd, 2023.</strong> From the Sourced Podcast Network in New York City, this is your host, Pokie Huang. Stories in today's episode come from <strong>Katy Craig </strong>in San Diego, California, <strong>Edwin Kwan</strong> in Sydney, Australia, <strong>Ian Garrett</strong>, in Arlington, Virginia, <strong>Marcel Brown</strong> in St. Louis, Missouri.&nbsp;</p><p>Let's get to it.</p><p><strong>RESTRICT Act: Firewall of America</strong></p><p><strong>🇺🇸</strong> Katy Craig, San Diego, California</p><p><a href="https://beincrypto.com/vpn-users-risk-20-year-jail-sentences-us-restrict-act/" rel="noopener noreferrer" target="_blank">VPN Users Risk 20-Year Jail Sentences in the US Under New RESTRICT Act</a></p><p><a href="https://www.congress.gov/118/bills/s686/BILLS-118s686is.pdf" rel="noopener noreferrer" target="_blank">https://www.congress.gov/118/bills/s686/BILLS-118s686is.pdf</a></p><p><br></p><p><strong>Microsoft OneNote to Block Dangerous File Extensions to Combat Phishing</strong></p><p>🇦🇺 Edwin Kwan, Sydney, Australia</p><p><a href="https://www.bleepingcomputer.com/news/security/microsoft-onenote-will-block-120-dangerous-file-extensions/" rel="noopener noreferrer" target="_blank">Microsoft OneNote will block 120 dangerous file extensions</a></p><p><br></p><p><strong>AI-generated Text and the Future of Phishing</strong></p><p><strong>🇺🇸 </strong>Ian Garrett, Arlington, Virginia</p><p><a href="https://cybernews.com/news/chatgpt-phishing-emails-could-weaponize-realism/" rel="noopener noreferrer" target="_blank">https://cybernews.com/news/chatgpt-phishing-emails-could-weaponize-realism/</a></p><p><br></p><p><strong>This Day In Tech History 04-02 &amp; 04-03</strong></p><p><strong>🇺🇸</strong> Marcel Brown, St. Louis, Missouri</p><p><a href="https://thisdayintechhistory.com/04/02" rel="noopener noreferrer" target="_blank">https://thisdayintechhistory.com/04/02</a></p><p><a href="https://thisdayintechhistory.com/04/03" rel="noopener noreferrer" target="_blank">https://thisdayintechhistory.com/04/03</a></p>]]></description><content:encoded><![CDATA[<p><strong>Hey, it's 5:05 on Monday, April 3rd, 2023.</strong> From the Sourced Podcast Network in New York City, this is your host, Pokie Huang. Stories in today's episode come from <strong>Katy Craig </strong>in San Diego, California, <strong>Edwin Kwan</strong> in Sydney, Australia, <strong>Ian Garrett</strong>, in Arlington, Virginia, <strong>Marcel Brown</strong> in St. Louis, Missouri.&nbsp;</p><p>Let's get to it.</p><p><strong>RESTRICT Act: Firewall of America</strong></p><p><strong>🇺🇸</strong> Katy Craig, San Diego, California</p><p><a href="https://beincrypto.com/vpn-users-risk-20-year-jail-sentences-us-restrict-act/" rel="noopener noreferrer" target="_blank">VPN Users Risk 20-Year Jail Sentences in the US Under New RESTRICT Act</a></p><p><a href="https://www.congress.gov/118/bills/s686/BILLS-118s686is.pdf" rel="noopener noreferrer" target="_blank">https://www.congress.gov/118/bills/s686/BILLS-118s686is.pdf</a></p><p><br></p><p><strong>Microsoft OneNote to Block Dangerous File Extensions to Combat Phishing</strong></p><p>🇦🇺 Edwin Kwan, Sydney, Australia</p><p><a href="https://www.bleepingcomputer.com/news/security/microsoft-onenote-will-block-120-dangerous-file-extensions/" rel="noopener noreferrer" target="_blank">Microsoft OneNote will block 120 dangerous file extensions</a></p><p><br></p><p><strong>AI-generated Text and the Future of Phishing</strong></p><p><strong>🇺🇸 </strong>Ian Garrett, Arlington, Virginia</p><p><a href="https://cybernews.com/news/chatgpt-phishing-emails-could-weaponize-realism/" rel="noopener noreferrer" target="_blank">https://cybernews.com/news/chatgpt-phishing-emails-could-weaponize-realism/</a></p><p><br></p><p><strong>This Day In Tech History 04-02 &amp; 04-03</strong></p><p><strong>🇺🇸</strong> Marcel Brown, St. Louis, Missouri</p><p><a href="https://thisdayintechhistory.com/04/02" rel="noopener noreferrer" target="_blank">https://thisdayintechhistory.com/04/02</a></p><p><a href="https://thisdayintechhistory.com/04/03" rel="noopener noreferrer" target="_blank">https://thisdayintechhistory.com/04/03</a></p>]]></content:encoded><link><![CDATA[https://3zozb9fxlbueipjyapmaas.captivate.fm/episode/episode-111-restrict-act-microsoft-onenote-blocks-dangerous-file-extensions-ai-generated-text-and-future-of-phishing]]></link><guid isPermaLink="false">81a69158-0ac3-4080-9ff3-1b8590a88d39</guid><itunes:image href="https://artwork.captivate.fm/44e3f4e4-da5a-4d06-a176-67ec30a50a5c/UfHYG86ua3xxpT7Q1A2-jcKt.png"/><dc:creator><![CDATA[Contributors from Around the World]]></dc:creator><pubDate>Mon, 03 Apr 2023 16:45:00 -0400</pubDate><enclosure url="https://dts.podtrac.com/redirect.mp3/podcasts.captivate.fm/media/aabf3a96-091d-4656-9110-e7ec16d1f185/2023-04-03-505-Episode-111-converted.mp3" length="7333416" type="audio/mpeg"/><itunes:duration>10:11</itunes:duration><itunes:explicit>false</itunes:explicit><itunes:episodeType>full</itunes:episodeType><itunes:season>1</itunes:season><itunes:episode>111</itunes:episode><itunes:season>1</itunes:season><podcast:episode>111</podcast:episode><podcast:season>1</podcast:season><itunes:author>Contributors from Around the World</itunes:author></item><item><title>Episode #110 - It&apos;s 5:05, Friday, March 31, 2023</title><itunes:title>Episode #110 - It&apos;s 5:05, Friday, March 31, 2023</itunes:title><description><![CDATA[<p><strong>Hey, it's 5:05 on Friday, March 31st, 2023.</strong> From The Sourced Podcast Network in New York City, this is your host Pokie Huang. Stories in today's episode come from <strong>Kadi Grigg</strong> in Alexandria, Virginia, <strong>Edwin Kwan</strong> in Sydney, Australia, <strong>Olimpiu Pop</strong> in Transylvania, Romania, <strong>Katy Craig</strong> in San Diego, California, <strong>Marcel Brown</strong> in St. Louis, Missouri.&nbsp;</p><p>Let's get to it.</p><p><strong>Latest Mass Ransomware Attack</strong></p><p><strong>🇺🇸</strong> Kadi Grigg, Alexandria, Virginia</p><p><a href="https://www.washingtonpost.com/politics/2023/03/27/latest-mass-ransomware-attack-has-been-unfolding-nearly-two-months/?utm_campaign=PostBeyond&amp;utm_source=Twitter&amp;utm_medium=Social&amp;utm_content=evergreen" rel="noopener noreferrer" target="_blank">The latest mass ransomware attack has been unfolding for nearly two months - The Washington Post</a>&nbsp;</p><p><a href="https://www.darkreading.com/attacks-breaches/clop-keeps-racking-up-ransomware-victims-with-goanywhere-flaw-" rel="noopener noreferrer" target="_blank">Clop Keeps Racking Up Ransomware Victims With GoAnywhere Flaw</a>&nbsp;</p><p><a href="https://infosec.exchange/@briankrebs/109795710941843934" rel="noopener noreferrer" target="_blank">https://infosec.exchange/@briankrebs/109795710941843934</a></p><p><strong>ChatGPT Data Breach Due to Open Source Vulnerability</strong></p><p>🇦🇺 Edwin Kwan, Sydney, Australia</p><p><a href="https://openai.com/blog/march-20-chatgpt-outage" rel="noopener noreferrer" target="_blank">March 20 ChatGPT outage: Here’s what happened</a></p><p><a href="https://www.securityweek.com/chatgpt-data-breach-confirmed-as-security-firm-warns-of-vulnerable-component-exploitation/" rel="noopener noreferrer" target="_blank">ChatGPT Data Breach Confirmed as Security Firm Warns of Vulnerable Component Exploitation - SecurityWeek</a></p><p><a href="https://www.greynoise.io/blog/openai-minio-and-why-you-should-always-use-docker-cli-scan-to-keep-your-supply-chain-clean" rel="noopener noreferrer" target="_blank">OpenAI, MinIO, And Why You Should Always Use docker-cli-scan To Keep Your Supply chAIn Clean</a></p><p><strong>Tesla Model 3 Pwned in 120 Seconds</strong></p><p><strong>🇷🇴 </strong>Olimpiu Pop, Transylvania, Romania</p><p><a href="https://www.zerodayinitiative.com/blog/2023/3/24/pwn2own-vancouver-2023-day" rel="noopener noreferrer" target="_blank">https://www.zerodayinitiative.com/blog/2023/3/24/pwn2own-vancouver-2023-day</a></p><p><a href="https://www.theregister.com/2023/03/27/in_brief_security/" rel="noopener noreferrer" target="_blank">https://www.theregister.com/2023/03/27/in_brief_security/</a></p><p><br></p><p><strong>WiFi Protocol Flaw</strong></p><p><strong>🇺🇸</strong> Katy Craig, San Diego, California</p><p><a href="https://www.bleepingcomputer.com/news/security/wifi-protocol-flaw-allows-attackers-to-hijack-network-traffic/amp/" rel="noopener noreferrer" target="_blank">WiFi protocol flaw allows attackers to hijack network traffic</a></p><p><a href="https://papers.mathyvanhoef.com/usenix2023-wifi.pdf" rel="noopener noreferrer" target="_blank">usenix2023-wifi.pdf (mathyvanhoef.com)</a></p><p><br></p><p><strong>This Day In Tech History 03-31 &amp; 04-01</strong></p><p><strong>🇺🇸</strong> Marcel Brown, St. Louis, Missouri</p><p><a href="https://thisdayintechhistory.com/03/31" rel="noopener noreferrer" target="_blank">https://thisdayintechhistory.com/03/31</a></p><p><a href="https://thisdayintechhistory.com/04/01" rel="noopener noreferrer" target="_blank">https://thisdayintechhistory.com/04/01</a></p>]]></description><content:encoded><![CDATA[<p><strong>Hey, it's 5:05 on Friday, March 31st, 2023.</strong> From The Sourced Podcast Network in New York City, this is your host Pokie Huang. Stories in today's episode come from <strong>Kadi Grigg</strong> in Alexandria, Virginia, <strong>Edwin Kwan</strong> in Sydney, Australia, <strong>Olimpiu Pop</strong> in Transylvania, Romania, <strong>Katy Craig</strong> in San Diego, California, <strong>Marcel Brown</strong> in St. Louis, Missouri.&nbsp;</p><p>Let's get to it.</p><p><strong>Latest Mass Ransomware Attack</strong></p><p><strong>🇺🇸</strong> Kadi Grigg, Alexandria, Virginia</p><p><a href="https://www.washingtonpost.com/politics/2023/03/27/latest-mass-ransomware-attack-has-been-unfolding-nearly-two-months/?utm_campaign=PostBeyond&amp;utm_source=Twitter&amp;utm_medium=Social&amp;utm_content=evergreen" rel="noopener noreferrer" target="_blank">The latest mass ransomware attack has been unfolding for nearly two months - The Washington Post</a>&nbsp;</p><p><a href="https://www.darkreading.com/attacks-breaches/clop-keeps-racking-up-ransomware-victims-with-goanywhere-flaw-" rel="noopener noreferrer" target="_blank">Clop Keeps Racking Up Ransomware Victims With GoAnywhere Flaw</a>&nbsp;</p><p><a href="https://infosec.exchange/@briankrebs/109795710941843934" rel="noopener noreferrer" target="_blank">https://infosec.exchange/@briankrebs/109795710941843934</a></p><p><strong>ChatGPT Data Breach Due to Open Source Vulnerability</strong></p><p>🇦🇺 Edwin Kwan, Sydney, Australia</p><p><a href="https://openai.com/blog/march-20-chatgpt-outage" rel="noopener noreferrer" target="_blank">March 20 ChatGPT outage: Here’s what happened</a></p><p><a href="https://www.securityweek.com/chatgpt-data-breach-confirmed-as-security-firm-warns-of-vulnerable-component-exploitation/" rel="noopener noreferrer" target="_blank">ChatGPT Data Breach Confirmed as Security Firm Warns of Vulnerable Component Exploitation - SecurityWeek</a></p><p><a href="https://www.greynoise.io/blog/openai-minio-and-why-you-should-always-use-docker-cli-scan-to-keep-your-supply-chain-clean" rel="noopener noreferrer" target="_blank">OpenAI, MinIO, And Why You Should Always Use docker-cli-scan To Keep Your Supply chAIn Clean</a></p><p><strong>Tesla Model 3 Pwned in 120 Seconds</strong></p><p><strong>🇷🇴 </strong>Olimpiu Pop, Transylvania, Romania</p><p><a href="https://www.zerodayinitiative.com/blog/2023/3/24/pwn2own-vancouver-2023-day" rel="noopener noreferrer" target="_blank">https://www.zerodayinitiative.com/blog/2023/3/24/pwn2own-vancouver-2023-day</a></p><p><a href="https://www.theregister.com/2023/03/27/in_brief_security/" rel="noopener noreferrer" target="_blank">https://www.theregister.com/2023/03/27/in_brief_security/</a></p><p><br></p><p><strong>WiFi Protocol Flaw</strong></p><p><strong>🇺🇸</strong> Katy Craig, San Diego, California</p><p><a href="https://www.bleepingcomputer.com/news/security/wifi-protocol-flaw-allows-attackers-to-hijack-network-traffic/amp/" rel="noopener noreferrer" target="_blank">WiFi protocol flaw allows attackers to hijack network traffic</a></p><p><a href="https://papers.mathyvanhoef.com/usenix2023-wifi.pdf" rel="noopener noreferrer" target="_blank">usenix2023-wifi.pdf (mathyvanhoef.com)</a></p><p><br></p><p><strong>This Day In Tech History 03-31 &amp; 04-01</strong></p><p><strong>🇺🇸</strong> Marcel Brown, St. Louis, Missouri</p><p><a href="https://thisdayintechhistory.com/03/31" rel="noopener noreferrer" target="_blank">https://thisdayintechhistory.com/03/31</a></p><p><a href="https://thisdayintechhistory.com/04/01" rel="noopener noreferrer" target="_blank">https://thisdayintechhistory.com/04/01</a></p>]]></content:encoded><link><![CDATA[https://3zozb9fxlbueipjyapmaas.captivate.fm/episode/episode-110-its-5-05-friday-march-31-2023]]></link><guid isPermaLink="false">fac50728-b2e2-4c2a-ad4d-9da8300ba5a7</guid><itunes:image href="https://artwork.captivate.fm/b13e1367-266d-42fb-8ce7-a0a5219ce045/YRz8EQqLPJx6qi9W9aAF00Zg.png"/><dc:creator><![CDATA[Contributors from Around the World]]></dc:creator><pubDate>Fri, 31 Mar 2023 16:45:00 -0400</pubDate><enclosure url="https://dts.podtrac.com/redirect.mp3/podcasts.captivate.fm/media/cc017ace-bcd4-44d9-96be-d31b1ba17825/2023-03-31-505-Episode-110-v2-converted.mp3" length="7839356" type="audio/mpeg"/><itunes:duration>10:53</itunes:duration><itunes:explicit>false</itunes:explicit><itunes:episodeType>full</itunes:episodeType><itunes:season>1</itunes:season><itunes:episode>110</itunes:episode><itunes:season>1</itunes:season><podcast:episode>110</podcast:episode><podcast:season>1</podcast:season><itunes:author>Contributors from Around the World</itunes:author></item><item><title>Episode #109 - It&apos;s 5:05, Thursday, March 30, 2023</title><itunes:title>Episode #109 - It&apos;s 5:05, Thursday, March 30, 2023</itunes:title><description><![CDATA[<p><strong>Hey, it's 5:05 on Thursday, March 30th, 2023</strong>. From The Sourced Podcast Network in New York City, this is your host, Pokie Huang. Stories in today's episode come from <strong>Edwin Kwan</strong> in Sydney, Australia, <strong>Mark Miller</strong> in New York City, <strong>Katy Craig</strong> in San Diego, California and <strong>Marcel Brown</strong> in St. Louis, Missouri.&nbsp;</p><p>Let's get to it.</p><p><br></p><p><strong>Superannuation Fund Impacted by Data Breach</strong></p><p>🇦🇺 Edwin Kwan, Sydney, Australia</p><p><a href="https://www.abc.net.au/news/2023-03-27/superannuation-fund-ngs-super-hit-by-cyber-attack/102151926" rel="noopener noreferrer" target="_blank">Superannuation fund NGS Super hit by cyber attack, 'limited data' taken from its system - ABC News</a></p><p><br></p><p><strong>The Vulcan Files</strong></p><p><strong>🇺🇸</strong> Mark Miller, New York City</p><p>Secret trove offers rare look into Russian cyberwar ambitions</p><p><a href="https://www.washingtonpost.com/national-security/2023/03/30/russian-cyberwarfare-documents-vulkan-files/" rel="noopener noreferrer" target="_blank">The Vulkan Files: Secret trove offers rare look into Russian cyberwar ambitions - The Washington Post</a></p><p>7 takeaways from the Vulkan Files investigation</p><p><a href="https://www.washingtonpost.com/national-security/2023/03/30/takeaways-vulkan-files-investigation/" rel="noopener noreferrer" target="_blank">7 takeaways from the Vulkan Files investigation - The Washington Post</a></p><p><br></p><p><strong>Microsoft Security CoPilot</strong></p><p><strong>🇺🇸</strong> Katy Craig, San Diego, California</p><p><a href="https://www.microsoft.com/en-us/security/business/ai-machine-learning/microsoft-security-copilot" rel="noopener noreferrer" target="_blank">Microsoft Security Copilot</a></p><p><a href="https://www.securityweek.com/microsoft-puts-chatgpt-to-work-on-automating-cybersecurity/" rel="noopener noreferrer" target="_blank">Microsoft Puts ChatGPT to Work on Automating Cybersecurity - SecurityWeek</a></p><p><br></p><p><br></p><p><strong>This Day In Tech History 03-30</strong></p><p><strong>🇺🇸</strong> Marcel Brown, St. Louis, Missouri</p><p><a href="https://thisdayintechhistory.com/03/30" rel="noopener noreferrer" target="_blank">https://thisdayintechhistory.com/03/30</a>  </p>]]></description><content:encoded><![CDATA[<p><strong>Hey, it's 5:05 on Thursday, March 30th, 2023</strong>. From The Sourced Podcast Network in New York City, this is your host, Pokie Huang. Stories in today's episode come from <strong>Edwin Kwan</strong> in Sydney, Australia, <strong>Mark Miller</strong> in New York City, <strong>Katy Craig</strong> in San Diego, California and <strong>Marcel Brown</strong> in St. Louis, Missouri.&nbsp;</p><p>Let's get to it.</p><p><br></p><p><strong>Superannuation Fund Impacted by Data Breach</strong></p><p>🇦🇺 Edwin Kwan, Sydney, Australia</p><p><a href="https://www.abc.net.au/news/2023-03-27/superannuation-fund-ngs-super-hit-by-cyber-attack/102151926" rel="noopener noreferrer" target="_blank">Superannuation fund NGS Super hit by cyber attack, 'limited data' taken from its system - ABC News</a></p><p><br></p><p><strong>The Vulcan Files</strong></p><p><strong>🇺🇸</strong> Mark Miller, New York City</p><p>Secret trove offers rare look into Russian cyberwar ambitions</p><p><a href="https://www.washingtonpost.com/national-security/2023/03/30/russian-cyberwarfare-documents-vulkan-files/" rel="noopener noreferrer" target="_blank">The Vulkan Files: Secret trove offers rare look into Russian cyberwar ambitions - The Washington Post</a></p><p>7 takeaways from the Vulkan Files investigation</p><p><a href="https://www.washingtonpost.com/national-security/2023/03/30/takeaways-vulkan-files-investigation/" rel="noopener noreferrer" target="_blank">7 takeaways from the Vulkan Files investigation - The Washington Post</a></p><p><br></p><p><strong>Microsoft Security CoPilot</strong></p><p><strong>🇺🇸</strong> Katy Craig, San Diego, California</p><p><a href="https://www.microsoft.com/en-us/security/business/ai-machine-learning/microsoft-security-copilot" rel="noopener noreferrer" target="_blank">Microsoft Security Copilot</a></p><p><a href="https://www.securityweek.com/microsoft-puts-chatgpt-to-work-on-automating-cybersecurity/" rel="noopener noreferrer" target="_blank">Microsoft Puts ChatGPT to Work on Automating Cybersecurity - SecurityWeek</a></p><p><br></p><p><br></p><p><strong>This Day In Tech History 03-30</strong></p><p><strong>🇺🇸</strong> Marcel Brown, St. Louis, Missouri</p><p><a href="https://thisdayintechhistory.com/03/30" rel="noopener noreferrer" target="_blank">https://thisdayintechhistory.com/03/30</a>  </p>]]></content:encoded><link><![CDATA[https://3zozb9fxlbueipjyapmaas.captivate.fm/episode/episode-109-its-5-05-thursday-march-30-2023]]></link><guid isPermaLink="false">7cf3e113-ad3c-483c-b479-151dcab4b62a</guid><itunes:image href="https://artwork.captivate.fm/05c29169-73df-4392-a613-6604f4545d92/ftbVl5nrnQDbTGKFb6MwBYkL.png"/><dc:creator><![CDATA[Contributors from Around the World]]></dc:creator><pubDate>Thu, 30 Mar 2023 16:45:00 -0400</pubDate><enclosure url="https://dts.podtrac.com/redirect.mp3/podcasts.captivate.fm/media/740efc31-163a-412c-b7b4-a083a6c430c5/2023-03-30-505-Episode-109-3-converted.mp3" length="6491124" type="audio/mpeg"/><itunes:duration>09:01</itunes:duration><itunes:explicit>false</itunes:explicit><itunes:episodeType>full</itunes:episodeType><itunes:season>1</itunes:season><itunes:episode>109</itunes:episode><itunes:season>1</itunes:season><podcast:episode>109</podcast:episode><podcast:season>1</podcast:season><itunes:author>Contributors from Around the World</itunes:author></item><item><title>Episode #108 - It&apos;s 5:05, Wednesday, March 29, 2023</title><itunes:title>Episode #108 - It&apos;s 5:05, Wednesday, March 29, 2023</itunes:title><description><![CDATA[<p><strong>Hey, it's 5:05 on Wednesday, March 29th , 2023.</strong> From the Sourced Podcast Network in New York City, this is your host, Pokie Huang. Stories in today's episode come from <strong>Chris Hughes</strong> in Virginia Beach, Virginia, <strong>Trac Bannon</strong> in Camp Hill, Pennsylvania, <strong>Edwin Kwan</strong> in Sydney, Australia, <strong>Katy Craig</strong> in San Diego, California, <strong>Marcel Brown</strong> in St. Louis, Missouri.&nbsp;</p><p>Let's get to it.</p><p><br></p><p><strong>GitHub - Streamlining SBOM Adoption</strong></p><p><strong>🇺🇸</strong> Chris Hughes, Virginia Beach, Virginia</p><p><a href="https://github.blog/2023-03-28-introducing-self-service-sboms/" rel="noopener noreferrer" target="_blank">Introducing self-service SBOMs | The GitHub Blog</a></p><p><br></p><p><strong>OpenAI, OpenSource Bug, and Leading Practices</strong></p><p><strong>🇺🇸</strong> Tracy (Trac) Bannon, Camp Hill, Pennsylvania</p><p><a href="https://www.hackread.com/chatgpt-bug-exposed-payment-details/" rel="noopener noreferrer" target="_blank">ChatGPT Bug Exposed Payment Details of Paid Users</a></p><p><a href="https://www.cmswire.com/digital-experience/chatgpt-suffers-first-data-breach-exposes-personal-information/amp/" rel="noopener noreferrer" target="_blank">ChatGPT Suffers First Data Breach, Exposes Personal Information</a>&nbsp;</p><p><a href="https://www.bleepingcomputer.com/news/security/openai-chatgpt-payment-data-leak-caused-by-open-source-bug/" rel="noopener noreferrer" target="_blank">OpenAI: ChatGPT payment data leak caused by open-source bug</a></p><p><a href="https://openai.com/blog/march-20-chatgpt-outage" rel="noopener noreferrer" target="_blank">March 20 ChatGPT outage: Here’s what happened</a>&nbsp;</p><p><a href="https://github.com/redis" rel="noopener noreferrer" target="_blank">Redis · GitHub</a></p><p><br></p><p><strong>Crown Resorts Suffers Data Breach</strong></p><p>🇦🇺 Edwin Kwan, Sydney, Australia</p><p><a href="https://www.bleepingcomputer.com/news/security/crown-resorts-confirms-ransom-demand-after-goanywhere-breach/" rel="noopener noreferrer" target="_blank">Crown Resorts confirms ransom demand after GoAnywhere breach</a></p><p><br></p><p><strong>Panera Pay by Palmprint</strong></p><p><strong>🇺🇸</strong> Katy Craig, San Diego, California</p><p><a href="https://www.fastcompany.com/90871131/panera-amazon-one-future-restaurant-tech-convenience" rel="noopener noreferrer" target="_blank">What Panera's Amazon-powered pay-by-palm tech means for restaurants</a></p><p><br></p><p><strong>This Day In Tech History 03-29</strong></p><p><strong>🇺🇸</strong> Marcel Brown, St. Louis, Missouri</p><p><a href="https://thisdayintechhistory.com/03/29" rel="noopener noreferrer" target="_blank">https://thisdayintechhistory.com/03/29</a></p>]]></description><content:encoded><![CDATA[<p><strong>Hey, it's 5:05 on Wednesday, March 29th , 2023.</strong> From the Sourced Podcast Network in New York City, this is your host, Pokie Huang. Stories in today's episode come from <strong>Chris Hughes</strong> in Virginia Beach, Virginia, <strong>Trac Bannon</strong> in Camp Hill, Pennsylvania, <strong>Edwin Kwan</strong> in Sydney, Australia, <strong>Katy Craig</strong> in San Diego, California, <strong>Marcel Brown</strong> in St. Louis, Missouri.&nbsp;</p><p>Let's get to it.</p><p><br></p><p><strong>GitHub - Streamlining SBOM Adoption</strong></p><p><strong>🇺🇸</strong> Chris Hughes, Virginia Beach, Virginia</p><p><a href="https://github.blog/2023-03-28-introducing-self-service-sboms/" rel="noopener noreferrer" target="_blank">Introducing self-service SBOMs | The GitHub Blog</a></p><p><br></p><p><strong>OpenAI, OpenSource Bug, and Leading Practices</strong></p><p><strong>🇺🇸</strong> Tracy (Trac) Bannon, Camp Hill, Pennsylvania</p><p><a href="https://www.hackread.com/chatgpt-bug-exposed-payment-details/" rel="noopener noreferrer" target="_blank">ChatGPT Bug Exposed Payment Details of Paid Users</a></p><p><a href="https://www.cmswire.com/digital-experience/chatgpt-suffers-first-data-breach-exposes-personal-information/amp/" rel="noopener noreferrer" target="_blank">ChatGPT Suffers First Data Breach, Exposes Personal Information</a>&nbsp;</p><p><a href="https://www.bleepingcomputer.com/news/security/openai-chatgpt-payment-data-leak-caused-by-open-source-bug/" rel="noopener noreferrer" target="_blank">OpenAI: ChatGPT payment data leak caused by open-source bug</a></p><p><a href="https://openai.com/blog/march-20-chatgpt-outage" rel="noopener noreferrer" target="_blank">March 20 ChatGPT outage: Here’s what happened</a>&nbsp;</p><p><a href="https://github.com/redis" rel="noopener noreferrer" target="_blank">Redis · GitHub</a></p><p><br></p><p><strong>Crown Resorts Suffers Data Breach</strong></p><p>🇦🇺 Edwin Kwan, Sydney, Australia</p><p><a href="https://www.bleepingcomputer.com/news/security/crown-resorts-confirms-ransom-demand-after-goanywhere-breach/" rel="noopener noreferrer" target="_blank">Crown Resorts confirms ransom demand after GoAnywhere breach</a></p><p><br></p><p><strong>Panera Pay by Palmprint</strong></p><p><strong>🇺🇸</strong> Katy Craig, San Diego, California</p><p><a href="https://www.fastcompany.com/90871131/panera-amazon-one-future-restaurant-tech-convenience" rel="noopener noreferrer" target="_blank">What Panera's Amazon-powered pay-by-palm tech means for restaurants</a></p><p><br></p><p><strong>This Day In Tech History 03-29</strong></p><p><strong>🇺🇸</strong> Marcel Brown, St. Louis, Missouri</p><p><a href="https://thisdayintechhistory.com/03/29" rel="noopener noreferrer" target="_blank">https://thisdayintechhistory.com/03/29</a></p>]]></content:encoded><link><![CDATA[https://3zozb9fxlbueipjyapmaas.captivate.fm/episode/episode-108-its-5-05-wednesday-march-29-2023]]></link><guid isPermaLink="false">04629749-bae5-401e-983d-a1635e1ac536</guid><itunes:image href="https://artwork.captivate.fm/01b87658-5066-4202-94eb-66e267de575e/LG23xzMsfoiCvb_ms6IGqkZx.png"/><dc:creator><![CDATA[Contributors from Around the World]]></dc:creator><pubDate>Wed, 29 Mar 2023 16:45:00 -0400</pubDate><enclosure url="https://dts.podtrac.com/redirect.mp3/podcasts.captivate.fm/media/951debdf-7841-4205-bfc4-edd31ba6527e/2023-03-29-505-Episode-108-converted.mp3" length="8684156" type="audio/mpeg"/><itunes:duration>12:04</itunes:duration><itunes:explicit>false</itunes:explicit><itunes:episodeType>full</itunes:episodeType><itunes:season>1</itunes:season><itunes:episode>108</itunes:episode><itunes:season>1</itunes:season><podcast:episode>108</podcast:episode><podcast:season>1</podcast:season><itunes:author>Contributors from Around the World</itunes:author></item><item><title>Episode #107 - It&apos;s 5:05, Tuesday, March 28, 2023</title><itunes:title>Episode #107 - It&apos;s 5:05, Tuesday, March 28, 2023</itunes:title><description><![CDATA[<p><strong>Hey, it's 5:05 on Tuesday, March 28th, 2023.</strong> From the Sourced Podcast Network in New York City, this is your host, Pokie Huang. Stories in today's episode come from <strong>Ax Sharma</strong> in Manchester, UK, <strong>Olimpiu Pop</strong> in Transylvania, Romania, <strong>Katy Craig</strong> in San Diego, California, <strong>Edwin Kwan</strong> in Sydney, Australia, <strong>Marcel Brown</strong> in St. Louis, Missouri.&nbsp;</p><p>Let's get to it.</p><p><br></p><p><strong>Redis CVE Race Condition</strong></p><p>🇬🇧 Ax Sharma, Manchester UK</p><p><a href="https://blog.sonatype.com/openai-data-leak-and-redis-race-condition-vulnerability-that-remains-unfixed" rel="noopener noreferrer" target="_blank">ChatGPT Data Leak and Redis Race Condition Vulnerability That Remains Unfixed</a></p><p><br></p><p><strong>Liberte, Egalite, Fraternite Surveillance: France to use AI for facial recognition during&nbsp; 2024 Olympic Games</strong></p><p><strong>🇷🇴 </strong>Olimpiu Pop, Transylvania, Romania</p><p><a href="https://www.reuters.com/technology/france-looks-ai-powered-surveillance-secure-olympics-2023-03-23/" rel="noopener noreferrer" target="_blank">France looks to AI-powered surveillance to secure Olympics | Reuters</a></p><p><a href="https://www.theguardian.com/world/2023/jan/31/france-paris-olympics-ai-video-surveillance-law" rel="noopener noreferrer" target="_blank">France under fire over fast-track plan for AI video surveillance at Paris Olympics</a></p><p><a href="https://www.theregister.com/2023/03/24/al_surveillance_french/" rel="noopener noreferrer" target="_blank">French parliament says oui to AI surveillance for 2024 Paris Olympics</a></p><p><a href="https://www.reuters.com/technology/what-is-european-union-ai-act-2023-03-22/" rel="noopener noreferrer" target="_blank">Explainer: What is the European Union AI Act? | Reuters</a></p><p><a href="https://www.amnesty.org/en/latest/news/2023/03/france-intrusive-olympics-surveillance-technologies-could-usher-in-a-dystopian-future/" rel="noopener noreferrer" target="_blank">France: Intrusive Olympics surveillance technologies could usher in a dystopian future - Amnesty International</a></p><p><a href="https://www.aljazeera.com/opinions/2023/3/10/french-plans-for-ai-surveillance-during-olympics-are-dangerous" rel="noopener noreferrer" target="_blank">French plans for AI surveillance during Olympics are dangerous | Privacy | Al Jazeera</a></p><p><a href="https://en.wikipedia.org/wiki/Libert%C3%A9,_%C3%A9galit%C3%A9,_fraternit%C3%A9" rel="noopener noreferrer" target="_blank">Liberté, égalité, fraternité - Wikipedia</a></p><p><a href="https://en.wikipedia.org/wiki/Minority_Report_(film)" rel="noopener noreferrer" target="_blank">Minority Report (film) - Wikipedia</a></p><p><a href="https://en.wikipedia.org/wiki/The_Minority_Report" rel="noopener noreferrer" target="_blank">The Minority Report - Wikipedia</a></p><p><br></p><p><strong>Unicode in PyPI</strong></p><p><strong>🇺🇸</strong> Katy Craig, San Diego, California</p><p><a href="https://blog.phylum.io/malicious-actors-use-unicode-support-in-python-to-evade-detection" rel="noopener noreferrer" target="_blank">Malicious Actors Use Unicode Support in Python to Evade Detection</a></p><p><a href="https://cyware.com/news/malicious-pypi-package-uses-unicode-why-e6e9603d" rel="noopener noreferrer" target="_blank">Malicious PyPI Package Uses Unicode - Why? | Cyware Alerts - Hacker News</a></p><p><br></p><p><strong>Twitter Takes Down Source Code Leak</strong></p><p>🇦🇺 Edwin Kwan, Sydney, Australia</p><p><a href="https://www.bleepingcomputer.com/news/security/twitter-takes-down-source-code-leaked-online-hunts-for-downloaders/" rel="noopener noreferrer" target="_blank">Twitter takes down source code leaked online, hunts for downloaders</a></p><p><br></p><p><strong>This Day In Tech History 03-28</strong></p><p><strong>🇺🇸</strong> Marcel Brown, St. Louis, Missouri</p><p><a href="https://thisdayintechhistory.com/03/28"...]]></description><content:encoded><![CDATA[<p><strong>Hey, it's 5:05 on Tuesday, March 28th, 2023.</strong> From the Sourced Podcast Network in New York City, this is your host, Pokie Huang. Stories in today's episode come from <strong>Ax Sharma</strong> in Manchester, UK, <strong>Olimpiu Pop</strong> in Transylvania, Romania, <strong>Katy Craig</strong> in San Diego, California, <strong>Edwin Kwan</strong> in Sydney, Australia, <strong>Marcel Brown</strong> in St. Louis, Missouri.&nbsp;</p><p>Let's get to it.</p><p><br></p><p><strong>Redis CVE Race Condition</strong></p><p>🇬🇧 Ax Sharma, Manchester UK</p><p><a href="https://blog.sonatype.com/openai-data-leak-and-redis-race-condition-vulnerability-that-remains-unfixed" rel="noopener noreferrer" target="_blank">ChatGPT Data Leak and Redis Race Condition Vulnerability That Remains Unfixed</a></p><p><br></p><p><strong>Liberte, Egalite, Fraternite Surveillance: France to use AI for facial recognition during&nbsp; 2024 Olympic Games</strong></p><p><strong>🇷🇴 </strong>Olimpiu Pop, Transylvania, Romania</p><p><a href="https://www.reuters.com/technology/france-looks-ai-powered-surveillance-secure-olympics-2023-03-23/" rel="noopener noreferrer" target="_blank">France looks to AI-powered surveillance to secure Olympics | Reuters</a></p><p><a href="https://www.theguardian.com/world/2023/jan/31/france-paris-olympics-ai-video-surveillance-law" rel="noopener noreferrer" target="_blank">France under fire over fast-track plan for AI video surveillance at Paris Olympics</a></p><p><a href="https://www.theregister.com/2023/03/24/al_surveillance_french/" rel="noopener noreferrer" target="_blank">French parliament says oui to AI surveillance for 2024 Paris Olympics</a></p><p><a href="https://www.reuters.com/technology/what-is-european-union-ai-act-2023-03-22/" rel="noopener noreferrer" target="_blank">Explainer: What is the European Union AI Act? | Reuters</a></p><p><a href="https://www.amnesty.org/en/latest/news/2023/03/france-intrusive-olympics-surveillance-technologies-could-usher-in-a-dystopian-future/" rel="noopener noreferrer" target="_blank">France: Intrusive Olympics surveillance technologies could usher in a dystopian future - Amnesty International</a></p><p><a href="https://www.aljazeera.com/opinions/2023/3/10/french-plans-for-ai-surveillance-during-olympics-are-dangerous" rel="noopener noreferrer" target="_blank">French plans for AI surveillance during Olympics are dangerous | Privacy | Al Jazeera</a></p><p><a href="https://en.wikipedia.org/wiki/Libert%C3%A9,_%C3%A9galit%C3%A9,_fraternit%C3%A9" rel="noopener noreferrer" target="_blank">Liberté, égalité, fraternité - Wikipedia</a></p><p><a href="https://en.wikipedia.org/wiki/Minority_Report_(film)" rel="noopener noreferrer" target="_blank">Minority Report (film) - Wikipedia</a></p><p><a href="https://en.wikipedia.org/wiki/The_Minority_Report" rel="noopener noreferrer" target="_blank">The Minority Report - Wikipedia</a></p><p><br></p><p><strong>Unicode in PyPI</strong></p><p><strong>🇺🇸</strong> Katy Craig, San Diego, California</p><p><a href="https://blog.phylum.io/malicious-actors-use-unicode-support-in-python-to-evade-detection" rel="noopener noreferrer" target="_blank">Malicious Actors Use Unicode Support in Python to Evade Detection</a></p><p><a href="https://cyware.com/news/malicious-pypi-package-uses-unicode-why-e6e9603d" rel="noopener noreferrer" target="_blank">Malicious PyPI Package Uses Unicode - Why? | Cyware Alerts - Hacker News</a></p><p><br></p><p><strong>Twitter Takes Down Source Code Leak</strong></p><p>🇦🇺 Edwin Kwan, Sydney, Australia</p><p><a href="https://www.bleepingcomputer.com/news/security/twitter-takes-down-source-code-leaked-online-hunts-for-downloaders/" rel="noopener noreferrer" target="_blank">Twitter takes down source code leaked online, hunts for downloaders</a></p><p><br></p><p><strong>This Day In Tech History 03-28</strong></p><p><strong>🇺🇸</strong> Marcel Brown, St. Louis, Missouri</p><p><a href="https://thisdayintechhistory.com/03/28" rel="noopener noreferrer" target="_blank">https://thisdayintechhistory.com/03/28</a></p><p><br></p>]]></content:encoded><link><![CDATA[https://3zozb9fxlbueipjyapmaas.captivate.fm/episode/episode-107-its-5-05-tuesday-march-28-2023]]></link><guid isPermaLink="false">d5e8c29e-62e9-4092-acea-74c38e1dbf2b</guid><itunes:image href="https://artwork.captivate.fm/dfc2df06-3676-4d7c-96d5-dc4ab0b74271/abHVDTgnehsxNtnEJbXYJ-AN.png"/><dc:creator><![CDATA[Contributors from Around the World]]></dc:creator><pubDate>Tue, 28 Mar 2023 16:45:00 -0400</pubDate><enclosure url="https://dts.podtrac.com/redirect.mp3/podcasts.captivate.fm/media/af76368d-dfd3-43bc-a310-14a5ff0f7369/2023-03-28-505-Episode-107-converted.mp3" length="6786413" type="audio/mpeg"/><itunes:duration>09:25</itunes:duration><itunes:explicit>false</itunes:explicit><itunes:episodeType>full</itunes:episodeType><itunes:season>1</itunes:season><itunes:episode>107</itunes:episode><itunes:season>1</itunes:season><podcast:episode>107</podcast:episode><podcast:season>1</podcast:season><itunes:author>Contributors from Around the World</itunes:author></item><item><title>Episode #106 - It&apos;s 5:05, Monday, March 27, 2023</title><itunes:title>Episode #106 - It&apos;s 5:05, Monday, March 27, 2023</itunes:title><description><![CDATA[<p><strong>Hey, it's 5:05 on Monday, March 27th, 2023.</strong> From the Sourced Podcast Network in New York City, this is your host, Pokie Huang. Stories in today's episode come from <strong>Edwin Kwan</strong> in Sydney, Australia, <strong>Katy Craig</strong> in San Diego, California, <strong>Derek Weeks</strong> in Bethesda, Maryland, <strong>Marcel Brown</strong> in St. Louis, Missouri.&nbsp;</p><p>Let's get to it.</p><p><strong>Latitude Financial Breach Exposed 14 Million Records</strong></p><p>🇦🇺 Edwin Kwan, Sydney, Australia</p><p><a href="https://www.theguardian.com/australia-news/2023/mar/27/latitude-financial-cyber-data-breach-hack-14m-customer-records-stolen" rel="noopener noreferrer" target="_blank">Latitude Financial cyber-attack worse than first thought with 14m customer records stolen | Business | The Guardian</a></p><p><br></p><p><br></p><p><strong>GPTs Impacts on Jobs</strong></p><p><strong>🇺🇸</strong> Katy Craig, San Diego, California</p><p><a href="https://arxiv.org/pdf/2303.10130.pdf?" rel="noopener noreferrer" target="_blank">GPTs are GPTs: An Early Look at the Labor Market Impact Potential of Large Language Models</a></p><p><a href="https://nypost.com/2023/03/26/up-to-80-percent-of-workers-could-see-jobs-impacted-by-ai/" rel="noopener noreferrer" target="_blank">Up to 80 percent of workers could see jobs impacted by AI</a></p><p><br></p><p><strong>North Dakota Approves Cybersecurity Education</strong></p><p><strong>🇺🇸</strong> Derek Weeks, Bethesda, Maryland</p><p><a href="https://www.kxnet.com/news/state-news/north-dakota-is-first-state-to-approve-required-cybersecurity-education/" rel="noopener noreferrer" target="_blank">North Dakota is first state to approve required cybersecurity education</a></p><p><br></p><p><strong>This Day In Tech History 03-26 &amp; 03-27</strong></p><p><strong>🇺🇸</strong> Marcel Brown, St. Louis, Missouri</p><p><a href="http://thisdayintechhistory.com/03/26" rel="noopener noreferrer" target="_blank">http://thisdayintechhistory.com/03/26</a></p><p><a href="http://thisdayintechhistory.com/03/27" rel="noopener noreferrer" target="_blank">http://thisdayintechhistory.com/03/27</a></p><p><br></p>]]></description><content:encoded><![CDATA[<p><strong>Hey, it's 5:05 on Monday, March 27th, 2023.</strong> From the Sourced Podcast Network in New York City, this is your host, Pokie Huang. Stories in today's episode come from <strong>Edwin Kwan</strong> in Sydney, Australia, <strong>Katy Craig</strong> in San Diego, California, <strong>Derek Weeks</strong> in Bethesda, Maryland, <strong>Marcel Brown</strong> in St. Louis, Missouri.&nbsp;</p><p>Let's get to it.</p><p><strong>Latitude Financial Breach Exposed 14 Million Records</strong></p><p>🇦🇺 Edwin Kwan, Sydney, Australia</p><p><a href="https://www.theguardian.com/australia-news/2023/mar/27/latitude-financial-cyber-data-breach-hack-14m-customer-records-stolen" rel="noopener noreferrer" target="_blank">Latitude Financial cyber-attack worse than first thought with 14m customer records stolen | Business | The Guardian</a></p><p><br></p><p><br></p><p><strong>GPTs Impacts on Jobs</strong></p><p><strong>🇺🇸</strong> Katy Craig, San Diego, California</p><p><a href="https://arxiv.org/pdf/2303.10130.pdf?" rel="noopener noreferrer" target="_blank">GPTs are GPTs: An Early Look at the Labor Market Impact Potential of Large Language Models</a></p><p><a href="https://nypost.com/2023/03/26/up-to-80-percent-of-workers-could-see-jobs-impacted-by-ai/" rel="noopener noreferrer" target="_blank">Up to 80 percent of workers could see jobs impacted by AI</a></p><p><br></p><p><strong>North Dakota Approves Cybersecurity Education</strong></p><p><strong>🇺🇸</strong> Derek Weeks, Bethesda, Maryland</p><p><a href="https://www.kxnet.com/news/state-news/north-dakota-is-first-state-to-approve-required-cybersecurity-education/" rel="noopener noreferrer" target="_blank">North Dakota is first state to approve required cybersecurity education</a></p><p><br></p><p><strong>This Day In Tech History 03-26 &amp; 03-27</strong></p><p><strong>🇺🇸</strong> Marcel Brown, St. Louis, Missouri</p><p><a href="http://thisdayintechhistory.com/03/26" rel="noopener noreferrer" target="_blank">http://thisdayintechhistory.com/03/26</a></p><p><a href="http://thisdayintechhistory.com/03/27" rel="noopener noreferrer" target="_blank">http://thisdayintechhistory.com/03/27</a></p><p><br></p>]]></content:encoded><link><![CDATA[https://3zozb9fxlbueipjyapmaas.captivate.fm/episode/episode-106-its-5-05-monday-march-27-2023]]></link><guid isPermaLink="false">f4529910-9a25-4890-ba16-90eaaf63915b</guid><itunes:image href="https://artwork.captivate.fm/74d5fe74-5757-48bd-a463-f4068a62246a/RKbqCC5Nu8KdOyYoWVTDShYf.png"/><dc:creator><![CDATA[Contributors from Around the World]]></dc:creator><pubDate>Mon, 27 Mar 2023 16:45:00 -0400</pubDate><enclosure url="https://dts.podtrac.com/redirect.mp3/podcasts.captivate.fm/media/5e56b7af-43f7-4ca4-a79d-40282b9e40f0/2023-03-27-Episode-106-converted.mp3" length="8103615" type="audio/mpeg"/><itunes:duration>11:15</itunes:duration><itunes:explicit>false</itunes:explicit><itunes:episodeType>full</itunes:episodeType><itunes:season>1</itunes:season><itunes:episode>106</itunes:episode><itunes:season>1</itunes:season><podcast:episode>106</podcast:episode><podcast:season>1</podcast:season><itunes:author>Contributors from Around the World</itunes:author></item><item><title>Episode #105 - It&apos;s 5:05, Friday, March 24, 2023</title><itunes:title>Episode #105 - It&apos;s 5:05, Friday, March 24, 2023</itunes:title><description><![CDATA[<p><strong>Hey, it's 5:05 on Friday, March 24th, 2023.</strong> From the Sourced Podcast Network in New York City, this is your host, Pokie Huang. Stories in today's episode come from <strong>Trac Bannon</strong> in Camp Hill, Pennsylvania, <strong>Edwin Kwan</strong> in Sydney, Australia, <strong>Kadi Grigg</strong> in Alexandria, Virginia, <strong>Olimpiu Pop</strong> in Pennsylvania, Romania, <strong>Katy Craig</strong> in San Diego, California and <strong>Marcel Brown</strong> in St. Louis, Missouri.&nbsp;</p><p>Let's get to it.</p><p><br></p><p><strong>ChatGPT Failures and Forgiveness</strong></p><p><strong>🇺🇸</strong> Tracy (Trac) Bannon, Camp Hill, Pennsylvania</p><p><a href="https://www.independent.co.uk/tech/chatgpt-down-bug-issue-history-b2306269.html" rel="noopener noreferrer" target="_blank">‘We feel awful about this’: ChatGPT creators reveal ‘significant issue’ with AI system | The Independent</a>&nbsp;</p><p><a href="https://www.searchenginejournal.com/chatgpt-down/482682/#close" rel="noopener noreferrer" target="_blank">ChatGPT Is Down: OpenAI Reports Major Outages For ChatGPT And Labs Users</a></p><p><a href="https://chat.openai.com/" rel="noopener noreferrer" target="_blank">Chat OpenAI</a>&nbsp;</p><p><br></p><p><strong>Latitude Financial Hack Revealed</strong></p><p>🇦🇺 Edwin Kwan, Sydney, Australia</p><p><a href="https://www.afr.com/technology/revealed-how-hackers-used-a-tech-giant-to-get-inside-latitude-financial-20230323-p5cukr" rel="noopener noreferrer" target="_blank">Revealed: how hackers used a tech giant to get inside Latitude Financial</a></p><p><br></p><p><br></p><p><strong>Equifax's Annual Report Reflects Current Cybersecurity Climate</strong></p><p><strong>🇺🇸</strong> Kadi Grigg, Alexandria, Virginia</p><p><a href="https://assets.equifax.com/marketing/US/assets/2022-security-annual-report.pdf" rel="noopener noreferrer" target="_blank">2022 Security Annual Report | Equifax</a></p><p><a href="https://investor.equifax.com/news-events/press-releases/detail/1283/equifax-releases-2022-security-annual-report" rel="noopener noreferrer" target="_blank">Equifax Releases 2022 Security Annual Report</a> </p><p><br></p><p><strong>ENISA Publishes Cyber Criminality Report Focused on Transportation</strong></p><p><strong>🇷🇴 </strong>Olimpiu Pop, Transylvania, Romania</p><p><a href="https://www.enisa.europa.eu/news/understanding-cyber-threats-in-transport" rel="noopener noreferrer" target="_blank">Understanding Cyber Threats in Transport — ENISA</a></p><p><a href="https://ec.europa.eu/eurostat/web/transport/data/database" rel="noopener noreferrer" target="_blank">Database - Transport - Eurostat</a></p><p><br></p><p><strong>Flock Safety and Suburban Surveillance</strong></p><p><strong>🇺🇸</strong> Katy Craig, San Diego, California</p><p><a href="https://theintercept.com/2023/03/22/hoa-surveillance-license-plate-police-flock/" rel="noopener noreferrer" target="_blank">License Plate Surveillance, Courtesy of Your Homeowners Association</a></p><p><a href="https://www.statesman.com/story/news/local/lake-travis-view/2021/06/22/rough-hollow-hoa-remove-cameras-installed-without-lakeway-council-permission/5312603001/" rel="noopener noreferrer" target="_blank">HOA promises to remove surveillance cameras installed without Lakeway's permission</a></p><p><br></p><p><strong>This Day In Tech History 03-24 &amp; 03-25</strong></p><p><strong>🇺🇸</strong> Marcel Brown, St. Louis, Missouri</p><p><a href="https://thisdayintechhistory.com/03/24" rel="noopener noreferrer" target="_blank">https://thisdayintechhistory.com/03/24</a></p><p><a href="https://thisdayintechhistory.com/03/25" rel="noopener noreferrer" target="_blank">https://thisdayintechhistory.com/03/25</a></p><p><br></p>]]></description><content:encoded><![CDATA[<p><strong>Hey, it's 5:05 on Friday, March 24th, 2023.</strong> From the Sourced Podcast Network in New York City, this is your host, Pokie Huang. Stories in today's episode come from <strong>Trac Bannon</strong> in Camp Hill, Pennsylvania, <strong>Edwin Kwan</strong> in Sydney, Australia, <strong>Kadi Grigg</strong> in Alexandria, Virginia, <strong>Olimpiu Pop</strong> in Pennsylvania, Romania, <strong>Katy Craig</strong> in San Diego, California and <strong>Marcel Brown</strong> in St. Louis, Missouri.&nbsp;</p><p>Let's get to it.</p><p><br></p><p><strong>ChatGPT Failures and Forgiveness</strong></p><p><strong>🇺🇸</strong> Tracy (Trac) Bannon, Camp Hill, Pennsylvania</p><p><a href="https://www.independent.co.uk/tech/chatgpt-down-bug-issue-history-b2306269.html" rel="noopener noreferrer" target="_blank">‘We feel awful about this’: ChatGPT creators reveal ‘significant issue’ with AI system | The Independent</a>&nbsp;</p><p><a href="https://www.searchenginejournal.com/chatgpt-down/482682/#close" rel="noopener noreferrer" target="_blank">ChatGPT Is Down: OpenAI Reports Major Outages For ChatGPT And Labs Users</a></p><p><a href="https://chat.openai.com/" rel="noopener noreferrer" target="_blank">Chat OpenAI</a>&nbsp;</p><p><br></p><p><strong>Latitude Financial Hack Revealed</strong></p><p>🇦🇺 Edwin Kwan, Sydney, Australia</p><p><a href="https://www.afr.com/technology/revealed-how-hackers-used-a-tech-giant-to-get-inside-latitude-financial-20230323-p5cukr" rel="noopener noreferrer" target="_blank">Revealed: how hackers used a tech giant to get inside Latitude Financial</a></p><p><br></p><p><br></p><p><strong>Equifax's Annual Report Reflects Current Cybersecurity Climate</strong></p><p><strong>🇺🇸</strong> Kadi Grigg, Alexandria, Virginia</p><p><a href="https://assets.equifax.com/marketing/US/assets/2022-security-annual-report.pdf" rel="noopener noreferrer" target="_blank">2022 Security Annual Report | Equifax</a></p><p><a href="https://investor.equifax.com/news-events/press-releases/detail/1283/equifax-releases-2022-security-annual-report" rel="noopener noreferrer" target="_blank">Equifax Releases 2022 Security Annual Report</a> </p><p><br></p><p><strong>ENISA Publishes Cyber Criminality Report Focused on Transportation</strong></p><p><strong>🇷🇴 </strong>Olimpiu Pop, Transylvania, Romania</p><p><a href="https://www.enisa.europa.eu/news/understanding-cyber-threats-in-transport" rel="noopener noreferrer" target="_blank">Understanding Cyber Threats in Transport — ENISA</a></p><p><a href="https://ec.europa.eu/eurostat/web/transport/data/database" rel="noopener noreferrer" target="_blank">Database - Transport - Eurostat</a></p><p><br></p><p><strong>Flock Safety and Suburban Surveillance</strong></p><p><strong>🇺🇸</strong> Katy Craig, San Diego, California</p><p><a href="https://theintercept.com/2023/03/22/hoa-surveillance-license-plate-police-flock/" rel="noopener noreferrer" target="_blank">License Plate Surveillance, Courtesy of Your Homeowners Association</a></p><p><a href="https://www.statesman.com/story/news/local/lake-travis-view/2021/06/22/rough-hollow-hoa-remove-cameras-installed-without-lakeway-council-permission/5312603001/" rel="noopener noreferrer" target="_blank">HOA promises to remove surveillance cameras installed without Lakeway's permission</a></p><p><br></p><p><strong>This Day In Tech History 03-24 &amp; 03-25</strong></p><p><strong>🇺🇸</strong> Marcel Brown, St. Louis, Missouri</p><p><a href="https://thisdayintechhistory.com/03/24" rel="noopener noreferrer" target="_blank">https://thisdayintechhistory.com/03/24</a></p><p><a href="https://thisdayintechhistory.com/03/25" rel="noopener noreferrer" target="_blank">https://thisdayintechhistory.com/03/25</a></p><p><br></p>]]></content:encoded><link><![CDATA[https://3zozb9fxlbueipjyapmaas.captivate.fm/episode/episode-105-its-5-05-friday-march-24-2023]]></link><guid isPermaLink="false">1a148494-9615-4295-a051-4a0bc5a123ca</guid><itunes:image href="https://artwork.captivate.fm/d52dda1b-7133-4349-9c5f-20d77233346c/8JZYKD-Ge81OzyzbMey6hOgG.png"/><dc:creator><![CDATA[Contributors from Around the World]]></dc:creator><pubDate>Fri, 24 Mar 2023 16:45:00 -0400</pubDate><enclosure url="https://dts.podtrac.com/redirect.mp3/podcasts.captivate.fm/media/f26cfd76-6543-436b-801c-759372ad66db/2023-03-24-505-Episode-105-converted.mp3" length="10336141" type="audio/mpeg"/><itunes:duration>14:21</itunes:duration><itunes:explicit>false</itunes:explicit><itunes:episodeType>full</itunes:episodeType><itunes:season>1</itunes:season><itunes:episode>105</itunes:episode><itunes:season>1</itunes:season><podcast:episode>105</podcast:episode><podcast:season>1</podcast:season><itunes:author>Contributors from Around the World</itunes:author></item><item><title>Episode #104 - It&apos;s 5:05, Thursday, March 23, 2023</title><itunes:title>Episode #104 - It&apos;s 5:05, Thursday, March 23, 2023</itunes:title><description><![CDATA[<p><strong>Hey, It's 5:05 on Thursday, March 23rd, 2023</strong>. From the Sourced Podcast Network in New York City, this is your host, Pokie Huang. Stories in today's episode come from <strong>Edwin Kwan</strong> in Sydney, Australia, <strong>Katy Craig</strong> in San Diego, California, <strong>Derek Weeks</strong> in Bethesda, Maryland, and <strong>Marcel Brown</strong> in St. Louis, Missouri.</p><p>Let's get to it</p><p><br></p><p><strong>Latitude Financial Breach Larger Than Initial Disclosure</strong></p><p>🇦🇺 Edwin Kwan, Sydney, Australia</p><p><a href="https://www.itnews.com.au/news/latitude-financial-warns-of-large-scale-information-theft-592386" rel="noopener noreferrer" target="_blank">Latitude Financial warns of 'large-scale information theft' - Finance - Security - iTnews</a></p><p><a href="https://www.itnews.com.au/news/impact-of-latitude-financial-cyber-attack-likely-to-spread-592318" rel="noopener noreferrer" target="_blank">Impact of Latitude Financial cyber attack likely to spread - Security - iTnews</a></p><p><br></p><p><strong>Google Rolls Out Bard In The US And UK</strong></p><p><strong>🇺🇸</strong> Katy Craig, San Diego, California</p><p><a href="https://www.technologyreview.com/2023/03/21/1070111/google-bard-chatgpt-openai-microsoft-bing-search/" rel="noopener noreferrer" target="_blank">Google just launched Bard, its answer to ChatGPT—and it wants you to make it better</a></p><p><a href="https://www.engadget.com/google-bard-ai-hands-on-a-work-in-progress-with-plenty-of-caveats-170956025.html" rel="noopener noreferrer" target="_blank">Google Bard AI hands-on: A work in progress with plenty of caveats | Engadget</a></p><p><a href="https://www.businessinsider.com/google-ai-bard-chatbot-launch-us-uk-2023-3" rel="noopener noreferrer" target="_blank">Google's Bard AI chatbot is now open to users in the US and UK. Here's how it works</a></p><p><br></p><p><strong>Will AI End Of Vulnerabilities In Code?</strong></p><p>🇺🇸 Derek Weeks, Bethesda, Maryland</p><p><a href="https://www.linkedin.com/feed/update/urn:li:activity:7044098920532086784?utm_source=share&amp;utm_medium=member_desktop" rel="noopener noreferrer" target="_blank">Write safer code with new vulnerability prevention features in GitHub Copilot&nbsp;</a></p><p><br></p><p><strong>This Day In Tech History 03-23</strong></p><p><strong>🇺🇸</strong> Marcel Brown, St. Louis, Missouri</p><p><a href="https://thisdayintechhistory.com/03/23" rel="noopener noreferrer" target="_blank">https://thisdayintechhistory.com/03/23</a></p><p><br></p>]]></description><content:encoded><![CDATA[<p><strong>Hey, It's 5:05 on Thursday, March 23rd, 2023</strong>. From the Sourced Podcast Network in New York City, this is your host, Pokie Huang. Stories in today's episode come from <strong>Edwin Kwan</strong> in Sydney, Australia, <strong>Katy Craig</strong> in San Diego, California, <strong>Derek Weeks</strong> in Bethesda, Maryland, and <strong>Marcel Brown</strong> in St. Louis, Missouri.</p><p>Let's get to it</p><p><br></p><p><strong>Latitude Financial Breach Larger Than Initial Disclosure</strong></p><p>🇦🇺 Edwin Kwan, Sydney, Australia</p><p><a href="https://www.itnews.com.au/news/latitude-financial-warns-of-large-scale-information-theft-592386" rel="noopener noreferrer" target="_blank">Latitude Financial warns of 'large-scale information theft' - Finance - Security - iTnews</a></p><p><a href="https://www.itnews.com.au/news/impact-of-latitude-financial-cyber-attack-likely-to-spread-592318" rel="noopener noreferrer" target="_blank">Impact of Latitude Financial cyber attack likely to spread - Security - iTnews</a></p><p><br></p><p><strong>Google Rolls Out Bard In The US And UK</strong></p><p><strong>🇺🇸</strong> Katy Craig, San Diego, California</p><p><a href="https://www.technologyreview.com/2023/03/21/1070111/google-bard-chatgpt-openai-microsoft-bing-search/" rel="noopener noreferrer" target="_blank">Google just launched Bard, its answer to ChatGPT—and it wants you to make it better</a></p><p><a href="https://www.engadget.com/google-bard-ai-hands-on-a-work-in-progress-with-plenty-of-caveats-170956025.html" rel="noopener noreferrer" target="_blank">Google Bard AI hands-on: A work in progress with plenty of caveats | Engadget</a></p><p><a href="https://www.businessinsider.com/google-ai-bard-chatbot-launch-us-uk-2023-3" rel="noopener noreferrer" target="_blank">Google's Bard AI chatbot is now open to users in the US and UK. Here's how it works</a></p><p><br></p><p><strong>Will AI End Of Vulnerabilities In Code?</strong></p><p>🇺🇸 Derek Weeks, Bethesda, Maryland</p><p><a href="https://www.linkedin.com/feed/update/urn:li:activity:7044098920532086784?utm_source=share&amp;utm_medium=member_desktop" rel="noopener noreferrer" target="_blank">Write safer code with new vulnerability prevention features in GitHub Copilot&nbsp;</a></p><p><br></p><p><strong>This Day In Tech History 03-23</strong></p><p><strong>🇺🇸</strong> Marcel Brown, St. Louis, Missouri</p><p><a href="https://thisdayintechhistory.com/03/23" rel="noopener noreferrer" target="_blank">https://thisdayintechhistory.com/03/23</a></p><p><br></p>]]></content:encoded><link><![CDATA[https://3zozb9fxlbueipjyapmaas.captivate.fm/episode/episode-104-its-5-05-thursday-march-23-2023]]></link><guid isPermaLink="false">6169bd56-1f5f-4e15-93d6-ea87f487cd14</guid><itunes:image href="https://artwork.captivate.fm/19bc0b6c-cfb1-4685-9a93-5fce8a3d2ebb/R87PU5Gn86yLUIYYosyrdN1w.png"/><dc:creator><![CDATA[Contributors from Around the World]]></dc:creator><pubDate>Thu, 23 Mar 2023 16:45:00 -0400</pubDate><enclosure url="https://dts.podtrac.com/redirect.mp3/podcasts.captivate.fm/media/7b17c703-2706-421b-b707-b4a53f0e5669/2023-03-23-505-Episode-104-converted.mp3" length="7288594" type="audio/mpeg"/><itunes:duration>10:07</itunes:duration><itunes:explicit>false</itunes:explicit><itunes:episodeType>full</itunes:episodeType><itunes:season>1</itunes:season><itunes:episode>104</itunes:episode><itunes:season>1</itunes:season><podcast:episode>104</podcast:episode><podcast:season>1</podcast:season><itunes:author>Contributors from Around the World</itunes:author></item><item><title>Episode #103 - It&apos;s 5:05, Wednesday, March 22, 2023</title><itunes:title>Episode #103 - It&apos;s 5:05, Wednesday, March 22, 2023</itunes:title><description><![CDATA[<p><strong>Hey, It's 5:05 on Wednesday, March 22nd, 2023</strong>. From the Sourced Podcast Network in New York City, this is your host, Pokie Huang. Stories in today's episode come from <strong>Ian Garrett</strong> in Arlington, Virginia, <strong>Edwin Kwan</strong> in Sydney, Australia, <strong>Katy Craig</strong> in San Diego, California and <strong>Marcel Brown</strong> in St. Louis, Missouri.</p><p>Let's get to it.</p><p><strong>Revving Up for Trouble: Ferrari's Ransomware Attack and Customer Data Breach</strong></p><p>🇺🇸 Ian Garrett, Arlington, Virginia</p><p><a href="https://www.ferrari.com/en-EN/corporate/articles/cyber-incident-in-ferrari" rel="noopener noreferrer" target="_blank">Cyber incident in Ferrari</a></p><p><a href="https://techcrunch.com/2023/03/21/ferrari-says-ransomware-attack-exposed-customers-personal-data/" rel="noopener noreferrer" target="_blank">Ferrari says ransomware attack exposed customers’ personal data | TechCrunch</a></p><p><strong>Serious Privacy Vulnerability in Google Pixel for Redacted Images</strong></p><p>🇦🇺 Edwin Kwan, Sydney, Australia</p><p><a href="https://www.bleepingcomputer.com/news/security/google-pixel-flaw-allowed-recovery-of-redacted-cropped-images/" rel="noopener noreferrer" target="_blank">Google Pixel flaw allowed recovery of redacted, cropped images</a></p><p><a href="https://twitter.com/ItsSimonTime/status/1636857478263750656" rel="noopener noreferrer" target="_blank">Introducing acropalypse | Twitter - ItsSimonTime</a></p><p><a href="https://acropalypse.app/" rel="noopener noreferrer" target="_blank">Acropalypse</a></p><p><br></p><p><strong>Joint Cybersecurity Advisory: Lockbit 3.0</strong></p><p><strong>🇺🇸</strong> Katy Craig, San Diego, California</p><p><a href="https://www.cisa.gov/news-events/cybersecurity-advisories/aa23-075a" rel="noopener noreferrer" target="_blank">#StopRansomware: LockBit 3.0 | CISA</a></p><p><a href="https://cybernews.com/news/oaklands-nightmare-continues-lockbit-strikes-again/" rel="noopener noreferrer" target="_blank">Oakland’s nightmare continues as LockBit strikes again | Cybernews</a></p><p><br></p><p><strong>This Day In Tech History 03-22</strong></p><p><strong>🇺🇸</strong> Marcel Brown, St. Louis, Missouri</p><p><a href="https://thisdayintechhistory.com/03/22" rel="noopener noreferrer" target="_blank">https://thisdayintechhistory.com/03/22</a></p><p><br></p>]]></description><content:encoded><![CDATA[<p><strong>Hey, It's 5:05 on Wednesday, March 22nd, 2023</strong>. From the Sourced Podcast Network in New York City, this is your host, Pokie Huang. Stories in today's episode come from <strong>Ian Garrett</strong> in Arlington, Virginia, <strong>Edwin Kwan</strong> in Sydney, Australia, <strong>Katy Craig</strong> in San Diego, California and <strong>Marcel Brown</strong> in St. Louis, Missouri.</p><p>Let's get to it.</p><p><strong>Revving Up for Trouble: Ferrari's Ransomware Attack and Customer Data Breach</strong></p><p>🇺🇸 Ian Garrett, Arlington, Virginia</p><p><a href="https://www.ferrari.com/en-EN/corporate/articles/cyber-incident-in-ferrari" rel="noopener noreferrer" target="_blank">Cyber incident in Ferrari</a></p><p><a href="https://techcrunch.com/2023/03/21/ferrari-says-ransomware-attack-exposed-customers-personal-data/" rel="noopener noreferrer" target="_blank">Ferrari says ransomware attack exposed customers’ personal data | TechCrunch</a></p><p><strong>Serious Privacy Vulnerability in Google Pixel for Redacted Images</strong></p><p>🇦🇺 Edwin Kwan, Sydney, Australia</p><p><a href="https://www.bleepingcomputer.com/news/security/google-pixel-flaw-allowed-recovery-of-redacted-cropped-images/" rel="noopener noreferrer" target="_blank">Google Pixel flaw allowed recovery of redacted, cropped images</a></p><p><a href="https://twitter.com/ItsSimonTime/status/1636857478263750656" rel="noopener noreferrer" target="_blank">Introducing acropalypse | Twitter - ItsSimonTime</a></p><p><a href="https://acropalypse.app/" rel="noopener noreferrer" target="_blank">Acropalypse</a></p><p><br></p><p><strong>Joint Cybersecurity Advisory: Lockbit 3.0</strong></p><p><strong>🇺🇸</strong> Katy Craig, San Diego, California</p><p><a href="https://www.cisa.gov/news-events/cybersecurity-advisories/aa23-075a" rel="noopener noreferrer" target="_blank">#StopRansomware: LockBit 3.0 | CISA</a></p><p><a href="https://cybernews.com/news/oaklands-nightmare-continues-lockbit-strikes-again/" rel="noopener noreferrer" target="_blank">Oakland’s nightmare continues as LockBit strikes again | Cybernews</a></p><p><br></p><p><strong>This Day In Tech History 03-22</strong></p><p><strong>🇺🇸</strong> Marcel Brown, St. Louis, Missouri</p><p><a href="https://thisdayintechhistory.com/03/22" rel="noopener noreferrer" target="_blank">https://thisdayintechhistory.com/03/22</a></p><p><br></p>]]></content:encoded><link><![CDATA[https://3zozb9fxlbueipjyapmaas.captivate.fm/episode/episode-103-its-5-05-wednesday-march-22-2023]]></link><guid isPermaLink="false">b4491df8-125a-4193-9b3b-0adb1d9bd78a</guid><itunes:image href="https://artwork.captivate.fm/7a6f174b-c932-4e0e-8216-bcbb70877a15/3ByRQ7dZ6XoFldOIG7J6Ad3s.png"/><dc:creator><![CDATA[Contributors from Around the World]]></dc:creator><pubDate>Wed, 22 Mar 2023 16:45:00 -0400</pubDate><enclosure url="https://dts.podtrac.com/redirect.mp3/podcasts.captivate.fm/media/7903e1fe-980a-4cb2-850f-671a58004955/2023-03-22-505-Episode-103-converted.mp3" length="6537208" type="audio/mpeg"/><itunes:duration>09:05</itunes:duration><itunes:explicit>false</itunes:explicit><itunes:episodeType>full</itunes:episodeType><itunes:season>1</itunes:season><itunes:episode>103</itunes:episode><itunes:season>1</itunes:season><podcast:episode>103</podcast:episode><podcast:season>1</podcast:season><itunes:author>Contributors from Around the World</itunes:author></item><item><title>Episode #102 - It&apos;s 5:05, Tuesday, March 21, 2023</title><itunes:title>Episode #102 - It&apos;s 5:05, Tuesday, March 21, 2023</itunes:title><description><![CDATA[<p><strong>Hey! It's 5:05 on Tuesday, March 21st, 2023.</strong> From the Sourced Podcast Network in New York City, this is your host, Pokie Huang. Stories in today's episode come from <strong>Edwin Kwan</strong> in Sydney, Australia, <strong>Katy Craig </strong>in San Diego, California, <strong>Olimpiu Pop </strong>in Transylvania, Romania and <strong>Marcel Brown</strong> in St. Louis, Missouri.&nbsp;</p><p>Let's get to it.</p><p><strong>Undisclosed Data Breach Of Medical Research Institute</strong></p><p>🇦🇺 Edwin Kwan, Sydney, Australia</p><p><a href="https://www.abc.net.au/news/2023-03-20/australias-largest-cancer-survey-hit-by-data-breach/102105720" rel="noopener noreferrer" target="_blank">Skin cancer survey hack may have 'compromised' personal details, Medicare numbers of participants - ABC News</a></p><p><strong>Mastercard Debuts AI Cyber Shield</strong></p><p><strong>🇺🇸</strong> Katy Craig, San Diego, California</p><p><a href="https://www.mastercard.com/news/press/2023/march/mastercard-strengthens-customer-security-with-new-ai-cyber-shield/" rel="noopener noreferrer" target="_blank">Mastercard strengthens customer security with new AI ‘Cyber Shield’</a></p><p><strong>GTP4 Is ‘Scary’ And ‘Power-Seeking</strong>’</p><p><strong>🇷🇴 </strong>Olimpiu Pop, Transylvania, Romania</p><p><a href="https://lifearchitect.substack.com/p/the-memo-19mar2023-20-announcements" rel="noopener noreferrer" target="_blank">The Memo - 19/Mar/2023 (20+ announcements)</a></p><p><a href="https://www.infoq.com/news/2022/10/ai-state-2022/" rel="noopener noreferrer" target="_blank">How GPT3 Architecture Enhanced AI Capabilities: Lifearchitect.ai Keynote At Devoxx</a></p><p><a href="https://en.wikipedia.org/wiki/Universal_basic_income" rel="noopener noreferrer" target="_blank">Universal basic income - Wikipedia</a></p><p><strong>This Day In Tech History 03-21</strong></p><p><strong>🇺🇸</strong> Marcel Brown, St. Louis, Missouri</p><p><a href="https://thisdayintechhistory.com/03/21" rel="noopener noreferrer" target="_blank">https://thisdayintechhistory.com/03/21</a></p>]]></description><content:encoded><![CDATA[<p><strong>Hey! It's 5:05 on Tuesday, March 21st, 2023.</strong> From the Sourced Podcast Network in New York City, this is your host, Pokie Huang. Stories in today's episode come from <strong>Edwin Kwan</strong> in Sydney, Australia, <strong>Katy Craig </strong>in San Diego, California, <strong>Olimpiu Pop </strong>in Transylvania, Romania and <strong>Marcel Brown</strong> in St. Louis, Missouri.&nbsp;</p><p>Let's get to it.</p><p><strong>Undisclosed Data Breach Of Medical Research Institute</strong></p><p>🇦🇺 Edwin Kwan, Sydney, Australia</p><p><a href="https://www.abc.net.au/news/2023-03-20/australias-largest-cancer-survey-hit-by-data-breach/102105720" rel="noopener noreferrer" target="_blank">Skin cancer survey hack may have 'compromised' personal details, Medicare numbers of participants - ABC News</a></p><p><strong>Mastercard Debuts AI Cyber Shield</strong></p><p><strong>🇺🇸</strong> Katy Craig, San Diego, California</p><p><a href="https://www.mastercard.com/news/press/2023/march/mastercard-strengthens-customer-security-with-new-ai-cyber-shield/" rel="noopener noreferrer" target="_blank">Mastercard strengthens customer security with new AI ‘Cyber Shield’</a></p><p><strong>GTP4 Is ‘Scary’ And ‘Power-Seeking</strong>’</p><p><strong>🇷🇴 </strong>Olimpiu Pop, Transylvania, Romania</p><p><a href="https://lifearchitect.substack.com/p/the-memo-19mar2023-20-announcements" rel="noopener noreferrer" target="_blank">The Memo - 19/Mar/2023 (20+ announcements)</a></p><p><a href="https://www.infoq.com/news/2022/10/ai-state-2022/" rel="noopener noreferrer" target="_blank">How GPT3 Architecture Enhanced AI Capabilities: Lifearchitect.ai Keynote At Devoxx</a></p><p><a href="https://en.wikipedia.org/wiki/Universal_basic_income" rel="noopener noreferrer" target="_blank">Universal basic income - Wikipedia</a></p><p><strong>This Day In Tech History 03-21</strong></p><p><strong>🇺🇸</strong> Marcel Brown, St. Louis, Missouri</p><p><a href="https://thisdayintechhistory.com/03/21" rel="noopener noreferrer" target="_blank">https://thisdayintechhistory.com/03/21</a></p>]]></content:encoded><link><![CDATA[https://3zozb9fxlbueipjyapmaas.captivate.fm/episode/episode-102-its-5-05-tuesday-march-21-2023]]></link><guid isPermaLink="false">216478d4-6235-4c1f-8e24-2cc5008ef238</guid><itunes:image href="https://artwork.captivate.fm/5aa6388d-c177-4ce1-b412-690c6c300c07/c8CNLDOUtFvlbhX-7uMsD1Bj.png"/><dc:creator><![CDATA[Contributors from Around the World]]></dc:creator><pubDate>Tue, 21 Mar 2023 16:45:00 -0400</pubDate><enclosure url="https://dts.podtrac.com/redirect.mp3/podcasts.captivate.fm/media/5c69128b-cc35-41f9-a081-75b0b3691861/2023-03-21-505-Episode-102-converted.mp3" length="6628741" type="audio/mpeg"/><itunes:duration>09:12</itunes:duration><itunes:explicit>false</itunes:explicit><itunes:episodeType>full</itunes:episodeType><itunes:season>1</itunes:season><itunes:episode>102</itunes:episode><itunes:season>1</itunes:season><podcast:episode>102</podcast:episode><podcast:season>1</podcast:season><itunes:author>Contributors from Around the World</itunes:author></item><item><title>Episode #101 - It&apos;s 5:05, Monday, March 20, 2023</title><itunes:title>Episode #101 - It&apos;s 5:05, Monday, March 20, 2023</itunes:title><description><![CDATA[<p><strong>Hey, it's 5:05 on Monday, March 20th, 2023.</strong> from Sourced Podcast Network in New York City, this is your host, Pokie Huang. Stories in today's episode come from <strong>Trac Bannon</strong> in Camp Hill, Pennsylvania, <strong>Edwin Kwan</strong> in Sydney, Australia, <strong>Katy Craig</strong> in San Diego, California, <strong>Derek Weeks</strong> in Bethesda, Maryland, and <strong>Marcel Brown</strong> in St. Louis, Missouri.&nbsp;</p><p>Let's get to it.</p><p><br></p><p><strong>Is It Time To Be Worried Yet?&nbsp; OpenAI CEO Says Yes.&nbsp;</strong></p><p><strong>🇺🇸</strong> Tracy (Trac) Bannon, Camp Hill, Pennsylvania</p><p><a href="https://www.theguardian.com/technology/2023/mar/17/openai-sam-altman-artificial-intelligence-warning-gpt4" rel="noopener noreferrer" target="_blank">‘We are a little bit scared’: OpenAI CEO warns of risks of artificial intelligence</a></p><p><br></p><p><strong>Latitude Financial Hit By Cyber Attack</strong></p><p>🇦🇺 Edwin Kwan, Sydney, Australia</p><p><a href="https://www.abc.net.au/news/2023-03-16/latitude-hack-300000-identity-documents-stolen/102104424" rel="noopener noreferrer" target="_blank">​​​​​​​Latitude Financial hit by cyber attack, more than 300,000 identity documents stolen - ABC News</a></p><p><a href="https://www.itnews.com.au/news/latitude-financial-breach-impacts-225000-customers-592152" rel="noopener noreferrer" target="_blank">Latitude Financial breach impacts 225,000 customers - Security - Finance - iTnews</a></p><p><a href="https://www.asx.com.au/asxpdf/20230316/pdf/45mqrr4z1tb693.pdf" rel="noopener noreferrer" target="_blank">ASX Announcement - Cyber Incident</a></p><p><br></p><p><strong>GM Eyes GPT For Future Cars</strong></p><p><strong>🇺🇸</strong> Katy Craig, San Diego, California</p><p><a href="https://www.reuters.com/business/autos-transportation/gm-explores-using-chatgpt-vehicles-2023-03-10/" rel="noopener noreferrer" target="_blank">GM explores using ChatGPT in vehicles | Reuters</a></p><p><a href="https://arstechnica.com/information-technology/2023/03/gm-plans-to-let-you-talk-to-your-car-with-chatgpt-knight-rider-style/" rel="noopener noreferrer" target="_blank">GM plans to let you talk to your car with ChatGPT, Knight Rider-style | Ars Technica</a></p><p><strong>300,000 girl scouts tackle cybersecurity</strong></p><p>🇺🇸 Derek Weeks, Bethesda, Maryland</p><p><a href="https://www.girlscouts.org/en/activities-for-girls/juniors/junior-cybersecurity-basics-badge-activity.html" rel="noopener noreferrer" target="_blank">Junior Cybersecurity Basics Badge Activity | Girl Scouts</a></p><p><a href="https://www.securitymagazine.com/articles/99078-cisa-girl-scouts-joins-forces-to-close-cybersecurity-gender-gap" rel="noopener noreferrer" target="_blank">CISA, Girl Scouts joins forces to close cybersecurity gender gap | Security Magazine</a></p><p><a href="https://www.meritalk.com/articles/cisa-girl-scouts-collaborating-to-bridge-gender-gap-in-cyber/" rel="noopener noreferrer" target="_blank">CISA, Girl Scouts Collaborating to Bridge Gender Gap in Cyber – MeriTalk</a></p><p><br></p><p><strong>This Day In Tech History 03-19 &amp; 03-20</strong></p><p><strong>🇺🇸</strong> Marcel Brown, St. Louis, Missouri</p><p><a href="https://thisdayintechhistory.com/03/19" rel="noopener noreferrer" target="_blank">https://thisdayintechhistory.com/03/19</a></p><p><a href="https://thisdayintechhistory.com/03/20" rel="noopener noreferrer" target="_blank">https://thisdayintechhistory.com/03/20</a></p><p><br></p>]]></description><content:encoded><![CDATA[<p><strong>Hey, it's 5:05 on Monday, March 20th, 2023.</strong> from Sourced Podcast Network in New York City, this is your host, Pokie Huang. Stories in today's episode come from <strong>Trac Bannon</strong> in Camp Hill, Pennsylvania, <strong>Edwin Kwan</strong> in Sydney, Australia, <strong>Katy Craig</strong> in San Diego, California, <strong>Derek Weeks</strong> in Bethesda, Maryland, and <strong>Marcel Brown</strong> in St. Louis, Missouri.&nbsp;</p><p>Let's get to it.</p><p><br></p><p><strong>Is It Time To Be Worried Yet?&nbsp; OpenAI CEO Says Yes.&nbsp;</strong></p><p><strong>🇺🇸</strong> Tracy (Trac) Bannon, Camp Hill, Pennsylvania</p><p><a href="https://www.theguardian.com/technology/2023/mar/17/openai-sam-altman-artificial-intelligence-warning-gpt4" rel="noopener noreferrer" target="_blank">‘We are a little bit scared’: OpenAI CEO warns of risks of artificial intelligence</a></p><p><br></p><p><strong>Latitude Financial Hit By Cyber Attack</strong></p><p>🇦🇺 Edwin Kwan, Sydney, Australia</p><p><a href="https://www.abc.net.au/news/2023-03-16/latitude-hack-300000-identity-documents-stolen/102104424" rel="noopener noreferrer" target="_blank">​​​​​​​Latitude Financial hit by cyber attack, more than 300,000 identity documents stolen - ABC News</a></p><p><a href="https://www.itnews.com.au/news/latitude-financial-breach-impacts-225000-customers-592152" rel="noopener noreferrer" target="_blank">Latitude Financial breach impacts 225,000 customers - Security - Finance - iTnews</a></p><p><a href="https://www.asx.com.au/asxpdf/20230316/pdf/45mqrr4z1tb693.pdf" rel="noopener noreferrer" target="_blank">ASX Announcement - Cyber Incident</a></p><p><br></p><p><strong>GM Eyes GPT For Future Cars</strong></p><p><strong>🇺🇸</strong> Katy Craig, San Diego, California</p><p><a href="https://www.reuters.com/business/autos-transportation/gm-explores-using-chatgpt-vehicles-2023-03-10/" rel="noopener noreferrer" target="_blank">GM explores using ChatGPT in vehicles | Reuters</a></p><p><a href="https://arstechnica.com/information-technology/2023/03/gm-plans-to-let-you-talk-to-your-car-with-chatgpt-knight-rider-style/" rel="noopener noreferrer" target="_blank">GM plans to let you talk to your car with ChatGPT, Knight Rider-style | Ars Technica</a></p><p><strong>300,000 girl scouts tackle cybersecurity</strong></p><p>🇺🇸 Derek Weeks, Bethesda, Maryland</p><p><a href="https://www.girlscouts.org/en/activities-for-girls/juniors/junior-cybersecurity-basics-badge-activity.html" rel="noopener noreferrer" target="_blank">Junior Cybersecurity Basics Badge Activity | Girl Scouts</a></p><p><a href="https://www.securitymagazine.com/articles/99078-cisa-girl-scouts-joins-forces-to-close-cybersecurity-gender-gap" rel="noopener noreferrer" target="_blank">CISA, Girl Scouts joins forces to close cybersecurity gender gap | Security Magazine</a></p><p><a href="https://www.meritalk.com/articles/cisa-girl-scouts-collaborating-to-bridge-gender-gap-in-cyber/" rel="noopener noreferrer" target="_blank">CISA, Girl Scouts Collaborating to Bridge Gender Gap in Cyber – MeriTalk</a></p><p><br></p><p><strong>This Day In Tech History 03-19 &amp; 03-20</strong></p><p><strong>🇺🇸</strong> Marcel Brown, St. Louis, Missouri</p><p><a href="https://thisdayintechhistory.com/03/19" rel="noopener noreferrer" target="_blank">https://thisdayintechhistory.com/03/19</a></p><p><a href="https://thisdayintechhistory.com/03/20" rel="noopener noreferrer" target="_blank">https://thisdayintechhistory.com/03/20</a></p><p><br></p>]]></content:encoded><link><![CDATA[https://3zozb9fxlbueipjyapmaas.captivate.fm/episode/episode-101-its-5-05-monday-march-20-2023]]></link><guid isPermaLink="false">1003cbdd-9a55-4ca0-83fd-cd4e0d739254</guid><itunes:image href="https://artwork.captivate.fm/62de13e4-ce42-4cae-940e-f8cdc752933d/QSjyqCfA5ZCtfXYIJDSofDJL.png"/><dc:creator><![CDATA[Contributors from Around the World]]></dc:creator><pubDate>Mon, 20 Mar 2023 16:45:00 -0400</pubDate><enclosure url="https://dts.podtrac.com/redirect.mp3/podcasts.captivate.fm/media/c8df692c-ae1a-4f80-8a03-08e2998d10a6/2023-03-20-505-Episode-101-converted.mp3" length="9266900" type="audio/mpeg"/><itunes:duration>12:52</itunes:duration><itunes:explicit>false</itunes:explicit><itunes:episodeType>full</itunes:episodeType><itunes:season>1</itunes:season><itunes:episode>101</itunes:episode><itunes:season>1</itunes:season><podcast:episode>101</podcast:episode><podcast:season>1</podcast:season><itunes:author>Contributors from Around the World</itunes:author></item><item><title>Episode #100 - It&apos;s 5:05, Friday, March 17, 2023</title><itunes:title>Episode #100 - It&apos;s 5:05, Friday, March 17, 2023</itunes:title><description><![CDATA[<p><strong>Hey! It's 5:05 on Friday, March 17th, 2023.</strong> From the Sourced Podcast Network in New York City, this is your host, Pokie Huang. Stories in today's episode come from <strong>Edwin Kwan</strong> in Sydney, Australia, <strong>Katy Craig </strong>in San Diego, California, <strong>DJ Schleen</strong> in Golden, Colorado, <strong>Trac Bannon </strong>in Camp Hill, Pennsylvania, <strong>Olimpiu Pop </strong>in Transylvania, Romania and <strong>Marcel Brown</strong> in St. Louis, Missouri.&nbsp;</p><p>Let's get to it.</p><p><strong>Beware of Silicon Valley Bank Related Scams</strong></p><p>🇦🇺 Edwin Kwan, Sydney, Australia</p><p><a href="https://isc.sans.edu/diary/rss/29630" rel="noopener noreferrer" target="_blank">Incoming Silicon Valley Bank Related Scams</a></p><p><strong>New Cyber Kill Chain</strong></p><p><strong>🇺🇸</strong> Katy Craig, San Diego, California</p><p><a href="https://carnegieendowment.org/files/202303-Nimmo_Hutchins_Online_Ops.pdf" rel="noopener noreferrer" target="_blank">Phase-based Tactical Analysis of Online Operations</a></p><p><strong>So I Tried To Use AI To Summarize An Article The Other Day…</strong></p><p><strong>🇺🇸</strong> DJ Schleen, Golden, Colorado</p><p><a href="https://www.securityweek.com/chatgpt-and-the-growing-threat-of-bring-your-own-ai-to-the-soc/" rel="noopener noreferrer" target="_blank">ChatGPT and the Growing Threat of Bring Your Own AI to the SOC - SecurityWeek</a></p><p><br></p><p><strong>The Risky Lure Of A Wicked Good Conversationalist: ChatGPT&nbsp;</strong></p><p><strong>🇺🇸</strong> Tracy (Trac) Bannon, Camp Hill, Pennsylvania</p><p><a href="https://www.bleepingcomputer.com/news/security/chatgpt-may-be-a-bigger-cybersecurity-risk-than-an-actual-benefit/" rel="noopener noreferrer" target="_blank">ChatGPT may be a bigger cybersecurity risk than an actual benefit</a></p><p><a href="https://arstechnica.com/information-technology/2023/02/chatgpt-is-a-data-privacy-nightmare-and-you-ought-to-be-concerned/" rel="noopener noreferrer" target="_blank">ChatGPT is a data privacy nightmare, and we ought to be concerned | Ars Technica</a></p><p><a href="https://research.checkpoint.com/2022/opwnai-ai-that-can-save-the-day-or-hack-it-away/" rel="noopener noreferrer" target="_blank">OpwnAI: AI That Can Save the Day or HACK it Away - Check Point Research</a></p><p><br></p><p><strong>Russian Cyber Army Regroups For New Cyberwar: Based On A Microsoft Threat Intelligence Report</strong></p><p><strong>🇷🇴 </strong>Olimpiu Pop, Transylvania, Romania</p><p><a href="https://en.wikipedia.org/wiki/Revolutions_of_1848" rel="noopener noreferrer" target="_blank">Revolutions of 1848 - Wikipedia</a></p><p><a href="https://blogs.microsoft.com/on-the-issues/2023/03/15/russia-ukraine-cyberwarfare-threat-intelligence-center/" rel="noopener noreferrer" target="_blank">Is Russia regrouping for renewed cyberwar? - Microsoft On the Issues</a></p><p><a href="https://www.microsoft.com/en-us/security/business/security-insider/wp-content/uploads/2023/03/A-year-of-Russian-hybrid-warfare-in-Ukraine_MS-Threat-Intelligence-1.pdf" rel="noopener noreferrer" target="_blank">A year of Russian hybrid warfare in Ukraine</a></p><p><br></p><p><strong>This Day In Tech History 03-17 &amp; 03-18</strong></p><p><strong>🇺🇸</strong> Marcel Brown, St. Louis, Missouri</p><p><a href="https://thisdayintechhistory.com/03/17" rel="noopener noreferrer" target="_blank">https://thisdayintechhistory.com/03/17</a></p><p><a href="https://thisdayintechhistory.com/03/18" rel="noopener noreferrer" target="_blank">https://thisdayintechhistory.com/03/18</a></p>]]></description><content:encoded><![CDATA[<p><strong>Hey! It's 5:05 on Friday, March 17th, 2023.</strong> From the Sourced Podcast Network in New York City, this is your host, Pokie Huang. Stories in today's episode come from <strong>Edwin Kwan</strong> in Sydney, Australia, <strong>Katy Craig </strong>in San Diego, California, <strong>DJ Schleen</strong> in Golden, Colorado, <strong>Trac Bannon </strong>in Camp Hill, Pennsylvania, <strong>Olimpiu Pop </strong>in Transylvania, Romania and <strong>Marcel Brown</strong> in St. Louis, Missouri.&nbsp;</p><p>Let's get to it.</p><p><strong>Beware of Silicon Valley Bank Related Scams</strong></p><p>🇦🇺 Edwin Kwan, Sydney, Australia</p><p><a href="https://isc.sans.edu/diary/rss/29630" rel="noopener noreferrer" target="_blank">Incoming Silicon Valley Bank Related Scams</a></p><p><strong>New Cyber Kill Chain</strong></p><p><strong>🇺🇸</strong> Katy Craig, San Diego, California</p><p><a href="https://carnegieendowment.org/files/202303-Nimmo_Hutchins_Online_Ops.pdf" rel="noopener noreferrer" target="_blank">Phase-based Tactical Analysis of Online Operations</a></p><p><strong>So I Tried To Use AI To Summarize An Article The Other Day…</strong></p><p><strong>🇺🇸</strong> DJ Schleen, Golden, Colorado</p><p><a href="https://www.securityweek.com/chatgpt-and-the-growing-threat-of-bring-your-own-ai-to-the-soc/" rel="noopener noreferrer" target="_blank">ChatGPT and the Growing Threat of Bring Your Own AI to the SOC - SecurityWeek</a></p><p><br></p><p><strong>The Risky Lure Of A Wicked Good Conversationalist: ChatGPT&nbsp;</strong></p><p><strong>🇺🇸</strong> Tracy (Trac) Bannon, Camp Hill, Pennsylvania</p><p><a href="https://www.bleepingcomputer.com/news/security/chatgpt-may-be-a-bigger-cybersecurity-risk-than-an-actual-benefit/" rel="noopener noreferrer" target="_blank">ChatGPT may be a bigger cybersecurity risk than an actual benefit</a></p><p><a href="https://arstechnica.com/information-technology/2023/02/chatgpt-is-a-data-privacy-nightmare-and-you-ought-to-be-concerned/" rel="noopener noreferrer" target="_blank">ChatGPT is a data privacy nightmare, and we ought to be concerned | Ars Technica</a></p><p><a href="https://research.checkpoint.com/2022/opwnai-ai-that-can-save-the-day-or-hack-it-away/" rel="noopener noreferrer" target="_blank">OpwnAI: AI That Can Save the Day or HACK it Away - Check Point Research</a></p><p><br></p><p><strong>Russian Cyber Army Regroups For New Cyberwar: Based On A Microsoft Threat Intelligence Report</strong></p><p><strong>🇷🇴 </strong>Olimpiu Pop, Transylvania, Romania</p><p><a href="https://en.wikipedia.org/wiki/Revolutions_of_1848" rel="noopener noreferrer" target="_blank">Revolutions of 1848 - Wikipedia</a></p><p><a href="https://blogs.microsoft.com/on-the-issues/2023/03/15/russia-ukraine-cyberwarfare-threat-intelligence-center/" rel="noopener noreferrer" target="_blank">Is Russia regrouping for renewed cyberwar? - Microsoft On the Issues</a></p><p><a href="https://www.microsoft.com/en-us/security/business/security-insider/wp-content/uploads/2023/03/A-year-of-Russian-hybrid-warfare-in-Ukraine_MS-Threat-Intelligence-1.pdf" rel="noopener noreferrer" target="_blank">A year of Russian hybrid warfare in Ukraine</a></p><p><br></p><p><strong>This Day In Tech History 03-17 &amp; 03-18</strong></p><p><strong>🇺🇸</strong> Marcel Brown, St. Louis, Missouri</p><p><a href="https://thisdayintechhistory.com/03/17" rel="noopener noreferrer" target="_blank">https://thisdayintechhistory.com/03/17</a></p><p><a href="https://thisdayintechhistory.com/03/18" rel="noopener noreferrer" target="_blank">https://thisdayintechhistory.com/03/18</a></p>]]></content:encoded><link><![CDATA[https://3zozb9fxlbueipjyapmaas.captivate.fm/episode/episode-100-its-5-05-friday-march-17-2023]]></link><guid isPermaLink="false">3f08191a-ce02-40bb-81a5-46a46640e58d</guid><itunes:image href="https://artwork.captivate.fm/6b6d902b-13b5-403c-b06b-23a4ea3bd433/GUsT1ds_BrX1wi5j1LbjbhcK.png"/><dc:creator><![CDATA[Contributors from Around the World]]></dc:creator><pubDate>Fri, 17 Mar 2023 16:45:00 -0400</pubDate><enclosure url="https://dts.podtrac.com/redirect.mp3/podcasts.captivate.fm/media/bf71868c-e251-4a17-a640-b4fc7c4e6082/2023-03-17-505-Episode-100-converted.mp3" length="13799040" type="audio/mpeg"/><itunes:duration>19:10</itunes:duration><itunes:explicit>false</itunes:explicit><itunes:episodeType>full</itunes:episodeType><itunes:season>1</itunes:season><itunes:episode>100</itunes:episode><itunes:season>1</itunes:season><podcast:episode>100</podcast:episode><podcast:season>1</podcast:season><itunes:author>Contributors from Around the World</itunes:author></item><item><title>Episode #99 - It&apos;s 5:05, Thursday, March 16, 2023</title><itunes:title>Episode #99 - It&apos;s 5:05, Thursday, March 16, 2023</itunes:title><description><![CDATA[<p><strong>Hey! It's 5:05 on Thursday, March 16th, 2023.</strong> From the Sourced Podcast Network in New York City, this is your host, Pokie Huang. Stories in today's episode come from <strong>Edwin Kwan</strong> in Sydney, Australia, <strong>Kadi Grigg </strong>in Alexandria, Virginia, <strong>Katy Craig </strong>in San Diego, California, <strong>Mark Miller </strong>in Boca Raton, Florida, and <strong>Marcel Brown</strong> in St. Louis, Missouri.&nbsp;</p><p>Let's get to it.</p><p><strong><span class="ql-cursor">﻿</span>Ring Camera Breached by Ransomware Group</strong></p><p>🇦🇺 Edwin Kwan, Sydney, Australia</p><p><a href="https://www.vice.com/en/article/qjvd9q/ransomware-group-claims-hack-of-amazons-ring" rel="noopener noreferrer" target="_blank">Ransomware Group Claims Hack of Amazon's Ring</a></p><p><br></p><p><strong>Girl Scouts and CISA taking on the Gender Gap in Cybersecurity</strong></p><p><strong>🇺🇸</strong> Kadi Grigg, Alexandria, Virginia</p><p><a href="https://www.cisa.gov/news-events/news/cisa-and-girl-scouts-usa-strengthen-collaboration-bring-more-young-women-cybersecurity" rel="noopener noreferrer" target="_blank">CISA and Girl Scouts of the USA Strengthen Collaboration to Bring More Young Women into Cybersecurity</a>&nbsp;</p><p><a href="https://www.meritalk.com/articles/cisa-girl-scouts-collaborating-to-bridge-gender-gap-in-cyber/" rel="noopener noreferrer" target="_blank">CISA, Girl Scouts Collaborating to Bridge Gender Gap in Cyber – MeriTalk</a>&nbsp;</p><p><a href="https://www.girlscouts.org/en/activities-for-girls/for-every-girl/cyber-awareness.html" rel="noopener noreferrer" target="_blank">Cyber Awareness | Girl Scouts</a>&nbsp;</p><p><a href="https://cybersecurityventures.com/women-in-cybersecurity-report-2022/" rel="noopener noreferrer" target="_blank">Women Hold 25 Percent Of Cybersecurity Jobs Globally In 2022</a>&nbsp;</p><p><br></p><p><strong>ChatGPT 4: Learn or Die</strong></p><p><strong>🇺🇸</strong> Katy Craig, San Diego, California</p><p><a href="https://openai.com/product/gpt-4" rel="noopener noreferrer" target="_blank">GPT-4</a></p><p><br></p><p><strong>OSPOs</strong></p><p><strong>🇺🇸</strong> Mark Miller, New York City</p><p><br></p><p><strong>This Day In Tech History 03-16</strong></p><p><strong>🇺🇸</strong> Marcel Brown, St. Louis, Missouri</p><p><a href="https://thisdayintechhistory.com/03/16" rel="noopener noreferrer" target="_blank">https://thisdayintechhistory.com/03/16</a></p>]]></description><content:encoded><![CDATA[<p><strong>Hey! It's 5:05 on Thursday, March 16th, 2023.</strong> From the Sourced Podcast Network in New York City, this is your host, Pokie Huang. Stories in today's episode come from <strong>Edwin Kwan</strong> in Sydney, Australia, <strong>Kadi Grigg </strong>in Alexandria, Virginia, <strong>Katy Craig </strong>in San Diego, California, <strong>Mark Miller </strong>in Boca Raton, Florida, and <strong>Marcel Brown</strong> in St. Louis, Missouri.&nbsp;</p><p>Let's get to it.</p><p><strong><span class="ql-cursor">﻿</span>Ring Camera Breached by Ransomware Group</strong></p><p>🇦🇺 Edwin Kwan, Sydney, Australia</p><p><a href="https://www.vice.com/en/article/qjvd9q/ransomware-group-claims-hack-of-amazons-ring" rel="noopener noreferrer" target="_blank">Ransomware Group Claims Hack of Amazon's Ring</a></p><p><br></p><p><strong>Girl Scouts and CISA taking on the Gender Gap in Cybersecurity</strong></p><p><strong>🇺🇸</strong> Kadi Grigg, Alexandria, Virginia</p><p><a href="https://www.cisa.gov/news-events/news/cisa-and-girl-scouts-usa-strengthen-collaboration-bring-more-young-women-cybersecurity" rel="noopener noreferrer" target="_blank">CISA and Girl Scouts of the USA Strengthen Collaboration to Bring More Young Women into Cybersecurity</a>&nbsp;</p><p><a href="https://www.meritalk.com/articles/cisa-girl-scouts-collaborating-to-bridge-gender-gap-in-cyber/" rel="noopener noreferrer" target="_blank">CISA, Girl Scouts Collaborating to Bridge Gender Gap in Cyber – MeriTalk</a>&nbsp;</p><p><a href="https://www.girlscouts.org/en/activities-for-girls/for-every-girl/cyber-awareness.html" rel="noopener noreferrer" target="_blank">Cyber Awareness | Girl Scouts</a>&nbsp;</p><p><a href="https://cybersecurityventures.com/women-in-cybersecurity-report-2022/" rel="noopener noreferrer" target="_blank">Women Hold 25 Percent Of Cybersecurity Jobs Globally In 2022</a>&nbsp;</p><p><br></p><p><strong>ChatGPT 4: Learn or Die</strong></p><p><strong>🇺🇸</strong> Katy Craig, San Diego, California</p><p><a href="https://openai.com/product/gpt-4" rel="noopener noreferrer" target="_blank">GPT-4</a></p><p><br></p><p><strong>OSPOs</strong></p><p><strong>🇺🇸</strong> Mark Miller, New York City</p><p><br></p><p><strong>This Day In Tech History 03-16</strong></p><p><strong>🇺🇸</strong> Marcel Brown, St. Louis, Missouri</p><p><a href="https://thisdayintechhistory.com/03/16" rel="noopener noreferrer" target="_blank">https://thisdayintechhistory.com/03/16</a></p>]]></content:encoded><link><![CDATA[https://3zozb9fxlbueipjyapmaas.captivate.fm/episode/episode-99-its-5-05-thursday-march-16-2023]]></link><guid isPermaLink="false">fac2a9dd-f426-4a44-8080-4ea4d2d994b1</guid><itunes:image href="https://artwork.captivate.fm/c690a2f8-f38e-4876-a17b-6e027f7971f6/Cm_uTZg_Y7p-djRXyCJfe-As.png"/><dc:creator><![CDATA[Contributors from Around the World]]></dc:creator><pubDate>Thu, 16 Mar 2023 16:45:00 -0400</pubDate><enclosure url="https://dts.podtrac.com/redirect.mp3/podcasts.captivate.fm/media/90c4f697-1203-4b23-8117-09dce7126345/2023-03-16-505-Episode-99-converted.mp3" length="8438086" type="audio/mpeg"/><itunes:duration>11:43</itunes:duration><itunes:explicit>false</itunes:explicit><itunes:episodeType>full</itunes:episodeType><itunes:season>1</itunes:season><itunes:episode>99</itunes:episode><itunes:season>1</itunes:season><podcast:episode>99</podcast:episode><podcast:season>1</podcast:season><itunes:author>Contributors from Around the World</itunes:author></item><item><title>Episode #98 - It&apos;s 5:05, Wednesday, March 15, 2023</title><itunes:title>Episode #98 - It&apos;s 5:05, Wednesday, March 15, 2023</itunes:title><description><![CDATA[<p><strong>Hey, it's 5:05 on Wednesday, March 15th, 2023.</strong> From The Source Podcast Network in New York City, this is your host, Pokie Huang. Stories in today's episode come from <strong>Edwin Kwan</strong> in Sydney, Australia, <strong>Katy Craig</strong> in San Diego, California, <strong>Olimpiu Pop</strong> in Transylvania, Romania, <strong>Ian Garrett</strong> in Arlington, Virginia, and <strong>Marcel Brown</strong> in St. Louis, Missouri.</p><p>Let's get to it.</p><p><br></p><p><strong>Patch Your FireFox Browser</strong></p><p>🇦🇺 Edwin Kwan, Sydney, Australia</p><p><a href="https://www.cisecurity.org/advisory/multiple-vulnerabilities-in-mozilla-firefox-could-allow-for-arbitrary-code-execution_2023-029" rel="noopener noreferrer" target="_blank">Multiple Vulnerabilities in Mozilla Firefox Could Allow for Arbitrary Code Execution</a></p><p><a href="https://www.mozilla.org/en-US/security/advisories/mfsa2023-09/" rel="noopener noreferrer" target="_blank">Security Vulnerabilities fixed in Firefox 111 — Mozilla</a></p><p><a href="https://www.mozilla.org/en-US/security/advisories/mfsa2023-10/" rel="noopener noreferrer" target="_blank">Security Vulnerabilities fixed in Firefox ESR 102.9 — Mozilla</a></p><p><br></p><p><strong>Introducing Chat GPT4</strong></p><p><strong>🇺🇸</strong> Katy Craig, San Diego, California</p><p><a href="https://openai.com/product/gpt-4" rel="noopener noreferrer" target="_blank">GPT-4</a></p><p><br></p><p><strong>After a Decade of Red, Kali Linux Adds Purple to Their Portfolio</strong></p><p><strong>🇷🇴 </strong>Olimpiu Pop, Transylvania, Romania</p><p><a href="https://www.bleepingcomputer.com/news/security/kali-linux-20231-introduces-purple-distro-for-defensive-security/" rel="noopener noreferrer" target="_blank">Kali Linux 2023.1 introduces 'Purple' distro for defensive security</a></p><p><a href="https://gitlab.com/kalilinux/kali-purple/documentation/-/wikis/home" rel="noopener noreferrer" target="_blank">Home · Wiki · Kali Linux / kali-purple / Documentation · GitLab</a></p><p><a href="https://www.kali.org/blog/kali-linux-2023-1-release/" rel="noopener noreferrer" target="_blank">Kali Linux 2023.1 Release (Kali Purple &amp; Python Changes)</a></p><p><br></p><p><strong>The Rise of Cybercrime After the Fall of Silicon Valley Bank</strong></p><p><strong>🇺🇸 </strong>Ian Garrett, Arlington, Virginia</p><p><a href="https://cybernews.com/news/svb-collapse-cyber-attacks-phishing-data/" rel="noopener noreferrer" target="_blank">Cyber crooks jump on SVB collapse to loot client money and data | Cybernews</a></p><p><a href="https://www.privatefundscfo.com/svb-collapse-presents-cyber-attackers-with-a-wealth-of-opportunities/" rel="noopener noreferrer" target="_blank">SVB collapse presents cyber-attackers with a wealth of opportunities</a></p><p><br></p><p><strong>This Day In Tech History 03-15</strong></p><p><strong>🇺🇸</strong> Marcel Brown, St. Louis, Missouri</p><p><a href="https://thisdayintechhistory.com//03/15" rel="noopener noreferrer" target="_blank">https://thisdayintechhistory.com/03/15</a></p>]]></description><content:encoded><![CDATA[<p><strong>Hey, it's 5:05 on Wednesday, March 15th, 2023.</strong> From The Source Podcast Network in New York City, this is your host, Pokie Huang. Stories in today's episode come from <strong>Edwin Kwan</strong> in Sydney, Australia, <strong>Katy Craig</strong> in San Diego, California, <strong>Olimpiu Pop</strong> in Transylvania, Romania, <strong>Ian Garrett</strong> in Arlington, Virginia, and <strong>Marcel Brown</strong> in St. Louis, Missouri.</p><p>Let's get to it.</p><p><br></p><p><strong>Patch Your FireFox Browser</strong></p><p>🇦🇺 Edwin Kwan, Sydney, Australia</p><p><a href="https://www.cisecurity.org/advisory/multiple-vulnerabilities-in-mozilla-firefox-could-allow-for-arbitrary-code-execution_2023-029" rel="noopener noreferrer" target="_blank">Multiple Vulnerabilities in Mozilla Firefox Could Allow for Arbitrary Code Execution</a></p><p><a href="https://www.mozilla.org/en-US/security/advisories/mfsa2023-09/" rel="noopener noreferrer" target="_blank">Security Vulnerabilities fixed in Firefox 111 — Mozilla</a></p><p><a href="https://www.mozilla.org/en-US/security/advisories/mfsa2023-10/" rel="noopener noreferrer" target="_blank">Security Vulnerabilities fixed in Firefox ESR 102.9 — Mozilla</a></p><p><br></p><p><strong>Introducing Chat GPT4</strong></p><p><strong>🇺🇸</strong> Katy Craig, San Diego, California</p><p><a href="https://openai.com/product/gpt-4" rel="noopener noreferrer" target="_blank">GPT-4</a></p><p><br></p><p><strong>After a Decade of Red, Kali Linux Adds Purple to Their Portfolio</strong></p><p><strong>🇷🇴 </strong>Olimpiu Pop, Transylvania, Romania</p><p><a href="https://www.bleepingcomputer.com/news/security/kali-linux-20231-introduces-purple-distro-for-defensive-security/" rel="noopener noreferrer" target="_blank">Kali Linux 2023.1 introduces 'Purple' distro for defensive security</a></p><p><a href="https://gitlab.com/kalilinux/kali-purple/documentation/-/wikis/home" rel="noopener noreferrer" target="_blank">Home · Wiki · Kali Linux / kali-purple / Documentation · GitLab</a></p><p><a href="https://www.kali.org/blog/kali-linux-2023-1-release/" rel="noopener noreferrer" target="_blank">Kali Linux 2023.1 Release (Kali Purple &amp; Python Changes)</a></p><p><br></p><p><strong>The Rise of Cybercrime After the Fall of Silicon Valley Bank</strong></p><p><strong>🇺🇸 </strong>Ian Garrett, Arlington, Virginia</p><p><a href="https://cybernews.com/news/svb-collapse-cyber-attacks-phishing-data/" rel="noopener noreferrer" target="_blank">Cyber crooks jump on SVB collapse to loot client money and data | Cybernews</a></p><p><a href="https://www.privatefundscfo.com/svb-collapse-presents-cyber-attackers-with-a-wealth-of-opportunities/" rel="noopener noreferrer" target="_blank">SVB collapse presents cyber-attackers with a wealth of opportunities</a></p><p><br></p><p><strong>This Day In Tech History 03-15</strong></p><p><strong>🇺🇸</strong> Marcel Brown, St. Louis, Missouri</p><p><a href="https://thisdayintechhistory.com//03/15" rel="noopener noreferrer" target="_blank">https://thisdayintechhistory.com/03/15</a></p>]]></content:encoded><link><![CDATA[https://3zozb9fxlbueipjyapmaas.captivate.fm/episode/episode-98-its-5-05-wednesday-march-15-2023]]></link><guid isPermaLink="false">eae82596-aa48-4ff1-8df4-e711eb661b43</guid><itunes:image href="https://artwork.captivate.fm/d5c8da52-31dd-4feb-92dc-608065a2ba33/vFnwVhFrVNPMAKC3vowGJ0j-.png"/><dc:creator><![CDATA[Contributors from Around the World]]></dc:creator><pubDate>Wed, 15 Mar 2023 16:45:00 -0400</pubDate><enclosure url="https://dts.podtrac.com/redirect.mp3/podcasts.captivate.fm/media/fc9a2712-c723-4b3f-ab4d-c05cee578e7b/2023-03-15-505-Episode-98-converted.mp3" length="7014621" type="audio/mpeg"/><itunes:duration>09:45</itunes:duration><itunes:explicit>false</itunes:explicit><itunes:episodeType>full</itunes:episodeType><itunes:season>1</itunes:season><itunes:episode>98</itunes:episode><itunes:season>1</itunes:season><podcast:episode>98</podcast:episode><podcast:season>1</podcast:season><itunes:author>Contributors from Around the World</itunes:author></item><item><title>Episode #97 - It&apos;s 5:05, Tuesday, March 14, 2023</title><itunes:title>Episode #97 - It&apos;s 5:05, Tuesday, March 14, 2023</itunes:title><description><![CDATA[<p><strong>Hey! It's 5:05 on Tuesday, March 14th, 2023.</strong> From the Sourced Podcast Network in New York City, this is your host, Pokie Huang. Stories in today's episode come from <strong>Derek Weeks </strong>in Bethesda, Maryland, <strong>Edwin Kwan</strong> in Sydney, Australia, <strong>Katy Craig </strong>in San Diego, California, <strong>Olimpiu Pop </strong>in Transylvania, Romania and <strong>Marcel Brown</strong> in St. Louis, Missouri.&nbsp;</p><p>Let's get to it.</p><p><strong>Is the cloud too big to fail?</strong></p><p><strong>🇺🇸</strong> Derek Weeks, Bethesda, Maryland</p><p><a href="https://www.politico.com/news/2023/03/10/white-house-cloud-overhaul-00086595" rel="noopener noreferrer" target="_blank">Biden admin’s cloud security problem: ‘It could take down the internet like a stack of dominos’ - POLITICO</a></p><p><strong>GitHub Rolling Out Mandatory 2FA from This Week</strong></p><p>🇦🇺 Edwin Kwan, Sydney, Australia</p><p><a href="https://www.bleepingcomputer.com/news/security/github-makes-2fa-mandatory-next-week-for-active-developers/" rel="noopener noreferrer" target="_blank">GitHub makes 2FA mandatory next week for active developers</a></p><p><br></p><p><strong>Dating app for GenZ</strong></p><p><strong>🇺🇸</strong> Katy Craig, San Diego, California</p><p><a href="https://www.distractify.com/p/how-does-snack-dating-app-work" rel="noopener noreferrer" target="_blank">Gen Z Is Obsessed With New Dating App Snack, Which Is Basically a Tinder and TikTok Hybrid</a></p><p><a href="https://www.fastcompany.com/90863241/snack-gen-z-dating-ap-ai-avatars-date-for-you?utm_source=newsletters&amp;utm_medium=email&amp;utm_campaign=FC%20-%20Compass%20Newsletter.Newsletter%20-%20FC%20-%20Compass%203-10-23&amp;leadId=5386521&amp;mkt_tok=NjEwLUxFRS04NzIAAAGKaoyRYgPGS3e6qs5libCWJgKEPT6CtY4tzPW102nNEDSnk7WE7petHpu8XEygYaPGbywyTo3DtwIP-vBGzEqz0x4IsZdCr0oI-DhQyZNU" rel="noopener noreferrer" target="_blank">Gen Z dating app Snack lets your AI-trained avatar go on dates so you don’t have to</a></p><p><br></p><p>Quarkus Java Cloud Native Pioneer Reaches 3rd Milestone</p><p><strong>🇷🇴 </strong>Olimpiu Pop, Transylvania, Romania</p><p><a href="https://www.cvedetails.com/vulnerability-list/vendor_id-21608/product_id-66014/Quarkus-Quarkus.html" rel="noopener noreferrer" target="_blank">Quarkus Quarkus : List of security vulnerabilities</a></p><p><a href="https://www.infoq.com/news/2023/03/quarkus-3-DX" rel="noopener noreferrer" target="_blank">Road to Quarkus 3: Improved Dev UI, Steps Towards Diataxis Documentation and Performance Bumps</a></p><p><a href="https://www.infoq.com/news/2023/03/road-quarkus-3" rel="noopener noreferrer" target="_blank">Road to Quarkus 3: Bets on the Flow API for Mutiny 2.0, Updates to Jakarta Namespace and More</a></p><p><br></p><p><strong>This Day In Tech History 03-14</strong></p><p><strong>🇺🇸</strong> Marcel Brown, St. Louis, Missouri</p><p><a href="https://thisdayintechhistory.com/03/14/" rel="noopener noreferrer" target="_blank">https://thisdayintechhistory.com/03/14/</a></p>]]></description><content:encoded><![CDATA[<p><strong>Hey! It's 5:05 on Tuesday, March 14th, 2023.</strong> From the Sourced Podcast Network in New York City, this is your host, Pokie Huang. Stories in today's episode come from <strong>Derek Weeks </strong>in Bethesda, Maryland, <strong>Edwin Kwan</strong> in Sydney, Australia, <strong>Katy Craig </strong>in San Diego, California, <strong>Olimpiu Pop </strong>in Transylvania, Romania and <strong>Marcel Brown</strong> in St. Louis, Missouri.&nbsp;</p><p>Let's get to it.</p><p><strong>Is the cloud too big to fail?</strong></p><p><strong>🇺🇸</strong> Derek Weeks, Bethesda, Maryland</p><p><a href="https://www.politico.com/news/2023/03/10/white-house-cloud-overhaul-00086595" rel="noopener noreferrer" target="_blank">Biden admin’s cloud security problem: ‘It could take down the internet like a stack of dominos’ - POLITICO</a></p><p><strong>GitHub Rolling Out Mandatory 2FA from This Week</strong></p><p>🇦🇺 Edwin Kwan, Sydney, Australia</p><p><a href="https://www.bleepingcomputer.com/news/security/github-makes-2fa-mandatory-next-week-for-active-developers/" rel="noopener noreferrer" target="_blank">GitHub makes 2FA mandatory next week for active developers</a></p><p><br></p><p><strong>Dating app for GenZ</strong></p><p><strong>🇺🇸</strong> Katy Craig, San Diego, California</p><p><a href="https://www.distractify.com/p/how-does-snack-dating-app-work" rel="noopener noreferrer" target="_blank">Gen Z Is Obsessed With New Dating App Snack, Which Is Basically a Tinder and TikTok Hybrid</a></p><p><a href="https://www.fastcompany.com/90863241/snack-gen-z-dating-ap-ai-avatars-date-for-you?utm_source=newsletters&amp;utm_medium=email&amp;utm_campaign=FC%20-%20Compass%20Newsletter.Newsletter%20-%20FC%20-%20Compass%203-10-23&amp;leadId=5386521&amp;mkt_tok=NjEwLUxFRS04NzIAAAGKaoyRYgPGS3e6qs5libCWJgKEPT6CtY4tzPW102nNEDSnk7WE7petHpu8XEygYaPGbywyTo3DtwIP-vBGzEqz0x4IsZdCr0oI-DhQyZNU" rel="noopener noreferrer" target="_blank">Gen Z dating app Snack lets your AI-trained avatar go on dates so you don’t have to</a></p><p><br></p><p>Quarkus Java Cloud Native Pioneer Reaches 3rd Milestone</p><p><strong>🇷🇴 </strong>Olimpiu Pop, Transylvania, Romania</p><p><a href="https://www.cvedetails.com/vulnerability-list/vendor_id-21608/product_id-66014/Quarkus-Quarkus.html" rel="noopener noreferrer" target="_blank">Quarkus Quarkus : List of security vulnerabilities</a></p><p><a href="https://www.infoq.com/news/2023/03/quarkus-3-DX" rel="noopener noreferrer" target="_blank">Road to Quarkus 3: Improved Dev UI, Steps Towards Diataxis Documentation and Performance Bumps</a></p><p><a href="https://www.infoq.com/news/2023/03/road-quarkus-3" rel="noopener noreferrer" target="_blank">Road to Quarkus 3: Bets on the Flow API for Mutiny 2.0, Updates to Jakarta Namespace and More</a></p><p><br></p><p><strong>This Day In Tech History 03-14</strong></p><p><strong>🇺🇸</strong> Marcel Brown, St. Louis, Missouri</p><p><a href="https://thisdayintechhistory.com/03/14/" rel="noopener noreferrer" target="_blank">https://thisdayintechhistory.com/03/14/</a></p>]]></content:encoded><link><![CDATA[https://3zozb9fxlbueipjyapmaas.captivate.fm/episode/episode-97-its-5-05-tuesday-march-14-2023]]></link><guid isPermaLink="false">36e36983-605d-4920-9063-93bf09e42655</guid><itunes:image href="https://artwork.captivate.fm/8af2929b-4878-4eb7-be81-c6de1973bbbd/KEPkrXB_K9UDBzJdDj-HHO7q.png"/><dc:creator><![CDATA[Contributors from Around the World]]></dc:creator><pubDate>Tue, 14 Mar 2023 16:45:00 -0400</pubDate><enclosure url="https://dts.podtrac.com/redirect.mp3/podcasts.captivate.fm/media/dbb81bcd-10f5-4ab7-ab0b-56e25d9a6850/2023-03-14-505-Episode-97-converted.mp3" length="7708329" type="audio/mpeg"/><itunes:duration>10:42</itunes:duration><itunes:explicit>false</itunes:explicit><itunes:episodeType>full</itunes:episodeType><itunes:season>1</itunes:season><itunes:episode>97</itunes:episode><itunes:season>1</itunes:season><podcast:episode>97</podcast:episode><podcast:season>1</podcast:season><itunes:author>Contributors from Around the World</itunes:author></item><item><title>Episode #96 - It&apos;s 5:05, Monday, March 13, 2023</title><itunes:title>Episode #96 - It&apos;s 5:05, Monday, March 13, 2023</itunes:title><description><![CDATA[<p><strong>Hey, it's 5:05 on Monday, March 13th, 2023</strong>. From the Sourced Podcast Network in New York City, this is your host, Pokie Huang. Stories in today's episode come from <strong>Edwin Kwan</strong> in Sydney, Australia, <strong>Ian Garrett</strong> in Arlington, Virginia, <strong>Katy Craig</strong> in San Diego, California, <strong>Marcel Brown</strong> in St. Louis, Missouri.</p><p>Let's get to it.</p><p><strong>Brute Force Attacks Against Popular Web Services</strong></p><p>🇦🇺 Edwin Kwan, Sydney, Australia</p><p><a href="https://www.bleepingcomputer.com/news/security/new-gobruteforcer-malware-targets-phpmyadmin-mysql-ftp-postgres/" rel="noopener noreferrer" target="_blank">New GoBruteforcer malware targets phpMyAdmin, MySQL, FTP, Postgres</a></p><p><strong>Voice Banking: Convenience or Risk?</strong></p><p><strong>🇺🇸 </strong>Ian Garrett, Arlington, Virginia</p><p><a href="https://cybernews.com/security/how-ai-voice-cloning-threatens-the-security-of-banking-systems/" rel="noopener noreferrer" target="_blank">How AI voice cloning threatens the security of banking systems | Cybernews</a></p><p><br></p><p><strong>CASPER is not so Friendly</strong></p><p><strong>🇺🇸</strong> Katy Craig, San Diego, California</p><p><a href="https://www.documentcloud.org/documents/23702294-sensors-23-02970?responsive=1&amp;title=1" rel="noopener noreferrer" target="_blank">sensors-23-02970 - DocumentCloud</a></p><p><a href="https://www.bleepingcomputer.com/news/security/casper-attack-steals-data-using-air-gapped-computers-internal-speaker/" rel="noopener noreferrer" target="_blank">CASPER attack steals data using air-gapped computer's internal speaker</a></p><p><br></p><p><strong>This Day In Tech History 03-12 &amp; 03-13</strong></p><p><strong>🇺🇸</strong> Marcel Brown, St. Louis, Missouri</p><p><a href="https://thisdayintechhistory.com/03/12" rel="noopener noreferrer" target="_blank">https://thisdayintechhistory.com/03/12</a></p><p><a href="https://thisdayintechhistory.com/03/13" rel="noopener noreferrer" target="_blank">https://thisdayintechhistory.com/03/13</a></p>]]></description><content:encoded><![CDATA[<p><strong>Hey, it's 5:05 on Monday, March 13th, 2023</strong>. From the Sourced Podcast Network in New York City, this is your host, Pokie Huang. Stories in today's episode come from <strong>Edwin Kwan</strong> in Sydney, Australia, <strong>Ian Garrett</strong> in Arlington, Virginia, <strong>Katy Craig</strong> in San Diego, California, <strong>Marcel Brown</strong> in St. Louis, Missouri.</p><p>Let's get to it.</p><p><strong>Brute Force Attacks Against Popular Web Services</strong></p><p>🇦🇺 Edwin Kwan, Sydney, Australia</p><p><a href="https://www.bleepingcomputer.com/news/security/new-gobruteforcer-malware-targets-phpmyadmin-mysql-ftp-postgres/" rel="noopener noreferrer" target="_blank">New GoBruteforcer malware targets phpMyAdmin, MySQL, FTP, Postgres</a></p><p><strong>Voice Banking: Convenience or Risk?</strong></p><p><strong>🇺🇸 </strong>Ian Garrett, Arlington, Virginia</p><p><a href="https://cybernews.com/security/how-ai-voice-cloning-threatens-the-security-of-banking-systems/" rel="noopener noreferrer" target="_blank">How AI voice cloning threatens the security of banking systems | Cybernews</a></p><p><br></p><p><strong>CASPER is not so Friendly</strong></p><p><strong>🇺🇸</strong> Katy Craig, San Diego, California</p><p><a href="https://www.documentcloud.org/documents/23702294-sensors-23-02970?responsive=1&amp;title=1" rel="noopener noreferrer" target="_blank">sensors-23-02970 - DocumentCloud</a></p><p><a href="https://www.bleepingcomputer.com/news/security/casper-attack-steals-data-using-air-gapped-computers-internal-speaker/" rel="noopener noreferrer" target="_blank">CASPER attack steals data using air-gapped computer's internal speaker</a></p><p><br></p><p><strong>This Day In Tech History 03-12 &amp; 03-13</strong></p><p><strong>🇺🇸</strong> Marcel Brown, St. Louis, Missouri</p><p><a href="https://thisdayintechhistory.com/03/12" rel="noopener noreferrer" target="_blank">https://thisdayintechhistory.com/03/12</a></p><p><a href="https://thisdayintechhistory.com/03/13" rel="noopener noreferrer" target="_blank">https://thisdayintechhistory.com/03/13</a></p>]]></content:encoded><link><![CDATA[https://3zozb9fxlbueipjyapmaas.captivate.fm/episode/episode-96-its-5-05-monday-march-13-2023]]></link><guid isPermaLink="false">8e33a1d9-8082-4929-b589-d928d43ccd5c</guid><itunes:image href="https://artwork.captivate.fm/cc714b49-1bf7-4674-a615-b805f3726f8d/nCEU0pjXgj3fAxCof0byyOfO.png"/><dc:creator><![CDATA[Contributors from Around the World]]></dc:creator><pubDate>Mon, 13 Mar 2023 16:45:00 -0400</pubDate><enclosure url="https://dts.podtrac.com/redirect.mp3/podcasts.captivate.fm/media/b488dd22-5111-4851-b0d3-dbfa756885e0/2023-03-13-505-Episode-96-converted.mp3" length="6617769" type="audio/mpeg"/><itunes:duration>09:11</itunes:duration><itunes:explicit>false</itunes:explicit><itunes:episodeType>full</itunes:episodeType><itunes:season>1</itunes:season><itunes:episode>96</itunes:episode><itunes:season>1</itunes:season><podcast:episode>96</podcast:episode><podcast:season>1</podcast:season><itunes:author>Contributors from Around the World</itunes:author></item><item><title>Episode #95 - It&apos;s 5:05, Friday, March 10, 2023</title><itunes:title>Episode #95 - It&apos;s 5:05, Friday, March 10, 2023</itunes:title><description><![CDATA[<p><strong>Hey, it's 5:05 on Friday, March 10th, 2023</strong>. From The Sourced Podcast Network in New York City, this is your host, Pokie Huang. Stories in today's episode come from <strong>Edwin Kwan</strong> in Sydney, Australia, <strong>Katy Craig</strong> in San Diego, California,<strong> Mark Miller</strong> in New York City,<strong> Olimpiu Pop</strong> in Transylvania Romania and <strong>Marcel Brown </strong>in St. Louis, Missouri.&nbsp;</p><p>Let's get to it.</p><p><strong>Optus Breach Due To Skilled CyberCriminal</strong></p><p>🇦🇺 Edwin Kwan, Sydney, Australia</p><p>Optus boss says 'skilled criminal' behind cyberattack, admits telco lost customers</p><p><strong>AI Mindreaders</strong></p><p><strong>🇺🇸</strong> Katy Craig, San Diego, California</p><p><a href="https://www.dailymail.co.uk/sciencetech/article-11836553/Mind-reading-AI-turns-thoughts-pictures-80-accuracy.html" rel="noopener noreferrer" target="_blank">Mind-reading AI turns your thoughts into pictures with 80% accuracy | Daily Mail Online</a></p><p><a href="https://www.dailymail.co.uk/sciencetech/article-8168191/Mind-reading-technology-uses-AI-voice-people-unable-speak.html" rel="noopener noreferrer" target="_blank">Mind-reading technology uses AI to give voice to people unable to speak | Daily Mail Online</a></p><p><br></p><p><strong>Drone Operator Tracking</strong></p><p><strong>🇺🇸</strong> Mark Miller, New York City</p><p>This Hacker Tool Can Pinpoint a DJI Drone Operator’s Exact Location</p><p><a href="https://www.wired.com/story/dji-droneid-operator-location-hacker-tool/" rel="noopener noreferrer" target="_blank">This Hacker Tool Can Pinpoint a DJI Drone Operator's Exact Location | WIRED</a></p><p>DJI Drones</p><p><a href="https://www.dji.com/" rel="noopener noreferrer" target="_blank">DJI</a></p><p>Tracers in the Dark: The Global Hunt for the Crime Lords of Cryptocurrency</p><p><a href="https://www.amazon.com/Tracers-Dark-Global-Crime-Cryptocurrency-ebook/dp/B09SKW8WRV" rel="noopener noreferrer" target="_blank">Amazon.com: Tracers in the Dark: The Global Hunt for the Crime Lords of Cryptocurrency eBook : Greenberg, Andy: Kindle Store</a></p><p><br></p><p><strong>DrayTek Obsolete i386 Routers Sniff Internet Traffic And Spread Malware</strong></p><p><strong>🇷🇴 </strong>Olimpiu Pop, Transylvania, Romania</p><p><a href="https://arstechnica.com/information-technology/2023/03/threat-actors-are-using-advanced-malware-to-backdoor-business-grade-routers/" rel="noopener noreferrer" target="_blank">Threat actors are using advanced malware to backdoor business-grade routers | Ars Technica</a></p><p><br></p><p><strong>This Day In Tech History 03-10 &amp; 03-11</strong></p><p><strong>🇺🇸</strong> Marcel Brown, St. Louis, Missouri</p><p><a href="https://thisdayintechhistory.com/03/10" rel="noopener noreferrer" target="_blank">https://thisdayintechhistory.com/03/10</a></p><p><a href="https://thisdayintechhistory.com/03/11" rel="noopener noreferrer" target="_blank">https://thisdayintechhistory.com/03/11</a></p>]]></description><content:encoded><![CDATA[<p><strong>Hey, it's 5:05 on Friday, March 10th, 2023</strong>. From The Sourced Podcast Network in New York City, this is your host, Pokie Huang. Stories in today's episode come from <strong>Edwin Kwan</strong> in Sydney, Australia, <strong>Katy Craig</strong> in San Diego, California,<strong> Mark Miller</strong> in New York City,<strong> Olimpiu Pop</strong> in Transylvania Romania and <strong>Marcel Brown </strong>in St. Louis, Missouri.&nbsp;</p><p>Let's get to it.</p><p><strong>Optus Breach Due To Skilled CyberCriminal</strong></p><p>🇦🇺 Edwin Kwan, Sydney, Australia</p><p>Optus boss says 'skilled criminal' behind cyberattack, admits telco lost customers</p><p><strong>AI Mindreaders</strong></p><p><strong>🇺🇸</strong> Katy Craig, San Diego, California</p><p><a href="https://www.dailymail.co.uk/sciencetech/article-11836553/Mind-reading-AI-turns-thoughts-pictures-80-accuracy.html" rel="noopener noreferrer" target="_blank">Mind-reading AI turns your thoughts into pictures with 80% accuracy | Daily Mail Online</a></p><p><a href="https://www.dailymail.co.uk/sciencetech/article-8168191/Mind-reading-technology-uses-AI-voice-people-unable-speak.html" rel="noopener noreferrer" target="_blank">Mind-reading technology uses AI to give voice to people unable to speak | Daily Mail Online</a></p><p><br></p><p><strong>Drone Operator Tracking</strong></p><p><strong>🇺🇸</strong> Mark Miller, New York City</p><p>This Hacker Tool Can Pinpoint a DJI Drone Operator’s Exact Location</p><p><a href="https://www.wired.com/story/dji-droneid-operator-location-hacker-tool/" rel="noopener noreferrer" target="_blank">This Hacker Tool Can Pinpoint a DJI Drone Operator's Exact Location | WIRED</a></p><p>DJI Drones</p><p><a href="https://www.dji.com/" rel="noopener noreferrer" target="_blank">DJI</a></p><p>Tracers in the Dark: The Global Hunt for the Crime Lords of Cryptocurrency</p><p><a href="https://www.amazon.com/Tracers-Dark-Global-Crime-Cryptocurrency-ebook/dp/B09SKW8WRV" rel="noopener noreferrer" target="_blank">Amazon.com: Tracers in the Dark: The Global Hunt for the Crime Lords of Cryptocurrency eBook : Greenberg, Andy: Kindle Store</a></p><p><br></p><p><strong>DrayTek Obsolete i386 Routers Sniff Internet Traffic And Spread Malware</strong></p><p><strong>🇷🇴 </strong>Olimpiu Pop, Transylvania, Romania</p><p><a href="https://arstechnica.com/information-technology/2023/03/threat-actors-are-using-advanced-malware-to-backdoor-business-grade-routers/" rel="noopener noreferrer" target="_blank">Threat actors are using advanced malware to backdoor business-grade routers | Ars Technica</a></p><p><br></p><p><strong>This Day In Tech History 03-10 &amp; 03-11</strong></p><p><strong>🇺🇸</strong> Marcel Brown, St. Louis, Missouri</p><p><a href="https://thisdayintechhistory.com/03/10" rel="noopener noreferrer" target="_blank">https://thisdayintechhistory.com/03/10</a></p><p><a href="https://thisdayintechhistory.com/03/11" rel="noopener noreferrer" target="_blank">https://thisdayintechhistory.com/03/11</a></p>]]></content:encoded><link><![CDATA[https://3zozb9fxlbueipjyapmaas.captivate.fm/episode/episode-95-its-5-05-friday-march-10-2023]]></link><guid isPermaLink="false">3136d375-114a-4ff0-a36c-983bcea5a667</guid><itunes:image href="https://artwork.captivate.fm/79967a6e-ebf8-426f-aa12-ef9438ab24b5/PxExBqau8zpDkdgrC-A59BzD.png"/><dc:creator><![CDATA[Contributors from Around the World]]></dc:creator><pubDate>Fri, 10 Mar 2023 16:45:00 -0400</pubDate><enclosure url="https://dts.podtrac.com/redirect.mp3/podcasts.captivate.fm/media/21bba5f4-d56e-4b51-a4d6-256bf8b2e6ba/2023-03-10-505-Episode-95-converted.mp3" length="8178846" type="audio/mpeg"/><itunes:duration>11:22</itunes:duration><itunes:explicit>false</itunes:explicit><itunes:episodeType>full</itunes:episodeType><itunes:season>1</itunes:season><itunes:episode>95</itunes:episode><itunes:season>1</itunes:season><podcast:episode>95</podcast:episode><podcast:season>1</podcast:season><itunes:author>Contributors from Around the World</itunes:author></item><item><title>Episode #94 - It&apos;s 5:05, Thursday, March 9, 2023</title><itunes:title>Episode #94 - It&apos;s 5:05, Thursday, March 9, 2023</itunes:title><description><![CDATA[<p><strong>Hey, it's 5:05 on Thursday, March 9th, 2023</strong>. From the Sourced Podcast Network in New York City, this is your host, Pokie Huang. Stories in today's episode come from <strong>Katy Craig</strong> in San Diego, California, <strong>Edwin Kwan</strong> in Sydney, Australia, <strong>Derek Weeks</strong> in Bethesda, Maryland, <strong>Olimpiu Pop</strong> in Transylvania, Romania and <strong>Marcel Brown</strong> in St. Louis, Missouri.&nbsp;</p><p>Let's get to it.&nbsp;</p><p><strong>Your Ring Doorbell is Watching YOU</strong></p><p><strong>🇺🇸</strong> Katy Craig, San Diego, California</p><p><a href="https://www.politico.com/news/2023/03/07/privacy-loophole-ring-doorbell-00084979" rel="noopener noreferrer" target="_blank">The privacy loophole in your doorbell - POLITICO</a></p><p><a href="https://www.eff.org/deeplinks/2021/06/emails-show-amazon-rings-hold-lapd-through-camera-giveaways" rel="noopener noreferrer" target="_blank">Emails from 2016 Show Amazon Ring's Hold on the LAPD Through Camera Giveaways | Electronic Frontier Foundation</a></p><p><strong>Top 10 Open Source Software Risks of 2023</strong></p><p>🇦🇺 Edwin Kwan, Sydney, Australia</p><p><a href="https://www.techrepublic.com/article/top-open-source-security-risks/" rel="noopener noreferrer" target="_blank">Top 10 open-source security and operational risks of 2023</a></p><p><a href="https://www.endorlabs.com/blog/top-10-oss-risks-press-release" rel="noopener noreferrer" target="_blank">Endor Labs Partners with Security and Technology Leaders to Identify Top 10 Open Source Software Risks of 2023</a></p><p><strong>Diaries of a Red Team</strong></p><p><strong>🇺🇸</strong> Derek Weeks, Bethesda, Maryland</p><p><a href="https://www.cisa.gov/news-events/cybersecurity-advisories/aa23-059a" rel="noopener noreferrer" target="_blank">CISA Red Team Shares Key Findings to Improve Monitoring and Hardening of Networks</a></p><p><br></p><p><strong>On International Women’s Day A Perspective Of Gender Equality on Both Sides of the Cyberspace</strong></p><p><strong>🇷🇴 </strong>Olimpiu Pop, Transylvania, Romania</p><p><a href="https://www.theregister.com/2023/03/06/in_brief_security/" rel="noopener noreferrer" target="_blank">Where are the women in cyber security? • The Register</a></p><p><a href="https://www.theregister.com/2022/10/15/infosec_boys_club/" rel="noopener noreferrer" target="_blank">Infosec still (mostly) a boys club • The Register</a></p><p><a href="https://www.isc2.org/News-and-Events/Press-Room/Posts/2021/10/26/ISC2-Cybersecurity-Workforce-Study-Sheds-New-Light-on-Global-Talent-Demand" rel="noopener noreferrer" target="_blank">(ISC)² Cybersecurity Workforce Study Sheds New Light on Global Talent Demand Amid a Lingering Pandemic</a></p><p><a href="https://www.trendmicro.com/vinfo/us/security/news/cybercrime-and-digital-threats/gender-in-cybercrime" rel="noopener noreferrer" target="_blank">The Gender-Equal Cybercriminal Underground - Security News</a></p><p><a href="https://www.isc2.org/-/media/ISC2/Research/2021/ISC2-Cybersecurity-Workforce-Study-2021.ashx" rel="noopener noreferrer" target="_blank">Cybersecurity Workforce Study</a></p><p><br></p><p><strong>This Day In Tech History 03-09</strong></p><p><strong>🇺🇸</strong> Marcel Brown, St. Louis, Missouri</p><p><a href="https://thisdayintechhistory.com/03/09" rel="noopener noreferrer" target="_blank">https://thisdayintechhistory.com/03/09</a></p>]]></description><content:encoded><![CDATA[<p><strong>Hey, it's 5:05 on Thursday, March 9th, 2023</strong>. From the Sourced Podcast Network in New York City, this is your host, Pokie Huang. Stories in today's episode come from <strong>Katy Craig</strong> in San Diego, California, <strong>Edwin Kwan</strong> in Sydney, Australia, <strong>Derek Weeks</strong> in Bethesda, Maryland, <strong>Olimpiu Pop</strong> in Transylvania, Romania and <strong>Marcel Brown</strong> in St. Louis, Missouri.&nbsp;</p><p>Let's get to it.&nbsp;</p><p><strong>Your Ring Doorbell is Watching YOU</strong></p><p><strong>🇺🇸</strong> Katy Craig, San Diego, California</p><p><a href="https://www.politico.com/news/2023/03/07/privacy-loophole-ring-doorbell-00084979" rel="noopener noreferrer" target="_blank">The privacy loophole in your doorbell - POLITICO</a></p><p><a href="https://www.eff.org/deeplinks/2021/06/emails-show-amazon-rings-hold-lapd-through-camera-giveaways" rel="noopener noreferrer" target="_blank">Emails from 2016 Show Amazon Ring's Hold on the LAPD Through Camera Giveaways | Electronic Frontier Foundation</a></p><p><strong>Top 10 Open Source Software Risks of 2023</strong></p><p>🇦🇺 Edwin Kwan, Sydney, Australia</p><p><a href="https://www.techrepublic.com/article/top-open-source-security-risks/" rel="noopener noreferrer" target="_blank">Top 10 open-source security and operational risks of 2023</a></p><p><a href="https://www.endorlabs.com/blog/top-10-oss-risks-press-release" rel="noopener noreferrer" target="_blank">Endor Labs Partners with Security and Technology Leaders to Identify Top 10 Open Source Software Risks of 2023</a></p><p><strong>Diaries of a Red Team</strong></p><p><strong>🇺🇸</strong> Derek Weeks, Bethesda, Maryland</p><p><a href="https://www.cisa.gov/news-events/cybersecurity-advisories/aa23-059a" rel="noopener noreferrer" target="_blank">CISA Red Team Shares Key Findings to Improve Monitoring and Hardening of Networks</a></p><p><br></p><p><strong>On International Women’s Day A Perspective Of Gender Equality on Both Sides of the Cyberspace</strong></p><p><strong>🇷🇴 </strong>Olimpiu Pop, Transylvania, Romania</p><p><a href="https://www.theregister.com/2023/03/06/in_brief_security/" rel="noopener noreferrer" target="_blank">Where are the women in cyber security? • The Register</a></p><p><a href="https://www.theregister.com/2022/10/15/infosec_boys_club/" rel="noopener noreferrer" target="_blank">Infosec still (mostly) a boys club • The Register</a></p><p><a href="https://www.isc2.org/News-and-Events/Press-Room/Posts/2021/10/26/ISC2-Cybersecurity-Workforce-Study-Sheds-New-Light-on-Global-Talent-Demand" rel="noopener noreferrer" target="_blank">(ISC)² Cybersecurity Workforce Study Sheds New Light on Global Talent Demand Amid a Lingering Pandemic</a></p><p><a href="https://www.trendmicro.com/vinfo/us/security/news/cybercrime-and-digital-threats/gender-in-cybercrime" rel="noopener noreferrer" target="_blank">The Gender-Equal Cybercriminal Underground - Security News</a></p><p><a href="https://www.isc2.org/-/media/ISC2/Research/2021/ISC2-Cybersecurity-Workforce-Study-2021.ashx" rel="noopener noreferrer" target="_blank">Cybersecurity Workforce Study</a></p><p><br></p><p><strong>This Day In Tech History 03-09</strong></p><p><strong>🇺🇸</strong> Marcel Brown, St. Louis, Missouri</p><p><a href="https://thisdayintechhistory.com/03/09" rel="noopener noreferrer" target="_blank">https://thisdayintechhistory.com/03/09</a></p>]]></content:encoded><link><![CDATA[https://3zozb9fxlbueipjyapmaas.captivate.fm/episode/episode-94-its-5-05-thursday-march-9-2023]]></link><guid isPermaLink="false">d211910e-595e-4616-a1e5-568435574de0</guid><itunes:image href="https://artwork.captivate.fm/aa1256aa-adb7-4bb4-bd6c-cd037ce8379a/Fr_Fmbb9t7UXBX0-qk937Guy.png"/><dc:creator><![CDATA[Contributors from Around the World]]></dc:creator><pubDate>Thu, 09 Mar 2023 16:45:00 -0400</pubDate><enclosure url="https://dts.podtrac.com/redirect.mp3/podcasts.captivate.fm/media/ebbd3f94-39c5-4184-93ff-cae56c4f0e22/2023-03-09-505-Episode-94-converted.mp3" length="10191875" type="audio/mpeg"/><itunes:duration>14:09</itunes:duration><itunes:explicit>false</itunes:explicit><itunes:episodeType>full</itunes:episodeType><itunes:season>1</itunes:season><itunes:episode>94</itunes:episode><itunes:season>1</itunes:season><podcast:episode>94</podcast:episode><podcast:season>1</podcast:season><itunes:author>Contributors from Around the World</itunes:author></item><item><title>Episode #93 - It&apos;s 5:05, Wednesday, March 8, 2023</title><itunes:title>Episode #93 - It&apos;s 5:05, Wednesday, March 8, 2023</itunes:title><description><![CDATA[<p><strong>Hey It's 5:05 on Wednesday, March 8th, 2023.</strong> From the Sourced Podcast Network in New York City, this is your host, Pokie Huang. Stories in today's episode come from <strong>Katy Craig</strong> in San Diego, California, <strong>Edwin Kwan</strong> in Sydney, Australia, <strong>Chris Hughes</strong> in Virginia Beach, Virginia, and <strong>Marcel Brown</strong> in St. Louis, Missouri.&nbsp;</p><p>Let's get to it.</p><p><strong>ICE And Secret Service Breaking Laws With Stingrays</strong></p><p><strong>🇺🇸</strong> Katy Craig, San Diego, California</p><p><a href="https://www.oig.dhs.gov/sites/default/files/assets/2023-03/OIG-23-17-Feb23-Redacted.pdf" rel="noopener noreferrer" target="_blank">OIG-23-17 - Secret Service and ICE Did Not Always Adhere to Statute and Policies Governing Use of Cell-Site Simulators</a></p><p><a href="https://www.theregister.com/2023/03/04/dhs_secret_service_ice_stingray/" rel="noopener noreferrer" target="_blank">Secret Service, ICE break the law over and over with fake cell tower spying</a></p><p><strong>Android March Updates Addresses Two Critical Vulnerabilities</strong></p><p>🇦🇺 Edwin Kwan, Sydney, Australia</p><p><a href="https://www.cisecurity.org/advisory/multiple-vulnerabilities-in-google-android-os-could-allow-for-remote-code-execution_2023-026" rel="noopener noreferrer" target="_blank">Multiple Vulnerabilities in Google Android OS Could Allow for Remote Code Execution</a></p><p><a href="https://www.bleepingcomputer.com/news/security/android-march-2023-update-fixes-two-critical-code-execution-flaws/" rel="noopener noreferrer" target="_blank">Android March 2023 update fixes two critical code execution flaws</a></p><p><br></p><p><strong>The State Of Secrets Sprawl</strong></p><p><strong>🇺🇸</strong> Chris Hughes, Virginia Beach, Virginia</p><p><a href="https://www.gitguardian.com/files/the-state-of-secrets-sprawl-report-2023" rel="noopener noreferrer" target="_blank">The State of Secrets Sprawl Report 2023</a></p><p><br></p><p><strong>This Day In Tech History 03-08</strong></p><p><strong>🇺🇸</strong> Marcel Brown, St. Louis, Missouri</p><p><a href="https://thisdayintechhistory.com/03/08" rel="noopener noreferrer" target="_blank">https://thisdayintechhistory.com/03/08</a></p>]]></description><content:encoded><![CDATA[<p><strong>Hey It's 5:05 on Wednesday, March 8th, 2023.</strong> From the Sourced Podcast Network in New York City, this is your host, Pokie Huang. Stories in today's episode come from <strong>Katy Craig</strong> in San Diego, California, <strong>Edwin Kwan</strong> in Sydney, Australia, <strong>Chris Hughes</strong> in Virginia Beach, Virginia, and <strong>Marcel Brown</strong> in St. Louis, Missouri.&nbsp;</p><p>Let's get to it.</p><p><strong>ICE And Secret Service Breaking Laws With Stingrays</strong></p><p><strong>🇺🇸</strong> Katy Craig, San Diego, California</p><p><a href="https://www.oig.dhs.gov/sites/default/files/assets/2023-03/OIG-23-17-Feb23-Redacted.pdf" rel="noopener noreferrer" target="_blank">OIG-23-17 - Secret Service and ICE Did Not Always Adhere to Statute and Policies Governing Use of Cell-Site Simulators</a></p><p><a href="https://www.theregister.com/2023/03/04/dhs_secret_service_ice_stingray/" rel="noopener noreferrer" target="_blank">Secret Service, ICE break the law over and over with fake cell tower spying</a></p><p><strong>Android March Updates Addresses Two Critical Vulnerabilities</strong></p><p>🇦🇺 Edwin Kwan, Sydney, Australia</p><p><a href="https://www.cisecurity.org/advisory/multiple-vulnerabilities-in-google-android-os-could-allow-for-remote-code-execution_2023-026" rel="noopener noreferrer" target="_blank">Multiple Vulnerabilities in Google Android OS Could Allow for Remote Code Execution</a></p><p><a href="https://www.bleepingcomputer.com/news/security/android-march-2023-update-fixes-two-critical-code-execution-flaws/" rel="noopener noreferrer" target="_blank">Android March 2023 update fixes two critical code execution flaws</a></p><p><br></p><p><strong>The State Of Secrets Sprawl</strong></p><p><strong>🇺🇸</strong> Chris Hughes, Virginia Beach, Virginia</p><p><a href="https://www.gitguardian.com/files/the-state-of-secrets-sprawl-report-2023" rel="noopener noreferrer" target="_blank">The State of Secrets Sprawl Report 2023</a></p><p><br></p><p><strong>This Day In Tech History 03-08</strong></p><p><strong>🇺🇸</strong> Marcel Brown, St. Louis, Missouri</p><p><a href="https://thisdayintechhistory.com/03/08" rel="noopener noreferrer" target="_blank">https://thisdayintechhistory.com/03/08</a></p>]]></content:encoded><link><![CDATA[https://3zozb9fxlbueipjyapmaas.captivate.fm/episode/episode-93-its-5-05-wednesday-march-8-2023]]></link><guid isPermaLink="false">84d313eb-e858-422a-bd06-2940e760b933</guid><itunes:image href="https://artwork.captivate.fm/85331f37-5f23-4df5-ab58-caba134a676a/Y1ov9f6tXvnd0j5VKIOxWr1g.png"/><dc:creator><![CDATA[Contributors from Around the World]]></dc:creator><pubDate>Wed, 08 Mar 2023 16:45:00 -0400</pubDate><enclosure url="https://dts.podtrac.com/redirect.mp3/podcasts.captivate.fm/media/42fcf256-15aa-450c-9fe2-fd006af6d453/2023-03-08-505-Episode-93-converted.mp3" length="5668897" type="audio/mpeg"/><itunes:duration>07:52</itunes:duration><itunes:explicit>false</itunes:explicit><itunes:episodeType>full</itunes:episodeType><itunes:season>1</itunes:season><itunes:episode>93</itunes:episode><itunes:season>1</itunes:season><podcast:episode>93</podcast:episode><podcast:season>1</podcast:season><itunes:author>Contributors from Around the World</itunes:author></item><item><title>Episode #92 - It&apos;s 5:05, Tuesday, March 7, 2023</title><itunes:title>Episode #92 - It&apos;s 5:05, Tuesday, March 7, 2023</itunes:title><description><![CDATA[<p><strong>Hey! It's 5:05 on Tuesday, March 7tht, 2023.</strong> From the Sourced Podcast Network in New York City, this is your host, Pokie Huang. Stories in today's episode come from <strong>Edwin Kwan </strong>in Sydney, Australia, <strong>Katy Craig</strong> in San Diego, California, <strong>Mark Miller </strong>in Houston, Texas and <strong>Marcel Brown</strong> in St. Louis, Missouri.&nbsp;</p><p>Let's get to it.</p><p><strong>Typosquatting Campaign To Steal Crypto</strong></p><p>🇦🇺 Edwin Kwan, Sydney, Australia</p><p><a href="https://www.bleepingcomputer.com/news/security/451-pypi-packages-install-chrome-extensions-to-steal-crypto/" rel="noopener noreferrer" target="_blank">451 PyPI packages install Chrome extensions to steal crypto</a></p><p><strong>Proposed Texas Law Is Internet Censorship</strong></p><p><strong>🇺🇸</strong> Katy Craig, San Diego, California</p><p><a href="https://www.theregister.com/2023/03/04/texas_abortion_info_law/" rel="noopener noreferrer" target="_blank">Proposed Texas law forces ISPs to block online abortion info • The Register</a></p><p><br></p><p><strong>Hack The USPS Change Of Address Form</strong></p><p><strong>🇺🇸</strong> Mark Miller, New York City</p><p><a href="https://techcrunch.com/2023/03/01/us-postal-service-change-of-address-fraud/" rel="noopener noreferrer" target="_blank">The life-upending flaw that USPS won’t fix | TechCrunch</a></p><p><br></p><p><strong>This Day In Tech History 03-07</strong></p><p><strong>🇺🇸</strong> Marcel Brown, St. Louis, Missouri</p><p><a href="https://thisdayintechhistory.com/03/07" rel="noopener noreferrer" target="_blank">https://thisdayintechhistory.com/03/07</a></p>]]></description><content:encoded><![CDATA[<p><strong>Hey! It's 5:05 on Tuesday, March 7tht, 2023.</strong> From the Sourced Podcast Network in New York City, this is your host, Pokie Huang. Stories in today's episode come from <strong>Edwin Kwan </strong>in Sydney, Australia, <strong>Katy Craig</strong> in San Diego, California, <strong>Mark Miller </strong>in Houston, Texas and <strong>Marcel Brown</strong> in St. Louis, Missouri.&nbsp;</p><p>Let's get to it.</p><p><strong>Typosquatting Campaign To Steal Crypto</strong></p><p>🇦🇺 Edwin Kwan, Sydney, Australia</p><p><a href="https://www.bleepingcomputer.com/news/security/451-pypi-packages-install-chrome-extensions-to-steal-crypto/" rel="noopener noreferrer" target="_blank">451 PyPI packages install Chrome extensions to steal crypto</a></p><p><strong>Proposed Texas Law Is Internet Censorship</strong></p><p><strong>🇺🇸</strong> Katy Craig, San Diego, California</p><p><a href="https://www.theregister.com/2023/03/04/texas_abortion_info_law/" rel="noopener noreferrer" target="_blank">Proposed Texas law forces ISPs to block online abortion info • The Register</a></p><p><br></p><p><strong>Hack The USPS Change Of Address Form</strong></p><p><strong>🇺🇸</strong> Mark Miller, New York City</p><p><a href="https://techcrunch.com/2023/03/01/us-postal-service-change-of-address-fraud/" rel="noopener noreferrer" target="_blank">The life-upending flaw that USPS won’t fix | TechCrunch</a></p><p><br></p><p><strong>This Day In Tech History 03-07</strong></p><p><strong>🇺🇸</strong> Marcel Brown, St. Louis, Missouri</p><p><a href="https://thisdayintechhistory.com/03/07" rel="noopener noreferrer" target="_blank">https://thisdayintechhistory.com/03/07</a></p>]]></content:encoded><link><![CDATA[https://3zozb9fxlbueipjyapmaas.captivate.fm/episode/episode-92-its-5-05-tuesday-march-7-2023]]></link><guid isPermaLink="false">4bf06adc-0307-41f1-8070-83de35715ca4</guid><itunes:image href="https://artwork.captivate.fm/f2fbc66e-f9c4-4b63-a59a-9f359dea3456/JgRxX6i79qhhLWo01ZXTooHV.png"/><dc:creator><![CDATA[Contributors from Around the World]]></dc:creator><pubDate>Tue, 07 Mar 2023 16:45:00 -0400</pubDate><enclosure url="https://dts.podtrac.com/redirect.mp3/podcasts.captivate.fm/media/53b9430b-3101-4959-a923-e9d34ee7b574/2023-03-07-505-Episode-92-converted.mp3" length="6177344" type="audio/mpeg"/><itunes:duration>08:35</itunes:duration><itunes:explicit>false</itunes:explicit><itunes:episodeType>full</itunes:episodeType><itunes:season>1</itunes:season><itunes:episode>92</itunes:episode><itunes:season>1</itunes:season><podcast:episode>92</podcast:episode><podcast:season>1</podcast:season><itunes:author>Contributors from Around the World</itunes:author></item><item><title>Episode #91 - It&apos;s 5:05, Monday, March 6, 2023</title><itunes:title>Episode #91 - It&apos;s 5:05, Monday, March 6, 2023</itunes:title><description><![CDATA[<p><strong>Hey, it's 5:05 on Monday, March 6th, 2023</strong>. From the Sourced Podcast Network in New York City, this is your host, Pokie Huang. Stories in today's episode come from <strong>Edwin Kwan</strong> in Sydney, Australia, <strong>Katy Craig</strong> in San Diego, California, <strong>Trac Bannon</strong> in Camp Hill, Pennsylvania, <strong>Olimpiu Pop</strong> in Transylvania, Romania, <strong>Marcel Brown</strong> in St. Louis, Missouri.</p><p>Let's get to it.</p><p><strong>Medibank Breach Due To Rookie Mistake</strong></p><p>🇦🇺 Edwin Kwan, Sydney, Australia</p><p><a href="https://ia.acs.org.au/content/ia/article/2023/medibank-finally-reveals--rookie-mistake--in-breach.html" rel="noopener noreferrer" target="_blank">Medibank finally reveals ‘rookie mistake’ in breach</a></p><p><br></p><p><strong>TikTok Bans: Major Fail</strong></p><p><strong>🇺🇸</strong> Katy Craig, San Diego, California</p><p><a href="https://www.brookings.edu/blog/techtank/2023/02/16/tiktok-bans-wont-guarantee-consumer-safety/" rel="noopener noreferrer" target="_blank">TikTok bans won’t guarantee consumer safety</a></p><p><a href="https://gizmodo.com/tiktok-ban-joe-biden-28000-apps-sdk-data-china-1850174019" rel="noopener noreferrer" target="_blank">We Found 28,000 Apps Sending TikTok Data. Banning the App Won't Help.</a></p><p><strong>Everyone Loves ChatGPT, Including The Dark Web</strong></p><p><strong>🇺🇸</strong> Tracy (Trac) Bannon, Camp Hill, Pennsylvania</p><p><a href="https://www.independent.co.uk/tech/chatgpt-dark-web-hackers-ai-b2292846.html" rel="noopener noreferrer" target="_blank">ChatGPT is dark web’s ‘hottest topic’ as criminals look to weaponise AI | The Independent</a>&nbsp;</p><p><a href="https://www.csoonline.com/article/3249765/what-is-the-dark-web-how-to-access-it-and-what-youll-find.html" rel="noopener noreferrer" target="_blank">What is the dark web? How to access it and what you'll find | CSO Online</a></p><p><a href="https://www.csoonline.com/article/3287653/what-is-the-tor-browser-how-it-works-and-how-it-can-help-you-protect-your-identity-online.html" rel="noopener noreferrer" target="_blank">What is the Tor Browser? And how the dark web browser works | CSO Online</a>&nbsp;</p><p><br></p><p><strong>Bitdefender Releases Free Mortal Kombat Ransomware Decryptor</strong></p><p><strong>🇷🇴 </strong>Olimpiu Pop, Transylvania, Romania</p><p><a href="https://www.bitdefender.com/blog/labs/bitdefender-releases-decryptor-for-mortalkombat-ransomware/" rel="noopener noreferrer" target="_blank">Bitdefender Releases Decryptor for MortalKombat Ransomware</a></p><p><a href="https://download.bitdefender.com/am/malware_removal/BDMortalKombatDecryptTool.exe" rel="noopener noreferrer" target="_blank">Download BitDefender</a></p><p><a href="https://blog.talosintelligence.com/new-mortalkombat-ransomware-and-laplas-clipper-malware-threats/" rel="noopener noreferrer" target="_blank">New MortalKombat ransomware and Laplas Clipper malware threats deployed in financially motivated campaign</a></p><p><a href="https://www.bleepingcomputer.com/news/security/new-clipboard-hijacker-replaces-crypto-wallet-addresses-with-lookalikes/" rel="noopener noreferrer" target="_blank">New clipboard hijacker replaces crypto wallet addresses with lookalikes</a></p><p><br></p><p><strong>This Day In Tech History 03-05 &amp; 03-06</strong></p><p><strong>🇺🇸</strong> Marcel Brown, St. Louis, Missouri</p><p><a href="https://thisdayintechhistory.com/03/05" rel="noopener noreferrer" target="_blank">https://thisdayintechhistory.com/03/05</a></p><p><a href="https://thisdayintechhistory.com/03/06" rel="noopener noreferrer" target="_blank">https://thisdayintechhistory.com/03/06</a></p>]]></description><content:encoded><![CDATA[<p><strong>Hey, it's 5:05 on Monday, March 6th, 2023</strong>. From the Sourced Podcast Network in New York City, this is your host, Pokie Huang. Stories in today's episode come from <strong>Edwin Kwan</strong> in Sydney, Australia, <strong>Katy Craig</strong> in San Diego, California, <strong>Trac Bannon</strong> in Camp Hill, Pennsylvania, <strong>Olimpiu Pop</strong> in Transylvania, Romania, <strong>Marcel Brown</strong> in St. Louis, Missouri.</p><p>Let's get to it.</p><p><strong>Medibank Breach Due To Rookie Mistake</strong></p><p>🇦🇺 Edwin Kwan, Sydney, Australia</p><p><a href="https://ia.acs.org.au/content/ia/article/2023/medibank-finally-reveals--rookie-mistake--in-breach.html" rel="noopener noreferrer" target="_blank">Medibank finally reveals ‘rookie mistake’ in breach</a></p><p><br></p><p><strong>TikTok Bans: Major Fail</strong></p><p><strong>🇺🇸</strong> Katy Craig, San Diego, California</p><p><a href="https://www.brookings.edu/blog/techtank/2023/02/16/tiktok-bans-wont-guarantee-consumer-safety/" rel="noopener noreferrer" target="_blank">TikTok bans won’t guarantee consumer safety</a></p><p><a href="https://gizmodo.com/tiktok-ban-joe-biden-28000-apps-sdk-data-china-1850174019" rel="noopener noreferrer" target="_blank">We Found 28,000 Apps Sending TikTok Data. Banning the App Won't Help.</a></p><p><strong>Everyone Loves ChatGPT, Including The Dark Web</strong></p><p><strong>🇺🇸</strong> Tracy (Trac) Bannon, Camp Hill, Pennsylvania</p><p><a href="https://www.independent.co.uk/tech/chatgpt-dark-web-hackers-ai-b2292846.html" rel="noopener noreferrer" target="_blank">ChatGPT is dark web’s ‘hottest topic’ as criminals look to weaponise AI | The Independent</a>&nbsp;</p><p><a href="https://www.csoonline.com/article/3249765/what-is-the-dark-web-how-to-access-it-and-what-youll-find.html" rel="noopener noreferrer" target="_blank">What is the dark web? How to access it and what you'll find | CSO Online</a></p><p><a href="https://www.csoonline.com/article/3287653/what-is-the-tor-browser-how-it-works-and-how-it-can-help-you-protect-your-identity-online.html" rel="noopener noreferrer" target="_blank">What is the Tor Browser? And how the dark web browser works | CSO Online</a>&nbsp;</p><p><br></p><p><strong>Bitdefender Releases Free Mortal Kombat Ransomware Decryptor</strong></p><p><strong>🇷🇴 </strong>Olimpiu Pop, Transylvania, Romania</p><p><a href="https://www.bitdefender.com/blog/labs/bitdefender-releases-decryptor-for-mortalkombat-ransomware/" rel="noopener noreferrer" target="_blank">Bitdefender Releases Decryptor for MortalKombat Ransomware</a></p><p><a href="https://download.bitdefender.com/am/malware_removal/BDMortalKombatDecryptTool.exe" rel="noopener noreferrer" target="_blank">Download BitDefender</a></p><p><a href="https://blog.talosintelligence.com/new-mortalkombat-ransomware-and-laplas-clipper-malware-threats/" rel="noopener noreferrer" target="_blank">New MortalKombat ransomware and Laplas Clipper malware threats deployed in financially motivated campaign</a></p><p><a href="https://www.bleepingcomputer.com/news/security/new-clipboard-hijacker-replaces-crypto-wallet-addresses-with-lookalikes/" rel="noopener noreferrer" target="_blank">New clipboard hijacker replaces crypto wallet addresses with lookalikes</a></p><p><br></p><p><strong>This Day In Tech History 03-05 &amp; 03-06</strong></p><p><strong>🇺🇸</strong> Marcel Brown, St. Louis, Missouri</p><p><a href="https://thisdayintechhistory.com/03/05" rel="noopener noreferrer" target="_blank">https://thisdayintechhistory.com/03/05</a></p><p><a href="https://thisdayintechhistory.com/03/06" rel="noopener noreferrer" target="_blank">https://thisdayintechhistory.com/03/06</a></p>]]></content:encoded><link><![CDATA[https://3zozb9fxlbueipjyapmaas.captivate.fm/episode/episode-91-its-5-05-monday-march-6-2023]]></link><guid isPermaLink="false">3ac336a4-e0b2-4de8-a038-4357cc5d4605</guid><itunes:image href="https://artwork.captivate.fm/af346067-6080-463c-ab0a-d7b9fa5fb5f2/Lx9OoG1QLdVs_HTx8hDX6mZj.png"/><dc:creator><![CDATA[Contributors from Around the World]]></dc:creator><pubDate>Mon, 06 Mar 2023 16:45:00 -0400</pubDate><enclosure url="https://dts.podtrac.com/redirect.mp3/podcasts.captivate.fm/media/960d0bce-421e-418b-b986-affb5ddfd75a/2023-03-06-505-Episode-91-converted.mp3" length="9706696" type="audio/mpeg"/><itunes:duration>13:29</itunes:duration><itunes:explicit>false</itunes:explicit><itunes:episodeType>full</itunes:episodeType><itunes:season>1</itunes:season><itunes:episode>91</itunes:episode><itunes:season>1</itunes:season><podcast:episode>91</podcast:episode><podcast:season>1</podcast:season><itunes:author>Contributors from Around the World</itunes:author></item><item><title>Episode #90 - It&apos;s 5:05, Friday, March 3, 2023</title><itunes:title>Episode #90 - It&apos;s 5:05, Friday, March 3, 2023</itunes:title><description><![CDATA[<p><strong>Hey, it's 5:05 on Friday, March 3rd, 2023.</strong> From the Sourced Podcast Network in New York City, this is your host, Pokie Huang. Stories in today's episode come from <strong>Katy Craig</strong> in San Diego, California, <strong>Edwin Kwan</strong> in Sydney, Australia, <strong>Olimpiu Pop</strong> in Transylvania, Romania, <strong>Derek Weeks</strong> in Bethesda, Maryland, <strong>Kadi Grigg</strong> in Alexandria, Virginia and <strong>Marcel Brown</strong> in St. Louis, Missouri.&nbsp;</p><p>Let's get to it.</p><p><strong>Cracked Games Spread Malware</strong></p><p><strong>🇺🇸</strong> Katy Craig, San Diego, California</p><p><a href="https://www.gearrice.com/update/cracked-versions-of-these-cult-games-steal-your-data/" rel="noopener noreferrer" target="_blank">cracked versions of these cult games steal your data</a></p><p><a href="https://www.hackread.com/roblox-nintendo-chromeloader-malwar/" rel="noopener noreferrer" target="_blank">Fake ROBLOX and Nintendo game cracks drop ChromeLoader malware</a></p><p><strong>Worrying Upward Trend In Australian Data Breach Notifications</strong></p><p>🇦🇺 Edwin Kwan, Sydney, Australia</p><p><a href="https://www.oaic.gov.au/privacy/notifiable-data-breaches/notifiable-data-breaches-statistics/notifiable-data-breaches-report-july-december-2022" rel="noopener noreferrer" target="_blank">Notifiable data breaches report July to December 2022</a></p><p><br></p><p><strong>CISA Releases Defender To Help Promote MITRE ATT&amp;CK Framework</strong></p><p><strong>🇷🇴 </strong>Olimpiu Pop, Transylvania, Romania</p><p><a href="https://www.bleepingcomputer.com/news/security/cisa-releases-free-decider-tool-to-help-with-mitre-attandck-mapping/" rel="noopener noreferrer" target="_blank">CISA releases free ‘Decider’ tool to help with MITRE ATT&amp;CK mapping</a></p><p><a href="https://www.cisa.gov/news-events/news/best-practices-mitre-attckr-mapping" rel="noopener noreferrer" target="_blank">Best Practices for MITRE ATT&amp;CK® Mapping | CISA</a></p><p><a href="https://github.com/cisagov/Decider/" rel="noopener noreferrer" target="_blank">GitHub - cisagov/decider: A web application that assists network defenders, analysts, and researcher in the process of mapping adversary behaviors to the MITRE ATT&amp;CK® framework.</a></p><p><a href="http://www.cisa.gov/news-events/alerts/2023/03/01/cisa-releases-decider-tool-help-mitre-attck-mapping" rel="noopener noreferrer" target="_blank">CISA Releases Decider Tool to Help with MITRE ATT&amp;CK Mapping</a></p><p><a href="https://www.statista.com/statistics/500755/worldwide-common-vulnerabilities-and-exposures/" rel="noopener noreferrer" target="_blank">Number of common vulnerabilities and exposures 2022 | Statista</a></p><p><a href="https://www.statista.com/statistics/273550/data-breaches-recorded-in-the-united-states-by-number-of-breaches-and-records-exposed/" rel="noopener noreferrer" target="_blank">Number of data breaches and victims U.S. 2022 | Statista</a></p><p><br></p><p><strong>Is It Time For Software Liability?</strong></p><p><strong>🇺🇸</strong> Derek Weeks, Bethesda, Maryland</p><p><a href="https://www.bloomberg.com/news/features/2023-02-15/zantac-cancer-risk-data-was-kept-quiet-by-manufacturer-glaxo-for-40-years" rel="noopener noreferrer" target="_blank">Zantac Cancer Risk Data Was Kept Quiet by Manufacturer Glaxo for 40 Years - Bloomberg</a></p><p><br></p><p><strong>Biden Administration Historic Move With Release Of National Cybersecurity Strategy</strong></p><p><strong>🇺🇸</strong> Kadi Grigg, Alexandria, Virginia</p><p><a href="https://www.whitehouse.gov/briefing-room/statements-releases/2023/03/02/fact-sheet-biden-harris-administration-announces-national-cybersecurity-strategy/" rel="noopener noreferrer" target="_blank">FACT SHEET: Biden-Harris Administration Announces National Cybersecurity Strategy | The White House</a></p><p><a...]]></description><content:encoded><![CDATA[<p><strong>Hey, it's 5:05 on Friday, March 3rd, 2023.</strong> From the Sourced Podcast Network in New York City, this is your host, Pokie Huang. Stories in today's episode come from <strong>Katy Craig</strong> in San Diego, California, <strong>Edwin Kwan</strong> in Sydney, Australia, <strong>Olimpiu Pop</strong> in Transylvania, Romania, <strong>Derek Weeks</strong> in Bethesda, Maryland, <strong>Kadi Grigg</strong> in Alexandria, Virginia and <strong>Marcel Brown</strong> in St. Louis, Missouri.&nbsp;</p><p>Let's get to it.</p><p><strong>Cracked Games Spread Malware</strong></p><p><strong>🇺🇸</strong> Katy Craig, San Diego, California</p><p><a href="https://www.gearrice.com/update/cracked-versions-of-these-cult-games-steal-your-data/" rel="noopener noreferrer" target="_blank">cracked versions of these cult games steal your data</a></p><p><a href="https://www.hackread.com/roblox-nintendo-chromeloader-malwar/" rel="noopener noreferrer" target="_blank">Fake ROBLOX and Nintendo game cracks drop ChromeLoader malware</a></p><p><strong>Worrying Upward Trend In Australian Data Breach Notifications</strong></p><p>🇦🇺 Edwin Kwan, Sydney, Australia</p><p><a href="https://www.oaic.gov.au/privacy/notifiable-data-breaches/notifiable-data-breaches-statistics/notifiable-data-breaches-report-july-december-2022" rel="noopener noreferrer" target="_blank">Notifiable data breaches report July to December 2022</a></p><p><br></p><p><strong>CISA Releases Defender To Help Promote MITRE ATT&amp;CK Framework</strong></p><p><strong>🇷🇴 </strong>Olimpiu Pop, Transylvania, Romania</p><p><a href="https://www.bleepingcomputer.com/news/security/cisa-releases-free-decider-tool-to-help-with-mitre-attandck-mapping/" rel="noopener noreferrer" target="_blank">CISA releases free ‘Decider’ tool to help with MITRE ATT&amp;CK mapping</a></p><p><a href="https://www.cisa.gov/news-events/news/best-practices-mitre-attckr-mapping" rel="noopener noreferrer" target="_blank">Best Practices for MITRE ATT&amp;CK® Mapping | CISA</a></p><p><a href="https://github.com/cisagov/Decider/" rel="noopener noreferrer" target="_blank">GitHub - cisagov/decider: A web application that assists network defenders, analysts, and researcher in the process of mapping adversary behaviors to the MITRE ATT&amp;CK® framework.</a></p><p><a href="http://www.cisa.gov/news-events/alerts/2023/03/01/cisa-releases-decider-tool-help-mitre-attck-mapping" rel="noopener noreferrer" target="_blank">CISA Releases Decider Tool to Help with MITRE ATT&amp;CK Mapping</a></p><p><a href="https://www.statista.com/statistics/500755/worldwide-common-vulnerabilities-and-exposures/" rel="noopener noreferrer" target="_blank">Number of common vulnerabilities and exposures 2022 | Statista</a></p><p><a href="https://www.statista.com/statistics/273550/data-breaches-recorded-in-the-united-states-by-number-of-breaches-and-records-exposed/" rel="noopener noreferrer" target="_blank">Number of data breaches and victims U.S. 2022 | Statista</a></p><p><br></p><p><strong>Is It Time For Software Liability?</strong></p><p><strong>🇺🇸</strong> Derek Weeks, Bethesda, Maryland</p><p><a href="https://www.bloomberg.com/news/features/2023-02-15/zantac-cancer-risk-data-was-kept-quiet-by-manufacturer-glaxo-for-40-years" rel="noopener noreferrer" target="_blank">Zantac Cancer Risk Data Was Kept Quiet by Manufacturer Glaxo for 40 Years - Bloomberg</a></p><p><br></p><p><strong>Biden Administration Historic Move With Release Of National Cybersecurity Strategy</strong></p><p><strong>🇺🇸</strong> Kadi Grigg, Alexandria, Virginia</p><p><a href="https://www.whitehouse.gov/briefing-room/statements-releases/2023/03/02/fact-sheet-biden-harris-administration-announces-national-cybersecurity-strategy/" rel="noopener noreferrer" target="_blank">FACT SHEET: Biden-Harris Administration Announces National Cybersecurity Strategy | The White House</a></p><p><a href="https://www.whitehouse.gov/wp-content/uploads/2023/03/National-Cybersecurity-Strategy-2023.pdf" rel="noopener noreferrer" target="_blank">National Cybersecurity Strategy 2023</a>&nbsp;</p><p><br></p><p><strong>This Day In Tech History 03-03 &amp; 03-04</strong></p><p><strong>🇺🇸</strong> Marcel Brown, St. Louis, Missouri</p><p><a href="https://thisdayintechhistory.com/03/03" rel="noopener noreferrer" target="_blank">https://thisdayintechhistory.com/03/03</a></p><p><a href="https://thisdayintechhistory.com/03/04" rel="noopener noreferrer" target="_blank">https://thisdayintechhistory.com/03/04</a></p><p><br></p>]]></content:encoded><link><![CDATA[https://3zozb9fxlbueipjyapmaas.captivate.fm/episode/episode-90-its-5-05-friday-march-3-2023]]></link><guid isPermaLink="false">21bb6bad-116e-4dc9-9408-9b3fe36a4f87</guid><itunes:image href="https://artwork.captivate.fm/5cd7bdef-188a-4c1d-b62c-a442a68012bd/sqgGo53PLmDt-aPcHk4WAkQm.png"/><dc:creator><![CDATA[Contributors from Around the World]]></dc:creator><pubDate>Fri, 03 Mar 2023 16:45:00 -0400</pubDate><enclosure url="https://dts.podtrac.com/redirect.mp3/podcasts.captivate.fm/media/6939fa43-399f-44ef-86ff-60b37661b315/2023-03-03-505-Episode-90-converted.mp3" length="11709105" type="audio/mpeg"/><itunes:duration>16:16</itunes:duration><itunes:explicit>false</itunes:explicit><itunes:episodeType>full</itunes:episodeType><itunes:season>1</itunes:season><itunes:episode>90</itunes:episode><itunes:season>1</itunes:season><podcast:episode>90</podcast:episode><podcast:season>1</podcast:season><itunes:author>Contributors from Around the World</itunes:author></item><item><title>Episode #89 - It&apos;s 5:05, Thursday, March 2, 2023</title><itunes:title>Episode #89 - It&apos;s 5:05, Thursday, March 2, 2023</itunes:title><description><![CDATA[<p><strong>Hey, it's 5:05 on Thursday, March 2nd, 2023</strong>. From the Sourced Podcast Network in New York City, this is your host, Pokie Huang. Stories in today's episode come from <strong>Edwin Kwan</strong> in Sydney, Australia. <strong>Katy Craig</strong> in San Diego, California, <strong>Kadi Grigg</strong> in Alexandria, Virginia, <strong>Derek Weeks</strong> in Bethesda, Maryland, and <strong>Marcel Brown</strong> in St. Louis, Missouri.&nbsp;</p><p>Let's get to it.</p><p><strong>GitHub Secret Scanning Now Free for Public Repositories</strong></p><p>🇦🇺 Edwin Kwan, Sydney, Australia</p><p><a href="https://github.blog/2023-02-28-secret-scanning-alerts-are-now-available-and-free-for-all-public-repositories/" rel="noopener noreferrer" target="_blank">Secret scanning alerts are now available (and free) for all public repositories | The GitHub Blog</a></p><p><strong>New Military Working Dogs</strong></p><p><strong>🇺🇸</strong> Katy Craig, San Diego, California</p><p><a href="https://taskandpurpose.com/tech-tactics/robot-dogs/?utm_term=Task%26Purpose_Today_03.02.23&amp;utm_campaign=Task%20%26%20Purpose_TPToday_Actives_Dynamic&amp;utm_source=Sailthru&amp;utm_medium=email" rel="noopener noreferrer" target="_blank">Robot dogs are taking over the US military - Task &amp; Purpose</a></p><p><a href="https://www.dvidshub.net/image/7652047/semi-autonomous-canine-enhances-security-cape-cod-space-force-station" rel="noopener noreferrer" target="_blank">Semi-autonomous canine enhances security at Cape Cod Space Force Station</a></p><p><a href="https://www.k80cb.com/post/metalhead" rel="noopener noreferrer" target="_blank">"Metalhead"</a></p><p><br></p><p><strong>New CVE Marked High Severity</strong></p><p><strong>🇺🇸</strong> Kadi Grigg, Alexandria, Virginia</p><p><a href="https://www.bleepingcomputer.com/news/security/cisa-warns-of-hackers-exploiting-zk-java-framework-rce-flaw/" rel="noopener noreferrer" target="_blank">CISA warns of hackers exploiting ZK Java Framework RCE flaw</a></p><p><a href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-36537" rel="noopener noreferrer" target="_blank">CVE-2022-36537</a></p><p><a href="https://nvd.nist.gov/vuln/detail/CVE-2022-36537" rel="noopener noreferrer" target="_blank">NVD - CVE-2022-36537</a></p><p><a href="https://www.cisa.gov/known-exploited-vulnerabilities-catalog" rel="noopener noreferrer" target="_blank">Known Exploited Vulnerabilities Catalog</a></p><p><br></p><p><strong>Biden Administration Takes Aim at Software Liability</strong></p><p><strong>🇺🇸</strong> Derek Weeks, Bethesda, Maryland</p><p><a href="https://www.whitehouse.gov/wp-content/uploads/2023/03/National-Cybersecurity-Strategy-2023.pdf" rel="noopener noreferrer" target="_blank">National Cybersecurity Strategy 2023</a></p><p><br></p><p><strong>This Day In Tech History 03-02</strong></p><p><strong>🇺🇸</strong> Marcel Brown, St. Louis, Missouri</p><p><a href="https://thisdayintechhistory.com/03/02" rel="noopener noreferrer" target="_blank">https://thisdayintechhistory.com/03/02</a></p>]]></description><content:encoded><![CDATA[<p><strong>Hey, it's 5:05 on Thursday, March 2nd, 2023</strong>. From the Sourced Podcast Network in New York City, this is your host, Pokie Huang. Stories in today's episode come from <strong>Edwin Kwan</strong> in Sydney, Australia. <strong>Katy Craig</strong> in San Diego, California, <strong>Kadi Grigg</strong> in Alexandria, Virginia, <strong>Derek Weeks</strong> in Bethesda, Maryland, and <strong>Marcel Brown</strong> in St. Louis, Missouri.&nbsp;</p><p>Let's get to it.</p><p><strong>GitHub Secret Scanning Now Free for Public Repositories</strong></p><p>🇦🇺 Edwin Kwan, Sydney, Australia</p><p><a href="https://github.blog/2023-02-28-secret-scanning-alerts-are-now-available-and-free-for-all-public-repositories/" rel="noopener noreferrer" target="_blank">Secret scanning alerts are now available (and free) for all public repositories | The GitHub Blog</a></p><p><strong>New Military Working Dogs</strong></p><p><strong>🇺🇸</strong> Katy Craig, San Diego, California</p><p><a href="https://taskandpurpose.com/tech-tactics/robot-dogs/?utm_term=Task%26Purpose_Today_03.02.23&amp;utm_campaign=Task%20%26%20Purpose_TPToday_Actives_Dynamic&amp;utm_source=Sailthru&amp;utm_medium=email" rel="noopener noreferrer" target="_blank">Robot dogs are taking over the US military - Task &amp; Purpose</a></p><p><a href="https://www.dvidshub.net/image/7652047/semi-autonomous-canine-enhances-security-cape-cod-space-force-station" rel="noopener noreferrer" target="_blank">Semi-autonomous canine enhances security at Cape Cod Space Force Station</a></p><p><a href="https://www.k80cb.com/post/metalhead" rel="noopener noreferrer" target="_blank">"Metalhead"</a></p><p><br></p><p><strong>New CVE Marked High Severity</strong></p><p><strong>🇺🇸</strong> Kadi Grigg, Alexandria, Virginia</p><p><a href="https://www.bleepingcomputer.com/news/security/cisa-warns-of-hackers-exploiting-zk-java-framework-rce-flaw/" rel="noopener noreferrer" target="_blank">CISA warns of hackers exploiting ZK Java Framework RCE flaw</a></p><p><a href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-36537" rel="noopener noreferrer" target="_blank">CVE-2022-36537</a></p><p><a href="https://nvd.nist.gov/vuln/detail/CVE-2022-36537" rel="noopener noreferrer" target="_blank">NVD - CVE-2022-36537</a></p><p><a href="https://www.cisa.gov/known-exploited-vulnerabilities-catalog" rel="noopener noreferrer" target="_blank">Known Exploited Vulnerabilities Catalog</a></p><p><br></p><p><strong>Biden Administration Takes Aim at Software Liability</strong></p><p><strong>🇺🇸</strong> Derek Weeks, Bethesda, Maryland</p><p><a href="https://www.whitehouse.gov/wp-content/uploads/2023/03/National-Cybersecurity-Strategy-2023.pdf" rel="noopener noreferrer" target="_blank">National Cybersecurity Strategy 2023</a></p><p><br></p><p><strong>This Day In Tech History 03-02</strong></p><p><strong>🇺🇸</strong> Marcel Brown, St. Louis, Missouri</p><p><a href="https://thisdayintechhistory.com/03/02" rel="noopener noreferrer" target="_blank">https://thisdayintechhistory.com/03/02</a></p>]]></content:encoded><link><![CDATA[https://3zozb9fxlbueipjyapmaas.captivate.fm/episode/episode-89-its-5-05-thursday-march-2-2023]]></link><guid isPermaLink="false">f7dffbfb-3c02-4e29-8f62-7c40e4fa2908</guid><itunes:image href="https://artwork.captivate.fm/c5707603-cb16-49dd-a189-9ba2351324b0/Fu8m2iB2o2PqWavKPSe5DTOu.png"/><dc:creator><![CDATA[Contributors from Around the World]]></dc:creator><pubDate>Thu, 02 Mar 2023 16:45:00 -0400</pubDate><enclosure url="https://dts.podtrac.com/redirect.mp3/podcasts.captivate.fm/media/ee874610-c7a0-4c95-ab94-8a501f79ee2c/2023-03-02-505-Episode-89-converted.mp3" length="6760050" type="audio/mpeg"/><itunes:duration>09:23</itunes:duration><itunes:explicit>false</itunes:explicit><itunes:episodeType>full</itunes:episodeType><itunes:season>1</itunes:season><itunes:episode>89</itunes:episode><itunes:season>1</itunes:season><podcast:episode>89</podcast:episode><podcast:season>1</podcast:season><itunes:author>Contributors from Around the World</itunes:author></item><item><title>Episode #88 - It&apos;s 5:05, Wednesday, March 1, 2023</title><itunes:title>Episode #88 - It&apos;s 5:05, Wednesday, March 1, 2023</itunes:title><description><![CDATA[<p><strong>Hey! It's 5:05 on Wednesday, March 1st, 2023.</strong> From the Sourced Podcast Network in New York City, this is your host, Pokie Huang. Stories in today's episode come from <strong>Edwin Kwan </strong>in Sydney, Australia, <strong>Ian Garrett </strong>in Arlington, Virginia, <strong>Katy Craig</strong> in San Diego, California, <strong>Olimpiu Pop</strong> in Transylvania, Romania and <strong>Marcel Brown</strong> in St. Louis, Missouri.&nbsp;</p><p>Let's get to it.</p><p><strong>Critical Apple Bug Wipes Out Passkeys</strong></p><p>🇦🇺 Edwin Kwan, Sydney, Australia</p><p><a href="https://terencekam.substack.com/p/beware-critical-apple-bug-wipes-out" rel="noopener noreferrer" target="_blank">Beware! Critical Apple bug wipes out passkeys</a></p><p><strong>At Home And Unprotected: The Risks Of Remote Working Exposed By LastPass Breach</strong></p><p><strong>🇺🇸 </strong>Ian Garrett, Arlington, Virginia</p><p><a href="https://arstechnica-com.cdn.ampproject.org/c/s/arstechnica.com/information-technology/2023/02/lastpass-hackers-infected-employees-home-computer-and-stole-corporate-vault/amp/" rel="noopener noreferrer" target="_blank">LastPass says employee’s home computer was hacked and corporate vault taken</a></p><p><br></p><p><strong>DOD Cloud Audit</strong></p><p><strong>🇺🇸</strong> Katy Craig, San Diego, California</p><p><a href="https://www.dodig.mil/reports.html/Article/3300521/audit-of-the-dods-compliance-with-security-requirements-when-using-commercial-c/" rel="noopener noreferrer" target="_blank">Audit of the DoD’s Compliance with Security Requirements When Using Commercial Cloud Services (DODIG-2023-052) &gt; Department of Defense Office of Inspector General &gt; DoD OIG Reports</a></p><p><br></p><p><strong>OSS Braces For War</strong></p><p><strong>🇷🇴 </strong>Olimpiu Pop, Transylvania, Romania</p><p><a href="https://www.reuters.com/breakingviews/open-source-software-braces-trade-war-2023-02-27/" rel="noopener noreferrer" target="_blank">Open-source software braces for trade war | Reuters</a></p><p><a href="https://www.synopsys.com/software-integrity/resources/analyst-reports/open-source-security-risk-analysis.html" rel="noopener noreferrer" target="_blank">Open Source Security and Risk Analysis report</a></p><p><a href="https://merics.org/en/short-analysis/china-bets-open-source-technologies-boost-domestic-innovation" rel="noopener noreferrer" target="_blank">China bets on open-source technologies to boost domestic innovation | Merics</a></p><p><br></p><p><strong>This Day In Tech History 03-01</strong></p><p><strong>🇺🇸</strong> Marcel Brown, St. Louis, Missouri</p><p><a href="https://thisdayintechhistory.com/03/01" rel="noopener noreferrer" target="_blank">https://thisdayintechhistory.com/03/01</a></p><p><br></p>]]></description><content:encoded><![CDATA[<p><strong>Hey! It's 5:05 on Wednesday, March 1st, 2023.</strong> From the Sourced Podcast Network in New York City, this is your host, Pokie Huang. Stories in today's episode come from <strong>Edwin Kwan </strong>in Sydney, Australia, <strong>Ian Garrett </strong>in Arlington, Virginia, <strong>Katy Craig</strong> in San Diego, California, <strong>Olimpiu Pop</strong> in Transylvania, Romania and <strong>Marcel Brown</strong> in St. Louis, Missouri.&nbsp;</p><p>Let's get to it.</p><p><strong>Critical Apple Bug Wipes Out Passkeys</strong></p><p>🇦🇺 Edwin Kwan, Sydney, Australia</p><p><a href="https://terencekam.substack.com/p/beware-critical-apple-bug-wipes-out" rel="noopener noreferrer" target="_blank">Beware! Critical Apple bug wipes out passkeys</a></p><p><strong>At Home And Unprotected: The Risks Of Remote Working Exposed By LastPass Breach</strong></p><p><strong>🇺🇸 </strong>Ian Garrett, Arlington, Virginia</p><p><a href="https://arstechnica-com.cdn.ampproject.org/c/s/arstechnica.com/information-technology/2023/02/lastpass-hackers-infected-employees-home-computer-and-stole-corporate-vault/amp/" rel="noopener noreferrer" target="_blank">LastPass says employee’s home computer was hacked and corporate vault taken</a></p><p><br></p><p><strong>DOD Cloud Audit</strong></p><p><strong>🇺🇸</strong> Katy Craig, San Diego, California</p><p><a href="https://www.dodig.mil/reports.html/Article/3300521/audit-of-the-dods-compliance-with-security-requirements-when-using-commercial-c/" rel="noopener noreferrer" target="_blank">Audit of the DoD’s Compliance with Security Requirements When Using Commercial Cloud Services (DODIG-2023-052) &gt; Department of Defense Office of Inspector General &gt; DoD OIG Reports</a></p><p><br></p><p><strong>OSS Braces For War</strong></p><p><strong>🇷🇴 </strong>Olimpiu Pop, Transylvania, Romania</p><p><a href="https://www.reuters.com/breakingviews/open-source-software-braces-trade-war-2023-02-27/" rel="noopener noreferrer" target="_blank">Open-source software braces for trade war | Reuters</a></p><p><a href="https://www.synopsys.com/software-integrity/resources/analyst-reports/open-source-security-risk-analysis.html" rel="noopener noreferrer" target="_blank">Open Source Security and Risk Analysis report</a></p><p><a href="https://merics.org/en/short-analysis/china-bets-open-source-technologies-boost-domestic-innovation" rel="noopener noreferrer" target="_blank">China bets on open-source technologies to boost domestic innovation | Merics</a></p><p><br></p><p><strong>This Day In Tech History 03-01</strong></p><p><strong>🇺🇸</strong> Marcel Brown, St. Louis, Missouri</p><p><a href="https://thisdayintechhistory.com/03/01" rel="noopener noreferrer" target="_blank">https://thisdayintechhistory.com/03/01</a></p><p><br></p>]]></content:encoded><link><![CDATA[https://3zozb9fxlbueipjyapmaas.captivate.fm/episode/episode-88-its-5-05-wednesday-march-1-2023]]></link><guid isPermaLink="false">fb13e79e-fec5-4cb6-aca8-92c811fd4862</guid><itunes:image href="https://artwork.captivate.fm/44e6e3cc-3647-4946-a0d1-2dd1c263e253/Mv21zNxRiwR29BTa59f14LBN.png"/><dc:creator><![CDATA[Contributors from Around the World]]></dc:creator><pubDate>Wed, 01 Mar 2023 16:45:00 -0400</pubDate><enclosure url="https://dts.podtrac.com/redirect.mp3/podcasts.captivate.fm/media/c0adc47b-5909-4b4d-a268-e4be1d3d1292/2023-03-01-505-Episode-88-converted.mp3" length="8847756" type="audio/mpeg"/><itunes:duration>12:17</itunes:duration><itunes:explicit>false</itunes:explicit><itunes:episodeType>full</itunes:episodeType><itunes:season>1</itunes:season><itunes:episode>88</itunes:episode><itunes:season>1</itunes:season><podcast:episode>88</podcast:episode><podcast:season>1</podcast:season><itunes:author>Contributors from Around the World</itunes:author></item><item><title>Episode #87 - It&apos;s 5:05, Tuesday, February 28, 2023</title><itunes:title>Episode #87 - It&apos;s 5:05, Tuesday, February 28, 2023</itunes:title><description><![CDATA[<p><strong>Hey! It's 5:05 on Tuesday, February 28th, 2023.</strong> From the Sourced Podcast Network in New York City, this is your host, Pokie Huang. Stories in today's episode come from <strong>Edwin Kwan </strong>in Sydney, Australia, <strong>Katy Craig </strong>in San Diego, California, Trac Bannon in Camp Hill, Pennsylvania and <strong>Marcel Brown</strong> in St. Louis, Missouri.&nbsp;</p><p>Today’s extended segment comes from Dan Whiting in Washington D.C., telling his story of a recent scam he received. You’ll want to hear this.</p><p>Let's get to it.</p><p><strong>&nbsp;A important scam reminder</strong></p><p><strong>🇺🇸</strong> Dan Whiting, Washington, DC</p><p><a href="https://www.truist.com/fraud-and-security/common-fraud" rel="noopener noreferrer" target="_blank">Common Fraud Schemes | Security | Truist</a></p><p><strong>New Cyber Security Requirements for Australian Critical Infrastructure</strong></p><p>🇦🇺 Edwin Kwan, Sydney, Australia</p><p><a href="https://www.afr.com/technology/businesses-face-new-9b-cybersecurity-requirements-20230217-p5clf5" rel="noopener noreferrer" target="_blank">Businesses face new $9b cybersecurity requirements</a></p><p><br></p><p><strong>AI for Social Engineering</strong></p><p><strong>🇺🇸</strong> Katy Craig, San Diego, California</p><p><a href="https://www.csoonline.com/article/3685368/study-shows-attackers-can-use-chatgpt-to-significantly-enhance-phishing-and-bec-scams.html" rel="noopener noreferrer" target="_blank">Study shows attackers can use ChatGPT to significantly enhance phishing and BEC scams | CSO Online</a></p><p><a href="https://nymag.com/intelligencer/2023/02/why-bing-is-being-creepy.html" rel="noopener noreferrer" target="_blank">Why Bing Is Being Creepy</a></p><p><br></p><p><strong>DevSecOps, OWASP, and Injection Attacks</strong></p><p><strong>🇺🇸</strong> Tracy (Trac) Bannon, Camp Hill, Pennsylvania</p><p><a href="https://owasp.org/www-project-top-ten/" rel="noopener noreferrer" target="_blank">OWASP Top Ten</a></p><p><a href="https://www.bleepingcomputer.com/news/security/75k-wordpress-sites-impacted-by-critical-online-course-plugin-flaws/" rel="noopener noreferrer" target="_blank">75k WordPress sites impacted by critical online course plugin flaws</a>&nbsp;</p><p><a href="https://portswigger.net/web-security/sql-injection" rel="noopener noreferrer" target="_blank">What is SQL Injection? Tutorial &amp; Examples | Web Security Academy</a>&nbsp;</p><p><a href="https://www.zaproxy.org/" rel="noopener noreferrer" target="_blank">OWASP ZAP</a>&nbsp;</p><p><a href="https://owasp.org/www-community/Vulnerability_Scanning_Tools" rel="noopener noreferrer" target="_blank">Vulnerability Scanning Tools | OWASP Foundation</a>&nbsp;</p><p><br></p><p><strong>This Day In Tech History 02-28</strong></p><p><strong>🇺🇸</strong> Marcel Brown, St. Louis, Missouri</p><p><a href="https://thisdayintechhistory.com/02/28" rel="noopener noreferrer" target="_blank">https://thisdayintechhistory.com/02/28</a></p><p><br></p>]]></description><content:encoded><![CDATA[<p><strong>Hey! It's 5:05 on Tuesday, February 28th, 2023.</strong> From the Sourced Podcast Network in New York City, this is your host, Pokie Huang. Stories in today's episode come from <strong>Edwin Kwan </strong>in Sydney, Australia, <strong>Katy Craig </strong>in San Diego, California, Trac Bannon in Camp Hill, Pennsylvania and <strong>Marcel Brown</strong> in St. Louis, Missouri.&nbsp;</p><p>Today’s extended segment comes from Dan Whiting in Washington D.C., telling his story of a recent scam he received. You’ll want to hear this.</p><p>Let's get to it.</p><p><strong>&nbsp;A important scam reminder</strong></p><p><strong>🇺🇸</strong> Dan Whiting, Washington, DC</p><p><a href="https://www.truist.com/fraud-and-security/common-fraud" rel="noopener noreferrer" target="_blank">Common Fraud Schemes | Security | Truist</a></p><p><strong>New Cyber Security Requirements for Australian Critical Infrastructure</strong></p><p>🇦🇺 Edwin Kwan, Sydney, Australia</p><p><a href="https://www.afr.com/technology/businesses-face-new-9b-cybersecurity-requirements-20230217-p5clf5" rel="noopener noreferrer" target="_blank">Businesses face new $9b cybersecurity requirements</a></p><p><br></p><p><strong>AI for Social Engineering</strong></p><p><strong>🇺🇸</strong> Katy Craig, San Diego, California</p><p><a href="https://www.csoonline.com/article/3685368/study-shows-attackers-can-use-chatgpt-to-significantly-enhance-phishing-and-bec-scams.html" rel="noopener noreferrer" target="_blank">Study shows attackers can use ChatGPT to significantly enhance phishing and BEC scams | CSO Online</a></p><p><a href="https://nymag.com/intelligencer/2023/02/why-bing-is-being-creepy.html" rel="noopener noreferrer" target="_blank">Why Bing Is Being Creepy</a></p><p><br></p><p><strong>DevSecOps, OWASP, and Injection Attacks</strong></p><p><strong>🇺🇸</strong> Tracy (Trac) Bannon, Camp Hill, Pennsylvania</p><p><a href="https://owasp.org/www-project-top-ten/" rel="noopener noreferrer" target="_blank">OWASP Top Ten</a></p><p><a href="https://www.bleepingcomputer.com/news/security/75k-wordpress-sites-impacted-by-critical-online-course-plugin-flaws/" rel="noopener noreferrer" target="_blank">75k WordPress sites impacted by critical online course plugin flaws</a>&nbsp;</p><p><a href="https://portswigger.net/web-security/sql-injection" rel="noopener noreferrer" target="_blank">What is SQL Injection? Tutorial &amp; Examples | Web Security Academy</a>&nbsp;</p><p><a href="https://www.zaproxy.org/" rel="noopener noreferrer" target="_blank">OWASP ZAP</a>&nbsp;</p><p><a href="https://owasp.org/www-community/Vulnerability_Scanning_Tools" rel="noopener noreferrer" target="_blank">Vulnerability Scanning Tools | OWASP Foundation</a>&nbsp;</p><p><br></p><p><strong>This Day In Tech History 02-28</strong></p><p><strong>🇺🇸</strong> Marcel Brown, St. Louis, Missouri</p><p><a href="https://thisdayintechhistory.com/02/28" rel="noopener noreferrer" target="_blank">https://thisdayintechhistory.com/02/28</a></p><p><br></p>]]></content:encoded><link><![CDATA[https://3zozb9fxlbueipjyapmaas.captivate.fm/episode/episode-87-its-5-05-tuesday-february-28-2023]]></link><guid isPermaLink="false">7127e52b-7e16-4d14-a018-465433a9d961</guid><itunes:image href="https://artwork.captivate.fm/3bff075e-f331-4995-8fc3-4d158708c7dc/0E3LvGjc9PR7Zs31WdZUVuHB.png"/><dc:creator><![CDATA[Contributors from Around the World]]></dc:creator><pubDate>Tue, 28 Feb 2023 16:45:00 -0400</pubDate><enclosure url="https://dts.podtrac.com/redirect.mp3/podcasts.captivate.fm/media/34b1aa9d-1384-4de7-bfe4-01973c540d21/2023-02-28-505-Episode-87-converted.mp3" length="8727384" type="audio/mpeg"/><itunes:duration>12:07</itunes:duration><itunes:explicit>false</itunes:explicit><itunes:episodeType>full</itunes:episodeType><itunes:season>1</itunes:season><itunes:episode>87</itunes:episode><itunes:season>1</itunes:season><podcast:episode>87</podcast:episode><podcast:season>1</podcast:season><itunes:author>Contributors from Around the World</itunes:author></item><item><title>Episode #86 - It&apos;s 5:05, Monday, February 27, 2023</title><itunes:title>Episode #86 - It&apos;s 5:05, Monday, February 27, 2023</itunes:title><description><![CDATA[<p><strong>Hey, it's 5:05 on Monday, February 27th, 2023</strong>. From The Sourced Podcast Network in New York City, this is your host, Pokie Huang. Stories in today's episode come from <strong>Mark Miller</strong> in New York City, <strong>Edwin Kwan</strong> in Sydney, Australia, <strong>Olimpiu Pop</strong> in Transylvania Romania and <strong>Marcel Brown</strong> in St. Louis, Missouri.&nbsp;</p><p>Let's get to it.</p><p><strong>The Sourced Podcast Network</strong></p><p><strong>🇺🇸</strong> Mark Miller, New York City</p><p><strong>Basic iPhone Feature Allowing Theft of Your Entire Digital Life</strong></p><p>🇦🇺 Edwin Kwan, Sydney, Australia</p><p><a href="https://www.wsj.com/articles/apple-iphone-security-theft-passcode-data-privacya-basic-iphone-feature-helps-criminals-steal-your-digital-life-cbf14b1a" rel="noopener noreferrer" target="_blank">A Basic iPhone Feature Helps Criminals Steal Your Entire Digital Life - WSJ</a></p><p><strong>JReleaser the Mercedes of CLI tools reaches version 1.5</strong></p><p><strong>🇷🇴 </strong>Olimpiu Pop, Transylvania, Romania</p><p><a href="https://andresalmiray.com/jreleaser-1-5-0-has-been-released/" rel="noopener noreferrer" target="_blank">JReleaser 1.5.0 has been released!</a></p><p><br></p><p><strong>This Day In Tech History 02-26 &amp; 02-27</strong></p><p><strong>🇺🇸</strong> Marcel Brown, St. Louis, Missouri</p><p><a href="https://thisdayintechhistory.com/02/26" rel="noopener noreferrer" target="_blank">https://thisdayintechhistory.com/02/26</a></p><p><a href="https://thisdayintechhistory.com/02/27" rel="noopener noreferrer" target="_blank">https://thisdayintechhistory.com/02/27</a></p><p><br></p>]]></description><content:encoded><![CDATA[<p><strong>Hey, it's 5:05 on Monday, February 27th, 2023</strong>. From The Sourced Podcast Network in New York City, this is your host, Pokie Huang. Stories in today's episode come from <strong>Mark Miller</strong> in New York City, <strong>Edwin Kwan</strong> in Sydney, Australia, <strong>Olimpiu Pop</strong> in Transylvania Romania and <strong>Marcel Brown</strong> in St. Louis, Missouri.&nbsp;</p><p>Let's get to it.</p><p><strong>The Sourced Podcast Network</strong></p><p><strong>🇺🇸</strong> Mark Miller, New York City</p><p><strong>Basic iPhone Feature Allowing Theft of Your Entire Digital Life</strong></p><p>🇦🇺 Edwin Kwan, Sydney, Australia</p><p><a href="https://www.wsj.com/articles/apple-iphone-security-theft-passcode-data-privacya-basic-iphone-feature-helps-criminals-steal-your-digital-life-cbf14b1a" rel="noopener noreferrer" target="_blank">A Basic iPhone Feature Helps Criminals Steal Your Entire Digital Life - WSJ</a></p><p><strong>JReleaser the Mercedes of CLI tools reaches version 1.5</strong></p><p><strong>🇷🇴 </strong>Olimpiu Pop, Transylvania, Romania</p><p><a href="https://andresalmiray.com/jreleaser-1-5-0-has-been-released/" rel="noopener noreferrer" target="_blank">JReleaser 1.5.0 has been released!</a></p><p><br></p><p><strong>This Day In Tech History 02-26 &amp; 02-27</strong></p><p><strong>🇺🇸</strong> Marcel Brown, St. Louis, Missouri</p><p><a href="https://thisdayintechhistory.com/02/26" rel="noopener noreferrer" target="_blank">https://thisdayintechhistory.com/02/26</a></p><p><a href="https://thisdayintechhistory.com/02/27" rel="noopener noreferrer" target="_blank">https://thisdayintechhistory.com/02/27</a></p><p><br></p>]]></content:encoded><link><![CDATA[https://3zozb9fxlbueipjyapmaas.captivate.fm/episode/episode-86-its-5-05-monday-february-27-2023]]></link><guid isPermaLink="false">7bb5db37-030d-4700-8df9-70d44053e9d5</guid><itunes:image href="https://artwork.captivate.fm/31e84207-14eb-405c-a17e-ae238cd14f4b/wAxiItoBT66lTE9wuLYOddO8.png"/><dc:creator><![CDATA[Contributors from Around the World]]></dc:creator><pubDate>Mon, 27 Feb 2023 16:45:00 -0400</pubDate><enclosure url="https://dts.podtrac.com/redirect.mp3/podcasts.captivate.fm/media/282f7494-6836-4d74-a5f9-3dc4ba2cd0c2/2023-02-27-505-Episode-86-converted.mp3" length="8395733" type="audio/mpeg"/><itunes:duration>11:40</itunes:duration><itunes:explicit>false</itunes:explicit><itunes:episodeType>full</itunes:episodeType><itunes:season>1</itunes:season><itunes:episode>86</itunes:episode><itunes:season>1</itunes:season><podcast:episode>86</podcast:episode><podcast:season>1</podcast:season><itunes:author>Contributors from Around the World</itunes:author></item><item><title>Episode #85 - It&apos;s 5:05, Friday, February 24, 2023</title><itunes:title>Episode #85 - It&apos;s 5:05, Friday, February 24, 2023</itunes:title><description><![CDATA[<p><strong>Hey! It's 5:05 on Friday, February 24th, 2023.</strong> From the Sourced Podcast Network in New York City, this is your host, Pokie Huang. Stories in today's episode come from <strong>Chris Hughes</strong> in Virginia Beach, Virginia, <strong>Mark Miller</strong> in Nashville, Tennessee, <strong>Katy Craig </strong>in San Diego, California, <strong>Edwin Kwan </strong>in Sydney, Australia, Olimpiu Pop in Transylvania, Romania and <strong>Marcel Brown</strong> in St. Louis, Missouri.</p><p>Let's get to it.</p><p><strong>Synopsys- Open Source Security and Risk Analysis</strong></p><p><strong>🇺🇸</strong> Chris Hughes, Virginia Beach, Virginia</p><p><a href="https://www.synopsys.com/content/dam/synopsys/sig-assets/reports/rep-ossra-2023.pdf" rel="noopener noreferrer" target="_blank">[Analyst Report] Open Source Security and Analysis Report | Synopsys</a></p><p><strong>State of Email Security Report</strong></p><p><strong>🇺🇸</strong> Mark Miller, Nashville, Tennessee</p><p><a href="https://www.mimecast.com/state-of-email-security/#main" rel="noopener noreferrer" target="_blank">The State of Email Security | Mimecast</a></p><p><br></p><p><strong>Sci Fi Magazine Flooded With ChatGPT Submissions</strong></p><p><strong>🇺🇸</strong> Katy Craig, San Diego, California</p><p><a href="https://www.fastcompany.com/90853591/chatgpt-science-fiction-short-stories-clarkesworld-magazine-submissions" rel="noopener noreferrer" target="_blank">https://www.fastcompany.com/90853591/chatgpt-science-fiction-short-stories-clarkesworld-magazine-submissions</a></p><p><a href="https://twitter.com/clarkesworld/status/1627711728245960704" rel="noopener noreferrer" target="_blank">https://twitter.com/clarkesworld/status/1627711728245960704</a></p><p><a href="https://clarkesworldmagazine.com/staff/" rel="noopener noreferrer" target="_blank">https://clarkesworldmagazine.com/staff/</a></p><p><br></p><p><strong>Atlassian Suffered Data Breach Due to Exposed Employee Credentials</strong></p><p>🇦🇺 Edwin Kwan, Sydney, Australia</p><p><a href="https://www.bleepingcomputer.com/news/security/atlassian-data-leak-caused-by-stolen-employee-credentials/" rel="noopener noreferrer" target="_blank">Atlassian data leak caused by stolen employee credentials</a></p><p><br></p><p><strong>#OneYearOfWar: Cyberwar And Disinformation At Record Rates Through History</strong></p><p><strong>🇷🇴 </strong>Olimpiu Pop, Transylvania, Romania</p><p><a href="https://krebsonsecurity.com/category/russias-war-on-ukraine/" rel="noopener noreferrer" target="_blank">Russia’s War on Ukraine – Krebs on Security</a></p><p><a href="https://securelist.com/reassessing-cyberwarfare-lessons-learned-in-2022/108328/" rel="noopener noreferrer" target="_blank">Reassessing cyberwarfare. Lessons learned in 2022 | Securelist</a></p><p><a href="https://twitter.com/search?q=%23UkraineWar" rel="noopener noreferrer" target="_blank">https://twitter.com/search?q=%23UkraineWar</a></p><p><a href="https://securelist.com/reassessing-cyberwarfare-lessons-learned-in-2022/108328/" rel="noopener noreferrer" target="_blank">Reassessing cyberwarfare. Lessons learned in 2022 | Securelist</a></p><p><a href="https://www.unrefugees.org/emergencies/ukraine/" rel="noopener noreferrer" target="_blank">Ukraine Emergency: Aid, Statistics and News | USA for UNHCR</a></p><p><a href="https://npm-stat.com/charts.html?package=node-ipc&amp;from=2022-02-22&amp;to=2023-02-24" rel="noopener noreferrer" target="_blank">download statistics for NPM packages</a></p><p><a href="https://en.wikipedia.org/wiki/Nineteen_Eighty-Four" rel="noopener noreferrer" target="_blank">https://en.wikipedia.org/wiki/Nineteen_Eighty-Four</a></p><p><a href="https://www.theguardian.com/world/2022/feb/27/anonymous-the-hacker-collective-that-has-declared-cyberwar-on-russia" rel="noopener noreferrer" target="_blank">Anonymous: the hacker collective that has declared cyberwar on Russia | Ukraine | The Guardian</a></p><p><a...]]></description><content:encoded><![CDATA[<p><strong>Hey! It's 5:05 on Friday, February 24th, 2023.</strong> From the Sourced Podcast Network in New York City, this is your host, Pokie Huang. Stories in today's episode come from <strong>Chris Hughes</strong> in Virginia Beach, Virginia, <strong>Mark Miller</strong> in Nashville, Tennessee, <strong>Katy Craig </strong>in San Diego, California, <strong>Edwin Kwan </strong>in Sydney, Australia, Olimpiu Pop in Transylvania, Romania and <strong>Marcel Brown</strong> in St. Louis, Missouri.</p><p>Let's get to it.</p><p><strong>Synopsys- Open Source Security and Risk Analysis</strong></p><p><strong>🇺🇸</strong> Chris Hughes, Virginia Beach, Virginia</p><p><a href="https://www.synopsys.com/content/dam/synopsys/sig-assets/reports/rep-ossra-2023.pdf" rel="noopener noreferrer" target="_blank">[Analyst Report] Open Source Security and Analysis Report | Synopsys</a></p><p><strong>State of Email Security Report</strong></p><p><strong>🇺🇸</strong> Mark Miller, Nashville, Tennessee</p><p><a href="https://www.mimecast.com/state-of-email-security/#main" rel="noopener noreferrer" target="_blank">The State of Email Security | Mimecast</a></p><p><br></p><p><strong>Sci Fi Magazine Flooded With ChatGPT Submissions</strong></p><p><strong>🇺🇸</strong> Katy Craig, San Diego, California</p><p><a href="https://www.fastcompany.com/90853591/chatgpt-science-fiction-short-stories-clarkesworld-magazine-submissions" rel="noopener noreferrer" target="_blank">https://www.fastcompany.com/90853591/chatgpt-science-fiction-short-stories-clarkesworld-magazine-submissions</a></p><p><a href="https://twitter.com/clarkesworld/status/1627711728245960704" rel="noopener noreferrer" target="_blank">https://twitter.com/clarkesworld/status/1627711728245960704</a></p><p><a href="https://clarkesworldmagazine.com/staff/" rel="noopener noreferrer" target="_blank">https://clarkesworldmagazine.com/staff/</a></p><p><br></p><p><strong>Atlassian Suffered Data Breach Due to Exposed Employee Credentials</strong></p><p>🇦🇺 Edwin Kwan, Sydney, Australia</p><p><a href="https://www.bleepingcomputer.com/news/security/atlassian-data-leak-caused-by-stolen-employee-credentials/" rel="noopener noreferrer" target="_blank">Atlassian data leak caused by stolen employee credentials</a></p><p><br></p><p><strong>#OneYearOfWar: Cyberwar And Disinformation At Record Rates Through History</strong></p><p><strong>🇷🇴 </strong>Olimpiu Pop, Transylvania, Romania</p><p><a href="https://krebsonsecurity.com/category/russias-war-on-ukraine/" rel="noopener noreferrer" target="_blank">Russia’s War on Ukraine – Krebs on Security</a></p><p><a href="https://securelist.com/reassessing-cyberwarfare-lessons-learned-in-2022/108328/" rel="noopener noreferrer" target="_blank">Reassessing cyberwarfare. Lessons learned in 2022 | Securelist</a></p><p><a href="https://twitter.com/search?q=%23UkraineWar" rel="noopener noreferrer" target="_blank">https://twitter.com/search?q=%23UkraineWar</a></p><p><a href="https://securelist.com/reassessing-cyberwarfare-lessons-learned-in-2022/108328/" rel="noopener noreferrer" target="_blank">Reassessing cyberwarfare. Lessons learned in 2022 | Securelist</a></p><p><a href="https://www.unrefugees.org/emergencies/ukraine/" rel="noopener noreferrer" target="_blank">Ukraine Emergency: Aid, Statistics and News | USA for UNHCR</a></p><p><a href="https://npm-stat.com/charts.html?package=node-ipc&amp;from=2022-02-22&amp;to=2023-02-24" rel="noopener noreferrer" target="_blank">download statistics for NPM packages</a></p><p><a href="https://en.wikipedia.org/wiki/Nineteen_Eighty-Four" rel="noopener noreferrer" target="_blank">https://en.wikipedia.org/wiki/Nineteen_Eighty-Four</a></p><p><a href="https://www.theguardian.com/world/2022/feb/27/anonymous-the-hacker-collective-that-has-declared-cyberwar-on-russia" rel="noopener noreferrer" target="_blank">Anonymous: the hacker collective that has declared cyberwar on Russia | Ukraine | The Guardian</a></p><p><a href="https://www.bleepingcomputer.com/news/security/ukraine-links-data-wiping-attack-on-news-agency-to-russian-hackers/" rel="noopener noreferrer" target="_blank">Ukraine links data-wiping attack on news agency to Russian hackers</a></p><p><a href="https://www.bleepingcomputer.com/news/security/ukraine-says-russian-hackers-backdoored-govt-websites-in-2021/" rel="noopener noreferrer" target="_blank">Ukraine says Russian hackers backdoored govt websites in 2021</a></p><p><a href="https://www.wired.com/story/ukraine-russia-wiper-malware/" rel="noopener noreferrer" target="_blank">Ukraine Suffered More Wiper Malware in 2022 Than Anywhere, Ever | WIRED</a></p><p><a href="https://www.europarl.europa.eu/doceo/document/E-9-2023-000475_EN.html" rel="noopener noreferrer" target="_blank">https://www.europarl.europa.eu/doceo/document/E-9-2023-000475_EN.html</a></p><p><a href="https://www.reuters.com/world/europe/moldova-dismisses-russian-report-ukraine-plot-over-transdniestria-2023-02-23/" rel="noopener noreferrer" target="_blank">Moldova dismisses Russia report of Ukraine plot over Transdniestria, Moscow vows response | Reuters</a></p><p><a href="https://www.nytimes.com/2023/02/22/world/europe/russia-ukraine-war-rally.html" rel="noopener noreferrer" target="_blank">Inside Putin’s Celebration of War - The New York Times</a></p><p><a href="https://krebsonsecurity.com/category/russias-war-on-ukraine/" rel="noopener noreferrer" target="_blank">Russia’s War on Ukraine – Krebs on Security</a></p><p><br></p><p><strong>This Day In Tech History 02-24</strong></p><p><strong>This Day In Tech History 02-25</strong></p><p><strong>🇺🇸</strong> Marcel Brown, St. Louis, Missouri</p><p><a href="https://thisdayintechhistory.com/02/24" rel="noopener noreferrer" target="_blank">https://thisdayintechhistory.com/02/24</a></p><p><a href="https://thisdayintechhistory.com/02/25" rel="noopener noreferrer" target="_blank">https://thisdayintechhistory.com/02/25</a></p>]]></content:encoded><link><![CDATA[https://3zozb9fxlbueipjyapmaas.captivate.fm/episode/episode-85-its-5-05-friday-february-24-2023]]></link><guid isPermaLink="false">0d21da3c-58b9-40ac-8845-38e3fbffc2f1</guid><itunes:image href="https://artwork.captivate.fm/c8eaf312-ea65-4eea-a98b-96f32157ba44/J-br6FG3-qCBIIVhVUcyDmEk.png"/><dc:creator><![CDATA[Contributors from Around the World]]></dc:creator><pubDate>Fri, 24 Feb 2023 16:45:00 -0400</pubDate><enclosure url="https://dts.podtrac.com/redirect.mp3/podcasts.captivate.fm/media/c616dbf2-8896-45e9-910c-ffd7aeddc16f/2023-02-24-505-Episode-85-u-converted.mp3" length="11226989" type="audio/mpeg"/><itunes:duration>15:36</itunes:duration><itunes:explicit>false</itunes:explicit><itunes:episodeType>full</itunes:episodeType><itunes:season>1</itunes:season><itunes:episode>85</itunes:episode><itunes:season>1</itunes:season><podcast:episode>85</podcast:episode><podcast:season>1</podcast:season><itunes:author>Contributors from Around the World</itunes:author></item><item><title>Episode #84 - It&apos;s 5:05, Thursday, February 23, 2023</title><itunes:title>Episode #84 - It&apos;s 5:05, Thursday, February 23, 2023</itunes:title><description><![CDATA[<p><strong>Hey, it's 5:05 on Thursday, February 23rd, 2023</strong>. From the Sourced Podcast Network in New York City, this is your host, Pokie Huang. Stories in today's episode come from <strong>Derek Weeks</strong> in Bethesda, Maryland, <strong>Katy Craig</strong> in San Diego, California, <strong>Edwin Kwan</strong> in Sydney, Australia, <strong>Trac Bannon</strong> in Camp Hill, Pennsylvania, and <strong>Marcel Brown</strong> in St. Louis, Missouri.&nbsp;</p><p>Let's get to it!</p><p><strong>Coinbase Is Breached</strong></p><p><strong>🇺🇸 </strong>Derek Weeks, Bethesda, Maryland</p><p><a href="https://nakedsecurity.sophos.com/2023/02/21/coinbase-breached-by-social-engineers-employee-data-stolen/" rel="noopener noreferrer" target="_blank">Coinbase breached by social engineers, employee data stolen – Naked Security</a></p><p><strong>AI Breaks Quantum Encryption</strong></p><p><strong>🇺🇸</strong> Katy Craig, San Diego, California</p><p><a href="https://eprint.iacr.org/2022/1713.pdf" rel="noopener noreferrer" target="_blank">https://eprint.iacr.org/2022/1713.pdf</a></p><p><a href="https://www.securityweek.com/cyber-insights-2023-quantum-computing-and-the-coming-cryptopocalypse/" rel="noopener noreferrer" target="_blank">https://www.securityweek.com/cyber-insights-2023-quantum-computing-and-the-coming-cryptopocalypse/</a></p><p><a href="https://www.securityweek.com/ai-helps-crack-a-nist-recommended-post-quantum-encryption-algorithm/" rel="noopener noreferrer" target="_blank">https://www.securityweek.com/ai-helps-crack-a-nist-recommended-post-quantum-encryption-algorithm/</a></p><p><br></p><p><strong>NSA Best Practices for Securing Your Home Network</strong></p><p>🇦🇺 Edwin Kwan, Sydney, Australia</p><p><a href="https://media.defense.gov/2023/Feb/22/2003165170/-1/-1/0/CSI_BEST_PRACTICES_FOR_SECURING_YOUR_HOME_NETWORK.PDF" rel="noopener noreferrer" target="_blank">Best Practices for Securing Your Home Network</a></p><p><a href="https://www.bleepingcomputer.com/news/security/nsa-shares-guidance-on-how-to-secure-your-home-network/" rel="noopener noreferrer" target="_blank">NSA shares guidance on how to secure your home network</a></p><p><br></p><p><strong>Ethical Hacker Finds Access To Sensitive DOD Email.</strong></p><p><strong>🇺🇸</strong> Tracy (Trac) Bannon, Camp Hill, Pennsylvania</p><p><a href="https://techcrunch.com/2023/02/21/sensitive-united-states-military-emails-spill-online/" rel="noopener noreferrer" target="_blank">https://techcrunch.com/2023/02/21/sensitive-united-states-military-emails-spill-online/</a></p><p><a href="https://www.shodan.io/" rel="noopener noreferrer" target="_blank">https://www.shodan.io/</a></p><p><br></p><p><strong>This Day In Tech History 02-23</strong></p><p><strong>🇺🇸</strong> Marcel Brown, St. Louis, Missouri</p><p><a href="https://thisdayintechhistory.com/02/23" rel="noopener noreferrer" target="_blank">https://thisdayintechhistory.com/02/23</a></p><p><br></p>]]></description><content:encoded><![CDATA[<p><strong>Hey, it's 5:05 on Thursday, February 23rd, 2023</strong>. From the Sourced Podcast Network in New York City, this is your host, Pokie Huang. Stories in today's episode come from <strong>Derek Weeks</strong> in Bethesda, Maryland, <strong>Katy Craig</strong> in San Diego, California, <strong>Edwin Kwan</strong> in Sydney, Australia, <strong>Trac Bannon</strong> in Camp Hill, Pennsylvania, and <strong>Marcel Brown</strong> in St. Louis, Missouri.&nbsp;</p><p>Let's get to it!</p><p><strong>Coinbase Is Breached</strong></p><p><strong>🇺🇸 </strong>Derek Weeks, Bethesda, Maryland</p><p><a href="https://nakedsecurity.sophos.com/2023/02/21/coinbase-breached-by-social-engineers-employee-data-stolen/" rel="noopener noreferrer" target="_blank">Coinbase breached by social engineers, employee data stolen – Naked Security</a></p><p><strong>AI Breaks Quantum Encryption</strong></p><p><strong>🇺🇸</strong> Katy Craig, San Diego, California</p><p><a href="https://eprint.iacr.org/2022/1713.pdf" rel="noopener noreferrer" target="_blank">https://eprint.iacr.org/2022/1713.pdf</a></p><p><a href="https://www.securityweek.com/cyber-insights-2023-quantum-computing-and-the-coming-cryptopocalypse/" rel="noopener noreferrer" target="_blank">https://www.securityweek.com/cyber-insights-2023-quantum-computing-and-the-coming-cryptopocalypse/</a></p><p><a href="https://www.securityweek.com/ai-helps-crack-a-nist-recommended-post-quantum-encryption-algorithm/" rel="noopener noreferrer" target="_blank">https://www.securityweek.com/ai-helps-crack-a-nist-recommended-post-quantum-encryption-algorithm/</a></p><p><br></p><p><strong>NSA Best Practices for Securing Your Home Network</strong></p><p>🇦🇺 Edwin Kwan, Sydney, Australia</p><p><a href="https://media.defense.gov/2023/Feb/22/2003165170/-1/-1/0/CSI_BEST_PRACTICES_FOR_SECURING_YOUR_HOME_NETWORK.PDF" rel="noopener noreferrer" target="_blank">Best Practices for Securing Your Home Network</a></p><p><a href="https://www.bleepingcomputer.com/news/security/nsa-shares-guidance-on-how-to-secure-your-home-network/" rel="noopener noreferrer" target="_blank">NSA shares guidance on how to secure your home network</a></p><p><br></p><p><strong>Ethical Hacker Finds Access To Sensitive DOD Email.</strong></p><p><strong>🇺🇸</strong> Tracy (Trac) Bannon, Camp Hill, Pennsylvania</p><p><a href="https://techcrunch.com/2023/02/21/sensitive-united-states-military-emails-spill-online/" rel="noopener noreferrer" target="_blank">https://techcrunch.com/2023/02/21/sensitive-united-states-military-emails-spill-online/</a></p><p><a href="https://www.shodan.io/" rel="noopener noreferrer" target="_blank">https://www.shodan.io/</a></p><p><br></p><p><strong>This Day In Tech History 02-23</strong></p><p><strong>🇺🇸</strong> Marcel Brown, St. Louis, Missouri</p><p><a href="https://thisdayintechhistory.com/02/23" rel="noopener noreferrer" target="_blank">https://thisdayintechhistory.com/02/23</a></p><p><br></p>]]></content:encoded><link><![CDATA[https://3zozb9fxlbueipjyapmaas.captivate.fm/episode/episode-84-its-5-05-thursday-february-23-2023]]></link><guid isPermaLink="false">b9e0d521-38ac-499d-9e7c-2e25c6d7d3f8</guid><itunes:image href="https://artwork.captivate.fm/42fff299-ab8a-4d1c-8576-4ff6748be86d/fCR5KV0yT37gbeG55ZF-QUWK.png"/><dc:creator><![CDATA[Contributors from Around the World]]></dc:creator><pubDate>Thu, 23 Feb 2023 16:45:00 -0400</pubDate><enclosure url="https://dts.podtrac.com/redirect.mp3/podcasts.captivate.fm/media/84bc7e2f-165d-44db-b306-868113e3ea9d/2023-02-23-505-Episode-84-converted.mp3" length="9733307" type="audio/mpeg"/><itunes:duration>13:31</itunes:duration><itunes:explicit>false</itunes:explicit><itunes:episodeType>full</itunes:episodeType><itunes:season>1</itunes:season><itunes:episode>84</itunes:episode><itunes:season>1</itunes:season><podcast:episode>84</podcast:episode><podcast:season>1</podcast:season><itunes:author>Contributors from Around the World</itunes:author></item><item><title>Episode #83 - It&apos;s 5:05, Wednesday, February 22, 2023</title><itunes:title>Episode #83 - It&apos;s 5:05, Wednesday, February 22, 2023</itunes:title><description><![CDATA[<p><strong>Hey! it's 5:05 on Wednesday, February 22nd, 2023</strong>. From the Sourced Podcast Network in New York City, this is your host, Pokie Huang. Stories in today's episode come from <strong>Ian Garrett</strong> in Arlington, Virginia, <strong>Katy Craig</strong> in San Diego, California, <strong>Edwin Kwan</strong> in Sydney, Australia, <strong>Olimpiu Pop</strong> in Transylvania, Romania, and <strong>Marcel Brown</strong> in St. Louis, Missouri. </p><p>Let's get to it!</p><p><strong><span class="ql-cursor">﻿</span>Accidental Human Error Causes US Military Email Spillage</strong></p><p><strong>🇺🇸 </strong>Ian Garrett, Arlington, Virginia</p><p><a href="https://techcrunch.com/2023/02/21/sensitive-united-states-military-emails-spill-online/" rel="noopener noreferrer" target="_blank">Sensitive US military emails spill online | TechCrunch</a></p><p><br></p><p><strong>US tries to convince nations to eschew AI in nukes</strong></p><p><strong>🇺🇸</strong> Katy Craig, San Diego, California</p><p><a href="https://www.state.gov/political-declaration-on-responsible-military-use-of-artificial-intelligence-and-autonomy/" rel="noopener noreferrer" target="_blank">Political Declaration on Responsible Military Use of Artificial Intelligence and Autonomy - United States Department of State</a></p><p><br></p><p><strong>10 Signs You're Being Scammed</strong></p><p>🇦🇺 Edwin Kwan, Sydney, Australia</p><p><a href="https://www.welivesecurity.com/2023/02/15/10-signs-scammers-sights/" rel="noopener noreferrer" target="_blank">10 signs that scammers have you in their sights | WeLiveSecurity</a></p><p><br></p><p><strong>Fight fire with fire: How Generative AI Supports Defenders Too</strong></p><p><strong>🇷🇴 </strong>Olimpiu Pop, Transylvania, Romania</p><p><a href="https://venturebeat.com/security/how-blackbird-ai-is-striking-back-at-chatgpt-and-ai-based-attacks/" rel="noopener noreferrer" target="_blank">How Blackbird AI is striking back at ChatGPT and AI-based attacks | VentureBeat</a></p><p><a href="https://orca.security/" rel="noopener noreferrer" target="_blank">Orca Security</a></p><p><a href="https://www.armosec.io/" rel="noopener noreferrer" target="_blank">ARMO</a></p><p><br></p><p><strong>This Day In Tech History 02-22</strong></p><p><strong>🇺🇸</strong> Marcel Brown, St. Louis, Missouri</p><p><a href="https://thisdayintechhistory.com/02/22" rel="noopener noreferrer" target="_blank">https://thisdayintechhistory.com/02/22</a></p>]]></description><content:encoded><![CDATA[<p><strong>Hey! it's 5:05 on Wednesday, February 22nd, 2023</strong>. From the Sourced Podcast Network in New York City, this is your host, Pokie Huang. Stories in today's episode come from <strong>Ian Garrett</strong> in Arlington, Virginia, <strong>Katy Craig</strong> in San Diego, California, <strong>Edwin Kwan</strong> in Sydney, Australia, <strong>Olimpiu Pop</strong> in Transylvania, Romania, and <strong>Marcel Brown</strong> in St. Louis, Missouri. </p><p>Let's get to it!</p><p><strong><span class="ql-cursor">﻿</span>Accidental Human Error Causes US Military Email Spillage</strong></p><p><strong>🇺🇸 </strong>Ian Garrett, Arlington, Virginia</p><p><a href="https://techcrunch.com/2023/02/21/sensitive-united-states-military-emails-spill-online/" rel="noopener noreferrer" target="_blank">Sensitive US military emails spill online | TechCrunch</a></p><p><br></p><p><strong>US tries to convince nations to eschew AI in nukes</strong></p><p><strong>🇺🇸</strong> Katy Craig, San Diego, California</p><p><a href="https://www.state.gov/political-declaration-on-responsible-military-use-of-artificial-intelligence-and-autonomy/" rel="noopener noreferrer" target="_blank">Political Declaration on Responsible Military Use of Artificial Intelligence and Autonomy - United States Department of State</a></p><p><br></p><p><strong>10 Signs You're Being Scammed</strong></p><p>🇦🇺 Edwin Kwan, Sydney, Australia</p><p><a href="https://www.welivesecurity.com/2023/02/15/10-signs-scammers-sights/" rel="noopener noreferrer" target="_blank">10 signs that scammers have you in their sights | WeLiveSecurity</a></p><p><br></p><p><strong>Fight fire with fire: How Generative AI Supports Defenders Too</strong></p><p><strong>🇷🇴 </strong>Olimpiu Pop, Transylvania, Romania</p><p><a href="https://venturebeat.com/security/how-blackbird-ai-is-striking-back-at-chatgpt-and-ai-based-attacks/" rel="noopener noreferrer" target="_blank">How Blackbird AI is striking back at ChatGPT and AI-based attacks | VentureBeat</a></p><p><a href="https://orca.security/" rel="noopener noreferrer" target="_blank">Orca Security</a></p><p><a href="https://www.armosec.io/" rel="noopener noreferrer" target="_blank">ARMO</a></p><p><br></p><p><strong>This Day In Tech History 02-22</strong></p><p><strong>🇺🇸</strong> Marcel Brown, St. Louis, Missouri</p><p><a href="https://thisdayintechhistory.com/02/22" rel="noopener noreferrer" target="_blank">https://thisdayintechhistory.com/02/22</a></p>]]></content:encoded><link><![CDATA[https://3zozb9fxlbueipjyapmaas.captivate.fm/episode/episode-83-its-5-05-wednesday-february-22-2023]]></link><guid isPermaLink="false">303c2e46-184a-43be-a136-349d73296609</guid><itunes:image href="https://artwork.captivate.fm/c3f8df14-7ed8-42c7-a7c3-6675a2876700/HqcpxzMeUkakZILonqbu8jJY.png"/><dc:creator><![CDATA[Contributors from Around the World]]></dc:creator><pubDate>Wed, 22 Feb 2023 16:45:00 -0400</pubDate><enclosure url="https://dts.podtrac.com/redirect.mp3/podcasts.captivate.fm/media/dbf9052d-517a-412c-b453-b16300fd6250/2023-02-22-505-Episode-83-converted.mp3" length="6405203" type="audio/mpeg"/><itunes:duration>08:54</itunes:duration><itunes:explicit>false</itunes:explicit><itunes:episodeType>full</itunes:episodeType><itunes:season>1</itunes:season><itunes:episode>83</itunes:episode><itunes:season>1</itunes:season><podcast:episode>83</podcast:episode><podcast:season>1</podcast:season><itunes:author>Contributors from Around the World</itunes:author></item><item><title>Special Episode - It’s 5:05, Deming - AI vs John Willis Part 2</title><itunes:title>Special Episode - It’s 5:05, Deming - AI vs John Willis Part 2</itunes:title><description><![CDATA[<p>This is part two of a special series from the Sourced Podcast Network, home of "It's 5:05!". I'm Mark Miller, founder and executive producer. In part one of this series, John Willis and I asked three AI engines, a simple request, "Summarize the direct connections between Edwards Deming and DevOps". You can hear that in the February 8th episode on 505updates.com.</p><p>In today's session, we're going to ask a more complex question: "Who created the economic miracle in Japan?" Were posing this to ChatGPT, Jasper, and perplexity with John, evaluating and reacting to the answers . We were surprised if not shocked at some of the responses that came back.</p><p>John's reaction, "This ain't right. It can't be right.", led us down a path of realization when it comes to content delivery from these engines. Stay with us as we explore and react to some surprising outcomes to our request.</p>]]></description><content:encoded><![CDATA[<p>This is part two of a special series from the Sourced Podcast Network, home of "It's 5:05!". I'm Mark Miller, founder and executive producer. In part one of this series, John Willis and I asked three AI engines, a simple request, "Summarize the direct connections between Edwards Deming and DevOps". You can hear that in the February 8th episode on 505updates.com.</p><p>In today's session, we're going to ask a more complex question: "Who created the economic miracle in Japan?" Were posing this to ChatGPT, Jasper, and perplexity with John, evaluating and reacting to the answers . We were surprised if not shocked at some of the responses that came back.</p><p>John's reaction, "This ain't right. It can't be right.", led us down a path of realization when it comes to content delivery from these engines. Stay with us as we explore and react to some surprising outcomes to our request.</p>]]></content:encoded><link><![CDATA[https://3zozb9fxlbueipjyapmaas.captivate.fm/episode/special-episode-its-5-05-deming-ai-vs-john-willis-part-2]]></link><guid isPermaLink="false">fdf74b54-9b82-4297-8c47-a72fad058e61</guid><itunes:image href="https://artwork.captivate.fm/d1182a29-beaa-4e1b-b18f-7a5f6ce5403a/v5Q6zfANVjCQwnkQ42y5cA5t.png"/><dc:creator><![CDATA[Contributors from Around the World]]></dc:creator><pubDate>Wed, 22 Feb 2023 16:45:00 -0400</pubDate><enclosure url="https://dts.podtrac.com/redirect.mp3/podcasts.captivate.fm/media/5e8183a1-9223-4200-84e5-2a94667237c8/Deming-AI-vs-Willis-Part-2-converted.mp3" length="19700172" type="audio/mpeg"/><itunes:duration>20:31</itunes:duration><itunes:explicit>false</itunes:explicit><itunes:episodeType>full</itunes:episodeType><itunes:season>1</itunes:season><itunes:season>1</itunes:season><podcast:season>1</podcast:season><itunes:author>Contributors from Around the World</itunes:author></item><item><title>Episode #82 - It&apos;s 5:05, Tuesday, February 21, 2023</title><itunes:title>Episode #82 - It&apos;s 5:05, Tuesday, February 21, 2023</itunes:title><description><![CDATA[<p><strong>Hey! It's 5:05 on Tuesday, February 21st, 2023.</strong> From the Sourced Podcast Network in New York City, this is your host, Pokie Huang. Stories in today's episode come from <strong>Katy Craig </strong>in San Diego, California, <strong>Kadi Grigg</strong> in Alexandria, Virginia, <strong>Edwin Kwan </strong>in Sydney, Australia and <strong>Marcel Brown</strong> in St. Louis, Missouri.</p><p>Let's get to it.</p><p><strong>Experts Expect Election Meddling</strong></p><p><strong>🇺🇸</strong> Katy Craig, San Diego, California</p><p><a href="https://www.securityweek.com/security-experts-warn-of-foreign-cyber-threat-to-2024-voting/" rel="noopener noreferrer" target="_blank">Security Experts Warn of Foreign Cyber Threat to 2024 Voting</a></p><p><strong>The Aging US Energy Grid</strong></p><p><strong>🇺🇸</strong> Kadi Grigg, Alexandria, Virginia</p><p><a href="https://www.forbes.com/sites/chuckbrooks/2023/02/15/3-alarming-threats-to-the-us-energy-grid--cyber-physical-and-existential-events/?sh=64442955101a" rel="noopener noreferrer" target="_blank">3 Alarming Threats To The U.S. Energy Grid – Cyber, Physical, And Existential Events</a></p><p><a href="https://www.atlanticcouncil.org/in-depth-research-reports/report/open-source-software-as-infrastructure/" rel="noopener noreferrer" target="_blank">Avoiding the success trap: Toward policy for open-source software as infrastructure - Atlantic Council</a>&nbsp;</p><p><a href="https://www.fordfoundation.org/work/learning/research-reports/roads-and-bridges-the-unseen-labor-behind-our-digital-infrastructure/" rel="noopener noreferrer" target="_blank">Roads and Bridges: The Unseen Labor Behind Our Digital Infrastructure / Ford Foundation</a></p><p><a href="https://www.energy.gov/sites/default/files/2022-01/Transmission%20NOI%20final%20for%20web_1.pdf" rel="noopener noreferrer" target="_blank">This is a prepublication version of a notice of intent signed by the Secretary of Energy on January 11, 2022 that is pending pub</a>&nbsp;</p><p><a href="https://www.nextgov.com/emerging-tech/2022/01/energy-launches-new-program-overhaul-us-electrical-grid/360667/" rel="noopener noreferrer" target="_blank">Energy Launches New Program To Overhaul the U.S. Electrical Grid - Nextgov</a> </p><p><br></p><p><strong>GitHub CoPilot AI Model Helping Secure Code</strong></p><p>🇦🇺 Edwin Kwan, Sydney, Australia</p><p><a href="https://www.bleepingcomputer.com/news/security/github-copilot-update-stops-ai-model-from-revealing-secrets/" rel="noopener noreferrer" target="_blank">GitHub Copilot update stops AI model from revealing secrets</a></p><p><br></p><p><strong>This Day In Tech History 02-21</strong></p><p><strong>🇺🇸</strong> Marcel Brown, St. Louis, Missouri</p><p><a href="https://thisdayintechhistory.com/02/21" rel="noopener noreferrer" target="_blank">https://thisdayintechhistory.com/02/21</a></p><p><br></p>]]></description><content:encoded><![CDATA[<p><strong>Hey! It's 5:05 on Tuesday, February 21st, 2023.</strong> From the Sourced Podcast Network in New York City, this is your host, Pokie Huang. Stories in today's episode come from <strong>Katy Craig </strong>in San Diego, California, <strong>Kadi Grigg</strong> in Alexandria, Virginia, <strong>Edwin Kwan </strong>in Sydney, Australia and <strong>Marcel Brown</strong> in St. Louis, Missouri.</p><p>Let's get to it.</p><p><strong>Experts Expect Election Meddling</strong></p><p><strong>🇺🇸</strong> Katy Craig, San Diego, California</p><p><a href="https://www.securityweek.com/security-experts-warn-of-foreign-cyber-threat-to-2024-voting/" rel="noopener noreferrer" target="_blank">Security Experts Warn of Foreign Cyber Threat to 2024 Voting</a></p><p><strong>The Aging US Energy Grid</strong></p><p><strong>🇺🇸</strong> Kadi Grigg, Alexandria, Virginia</p><p><a href="https://www.forbes.com/sites/chuckbrooks/2023/02/15/3-alarming-threats-to-the-us-energy-grid--cyber-physical-and-existential-events/?sh=64442955101a" rel="noopener noreferrer" target="_blank">3 Alarming Threats To The U.S. Energy Grid – Cyber, Physical, And Existential Events</a></p><p><a href="https://www.atlanticcouncil.org/in-depth-research-reports/report/open-source-software-as-infrastructure/" rel="noopener noreferrer" target="_blank">Avoiding the success trap: Toward policy for open-source software as infrastructure - Atlantic Council</a>&nbsp;</p><p><a href="https://www.fordfoundation.org/work/learning/research-reports/roads-and-bridges-the-unseen-labor-behind-our-digital-infrastructure/" rel="noopener noreferrer" target="_blank">Roads and Bridges: The Unseen Labor Behind Our Digital Infrastructure / Ford Foundation</a></p><p><a href="https://www.energy.gov/sites/default/files/2022-01/Transmission%20NOI%20final%20for%20web_1.pdf" rel="noopener noreferrer" target="_blank">This is a prepublication version of a notice of intent signed by the Secretary of Energy on January 11, 2022 that is pending pub</a>&nbsp;</p><p><a href="https://www.nextgov.com/emerging-tech/2022/01/energy-launches-new-program-overhaul-us-electrical-grid/360667/" rel="noopener noreferrer" target="_blank">Energy Launches New Program To Overhaul the U.S. Electrical Grid - Nextgov</a> </p><p><br></p><p><strong>GitHub CoPilot AI Model Helping Secure Code</strong></p><p>🇦🇺 Edwin Kwan, Sydney, Australia</p><p><a href="https://www.bleepingcomputer.com/news/security/github-copilot-update-stops-ai-model-from-revealing-secrets/" rel="noopener noreferrer" target="_blank">GitHub Copilot update stops AI model from revealing secrets</a></p><p><br></p><p><strong>This Day In Tech History 02-21</strong></p><p><strong>🇺🇸</strong> Marcel Brown, St. Louis, Missouri</p><p><a href="https://thisdayintechhistory.com/02/21" rel="noopener noreferrer" target="_blank">https://thisdayintechhistory.com/02/21</a></p><p><br></p>]]></content:encoded><link><![CDATA[https://3zozb9fxlbueipjyapmaas.captivate.fm/episode/episode-82-its-5-05-tuesday-february-21-2023]]></link><guid isPermaLink="false">104be715-1877-4976-90c5-a7520c512d72</guid><itunes:image href="https://artwork.captivate.fm/0dbbd447-e857-41cf-b4cc-5104c53e5a16/s_1V6IHyFm1zmCcI7jL-oLpT.png"/><dc:creator><![CDATA[Contributors from Around the World]]></dc:creator><pubDate>Tue, 21 Feb 2023 16:45:00 -0400</pubDate><enclosure url="https://dts.podtrac.com/redirect.mp3/podcasts.captivate.fm/media/cc0f2d37-55c0-4d73-a092-37ef038426bd/2023-02-21-505-Episode-82-converted.mp3" length="5743782" type="audio/mpeg"/><itunes:duration>07:59</itunes:duration><itunes:explicit>false</itunes:explicit><itunes:episodeType>full</itunes:episodeType><itunes:season>1</itunes:season><itunes:episode>82</itunes:episode><itunes:season>1</itunes:season><podcast:episode>82</podcast:episode><podcast:season>1</podcast:season><itunes:author>Contributors from Around the World</itunes:author></item><item><title>Episode #81 - It&apos;s 5:05, Monday, February 20, 2023</title><itunes:title>Episode #81 - It&apos;s 5:05, Monday, February 20, 2023</itunes:title><description><![CDATA[<p><strong>Hey! It's 5:05 on Monday, February 20th, 2023.</strong> From the Sourced Podcast Network in New York City, this is your host, Pokie Huang. Stories in today's episode come from <strong>Edwin Kwan</strong> in Sydney, Australia, <strong>Trac Bannon</strong> in Camp Hill, Pennsylvania, <strong>Katy Craig</strong> in San Diego, California, <strong>Olimpiu Pop</strong> in Transylvania, Romania, <strong>Marcel Brown</strong> in St. Louis, Missouri.</p><p>Let's get to it.</p><p><strong>GoDaddy Multi Year Security Breach</strong></p><p>🇦🇺 Edwin Kwan, Sydney, Australia</p><p><a href="https://aboutus.godaddy.net/newsroom/company-news/news-details/2023/Statement-on-recent-website-redirect-issues/default.aspx" rel="noopener noreferrer" target="_blank">GoDaddy Inc. - Statement on recent website redirect issues</a></p><p><a href="https://www.bleepingcomputer.com/news/security/godaddy-hackers-stole-source-code-installed-malware-in-multi-year-breach/" rel="noopener noreferrer" target="_blank">GoDaddy: Hackers stole source code, installed malware in multi-year breach</a></p><p><br></p><p><strong>Twitter’s Decision To Limit SMS-based 2FA</strong></p><p><strong>🇺🇸</strong> Tracy (Trac) Bannon, Camp Hill, Pennsylvania</p><p><a href="https://thehackernews.com/2023/02/twitter-limits-sms-based-2-factor.html" rel="noopener noreferrer" target="_blank">Twitter Limits SMS-Based 2-Factor Authentication to Blue Subscribers Only</a></p><p><a href="https://thenextweb.com/news/twitter-suspends-sms-feature-after-ceo-dorseys-account-was-hi-jack-ed" rel="noopener noreferrer" target="_blank">Twitter suspends SMS feature after CEO Dorsey’s account was hi-Jack-ed</a></p><p><a href="https://youtu.be/DTug00deTDc" rel="noopener noreferrer" target="_blank">Another day another breach: T-Mobile w Trac Bannon - It’s 5:05, Monday, January 30, 2023</a></p><p><a href="https://transparency.twitter.com/en/reports/account-security.html#2021-jul-dec" rel="noopener noreferrer" target="_blank">Account Security - Twitter Transparency Center</a></p><p><br></p><p><strong>DOD CIO’s New Workforce Manual</strong></p><p><strong>🇺🇸</strong> Katy Craig, San Diego, California</p><p><a href="https://www.defense.gov/News/Releases/Release/Article/3299971/dod-cio-issues-dod-manual-8140/" rel="noopener noreferrer" target="_blank">DoD CIO Issues DoD Manual 8140</a></p><p><br></p><p><strong>The German Aero Industry Problems Are Not Yet Over: DDoS Takes Down The Sites Of Düsseldorf, Nüremberg, Erfurt-Weimar and Dortmund Airports</strong></p><p>🇷🇴 Olimpiu Pop, Transylvania, Romania</p><p><a href="https://www.dw.com/en/german-airport-websites-down-in-possible-hacker-attack/a-64724769" rel="noopener noreferrer" target="_blank">German airport websites down in possible hacker attack&nbsp;</a></p><p><a href="https://www.dw.com/en/lufthansa-system-failure-causes-massive-travel-chaos/a-64705780" rel="noopener noreferrer" target="_blank">Lufthansa system failure causes massive travel chaos&nbsp;</a></p><p><a href="https://www.adv.aero/" rel="noopener noreferrer" target="_blank">Flughafenverband ADV</a></p><p><a href="https://www.dw.com/en/how-devastating-is-a-ddos-cyberattack/a-61748267" rel="noopener noreferrer" target="_blank">How devastating is a DDoS cyberattack?</a></p><p><br></p><p><strong>This Day In Tech History 02-19</strong></p><p><strong>This Day In Tech History 02-20</strong></p><p><strong>🇺🇸</strong> Marcel Brown, St. Louis, Missouri</p><p><a href="https://thisdayintechhistory.com/02/19" rel="noopener noreferrer" target="_blank">https://thisdayintechhistory.com/02/19</a></p><p><a href="https://thisdayintechhistory.com/02/20" rel="noopener noreferrer" target="_blank">https://thisdayintechhistory.com/02/20</a></p>]]></description><content:encoded><![CDATA[<p><strong>Hey! It's 5:05 on Monday, February 20th, 2023.</strong> From the Sourced Podcast Network in New York City, this is your host, Pokie Huang. Stories in today's episode come from <strong>Edwin Kwan</strong> in Sydney, Australia, <strong>Trac Bannon</strong> in Camp Hill, Pennsylvania, <strong>Katy Craig</strong> in San Diego, California, <strong>Olimpiu Pop</strong> in Transylvania, Romania, <strong>Marcel Brown</strong> in St. Louis, Missouri.</p><p>Let's get to it.</p><p><strong>GoDaddy Multi Year Security Breach</strong></p><p>🇦🇺 Edwin Kwan, Sydney, Australia</p><p><a href="https://aboutus.godaddy.net/newsroom/company-news/news-details/2023/Statement-on-recent-website-redirect-issues/default.aspx" rel="noopener noreferrer" target="_blank">GoDaddy Inc. - Statement on recent website redirect issues</a></p><p><a href="https://www.bleepingcomputer.com/news/security/godaddy-hackers-stole-source-code-installed-malware-in-multi-year-breach/" rel="noopener noreferrer" target="_blank">GoDaddy: Hackers stole source code, installed malware in multi-year breach</a></p><p><br></p><p><strong>Twitter’s Decision To Limit SMS-based 2FA</strong></p><p><strong>🇺🇸</strong> Tracy (Trac) Bannon, Camp Hill, Pennsylvania</p><p><a href="https://thehackernews.com/2023/02/twitter-limits-sms-based-2-factor.html" rel="noopener noreferrer" target="_blank">Twitter Limits SMS-Based 2-Factor Authentication to Blue Subscribers Only</a></p><p><a href="https://thenextweb.com/news/twitter-suspends-sms-feature-after-ceo-dorseys-account-was-hi-jack-ed" rel="noopener noreferrer" target="_blank">Twitter suspends SMS feature after CEO Dorsey’s account was hi-Jack-ed</a></p><p><a href="https://youtu.be/DTug00deTDc" rel="noopener noreferrer" target="_blank">Another day another breach: T-Mobile w Trac Bannon - It’s 5:05, Monday, January 30, 2023</a></p><p><a href="https://transparency.twitter.com/en/reports/account-security.html#2021-jul-dec" rel="noopener noreferrer" target="_blank">Account Security - Twitter Transparency Center</a></p><p><br></p><p><strong>DOD CIO’s New Workforce Manual</strong></p><p><strong>🇺🇸</strong> Katy Craig, San Diego, California</p><p><a href="https://www.defense.gov/News/Releases/Release/Article/3299971/dod-cio-issues-dod-manual-8140/" rel="noopener noreferrer" target="_blank">DoD CIO Issues DoD Manual 8140</a></p><p><br></p><p><strong>The German Aero Industry Problems Are Not Yet Over: DDoS Takes Down The Sites Of Düsseldorf, Nüremberg, Erfurt-Weimar and Dortmund Airports</strong></p><p>🇷🇴 Olimpiu Pop, Transylvania, Romania</p><p><a href="https://www.dw.com/en/german-airport-websites-down-in-possible-hacker-attack/a-64724769" rel="noopener noreferrer" target="_blank">German airport websites down in possible hacker attack&nbsp;</a></p><p><a href="https://www.dw.com/en/lufthansa-system-failure-causes-massive-travel-chaos/a-64705780" rel="noopener noreferrer" target="_blank">Lufthansa system failure causes massive travel chaos&nbsp;</a></p><p><a href="https://www.adv.aero/" rel="noopener noreferrer" target="_blank">Flughafenverband ADV</a></p><p><a href="https://www.dw.com/en/how-devastating-is-a-ddos-cyberattack/a-61748267" rel="noopener noreferrer" target="_blank">How devastating is a DDoS cyberattack?</a></p><p><br></p><p><strong>This Day In Tech History 02-19</strong></p><p><strong>This Day In Tech History 02-20</strong></p><p><strong>🇺🇸</strong> Marcel Brown, St. Louis, Missouri</p><p><a href="https://thisdayintechhistory.com/02/19" rel="noopener noreferrer" target="_blank">https://thisdayintechhistory.com/02/19</a></p><p><a href="https://thisdayintechhistory.com/02/20" rel="noopener noreferrer" target="_blank">https://thisdayintechhistory.com/02/20</a></p>]]></content:encoded><link><![CDATA[https://3zozb9fxlbueipjyapmaas.captivate.fm/episode/episode-81-its-5-05-monday-february-20-2023]]></link><guid isPermaLink="false">71570b67-67fa-45fe-88f4-c369e110231e</guid><itunes:image href="https://artwork.captivate.fm/58bbc8ec-0b94-44a5-b977-6a96b2806077/eKt9oGz51M_1I8OG6PqF82y7.png"/><dc:creator><![CDATA[Contributors from Around the World]]></dc:creator><pubDate>Mon, 20 Feb 2023 16:45:00 -0400</pubDate><enclosure url="https://dts.podtrac.com/redirect.mp3/podcasts.captivate.fm/media/485950b3-87fa-4e73-99f9-b6cc6a8c41e7/2023-02-20-505-Episode-81-converted.mp3" length="7311129" type="audio/mpeg"/><itunes:duration>10:09</itunes:duration><itunes:explicit>false</itunes:explicit><itunes:episodeType>full</itunes:episodeType><itunes:season>1</itunes:season><itunes:episode>81</itunes:episode><itunes:season>1</itunes:season><podcast:episode>81</podcast:episode><podcast:season>1</podcast:season><itunes:author>Contributors from Around the World</itunes:author></item><item><title>Episode #80 - It&apos;s 5:05, Friday, February 17, 2023</title><itunes:title>Episode #80 - It&apos;s 5:05, Friday, February 17, 2023</itunes:title><description><![CDATA[<p><strong>Hey! It’s 5:05, on Friday, February 17, 2023. </strong>From the Sourced Podcast Network in New York City, this is your host, Pokie Huang. Stories in today’s episode come from <strong>Edwin Kwan </strong>in Sydney, Australia, <strong>Trac Bannon </strong>in Camp Hill, Pennsylvania, <strong>Ian Garrett</strong> in Arlington, Virginia, <strong>Katy Craig</strong> in San Diego, California and <strong>Marcel Brown</strong> in St. Louis, Missouri.</p><p>Let’s get to it!</p><p><strong>Is Your Smart Speaker Eavesdropping?</strong></p><p>🇦🇺 Edwin Kwan, Sydney, Australia</p><p><a href="https://www.welivesecurity.com/2023/02/09/alexa-who-else-is-listening/" rel="noopener noreferrer" target="_blank">Alexa, who else is listening? | WeLiveSecurity</a></p><h3>Valentine’s Day Breakup: Goodbye Internet Explorer</h3><p><strong>🇺🇸</strong> Tracy (Trac) Bannon, Camp Hill, Pennsylvania</p><p><a href="https://www-bleepingcomputer-com.cdn.ampproject.org/c/s/www.bleepingcomputer.com/news/microsoft/microsoft-edge-update-starts-disabling-internet-explorer-11-today/amp/" rel="noopener noreferrer" target="_blank">Microsoft Edge update starts disabling Internet Explorer 11 today</a></p><p><a href="https://learn.microsoft.com/en-us/lifecycle/announcements/internet-explorer-11-end-of-support" rel="noopener noreferrer" target="_blank">Internet Explorer 11 desktop application ended support for certain operating systems - Microsoft Lifecycle</a></p><p><a href="https://www.pocket-lint.com/apps/news/microsoft/133746-what-is-microsoft-edge-the-lowdown-on-microsoft-s-windows-10-browser/" rel="noopener noreferrer" target="_blank">What is Microsoft Edge? The lowdown on Microsoft's replacement for Internet Explorer</a></p><p><strong>More Than Meets The Eye: North Korean APT Group Using JPEGs To Transfer Malware</strong></p><p><strong>🇺🇸 </strong>Ian Garrett, Arlington, Virginia</p><p><a href="https://cyware.com/news/apt37-exploits-hangul-vulnerability-with-highly-evasive-m2rat-malware-8766dc14" rel="noopener noreferrer" target="_blank">APT37 Exploits Hangul Vulnerability with Highly-Evasive M2RAT Malware | Cyware Alerts - Hacker News</a></p><p><strong>Beeping Good Malware</strong></p><p><strong>🇺🇸</strong> Katy Craig, San Diego, California</p><p><a href="https://thehackernews.com/2023/02/experts-warn-of-beep-new-evasive.html?m=1" rel="noopener noreferrer" target="_blank">Experts Warn of 'Beep' - A New Evasive Malware That Can Fly Under the Radar</a></p><p><a href="https://minerva-labs.com/blog/beepin-out-of-the-sandbox-analyzing-a-new-extremely-evasive-malware/" rel="noopener noreferrer" target="_blank">Beepin' Out of the Sandbox: Analyzing a New, Extremely Evasive Malware</a></p><p><br></p><p><strong>This Day In Tech History 02-17</strong></p><p><strong>This Day In Tech History 02-18</strong></p><p><strong>🇺🇸</strong> Marcel Brown, St. Louis, Missouri</p><p><a href="https://thisdayintechhistory.com/02/17" rel="noopener noreferrer" target="_blank">This Day In Tech History 02-17</a></p><p><a href="https://thisdayintechhistory.com/02/18" rel="noopener noreferrer" target="_blank">This Day In Tech History 02-18</a></p>]]></description><content:encoded><![CDATA[<p><strong>Hey! It’s 5:05, on Friday, February 17, 2023. </strong>From the Sourced Podcast Network in New York City, this is your host, Pokie Huang. Stories in today’s episode come from <strong>Edwin Kwan </strong>in Sydney, Australia, <strong>Trac Bannon </strong>in Camp Hill, Pennsylvania, <strong>Ian Garrett</strong> in Arlington, Virginia, <strong>Katy Craig</strong> in San Diego, California and <strong>Marcel Brown</strong> in St. Louis, Missouri.</p><p>Let’s get to it!</p><p><strong>Is Your Smart Speaker Eavesdropping?</strong></p><p>🇦🇺 Edwin Kwan, Sydney, Australia</p><p><a href="https://www.welivesecurity.com/2023/02/09/alexa-who-else-is-listening/" rel="noopener noreferrer" target="_blank">Alexa, who else is listening? | WeLiveSecurity</a></p><h3>Valentine’s Day Breakup: Goodbye Internet Explorer</h3><p><strong>🇺🇸</strong> Tracy (Trac) Bannon, Camp Hill, Pennsylvania</p><p><a href="https://www-bleepingcomputer-com.cdn.ampproject.org/c/s/www.bleepingcomputer.com/news/microsoft/microsoft-edge-update-starts-disabling-internet-explorer-11-today/amp/" rel="noopener noreferrer" target="_blank">Microsoft Edge update starts disabling Internet Explorer 11 today</a></p><p><a href="https://learn.microsoft.com/en-us/lifecycle/announcements/internet-explorer-11-end-of-support" rel="noopener noreferrer" target="_blank">Internet Explorer 11 desktop application ended support for certain operating systems - Microsoft Lifecycle</a></p><p><a href="https://www.pocket-lint.com/apps/news/microsoft/133746-what-is-microsoft-edge-the-lowdown-on-microsoft-s-windows-10-browser/" rel="noopener noreferrer" target="_blank">What is Microsoft Edge? The lowdown on Microsoft's replacement for Internet Explorer</a></p><p><strong>More Than Meets The Eye: North Korean APT Group Using JPEGs To Transfer Malware</strong></p><p><strong>🇺🇸 </strong>Ian Garrett, Arlington, Virginia</p><p><a href="https://cyware.com/news/apt37-exploits-hangul-vulnerability-with-highly-evasive-m2rat-malware-8766dc14" rel="noopener noreferrer" target="_blank">APT37 Exploits Hangul Vulnerability with Highly-Evasive M2RAT Malware | Cyware Alerts - Hacker News</a></p><p><strong>Beeping Good Malware</strong></p><p><strong>🇺🇸</strong> Katy Craig, San Diego, California</p><p><a href="https://thehackernews.com/2023/02/experts-warn-of-beep-new-evasive.html?m=1" rel="noopener noreferrer" target="_blank">Experts Warn of 'Beep' - A New Evasive Malware That Can Fly Under the Radar</a></p><p><a href="https://minerva-labs.com/blog/beepin-out-of-the-sandbox-analyzing-a-new-extremely-evasive-malware/" rel="noopener noreferrer" target="_blank">Beepin' Out of the Sandbox: Analyzing a New, Extremely Evasive Malware</a></p><p><br></p><p><strong>This Day In Tech History 02-17</strong></p><p><strong>This Day In Tech History 02-18</strong></p><p><strong>🇺🇸</strong> Marcel Brown, St. Louis, Missouri</p><p><a href="https://thisdayintechhistory.com/02/17" rel="noopener noreferrer" target="_blank">This Day In Tech History 02-17</a></p><p><a href="https://thisdayintechhistory.com/02/18" rel="noopener noreferrer" target="_blank">This Day In Tech History 02-18</a></p>]]></content:encoded><link><![CDATA[https://3zozb9fxlbueipjyapmaas.captivate.fm/episode/episode-80-its-5-05-friday-february-17-2023]]></link><guid isPermaLink="false">3b21410e-802f-460f-8ca0-fce763a78b05</guid><itunes:image href="https://artwork.captivate.fm/e8599426-8fc9-4f1e-821f-21313b08709d/-D_nUwasykmK50hKwVVVis2p.png"/><dc:creator><![CDATA[Contributors from Around the World]]></dc:creator><pubDate>Fri, 17 Feb 2023 16:45:00 -0400</pubDate><enclosure url="https://dts.podtrac.com/redirect.mp3/podcasts.captivate.fm/media/20e42384-b3d5-460a-b681-f9769ce4f128/2023-02-17-505-Episode-80-converted.mp3" length="8086025" type="audio/mpeg"/><itunes:duration>11:14</itunes:duration><itunes:explicit>false</itunes:explicit><itunes:episodeType>full</itunes:episodeType><itunes:season>1</itunes:season><itunes:episode>80</itunes:episode><itunes:season>1</itunes:season><podcast:episode>80</podcast:episode><podcast:season>1</podcast:season><itunes:author>Contributors from Around the World</itunes:author></item><item><title>Episode #79 - It&apos;s 5:05, Thursday, February 16, 2023</title><itunes:title>Episode #79 - It&apos;s 5:05, Thursday, February 16, 2023</itunes:title><description><![CDATA[<p><strong>Hey! It's 5:05 on Monday, February 16th, 2023.</strong> From the Sourced Podcast Network in New York City, this is your host, Pokie Huang. Stories in today's episode come from <strong>Katie Craig</strong> in San Diego, California, <strong>Edwin Kwan</strong> in Sydney, Australia, <strong>Kadi Grigg</strong> in Alexandria, Virginia, <strong>Olimpiu Pop</strong> in Transylvania, Romania, <strong>Marcel Brown</strong> in St. Louis, Missouri.</p><p>Let's get to it!</p><p><strong>Highlight from AFCEA/USNI WEST</strong></p><p><strong>🇺🇸</strong> Katy Craig, San Diego, California</p><p><a href="https://www.westconference.org/West23/Public/Enter.aspx" rel="noopener noreferrer" target="_blank">2023 West: Premier Sea Services Event San Diego</a></p><p><strong>Update Your Apple Devices</strong></p><p>🇦🇺 Edwin Kwan, Sydney, Australia</p><p><a href="https://www.macrumors.com/2023/02/13/ios-16-3-1-macos-ventura-13-2-1-vulnerability-fix/" rel="noopener noreferrer" target="_blank">PSA: Make Sure to Update Soon, macOS Ventura 13.2.1 and iOS 16.3.1 Address Actively Exploited Vulnerability</a></p><p><a href="https://www.bleepingcomputer.com/news/security/apple-fixes-new-webkit-zero-day-exploited-to-hack-iphones-macs/" rel="noopener noreferrer" target="_blank">Apple fixes new WebKit zero-day exploited to hack iPhones, Macs</a></p><p><a href="https://www.cisecurity.org/advisory/multiple-vulnerabilities-in-apple-products-could-allow-for-arbitrary-code-execution_2023-016" rel="noopener noreferrer" target="_blank">Multiple Vulnerabilities in Apple Products Could Allow for Arbitrary Code Execution</a></p><p><br></p><p><strong>Ever changing face of the hacker</strong></p><p><strong>🇺🇸</strong> Kadi Grigg, Alexandria, Virginia</p><p><a href="https://hackernoon.com/a-shapeshifter-under-the-hoodie-the-face-of-modern-cybercrime" rel="noopener noreferrer" target="_blank">A Shapeshifter Under the Hoodie: The Face of Modern Cybercrime | HackerNoon</a>&nbsp;</p><p><br></p><p><strong>Git 2.39.2 Released On Valentine's Day To Fix Exfiltration and RCE</strong></p><p>🇷🇴 Olimpiu Pop, Transylvania, Romania</p><p><a href="https://github.blog/2023-02-14-git-security-vulnerabilities-announced-3/" rel="noopener noreferrer" target="_blank">Git security vulnerabilities announced | The GitHub Blog</a></p><p><a href="https://github.com/git/git/security/advisories/GHSA-gw92-x3fm-3g3q" rel="noopener noreferrer" target="_blank">Local clone-based data exfiltration with non-local transports</a></p><p><a href="https://github.com/git/git/security/advisories/GHSA-r87m-v37r-cwfh" rel="noopener noreferrer" target="_blank">"git apply" overwriting paths outside the working tree</a></p><p><a href="https://about.gitlab.com/releases/2023/02/14/critical-security-release-gitlab-15-8-2-released/" rel="noopener noreferrer" target="_blank">GitLab Critical Security Release: 15.8.2, 15.7.7 and 15.6.8</a></p><p><br></p><p><strong>This Day In Tech History 02-16</strong></p><p><strong>🇺🇸</strong> Marcel Brown, St. Louis, Missouri</p><p><a href="https://thisdayintechhistory.com/02/16" rel="noopener noreferrer" target="_blank">This Day In Tech History 02-16</a></p>]]></description><content:encoded><![CDATA[<p><strong>Hey! It's 5:05 on Monday, February 16th, 2023.</strong> From the Sourced Podcast Network in New York City, this is your host, Pokie Huang. Stories in today's episode come from <strong>Katie Craig</strong> in San Diego, California, <strong>Edwin Kwan</strong> in Sydney, Australia, <strong>Kadi Grigg</strong> in Alexandria, Virginia, <strong>Olimpiu Pop</strong> in Transylvania, Romania, <strong>Marcel Brown</strong> in St. Louis, Missouri.</p><p>Let's get to it!</p><p><strong>Highlight from AFCEA/USNI WEST</strong></p><p><strong>🇺🇸</strong> Katy Craig, San Diego, California</p><p><a href="https://www.westconference.org/West23/Public/Enter.aspx" rel="noopener noreferrer" target="_blank">2023 West: Premier Sea Services Event San Diego</a></p><p><strong>Update Your Apple Devices</strong></p><p>🇦🇺 Edwin Kwan, Sydney, Australia</p><p><a href="https://www.macrumors.com/2023/02/13/ios-16-3-1-macos-ventura-13-2-1-vulnerability-fix/" rel="noopener noreferrer" target="_blank">PSA: Make Sure to Update Soon, macOS Ventura 13.2.1 and iOS 16.3.1 Address Actively Exploited Vulnerability</a></p><p><a href="https://www.bleepingcomputer.com/news/security/apple-fixes-new-webkit-zero-day-exploited-to-hack-iphones-macs/" rel="noopener noreferrer" target="_blank">Apple fixes new WebKit zero-day exploited to hack iPhones, Macs</a></p><p><a href="https://www.cisecurity.org/advisory/multiple-vulnerabilities-in-apple-products-could-allow-for-arbitrary-code-execution_2023-016" rel="noopener noreferrer" target="_blank">Multiple Vulnerabilities in Apple Products Could Allow for Arbitrary Code Execution</a></p><p><br></p><p><strong>Ever changing face of the hacker</strong></p><p><strong>🇺🇸</strong> Kadi Grigg, Alexandria, Virginia</p><p><a href="https://hackernoon.com/a-shapeshifter-under-the-hoodie-the-face-of-modern-cybercrime" rel="noopener noreferrer" target="_blank">A Shapeshifter Under the Hoodie: The Face of Modern Cybercrime | HackerNoon</a>&nbsp;</p><p><br></p><p><strong>Git 2.39.2 Released On Valentine's Day To Fix Exfiltration and RCE</strong></p><p>🇷🇴 Olimpiu Pop, Transylvania, Romania</p><p><a href="https://github.blog/2023-02-14-git-security-vulnerabilities-announced-3/" rel="noopener noreferrer" target="_blank">Git security vulnerabilities announced | The GitHub Blog</a></p><p><a href="https://github.com/git/git/security/advisories/GHSA-gw92-x3fm-3g3q" rel="noopener noreferrer" target="_blank">Local clone-based data exfiltration with non-local transports</a></p><p><a href="https://github.com/git/git/security/advisories/GHSA-r87m-v37r-cwfh" rel="noopener noreferrer" target="_blank">"git apply" overwriting paths outside the working tree</a></p><p><a href="https://about.gitlab.com/releases/2023/02/14/critical-security-release-gitlab-15-8-2-released/" rel="noopener noreferrer" target="_blank">GitLab Critical Security Release: 15.8.2, 15.7.7 and 15.6.8</a></p><p><br></p><p><strong>This Day In Tech History 02-16</strong></p><p><strong>🇺🇸</strong> Marcel Brown, St. Louis, Missouri</p><p><a href="https://thisdayintechhistory.com/02/16" rel="noopener noreferrer" target="_blank">This Day In Tech History 02-16</a></p>]]></content:encoded><link><![CDATA[https://3zozb9fxlbueipjyapmaas.captivate.fm/episode/episode-79-its-5-05-thursday-february-16-2023]]></link><guid isPermaLink="false">81ff634e-bb1c-4012-b216-d5c9c05b0c3f</guid><itunes:image href="https://artwork.captivate.fm/02c775fa-7b36-45eb-8690-601e091fa62a/VYphB7oXPfMqhIjXmBM2_t79.png"/><dc:creator><![CDATA[Contributors from Around the World]]></dc:creator><pubDate>Thu, 16 Feb 2023 16:45:00 -0400</pubDate><enclosure url="https://dts.podtrac.com/redirect.mp3/podcasts.captivate.fm/media/c494d49f-4473-4610-93fc-53431d0f36d8/2023-02-16-505-Episode-79-converted.mp3" length="8096056" type="audio/mpeg"/><itunes:duration>11:15</itunes:duration><itunes:explicit>false</itunes:explicit><itunes:episodeType>full</itunes:episodeType><itunes:season>1</itunes:season><itunes:episode>79</itunes:episode><itunes:season>1</itunes:season><podcast:episode>79</podcast:episode><podcast:season>1</podcast:season><itunes:author>Contributors from Around the World</itunes:author></item><item><title>Episode #78 - It&apos;s 5:05, Wednesday, February 15, 2023</title><itunes:title>Episode #78 - It&apos;s 5:05, Wednesday, February 15, 2023</itunes:title><description><![CDATA[<p><strong>Hey, it's 5:05 on Wednesday, February 15th, 2023.</strong> From the Sourced Podcast Network in New York City, this is your host, Pokie Huang. Stories in today's episode come from <strong>Derek Weeks</strong> in Bethesda, Maryland, <strong>Olimpiu Pop</strong> in Transylvania, Romania, <strong>Trac Bannon</strong> in Camp Hill, Pennsylvania, <strong>Edwin Kwan</strong> in Sydney, Australia, <strong>Marcel Brown</strong> in St. Louis, Missouri.</p><p>Let's get to it!</p><p>🇺🇸 <strong>Derek Weeks, Bethesda, Maryland</strong></p><p>Adoption is an option to improve security</p><p><a href="https://www.atlanticcouncil.org/in-depth-research-reports/report/open-source-software-as-infrastructure/#adopt-a-package" rel="noopener noreferrer" target="_blank">https://www.atlanticcouncil.org/in-depth-research-reports/report/open-source-software-as-infrastructure/#adopt-a-package</a></p><p><strong>🇷🇴 Olimpiu Pop, Transylvania, Romania</strong></p><p>Construction Workers Involuntary Hackers of Lufthansa's IT Systems</p><p><a href="https://www.bloomberg.com/news/articles/2023-02-15/lufthansa-says-it-system-issues-causing-widespread-cancellations" rel="noopener noreferrer" target="_blank">https://www.bloomberg.com/news/articles/2023-02-15/lufthansa-says-it-system-issues-causing-widespread-cancellations</a></p><p><a href="https://www.bloomberg.com/news/terminal/RQ4A1FT0G1KW" rel="noopener noreferrer" target="_blank">https://www.bloomberg.com/news/terminal/RQ4A1FT0G1KW</a></p><p><a href="https://www.bloomberg.com/news/terminal/RMTOWKT0G1KX" rel="noopener noreferrer" target="_blank">https://www.bloomberg.com/news/terminal/RMTOWKT0G1KX</a></p><p><a href="https://twitter.com/deutschetelekom/status/1625587220785598464" rel="noopener noreferrer" target="_blank">https://twitter.com/deutschetelekom/status/1625587220785598464</a></p><p><strong>🇦🇺 Edwin Kwan, Sydney, Australia</strong></p><p>Online Stores are Leaking private data</p><p><a href="https://sansec.io/research/sansec-analysis-12-of-online-stores-leak-private-backups" rel="noopener noreferrer" target="_blank">https://sansec.io/research/sansec-analysis-12-of-online-stores-leak-private-backups</a></p><p><a href="https://www.bleepingcomputer.com/news/security/over-12-percent-of-analyzed-online-stores-expose-private-data-backups/" rel="noopener noreferrer" target="_blank">https://www.bleepingcomputer.com/news/security/over-12-percent-of-analyzed-online-stores-expose-private-data-backups/</a></p><p><br></p><p><strong>🇺🇸</strong> <strong>Tracy (Trac) Bannon, Camp Hill, Pennsylvania</strong></p><p>Total global control of Toyota Supplier Network? Yikes!&nbsp;</p><p><a href="https://eaton-works.com/2023/02/06/toyota-gspims-hack/" rel="noopener noreferrer" target="_blank">https://eaton-works.com/2023/02/06/toyota-gspims-hack/</a>&nbsp;</p><p><a href="https://www.reversinglabs.com/blog/leaky-app-exposes-toyota-supplier-network" rel="noopener noreferrer" target="_blank">https://www.reversinglabs.com/blog/leaky-app-exposes-toyota-supplier-network</a>&nbsp;</p><p><a href="http://sogolfathian.com/the-toyota-way-and-its-effect-on-software-development/" rel="noopener noreferrer" target="_blank">http://sogolfathian.com/the-toyota-way-and-its-effect-on-software-development/</a></p><p><a href="https://www.cnn.com/2022/03/01/business/toyota-japan-cyberattack-production-restarts-intl-hnk/index.html" rel="noopener noreferrer" target="_blank">https://www.cnn.com/2022/03/01/business/toyota-japan-cyberattack-production-restarts-intl-hnk/index.html</a>&nbsp;</p><p><br></p><p><strong>🇺🇸</strong> <strong>Marcel Brown, St. Louis, Missouri</strong></p><p>This Day In Tech History 02-15</p><p><a href="https://thisdayintechhistory.com/02/15" rel="noopener noreferrer" target="_blank">https://thisdayintechhistory.com/02/15</a></p>]]></description><content:encoded><![CDATA[<p><strong>Hey, it's 5:05 on Wednesday, February 15th, 2023.</strong> From the Sourced Podcast Network in New York City, this is your host, Pokie Huang. Stories in today's episode come from <strong>Derek Weeks</strong> in Bethesda, Maryland, <strong>Olimpiu Pop</strong> in Transylvania, Romania, <strong>Trac Bannon</strong> in Camp Hill, Pennsylvania, <strong>Edwin Kwan</strong> in Sydney, Australia, <strong>Marcel Brown</strong> in St. Louis, Missouri.</p><p>Let's get to it!</p><p>🇺🇸 <strong>Derek Weeks, Bethesda, Maryland</strong></p><p>Adoption is an option to improve security</p><p><a href="https://www.atlanticcouncil.org/in-depth-research-reports/report/open-source-software-as-infrastructure/#adopt-a-package" rel="noopener noreferrer" target="_blank">https://www.atlanticcouncil.org/in-depth-research-reports/report/open-source-software-as-infrastructure/#adopt-a-package</a></p><p><strong>🇷🇴 Olimpiu Pop, Transylvania, Romania</strong></p><p>Construction Workers Involuntary Hackers of Lufthansa's IT Systems</p><p><a href="https://www.bloomberg.com/news/articles/2023-02-15/lufthansa-says-it-system-issues-causing-widespread-cancellations" rel="noopener noreferrer" target="_blank">https://www.bloomberg.com/news/articles/2023-02-15/lufthansa-says-it-system-issues-causing-widespread-cancellations</a></p><p><a href="https://www.bloomberg.com/news/terminal/RQ4A1FT0G1KW" rel="noopener noreferrer" target="_blank">https://www.bloomberg.com/news/terminal/RQ4A1FT0G1KW</a></p><p><a href="https://www.bloomberg.com/news/terminal/RMTOWKT0G1KX" rel="noopener noreferrer" target="_blank">https://www.bloomberg.com/news/terminal/RMTOWKT0G1KX</a></p><p><a href="https://twitter.com/deutschetelekom/status/1625587220785598464" rel="noopener noreferrer" target="_blank">https://twitter.com/deutschetelekom/status/1625587220785598464</a></p><p><strong>🇦🇺 Edwin Kwan, Sydney, Australia</strong></p><p>Online Stores are Leaking private data</p><p><a href="https://sansec.io/research/sansec-analysis-12-of-online-stores-leak-private-backups" rel="noopener noreferrer" target="_blank">https://sansec.io/research/sansec-analysis-12-of-online-stores-leak-private-backups</a></p><p><a href="https://www.bleepingcomputer.com/news/security/over-12-percent-of-analyzed-online-stores-expose-private-data-backups/" rel="noopener noreferrer" target="_blank">https://www.bleepingcomputer.com/news/security/over-12-percent-of-analyzed-online-stores-expose-private-data-backups/</a></p><p><br></p><p><strong>🇺🇸</strong> <strong>Tracy (Trac) Bannon, Camp Hill, Pennsylvania</strong></p><p>Total global control of Toyota Supplier Network? Yikes!&nbsp;</p><p><a href="https://eaton-works.com/2023/02/06/toyota-gspims-hack/" rel="noopener noreferrer" target="_blank">https://eaton-works.com/2023/02/06/toyota-gspims-hack/</a>&nbsp;</p><p><a href="https://www.reversinglabs.com/blog/leaky-app-exposes-toyota-supplier-network" rel="noopener noreferrer" target="_blank">https://www.reversinglabs.com/blog/leaky-app-exposes-toyota-supplier-network</a>&nbsp;</p><p><a href="http://sogolfathian.com/the-toyota-way-and-its-effect-on-software-development/" rel="noopener noreferrer" target="_blank">http://sogolfathian.com/the-toyota-way-and-its-effect-on-software-development/</a></p><p><a href="https://www.cnn.com/2022/03/01/business/toyota-japan-cyberattack-production-restarts-intl-hnk/index.html" rel="noopener noreferrer" target="_blank">https://www.cnn.com/2022/03/01/business/toyota-japan-cyberattack-production-restarts-intl-hnk/index.html</a>&nbsp;</p><p><br></p><p><strong>🇺🇸</strong> <strong>Marcel Brown, St. Louis, Missouri</strong></p><p>This Day In Tech History 02-15</p><p><a href="https://thisdayintechhistory.com/02/15" rel="noopener noreferrer" target="_blank">https://thisdayintechhistory.com/02/15</a></p>]]></content:encoded><link><![CDATA[https://3zozb9fxlbueipjyapmaas.captivate.fm/episode/episode-78-its-5-05-wednesday-february-15-2023]]></link><guid isPermaLink="false">d12243ee-8f66-45da-b1ba-a7656bc23adc</guid><itunes:image href="https://artwork.captivate.fm/aad56eaa-7e3e-44b8-b41a-949a82eb4834/lNuE7ln2QfpcgkwBvA9h-BM7.png"/><dc:creator><![CDATA[Contributors from Around the World]]></dc:creator><pubDate>Wed, 15 Feb 2023 16:45:00 -0400</pubDate><enclosure url="https://dts.podtrac.com/redirect.mp3/podcasts.captivate.fm/media/5287cde3-d999-444b-bfe5-2c1b16502a15/2023-02-15-505-Episode-78-converted.mp3" length="7995119" type="audio/mpeg"/><itunes:duration>11:06</itunes:duration><itunes:explicit>false</itunes:explicit><itunes:episodeType>full</itunes:episodeType><itunes:season>1</itunes:season><itunes:episode>78</itunes:episode><itunes:season>1</itunes:season><podcast:episode>78</podcast:episode><podcast:season>1</podcast:season><itunes:author>Contributors from Around the World</itunes:author></item><item><title>Episode #77 - It&apos;s 5:05, Tuesday, February 14, 2023</title><itunes:title>Episode #77 - It&apos;s 5:05, Tuesday, February 14, 2023</itunes:title><description><![CDATA[<p><strong>Hey, it's 5:05 on Tuesday, February 14th, 2023</strong>. From the Sourced Podcast Network in New York City, this is your host, Pokie Huang. Stories in today's episode come from <strong>Mark Miller</strong> in Boca Raton, Florida, <strong>Edwin Kwan</strong> in Sydney, Australia, <strong>Olimpiu Pop</strong> in Transylvania, Romania, <strong>Marcel Brown</strong> in St. Louis, Missouri.</p><p>Let's get to it.</p><p><strong>🇺🇸</strong> <strong>Mark Miller, Boca Raton, Florida</strong></p><p>Progress in EV Charging Stations</p><p>Electrifying Heavy Duty Transport</p><p><a href="https://www.wattev.com/" rel="noopener noreferrer" target="_blank">https://www.wattev.com/</a></p><p>WAVE</p><p><a href="https://waveipt.com/" rel="noopener noreferrer" target="_blank">https://waveipt.com/</a></p><p>ChargePoint</p><p><a href="https://www.chargepoint.com/" rel="noopener noreferrer" target="_blank">https://www.chargepoint.com/</a></p><p>Electrify America</p><p><a href="https://www.electrifyamerica.com/" rel="noopener noreferrer" target="_blank">https://www.electrifyamerica.com/</a></p><p>EVgo</p><p><a href="https://www.evgo.com/" rel="noopener noreferrer" target="_blank">https://www.evgo.com/</a></p><p>Blink Charging</p><p><a href="https://blinkcharging.com/" rel="noopener noreferrer" target="_blank">https://blinkcharging.com/</a></p><p><strong>🇦🇺 Edwin Kwan, Sydney, Australia</strong></p><p>Fake Job Ads to steal data from Applicants</p><p><a href="https://www.trendmicro.com/en_us/research/23/b/enigma-stealer-targets-cryptocurrency-industry-with-fake-jobs.html" rel="noopener noreferrer" target="_blank">https://www.trendmicro.com/en_us/research/23/b/enigma-stealer-targets-cryptocurrency-industry-with-fake-jobs.html</a></p><p><a href="https://www.bleepingcomputer.com/news/security/hackers-use-fake-crypto-job-offers-to-push-info-stealing-malware/" rel="noopener noreferrer" target="_blank">https://www.bleepingcomputer.com/news/security/hackers-use-fake-crypto-job-offers-to-push-info-stealing-malware/</a></p><p><br></p><p><strong>🇷🇴 Olimpiu Pop, Transylvania, Romania</strong></p><p>The Gold and the Chicken Problem: Security Experts Might Have Guessed MaaS Masterminds</p><p><a href="https://thehackernews.com/2023/01/experts-uncover-identity-of-mastermind.html" rel="noopener noreferrer" target="_blank">https://thehackernews.com/2023/01/experts-uncover-identity-of-mastermind.html</a></p><p><a href="https://www.imdb.com/title/tt0107977/" rel="noopener noreferrer" target="_blank">https://www.imdb.com/title/tt0107977/</a></p><p><a href="https://www.esentire.com/web-native-pages/unmasking-venom-spider" rel="noopener noreferrer" target="_blank">https://www.esentire.com/web-native-pages/unmasking-venom-spider</a></p><p><br></p><p><strong>🇺🇸</strong> <strong>Marcel Brown, St. Louis, Missouri</strong></p><p>This Day In Tech History 02-14</p><p><a href="https://thisdayintechhistory.com/02/14/" rel="noopener noreferrer" target="_blank">https://thisdayintechhistory.com/02/14/</a></p>]]></description><content:encoded><![CDATA[<p><strong>Hey, it's 5:05 on Tuesday, February 14th, 2023</strong>. From the Sourced Podcast Network in New York City, this is your host, Pokie Huang. Stories in today's episode come from <strong>Mark Miller</strong> in Boca Raton, Florida, <strong>Edwin Kwan</strong> in Sydney, Australia, <strong>Olimpiu Pop</strong> in Transylvania, Romania, <strong>Marcel Brown</strong> in St. Louis, Missouri.</p><p>Let's get to it.</p><p><strong>🇺🇸</strong> <strong>Mark Miller, Boca Raton, Florida</strong></p><p>Progress in EV Charging Stations</p><p>Electrifying Heavy Duty Transport</p><p><a href="https://www.wattev.com/" rel="noopener noreferrer" target="_blank">https://www.wattev.com/</a></p><p>WAVE</p><p><a href="https://waveipt.com/" rel="noopener noreferrer" target="_blank">https://waveipt.com/</a></p><p>ChargePoint</p><p><a href="https://www.chargepoint.com/" rel="noopener noreferrer" target="_blank">https://www.chargepoint.com/</a></p><p>Electrify America</p><p><a href="https://www.electrifyamerica.com/" rel="noopener noreferrer" target="_blank">https://www.electrifyamerica.com/</a></p><p>EVgo</p><p><a href="https://www.evgo.com/" rel="noopener noreferrer" target="_blank">https://www.evgo.com/</a></p><p>Blink Charging</p><p><a href="https://blinkcharging.com/" rel="noopener noreferrer" target="_blank">https://blinkcharging.com/</a></p><p><strong>🇦🇺 Edwin Kwan, Sydney, Australia</strong></p><p>Fake Job Ads to steal data from Applicants</p><p><a href="https://www.trendmicro.com/en_us/research/23/b/enigma-stealer-targets-cryptocurrency-industry-with-fake-jobs.html" rel="noopener noreferrer" target="_blank">https://www.trendmicro.com/en_us/research/23/b/enigma-stealer-targets-cryptocurrency-industry-with-fake-jobs.html</a></p><p><a href="https://www.bleepingcomputer.com/news/security/hackers-use-fake-crypto-job-offers-to-push-info-stealing-malware/" rel="noopener noreferrer" target="_blank">https://www.bleepingcomputer.com/news/security/hackers-use-fake-crypto-job-offers-to-push-info-stealing-malware/</a></p><p><br></p><p><strong>🇷🇴 Olimpiu Pop, Transylvania, Romania</strong></p><p>The Gold and the Chicken Problem: Security Experts Might Have Guessed MaaS Masterminds</p><p><a href="https://thehackernews.com/2023/01/experts-uncover-identity-of-mastermind.html" rel="noopener noreferrer" target="_blank">https://thehackernews.com/2023/01/experts-uncover-identity-of-mastermind.html</a></p><p><a href="https://www.imdb.com/title/tt0107977/" rel="noopener noreferrer" target="_blank">https://www.imdb.com/title/tt0107977/</a></p><p><a href="https://www.esentire.com/web-native-pages/unmasking-venom-spider" rel="noopener noreferrer" target="_blank">https://www.esentire.com/web-native-pages/unmasking-venom-spider</a></p><p><br></p><p><strong>🇺🇸</strong> <strong>Marcel Brown, St. Louis, Missouri</strong></p><p>This Day In Tech History 02-14</p><p><a href="https://thisdayintechhistory.com/02/14/" rel="noopener noreferrer" target="_blank">https://thisdayintechhistory.com/02/14/</a></p>]]></content:encoded><link><![CDATA[https://3zozb9fxlbueipjyapmaas.captivate.fm/episode/episode-77-its-5-05-tuesday-february-14-2023]]></link><guid isPermaLink="false">065e4ec2-bbd2-4abd-9c06-75908f5a3ff5</guid><itunes:image href="https://artwork.captivate.fm/bafb2800-2335-43b6-9459-da0a99c6632a/H1aAroLskG1VfI7ybcN3w5mK.png"/><dc:creator><![CDATA[Contributors from Around the World]]></dc:creator><pubDate>Tue, 14 Feb 2023 16:45:00 -0400</pubDate><enclosure url="https://dts.podtrac.com/redirect.mp3/podcasts.captivate.fm/media/eaf4bc8c-4625-402c-979a-279d56a39e83/2023-02-14-505-Episode-77-u-converted.mp3" length="7506421" type="audio/mpeg"/><itunes:duration>10:26</itunes:duration><itunes:explicit>false</itunes:explicit><itunes:episodeType>full</itunes:episodeType><itunes:season>1</itunes:season><itunes:episode>77</itunes:episode><itunes:season>1</itunes:season><podcast:episode>77</podcast:episode><podcast:season>1</podcast:season><itunes:author>Contributors from Around the World</itunes:author></item><item><title>Episode #76 - It&apos;s 5:05, Monday, February 13, 2023</title><itunes:title>Episode #76 - It&apos;s 5:05, Monday, February 13, 2023</itunes:title><description><![CDATA[<p><strong>Hey! It’s 5:05, on Monday, February 13, 2023. </strong>From the Sourced Podcast Network in New York City, this is your host, Pokie Huang. Stories in today’s episode come from <strong>Chris Hughes </strong>in Virginia Beach, Virginia, <strong>Katy Craig</strong> in San Diego, California, <strong>&nbsp;Edwin Kwan </strong>in Sydney, Australia, <strong>Olimpiu Pop</strong> in Transylvania, Romania, <strong>Marcel Brown </strong>in St. Louis, Missouri.</p><p>Let’s get to it!</p><p><strong>🇺🇸</strong> <strong>Chris Hughes, Virginia Beach, Virginia</strong></p><p>Has the business model for OWASP run its course?</p><p><a href="https://github.com/owasp-change/owasp-change.github.io" rel="noopener noreferrer" target="_blank">https://github.com/owasp-change/owasp-change.github.io</a></p><p><strong>🇺🇸</strong> <strong>Katy Craig, San Diego, California</strong></p><p>Valentines Day romance scams</p><p><a href="https://www.ftc.gov/news-events/news/press-releases/2023/02/new-ftc-data-reveals-top-lies-told-romance-scammers" rel="noopener noreferrer" target="_blank">https://www.ftc.gov/news-events/news/press-releases/2023/02/new-ftc-data-reveals-top-lies-told-romance-scammers</a></p><p><a href="https://www.washingtonpost.com/politics/2023/02/10/romance-scammers-could-cause-unhappy-valentines-day/" rel="noopener noreferrer" target="_blank">https://www.washingtonpost.com/politics/2023/02/10/romance-scammers-could-cause-unhappy-valentines-day/</a></p><p><strong>🇦🇺 Edwin Kwan, Sydney, Australia</strong></p><p>Earthquake Relief Donation Scams Spotted</p><p><a href="https://www.bleepingcomputer.com/news/security/paypal-and-twitter-abused-in-turkey-relief-donation-scams/" rel="noopener noreferrer" target="_blank">https://www.bleepingcomputer.com/news/security/paypal-and-twitter-abused-in-turkey-relief-donation-scams/</a></p><p><strong>🇷🇴 Olimpiu Pop, Transylvania, Romania</strong></p><p>Finlands is not only about Lapland: Finnish Hacker Arrested by French Police</p><p><a href="https://yle.fi/a/74-20016301" rel="noopener noreferrer" target="_blank">https://yle.fi/a/74-20016301</a></p><p><a href="https://yle.fi/a/3-12672643" rel="noopener noreferrer" target="_blank">https://yle.fi/a/3-12672643</a></p><p><strong>🇺🇸</strong> <strong>Marcel Brown, St. Louis, Missouri</strong></p><p>This Day In Tech History 02-12</p><p>This Day In Tech History 02-13</p><p><a href="https://thisdayintechhistory.com/02/12/" rel="noopener noreferrer" target="_blank">https://thisdayintechhistory.com/02/12/</a></p><p><a href="https://thisdayintechhistory.com/02/13/" rel="noopener noreferrer" target="_blank">https://thisdayintechhistory.com/02/13/</a></p>]]></description><content:encoded><![CDATA[<p><strong>Hey! It’s 5:05, on Monday, February 13, 2023. </strong>From the Sourced Podcast Network in New York City, this is your host, Pokie Huang. Stories in today’s episode come from <strong>Chris Hughes </strong>in Virginia Beach, Virginia, <strong>Katy Craig</strong> in San Diego, California, <strong>&nbsp;Edwin Kwan </strong>in Sydney, Australia, <strong>Olimpiu Pop</strong> in Transylvania, Romania, <strong>Marcel Brown </strong>in St. Louis, Missouri.</p><p>Let’s get to it!</p><p><strong>🇺🇸</strong> <strong>Chris Hughes, Virginia Beach, Virginia</strong></p><p>Has the business model for OWASP run its course?</p><p><a href="https://github.com/owasp-change/owasp-change.github.io" rel="noopener noreferrer" target="_blank">https://github.com/owasp-change/owasp-change.github.io</a></p><p><strong>🇺🇸</strong> <strong>Katy Craig, San Diego, California</strong></p><p>Valentines Day romance scams</p><p><a href="https://www.ftc.gov/news-events/news/press-releases/2023/02/new-ftc-data-reveals-top-lies-told-romance-scammers" rel="noopener noreferrer" target="_blank">https://www.ftc.gov/news-events/news/press-releases/2023/02/new-ftc-data-reveals-top-lies-told-romance-scammers</a></p><p><a href="https://www.washingtonpost.com/politics/2023/02/10/romance-scammers-could-cause-unhappy-valentines-day/" rel="noopener noreferrer" target="_blank">https://www.washingtonpost.com/politics/2023/02/10/romance-scammers-could-cause-unhappy-valentines-day/</a></p><p><strong>🇦🇺 Edwin Kwan, Sydney, Australia</strong></p><p>Earthquake Relief Donation Scams Spotted</p><p><a href="https://www.bleepingcomputer.com/news/security/paypal-and-twitter-abused-in-turkey-relief-donation-scams/" rel="noopener noreferrer" target="_blank">https://www.bleepingcomputer.com/news/security/paypal-and-twitter-abused-in-turkey-relief-donation-scams/</a></p><p><strong>🇷🇴 Olimpiu Pop, Transylvania, Romania</strong></p><p>Finlands is not only about Lapland: Finnish Hacker Arrested by French Police</p><p><a href="https://yle.fi/a/74-20016301" rel="noopener noreferrer" target="_blank">https://yle.fi/a/74-20016301</a></p><p><a href="https://yle.fi/a/3-12672643" rel="noopener noreferrer" target="_blank">https://yle.fi/a/3-12672643</a></p><p><strong>🇺🇸</strong> <strong>Marcel Brown, St. Louis, Missouri</strong></p><p>This Day In Tech History 02-12</p><p>This Day In Tech History 02-13</p><p><a href="https://thisdayintechhistory.com/02/12/" rel="noopener noreferrer" target="_blank">https://thisdayintechhistory.com/02/12/</a></p><p><a href="https://thisdayintechhistory.com/02/13/" rel="noopener noreferrer" target="_blank">https://thisdayintechhistory.com/02/13/</a></p>]]></content:encoded><link><![CDATA[https://3zozb9fxlbueipjyapmaas.captivate.fm/episode/episode-76-its-5-05-monday-february-13-2023]]></link><guid isPermaLink="false">1136c0de-74e4-48c6-b4fc-771c18d3f094</guid><itunes:image href="https://artwork.captivate.fm/424d9fd2-ea08-40aa-86f2-18458b32ef6e/_olutfZFzmk1qIdHX7Z_GBNW.png"/><dc:creator><![CDATA[Contributors from Around the World]]></dc:creator><pubDate>Mon, 13 Feb 2023 16:45:00 -0400</pubDate><enclosure url="https://dts.podtrac.com/redirect.mp3/podcasts.captivate.fm/media/298a3fe7-ca48-439b-97a6-74ff96f1f0ac/2023-02-13-505-Episode-76-converted.mp3" length="7530871" type="audio/mpeg"/><itunes:duration>10:28</itunes:duration><itunes:explicit>false</itunes:explicit><itunes:episodeType>full</itunes:episodeType><itunes:season>1</itunes:season><itunes:episode>76</itunes:episode><itunes:season>1</itunes:season><podcast:episode>76</podcast:episode><podcast:season>1</podcast:season><itunes:author>Contributors from Around the World</itunes:author></item><item><title>Episode #75 - It&apos;s 5:05, Friday, February 10, 2023</title><itunes:title>Episode #75 - It&apos;s 5:05, Friday, February 10, 2023</itunes:title><description><![CDATA[<p><strong>Hey! It’s 5:05, on Friday, February 10, 2023. </strong>From the Sourced Podcast Network in New York City, this is your host, Pokie Huang. Stories in today’s episode come from <strong>Kadi Grigg</strong> in Alexandria, Virginia, <strong>Edwin Kwan </strong>in Sydney, Australia, <strong>Katy Craig </strong>in San Diego, California, <strong>Olimpiu Pop</strong> in Transylvania, Romania,&nbsp; <strong>Marcel Brown, </strong>St. Louis, Missouri.</p><p>Let’s get to it!</p><p><strong>🇺🇸</strong> <strong>Kadi Grigg, Alexandria, Virginia</strong></p><p>Infrastructure Policy + OSS</p><p><a href="https://www.atlanticcouncil.org/in-depth-research-reports/report/open-source-software-as-infrastructure/" rel="noopener noreferrer" target="_blank">https://www.atlanticcouncil.org/in-depth-research-reports/report/open-source-software-as-infrastructure/</a>&nbsp;</p><p><a href="https://www.fordfoundation.org/work/learning/research-reports/roads-and-bridges-the-unseen-labor-behind-our-digital-infrastructure/" rel="noopener noreferrer" target="_blank">https://www.fordfoundation.org/work/learning/research-reports/roads-and-bridges-the-unseen-labor-behind-our-digital-infrastructure/</a></p><p><strong>🇦🇺 Edwin Kwan, Sydney, Australia</strong></p><p>Reddit Security Incident</p><p><a href="https://old.reddit.com/r/reddit/comments/10y427y/we_had_a_security_incident_heres_what_we_know/" rel="noopener noreferrer" target="_blank">https://old.reddit.com/r/reddit/comments/10y427y/we_had_a_security_incident_heres_what_we_know/</a></p><p><br></p><p><strong>🇺🇸</strong> <strong>Katy Craig, San Diego, California</strong></p><p>The Supreme Court and Section 230</p><p><a href="https://www.brookings.edu/blog/techtank/2023/01/31/the-supreme-court-takes-up-section-230/" rel="noopener noreferrer" target="_blank">https://www.brookings.edu/blog/techtank/2023/01/31/the-supreme-court-takes-up-section-230/</a></p><p><a href="https://www.theatlantic.com/technology/archive/2023/02/supreme-court-section-230-twitter-google-algorithm/672915/" rel="noopener noreferrer" target="_blank">https://www.theatlantic.com/technology/archive/2023/02/supreme-court-section-230-twitter-google-algorithm/672915/</a></p><p><br></p><p><strong>🇷🇴 Olimpiu Pop, Transylvania, Romania</strong></p><p>ION Customers Get Back Online After Lockbit’s Ransomware Attack</p><p><a href="https://www.cftc.gov/PressRoom/SpeechesTestimony/cftcstatement020223" rel="noopener noreferrer" target="_blank">https://www.cftc.gov/PressRoom/SpeechesTestimony/cftcstatement020223</a></p><p><a href="https://www.reuters.com/technology/us-cftc-traders-report-delayed-by-ransomware-attack-data-firm-ion-2023-02-03/" rel="noopener noreferrer" target="_blank">https://www.reuters.com/technology/us-cftc-traders-report-delayed-by-ransomware-attack-data-firm-ion-2023-02-03/</a></p><p><a href="https://www.fia.org/resources/fia-comments-ion-group-cyber-incident" rel="noopener noreferrer" target="_blank">https://www.fia.org/resources/fia-comments-ion-group-cyber-incident</a></p><p><a href="https://www.reuters.com/technology/ion-starts-bring-clients-back-online-after-ransomware-attack-source-2023-02-07/" rel="noopener noreferrer" target="_blank">https://www.reuters.com/technology/ion-starts-bring-clients-back-online-after-ransomware-attack-source-2023-02-07/</a></p><p><br></p><p><strong>🇺🇸</strong> <strong>Marcel Brown, St. Louis, Missouri</strong></p><p><a href="https://thisdayintechhistory.com/02/10/" rel="noopener noreferrer" target="_blank"><strong>https://thisdayintechhistory.com/02/10/</strong></a></p><p><a href="https://thisdayintechhistory.com/02/11/" rel="noopener noreferrer" target="_blank"><strong>https://thisdayintechhistory.com/02/11/</strong></a></p><p><br></p>]]></description><content:encoded><![CDATA[<p><strong>Hey! It’s 5:05, on Friday, February 10, 2023. </strong>From the Sourced Podcast Network in New York City, this is your host, Pokie Huang. Stories in today’s episode come from <strong>Kadi Grigg</strong> in Alexandria, Virginia, <strong>Edwin Kwan </strong>in Sydney, Australia, <strong>Katy Craig </strong>in San Diego, California, <strong>Olimpiu Pop</strong> in Transylvania, Romania,&nbsp; <strong>Marcel Brown, </strong>St. Louis, Missouri.</p><p>Let’s get to it!</p><p><strong>🇺🇸</strong> <strong>Kadi Grigg, Alexandria, Virginia</strong></p><p>Infrastructure Policy + OSS</p><p><a href="https://www.atlanticcouncil.org/in-depth-research-reports/report/open-source-software-as-infrastructure/" rel="noopener noreferrer" target="_blank">https://www.atlanticcouncil.org/in-depth-research-reports/report/open-source-software-as-infrastructure/</a>&nbsp;</p><p><a href="https://www.fordfoundation.org/work/learning/research-reports/roads-and-bridges-the-unseen-labor-behind-our-digital-infrastructure/" rel="noopener noreferrer" target="_blank">https://www.fordfoundation.org/work/learning/research-reports/roads-and-bridges-the-unseen-labor-behind-our-digital-infrastructure/</a></p><p><strong>🇦🇺 Edwin Kwan, Sydney, Australia</strong></p><p>Reddit Security Incident</p><p><a href="https://old.reddit.com/r/reddit/comments/10y427y/we_had_a_security_incident_heres_what_we_know/" rel="noopener noreferrer" target="_blank">https://old.reddit.com/r/reddit/comments/10y427y/we_had_a_security_incident_heres_what_we_know/</a></p><p><br></p><p><strong>🇺🇸</strong> <strong>Katy Craig, San Diego, California</strong></p><p>The Supreme Court and Section 230</p><p><a href="https://www.brookings.edu/blog/techtank/2023/01/31/the-supreme-court-takes-up-section-230/" rel="noopener noreferrer" target="_blank">https://www.brookings.edu/blog/techtank/2023/01/31/the-supreme-court-takes-up-section-230/</a></p><p><a href="https://www.theatlantic.com/technology/archive/2023/02/supreme-court-section-230-twitter-google-algorithm/672915/" rel="noopener noreferrer" target="_blank">https://www.theatlantic.com/technology/archive/2023/02/supreme-court-section-230-twitter-google-algorithm/672915/</a></p><p><br></p><p><strong>🇷🇴 Olimpiu Pop, Transylvania, Romania</strong></p><p>ION Customers Get Back Online After Lockbit’s Ransomware Attack</p><p><a href="https://www.cftc.gov/PressRoom/SpeechesTestimony/cftcstatement020223" rel="noopener noreferrer" target="_blank">https://www.cftc.gov/PressRoom/SpeechesTestimony/cftcstatement020223</a></p><p><a href="https://www.reuters.com/technology/us-cftc-traders-report-delayed-by-ransomware-attack-data-firm-ion-2023-02-03/" rel="noopener noreferrer" target="_blank">https://www.reuters.com/technology/us-cftc-traders-report-delayed-by-ransomware-attack-data-firm-ion-2023-02-03/</a></p><p><a href="https://www.fia.org/resources/fia-comments-ion-group-cyber-incident" rel="noopener noreferrer" target="_blank">https://www.fia.org/resources/fia-comments-ion-group-cyber-incident</a></p><p><a href="https://www.reuters.com/technology/ion-starts-bring-clients-back-online-after-ransomware-attack-source-2023-02-07/" rel="noopener noreferrer" target="_blank">https://www.reuters.com/technology/ion-starts-bring-clients-back-online-after-ransomware-attack-source-2023-02-07/</a></p><p><br></p><p><strong>🇺🇸</strong> <strong>Marcel Brown, St. Louis, Missouri</strong></p><p><a href="https://thisdayintechhistory.com/02/10/" rel="noopener noreferrer" target="_blank"><strong>https://thisdayintechhistory.com/02/10/</strong></a></p><p><a href="https://thisdayintechhistory.com/02/11/" rel="noopener noreferrer" target="_blank"><strong>https://thisdayintechhistory.com/02/11/</strong></a></p><p><br></p>]]></content:encoded><link><![CDATA[https://3zozb9fxlbueipjyapmaas.captivate.fm/episode/episode-75-its-5-05-friday-february-10-2023]]></link><guid isPermaLink="false">6f87f665-71c0-4dcb-80b4-9a018b0b7e89</guid><itunes:image href="https://artwork.captivate.fm/29e4e4b2-2c3d-45a1-b1c1-7dd2d1301f17/t_ACS0I3Dat_-p6NGo2QQZKU.png"/><dc:creator><![CDATA[Contributors from Around the World]]></dc:creator><pubDate>Fri, 10 Feb 2023 16:45:00 -0400</pubDate><enclosure url="https://dts.podtrac.com/redirect.mp3/podcasts.captivate.fm/media/947458d4-6c0d-46fc-9b50-9b20e28acd6a/2023-02-10-505-Episode-75-converted.mp3" length="7385421" type="audio/mpeg"/><itunes:duration>10:15</itunes:duration><itunes:explicit>false</itunes:explicit><itunes:episodeType>full</itunes:episodeType><itunes:season>1</itunes:season><itunes:episode>75</itunes:episode><itunes:season>1</itunes:season><podcast:episode>75</podcast:episode><podcast:season>1</podcast:season><itunes:author>Contributors from Around the World</itunes:author></item><item><title>Episode #74 - It&apos;s 5:05, Thursday, February 9, 2023</title><itunes:title>Episode #74 - It&apos;s 5:05, Thursday, February 9, 2023</itunes:title><description><![CDATA[<p><strong>Hey! It’s 5:05, on Thursday, February 9, 2023. </strong>From the Sourced Podcast Network in New York City, this is your host, Pokie Huang. Stories in today’s episode come from <strong>Chris Hughes</strong> in Virginia Beach, Virginia, <strong>Mark Miller</strong> in New York City,, <strong>Katy Craig</strong> in San Diego, California, <strong>Edwin Kwan</strong> in Sydney, Australia, <strong>Olimpiu Pop </strong>in Transylvania, Romania,</p><p>Let’s get to it!</p><p><strong>🇺🇸</strong> <strong>Chris Hughes, Virginia Beach, Virginia</strong></p><p>The State of Cloud-Native Security in 2023</p><p><a href="https://sysdig.com/press-releases/sysdig-2023-usage-report/" rel="noopener noreferrer" target="_blank"><strong>https://sysdig.com/press-releases/sysdig-2023-usage-report/</strong></a></p><p><strong>🇺🇸</strong> <strong>Mark Miller, New York City</strong></p><p>Should you trust AI chat</p><p><strong>🇺🇸</strong> <strong>Katy Craig, San Diego, California</strong></p><p>San Diego hospitals suffer from cyber attacks</p><p><a href="https://www.sandiegouniontribune.com/news/health/story/2023-02-06/sharp-notified-x-patients-of-data-breach" rel="noopener noreferrer" target="_blank">https://www.sandiegouniontribune.com/news/health/story/2023-02-06/sharp-notified-x-patients-of-data-breach</a></p><p><a href="https://www.sandiegouniontribune.com/business/story/2021-09-23/sd-fi-ucsandiego-cyber-attack" rel="noopener noreferrer" target="_blank">https://www.sandiegouniontribune.com/business/story/2021-09-23/sd-fi-ucsandiego-cyber-attack</a></p><p><br></p><p><strong>🇦🇺 Edwin Kwan, Sydney, Australia</strong></p><p>Toyota Supplier Portal Vulnerability Disclosure</p><p><a href="https://www.bleepingcomputer.com/news/security/researcher-breaches-toyota-supplier-portal-with-info-on-14-000-partners/" rel="noopener noreferrer" target="_blank">https://www.bleepingcomputer.com/news/security/researcher-breaches-toyota-supplier-portal-with-info-on-14-000-partners/</a></p><p><br></p><p><strong>🇷🇴 Olimpiu Pop, Transylvania, Romania</strong></p><p>The second wave VMWare ESXiArgs Attack Hits on February 8th</p><p><a href="https://www.cisa.gov/uscert/ncas/current-activity/2023/02/08/cisa-and-fbi-release-esxiargs-ransomware-recovery-guidance" rel="noopener noreferrer" target="_blank">https://www.cisa.gov/uscert/ncas/current-activity/2023/02/08/cisa-and-fbi-release-esxiargs-ransomware-recovery-guidance</a></p><p><a href="https://www.cisa.gov/uscert/ncas/current-activity/2023/02/07/cisa-releases-esxiargs-ransomware-recovery-script" rel="noopener noreferrer" target="_blank">https://www.cisa.gov/uscert/ncas/current-activity/2023/02/07/cisa-releases-esxiargs-ransomware-recovery-script</a></p><p><a href="https://github.com/cisagov/ESXiArgs-Recover" rel="noopener noreferrer" target="_blank">https://github.com/cisagov/ESXiArgs-Recover</a></p><p><a href="https://www.bleepingcomputer.com/forums/t/782193/esxi-ransomware-help-and-support-topic-esxiargs-args-extension/" rel="noopener noreferrer" target="_blank">https://www.bleepingcomputer.com/forums/t/782193/esxi-ransomware-help-and-support-topic-esxiargs-args-extension/</a></p>]]></description><content:encoded><![CDATA[<p><strong>Hey! It’s 5:05, on Thursday, February 9, 2023. </strong>From the Sourced Podcast Network in New York City, this is your host, Pokie Huang. Stories in today’s episode come from <strong>Chris Hughes</strong> in Virginia Beach, Virginia, <strong>Mark Miller</strong> in New York City,, <strong>Katy Craig</strong> in San Diego, California, <strong>Edwin Kwan</strong> in Sydney, Australia, <strong>Olimpiu Pop </strong>in Transylvania, Romania,</p><p>Let’s get to it!</p><p><strong>🇺🇸</strong> <strong>Chris Hughes, Virginia Beach, Virginia</strong></p><p>The State of Cloud-Native Security in 2023</p><p><a href="https://sysdig.com/press-releases/sysdig-2023-usage-report/" rel="noopener noreferrer" target="_blank"><strong>https://sysdig.com/press-releases/sysdig-2023-usage-report/</strong></a></p><p><strong>🇺🇸</strong> <strong>Mark Miller, New York City</strong></p><p>Should you trust AI chat</p><p><strong>🇺🇸</strong> <strong>Katy Craig, San Diego, California</strong></p><p>San Diego hospitals suffer from cyber attacks</p><p><a href="https://www.sandiegouniontribune.com/news/health/story/2023-02-06/sharp-notified-x-patients-of-data-breach" rel="noopener noreferrer" target="_blank">https://www.sandiegouniontribune.com/news/health/story/2023-02-06/sharp-notified-x-patients-of-data-breach</a></p><p><a href="https://www.sandiegouniontribune.com/business/story/2021-09-23/sd-fi-ucsandiego-cyber-attack" rel="noopener noreferrer" target="_blank">https://www.sandiegouniontribune.com/business/story/2021-09-23/sd-fi-ucsandiego-cyber-attack</a></p><p><br></p><p><strong>🇦🇺 Edwin Kwan, Sydney, Australia</strong></p><p>Toyota Supplier Portal Vulnerability Disclosure</p><p><a href="https://www.bleepingcomputer.com/news/security/researcher-breaches-toyota-supplier-portal-with-info-on-14-000-partners/" rel="noopener noreferrer" target="_blank">https://www.bleepingcomputer.com/news/security/researcher-breaches-toyota-supplier-portal-with-info-on-14-000-partners/</a></p><p><br></p><p><strong>🇷🇴 Olimpiu Pop, Transylvania, Romania</strong></p><p>The second wave VMWare ESXiArgs Attack Hits on February 8th</p><p><a href="https://www.cisa.gov/uscert/ncas/current-activity/2023/02/08/cisa-and-fbi-release-esxiargs-ransomware-recovery-guidance" rel="noopener noreferrer" target="_blank">https://www.cisa.gov/uscert/ncas/current-activity/2023/02/08/cisa-and-fbi-release-esxiargs-ransomware-recovery-guidance</a></p><p><a href="https://www.cisa.gov/uscert/ncas/current-activity/2023/02/07/cisa-releases-esxiargs-ransomware-recovery-script" rel="noopener noreferrer" target="_blank">https://www.cisa.gov/uscert/ncas/current-activity/2023/02/07/cisa-releases-esxiargs-ransomware-recovery-script</a></p><p><a href="https://github.com/cisagov/ESXiArgs-Recover" rel="noopener noreferrer" target="_blank">https://github.com/cisagov/ESXiArgs-Recover</a></p><p><a href="https://www.bleepingcomputer.com/forums/t/782193/esxi-ransomware-help-and-support-topic-esxiargs-args-extension/" rel="noopener noreferrer" target="_blank">https://www.bleepingcomputer.com/forums/t/782193/esxi-ransomware-help-and-support-topic-esxiargs-args-extension/</a></p>]]></content:encoded><link><![CDATA[https://3zozb9fxlbueipjyapmaas.captivate.fm/episode/episode-74-its-5-05-thursday-february-9-2023]]></link><guid isPermaLink="false">18f82c5a-0baf-4fcb-8a91-7c7727cccbd5</guid><itunes:image href="https://artwork.captivate.fm/4c3f8e2b-7ac5-4584-98cf-4c085814eb84/qodNgP7Cet_kNOWAl-GA-56B.png"/><dc:creator><![CDATA[Contributors from Around the World]]></dc:creator><pubDate>Thu, 09 Feb 2023 16:45:00 -0400</pubDate><enclosure url="https://dts.podtrac.com/redirect.mp3/podcasts.captivate.fm/media/a65e76dd-0caf-4f72-989a-4f5fe72b5d28/2023-02-09-505-Episode-74-converted.mp3" length="7557203" type="audio/mpeg"/><itunes:duration>10:30</itunes:duration><itunes:explicit>false</itunes:explicit><itunes:episodeType>full</itunes:episodeType><itunes:season>1</itunes:season><itunes:episode>74</itunes:episode><itunes:season>1</itunes:season><podcast:episode>74</podcast:episode><podcast:season>1</podcast:season><itunes:author>Contributors from Around the World</itunes:author></item><item><title>Episode #73 - It&apos;s 5:05, Wednesday, February 8, 2023</title><itunes:title>Episode #73 - It&apos;s 5:05, Wednesday, February 8, 2023</itunes:title><description><![CDATA[<p><strong>Hey! It’s 5:05, on Wednesday, February 8 , 2023. </strong>From the Sourced Podcast Network in New York City, this is your host, Pokie Huang. Stories in today’s episode come from <strong>Olimpiu Pop </strong>in Transylvania, Romania, <strong>Katy Craig</strong> in San Diego, California, <strong>Edwin Kwan</strong> in Sydney, Australia.</p><p><strong>&nbsp;</strong>Let’s get to it!</p><p><strong>🇦🇺 Edwin Kwan, Sydney, Australia</strong></p><p>Beware of Donation Scams about Earthquake in Turkey and Syria</p><p><a href="https://isc.sans.edu/diary/Earthquake+in+Turkey+and+Syria+Be+Aware+of+Possible+Donation+Scams/29518" rel="noopener noreferrer" target="_blank">https://isc.sans.edu/diary/Earthquake+in+Turkey+and+Syria+Be+Aware+of+Possible+Donation+Scams/29518</a></p><p><br></p><p><strong>🇺🇸</strong> <strong>Katy Craig, San Diego, California</strong></p><p>Facebook and foreign developers</p><p><a href="https://www.reuters.com/technology/us-senators-question-meta-over-chinese-russian-access-facebook-data-statement-2023-02-06/" rel="noopener noreferrer" target="_blank">https://www.reuters.com/technology/us-senators-question-meta-over-chinese-russian-access-facebook-data-statement-2023-02-06/</a></p><p><a href="https://www.warner.senate.gov/public/index.cfm/pressreleases" rel="noopener noreferrer" target="_blank">https://www.warner.senate.gov/public/index.cfm/pressreleases</a></p><p><br></p><p><strong>🇷🇴 Olimpiu Pop, Transylvania, Romania</strong></p><p>Google Outrun by Maltervising Actors</p><p><a href="https://www.spamhaus.com/resource-center/a-surge-of-malvertising-across-google-ads-is-distributing-dangerous-malware/" rel="noopener noreferrer" target="_blank">https://www.spamhaus.com/resource-center/a-surge-of-malvertising-across-google-ads-is-distributing-dangerous-malware/</a></p><p><a href="https://arstechnica.com/information-technology/2023/02/until-further-notice-think-twice-before-using-google-to-download-software/" rel="noopener noreferrer" target="_blank">https://arstechnica.com/information-technology/2023/02/until-further-notice-think-twice-before-using-google-to-download-software/</a></p><p><a href="https://www.sentinelone.com/labs/malvirt-net-virtualization-thrives-in-malvertising-attacks/" rel="noopener noreferrer" target="_blank">https://www.sentinelone.com/labs/malvirt-net-virtualization-thrives-in-malvertising-attacks/</a></p><p><br></p>]]></description><content:encoded><![CDATA[<p><strong>Hey! It’s 5:05, on Wednesday, February 8 , 2023. </strong>From the Sourced Podcast Network in New York City, this is your host, Pokie Huang. Stories in today’s episode come from <strong>Olimpiu Pop </strong>in Transylvania, Romania, <strong>Katy Craig</strong> in San Diego, California, <strong>Edwin Kwan</strong> in Sydney, Australia.</p><p><strong>&nbsp;</strong>Let’s get to it!</p><p><strong>🇦🇺 Edwin Kwan, Sydney, Australia</strong></p><p>Beware of Donation Scams about Earthquake in Turkey and Syria</p><p><a href="https://isc.sans.edu/diary/Earthquake+in+Turkey+and+Syria+Be+Aware+of+Possible+Donation+Scams/29518" rel="noopener noreferrer" target="_blank">https://isc.sans.edu/diary/Earthquake+in+Turkey+and+Syria+Be+Aware+of+Possible+Donation+Scams/29518</a></p><p><br></p><p><strong>🇺🇸</strong> <strong>Katy Craig, San Diego, California</strong></p><p>Facebook and foreign developers</p><p><a href="https://www.reuters.com/technology/us-senators-question-meta-over-chinese-russian-access-facebook-data-statement-2023-02-06/" rel="noopener noreferrer" target="_blank">https://www.reuters.com/technology/us-senators-question-meta-over-chinese-russian-access-facebook-data-statement-2023-02-06/</a></p><p><a href="https://www.warner.senate.gov/public/index.cfm/pressreleases" rel="noopener noreferrer" target="_blank">https://www.warner.senate.gov/public/index.cfm/pressreleases</a></p><p><br></p><p><strong>🇷🇴 Olimpiu Pop, Transylvania, Romania</strong></p><p>Google Outrun by Maltervising Actors</p><p><a href="https://www.spamhaus.com/resource-center/a-surge-of-malvertising-across-google-ads-is-distributing-dangerous-malware/" rel="noopener noreferrer" target="_blank">https://www.spamhaus.com/resource-center/a-surge-of-malvertising-across-google-ads-is-distributing-dangerous-malware/</a></p><p><a href="https://arstechnica.com/information-technology/2023/02/until-further-notice-think-twice-before-using-google-to-download-software/" rel="noopener noreferrer" target="_blank">https://arstechnica.com/information-technology/2023/02/until-further-notice-think-twice-before-using-google-to-download-software/</a></p><p><a href="https://www.sentinelone.com/labs/malvirt-net-virtualization-thrives-in-malvertising-attacks/" rel="noopener noreferrer" target="_blank">https://www.sentinelone.com/labs/malvirt-net-virtualization-thrives-in-malvertising-attacks/</a></p><p><br></p>]]></content:encoded><link><![CDATA[https://3zozb9fxlbueipjyapmaas.captivate.fm/episode/episode-73-its-5-05-wednesday-february-8-2023]]></link><guid isPermaLink="false">686c1b71-0c3f-465f-b123-f2574d529f62</guid><itunes:image href="https://artwork.captivate.fm/03ec65c7-d855-461e-885f-f45a15ed8d53/DD-uj3aA6lyfDFHyk3IuMejT.png"/><dc:creator><![CDATA[Contributors from Around the World]]></dc:creator><pubDate>Wed, 08 Feb 2023 16:45:00 -0400</pubDate><enclosure url="https://dts.podtrac.com/redirect.mp3/podcasts.captivate.fm/media/6980f3c3-dd3e-4b62-b00d-0e2c51c1843a/2023-02-08-505-Episode-73-converted.mp3" length="4488337" type="audio/mpeg"/><itunes:duration>06:14</itunes:duration><itunes:explicit>false</itunes:explicit><itunes:episodeType>full</itunes:episodeType><itunes:season>1</itunes:season><itunes:episode>73</itunes:episode><itunes:season>1</itunes:season><podcast:episode>73</podcast:episode><podcast:season>1</podcast:season><itunes:author>Contributors from Around the World</itunes:author></item><item><title>Special Episode - It’s 5:05, Deming - AI vs John Willis Part 1</title><itunes:title>Special Episode - It’s 5:05, Deming - AI vs John Willis Part 1</itunes:title><description><![CDATA[<p>This is a special episode from the Sourced Podcast Network, home of "It's 5:05". I'm Mark Miller, Founder and Executive producer. </p><p>With ChatpGTP being the rage right now, I think it's important that we step back and evaluate where AI transformation engines are going and how they might be used in the near future. My first avenue of exploration is to find out how accurate the current state of AI is when it comes to its output responses. </p><p>I called my friend John Willis, one of the premier experts on W. Edwards Deming. We started talking about how to prove, or disprove, the accuracy of the information being produced by ChatGPT.</p><p>After talking a bit, we thought it would be fun to do something like the reaction videos on YouTube where people react in real time to a video. In this case, I asked John to react to the output of three AI engines when we asked them questions about Demming. </p><p>We chose three engines. ChatGTP, for obvious reasons, Jasper and Perplexity.</p><p>What follows are John's reactions in real time to a simple question posed to the chat engines. "Summarize the direct connections between Edwards Deming and DevOps." </p><p>What you are about to hear is the immediate reaction to the AI responses. </p><p>We hope this will help you understand how chat engines can be of use and how you can't take what they output at face value. </p><p>Let's get started.</p>]]></description><content:encoded><![CDATA[<p>This is a special episode from the Sourced Podcast Network, home of "It's 5:05". I'm Mark Miller, Founder and Executive producer. </p><p>With ChatpGTP being the rage right now, I think it's important that we step back and evaluate where AI transformation engines are going and how they might be used in the near future. My first avenue of exploration is to find out how accurate the current state of AI is when it comes to its output responses. </p><p>I called my friend John Willis, one of the premier experts on W. Edwards Deming. We started talking about how to prove, or disprove, the accuracy of the information being produced by ChatGPT.</p><p>After talking a bit, we thought it would be fun to do something like the reaction videos on YouTube where people react in real time to a video. In this case, I asked John to react to the output of three AI engines when we asked them questions about Demming. </p><p>We chose three engines. ChatGTP, for obvious reasons, Jasper and Perplexity.</p><p>What follows are John's reactions in real time to a simple question posed to the chat engines. "Summarize the direct connections between Edwards Deming and DevOps." </p><p>What you are about to hear is the immediate reaction to the AI responses. </p><p>We hope this will help you understand how chat engines can be of use and how you can't take what they output at face value. </p><p>Let's get started.</p>]]></content:encoded><link><![CDATA[https://3zozb9fxlbueipjyapmaas.captivate.fm/episode/special-episode-its-5-05-deming-ai-vs-john-willis]]></link><guid isPermaLink="false">85c1a55b-d7f8-466a-a9a9-63fdb55ab94e</guid><itunes:image href="https://artwork.captivate.fm/50eaf96f-67cb-4d78-b9ce-b4a19e2427a9/NNnp3b9hblFjNV7gSjjniDou.png"/><dc:creator><![CDATA[Contributors from Around the World]]></dc:creator><pubDate>Wed, 08 Feb 2023 11:00:00 -0400</pubDate><enclosure url="https://dts.podtrac.com/redirect.mp3/podcasts.captivate.fm/media/963265a0-5cd0-4e49-bf4a-fdb09e1fdeb0/Deming-AI-vs-John-Willis-Final-converted.mp3" length="19638692" type="audio/mpeg"/><itunes:duration>20:27</itunes:duration><itunes:explicit>false</itunes:explicit><itunes:episodeType>full</itunes:episodeType><itunes:season>1</itunes:season><itunes:season>1</itunes:season><podcast:season>1</podcast:season><itunes:author>Contributors from Around the World</itunes:author></item><item><title>Episode #72 - It&apos;s 5:05, Tuesday, February 7, 2023</title><itunes:title>Episode #72 - It&apos;s 5:05, Tuesday, February 7, 2023</itunes:title><description><![CDATA[<p>Hey, it's 5:05 on Tuesday, February 7th, 2023. From the Sourced Podcast Network in New York City, this is your host, Pokie Huang. Stories in today's episode come from <strong>Katy Craig</strong> in San Diego, California, <strong>Derek Weeks</strong> in Bethesda, Maryland, <strong>Olimpiu Pop</strong> in Transylvania, Romania, <strong>Ian Garrett</strong>, in Arlington, Virginia, <strong>Edwin Kwan</strong> in Sydney, Australia.&nbsp;</p><p>Let's get to it.</p><p>🇺🇸 <strong>Katy Craig, San Diego, California</strong></p><p>Google unveils Bard</p><p><a href="https://blog.google/technology/ai/bard-google-ai-search-updates/" rel="noopener noreferrer" target="_blank">https://blog.google/technology/ai/bard-google-ai-search-updates/</a></p><p><a href="https://www.cnn.com/2023/02/06/tech/google-bard-chatgpt-rival/index.html" rel="noopener noreferrer" target="_blank">https://www.cnn.com/2023/02/06/tech/google-bard-chatgpt-rival/index.html</a></p><p><a href="https://9to5google.com/2022/06/12/google-ai-lamda-sentient/" rel="noopener noreferrer" target="_blank">https://9to5google.com/2022/06/12/google-ai-lamda-sentient</a></p><p><a href="https://cajundiscordian.medium.com/what-is-lamda-and-what-does-it-want-688632134489" rel="noopener noreferrer" target="_blank">https://cajundiscordian.medium.com/what-is-lamda-and-what-does-it-want-688632134489</a></p><p><strong>🇺🇸</strong> <strong>Derek Weeks, Bethesda, Maryland</strong></p><p>VMware hypervisors under attack</p><p><a href="https://techcrunch.com/2023/02/06/hackers-vmware-esxi-ransomware/" rel="noopener noreferrer" target="_blank">https://techcrunch.com/2023/02/06/hackers-vmware-esxi-ransomware/</a></p><p><strong>🇷🇴 Olimpiu Pop, Transylvania, Romania</strong></p><p>The Most Significant Non-Windows Ransomware Attack Targets Vulnerable VMWare ESXi Machines </p><p><a href="https://www.reuters.com/world/europe/italy-sounds-alarm-large-scale-computer-hacking-attack-2023-02-05/" rel="noopener noreferrer" target="_blank">https://www.reuters.com/world/europe/italy-sounds-alarm-large-scale-computer-hacking-attack-2023-02-05/</a></p><p><a href="https://www.bleepingcomputer.com/news/security/massive-esxiargs-ransomware-attack-targets-vmware-esxi-servers-worldwide/" rel="noopener noreferrer" target="_blank">https://www.bleepingcomputer.com/news/security/massive-esxiargs-ransomware-attack-targets-vmware-esxi-servers-worldwide/</a></p><p><a href="https://blog.checkpoint.com/2023/02/06/massive-ransomware-attack-targets-vmware-esxi-servers/" rel="noopener noreferrer" target="_blank">https://blog.checkpoint.com/2023/02/06/massive-ransomware-attack-targets-vmware-esxi-servers/</a></p><p><a href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-21974" rel="noopener noreferrer" target="_blank">https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-21974</a></p><p><a href="https://www.vmware.com/security/advisories/VMSA-2021-0002.html" rel="noopener noreferrer" target="_blank">https://www.vmware.com/security/advisories/VMSA-2021-0002.html</a></p><p><a href="https://www.cert.ssi.gouv.fr/alerte/CERTFR-2023-ALE-015/" rel="noopener noreferrer" target="_blank">https://www.cert.ssi.gouv.fr/alerte/CERTFR-2023-ALE-015/</a></p><p><a href="https://blog.ovhcloud.com/ransomware-targeting-vmware-esxi/" rel="noopener noreferrer" target="_blank">https://blog.ovhcloud.com/ransomware-targeting-vmware-esxi/</a></p><p><a href="https://search.censys.io/search?resource=hosts&amp;sort=RELEVANCE&amp;per_page=25&amp;virtual_hosts=EXCLUDE&amp;q=services.http.response.body%3A+%22How+to+Restore+Your+Files%22+and+services.http.response.html_title%3A%22How+to+Restore+Your+Files%22&amp;ct=1" rel="noopener noreferrer" target="_blank">https://search.censys.io/search?resource=hosts&amp;sort=RELEVANCE&amp;per_page=25&amp;virtual_hosts=EXCLUDE&amp;q=services.http.response.body%3A+%22How+to+Restore+Your+Files%22+and+services.http.response.html_title%3A%22How+to+Restore+Your+Files%22&amp;ct=1</a></p><p><a...]]></description><content:encoded><![CDATA[<p>Hey, it's 5:05 on Tuesday, February 7th, 2023. From the Sourced Podcast Network in New York City, this is your host, Pokie Huang. Stories in today's episode come from <strong>Katy Craig</strong> in San Diego, California, <strong>Derek Weeks</strong> in Bethesda, Maryland, <strong>Olimpiu Pop</strong> in Transylvania, Romania, <strong>Ian Garrett</strong>, in Arlington, Virginia, <strong>Edwin Kwan</strong> in Sydney, Australia.&nbsp;</p><p>Let's get to it.</p><p>🇺🇸 <strong>Katy Craig, San Diego, California</strong></p><p>Google unveils Bard</p><p><a href="https://blog.google/technology/ai/bard-google-ai-search-updates/" rel="noopener noreferrer" target="_blank">https://blog.google/technology/ai/bard-google-ai-search-updates/</a></p><p><a href="https://www.cnn.com/2023/02/06/tech/google-bard-chatgpt-rival/index.html" rel="noopener noreferrer" target="_blank">https://www.cnn.com/2023/02/06/tech/google-bard-chatgpt-rival/index.html</a></p><p><a href="https://9to5google.com/2022/06/12/google-ai-lamda-sentient/" rel="noopener noreferrer" target="_blank">https://9to5google.com/2022/06/12/google-ai-lamda-sentient</a></p><p><a href="https://cajundiscordian.medium.com/what-is-lamda-and-what-does-it-want-688632134489" rel="noopener noreferrer" target="_blank">https://cajundiscordian.medium.com/what-is-lamda-and-what-does-it-want-688632134489</a></p><p><strong>🇺🇸</strong> <strong>Derek Weeks, Bethesda, Maryland</strong></p><p>VMware hypervisors under attack</p><p><a href="https://techcrunch.com/2023/02/06/hackers-vmware-esxi-ransomware/" rel="noopener noreferrer" target="_blank">https://techcrunch.com/2023/02/06/hackers-vmware-esxi-ransomware/</a></p><p><strong>🇷🇴 Olimpiu Pop, Transylvania, Romania</strong></p><p>The Most Significant Non-Windows Ransomware Attack Targets Vulnerable VMWare ESXi Machines </p><p><a href="https://www.reuters.com/world/europe/italy-sounds-alarm-large-scale-computer-hacking-attack-2023-02-05/" rel="noopener noreferrer" target="_blank">https://www.reuters.com/world/europe/italy-sounds-alarm-large-scale-computer-hacking-attack-2023-02-05/</a></p><p><a href="https://www.bleepingcomputer.com/news/security/massive-esxiargs-ransomware-attack-targets-vmware-esxi-servers-worldwide/" rel="noopener noreferrer" target="_blank">https://www.bleepingcomputer.com/news/security/massive-esxiargs-ransomware-attack-targets-vmware-esxi-servers-worldwide/</a></p><p><a href="https://blog.checkpoint.com/2023/02/06/massive-ransomware-attack-targets-vmware-esxi-servers/" rel="noopener noreferrer" target="_blank">https://blog.checkpoint.com/2023/02/06/massive-ransomware-attack-targets-vmware-esxi-servers/</a></p><p><a href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-21974" rel="noopener noreferrer" target="_blank">https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-21974</a></p><p><a href="https://www.vmware.com/security/advisories/VMSA-2021-0002.html" rel="noopener noreferrer" target="_blank">https://www.vmware.com/security/advisories/VMSA-2021-0002.html</a></p><p><a href="https://www.cert.ssi.gouv.fr/alerte/CERTFR-2023-ALE-015/" rel="noopener noreferrer" target="_blank">https://www.cert.ssi.gouv.fr/alerte/CERTFR-2023-ALE-015/</a></p><p><a href="https://blog.ovhcloud.com/ransomware-targeting-vmware-esxi/" rel="noopener noreferrer" target="_blank">https://blog.ovhcloud.com/ransomware-targeting-vmware-esxi/</a></p><p><a href="https://search.censys.io/search?resource=hosts&amp;sort=RELEVANCE&amp;per_page=25&amp;virtual_hosts=EXCLUDE&amp;q=services.http.response.body%3A+%22How+to+Restore+Your+Files%22+and+services.http.response.html_title%3A%22How+to+Restore+Your+Files%22&amp;ct=1" rel="noopener noreferrer" target="_blank">https://search.censys.io/search?resource=hosts&amp;sort=RELEVANCE&amp;per_page=25&amp;virtual_hosts=EXCLUDE&amp;q=services.http.response.body%3A+%22How+to+Restore+Your+Files%22+and+services.http.response.html_title%3A%22How+to+Restore+Your+Files%22&amp;ct=1</a></p><p><a href="https://www.bleepingcomputer.com/forums/t/782193/esxi-ransomware-help/" rel="noopener noreferrer" target="_blank">https://www.bleepingcomputer.com/forums/t/782193/esxi-ransomware-help/</a></p><p><strong>🇺🇸</strong> <strong>Ian Garrett, Arlington, Virginia</strong></p><p>Entertainment, Internet, and a side of Cybersecurity: Comcast will build cyber products</p><p><a href="https://www.securityweek.com/comcast-creates-enterprise-cybersecurity-business-unit/" rel="noopener noreferrer" target="_blank">https://www.securityweek.com/comcast-creates-enterprise-cybersecurity-business-unit/</a></p><p><br></p><p><strong>🇦🇺 Edwin Kwan, Sydney, Australia</strong></p><p>2FA Bypass for Facebook</p><p><a href="https://medium.com/pentesternepal/two-factor-authentication-bypass-on-facebook-3f4ac3ea139c" rel="noopener noreferrer" target="_blank">https://medium.com/pentesternepal/two-factor-authentication-bypass-on-facebook-3f4ac3ea139c</a></p>]]></content:encoded><link><![CDATA[https://3zozb9fxlbueipjyapmaas.captivate.fm/episode/episode-72-its-5-05-tuesday-february-7-2023]]></link><guid isPermaLink="false">024e41f7-4763-43b5-b19e-a6ea011b7e92</guid><itunes:image href="https://artwork.captivate.fm/b287a904-79ab-465d-92e8-17e55e3b014b/TAUBTeZN9hjX_aCvRkg2uzZb.png"/><dc:creator><![CDATA[Contributors from Around the World]]></dc:creator><pubDate>Tue, 07 Feb 2023 16:45:00 -0400</pubDate><enclosure url="https://dts.podtrac.com/redirect.mp3/podcasts.captivate.fm/media/7eace381-a046-40c8-9868-1817d448aace/2023-02-07-505-Episode-72-converted.mp3" length="8456546" type="audio/mpeg"/><itunes:duration>11:45</itunes:duration><itunes:explicit>false</itunes:explicit><itunes:episodeType>full</itunes:episodeType><itunes:season>1</itunes:season><itunes:episode>72</itunes:episode><itunes:season>1</itunes:season><podcast:episode>72</podcast:episode><podcast:season>1</podcast:season><itunes:author>Contributors from Around the World</itunes:author></item><item><title>Episode #71 - It&apos;s 5:05, Monday, February 6, 2023</title><itunes:title>Episode #71 - It&apos;s 5:05, Monday, February 6, 2023</itunes:title><description><![CDATA[<p><strong>Hey! It’s 5:05, on Monday, February 6&nbsp; , 2023. </strong>From the Sourced Podcast Network in New York City, this is your host, Pokie Huang. Stories in today’s episode come from <strong>Olimpiu Pop </strong>in Transylvania, Romania, <strong>Katy Craig</strong> in San Diego, California, <strong>Trac Bannon </strong>in Camp Hill, Pennsylvania, <strong>Edwin Kwan</strong> in Sydney, Australia. We will begin today’s episode with <strong>Amélie Koran</strong> in Washington DC.</p><p>Let’s get to it!</p><p><strong>🇺🇸 Amélie Koran, Washington, DC</strong></p><p>Open Source Security Policy Conundrum</p><p><a href="https://aeva.online/blog/2023-oss-security-conundrum/" rel="noopener noreferrer" target="_blank">https://aeva.online/blog/2023-oss-security-conundrum/</a></p><p><strong>🇦🇺 Edwin Kwan, Sydney, Australia</strong></p><p>Google Chrome No Longer Safe to Use for Millions of Users</p><p><a href="https://7news.com.au/news/cyber-security/google-chrome-to-become-dangerous-for-millions-of-users-from-next-week-c-9638559" rel="noopener noreferrer" target="_blank">https://7news.com.au/news/cyber-security/google-chrome-to-become-dangerous-for-millions-of-users-from-next-week-c-9638559</a></p><p><strong>🇺🇸 Tracy (Trac) Bannon, Camp Hill, Pennsylvania</strong></p><p>GSA to Collect Software Attestation Letters </p><p><a href="https://www.gsa.gov/cdnstatic/MV-23-02_0.pdf" rel="noopener noreferrer" target="_blank">https://www.gsa.gov/cdnstatic/MV-23-02_0.pdf</a></p><p><a href="https://fedscoop.com/gsa-to-collect-letters-of-attestation/" rel="noopener noreferrer" target="_blank">https://fedscoop.com/gsa-to-collect-letters-of-attestation/</a>&nbsp;</p><p><a href="https://fedscoop.com/cisa-to-develop-self-attestation-cybersecurity-standards-for-federal-software-vendors/" rel="noopener noreferrer" target="_blank">https://fedscoop.com/cisa-to-develop-self-attestation-cybersecurity-standards-for-federal-software-vendors/</a></p><p><a href="https://cyberscoop.com/dhs-sbom-adoption/" rel="noopener noreferrer" target="_blank">https://cyberscoop.com/dhs-sbom-adoption/</a>&nbsp;</p><p><a href="https://whitehouse.gov/wp-content/uploads/2022/09/M-22-18.pdf" rel="noopener noreferrer" target="_blank">https://whitehouse.gov/wp-content/uploads/2022/09/M-22-18.pdf</a></p><p><br></p><p><strong>🇺🇸</strong> <strong>Katy Craig, San Diego, California</strong></p><p>Google invests in Anthropic AI</p><p><a href="https://www.businessinsider.in/tech/news/chatgpt-will-soon-be-rivalled-by-a-similar-ai-engine-from-google/articleshow/97637277.cms" rel="noopener noreferrer" target="_blank">https://www.businessinsider.in/tech/news/chatgpt-will-soon-be-rivalled-by-a-similar-ai-engine-from-google/articleshow/97637277.cms</a></p><p><a href="https://timesofindia.indiatimes.com/gadgets-news/google-invests-400-million-in-ai-firm-working-on-chatgpt-rival/articleshow/97642214.cms" rel="noopener noreferrer" target="_blank">https://timesofindia.indiatimes.com/gadgets-news/google-invests-400-million-in-ai-firm-working-on-chatgpt-rival/articleshow/97642214.cms</a></p><p><a href="https://techcrunch.com/2023/02/03/google-best-yet-to-come-ai-journey-faces-potential-disruption-openai-chatgpt/" rel="noopener noreferrer" target="_blank">https://techcrunch.com/2023/02/03/google-best-yet-to-come-ai-journey-faces-potential-disruption-openai-chatgpt/</a></p><p><a href="https://techcrunch.com/2023/02/01/report-microsoft-plans-to-update-bing-with-a-faster-version-of-chatgpt-in-the-coming-weeks/" rel="noopener noreferrer" target="_blank">https://techcrunch.com/2023/02/01/report-microsoft-plans-to-update-bing-with-a-faster-version-of-chatgpt-in-the-coming-weeks/</a></p><p><br></p><p><strong>🇷🇴 Olimpiu Pop, Transylvania, Romania</strong></p><p>Did ION Group pay for the ransom? Or has Lockbit got cold feet?</p><p><a href="https://505updates.com/february-1-2023/" rel="noopener noreferrer" target="_blank">https://505updates.com/february-1-2023/</a></p><p><a...]]></description><content:encoded><![CDATA[<p><strong>Hey! It’s 5:05, on Monday, February 6&nbsp; , 2023. </strong>From the Sourced Podcast Network in New York City, this is your host, Pokie Huang. Stories in today’s episode come from <strong>Olimpiu Pop </strong>in Transylvania, Romania, <strong>Katy Craig</strong> in San Diego, California, <strong>Trac Bannon </strong>in Camp Hill, Pennsylvania, <strong>Edwin Kwan</strong> in Sydney, Australia. We will begin today’s episode with <strong>Amélie Koran</strong> in Washington DC.</p><p>Let’s get to it!</p><p><strong>🇺🇸 Amélie Koran, Washington, DC</strong></p><p>Open Source Security Policy Conundrum</p><p><a href="https://aeva.online/blog/2023-oss-security-conundrum/" rel="noopener noreferrer" target="_blank">https://aeva.online/blog/2023-oss-security-conundrum/</a></p><p><strong>🇦🇺 Edwin Kwan, Sydney, Australia</strong></p><p>Google Chrome No Longer Safe to Use for Millions of Users</p><p><a href="https://7news.com.au/news/cyber-security/google-chrome-to-become-dangerous-for-millions-of-users-from-next-week-c-9638559" rel="noopener noreferrer" target="_blank">https://7news.com.au/news/cyber-security/google-chrome-to-become-dangerous-for-millions-of-users-from-next-week-c-9638559</a></p><p><strong>🇺🇸 Tracy (Trac) Bannon, Camp Hill, Pennsylvania</strong></p><p>GSA to Collect Software Attestation Letters </p><p><a href="https://www.gsa.gov/cdnstatic/MV-23-02_0.pdf" rel="noopener noreferrer" target="_blank">https://www.gsa.gov/cdnstatic/MV-23-02_0.pdf</a></p><p><a href="https://fedscoop.com/gsa-to-collect-letters-of-attestation/" rel="noopener noreferrer" target="_blank">https://fedscoop.com/gsa-to-collect-letters-of-attestation/</a>&nbsp;</p><p><a href="https://fedscoop.com/cisa-to-develop-self-attestation-cybersecurity-standards-for-federal-software-vendors/" rel="noopener noreferrer" target="_blank">https://fedscoop.com/cisa-to-develop-self-attestation-cybersecurity-standards-for-federal-software-vendors/</a></p><p><a href="https://cyberscoop.com/dhs-sbom-adoption/" rel="noopener noreferrer" target="_blank">https://cyberscoop.com/dhs-sbom-adoption/</a>&nbsp;</p><p><a href="https://whitehouse.gov/wp-content/uploads/2022/09/M-22-18.pdf" rel="noopener noreferrer" target="_blank">https://whitehouse.gov/wp-content/uploads/2022/09/M-22-18.pdf</a></p><p><br></p><p><strong>🇺🇸</strong> <strong>Katy Craig, San Diego, California</strong></p><p>Google invests in Anthropic AI</p><p><a href="https://www.businessinsider.in/tech/news/chatgpt-will-soon-be-rivalled-by-a-similar-ai-engine-from-google/articleshow/97637277.cms" rel="noopener noreferrer" target="_blank">https://www.businessinsider.in/tech/news/chatgpt-will-soon-be-rivalled-by-a-similar-ai-engine-from-google/articleshow/97637277.cms</a></p><p><a href="https://timesofindia.indiatimes.com/gadgets-news/google-invests-400-million-in-ai-firm-working-on-chatgpt-rival/articleshow/97642214.cms" rel="noopener noreferrer" target="_blank">https://timesofindia.indiatimes.com/gadgets-news/google-invests-400-million-in-ai-firm-working-on-chatgpt-rival/articleshow/97642214.cms</a></p><p><a href="https://techcrunch.com/2023/02/03/google-best-yet-to-come-ai-journey-faces-potential-disruption-openai-chatgpt/" rel="noopener noreferrer" target="_blank">https://techcrunch.com/2023/02/03/google-best-yet-to-come-ai-journey-faces-potential-disruption-openai-chatgpt/</a></p><p><a href="https://techcrunch.com/2023/02/01/report-microsoft-plans-to-update-bing-with-a-faster-version-of-chatgpt-in-the-coming-weeks/" rel="noopener noreferrer" target="_blank">https://techcrunch.com/2023/02/01/report-microsoft-plans-to-update-bing-with-a-faster-version-of-chatgpt-in-the-coming-weeks/</a></p><p><br></p><p><strong>🇷🇴 Olimpiu Pop, Transylvania, Romania</strong></p><p>Did ION Group pay for the ransom? Or has Lockbit got cold feet?</p><p><a href="https://505updates.com/february-1-2023/" rel="noopener noreferrer" target="_blank">https://505updates.com/february-1-2023/</a></p><p><a href="https://www.visualcapitalist.com/the-worlds-10-largest-stock-markets/" rel="noopener noreferrer" target="_blank">https://www.visualcapitalist.com/the-worlds-10-largest-stock-markets/</a></p><p><a href="https://www.reuters.com/technology/hackers-say-ransom-paid-case-derivatives-data-firm-ion-company-declines-comment-2023-02-03/" rel="noopener noreferrer" target="_blank">https://www.reuters.com/technology/hackers-say-ransom-paid-case-derivatives-data-firm-ion-company-declines-comment-2023-02-03/</a></p><p><a href="https://www.kaspersky.com/resource-center/threats/lockbit-ransomware" rel="noopener noreferrer" target="_blank">https://www.kaspersky.com/resource-center/threats/lockbit-ransomware</a></p>]]></content:encoded><link><![CDATA[https://3zozb9fxlbueipjyapmaas.captivate.fm/episode/episode-71-its-5-05-monday-february-6-2023]]></link><guid isPermaLink="false">1bf1565a-bcec-4537-a48a-0b53e4e33aff</guid><itunes:image href="https://artwork.captivate.fm/f6cd376d-5a76-4723-a33b-399e862c1f8f/5k3zRNTSdhr8i1JgpQjz-9Hv.png"/><dc:creator><![CDATA[Contributors from Around the World]]></dc:creator><pubDate>Mon, 06 Feb 2023 16:45:00 -0400</pubDate><enclosure url="https://dts.podtrac.com/redirect.mp3/podcasts.captivate.fm/media/d433f00c-979c-4a0f-b06a-a8368d6321d6/2023-02-06-505-Episdoe-71-converted.mp3" length="8285392" type="audio/mpeg"/><itunes:duration>11:30</itunes:duration><itunes:explicit>false</itunes:explicit><itunes:episodeType>full</itunes:episodeType><itunes:season>1</itunes:season><itunes:episode>71</itunes:episode><itunes:season>1</itunes:season><podcast:episode>71</podcast:episode><podcast:season>1</podcast:season><itunes:author>Contributors from Around the World</itunes:author></item><item><title>Episode #70 - It&apos;s 5:05, Friday, February 3, 2023</title><itunes:title>Episode #70 - It&apos;s 5:05, Friday, February 3, 2023</itunes:title><description><![CDATA[<p><strong>Hey! It’s 5:05, Friday, February 3, 2023. </strong>From the Sourced Podcast Network in New York City, this is your host, Pokie Huang. Stories in today’s episode come from&nbsp;<strong>Katy Craig</strong> in San Diego, California, <strong>Edwin Kwan</strong> in Sydney, Australia,<strong> Trac Bannon </strong>in Camp Hill, Pennsylvania,<strong> </strong>and <strong>Olimpiu Pop </strong>in Transylvania, Romania</p><p>Let’s get to it!</p><p><strong>🇺🇸</strong> <strong>Katy Craig, San Diego, California</strong></p><p>SIM Jacking on the Rise</p><p><a href="https://www.darkreading.com/threat-intelligence/cybercriminals-target-telecom-provider-networks" rel="noopener noreferrer" target="_blank">Cybercriminals Target Telecom Provider Networks</a></p><p><a href="https://www.bleepingcomputer.com/news/security/google-fi-data-breach-let-hackers-carry-out-sim-swap-attacks/" rel="noopener noreferrer" target="_blank">Google Fi data breach let hackers carry out SIM swap attacks</a></p><p><a href="https://www.crowdstrike.com/blog/analysis-of-intrusion-campaign-targeting-telecom-and-bpo-companies/" rel="noopener noreferrer" target="_blank">Not a SIMulation: CrowdStrike Investigations Reveal Intrusion Campaign Targeting Telco and BPO Companies</a></p><p><strong>🇦🇺 Edwin Kwan, Sydney, Australia</strong></p><p>Record Number of Online Shopping and Trading Scams for Western Australia in 2022</p><p><a href="https://www.commerce.wa.gov.au/announcements/online-shopping-and-trading-scams-hit-record-wa-victims-2022" rel="noopener noreferrer" target="_blank">https://www.commerce.wa.gov.au/announcements/online-shopping-and-trading-scams-hit-record-wa-victims-2022</a></p><p><br></p><h2>🇺🇸 Tracy (Trac) Bannon, Camp Hill, Pennsylvania</h2><p>Microsoft Monitors the Ransomware Surge</p><p><a href="https://www.bleepingcomputer.com/news/security/microsoft-over-100-threat-actors-deploy-ransomware-in-attacks/" rel="noopener noreferrer" target="_blank">https://www.bleepingcomputer.com/news/security/microsoft-over-100-threat-actors-deploy-ransomware-in-attacks/</a></p><p><a href="https://twitter.com/MsftSecIntel/status/1620474467083231234" rel="noopener noreferrer" target="_blank">https://twitter.com/MsftSecIntel/status/1620474467083231234</a></p><p><a href="https://505updates.com/november-23-2022/" rel="noopener noreferrer" target="_blank">https://505updates.com/november-23-2022/</a>&nbsp;</p><p><br></p><p><strong>🇷🇴 Olimpiu Pop, Transylvania, Romania</strong></p><p>The Inaugural EU Cybersecurity Conference held in Brussels</p><p><a href="https://www.enisa.europa.eu/news/supporting-policy-developments-to-achieve-a-high-common-level-of-cybersecurity" rel="noopener noreferrer" target="_blank">https://www.enisa.europa.eu/news/supporting-policy-developments-to-achieve-a-high-common-level-of-cybersecurity</a></p>]]></description><content:encoded><![CDATA[<p><strong>Hey! It’s 5:05, Friday, February 3, 2023. </strong>From the Sourced Podcast Network in New York City, this is your host, Pokie Huang. Stories in today’s episode come from&nbsp;<strong>Katy Craig</strong> in San Diego, California, <strong>Edwin Kwan</strong> in Sydney, Australia,<strong> Trac Bannon </strong>in Camp Hill, Pennsylvania,<strong> </strong>and <strong>Olimpiu Pop </strong>in Transylvania, Romania</p><p>Let’s get to it!</p><p><strong>🇺🇸</strong> <strong>Katy Craig, San Diego, California</strong></p><p>SIM Jacking on the Rise</p><p><a href="https://www.darkreading.com/threat-intelligence/cybercriminals-target-telecom-provider-networks" rel="noopener noreferrer" target="_blank">Cybercriminals Target Telecom Provider Networks</a></p><p><a href="https://www.bleepingcomputer.com/news/security/google-fi-data-breach-let-hackers-carry-out-sim-swap-attacks/" rel="noopener noreferrer" target="_blank">Google Fi data breach let hackers carry out SIM swap attacks</a></p><p><a href="https://www.crowdstrike.com/blog/analysis-of-intrusion-campaign-targeting-telecom-and-bpo-companies/" rel="noopener noreferrer" target="_blank">Not a SIMulation: CrowdStrike Investigations Reveal Intrusion Campaign Targeting Telco and BPO Companies</a></p><p><strong>🇦🇺 Edwin Kwan, Sydney, Australia</strong></p><p>Record Number of Online Shopping and Trading Scams for Western Australia in 2022</p><p><a href="https://www.commerce.wa.gov.au/announcements/online-shopping-and-trading-scams-hit-record-wa-victims-2022" rel="noopener noreferrer" target="_blank">https://www.commerce.wa.gov.au/announcements/online-shopping-and-trading-scams-hit-record-wa-victims-2022</a></p><p><br></p><h2>🇺🇸 Tracy (Trac) Bannon, Camp Hill, Pennsylvania</h2><p>Microsoft Monitors the Ransomware Surge</p><p><a href="https://www.bleepingcomputer.com/news/security/microsoft-over-100-threat-actors-deploy-ransomware-in-attacks/" rel="noopener noreferrer" target="_blank">https://www.bleepingcomputer.com/news/security/microsoft-over-100-threat-actors-deploy-ransomware-in-attacks/</a></p><p><a href="https://twitter.com/MsftSecIntel/status/1620474467083231234" rel="noopener noreferrer" target="_blank">https://twitter.com/MsftSecIntel/status/1620474467083231234</a></p><p><a href="https://505updates.com/november-23-2022/" rel="noopener noreferrer" target="_blank">https://505updates.com/november-23-2022/</a>&nbsp;</p><p><br></p><p><strong>🇷🇴 Olimpiu Pop, Transylvania, Romania</strong></p><p>The Inaugural EU Cybersecurity Conference held in Brussels</p><p><a href="https://www.enisa.europa.eu/news/supporting-policy-developments-to-achieve-a-high-common-level-of-cybersecurity" rel="noopener noreferrer" target="_blank">https://www.enisa.europa.eu/news/supporting-policy-developments-to-achieve-a-high-common-level-of-cybersecurity</a></p>]]></content:encoded><link><![CDATA[https://3zozb9fxlbueipjyapmaas.captivate.fm/episode/episode-70-its-5-05-friday-february-3-2023]]></link><guid isPermaLink="false">ccc75377-63d8-47b1-99f7-4cd122c5f38f</guid><itunes:image href="https://artwork.captivate.fm/24be0830-e9b5-4f78-bd7d-c2dc411323f0/EydWkO42aBahPcmYqjfMGI0E.png"/><dc:creator><![CDATA[Contributors from Around the World]]></dc:creator><pubDate>Fri, 03 Feb 2023 16:45:00 -0400</pubDate><enclosure url="https://dts.podtrac.com/redirect.mp3/podcasts.captivate.fm/media/402c47e2-9957-4ed9-bc32-5c010ceac338/2023-02-03-505-Episode-70-converted.mp3" length="5960076" type="audio/mpeg"/><itunes:duration>08:17</itunes:duration><itunes:explicit>false</itunes:explicit><itunes:episodeType>full</itunes:episodeType><itunes:season>1</itunes:season><itunes:episode>70</itunes:episode><itunes:season>1</itunes:season><podcast:episode>70</podcast:episode><podcast:season>1</podcast:season><itunes:author>Contributors from Around the World</itunes:author></item><item><title>Episode #69 - It&apos;s 5:05, Thursday, February 2, 2023</title><itunes:title>Episode #69 - It&apos;s 5:05, Thursday, February 2, 2023</itunes:title><description><![CDATA[<p><strong>Hey! It’s 5:05, Thursday, February 2, 2023. </strong>From the Sourced Podcast Network in New York City, this is your host, Pokie Huang. Today’s report come from&nbsp; <strong>Edwin Kwan</strong> in Sydney, Australia,<strong> Olimpiu Pop</strong> in Transylvania, Romania,<strong> Katy Craig</strong> in San Diego, California and <strong>Mark Miller </strong>in Boca Raton, Florida.</p><p>Let’s get to it!</p><p><strong>﻿🇦🇺 Edwin Kwan, Sydney, Australia</strong></p><p>It's Change Your Password Day</p><p><a href="https://nationaltoday.com/change-your-password-day/" rel="noopener noreferrer" target="_blank">https://nationaltoday.com/change-your-password-day/</a></p><p><strong>🇷🇴 Olimpiu Pop, Transylvania, Romania</strong></p><p>The EU Agency for Cybersecurity publishes a report containing technological recommendations for GDPR implementation</p><p><a href="https://www.enisa.europa.eu/news/protecting-data-can-we-engineer-data-sharing" rel="noopener noreferrer" target="_blank">https://www.enisa.europa.eu/news/protecting-data-can-we-engineer-data-sharing</a></p><p><a href="https://www.enisa.europa.eu/news/protecting-data-can-we-engineer-data-sharing" rel="noopener noreferrer" target="_blank">https://www.enisa.europa.eu/news/protecting-data-can-we-engineer-data-sharing</a></p><p><a href="https://www.enisa.europa.eu/publications/engineering-personal-data-sharing" rel="noopener noreferrer" target="_blank">https://www.enisa.europa.eu/publications/engineering-personal-data-sharing</a></p><p><br></p><p><strong>🇺🇸</strong> <strong>Katy Craig, San Diego, California</strong></p><p>ChatGPT clones stealing user data</p><p><a href="https://www.hackread.com/chatgpt-clone-apps-collect-ios-play-store/" rel="noopener noreferrer" target="_blank">https://www.hackread.com/chatgpt-clone-apps-collect-ios-play-store/</a></p><p><br></p><p><strong>🇺🇸</strong> <strong>Mark Miller, Boca Raton, Florida</strong></p><p>CVE-2023-20076- Cisco Appliances Vulnerability Announced</p><p>When Pwning Cisco, Persistence is Key - When Pwning Supply Chain, Cisco is Key</p><p><a href="https://www.trellix.com/en-us/about/newsroom/stories/research/when-pwning-cisco-persistence-is-key-when-pwning-supply-chain-cisco-is-key.html" rel="noopener noreferrer" target="_blank">https://www.trellix.com/en-us/about/newsroom/stories/research/when-pwning-cisco-persistence-is-key-when-pwning-supply-chain-cisco-is-key.html</a></p><p>Command-Injection Bug in Cisco Industrial Gear Opens Devices to Complete Takeover</p><p><a href="https://www.darkreading.com/ics-ot/command-injection-bug-cisco-industrial-gear-devices-complete-takeover" rel="noopener noreferrer" target="_blank">https://www.darkreading.com/ics-ot/command-injection-bug-cisco-industrial-gear-devices-complete-takeover</a></p>]]></description><content:encoded><![CDATA[<p><strong>Hey! It’s 5:05, Thursday, February 2, 2023. </strong>From the Sourced Podcast Network in New York City, this is your host, Pokie Huang. Today’s report come from&nbsp; <strong>Edwin Kwan</strong> in Sydney, Australia,<strong> Olimpiu Pop</strong> in Transylvania, Romania,<strong> Katy Craig</strong> in San Diego, California and <strong>Mark Miller </strong>in Boca Raton, Florida.</p><p>Let’s get to it!</p><p><strong>﻿🇦🇺 Edwin Kwan, Sydney, Australia</strong></p><p>It's Change Your Password Day</p><p><a href="https://nationaltoday.com/change-your-password-day/" rel="noopener noreferrer" target="_blank">https://nationaltoday.com/change-your-password-day/</a></p><p><strong>🇷🇴 Olimpiu Pop, Transylvania, Romania</strong></p><p>The EU Agency for Cybersecurity publishes a report containing technological recommendations for GDPR implementation</p><p><a href="https://www.enisa.europa.eu/news/protecting-data-can-we-engineer-data-sharing" rel="noopener noreferrer" target="_blank">https://www.enisa.europa.eu/news/protecting-data-can-we-engineer-data-sharing</a></p><p><a href="https://www.enisa.europa.eu/news/protecting-data-can-we-engineer-data-sharing" rel="noopener noreferrer" target="_blank">https://www.enisa.europa.eu/news/protecting-data-can-we-engineer-data-sharing</a></p><p><a href="https://www.enisa.europa.eu/publications/engineering-personal-data-sharing" rel="noopener noreferrer" target="_blank">https://www.enisa.europa.eu/publications/engineering-personal-data-sharing</a></p><p><br></p><p><strong>🇺🇸</strong> <strong>Katy Craig, San Diego, California</strong></p><p>ChatGPT clones stealing user data</p><p><a href="https://www.hackread.com/chatgpt-clone-apps-collect-ios-play-store/" rel="noopener noreferrer" target="_blank">https://www.hackread.com/chatgpt-clone-apps-collect-ios-play-store/</a></p><p><br></p><p><strong>🇺🇸</strong> <strong>Mark Miller, Boca Raton, Florida</strong></p><p>CVE-2023-20076- Cisco Appliances Vulnerability Announced</p><p>When Pwning Cisco, Persistence is Key - When Pwning Supply Chain, Cisco is Key</p><p><a href="https://www.trellix.com/en-us/about/newsroom/stories/research/when-pwning-cisco-persistence-is-key-when-pwning-supply-chain-cisco-is-key.html" rel="noopener noreferrer" target="_blank">https://www.trellix.com/en-us/about/newsroom/stories/research/when-pwning-cisco-persistence-is-key-when-pwning-supply-chain-cisco-is-key.html</a></p><p>Command-Injection Bug in Cisco Industrial Gear Opens Devices to Complete Takeover</p><p><a href="https://www.darkreading.com/ics-ot/command-injection-bug-cisco-industrial-gear-devices-complete-takeover" rel="noopener noreferrer" target="_blank">https://www.darkreading.com/ics-ot/command-injection-bug-cisco-industrial-gear-devices-complete-takeover</a></p>]]></content:encoded><link><![CDATA[https://3zozb9fxlbueipjyapmaas.captivate.fm/episode/episode-69-its-5-05-thursday-february-2-2023]]></link><guid isPermaLink="false">5f9b3473-5d81-413f-9a06-55c80d985093</guid><itunes:image href="https://artwork.captivate.fm/5cef1353-0a7f-4fcb-9ebd-4ca374a72ca6/zHc-XMn7M3WHfgxjPzPikkGF.png"/><dc:creator><![CDATA[Contributors from Around the World]]></dc:creator><pubDate>Thu, 02 Feb 2023 16:45:00 -0400</pubDate><enclosure url="https://dts.podtrac.com/redirect.mp3/podcasts.captivate.fm/media/54917280-6f0a-432d-ac2a-fcfab4f4d6d4/2023-02-02-505-Episode-69-updated-converted.mp3" length="6205523" type="audio/mpeg"/><itunes:duration>08:37</itunes:duration><itunes:explicit>false</itunes:explicit><itunes:episodeType>full</itunes:episodeType><itunes:season>1</itunes:season><itunes:episode>69</itunes:episode><itunes:season>1</itunes:season><podcast:episode>69</podcast:episode><podcast:season>1</podcast:season><itunes:author>Contributors from Around the World</itunes:author></item><item><title>Episode #68 - It&apos;s 5:05, Wednesday, February 1, 2023</title><itunes:title>Episode #68 - It&apos;s 5:05, Wednesday, February 1, 2023</itunes:title><description><![CDATA[<p><strong>Hey! It’s 5:05, Wednesday, February 1, 2023. </strong>From the Sourced Podcast Network in New York City, this is your host, Pokie Huang. Stories in today’s episode come from <strong>Derek Weeks </strong>in Bethesda, Maryland,<strong> Olimpiu Pop</strong> in Transylvania, Romania,<strong> Ian Garret</strong> in Arlington, Virginia, <strong>Katy Craig</strong> in San Diego, California and <strong>Edwin Kwan</strong> in Sydney, Australia.</p><p>Let’s get to it!</p><p><strong>🇺🇸</strong> <strong>Derek Weeks, Bethesda, Maryland</strong></p><p>open source security index reveals top 100</p><p><a href="https://opensourcesecurityindex.io/" rel="noopener noreferrer" target="_blank">https://opensourcesecurityindex.io/</a></p><p><a href="https://www.esecurityplanet.com/networks/open-source-security-ranking/" rel="noopener noreferrer" target="_blank">https://www.esecurityplanet.com/networks/open-source-security-ranking/</a></p><p><strong>🇷🇴 Olimpiu Pop, Transylvania, Romania</strong></p><p>Lockbit ransomware group tries to unplug the City Of London</p><p><a href="https://www.telegraph.co.uk/business/2023/02/01/city-london-traders-hit-russia-linked-cyber-attack/" rel="noopener noreferrer" target="_blank">https://www.telegraph.co.uk/business/2023/02/01/city-london-traders-hit-russia-linked-cyber-attack/</a></p><p><br></p><p><strong>🇺🇸</strong> <strong>Ian Garrett, Arlington, Virginia</strong></p><p>Does this Hacker Job Come With a 401k?</p><p><a href="https://securelist.com/darknet-it-headhunting/108526/" rel="noopener noreferrer" target="_blank">https://securelist.com/darknet-it-headhunting/108526/</a></p><p><br></p><p><strong>🇺🇸</strong> <strong>Katy Craig, San Diego, California</strong></p><p>Prilex payment card malware</p><p><a href="https://securelist.com/prilex-modification-now-targeting-contactless-credit-card-transactions/108569/" rel="noopener noreferrer" target="_blank">https://securelist.com/prilex-modification-now-targeting-contactless-credit-card-transactions/108569/</a></p><p><a href="https://www.statista.com/statistics/1227815/contactless-payments-worldwide-by-region/" rel="noopener noreferrer" target="_blank">https://www.statista.com/statistics/1227815/contactless-payments-worldwide-by-region/</a></p><p><br></p><p><strong>🇦🇺 Edwin Kwan, Sydney, Australia</strong></p><p>Dodgy Android Apps Gaining Popularity on Google Play</p><p><a href="https://www.bleepingcomputer.com/news/security/shady-reward-apps-on-google-play-amass-20-million-downloads/" rel="noopener noreferrer" target="_blank">https://www.bleepingcomputer.com/news/security/shady-reward-apps-on-google-play-amass-20-million-downloads/</a></p><p><br></p>]]></description><content:encoded><![CDATA[<p><strong>Hey! It’s 5:05, Wednesday, February 1, 2023. </strong>From the Sourced Podcast Network in New York City, this is your host, Pokie Huang. Stories in today’s episode come from <strong>Derek Weeks </strong>in Bethesda, Maryland,<strong> Olimpiu Pop</strong> in Transylvania, Romania,<strong> Ian Garret</strong> in Arlington, Virginia, <strong>Katy Craig</strong> in San Diego, California and <strong>Edwin Kwan</strong> in Sydney, Australia.</p><p>Let’s get to it!</p><p><strong>🇺🇸</strong> <strong>Derek Weeks, Bethesda, Maryland</strong></p><p>open source security index reveals top 100</p><p><a href="https://opensourcesecurityindex.io/" rel="noopener noreferrer" target="_blank">https://opensourcesecurityindex.io/</a></p><p><a href="https://www.esecurityplanet.com/networks/open-source-security-ranking/" rel="noopener noreferrer" target="_blank">https://www.esecurityplanet.com/networks/open-source-security-ranking/</a></p><p><strong>🇷🇴 Olimpiu Pop, Transylvania, Romania</strong></p><p>Lockbit ransomware group tries to unplug the City Of London</p><p><a href="https://www.telegraph.co.uk/business/2023/02/01/city-london-traders-hit-russia-linked-cyber-attack/" rel="noopener noreferrer" target="_blank">https://www.telegraph.co.uk/business/2023/02/01/city-london-traders-hit-russia-linked-cyber-attack/</a></p><p><br></p><p><strong>🇺🇸</strong> <strong>Ian Garrett, Arlington, Virginia</strong></p><p>Does this Hacker Job Come With a 401k?</p><p><a href="https://securelist.com/darknet-it-headhunting/108526/" rel="noopener noreferrer" target="_blank">https://securelist.com/darknet-it-headhunting/108526/</a></p><p><br></p><p><strong>🇺🇸</strong> <strong>Katy Craig, San Diego, California</strong></p><p>Prilex payment card malware</p><p><a href="https://securelist.com/prilex-modification-now-targeting-contactless-credit-card-transactions/108569/" rel="noopener noreferrer" target="_blank">https://securelist.com/prilex-modification-now-targeting-contactless-credit-card-transactions/108569/</a></p><p><a href="https://www.statista.com/statistics/1227815/contactless-payments-worldwide-by-region/" rel="noopener noreferrer" target="_blank">https://www.statista.com/statistics/1227815/contactless-payments-worldwide-by-region/</a></p><p><br></p><p><strong>🇦🇺 Edwin Kwan, Sydney, Australia</strong></p><p>Dodgy Android Apps Gaining Popularity on Google Play</p><p><a href="https://www.bleepingcomputer.com/news/security/shady-reward-apps-on-google-play-amass-20-million-downloads/" rel="noopener noreferrer" target="_blank">https://www.bleepingcomputer.com/news/security/shady-reward-apps-on-google-play-amass-20-million-downloads/</a></p><p><br></p>]]></content:encoded><link><![CDATA[https://3zozb9fxlbueipjyapmaas.captivate.fm/episode/episode-68-its-5-05-wednesday-february-1-2023]]></link><guid isPermaLink="false">5ee2fece-13dd-4206-8b68-252ba8947f96</guid><itunes:image href="https://artwork.captivate.fm/9752aa23-88b6-43da-955d-5e6ef7b7393e/25EF5OS-hrjM-SYC6Qs44WBw.png"/><dc:creator><![CDATA[Contributors from Around the World]]></dc:creator><pubDate>Wed, 01 Feb 2023 16:45:00 -0400</pubDate><enclosure url="https://dts.podtrac.com/redirect.mp3/podcasts.captivate.fm/media/929ee9e5-9f9f-46f3-aa5b-b0631f8d3bac/2023-02-01-505-Episode-68-converted.mp3" length="8465637" type="audio/mpeg"/><itunes:duration>11:45</itunes:duration><itunes:explicit>false</itunes:explicit><itunes:episodeType>full</itunes:episodeType><itunes:season>1</itunes:season><itunes:episode>68</itunes:episode><itunes:season>1</itunes:season><podcast:episode>68</podcast:episode><podcast:season>1</podcast:season><itunes:author>Contributors from Around the World</itunes:author></item><item><title>Episode #67 - It&apos;s 5:05, Tuesday, January 31, 2023</title><itunes:title>Episode #67 - It&apos;s 5:05, Tuesday, January 31, 2023</itunes:title><description><![CDATA[<p><strong>Hey! It’s 5:05, Tuesday, January31, 2023. </strong>From the Sourced Podcast Network in New York City, this is your host, Pokie Huang. Stories in today’s episode come from <strong>Mark Miller </strong>in New York City, <strong>Katy Craig </strong>in San Diego, California, <strong>Olimpiu Pop</strong> in Transylvania, Romania and <strong>Edwin Kwan </strong>in Sydney Australia.</p><p>Let’s get to it!</p><p><strong>🇺🇸</strong> <strong>Mark Miller, New York City</strong></p><p>Black Basta Ransomare Incident</p><p>Case Study: Thwarting Black Basta</p><p><a href="https://quadrantsec.com/resource/case-study/thwarting-black-basta" rel="noopener noreferrer" target="_blank">https://quadrantsec.com/resource/case-study/thwarting-black-basta</a></p><p>Technical Analysis of Quadrant Security, Black Basta Incident</p><p><a href="https://quadrantsec.com/sites/default/files/2023-01/Black-Basta_Technical-Analysis_2023.pdf" rel="noopener noreferrer" target="_blank">https://quadrantsec.com/sites/default/files/2023-01/Black-Basta_Technical-Analysis_2023.pdf</a></p><p><br></p><p>From the Labs: YARA Rule for Detecting Black Basta</p><p><a href="https://www.reversinglabs.com/from-the-labs/yara-rule-for-detecting-black-basta" rel="noopener noreferrer" target="_blank">https://www.reversinglabs.com/from-the-labs/yara-rule-for-detecting-black-basta</a></p><p><br></p><p><br></p><p><strong>🇺🇸</strong> <strong>Katy Craig, San Diego, California</strong></p><p>NSA issues IPv6 security guidance</p><p><a href="https://www.nsa.gov/Press-Room/Press-Releases-Statements/Press-Release-View/Article/3270451/nsa-publishes-internet-protocol-version-6-ipv6-security-guidance/" rel="noopener noreferrer" target="_blank">NSA Publishes Internet Protocol Version 6 (IPv6) Security Guidance</a></p><p><a href="https://media.defense.gov/2023/Jan/18/2003145994/-1/-1/0/CSI_IPV6_SECURITY_GUIDANCE.PDF" rel="noopener noreferrer" target="_blank">https://media.defense.gov/2023/Jan/18/2003145994/-1/-1/0/CSI_IPV6_SECURITY_GUIDANCE.PDF</a></p><p><br></p><p><strong>🇷🇴 Olimpiu Pop, Transylvania, Romania</strong></p><p>UK and Germany Under Cyber Barrage from Iranian and Russian Hacker Collectives</p><p><a href="https://www.euronews.com/2023/01/26/russian-hackers-launch-cyberattack-on-germany-in-leopard-retaliation" rel="noopener noreferrer" target="_blank">https://www.euronews.com/2023/01/26/russian-hackers-launch-cyberattack-on-germany-in-leopard-retaliation</a></p><p><a href="https://www.ncsc.gov.uk/news/uk-cyber-experts-warn-of-targeted-phishing-attacks-from-actors-based-in-russia-and-iran" rel="noopener noreferrer" target="_blank">https://www.ncsc.gov.uk/news/uk-cyber-experts-warn-of-targeted-phishing-attacks-from-actors-based-in-russia-and-iran</a></p><p><a href="https://thehackernews.com/2023/01/british-cyber-agency-warns-of-russian.html" rel="noopener noreferrer" target="_blank">https://thehackernews.com/2023/01/british-cyber-agency-warns-of-russian.html</a></p><p><br></p><p><strong>🇦🇺 Edwin Kwan, Sydney, Australia</strong></p><p>Code Signing Certificates for GitHub Desktop for Mac and Atom Revoked</p><p>https://www.bleepingcomputer.com/news/security/github-revokes-code-signing-certificates-stolen-in-repo-hack/</p><p><br></p>]]></description><content:encoded><![CDATA[<p><strong>Hey! It’s 5:05, Tuesday, January31, 2023. </strong>From the Sourced Podcast Network in New York City, this is your host, Pokie Huang. Stories in today’s episode come from <strong>Mark Miller </strong>in New York City, <strong>Katy Craig </strong>in San Diego, California, <strong>Olimpiu Pop</strong> in Transylvania, Romania and <strong>Edwin Kwan </strong>in Sydney Australia.</p><p>Let’s get to it!</p><p><strong>🇺🇸</strong> <strong>Mark Miller, New York City</strong></p><p>Black Basta Ransomare Incident</p><p>Case Study: Thwarting Black Basta</p><p><a href="https://quadrantsec.com/resource/case-study/thwarting-black-basta" rel="noopener noreferrer" target="_blank">https://quadrantsec.com/resource/case-study/thwarting-black-basta</a></p><p>Technical Analysis of Quadrant Security, Black Basta Incident</p><p><a href="https://quadrantsec.com/sites/default/files/2023-01/Black-Basta_Technical-Analysis_2023.pdf" rel="noopener noreferrer" target="_blank">https://quadrantsec.com/sites/default/files/2023-01/Black-Basta_Technical-Analysis_2023.pdf</a></p><p><br></p><p>From the Labs: YARA Rule for Detecting Black Basta</p><p><a href="https://www.reversinglabs.com/from-the-labs/yara-rule-for-detecting-black-basta" rel="noopener noreferrer" target="_blank">https://www.reversinglabs.com/from-the-labs/yara-rule-for-detecting-black-basta</a></p><p><br></p><p><br></p><p><strong>🇺🇸</strong> <strong>Katy Craig, San Diego, California</strong></p><p>NSA issues IPv6 security guidance</p><p><a href="https://www.nsa.gov/Press-Room/Press-Releases-Statements/Press-Release-View/Article/3270451/nsa-publishes-internet-protocol-version-6-ipv6-security-guidance/" rel="noopener noreferrer" target="_blank">NSA Publishes Internet Protocol Version 6 (IPv6) Security Guidance</a></p><p><a href="https://media.defense.gov/2023/Jan/18/2003145994/-1/-1/0/CSI_IPV6_SECURITY_GUIDANCE.PDF" rel="noopener noreferrer" target="_blank">https://media.defense.gov/2023/Jan/18/2003145994/-1/-1/0/CSI_IPV6_SECURITY_GUIDANCE.PDF</a></p><p><br></p><p><strong>🇷🇴 Olimpiu Pop, Transylvania, Romania</strong></p><p>UK and Germany Under Cyber Barrage from Iranian and Russian Hacker Collectives</p><p><a href="https://www.euronews.com/2023/01/26/russian-hackers-launch-cyberattack-on-germany-in-leopard-retaliation" rel="noopener noreferrer" target="_blank">https://www.euronews.com/2023/01/26/russian-hackers-launch-cyberattack-on-germany-in-leopard-retaliation</a></p><p><a href="https://www.ncsc.gov.uk/news/uk-cyber-experts-warn-of-targeted-phishing-attacks-from-actors-based-in-russia-and-iran" rel="noopener noreferrer" target="_blank">https://www.ncsc.gov.uk/news/uk-cyber-experts-warn-of-targeted-phishing-attacks-from-actors-based-in-russia-and-iran</a></p><p><a href="https://thehackernews.com/2023/01/british-cyber-agency-warns-of-russian.html" rel="noopener noreferrer" target="_blank">https://thehackernews.com/2023/01/british-cyber-agency-warns-of-russian.html</a></p><p><br></p><p><strong>🇦🇺 Edwin Kwan, Sydney, Australia</strong></p><p>Code Signing Certificates for GitHub Desktop for Mac and Atom Revoked</p><p>https://www.bleepingcomputer.com/news/security/github-revokes-code-signing-certificates-stolen-in-repo-hack/</p><p><br></p>]]></content:encoded><link><![CDATA[https://3zozb9fxlbueipjyapmaas.captivate.fm/episode/episode-67-its-5-05-tuesday-january-31-2023]]></link><guid isPermaLink="false">a3bff145-1be6-4328-910b-50c9af782a31</guid><itunes:image href="https://artwork.captivate.fm/b6f2ac99-38c1-4be6-8bfd-b98693856363/PB5XESmmgwfMddETxjm6htGD.png"/><dc:creator><![CDATA[Contributors from Around the World]]></dc:creator><pubDate>Tue, 31 Jan 2023 16:45:00 -0400</pubDate><enclosure url="https://dts.podtrac.com/redirect.mp3/podcasts.captivate.fm/media/1718b345-424d-4f0d-a63b-e969dafa3f16/2023-01-31-505-Episode-67-converted.mp3" length="6372602" type="audio/mpeg"/><itunes:duration>08:51</itunes:duration><itunes:explicit>false</itunes:explicit><itunes:episodeType>full</itunes:episodeType><itunes:season>1</itunes:season><itunes:episode>67</itunes:episode><itunes:season>1</itunes:season><podcast:episode>67</podcast:episode><podcast:season>1</podcast:season><itunes:author>Contributors from Around the World</itunes:author></item><item><title>Episode #66 - It&apos;s 5:05, Monday, January 30, 2023</title><itunes:title>Episode #66 - It&apos;s 5:05, Monday, January 30, 2023</itunes:title><description><![CDATA[<p><strong>Hey, it's 5:05 on Monday, January 30th, 2023</strong> from the Sourced Podcast Network in New York City, this is your host, Pokie Huang. Stories in today's episode come from <strong>Trac Bannon</strong> in Camp Hill, Pennsylvania, <strong>Edwin Kwan</strong> in Sydney, Australia, <strong>Katy Craig</strong> in San Diego, California, <strong>Olimpiu Pop</strong> in Transylvania, Romania.</p><p>Let's get to it.</p><p><strong>🇺🇸 Tracy (Trac) Bannon, Camp Hill, Pennsylvania</strong></p><p>Another day another breach: T-Mobile</p><p><a href="https://techcrunch.com/2023/01/19/t-mobile-data-breach/" rel="noopener noreferrer" target="_blank">https://techcrunch.com/2023/01/19/t-mobile-data-breach/</a>&nbsp;</p><p><a href="https://d18rn0p25nwr6d.cloudfront.net/CIK-0001283699/cd07a3a7-4109-47fe-a6c0-f16a300a3bf7.pdf" rel="noopener noreferrer" target="_blank">https://d18rn0p25nwr6d.cloudfront.net/CIK-0001283699/cd07a3a7-4109-47fe-a6c0-f16a300a3bf7.pdf</a>&nbsp;</p><p><a href="https://techcrunch.com/2022/04/22/lapsus-hackers-t-mobile/" rel="noopener noreferrer" target="_blank">https://techcrunch.com/2022/04/22/lapsus-hackers-t-mobile/</a>&nbsp;</p><p><strong>🇦🇺 Edwin Kwan, Sydney, Australia</strong></p><p>How to ensure success for your AppSec Security Champions Program</p><p><a href="https://boringappsec.substack.com/p/edition-15-is-your-champions-program" rel="noopener noreferrer" target="_blank">https://boringappsec.substack.com/p/edition-15-is-your-champions-program</a></p><p><br></p><p><strong>🇺🇸</strong> <strong>Katy Craig, San Diego, California</strong></p><p>NewsGPT: Buzzfeed goes all in on ChatGPT</p><p><a href="https://www.forbes.com/sites/chriswestfall/2023/01/26/buzzfeed-to-use-chatgpts-ai-for-content-creation-stock-up-200/?sh=b61e3b27eaec" rel="noopener noreferrer" target="_blank">https://www.forbes.com/sites/chriswestfall/2023/01/26/buzzfeed-to-use-chatgpts-ai-for-content-creation-stock-up-200/?sh=b61e3b27eaec</a>&nbsp;</p><p><a href="https://chat.openai.com/" rel="noopener noreferrer" target="_blank">https://chat.openai.com</a> “Write a short article on the significance of a news outlet using ChatGPT to develop content”</p><p><br></p><p><strong>🇷🇴 Olimpiu Pop, Transylvania, Romania</strong></p><p>Malware Molotov Cocktail Ingredients Thrown at Ukrinform Discovered</p><p><a href="https://505updates.com/january-19-2023/" rel="noopener noreferrer" target="_blank">https://505updates.com/january-19-2023/</a></p><p><a href="https://www.bleepingcomputer.com/news/security/ukraine-sandworm-hackers-hit-news-agency-with-5-data-wipers/" rel="noopener noreferrer" target="_blank">https://www.bleepingcomputer.com/news/security/ukraine-sandworm-hackers-hit-news-agency-with-5-data-wipers/</a></p><p><a href="https://cert.gov.ua/article/3718487" rel="noopener noreferrer" target="_blank">https://cert.gov.ua/article/3718487</a>&nbsp;</p><p><br></p>]]></description><content:encoded><![CDATA[<p><strong>Hey, it's 5:05 on Monday, January 30th, 2023</strong> from the Sourced Podcast Network in New York City, this is your host, Pokie Huang. Stories in today's episode come from <strong>Trac Bannon</strong> in Camp Hill, Pennsylvania, <strong>Edwin Kwan</strong> in Sydney, Australia, <strong>Katy Craig</strong> in San Diego, California, <strong>Olimpiu Pop</strong> in Transylvania, Romania.</p><p>Let's get to it.</p><p><strong>🇺🇸 Tracy (Trac) Bannon, Camp Hill, Pennsylvania</strong></p><p>Another day another breach: T-Mobile</p><p><a href="https://techcrunch.com/2023/01/19/t-mobile-data-breach/" rel="noopener noreferrer" target="_blank">https://techcrunch.com/2023/01/19/t-mobile-data-breach/</a>&nbsp;</p><p><a href="https://d18rn0p25nwr6d.cloudfront.net/CIK-0001283699/cd07a3a7-4109-47fe-a6c0-f16a300a3bf7.pdf" rel="noopener noreferrer" target="_blank">https://d18rn0p25nwr6d.cloudfront.net/CIK-0001283699/cd07a3a7-4109-47fe-a6c0-f16a300a3bf7.pdf</a>&nbsp;</p><p><a href="https://techcrunch.com/2022/04/22/lapsus-hackers-t-mobile/" rel="noopener noreferrer" target="_blank">https://techcrunch.com/2022/04/22/lapsus-hackers-t-mobile/</a>&nbsp;</p><p><strong>🇦🇺 Edwin Kwan, Sydney, Australia</strong></p><p>How to ensure success for your AppSec Security Champions Program</p><p><a href="https://boringappsec.substack.com/p/edition-15-is-your-champions-program" rel="noopener noreferrer" target="_blank">https://boringappsec.substack.com/p/edition-15-is-your-champions-program</a></p><p><br></p><p><strong>🇺🇸</strong> <strong>Katy Craig, San Diego, California</strong></p><p>NewsGPT: Buzzfeed goes all in on ChatGPT</p><p><a href="https://www.forbes.com/sites/chriswestfall/2023/01/26/buzzfeed-to-use-chatgpts-ai-for-content-creation-stock-up-200/?sh=b61e3b27eaec" rel="noopener noreferrer" target="_blank">https://www.forbes.com/sites/chriswestfall/2023/01/26/buzzfeed-to-use-chatgpts-ai-for-content-creation-stock-up-200/?sh=b61e3b27eaec</a>&nbsp;</p><p><a href="https://chat.openai.com/" rel="noopener noreferrer" target="_blank">https://chat.openai.com</a> “Write a short article on the significance of a news outlet using ChatGPT to develop content”</p><p><br></p><p><strong>🇷🇴 Olimpiu Pop, Transylvania, Romania</strong></p><p>Malware Molotov Cocktail Ingredients Thrown at Ukrinform Discovered</p><p><a href="https://505updates.com/january-19-2023/" rel="noopener noreferrer" target="_blank">https://505updates.com/january-19-2023/</a></p><p><a href="https://www.bleepingcomputer.com/news/security/ukraine-sandworm-hackers-hit-news-agency-with-5-data-wipers/" rel="noopener noreferrer" target="_blank">https://www.bleepingcomputer.com/news/security/ukraine-sandworm-hackers-hit-news-agency-with-5-data-wipers/</a></p><p><a href="https://cert.gov.ua/article/3718487" rel="noopener noreferrer" target="_blank">https://cert.gov.ua/article/3718487</a>&nbsp;</p><p><br></p>]]></content:encoded><link><![CDATA[https://3zozb9fxlbueipjyapmaas.captivate.fm/episode/episode-66-its-5-05-monday-january-30-2023]]></link><guid isPermaLink="false">d5ecc5da-0690-47e3-8432-a5c60630ebbd</guid><itunes:image href="https://artwork.captivate.fm/9049536b-9783-4f0e-a292-1fdfac8e2925/MUAG4F3zZMueMRQAP6039rsi.png"/><dc:creator><![CDATA[Contributors from Around the World]]></dc:creator><pubDate>Mon, 30 Jan 2023 16:45:00 -0400</pubDate><enclosure url="https://dts.podtrac.com/redirect.mp3/podcasts.captivate.fm/media/082adf88-284d-47a4-a41e-5e3470bbdca1/2023-01-30-505-Episdoe-66-converted.mp3" length="5609266" type="audio/mpeg"/><itunes:duration>07:47</itunes:duration><itunes:explicit>false</itunes:explicit><itunes:episodeType>full</itunes:episodeType><itunes:season>1</itunes:season><itunes:episode>66</itunes:episode><itunes:season>1</itunes:season><podcast:episode>66</podcast:episode><podcast:season>1</podcast:season><itunes:author>Contributors from Around the World</itunes:author></item><item><title>Episode #65 - It&apos;s 5:05, Friday, January 27, 2023</title><itunes:title>Episode #65 - It&apos;s 5:05, Friday, January 27, 2023</itunes:title><description><![CDATA[<p><strong>Hey! It’s 5:05, Friday, January 27, 2023. </strong>From the Sourced Podcast Network in New York City, this is your host, Pokie Huang. Stories in today’s episode come from <strong>Edwin Kwan </strong>in Sydney Australia, <strong>Trac Bannon</strong> in Camp Hill, Pennsylvania, <strong>Katy Craig </strong>in San Diego, California, <strong>Paulo Gouveia </strong>in Everglades, Florida, <strong>Olimpiu Pop</strong> in Transylvania, Romania and <strong>Mark Miller </strong>in New York City.</p><p>Let’s get to it!</p><p><strong>🇦🇺 Edwin Kwan, Sydney, Australia</strong></p><p>Your Data is more valuable than you may realise</p><p><a href="https://www.welivesecurity.com/2023/01/26/data-more-valuable-you-realize/" rel="noopener noreferrer" target="_blank">https://www.welivesecurity.com/2023/01/26/data-more-valuable-you-realize/</a></p><p><a href="https://techwireasia.com/2023/01/observing-data-privacy-day-the-importance-of-protecting-personal-information-in-the-digital-age/" rel="noopener noreferrer" target="_blank">https://techwireasia.com/2023/01/observing-data-privacy-day-the-importance-of-protecting-personal-information-in-the-digital-age/</a></p><p><a href="https://www.coe.int/en/web/portal/28-january-data-protection-day" rel="noopener noreferrer" target="_blank">https://www.coe.int/en/web/portal/28-january-data-protection-day</a></p><p><strong>🇺🇸 Tracy (Trac) Bannon, Camp Hill, Pennsylvania</strong></p><p>A helping hand for Cyber Criminals: ChatGPT</p><p><a href="https://research.checkpoint.com/2023/opwnai-cybercriminals-starting-to-use-chatgpt/" rel="noopener noreferrer" target="_blank">https://research.checkpoint.com/2023/opwnai-cybercriminals-starting-to-use-chatgpt/</a></p><p><a href="https://www.forbes.com/sites/thomasbrewster/2023/01/06/chatgpt-cybercriminal-malware-female-chatbots/?sh=1d4bbbf05534" rel="noopener noreferrer" target="_blank">https://www.forbes.com/sites/thomasbrewster/2023/01/06/chatgpt-cybercriminal-malware-female-chatbots/?sh=1d4bbbf05534</a></p><p><a href="https://www.pcmag.com/news/cybercriminals-using-chatgpt-to-build-hacking-tools-write-code" rel="noopener noreferrer" target="_blank">https://www.pcmag.com/news/cybercriminals-using-chatgpt-to-build-hacking-tools-write-code</a></p><p><a href="https://www.bleepingcomputer.com/news/technology/openais-new-chatgpt-bot-10-dangerous-things-its-capable-of/" rel="noopener noreferrer" target="_blank">https://www.bleepingcomputer.com/news/technology/openais-new-chatgpt-bot-10-dangerous-things-its-capable-of/</a></p><p><br></p><p><strong>🇺🇸</strong> <strong>Katy Craig, San Diego, California</strong></p><p>Weapon of Mass Distraction</p><p><a href="https://gurwinder.substack.com/p/tiktok-may-be-a-chinese-bio-weapon" rel="noopener noreferrer" target="_blank">https://gurwinder.substack.com/p/tiktok-may-be-a-chinese-bio-weapon</a></p><p><a href="https://www.ncbi.nlm.nih.gov/pmc/articles/PMC8622754/" rel="noopener noreferrer" target="_blank">https://www.ncbi.nlm.nih.gov/pmc/articles/PMC8622754/</a></p><p><a href="https://www.youtube.com/watch?v=0j0xzuh-6rY" rel="noopener noreferrer" target="_blank">https://www.youtube.com/watch?v=0j0xzuh-6rY</a></p><p><a href="https://www.cnn.com/2021/09/20/tech/china-tiktok-douyin-usage-limit-intl-hnk/index.html" rel="noopener noreferrer" target="_blank">https://www.cnn.com/2021/09/20/tech/china-tiktok-douyin-usage-limit-intl-hnk/index.html</a></p><p><a href="https://www.sciencealert.com/iq-scores-falling-in-worrying-reversal-20th-century-intelligence-boom-flynn-effect-intelligence" rel="noopener noreferrer" target="_blank">https://www.sciencealert.com/iq-scores-falling-in-worrying-reversal-20th-century-intelligence-boom-flynn-effect-intelligence</a></p><p><br></p><p><strong>🇺🇸</strong> <strong>Paulo Gouveia, Everglades, Florida</strong></p><p>Good news at last</p><p><a href="https://www.justice.gov/opa/pr/us-department-justice-disrupts-hive-ransomware-variant" rel="noopener noreferrer"...]]></description><content:encoded><![CDATA[<p><strong>Hey! It’s 5:05, Friday, January 27, 2023. </strong>From the Sourced Podcast Network in New York City, this is your host, Pokie Huang. Stories in today’s episode come from <strong>Edwin Kwan </strong>in Sydney Australia, <strong>Trac Bannon</strong> in Camp Hill, Pennsylvania, <strong>Katy Craig </strong>in San Diego, California, <strong>Paulo Gouveia </strong>in Everglades, Florida, <strong>Olimpiu Pop</strong> in Transylvania, Romania and <strong>Mark Miller </strong>in New York City.</p><p>Let’s get to it!</p><p><strong>🇦🇺 Edwin Kwan, Sydney, Australia</strong></p><p>Your Data is more valuable than you may realise</p><p><a href="https://www.welivesecurity.com/2023/01/26/data-more-valuable-you-realize/" rel="noopener noreferrer" target="_blank">https://www.welivesecurity.com/2023/01/26/data-more-valuable-you-realize/</a></p><p><a href="https://techwireasia.com/2023/01/observing-data-privacy-day-the-importance-of-protecting-personal-information-in-the-digital-age/" rel="noopener noreferrer" target="_blank">https://techwireasia.com/2023/01/observing-data-privacy-day-the-importance-of-protecting-personal-information-in-the-digital-age/</a></p><p><a href="https://www.coe.int/en/web/portal/28-january-data-protection-day" rel="noopener noreferrer" target="_blank">https://www.coe.int/en/web/portal/28-january-data-protection-day</a></p><p><strong>🇺🇸 Tracy (Trac) Bannon, Camp Hill, Pennsylvania</strong></p><p>A helping hand for Cyber Criminals: ChatGPT</p><p><a href="https://research.checkpoint.com/2023/opwnai-cybercriminals-starting-to-use-chatgpt/" rel="noopener noreferrer" target="_blank">https://research.checkpoint.com/2023/opwnai-cybercriminals-starting-to-use-chatgpt/</a></p><p><a href="https://www.forbes.com/sites/thomasbrewster/2023/01/06/chatgpt-cybercriminal-malware-female-chatbots/?sh=1d4bbbf05534" rel="noopener noreferrer" target="_blank">https://www.forbes.com/sites/thomasbrewster/2023/01/06/chatgpt-cybercriminal-malware-female-chatbots/?sh=1d4bbbf05534</a></p><p><a href="https://www.pcmag.com/news/cybercriminals-using-chatgpt-to-build-hacking-tools-write-code" rel="noopener noreferrer" target="_blank">https://www.pcmag.com/news/cybercriminals-using-chatgpt-to-build-hacking-tools-write-code</a></p><p><a href="https://www.bleepingcomputer.com/news/technology/openais-new-chatgpt-bot-10-dangerous-things-its-capable-of/" rel="noopener noreferrer" target="_blank">https://www.bleepingcomputer.com/news/technology/openais-new-chatgpt-bot-10-dangerous-things-its-capable-of/</a></p><p><br></p><p><strong>🇺🇸</strong> <strong>Katy Craig, San Diego, California</strong></p><p>Weapon of Mass Distraction</p><p><a href="https://gurwinder.substack.com/p/tiktok-may-be-a-chinese-bio-weapon" rel="noopener noreferrer" target="_blank">https://gurwinder.substack.com/p/tiktok-may-be-a-chinese-bio-weapon</a></p><p><a href="https://www.ncbi.nlm.nih.gov/pmc/articles/PMC8622754/" rel="noopener noreferrer" target="_blank">https://www.ncbi.nlm.nih.gov/pmc/articles/PMC8622754/</a></p><p><a href="https://www.youtube.com/watch?v=0j0xzuh-6rY" rel="noopener noreferrer" target="_blank">https://www.youtube.com/watch?v=0j0xzuh-6rY</a></p><p><a href="https://www.cnn.com/2021/09/20/tech/china-tiktok-douyin-usage-limit-intl-hnk/index.html" rel="noopener noreferrer" target="_blank">https://www.cnn.com/2021/09/20/tech/china-tiktok-douyin-usage-limit-intl-hnk/index.html</a></p><p><a href="https://www.sciencealert.com/iq-scores-falling-in-worrying-reversal-20th-century-intelligence-boom-flynn-effect-intelligence" rel="noopener noreferrer" target="_blank">https://www.sciencealert.com/iq-scores-falling-in-worrying-reversal-20th-century-intelligence-boom-flynn-effect-intelligence</a></p><p><br></p><p><strong>🇺🇸</strong> <strong>Paulo Gouveia, Everglades, Florida</strong></p><p>Good news at last</p><p><a href="https://www.justice.gov/opa/pr/us-department-justice-disrupts-hive-ransomware-variant" rel="noopener noreferrer" target="_blank">https://www.justice.gov/opa/pr/us-department-justice-disrupts-hive-ransomware-variant</a></p><p><a href="https://www.aljazeera.com/economy/2023/1/26/us-shuts-down-major-ransomware-network-hive" rel="noopener noreferrer" target="_blank">https://www.aljazeera.com/economy/2023/1/26/us-shuts-down-major-ransomware-network-hive</a></p><p><a href="https://www.cisa.gov/uscert/ncas/alerts/aa22-321a" rel="noopener noreferrer" target="_blank">https://www.cisa.gov/uscert/ncas/alerts/aa22-321a</a></p><p><br></p><p><strong>🇷🇴 Olimpiu Pop, Transylvania, Romania</strong></p><p>Austrian Police Disclose Data Theft For Almost Every Austrian</p><p><a href="https://www.visualcapitalist.com/cp/charted-the-dark-web-price-index-2022/" rel="noopener noreferrer" target="_blank">https://www.visualcapitalist.com/cp/charted-the-dark-web-price-index-2022/</a></p><p><a href="https://www.privacyaffairs.com/dark-web-price-index-2022/" rel="noopener noreferrer" target="_blank">https://www.privacyaffairs.com/dark-web-price-index-2022/</a></p><p><a href="https://www.reuters.com/world/europe/dutch-hacker-obtained-virtually-all-austrians-personal-data-police-say-2023-01-25/" rel="noopener noreferrer" target="_blank">https://www.reuters.com/world/europe/dutch-hacker-obtained-virtually-all-austrians-personal-data-police-say-2023-01-25/</a></p><p><a href="https://www.heute.at/s/hacker-25-stahl9-millionen-oesterreichische-meldedaten-100251437" rel="noopener noreferrer" target="_blank">https://www.heute.at/s/hacker-25-stahl9-millionen-oesterreichische-meldedaten-100251437</a></p><p><br></p><p><strong>🇺🇸</strong> <strong>Mark Miller, New York City</strong></p><p>Google Ads go Phishing for Bitwarden</p><p><a href="https://community.bitwarden.com/t/phishing-website-bitwardenlogin-com/49704" rel="noopener noreferrer" target="_blank">https://community.bitwarden.com/t/phishing-website-bitwardenlogin-com/49704</a></p><p><a href="https://www.bleepingcomputer.com/news/security/bitwarden-password-vaults-targeted-in-google-ads-phishing-attack/" rel="noopener noreferrer" target="_blank">https://www.bleepingcomputer.com/news/security/bitwarden-password-vaults-targeted-in-google-ads-phishing-attack/</a></p><p><br></p><p><br></p>]]></content:encoded><link><![CDATA[https://3zozb9fxlbueipjyapmaas.captivate.fm/episode/episode-65-its-5-05-friday-january-27-2023]]></link><guid isPermaLink="false">6cd507aa-a36a-4361-8cf7-563f06261f49</guid><itunes:image href="https://artwork.captivate.fm/18683e3d-8077-47ea-a42a-649cf04fb10f/Z83X1YstgPNlrwA6mznhPziz.png"/><dc:creator><![CDATA[Contributors from Around the World]]></dc:creator><pubDate>Fri, 27 Jan 2023 16:45:00 -0400</pubDate><enclosure url="https://dts.podtrac.com/redirect.mp3/podcasts.captivate.fm/media/e9f87ddb-3d8e-4bca-8686-1a7ca67a0ce3/2023-01-27-505-Episode-65-converted.mp3" length="10342378" type="audio/mpeg"/><itunes:duration>14:22</itunes:duration><itunes:explicit>false</itunes:explicit><itunes:episodeType>full</itunes:episodeType><itunes:season>1</itunes:season><itunes:episode>65</itunes:episode><itunes:season>1</itunes:season><podcast:episode>65</podcast:episode><podcast:season>1</podcast:season><itunes:author>Contributors from Around the World</itunes:author></item><item><title>Episode #64 - It&apos;s 5:05, Thursday, January 26, 2023</title><itunes:title>Episode #64 - It&apos;s 5:05, Thursday, January 26, 2023</itunes:title><description><![CDATA[<p><strong>Hey, it's 5:05 on Thursday, January 26th, 2023</strong>. From the Sourced Podcast Network in New York City, this is your host, Pokie Huang. Stories in today's episode come from <strong>Kadi Grigg</strong> in Alexandria, Virginia, <strong>Derek Weeks</strong> in Bethesda, Maryland, <strong>Edwin Kwan</strong> in Sydney, Australia, <strong>Katy Craig</strong> in San Diego, California, <strong>Mark Miller</strong> in New York City.</p><p>Let's get to it!</p><p><strong>🇺🇸</strong> <strong>Kadi Grigg, Alexandria, Virginia</strong></p><p>ChatGPT + Mental Health</p><p><a href="https://www.statnews.com/2023/01/23/mental-health-chatbot-chatgpt/" rel="noopener noreferrer" target="_blank">https://www.statnews.com/2023/01/23/mental-health-chatbot-chatgpt/</a></p><p><a href="https://www.goodtherapy.org/for-professionals/personal-development/become-a-therapist/is-there-shortage-of-mental-health-professionals-in-america" rel="noopener noreferrer" target="_blank">https://www.goodtherapy.org/for-professionals/personal-development/become-a-therapist/is-there-shortage-of-mental-health-professionals-in-america</a> </p><p><br></p><p><strong>🇺🇸</strong> <strong>Derek Weeks, Bethesda, Maryland</strong></p><p>1500 ChatGPT-based exploits on the dark web</p><p><a href="https://www.crn.com/news/security/chatgpt-is-a-powerful-tool-for-cybercrime-recorded-future" rel="noopener noreferrer" target="_blank">https://www.crn.com/news/security/chatgpt-is-a-powerful-tool-for-cybercrime-recorded-future</a></p><p><a href="https://cybersecurityventures.com/cybercrime-damages-6-trillion-by-2021/" rel="noopener noreferrer" target="_blank">https://cybersecurityventures.com/cybercrime-damages-6-trillion-by-2021/</a></p><p><br></p><p><strong>🇦🇺 Edwin Kwan, Sydney, Australia</strong></p><p>Why is Google Sending me Spam and Phishing Emails?</p><p><a href="https://www.bleepingcomputer.com/news/security/google-ads-invites-being-abused-to-push-spam-adult-sites/" rel="noopener noreferrer" target="_blank">https://www.bleepingcomputer.com/news/security/google-ads-invites-being-abused-to-push-spam-adult-sites/</a></p><p><br></p><p><strong>🇺🇸</strong> <strong>Katy Craig, San Diego, California</strong></p><p>Colleges join the TikTok “ban” wagon</p><p><a href="https://www.theguardian.com/us-news/2023/jan/20/us-tiktok-bans-university-campuses" rel="noopener noreferrer" target="_blank">https://www.theguardian.com/us-news/2023/jan/20/us-tiktok-bans-university-campuses</a></p><p><a href="https://www.washingtonpost.com/technology/2023/01/20/tiktok-bans-states-colleges/" rel="noopener noreferrer" target="_blank">https://www.washingtonpost.com/technology/2023/01/20/tiktok-bans-states-colleges/</a></p><p><br></p><p><strong>🇺🇸</strong> <strong>Mark Miller, New York City</strong></p><p>Can it get any worse for LastPass users? Yes</p><p><br></p><p>Our response to a recent security incident</p><p><a href="https://www.goto.com/blog/our-response-to-a-recent-security-incident#" rel="noopener noreferrer" target="_blank">https://www.goto.com/blog/our-response-to-a-recent-security-incident#</a></p><p><br></p><p>LastPass security breach keeps getting worse, admits parent company</p><p><a href="https://www.techspot.com/news/97381-lastpass-owner-hackers-stole-encrypted-backups.html#commentsOffset" rel="noopener noreferrer" target="_blank">https://www.techspot.com/news/97381-lastpass-owner-hackers-stole-encrypted-backups.html#commentsOffset</a></p>]]></description><content:encoded><![CDATA[<p><strong>Hey, it's 5:05 on Thursday, January 26th, 2023</strong>. From the Sourced Podcast Network in New York City, this is your host, Pokie Huang. Stories in today's episode come from <strong>Kadi Grigg</strong> in Alexandria, Virginia, <strong>Derek Weeks</strong> in Bethesda, Maryland, <strong>Edwin Kwan</strong> in Sydney, Australia, <strong>Katy Craig</strong> in San Diego, California, <strong>Mark Miller</strong> in New York City.</p><p>Let's get to it!</p><p><strong>🇺🇸</strong> <strong>Kadi Grigg, Alexandria, Virginia</strong></p><p>ChatGPT + Mental Health</p><p><a href="https://www.statnews.com/2023/01/23/mental-health-chatbot-chatgpt/" rel="noopener noreferrer" target="_blank">https://www.statnews.com/2023/01/23/mental-health-chatbot-chatgpt/</a></p><p><a href="https://www.goodtherapy.org/for-professionals/personal-development/become-a-therapist/is-there-shortage-of-mental-health-professionals-in-america" rel="noopener noreferrer" target="_blank">https://www.goodtherapy.org/for-professionals/personal-development/become-a-therapist/is-there-shortage-of-mental-health-professionals-in-america</a> </p><p><br></p><p><strong>🇺🇸</strong> <strong>Derek Weeks, Bethesda, Maryland</strong></p><p>1500 ChatGPT-based exploits on the dark web</p><p><a href="https://www.crn.com/news/security/chatgpt-is-a-powerful-tool-for-cybercrime-recorded-future" rel="noopener noreferrer" target="_blank">https://www.crn.com/news/security/chatgpt-is-a-powerful-tool-for-cybercrime-recorded-future</a></p><p><a href="https://cybersecurityventures.com/cybercrime-damages-6-trillion-by-2021/" rel="noopener noreferrer" target="_blank">https://cybersecurityventures.com/cybercrime-damages-6-trillion-by-2021/</a></p><p><br></p><p><strong>🇦🇺 Edwin Kwan, Sydney, Australia</strong></p><p>Why is Google Sending me Spam and Phishing Emails?</p><p><a href="https://www.bleepingcomputer.com/news/security/google-ads-invites-being-abused-to-push-spam-adult-sites/" rel="noopener noreferrer" target="_blank">https://www.bleepingcomputer.com/news/security/google-ads-invites-being-abused-to-push-spam-adult-sites/</a></p><p><br></p><p><strong>🇺🇸</strong> <strong>Katy Craig, San Diego, California</strong></p><p>Colleges join the TikTok “ban” wagon</p><p><a href="https://www.theguardian.com/us-news/2023/jan/20/us-tiktok-bans-university-campuses" rel="noopener noreferrer" target="_blank">https://www.theguardian.com/us-news/2023/jan/20/us-tiktok-bans-university-campuses</a></p><p><a href="https://www.washingtonpost.com/technology/2023/01/20/tiktok-bans-states-colleges/" rel="noopener noreferrer" target="_blank">https://www.washingtonpost.com/technology/2023/01/20/tiktok-bans-states-colleges/</a></p><p><br></p><p><strong>🇺🇸</strong> <strong>Mark Miller, New York City</strong></p><p>Can it get any worse for LastPass users? Yes</p><p><br></p><p>Our response to a recent security incident</p><p><a href="https://www.goto.com/blog/our-response-to-a-recent-security-incident#" rel="noopener noreferrer" target="_blank">https://www.goto.com/blog/our-response-to-a-recent-security-incident#</a></p><p><br></p><p>LastPass security breach keeps getting worse, admits parent company</p><p><a href="https://www.techspot.com/news/97381-lastpass-owner-hackers-stole-encrypted-backups.html#commentsOffset" rel="noopener noreferrer" target="_blank">https://www.techspot.com/news/97381-lastpass-owner-hackers-stole-encrypted-backups.html#commentsOffset</a></p>]]></content:encoded><link><![CDATA[https://3zozb9fxlbueipjyapmaas.captivate.fm/episode/episode-64-its-5-05-thursday-january-26-2023]]></link><guid isPermaLink="false">bc6c56ea-6e00-42c3-af44-6991f902463f</guid><itunes:image href="https://artwork.captivate.fm/093d711a-8a73-44f6-bb90-fee5fd027f74/UopwEvIJWDoocl5XqtUskW-1.png"/><dc:creator><![CDATA[Contributors from Around the World]]></dc:creator><pubDate>Thu, 26 Jan 2023 16:45:00 -0400</pubDate><enclosure url="https://dts.podtrac.com/redirect.mp3/podcasts.captivate.fm/media/93e6053b-2899-402e-ad5e-953b3451c45e/2023-01-26-505-Episode-64-updated-converted.mp3" length="9366234" type="audio/mpeg"/><itunes:duration>13:00</itunes:duration><itunes:explicit>false</itunes:explicit><itunes:episodeType>full</itunes:episodeType><itunes:season>1</itunes:season><itunes:episode>64</itunes:episode><itunes:season>1</itunes:season><podcast:episode>64</podcast:episode><podcast:season>1</podcast:season><itunes:author>Contributors from Around the World</itunes:author></item><item><title>Episode #63 - It&apos;s 5:05, Wednesday, January 25, 2023</title><itunes:title>Episode #63 - It&apos;s 5:05, Wednesday, January 25, 2023</itunes:title><description><![CDATA[<p><strong>Hey! It's 5:05, Wednesday, January 25, 2023.</strong> From the Sourced Podcast Network in New York City, this is your host, Pokie Huang. Stories in today's episode come from <strong>Katy Craig</strong> in San Diego, California, <strong>Mark Miller</strong> in New York City, <strong>Edwin Kwan</strong> in Sydney, Australia. </p><p>Let's get to it!</p><p><strong><span class="ql-cursor">﻿</span>🇺🇸</strong> <strong>Katy Craig, San Diego, California</strong></p><p>TSA No Fly list leaked by hacker</p><p><a href="https://www.cnn.com/2023/01/20/politics/tsa-no-fly-list-data-cybersecurity/index.html" rel="noopener noreferrer" target="_blank">TSA investigating how some no-fly list data was exposed on internet | CNN Politics</a></p><p><a href="https://www.vice.com/en/article/93a4p5/us-no-fly-list-leaks-after-being-left-in-an-unsecured-airline-server" rel="noopener noreferrer" target="_blank">U.S. ‘No Fly List’ Leaks After Being Left in an Unsecured Airline Server</a></p><p><a href="https://liveandletsfly.com/no-fly-list-commutair/" rel="noopener noreferrer" target="_blank">FBI’s Terrorist "No Fly" List Leaked By United Express Carrier - Live and Let's Fly</a></p><p><br></p><p><strong>🇺🇸</strong> <strong>Mark Miller, New York City</strong></p><p>Bye Bye LastPass: I'm out</p><p>Bret Johnson on LastPass breach</p><p><a href="https://www.linkedin.com/posts/gollumfun_lastpass-owner-goto-shares-more-bad-news-activity-7023834342346956800-AZYA" rel="noopener noreferrer" target="_blank">https://www.linkedin.com/posts/gollumfun_lastpass-owner-goto-shares-more-bad-news-activity-7023834342346956800-AZYA</a></p><p>LastPass owner GoTo shares more bad news about November’s security breach</p><p><a href="https://www.theverge.com/2023/1/24/23569109/goto-hack-lastpass-breach-encrypted-backups-key" rel="noopener noreferrer" target="_blank">https://www.theverge.com/2023/1/24/23569109/goto-hack-lastpass-breach-encrypted-backups-key</a></p><p>From GoTo: Our response to a recent security incident</p><p><a href="https://www.goto.com/blog/our-response-to-a-recent-security-incident" rel="noopener noreferrer" target="_blank">https://www.goto.com/blog/our-response-to-a-recent-security-incident</a></p><p><br></p><p><strong>🇦🇺 Edwin Kwan, Sydney, Australia</strong></p><p>Popular Wordpress Plugin with Critical Vulnerability affecting 75,000 wordpress sites</p><p><a href="https://www.bleepingcomputer.com/news/security/75k-wordpress-sites-impacted-by-critical-online-course-plugin-flaws/" rel="noopener noreferrer" target="_blank">https://www.bleepingcomputer.com/news/security/75k-wordpress-sites-impacted-by-critical-online-course-plugin-flaws/</a></p><p><br></p>]]></description><content:encoded><![CDATA[<p><strong>Hey! It's 5:05, Wednesday, January 25, 2023.</strong> From the Sourced Podcast Network in New York City, this is your host, Pokie Huang. Stories in today's episode come from <strong>Katy Craig</strong> in San Diego, California, <strong>Mark Miller</strong> in New York City, <strong>Edwin Kwan</strong> in Sydney, Australia. </p><p>Let's get to it!</p><p><strong><span class="ql-cursor">﻿</span>🇺🇸</strong> <strong>Katy Craig, San Diego, California</strong></p><p>TSA No Fly list leaked by hacker</p><p><a href="https://www.cnn.com/2023/01/20/politics/tsa-no-fly-list-data-cybersecurity/index.html" rel="noopener noreferrer" target="_blank">TSA investigating how some no-fly list data was exposed on internet | CNN Politics</a></p><p><a href="https://www.vice.com/en/article/93a4p5/us-no-fly-list-leaks-after-being-left-in-an-unsecured-airline-server" rel="noopener noreferrer" target="_blank">U.S. ‘No Fly List’ Leaks After Being Left in an Unsecured Airline Server</a></p><p><a href="https://liveandletsfly.com/no-fly-list-commutair/" rel="noopener noreferrer" target="_blank">FBI’s Terrorist "No Fly" List Leaked By United Express Carrier - Live and Let's Fly</a></p><p><br></p><p><strong>🇺🇸</strong> <strong>Mark Miller, New York City</strong></p><p>Bye Bye LastPass: I'm out</p><p>Bret Johnson on LastPass breach</p><p><a href="https://www.linkedin.com/posts/gollumfun_lastpass-owner-goto-shares-more-bad-news-activity-7023834342346956800-AZYA" rel="noopener noreferrer" target="_blank">https://www.linkedin.com/posts/gollumfun_lastpass-owner-goto-shares-more-bad-news-activity-7023834342346956800-AZYA</a></p><p>LastPass owner GoTo shares more bad news about November’s security breach</p><p><a href="https://www.theverge.com/2023/1/24/23569109/goto-hack-lastpass-breach-encrypted-backups-key" rel="noopener noreferrer" target="_blank">https://www.theverge.com/2023/1/24/23569109/goto-hack-lastpass-breach-encrypted-backups-key</a></p><p>From GoTo: Our response to a recent security incident</p><p><a href="https://www.goto.com/blog/our-response-to-a-recent-security-incident" rel="noopener noreferrer" target="_blank">https://www.goto.com/blog/our-response-to-a-recent-security-incident</a></p><p><br></p><p><strong>🇦🇺 Edwin Kwan, Sydney, Australia</strong></p><p>Popular Wordpress Plugin with Critical Vulnerability affecting 75,000 wordpress sites</p><p><a href="https://www.bleepingcomputer.com/news/security/75k-wordpress-sites-impacted-by-critical-online-course-plugin-flaws/" rel="noopener noreferrer" target="_blank">https://www.bleepingcomputer.com/news/security/75k-wordpress-sites-impacted-by-critical-online-course-plugin-flaws/</a></p><p><br></p>]]></content:encoded><link><![CDATA[https://3zozb9fxlbueipjyapmaas.captivate.fm/episode/episode-63-its-5-05-wednesday-january-25-2023]]></link><guid isPermaLink="false">30ea1924-6ee9-46a5-9d79-34769ccf09ba</guid><itunes:image href="https://artwork.captivate.fm/edb5c374-fcf0-41bb-9fd8-6b08cc3d0e84/fm9VrsZGeb-CtFJokVmwOO7v.png"/><dc:creator><![CDATA[Contributors from Around the World]]></dc:creator><pubDate>Wed, 25 Jan 2023 16:45:00 -0400</pubDate><enclosure url="https://dts.podtrac.com/redirect.mp3/podcasts.captivate.fm/media/219f2fa7-cc67-4e75-a5e6-1f2ff1bb8a8d/2023-01-25-505-Episode-63-U-converted.mp3" length="4609336" type="audio/mpeg"/><itunes:duration>06:24</itunes:duration><itunes:explicit>false</itunes:explicit><itunes:episodeType>full</itunes:episodeType><itunes:season>1</itunes:season><itunes:episode>63</itunes:episode><itunes:season>1</itunes:season><podcast:episode>63</podcast:episode><podcast:season>1</podcast:season><itunes:author>Contributors from Around the World</itunes:author></item><item><title>Episode #62 - It&apos;s 5:05, Tuesday, January 24, 2023</title><itunes:title>Episode #62 - It&apos;s 5:05, Tuesday, January 24, 2023</itunes:title><description><![CDATA[<p><strong>Hey! It’s 5:05, Tuesday, January 24, 2023. </strong>From the Sourced Podcast Network in New York City, this is your host, Pokie Huang. Stories in today’s episode come from <strong>Mark Miller</strong> in Boca Raton, Florida, <strong>Katy Craig in </strong>San Diego, California, <strong>Edwin Kwan </strong>in Sydney, Australia, <strong>Trac Bannon</strong> in Camp Hill, Pennsylvania, and<strong> Olimpiu Pop </strong>in Transylvania, Romania.</p><p>Let’s get to it!</p><p><strong>🇺🇸</strong> <strong>Mark Miller, Boca Raton, Florida</strong></p><p>VASTFLUX Ad Fraud sends as many as 12 billion hidden requests a day</p><p>The VastFlux Takedown</p><p><a href="https://www.humansecurity.com/company/satori-threat-intelligence/vastflux" rel="noopener noreferrer" target="_blank">https://www.humansecurity.com/company/satori-threat-intelligence/vastflux</a></p><p>Traffic signals: The VASTFLUX Takedown</p><p><a href="https://www.humansecurity.com/learn/blog/traffic-signals-the-vastflux-takedown" rel="noopener noreferrer" target="_blank">https://www.humansecurity.com/learn/blog/traffic-signals-the-vastflux-takedown</a></p><p><strong>🇺🇸</strong> <strong>Katy Craig, San Diego, California</strong></p><p>MITRE-Harris Poll reveals large majority of US residents with cybersecurity concerns</p><p><a href="https://www.mitre.org/news-insights/news-release/mitre-harris-poll-77-us-residents-concerned-about-ransomware-ip-theft" rel="noopener noreferrer" target="_blank">https://www.mitre.org/news-insights/news-release/mitre-harris-poll-77-us-residents-concerned-about-ransomware-ip-theft</a></p><p><br></p><p><strong>🇦🇺 Edwin Kwan, Sydney, Australia</strong></p><p>Hosting and Delivering Malware on GitHub Codespaces</p><p>https://www.bleepingcomputer.com/news/security/hackers-can-use-github-codespaces-to-host-and-deliver-malware/</p><p><br></p><h2>🇺🇸 Tracy (Trac) Bannon, Camp Hill, Pennsylvania</h2><p>NVIDIA’s AI means you can fake looking at the camera</p><p><a href="https://crowdsource.nvidia.com/en-us/broadcast/eye-contact/" rel="noopener noreferrer" target="_blank">https://crowdsource.nvidia.com/en-us/broadcast/eye-contact/</a></p><p><a href="https://www.nvidia.com/en-us/geforce/news/jan-2023-nvidia-broadcast-update/" rel="noopener noreferrer" target="_blank">https://www.nvidia.com/en-us/geforce/news/jan-2023-nvidia-</a></p><p><a href="https://www.nvidia.com/en-us/geforce/news/jan-2023-nvidia-broadcast-update/" rel="noopener noreferrer" target="_blank">broadcast-update/</a></p><p><br></p><p><strong>🇷🇴 Olimpiu Pop, Transylvania, Romania</strong></p><p>AR-in-a-BOX: ENISA’s DYI Kit for awareness-raising programs</p><p><a href="https://www.enisa.europa.eu/news/cybersecurity-awareness-raising-peek-into-the-enisa-do-it-yourself-toolbox" rel="noopener noreferrer" target="_blank">https://www.enisa.europa.eu/news/cybersecurity-awareness-raising-peek-into-the-enisa-do-it-yourself-toolbox</a></p><p><a href="https://www.enisa.europa.eu/topics/cybersecurity-education/awareness-raising-in-a-box" rel="noopener noreferrer" target="_blank">https://www.enisa.europa.eu/topics/cybersecurity-education/awareness-raising-in-a-box</a></p><p><a href="https://www.enisa.europa.eu/topics/cybersecurity-education/sme_cybersecurity" rel="noopener noreferrer" target="_blank">https://www.enisa.europa.eu/topics/cybersecurity-education/sme_cybersecurity</a></p><p><br></p><p><br></p>]]></description><content:encoded><![CDATA[<p><strong>Hey! It’s 5:05, Tuesday, January 24, 2023. </strong>From the Sourced Podcast Network in New York City, this is your host, Pokie Huang. Stories in today’s episode come from <strong>Mark Miller</strong> in Boca Raton, Florida, <strong>Katy Craig in </strong>San Diego, California, <strong>Edwin Kwan </strong>in Sydney, Australia, <strong>Trac Bannon</strong> in Camp Hill, Pennsylvania, and<strong> Olimpiu Pop </strong>in Transylvania, Romania.</p><p>Let’s get to it!</p><p><strong>🇺🇸</strong> <strong>Mark Miller, Boca Raton, Florida</strong></p><p>VASTFLUX Ad Fraud sends as many as 12 billion hidden requests a day</p><p>The VastFlux Takedown</p><p><a href="https://www.humansecurity.com/company/satori-threat-intelligence/vastflux" rel="noopener noreferrer" target="_blank">https://www.humansecurity.com/company/satori-threat-intelligence/vastflux</a></p><p>Traffic signals: The VASTFLUX Takedown</p><p><a href="https://www.humansecurity.com/learn/blog/traffic-signals-the-vastflux-takedown" rel="noopener noreferrer" target="_blank">https://www.humansecurity.com/learn/blog/traffic-signals-the-vastflux-takedown</a></p><p><strong>🇺🇸</strong> <strong>Katy Craig, San Diego, California</strong></p><p>MITRE-Harris Poll reveals large majority of US residents with cybersecurity concerns</p><p><a href="https://www.mitre.org/news-insights/news-release/mitre-harris-poll-77-us-residents-concerned-about-ransomware-ip-theft" rel="noopener noreferrer" target="_blank">https://www.mitre.org/news-insights/news-release/mitre-harris-poll-77-us-residents-concerned-about-ransomware-ip-theft</a></p><p><br></p><p><strong>🇦🇺 Edwin Kwan, Sydney, Australia</strong></p><p>Hosting and Delivering Malware on GitHub Codespaces</p><p>https://www.bleepingcomputer.com/news/security/hackers-can-use-github-codespaces-to-host-and-deliver-malware/</p><p><br></p><h2>🇺🇸 Tracy (Trac) Bannon, Camp Hill, Pennsylvania</h2><p>NVIDIA’s AI means you can fake looking at the camera</p><p><a href="https://crowdsource.nvidia.com/en-us/broadcast/eye-contact/" rel="noopener noreferrer" target="_blank">https://crowdsource.nvidia.com/en-us/broadcast/eye-contact/</a></p><p><a href="https://www.nvidia.com/en-us/geforce/news/jan-2023-nvidia-broadcast-update/" rel="noopener noreferrer" target="_blank">https://www.nvidia.com/en-us/geforce/news/jan-2023-nvidia-</a></p><p><a href="https://www.nvidia.com/en-us/geforce/news/jan-2023-nvidia-broadcast-update/" rel="noopener noreferrer" target="_blank">broadcast-update/</a></p><p><br></p><p><strong>🇷🇴 Olimpiu Pop, Transylvania, Romania</strong></p><p>AR-in-a-BOX: ENISA’s DYI Kit for awareness-raising programs</p><p><a href="https://www.enisa.europa.eu/news/cybersecurity-awareness-raising-peek-into-the-enisa-do-it-yourself-toolbox" rel="noopener noreferrer" target="_blank">https://www.enisa.europa.eu/news/cybersecurity-awareness-raising-peek-into-the-enisa-do-it-yourself-toolbox</a></p><p><a href="https://www.enisa.europa.eu/topics/cybersecurity-education/awareness-raising-in-a-box" rel="noopener noreferrer" target="_blank">https://www.enisa.europa.eu/topics/cybersecurity-education/awareness-raising-in-a-box</a></p><p><a href="https://www.enisa.europa.eu/topics/cybersecurity-education/sme_cybersecurity" rel="noopener noreferrer" target="_blank">https://www.enisa.europa.eu/topics/cybersecurity-education/sme_cybersecurity</a></p><p><br></p><p><br></p>]]></content:encoded><link><![CDATA[https://3zozb9fxlbueipjyapmaas.captivate.fm/episode/episode-62-its-5-05-tuesday-january-24-2023]]></link><guid isPermaLink="false">20943af1-1301-441c-b297-fa9ff53bcbc6</guid><itunes:image href="https://artwork.captivate.fm/fe0f1aa0-4461-44d0-9bff-4e0cfb9df9d1/bc9B0gE7CyF3f9-mlG9Ryw28.png"/><dc:creator><![CDATA[Contributors from Around the World]]></dc:creator><pubDate>Tue, 24 Jan 2023 16:45:00 -0400</pubDate><enclosure url="https://dts.podtrac.com/redirect.mp3/podcasts.captivate.fm/media/b34c458c-2890-4eff-b41e-40f13cabc3a8/2023-01-24-505-Episode-62-converted.mp3" length="8340249" type="audio/mpeg"/><itunes:duration>11:35</itunes:duration><itunes:explicit>false</itunes:explicit><itunes:episodeType>full</itunes:episodeType><itunes:season>1</itunes:season><itunes:episode>62</itunes:episode><itunes:season>1</itunes:season><podcast:episode>62</podcast:episode><podcast:season>1</podcast:season><itunes:author>Contributors from Around the World</itunes:author></item><item><title>Episode #61 - It&apos;s 5:05, Monday, January 23, 2023</title><itunes:title>Episode #61 - It&apos;s 5:05, Monday, January 23, 2023</itunes:title><description><![CDATA[<p><strong>Hey! It’s 5:05, Monday, January 23, 2023. </strong>From the Sourced Podcast Network in New York City, this is your host, Pokie Huang. Stories in today’s episode come from <strong>Trac Bannon</strong> in Camp Hill, Pennsylvania, <strong>Edwin Kwan </strong>in Sydney, Australia, <strong>Katy Craig in </strong>San Diego, California, <strong>Derek Weeks </strong>in Bethesda, Maryland, <strong>Kadi Grigg, </strong>Alexandria, Virginia,<strong> </strong>and<strong> Olimpiu Pop </strong>in Transylvania, Romania.</p><p>Let's get to it!</p><h2>🇺🇸 Tracy (Trac) Bannon, Camp Hill, Pennsylvania</h2><p>VALL-E</p><p><a href="https://valle-demo.github.io/" rel="noopener noreferrer" target="_blank">https://valle-demo.github.io/</a>&nbsp;</p><p><a href="https://github.com/microsoft/unilm" rel="noopener noreferrer" target="_blank">https://github.com/microsoft/unilm</a>&nbsp;</p><p><a href="https://arxiv.org/pdf/2301.02111.pdf" rel="noopener noreferrer" target="_blank">https://arxiv.org/pdf/2301.02111.pdf</a>&nbsp;</p><p><a href="https://uk.finance.yahoo.com/news/microsoft-unveils-ai-simulate-voice-112136270.html" rel="noopener noreferrer" target="_blank">https://uk.finance.yahoo.com/news/microsoft-unveils-ai-simulate-voice-112136270.html</a></p><h2>🇦🇺 Edwin Kwan, Sydney, Australia</h2><p>Rise in Microsoft OneNote Attachments in Phishing Emails</p><p><a href="https://www.bleepingcomputer.com/news/security/hackers-now-use-microsoft-onenote-attachments-to-spread-malware/" rel="noopener noreferrer" target="_blank">https://www.bleepingcomputer.com/news/security/hackers-now-use-microsoft-onenote-attachments-to-spread-malware/</a></p><p><br></p><p><strong>🇺🇸</strong> <strong>Katy Craig, San Diego, California</strong></p><p>Voice biometrics for profits</p><p><a href="https://abcnews.go.com/Technology/collection-voice-data-profit-raises-privacy-fears/story?id=96363792" rel="noopener noreferrer" target="_blank">https://abcnews.go.com/Technology/collection-voice-data-profit-raises-privacy-fears/story?id=96363792</a></p><p><a href="https://www.aboutamazon.com/news/devices/amazon-devices-event-september-2019" rel="noopener noreferrer" target="_blank">https://www.aboutamazon.com/news/devices/amazon-devices-event-september-2019</a></p><p><br></p><p><strong>🇺🇸</strong> <strong>Derek Weeks, Bethesda, Maryland</strong></p><p>A $30,000 PC goes open source</p><p>https://computerhistory.org/press-releases/chm-makes-apple-lisa-source-code-available-to-the-p ublic-as-a-part-of-its-art-of-code-series/</p><p><br></p><p><strong>🇺🇸</strong> <strong>Kadi Grigg, Alexandria, Virginia</strong></p><p>Kids and the Metaverse</p><p><a href="https://nftnow.com/features/minors-in-the-metaverse-what-you-need-to-know-about-safety/" rel="noopener noreferrer" target="_blank"><strong>https://nftnow.com/features/minors-in-the-metaverse-what-you-need-to-know-about-safety/</strong></a></p><p><a href="https://www.parents.com/kids/safety/internet/what-parents-need-to-know-about-the-metaverse/" rel="noopener noreferrer" target="_blank"><strong>https://www.parents.com/kids/safety/internet/what-parents-need-to-know-about-the-metaverse/</strong></a><strong>&nbsp;</strong></p><p><br></p><p><strong>🇷🇴 Olimpiu Pop, Transylvania, Romania</strong></p><p>The tracking season is ON: Make sure that there are no rogue AirTags hidden in your pockets!</p><p><a href="https://www.zdnet.com/google-amp/article/how-to-find-out-if-an-airtag-is-tracking-you/" rel="noopener noreferrer" target="_blank">https://www.zdnet.com/google-amp/article/how-to-find-out-if-an-airtag-is-tracking-you/</a></p><p><a href="https://www.wired.com/story/opinion-apples-air-tags-are-a-gift-to-stalkers/" rel="noopener noreferrer" target="_blank">https://www.wired.com/story/opinion-apples-air-tags-are-a-gift-to-stalkers/</a></p><p><a href="https://www.wired.com/story/how-to-find-airtags/" rel="noopener noreferrer" target="_blank">https://www.wired.com/story/how-to-find-airtags/</a></p><p><br></p>]]></description><content:encoded><![CDATA[<p><strong>Hey! It’s 5:05, Monday, January 23, 2023. </strong>From the Sourced Podcast Network in New York City, this is your host, Pokie Huang. Stories in today’s episode come from <strong>Trac Bannon</strong> in Camp Hill, Pennsylvania, <strong>Edwin Kwan </strong>in Sydney, Australia, <strong>Katy Craig in </strong>San Diego, California, <strong>Derek Weeks </strong>in Bethesda, Maryland, <strong>Kadi Grigg, </strong>Alexandria, Virginia,<strong> </strong>and<strong> Olimpiu Pop </strong>in Transylvania, Romania.</p><p>Let's get to it!</p><h2>🇺🇸 Tracy (Trac) Bannon, Camp Hill, Pennsylvania</h2><p>VALL-E</p><p><a href="https://valle-demo.github.io/" rel="noopener noreferrer" target="_blank">https://valle-demo.github.io/</a>&nbsp;</p><p><a href="https://github.com/microsoft/unilm" rel="noopener noreferrer" target="_blank">https://github.com/microsoft/unilm</a>&nbsp;</p><p><a href="https://arxiv.org/pdf/2301.02111.pdf" rel="noopener noreferrer" target="_blank">https://arxiv.org/pdf/2301.02111.pdf</a>&nbsp;</p><p><a href="https://uk.finance.yahoo.com/news/microsoft-unveils-ai-simulate-voice-112136270.html" rel="noopener noreferrer" target="_blank">https://uk.finance.yahoo.com/news/microsoft-unveils-ai-simulate-voice-112136270.html</a></p><h2>🇦🇺 Edwin Kwan, Sydney, Australia</h2><p>Rise in Microsoft OneNote Attachments in Phishing Emails</p><p><a href="https://www.bleepingcomputer.com/news/security/hackers-now-use-microsoft-onenote-attachments-to-spread-malware/" rel="noopener noreferrer" target="_blank">https://www.bleepingcomputer.com/news/security/hackers-now-use-microsoft-onenote-attachments-to-spread-malware/</a></p><p><br></p><p><strong>🇺🇸</strong> <strong>Katy Craig, San Diego, California</strong></p><p>Voice biometrics for profits</p><p><a href="https://abcnews.go.com/Technology/collection-voice-data-profit-raises-privacy-fears/story?id=96363792" rel="noopener noreferrer" target="_blank">https://abcnews.go.com/Technology/collection-voice-data-profit-raises-privacy-fears/story?id=96363792</a></p><p><a href="https://www.aboutamazon.com/news/devices/amazon-devices-event-september-2019" rel="noopener noreferrer" target="_blank">https://www.aboutamazon.com/news/devices/amazon-devices-event-september-2019</a></p><p><br></p><p><strong>🇺🇸</strong> <strong>Derek Weeks, Bethesda, Maryland</strong></p><p>A $30,000 PC goes open source</p><p>https://computerhistory.org/press-releases/chm-makes-apple-lisa-source-code-available-to-the-p ublic-as-a-part-of-its-art-of-code-series/</p><p><br></p><p><strong>🇺🇸</strong> <strong>Kadi Grigg, Alexandria, Virginia</strong></p><p>Kids and the Metaverse</p><p><a href="https://nftnow.com/features/minors-in-the-metaverse-what-you-need-to-know-about-safety/" rel="noopener noreferrer" target="_blank"><strong>https://nftnow.com/features/minors-in-the-metaverse-what-you-need-to-know-about-safety/</strong></a></p><p><a href="https://www.parents.com/kids/safety/internet/what-parents-need-to-know-about-the-metaverse/" rel="noopener noreferrer" target="_blank"><strong>https://www.parents.com/kids/safety/internet/what-parents-need-to-know-about-the-metaverse/</strong></a><strong>&nbsp;</strong></p><p><br></p><p><strong>🇷🇴 Olimpiu Pop, Transylvania, Romania</strong></p><p>The tracking season is ON: Make sure that there are no rogue AirTags hidden in your pockets!</p><p><a href="https://www.zdnet.com/google-amp/article/how-to-find-out-if-an-airtag-is-tracking-you/" rel="noopener noreferrer" target="_blank">https://www.zdnet.com/google-amp/article/how-to-find-out-if-an-airtag-is-tracking-you/</a></p><p><a href="https://www.wired.com/story/opinion-apples-air-tags-are-a-gift-to-stalkers/" rel="noopener noreferrer" target="_blank">https://www.wired.com/story/opinion-apples-air-tags-are-a-gift-to-stalkers/</a></p><p><a href="https://www.wired.com/story/how-to-find-airtags/" rel="noopener noreferrer" target="_blank">https://www.wired.com/story/how-to-find-airtags/</a></p><p><br></p>]]></content:encoded><link><![CDATA[https://3zozb9fxlbueipjyapmaas.captivate.fm/episode/episode-61-its-5-05-monday-january-23-2023]]></link><guid isPermaLink="false">aaf114c3-7702-45bc-b64e-0293b0cfab2f</guid><itunes:image href="https://artwork.captivate.fm/e31392d2-9f10-4296-b660-d5095e0eaab1/9HxNWTiKGdH92B1paxz1yW_O.png"/><dc:creator><![CDATA[Contributors from Around the World]]></dc:creator><pubDate>Mon, 23 Jan 2023 16:45:00 -0400</pubDate><enclosure url="https://dts.podtrac.com/redirect.mp3/podcasts.captivate.fm/media/07b25d9a-767a-4ae2-8176-dfc86bdaae06/2023-01-23-505-Episode-61-converted.mp3" length="9890669" type="audio/mpeg"/><itunes:duration>13:44</itunes:duration><itunes:explicit>false</itunes:explicit><itunes:episodeType>full</itunes:episodeType><itunes:season>1</itunes:season><itunes:episode>61</itunes:episode><itunes:season>1</itunes:season><podcast:episode>61</podcast:episode><podcast:season>1</podcast:season><itunes:author>Contributors from Around the World</itunes:author></item><item><title>Episode #60 - It&apos;s 5:05, Friday, January 20, 2023</title><itunes:title>Episode #60 - It&apos;s 5:05, Friday, January 20, 2023</itunes:title><description><![CDATA[<p><strong>Hey! It’s 5:05, Friday, January 20, 2023. </strong>From the Sourced Podcast Network in New York City, this is your host, Pokie Huang. Stories in today’s episode come from <strong>Derek Weeks </strong>in Bethesda, Maryland, <strong>Olimpiu Pop </strong>in Transylvania, Romania, <strong>Trac Bannon</strong> in Camp Hill, Pennsylvania, <strong>Katy Craig in </strong>San Diego, California and <strong>Edwin Kwan </strong>in Sydney, Australia. </p><p>Let's get to it!</p><p><strong>🇺🇸</strong> <strong>Derek Weeks, Bethesda, Maryland</strong></p><p>The credential-stuffing attack on PayPal</p><p><a href="https://www.darkreading.com/attacks-breaches/paypal-breach-exposed-pii-of-nearly-35k-accounts" rel="noopener noreferrer" target="_blank">https://www.darkreading.com/attacks-breaches/paypal-breach-exposed-pii-of-nearly-35k-accounts</a></p><p><a href="https://www.hackread.com/paypal-data-breach-alert/" rel="noopener noreferrer" target="_blank">https://www.hackread.com/paypal-data-breach-alert/</a></p><p><strong>🇷🇴 Olimpiu Pop, Transylvania, Romania</strong></p><p>11 Years Old sudo vulnerability allows attackers to gain root privileges </p><p><a href="http://www.openwall.com/lists/oss-security/2023/01/19/1" rel="noopener noreferrer" target="_blank">http://www.openwall.com/lists/oss-security/2023/01/19/1</a></p><p><a href="https://lists.debian.org/debian-lts-announce/2023/01/msg00012.html" rel="noopener noreferrer" target="_blank">https://lists.debian.org/debian-lts-announce/2023/01/msg00012.html</a></p><p><a href="https://www.debian.org/security/2023/dsa-5321" rel="noopener noreferrer" target="_blank">https://www.debian.org/security/2023/dsa-5321</a></p><p><a href="https://www.sudo.ws/security/advisories/sudoedit_any/" rel="noopener noreferrer" target="_blank">https://www.sudo.ws/security/advisories/sudoedit_any/</a></p><p><a href="https://www.synacktiv.com/sites/default/files/2023-01/sudo-CVE-2023-22809.pdf" rel="noopener noreferrer" target="_blank">https://www.synacktiv.com/sites/default/files/2023-01/sudo-CVE-2023-22809.pdf</a></p><p><br></p><p><strong>🇺🇸</strong> <strong>Tracy (Trac) Bannon, Camp Hill, Pennsylvania</strong></p><p>Hack the Pentagon</p><p><a href="https://sam.gov/opp/be855762a82543bcba2a4eac18b7202f/view" rel="noopener noreferrer" target="_blank">https://sam.gov/opp/be855762a82543bcba2a4eac18b7202f/view</a></p><p><a href="https://sam.gov/api/prod/opps/v3/opportunities/resources/files/0ff9fa4242824b0e807f92829c9222fb/download?&amp;token=" rel="noopener noreferrer" target="_blank">https://sam.gov/api/prod/opps/v3/opportunities/resources/files/0ff9fa4242824b0e807f92829c9222fb/download?&amp;token=</a></p><p><a href="https://www.nextgov.com/cybersecurity/2016/03/pentagon-launches-open-contest-hack-military-websites/126383/" rel="noopener noreferrer" target="_blank">https://www.nextgov.com/cybersecurity/2016/03/pentagon-launches-open-contest-hack-military-websites/126383/</a></p><p><br></p><p><strong>🇺🇸</strong> <strong>Katy Craig, San Diego, California</strong></p><p>AI-powered "robot" lawyer will be first of its kind to represent defendant in court</p><p><a href="https://www.cbsnews.com/news/ai-powered-robot-lawyer-takes-its-first-court-case/" rel="noopener noreferrer" target="_blank">https://www.cbsnews.com/news/ai-powered-robot-lawyer-takes-its-first-court-case/</a></p><p><br></p><p><strong>🇦🇺 Edwin Kwan, Sydney, Australia</strong></p><p>Critical Exploits Available for Popular Wordpress Plugins</p><p><a href="https://www.bleepingcomputer.com/news/security/poc-exploits-released-for-critical-bugs-in-popular-wordpress-plugins/" rel="noopener noreferrer" target="_blank">https://www.bleepingcomputer.com/news/security/poc-exploits-released-for-critical-bugs-in-popular-wordpress-plugins/</a></p><p><br></p>]]></description><content:encoded><![CDATA[<p><strong>Hey! It’s 5:05, Friday, January 20, 2023. </strong>From the Sourced Podcast Network in New York City, this is your host, Pokie Huang. Stories in today’s episode come from <strong>Derek Weeks </strong>in Bethesda, Maryland, <strong>Olimpiu Pop </strong>in Transylvania, Romania, <strong>Trac Bannon</strong> in Camp Hill, Pennsylvania, <strong>Katy Craig in </strong>San Diego, California and <strong>Edwin Kwan </strong>in Sydney, Australia. </p><p>Let's get to it!</p><p><strong>🇺🇸</strong> <strong>Derek Weeks, Bethesda, Maryland</strong></p><p>The credential-stuffing attack on PayPal</p><p><a href="https://www.darkreading.com/attacks-breaches/paypal-breach-exposed-pii-of-nearly-35k-accounts" rel="noopener noreferrer" target="_blank">https://www.darkreading.com/attacks-breaches/paypal-breach-exposed-pii-of-nearly-35k-accounts</a></p><p><a href="https://www.hackread.com/paypal-data-breach-alert/" rel="noopener noreferrer" target="_blank">https://www.hackread.com/paypal-data-breach-alert/</a></p><p><strong>🇷🇴 Olimpiu Pop, Transylvania, Romania</strong></p><p>11 Years Old sudo vulnerability allows attackers to gain root privileges </p><p><a href="http://www.openwall.com/lists/oss-security/2023/01/19/1" rel="noopener noreferrer" target="_blank">http://www.openwall.com/lists/oss-security/2023/01/19/1</a></p><p><a href="https://lists.debian.org/debian-lts-announce/2023/01/msg00012.html" rel="noopener noreferrer" target="_blank">https://lists.debian.org/debian-lts-announce/2023/01/msg00012.html</a></p><p><a href="https://www.debian.org/security/2023/dsa-5321" rel="noopener noreferrer" target="_blank">https://www.debian.org/security/2023/dsa-5321</a></p><p><a href="https://www.sudo.ws/security/advisories/sudoedit_any/" rel="noopener noreferrer" target="_blank">https://www.sudo.ws/security/advisories/sudoedit_any/</a></p><p><a href="https://www.synacktiv.com/sites/default/files/2023-01/sudo-CVE-2023-22809.pdf" rel="noopener noreferrer" target="_blank">https://www.synacktiv.com/sites/default/files/2023-01/sudo-CVE-2023-22809.pdf</a></p><p><br></p><p><strong>🇺🇸</strong> <strong>Tracy (Trac) Bannon, Camp Hill, Pennsylvania</strong></p><p>Hack the Pentagon</p><p><a href="https://sam.gov/opp/be855762a82543bcba2a4eac18b7202f/view" rel="noopener noreferrer" target="_blank">https://sam.gov/opp/be855762a82543bcba2a4eac18b7202f/view</a></p><p><a href="https://sam.gov/api/prod/opps/v3/opportunities/resources/files/0ff9fa4242824b0e807f92829c9222fb/download?&amp;token=" rel="noopener noreferrer" target="_blank">https://sam.gov/api/prod/opps/v3/opportunities/resources/files/0ff9fa4242824b0e807f92829c9222fb/download?&amp;token=</a></p><p><a href="https://www.nextgov.com/cybersecurity/2016/03/pentagon-launches-open-contest-hack-military-websites/126383/" rel="noopener noreferrer" target="_blank">https://www.nextgov.com/cybersecurity/2016/03/pentagon-launches-open-contest-hack-military-websites/126383/</a></p><p><br></p><p><strong>🇺🇸</strong> <strong>Katy Craig, San Diego, California</strong></p><p>AI-powered "robot" lawyer will be first of its kind to represent defendant in court</p><p><a href="https://www.cbsnews.com/news/ai-powered-robot-lawyer-takes-its-first-court-case/" rel="noopener noreferrer" target="_blank">https://www.cbsnews.com/news/ai-powered-robot-lawyer-takes-its-first-court-case/</a></p><p><br></p><p><strong>🇦🇺 Edwin Kwan, Sydney, Australia</strong></p><p>Critical Exploits Available for Popular Wordpress Plugins</p><p><a href="https://www.bleepingcomputer.com/news/security/poc-exploits-released-for-critical-bugs-in-popular-wordpress-plugins/" rel="noopener noreferrer" target="_blank">https://www.bleepingcomputer.com/news/security/poc-exploits-released-for-critical-bugs-in-popular-wordpress-plugins/</a></p><p><br></p>]]></content:encoded><link><![CDATA[https://3zozb9fxlbueipjyapmaas.captivate.fm/episode/episode-60-its-5-05-friday-january-20-2023]]></link><guid isPermaLink="false">cf8f0f84-6d0c-46d9-b7d9-2f722acdb902</guid><itunes:image href="https://artwork.captivate.fm/a4542d3e-3360-42ff-b99d-71ca8787b36b/T262AbQxt6Roh0extxEQ_VlC.png"/><dc:creator><![CDATA[Contributors from Around the World]]></dc:creator><pubDate>Fri, 20 Jan 2023 16:45:00 -0400</pubDate><enclosure url="https://dts.podtrac.com/redirect.mp3/podcasts.captivate.fm/media/e397d43e-05ba-4d52-94ca-97da09809da8/2023-01-20-505-Episode-60-converted.mp3" length="8112984" type="audio/mpeg"/><itunes:duration>11:16</itunes:duration><itunes:explicit>false</itunes:explicit><itunes:episodeType>full</itunes:episodeType><itunes:season>1</itunes:season><itunes:episode>60</itunes:episode><itunes:season>1</itunes:season><podcast:episode>60</podcast:episode><podcast:season>1</podcast:season><itunes:author>Contributors from Around the World</itunes:author></item><item><title>Episode #59 - It&apos;s 5:05, Thursday, January 19, 2023</title><itunes:title>Episode #59 - It&apos;s 5:05, Thursday, January 19, 2023</itunes:title><description><![CDATA[<p><strong>Hey! It’s 5:05, Thursday, January 19, 2023. </strong>From the Sourced Podcast Network in New York City, this is your host, Pokie Huang. Stories in today’s episode come from <strong>Mark Miller </strong>in New York City, <strong>Katy Craig</strong> in San Diego, California, <strong>Olimpiu Pop </strong>in Transylvania, Romania and <strong>Edwin Kwan </strong>in Sydney, Australia.</p><p>Let's get to it!</p><p><strong>🇺🇸</strong> <strong>Mark Miller, New York City</strong></p><p>Finally, A National Cybersecurity Strategy</p><p>When It Comes to Cybersecurity, the Biden Administration Is Getting Much More Aggressive</p><p><a href="https://slate.com/news-and-politics/2023/01/biden-cybersecurity-inglis-neuberger.html" rel="noopener noreferrer" target="_blank">https://slate.com/news-and-politics/2023/01/biden-cybersecurity-inglis-neuberger.html</a></p><p>The Biden national cyber strategy is unlike any before it</p><p><a href="https://www.washingtonpost.com/politics/2023/01/06/biden-national-cyber-strategy-is-unlike-any-before-it/" rel="noopener noreferrer" target="_blank">https://www.washingtonpost.com/politics/2023/01/06/biden-national-cyber-strategy-is-unlike-any-before-it/</a></p><p>U.S. national cyber strategy to stress Biden push on regulation</p><p><a href="https://www.washingtonpost.com/national-security/2023/01/05/biden-cyber-strategy-hacking/" rel="noopener noreferrer" target="_blank">https://www.washingtonpost.com/national-security/2023/01/05/biden-cyber-strategy-hacking/</a></p><p>Cyber regulations proliferate, creating fresh problems</p><p><a href="https://www.washingtonpost.com/politics/2022/07/27/cyber-regulations-proliferate-creating-fresh-problems/" rel="noopener noreferrer" target="_blank">https://www.washingtonpost.com/politics/2022/07/27/cyber-regulations-proliferate-creating-fresh-problems/</a></p><p><br></p><p><strong>🇺🇸</strong> <strong>Katy Craig, San Diego, California</strong></p><p>Security experts downplay GhostSec's RTU breach</p><p><a href="https://www.securityweek.com/cybersecurity-experts-cast-doubt-hackers-ics-ransomware-claims" rel="noopener noreferrer" target="_blank">https://www.securityweek.com/cybersecurity-experts-cast-doubt-hackers-ics-ransomware-claims</a></p><p><a href="https://trello.com/c/3kyaELsl/116-security-experts-downplay-ghostsecs-rtu-breach" rel="noopener noreferrer" target="_blank">https://trello.com/c/3kyaELsl/116-security-experts-downplay-ghostsecs-rtu-breach</a></p><p><br></p><p><strong>🇷🇴 Olimpiu Pop, Transylvania, Romania</strong></p><p>Russian Sand Worm Attacks Ukrinform - the Ukrainian News Agency</p><p><a href="https://twitter.com/dsszzi/status/1615718476269723651" rel="noopener noreferrer" target="_blank">https://twitter.com/dsszzi/status/1615718476269723651</a></p><p><a href="https://cip.gov.ua/en/news/kiberataka-ne-zmogla-zupiniti-robotu-informaciinogo-agentstva-ukrinform" rel="noopener noreferrer" target="_blank">https://cip.gov.ua/en/news/kiberatakanezmoglazupinitirobotuinformaciinogoagentstvaukrinform</a></p><p><a href="https://cip.gov.ua/ua/news/ukrinform-mogli-atakuvati-khakeri-z-ugrupuvannya-sandworm-pov-yazanogo-z-rosiiskim-gru-poperedni-dani-doslidzhennya-cert-ua" rel="noopener noreferrer" target="_blank">https://cip.gov.ua/ua/news/ukrinformmogliatakuvatikhakerizugrupuvannyasandwormpovyazanogozrosiiskimgrupoperednidanidoslidzhennyacertua</a></p><p><a href="https://www.bleepingcomputer.com/news/security/ukraine-links-data-wiping-attack-on-news-agency-to-russian-hackers/" rel="noopener noreferrer" target="_blank">https://www.bleepingcomputer.com/news/security/ukrainelinksdatawipingattackonnewsagencytorussianhackers/</a></p><p><br></p><p><strong>🇦🇺 Edwin Kwan, Sydney, Australia</strong></p><p>CircleCI Hack Due to Compromise of Engineer's 2FA-backed session</p><p><a href="https://www.bleepingcomputer.com/news/security/circlecis-hack-caused-by-malware-stealing-engineers-2fa-backed-session/" rel="noopener noreferrer"...]]></description><content:encoded><![CDATA[<p><strong>Hey! It’s 5:05, Thursday, January 19, 2023. </strong>From the Sourced Podcast Network in New York City, this is your host, Pokie Huang. Stories in today’s episode come from <strong>Mark Miller </strong>in New York City, <strong>Katy Craig</strong> in San Diego, California, <strong>Olimpiu Pop </strong>in Transylvania, Romania and <strong>Edwin Kwan </strong>in Sydney, Australia.</p><p>Let's get to it!</p><p><strong>🇺🇸</strong> <strong>Mark Miller, New York City</strong></p><p>Finally, A National Cybersecurity Strategy</p><p>When It Comes to Cybersecurity, the Biden Administration Is Getting Much More Aggressive</p><p><a href="https://slate.com/news-and-politics/2023/01/biden-cybersecurity-inglis-neuberger.html" rel="noopener noreferrer" target="_blank">https://slate.com/news-and-politics/2023/01/biden-cybersecurity-inglis-neuberger.html</a></p><p>The Biden national cyber strategy is unlike any before it</p><p><a href="https://www.washingtonpost.com/politics/2023/01/06/biden-national-cyber-strategy-is-unlike-any-before-it/" rel="noopener noreferrer" target="_blank">https://www.washingtonpost.com/politics/2023/01/06/biden-national-cyber-strategy-is-unlike-any-before-it/</a></p><p>U.S. national cyber strategy to stress Biden push on regulation</p><p><a href="https://www.washingtonpost.com/national-security/2023/01/05/biden-cyber-strategy-hacking/" rel="noopener noreferrer" target="_blank">https://www.washingtonpost.com/national-security/2023/01/05/biden-cyber-strategy-hacking/</a></p><p>Cyber regulations proliferate, creating fresh problems</p><p><a href="https://www.washingtonpost.com/politics/2022/07/27/cyber-regulations-proliferate-creating-fresh-problems/" rel="noopener noreferrer" target="_blank">https://www.washingtonpost.com/politics/2022/07/27/cyber-regulations-proliferate-creating-fresh-problems/</a></p><p><br></p><p><strong>🇺🇸</strong> <strong>Katy Craig, San Diego, California</strong></p><p>Security experts downplay GhostSec's RTU breach</p><p><a href="https://www.securityweek.com/cybersecurity-experts-cast-doubt-hackers-ics-ransomware-claims" rel="noopener noreferrer" target="_blank">https://www.securityweek.com/cybersecurity-experts-cast-doubt-hackers-ics-ransomware-claims</a></p><p><a href="https://trello.com/c/3kyaELsl/116-security-experts-downplay-ghostsecs-rtu-breach" rel="noopener noreferrer" target="_blank">https://trello.com/c/3kyaELsl/116-security-experts-downplay-ghostsecs-rtu-breach</a></p><p><br></p><p><strong>🇷🇴 Olimpiu Pop, Transylvania, Romania</strong></p><p>Russian Sand Worm Attacks Ukrinform - the Ukrainian News Agency</p><p><a href="https://twitter.com/dsszzi/status/1615718476269723651" rel="noopener noreferrer" target="_blank">https://twitter.com/dsszzi/status/1615718476269723651</a></p><p><a href="https://cip.gov.ua/en/news/kiberataka-ne-zmogla-zupiniti-robotu-informaciinogo-agentstva-ukrinform" rel="noopener noreferrer" target="_blank">https://cip.gov.ua/en/news/kiberatakanezmoglazupinitirobotuinformaciinogoagentstvaukrinform</a></p><p><a href="https://cip.gov.ua/ua/news/ukrinform-mogli-atakuvati-khakeri-z-ugrupuvannya-sandworm-pov-yazanogo-z-rosiiskim-gru-poperedni-dani-doslidzhennya-cert-ua" rel="noopener noreferrer" target="_blank">https://cip.gov.ua/ua/news/ukrinformmogliatakuvatikhakerizugrupuvannyasandwormpovyazanogozrosiiskimgrupoperednidanidoslidzhennyacertua</a></p><p><a href="https://www.bleepingcomputer.com/news/security/ukraine-links-data-wiping-attack-on-news-agency-to-russian-hackers/" rel="noopener noreferrer" target="_blank">https://www.bleepingcomputer.com/news/security/ukrainelinksdatawipingattackonnewsagencytorussianhackers/</a></p><p><br></p><p><strong>🇦🇺 Edwin Kwan, Sydney, Australia</strong></p><p>CircleCI Hack Due to Compromise of Engineer's 2FA-backed session</p><p><a href="https://www.bleepingcomputer.com/news/security/circlecis-hack-caused-by-malware-stealing-engineers-2fa-backed-session/" rel="noopener noreferrer" target="_blank">https://www.bleepingcomputer.com/news/security/circlecis-hack-caused-by-malware-stealing-engineers-2fa-backed-session/</a></p><p><br></p>]]></content:encoded><link><![CDATA[https://3zozb9fxlbueipjyapmaas.captivate.fm/episode/episode-59-its-5-05-thursday-january-19-2023]]></link><guid isPermaLink="false">a21ebf60-c43c-4f1f-bffa-949bd7d0c734</guid><itunes:image href="https://artwork.captivate.fm/c5597742-9e31-4839-b997-f396bac918a5/-RvtK_YteKQRt80N5ek_4TjW.png"/><dc:creator><![CDATA[Contributors from Around the World]]></dc:creator><pubDate>Thu, 19 Jan 2023 16:45:00 -0400</pubDate><enclosure url="https://dts.podtrac.com/redirect.mp3/podcasts.captivate.fm/media/22fa23ad-3705-4be4-99f3-8d640bccb997/2023-01-19-505-Episode-59-converted.mp3" length="7186055" type="audio/mpeg"/><itunes:duration>09:59</itunes:duration><itunes:explicit>false</itunes:explicit><itunes:episodeType>full</itunes:episodeType><itunes:season>1</itunes:season><itunes:episode>59</itunes:episode><itunes:season>1</itunes:season><podcast:episode>59</podcast:episode><podcast:season>1</podcast:season><itunes:author>Contributors from Around the World</itunes:author></item><item><title>Episode #58 - It&apos;s 5:05, Wednesday, January 18, 2023</title><itunes:title>Episode #58 - It&apos;s 5:05, Wednesday, January 18, 2023</itunes:title><description><![CDATA[<p><strong>Hey! It’s 5:05, Wednesday, January 18, 2023. </strong>From the Sourced Podcast Network in New York City, this is your host, Pokie Huang. Stories in today’s episode come from <strong>Katy Craig</strong> in San Diego, California, <strong>Edwin Kwan </strong>in Sydney, Australia, <strong>Kadi Grigg </strong>in Alexandria, Virginia and <strong>Olimpiu Pop </strong>in Transylvania, Romania. </p><p>Let's get to it!</p><p><strong>🇺🇸</strong> <strong>Katy Craig, San Diego, California</strong></p><p>Fortinet OS exploited</p><p><a href="https://arstechnica.com/information-technology/2023/01/fortinet-says-hackers-exploited-critical-vulnerability-to-infect-vpn-customers/" rel="noopener noreferrer" target="_blank">https://arstechnica.com/information-technology/2023/01/fortinet-says-hackers-exploited-critical-vulnerability-to-infect-vpn-customers/</a></p><p><strong>🇦🇺 Edwin Kwan, Sydney, Australia</strong></p><p>Malicious Python Lolipop packages in the Wild&nbsp;</p><p><a href="https://www.bleepingcomputer.com/news/security/malicious-lolip0p-pypi-packages-install-info-stealing-malware/" rel="noopener noreferrer" target="_blank">https://www.bleepingcomputer.com/news/security/malicious-lolip0p-pypi-packages-install-info-stealing-malware/</a>&nbsp;</p><p><br></p><p><strong>🇦🇺 Edwin Kwan, Sydney, Australia</strong></p><p>Upgrade to The Latest Version of Git</p><p><a href="https://www.bleepingcomputer.com/news/security/git-patches-two-critical-remote-code-execution-security-flaws/" rel="noopener noreferrer" target="_blank">https://www.bleepingcomputer.com/news/security/git-patches-two-critical-remote-code-execution-security-flaws/</a></p><p><br></p><p><strong>🇺🇸</strong> <strong>Kadi Grigg, Alexandria, Virginia</strong></p><p>Human Intelligence vs. ChatGPT Code</p><p><a href="https://devops.com/will-chatgpt-replace-developers/" rel="noopener noreferrer" target="_blank">https://devops.com/will-chatgpt-replace-developers/</a>&nbsp;</p><p><a href="https://alphacode.deepmind.com/" rel="noopener noreferrer" target="_blank">https://alphacode.deepmind.com/</a></p><p><a href="https://www.science.org/doi/10.1126/science.abq1158" rel="noopener noreferrer" target="_blank">https://www.science.org/doi/10.1126/science.abq1158</a></p><p><br></p><p><strong>🇷🇴 Olimpiu Pop, Transylvania, Romania</strong></p><p>Reuters discloses hacking attempts at US nuclear research laboratories</p><p><a href="https://www.reuters.com/world/europe/russian-hackers-targeted-us-nuclear-scientists-2023-01-06/" rel="noopener noreferrer" target="_blank">https://www.reuters.com/world/europe/russian-hackers-targeted-us-nuclear-scientists-2023-01-06/</a></p><p><a href="https://www.reuters.com/world/europe/has-putin-threatened-use-nuclear-weapons-2022-10-27/" rel="noopener noreferrer" target="_blank">https://www.reuters.com/world/europe/has-putin-threatened-use-nuclear-weapons-2022-10-27/</a></p><p><a href="https://cyware.com/news/russian-attackers-involved-in-phishing-attacks-on-us-nuclear-scientists-e6f87707" rel="noopener noreferrer" target="_blank">https://cyware.com/news/russian-attackers-involved-in-phishing-attacks-on-us-nuclear-scientists-e6f87707</a></p><p><a href="https://www.theguardian.com/world/2023/jan/06/russian-hackers-targeted-us-nuclear-research-laboratories-records" rel="noopener noreferrer" target="_blank">https://www.theguardian.com/world/2023/jan/06/russian-hackers-targeted-us-nuclear-research-laboratories-records</a></p><p><br></p>]]></description><content:encoded><![CDATA[<p><strong>Hey! It’s 5:05, Wednesday, January 18, 2023. </strong>From the Sourced Podcast Network in New York City, this is your host, Pokie Huang. Stories in today’s episode come from <strong>Katy Craig</strong> in San Diego, California, <strong>Edwin Kwan </strong>in Sydney, Australia, <strong>Kadi Grigg </strong>in Alexandria, Virginia and <strong>Olimpiu Pop </strong>in Transylvania, Romania. </p><p>Let's get to it!</p><p><strong>🇺🇸</strong> <strong>Katy Craig, San Diego, California</strong></p><p>Fortinet OS exploited</p><p><a href="https://arstechnica.com/information-technology/2023/01/fortinet-says-hackers-exploited-critical-vulnerability-to-infect-vpn-customers/" rel="noopener noreferrer" target="_blank">https://arstechnica.com/information-technology/2023/01/fortinet-says-hackers-exploited-critical-vulnerability-to-infect-vpn-customers/</a></p><p><strong>🇦🇺 Edwin Kwan, Sydney, Australia</strong></p><p>Malicious Python Lolipop packages in the Wild&nbsp;</p><p><a href="https://www.bleepingcomputer.com/news/security/malicious-lolip0p-pypi-packages-install-info-stealing-malware/" rel="noopener noreferrer" target="_blank">https://www.bleepingcomputer.com/news/security/malicious-lolip0p-pypi-packages-install-info-stealing-malware/</a>&nbsp;</p><p><br></p><p><strong>🇦🇺 Edwin Kwan, Sydney, Australia</strong></p><p>Upgrade to The Latest Version of Git</p><p><a href="https://www.bleepingcomputer.com/news/security/git-patches-two-critical-remote-code-execution-security-flaws/" rel="noopener noreferrer" target="_blank">https://www.bleepingcomputer.com/news/security/git-patches-two-critical-remote-code-execution-security-flaws/</a></p><p><br></p><p><strong>🇺🇸</strong> <strong>Kadi Grigg, Alexandria, Virginia</strong></p><p>Human Intelligence vs. ChatGPT Code</p><p><a href="https://devops.com/will-chatgpt-replace-developers/" rel="noopener noreferrer" target="_blank">https://devops.com/will-chatgpt-replace-developers/</a>&nbsp;</p><p><a href="https://alphacode.deepmind.com/" rel="noopener noreferrer" target="_blank">https://alphacode.deepmind.com/</a></p><p><a href="https://www.science.org/doi/10.1126/science.abq1158" rel="noopener noreferrer" target="_blank">https://www.science.org/doi/10.1126/science.abq1158</a></p><p><br></p><p><strong>🇷🇴 Olimpiu Pop, Transylvania, Romania</strong></p><p>Reuters discloses hacking attempts at US nuclear research laboratories</p><p><a href="https://www.reuters.com/world/europe/russian-hackers-targeted-us-nuclear-scientists-2023-01-06/" rel="noopener noreferrer" target="_blank">https://www.reuters.com/world/europe/russian-hackers-targeted-us-nuclear-scientists-2023-01-06/</a></p><p><a href="https://www.reuters.com/world/europe/has-putin-threatened-use-nuclear-weapons-2022-10-27/" rel="noopener noreferrer" target="_blank">https://www.reuters.com/world/europe/has-putin-threatened-use-nuclear-weapons-2022-10-27/</a></p><p><a href="https://cyware.com/news/russian-attackers-involved-in-phishing-attacks-on-us-nuclear-scientists-e6f87707" rel="noopener noreferrer" target="_blank">https://cyware.com/news/russian-attackers-involved-in-phishing-attacks-on-us-nuclear-scientists-e6f87707</a></p><p><a href="https://www.theguardian.com/world/2023/jan/06/russian-hackers-targeted-us-nuclear-research-laboratories-records" rel="noopener noreferrer" target="_blank">https://www.theguardian.com/world/2023/jan/06/russian-hackers-targeted-us-nuclear-research-laboratories-records</a></p><p><br></p>]]></content:encoded><link><![CDATA[https://3zozb9fxlbueipjyapmaas.captivate.fm/episode/episode-58-its-5-05-wednesday-january-18-2023]]></link><guid isPermaLink="false">6767b059-3625-438f-a668-123e9291dc31</guid><itunes:image href="https://artwork.captivate.fm/d3483fb4-8a32-481d-93c6-a3cbc7e037a8/a5UI_q4mut4ZQMDkKI4Wwpzy.png"/><dc:creator><![CDATA[Contributors from Around the World]]></dc:creator><pubDate>Wed, 18 Jan 2023 16:45:00 -0400</pubDate><enclosure url="https://dts.podtrac.com/redirect.mp3/podcasts.captivate.fm/media/a3645ac3-2eb7-4452-bbdf-4efe6475986a/2023-01-18-505-Episode-58-converted.mp3" length="6632948" type="audio/mpeg"/><itunes:duration>09:13</itunes:duration><itunes:explicit>false</itunes:explicit><itunes:episodeType>full</itunes:episodeType><itunes:season>1</itunes:season><itunes:episode>58</itunes:episode><itunes:season>1</itunes:season><podcast:episode>58</podcast:episode><podcast:season>1</podcast:season><itunes:author>Contributors from Around the World</itunes:author></item><item><title>Episode #57 - It&apos;s 5:05, Tuesday, January 17, 2023</title><itunes:title>Episode #57 - It&apos;s 5:05, Tuesday, January 17, 2023</itunes:title><description><![CDATA[<p>Hey! It's 5:05 on Tuesday, January 17th, 2023. From the Sourced Podcast Network in New York City, this is your host, Pokie Huang. Stories in today's episode, come from <strong>Trac Bannon</strong> in Camp Hill, Pennsylvania, <strong>Dan Whiting</strong> in Washington, D.C, <strong>Edwin Kwan</strong> in Sydney, Australia, <strong>Katy Craig</strong> in San Diego, California, and <strong>Olimpiu Pop</strong> in Transylvania, Romania.</p><p>Let's get to it.</p><p><strong>🇺🇸</strong> <strong>Tracy (Trac) Bannon, Camp Hill, Pennsylvania</strong></p><p>Taking the ChatGPT plunge</p><p>https://You.com</p><p><a href="https://you.com/apps/discover" rel="noopener noreferrer" target="_blank">https://you.com/apps/discover</a></p><p><strong>🇺🇸</strong> <strong>Dan Whiting, Washington, DC</strong></p><p>A digital reserve corps of the U.S.</p><p>H.R. 162 on Congress.gov <a href="https://www.congress.gov/bill/118th-congress/house-bill/162?q=%7B%22search%22%3A%5B%22digital+reserve+corps%22%2C%22digital%22%2C%22reserve%22%2C%22corps%22%5D%7D&amp;s=1&amp;r=1" rel="noopener noreferrer" target="_blank">https://www.congress.gov/bill/118th-congress/house-bill/162?q=%7B%22search%22%3A%5B%22digital+reserve+corps%22%2C%22digital%22%2C%22reserve%22%2C%22corps%22%5D%7D&amp;s=1&amp;r=1</a></p><p>H.R. 162 bill text <a href="https://gonzales.house.gov/sites/evo-subsites/gonzales.house.gov/files/evo-media-document/national-digital-reserve-corps-act.pdf" rel="noopener noreferrer" target="_blank">https://gonzales.house.gov/sites/evo-subsites/gonzales.house.gov/files/evo-media-document/national-digital-reserve-corps-act.pdf</a></p><p>Rep. Tony Gonzales <a href="https://gonzales.house.gov/" rel="noopener noreferrer" target="_blank">https://gonzales.house.gov/</a> @RepTonyGonzales</p><p>Rep. Kelly <a href="https://robinkelly.house.gov/" rel="noopener noreferrer" target="_blank">https://robinkelly.house.gov/</a> @RepRobinKelly</p><p><strong>🇦🇺 Edwin Kwan, Sydney, Australia</strong></p><p>The Case for Running Ad Blockers</p><p><a href="https://isc.sans.edu/diary/rss/29438" rel="noopener noreferrer" target="_blank">https://isc.sans.edu/diary/rss/29438</a></p><p><br></p><p><strong>🇺🇸</strong> <strong>Katy Craig, San Diego, California</strong></p><p>Hackers breach an RTU</p><p><a href="https://industrialcyber.co/industrial-cyber-attacks/hacker-group-discloses-ability-to-encrypt-an-rtu-device-using-ransomware-industry-reacts/" rel="noopener noreferrer" target="_blank">https://industrialcyber.co/industrial-cyber-attacks/hacker-group-discloses-ability-to-encrypt-an-rtu-device-using-ransomware-industry-reacts/</a></p><p><br></p><p><strong>🇷🇴 Olimpiu Pop, Transylvania, Romania</strong></p><p>No firmware patch for Siemens PLC vulnerability</p><p><a href="https://thehackernews.com/2023/01/over-100-siemens-plc-models-found.html" rel="noopener noreferrer" target="_blank">https://thehackernews.com/2023/01/over-100-siemens-plc-models-found.html</a></p><p><a href="https://redballoonsecurity.com/siemens-discovery" rel="noopener noreferrer" target="_blank">https://redballoonsecurity.com/siemens-discovery</a></p><p><a href="https://cert-portal.siemens.com/productcert/html/ssa-482757.html" rel="noopener noreferrer" target="_blank">https://cert-portal.siemens.com/productcert/html/ssa-482757.html</a></p><p><a href="https://thehackernews.com/2022/10/critical-bug-in-siemens-simatic-plcs.html" rel="noopener noreferrer" target="_blank">https://thehackernews.com/2022/10/critical-bug-in-siemens-simatic-plcs.html</a></p><p><br></p>]]></description><content:encoded><![CDATA[<p>Hey! It's 5:05 on Tuesday, January 17th, 2023. From the Sourced Podcast Network in New York City, this is your host, Pokie Huang. Stories in today's episode, come from <strong>Trac Bannon</strong> in Camp Hill, Pennsylvania, <strong>Dan Whiting</strong> in Washington, D.C, <strong>Edwin Kwan</strong> in Sydney, Australia, <strong>Katy Craig</strong> in San Diego, California, and <strong>Olimpiu Pop</strong> in Transylvania, Romania.</p><p>Let's get to it.</p><p><strong>🇺🇸</strong> <strong>Tracy (Trac) Bannon, Camp Hill, Pennsylvania</strong></p><p>Taking the ChatGPT plunge</p><p>https://You.com</p><p><a href="https://you.com/apps/discover" rel="noopener noreferrer" target="_blank">https://you.com/apps/discover</a></p><p><strong>🇺🇸</strong> <strong>Dan Whiting, Washington, DC</strong></p><p>A digital reserve corps of the U.S.</p><p>H.R. 162 on Congress.gov <a href="https://www.congress.gov/bill/118th-congress/house-bill/162?q=%7B%22search%22%3A%5B%22digital+reserve+corps%22%2C%22digital%22%2C%22reserve%22%2C%22corps%22%5D%7D&amp;s=1&amp;r=1" rel="noopener noreferrer" target="_blank">https://www.congress.gov/bill/118th-congress/house-bill/162?q=%7B%22search%22%3A%5B%22digital+reserve+corps%22%2C%22digital%22%2C%22reserve%22%2C%22corps%22%5D%7D&amp;s=1&amp;r=1</a></p><p>H.R. 162 bill text <a href="https://gonzales.house.gov/sites/evo-subsites/gonzales.house.gov/files/evo-media-document/national-digital-reserve-corps-act.pdf" rel="noopener noreferrer" target="_blank">https://gonzales.house.gov/sites/evo-subsites/gonzales.house.gov/files/evo-media-document/national-digital-reserve-corps-act.pdf</a></p><p>Rep. Tony Gonzales <a href="https://gonzales.house.gov/" rel="noopener noreferrer" target="_blank">https://gonzales.house.gov/</a> @RepTonyGonzales</p><p>Rep. Kelly <a href="https://robinkelly.house.gov/" rel="noopener noreferrer" target="_blank">https://robinkelly.house.gov/</a> @RepRobinKelly</p><p><strong>🇦🇺 Edwin Kwan, Sydney, Australia</strong></p><p>The Case for Running Ad Blockers</p><p><a href="https://isc.sans.edu/diary/rss/29438" rel="noopener noreferrer" target="_blank">https://isc.sans.edu/diary/rss/29438</a></p><p><br></p><p><strong>🇺🇸</strong> <strong>Katy Craig, San Diego, California</strong></p><p>Hackers breach an RTU</p><p><a href="https://industrialcyber.co/industrial-cyber-attacks/hacker-group-discloses-ability-to-encrypt-an-rtu-device-using-ransomware-industry-reacts/" rel="noopener noreferrer" target="_blank">https://industrialcyber.co/industrial-cyber-attacks/hacker-group-discloses-ability-to-encrypt-an-rtu-device-using-ransomware-industry-reacts/</a></p><p><br></p><p><strong>🇷🇴 Olimpiu Pop, Transylvania, Romania</strong></p><p>No firmware patch for Siemens PLC vulnerability</p><p><a href="https://thehackernews.com/2023/01/over-100-siemens-plc-models-found.html" rel="noopener noreferrer" target="_blank">https://thehackernews.com/2023/01/over-100-siemens-plc-models-found.html</a></p><p><a href="https://redballoonsecurity.com/siemens-discovery" rel="noopener noreferrer" target="_blank">https://redballoonsecurity.com/siemens-discovery</a></p><p><a href="https://cert-portal.siemens.com/productcert/html/ssa-482757.html" rel="noopener noreferrer" target="_blank">https://cert-portal.siemens.com/productcert/html/ssa-482757.html</a></p><p><a href="https://thehackernews.com/2022/10/critical-bug-in-siemens-simatic-plcs.html" rel="noopener noreferrer" target="_blank">https://thehackernews.com/2022/10/critical-bug-in-siemens-simatic-plcs.html</a></p><p><br></p>]]></content:encoded><link><![CDATA[https://3zozb9fxlbueipjyapmaas.captivate.fm/episode/episode-57-its-5-05-tuesday-january-17-2023]]></link><guid isPermaLink="false">657b00d7-980c-4bd4-b7f7-99b27d86123a</guid><itunes:image href="https://artwork.captivate.fm/ef69613d-5418-4c7b-8fea-31f9f621c1ea/b7MsJ8vqZ3-7ahnj3FE6zLzx.png"/><dc:creator><![CDATA[Contributors from Around the World]]></dc:creator><pubDate>Tue, 17 Jan 2023 16:45:00 -0400</pubDate><enclosure url="https://dts.podtrac.com/redirect.mp3/podcasts.captivate.fm/media/7fbd9889-5ab4-46b2-bae9-dbc40458ad6f/2023-01-17-505-Episode-57-converted.mp3" length="7667711" type="audio/mpeg"/><itunes:duration>10:39</itunes:duration><itunes:explicit>false</itunes:explicit><itunes:episodeType>full</itunes:episodeType><itunes:season>1</itunes:season><itunes:episode>57</itunes:episode><itunes:season>1</itunes:season><podcast:episode>57</podcast:episode><podcast:season>1</podcast:season><itunes:author>Contributors from Around the World</itunes:author></item><item><title>Episode #56 - It&apos;s 5:05, Monday, January 16, 2023</title><itunes:title>Episode #56 - It&apos;s 5:05, Monday, January 16, 2023</itunes:title><description><![CDATA[<p><strong>Hey! It’s 5:05, Monday, January 16, 2023. </strong>From the Sourced Podcast Network in New York City, this is your host, Pokie Huang. Stories in today’s episode come from <strong>Trac Bannon </strong>in Pennsylvania on the fight to retain US military cyber experts, <strong>Edwin Kwan </strong>in Australia on password manager accounts compromised by credential stuffing, <strong>&nbsp;Katy Craig </strong>in California on Russian twibots and the 2016 election.</p><p>Let’s get to it!</p><p><strong>🇺🇸</strong> <strong>Katy Craig, San Diego, California</strong></p><p>Russian twitbots &amp; the 2016 election</p><p><a href="https://www.nature.com/articles/s41467-022-35576-9" rel="noopener noreferrer" target="_blank">https://www.nature.com/articles/s41467-022-35576-9</a></p><p><strong>🇦🇺 Edwin Kwan, Sydney, Australia</strong></p><p>Password Manager Accounts Compromised By Credential Stuffing</p><p><a href="https://www.bleepingcomputer.com/news/security/nortonlifelock-warns-that-hackers-breached-password-manager-accounts/" rel="noopener noreferrer" target="_blank">https://www.bleepingcomputer.com/news/security/nortonlifelock-warns-that-hackers-breached-password-manager-accounts/</a></p><p><br></p><p><strong>🇺🇸</strong> <strong>Tracy (Trac) Bannon, Camp Hill, Pennsylvania</strong></p><p>The Fight to Retain US Military Cyber Experts.</p><p><a href="https://www.c4isrnet.com/cyber/2022/12/28/militarys-special-pay-keeps-cyber-experts-from-jumping-ship/" rel="noopener noreferrer" target="_blank">https://www.c4isrnet.com/cyber/2022/12/28/militarys-special-pay-keeps-cyber-experts-from-jumping-ship/</a></p><p><a href="https://cybersecurityguide.org/industries/government/" rel="noopener noreferrer" target="_blank">https://cybersecurityguide.org/industries/government/</a></p><p><a href="https://www.bankinfosecurity.com/bidens-infrastructure-plan-3-cybersecurity-provisions-a-16308" rel="noopener noreferrer" target="_blank">https://www.bankinfosecurity.com/bidens-infrastructure-plan-3-cybersecurity-provisions-a-16308</a></p><p><a href="https://www.gao.gov/products/gao-23-105423" rel="noopener noreferrer" target="_blank">https://www.gao.gov/products/gao-23-105423</a></p><p><a href="https://www.gao.gov/assets/gao-23-105423.pdf" rel="noopener noreferrer" target="_blank">https://www.gao.gov/assets/gao-23-105423.pdf</a>&nbsp;</p><p><br></p>]]></description><content:encoded><![CDATA[<p><strong>Hey! It’s 5:05, Monday, January 16, 2023. </strong>From the Sourced Podcast Network in New York City, this is your host, Pokie Huang. Stories in today’s episode come from <strong>Trac Bannon </strong>in Pennsylvania on the fight to retain US military cyber experts, <strong>Edwin Kwan </strong>in Australia on password manager accounts compromised by credential stuffing, <strong>&nbsp;Katy Craig </strong>in California on Russian twibots and the 2016 election.</p><p>Let’s get to it!</p><p><strong>🇺🇸</strong> <strong>Katy Craig, San Diego, California</strong></p><p>Russian twitbots &amp; the 2016 election</p><p><a href="https://www.nature.com/articles/s41467-022-35576-9" rel="noopener noreferrer" target="_blank">https://www.nature.com/articles/s41467-022-35576-9</a></p><p><strong>🇦🇺 Edwin Kwan, Sydney, Australia</strong></p><p>Password Manager Accounts Compromised By Credential Stuffing</p><p><a href="https://www.bleepingcomputer.com/news/security/nortonlifelock-warns-that-hackers-breached-password-manager-accounts/" rel="noopener noreferrer" target="_blank">https://www.bleepingcomputer.com/news/security/nortonlifelock-warns-that-hackers-breached-password-manager-accounts/</a></p><p><br></p><p><strong>🇺🇸</strong> <strong>Tracy (Trac) Bannon, Camp Hill, Pennsylvania</strong></p><p>The Fight to Retain US Military Cyber Experts.</p><p><a href="https://www.c4isrnet.com/cyber/2022/12/28/militarys-special-pay-keeps-cyber-experts-from-jumping-ship/" rel="noopener noreferrer" target="_blank">https://www.c4isrnet.com/cyber/2022/12/28/militarys-special-pay-keeps-cyber-experts-from-jumping-ship/</a></p><p><a href="https://cybersecurityguide.org/industries/government/" rel="noopener noreferrer" target="_blank">https://cybersecurityguide.org/industries/government/</a></p><p><a href="https://www.bankinfosecurity.com/bidens-infrastructure-plan-3-cybersecurity-provisions-a-16308" rel="noopener noreferrer" target="_blank">https://www.bankinfosecurity.com/bidens-infrastructure-plan-3-cybersecurity-provisions-a-16308</a></p><p><a href="https://www.gao.gov/products/gao-23-105423" rel="noopener noreferrer" target="_blank">https://www.gao.gov/products/gao-23-105423</a></p><p><a href="https://www.gao.gov/assets/gao-23-105423.pdf" rel="noopener noreferrer" target="_blank">https://www.gao.gov/assets/gao-23-105423.pdf</a>&nbsp;</p><p><br></p>]]></content:encoded><link><![CDATA[https://3zozb9fxlbueipjyapmaas.captivate.fm/episode/episode-56-its-5-05-monday-january-16-2023]]></link><guid isPermaLink="false">c68f23ce-7eb1-409d-98cb-ed45ae59e194</guid><itunes:image href="https://artwork.captivate.fm/cf852ed1-6d21-4bb3-9599-fbf2beeaf6e5/l2_Rcy0Tc74mCxqzYJSobX5U.png"/><dc:creator><![CDATA[Contributors from Around the World]]></dc:creator><pubDate>Mon, 16 Jan 2023 16:45:00 -0400</pubDate><enclosure url="https://dts.podtrac.com/redirect.mp3/podcasts.captivate.fm/media/35fa68d7-4974-41c1-89dd-1e159c201e8e/2023-01-16-505-Episode-56-converted.mp3" length="4247760" type="audio/mpeg"/><itunes:duration>05:54</itunes:duration><itunes:explicit>false</itunes:explicit><itunes:episodeType>full</itunes:episodeType><itunes:season>1</itunes:season><itunes:episode>56</itunes:episode><itunes:season>1</itunes:season><podcast:episode>56</podcast:episode><podcast:season>1</podcast:season><itunes:author>Contributors from Around the World</itunes:author></item><item><title>Episode #55 - It&apos;s 5:05, Friday, January 13, 2023</title><itunes:title>Episode #55 - It&apos;s 5:05, Friday, January 13, 2023</itunes:title><description><![CDATA[<p><strong>Hey… It’s 5:05, Friday, January 13e, 2023. </strong>From the Sourced Podcast Network in New York City, this is your host, Pokie Huang. Stories in today’s episode come from <strong>Olimpiu Pop </strong>in Romania on part 4 of Kaspersky’s predictions of trends for crimeware and financial cybercrime in 2023, <strong>Katy Craig</strong> in California on student: 1 - GPT: 0, <strong>Edwin Kwan </strong>in Australia on university students suffering financial impact from QUT ransomware attack.</p><p>Today’s episode begins with<strong> Paulo Gouveia</strong> in Florida on Mom! I downloaded this free Pokemon game!</p><p>Let’s get to it!</p><p><strong>🇺🇸</strong> <strong>Paulo Gouveia, Florida</strong></p><p>Mom! I downloaded this free Pokémon game!</p><p><a href="https://asec.ahnlab.com/en/45312/" rel="noopener noreferrer" target="_blank">https://asec.ahnlab.com/en/45312/</a></p><p><a href="https://www.cybersecurityconnect.com.au/commercial/8572-hackers-access-windows-devices-through-fake-pokemon-game" rel="noopener noreferrer" target="_blank">https://www.cybersecurityconnect.com.au/commercial/8572-hackers-access-windows-devices-through-fake-pokemon-game</a></p><p><a href="https://www.ic3.gov/" rel="noopener noreferrer" target="_blank">https://www.ic3.gov/</a></p><p><a href="https://www.fbi.gov/investigate/cyber" rel="noopener noreferrer" target="_blank">https://www.fbi.gov/investigate/cyber</a></p><p><strong>🇦🇺 Edwin Kwan, Sydney, Australia</strong></p><p>University Students Suffering Financial Impact from QUT Ransomware Attack</p><p><a href="https://www.abc.net.au/news/2023-01-13/qut-cyber-attack-students-without-centrelink-payments/101846410" rel="noopener noreferrer" target="_blank">https://www.abc.net.au/news/2023-01-13/qut-cyber-attack-students-without-centrelink-payments/101846410</a></p><p><br></p><p><strong>🇺🇸</strong> <strong>Katy Craig, San Diego, California</strong></p><p>Student: 1 -- GPT: 0</p><p><a href="https://www.businessinsider.com/app-detects-if-chatgpt-wrote-essay-ai-plagiarism-2023-1" rel="noopener noreferrer" target="_blank">https://www.businessinsider.com/app-detects-if-chatgpt-wrote-essay-ai-plagiarism-2023-1</a> </p><p><br></p><p><strong>🇷🇴 Olimpiu Pop, Transylvania, Romania</strong></p><p>Part 4 of Kaspersky’s Predictions of Trends For Crimeware and Financial Cybercrime in 2023</p><p><a href="https://securelist.com/crimeware-financial-cyberthreats-2023/108005" rel="noopener noreferrer" target="_blank">https://securelist.com/crimeware-financial-cyberthreats-2023/108005</a></p><p><a href="https://securelist.com/it-threat-evolution-q2-2022/107099/" rel="noopener noreferrer" target="_blank">https://securelist.com/it-threat-evolution-q2-2022/107099/</a></p><p><a href="https://www.bleepingcomputer.com/news/security/hackers-now-sharing-cracked-brute-ratel-post-exploitation-kit-online/" rel="noopener noreferrer" target="_blank">https://www.bleepingcomputer.com/news/security/hackers-now-sharing-cracked-brute-ratel-post-exploitation-kit-online/</a></p><p><a href="https://securelist.com/new-ransomware-trends-in-2022/106457/#freeud-brand-new-ransomware-with-wiper-capabilities" rel="noopener noreferrer" target="_blank">https://securelist.com/new-ransomware-trends-in-2022/106457</a></p><p><br></p><p><br></p>]]></description><content:encoded><![CDATA[<p><strong>Hey… It’s 5:05, Friday, January 13e, 2023. </strong>From the Sourced Podcast Network in New York City, this is your host, Pokie Huang. Stories in today’s episode come from <strong>Olimpiu Pop </strong>in Romania on part 4 of Kaspersky’s predictions of trends for crimeware and financial cybercrime in 2023, <strong>Katy Craig</strong> in California on student: 1 - GPT: 0, <strong>Edwin Kwan </strong>in Australia on university students suffering financial impact from QUT ransomware attack.</p><p>Today’s episode begins with<strong> Paulo Gouveia</strong> in Florida on Mom! I downloaded this free Pokemon game!</p><p>Let’s get to it!</p><p><strong>🇺🇸</strong> <strong>Paulo Gouveia, Florida</strong></p><p>Mom! I downloaded this free Pokémon game!</p><p><a href="https://asec.ahnlab.com/en/45312/" rel="noopener noreferrer" target="_blank">https://asec.ahnlab.com/en/45312/</a></p><p><a href="https://www.cybersecurityconnect.com.au/commercial/8572-hackers-access-windows-devices-through-fake-pokemon-game" rel="noopener noreferrer" target="_blank">https://www.cybersecurityconnect.com.au/commercial/8572-hackers-access-windows-devices-through-fake-pokemon-game</a></p><p><a href="https://www.ic3.gov/" rel="noopener noreferrer" target="_blank">https://www.ic3.gov/</a></p><p><a href="https://www.fbi.gov/investigate/cyber" rel="noopener noreferrer" target="_blank">https://www.fbi.gov/investigate/cyber</a></p><p><strong>🇦🇺 Edwin Kwan, Sydney, Australia</strong></p><p>University Students Suffering Financial Impact from QUT Ransomware Attack</p><p><a href="https://www.abc.net.au/news/2023-01-13/qut-cyber-attack-students-without-centrelink-payments/101846410" rel="noopener noreferrer" target="_blank">https://www.abc.net.au/news/2023-01-13/qut-cyber-attack-students-without-centrelink-payments/101846410</a></p><p><br></p><p><strong>🇺🇸</strong> <strong>Katy Craig, San Diego, California</strong></p><p>Student: 1 -- GPT: 0</p><p><a href="https://www.businessinsider.com/app-detects-if-chatgpt-wrote-essay-ai-plagiarism-2023-1" rel="noopener noreferrer" target="_blank">https://www.businessinsider.com/app-detects-if-chatgpt-wrote-essay-ai-plagiarism-2023-1</a> </p><p><br></p><p><strong>🇷🇴 Olimpiu Pop, Transylvania, Romania</strong></p><p>Part 4 of Kaspersky’s Predictions of Trends For Crimeware and Financial Cybercrime in 2023</p><p><a href="https://securelist.com/crimeware-financial-cyberthreats-2023/108005" rel="noopener noreferrer" target="_blank">https://securelist.com/crimeware-financial-cyberthreats-2023/108005</a></p><p><a href="https://securelist.com/it-threat-evolution-q2-2022/107099/" rel="noopener noreferrer" target="_blank">https://securelist.com/it-threat-evolution-q2-2022/107099/</a></p><p><a href="https://www.bleepingcomputer.com/news/security/hackers-now-sharing-cracked-brute-ratel-post-exploitation-kit-online/" rel="noopener noreferrer" target="_blank">https://www.bleepingcomputer.com/news/security/hackers-now-sharing-cracked-brute-ratel-post-exploitation-kit-online/</a></p><p><a href="https://securelist.com/new-ransomware-trends-in-2022/106457/#freeud-brand-new-ransomware-with-wiper-capabilities" rel="noopener noreferrer" target="_blank">https://securelist.com/new-ransomware-trends-in-2022/106457</a></p><p><br></p><p><br></p>]]></content:encoded><link><![CDATA[https://3zozb9fxlbueipjyapmaas.captivate.fm/episode/episode-55-its-5-05-friday-january-13-2023]]></link><guid isPermaLink="false">25810ba2-0d66-4d09-be27-bfad1c8a73e3</guid><itunes:image href="https://artwork.captivate.fm/4c243d3a-7625-4a1f-be9e-82def542958a/cRHZVshRAyvVDmk6QA24Trpv.png"/><dc:creator><![CDATA[Contributors from Around the World]]></dc:creator><pubDate>Fri, 13 Jan 2023 16:45:00 -0400</pubDate><enclosure url="https://dts.podtrac.com/redirect.mp3/podcasts.captivate.fm/media/9e203536-79bf-43c0-a6a7-d0477de94654/2023-01-13-505-Episode-55-converted.mp3" length="6776935" type="audio/mpeg"/><itunes:duration>08:04</itunes:duration><itunes:explicit>false</itunes:explicit><itunes:episodeType>full</itunes:episodeType><itunes:season>1</itunes:season><itunes:episode>55</itunes:episode><itunes:season>1</itunes:season><podcast:episode>55</podcast:episode><podcast:season>1</podcast:season><itunes:author>Contributors from Around the World</itunes:author></item><item><title>Episode #54 - It&apos;s 5:05, Thursday, January 12, 2023</title><itunes:title>Episode #54 - It&apos;s 5:05, Thursday, January 12, 2023</itunes:title><description><![CDATA[<p>Hey! It's 5:05 on Thursday, January 12th, 2023. From the Sourced Podcast Network in New York City, this is your host, Pokie Huang. Stories in today's episode come from <strong>Edwin Kwan</strong> in Australia on Whatfuscator: an analysis of malicious open source packages, <strong>Olimpiu Pop</strong> in Romania on part three of Kaspersky's crimeware financial cybercrime trends 2022 and a quick follow up on what's going on with the airlines now with our Executive Producer <strong>Mark Miller</strong> in New York City. </p><p>Let's get to it!</p><p><strong>🇺🇸</strong> <strong>Mark Miller, New York City</strong></p><p>Update on what’s going on with the airlines now?</p><p>New York Times: <a href="https://www.nytimes.com/live/2023/01/11/business/faa-flights-grounded" rel="noopener noreferrer" target="_blank">https://www.nytimes.com/live/2023/01/11/business/faa-flights-grounded</a></p><p>Flight Aware: <a href="https://flightaware.com/" rel="noopener noreferrer" target="_blank">https://flightaware.com/</a></p><p>The Flight Misery Map: <a href="https://flightaware.com/miserymap/" rel="noopener noreferrer" target="_blank">https://flightaware.com/miserymap/</a></p><p><strong>🇷🇴 Olimpiu Pop, Transylvania, Romania</strong></p><p>Part 3 of Kaspersky Crimeware Financial Cybercrime Trends 2022</p><p><a href="https://securelist.com/crimeware-financial-cyberthreats-2023/108005/" rel="noopener noreferrer" target="_blank">https://securelist.com/crimeware-financial-cyberthreats-2023/108005/</a></p><p><a href="https://en.wikipedia.org/wiki/YOLO_(aphorism)" rel="noopener noreferrer" target="_blank">https://en.wikipedia.org/wiki/YOLO_(aphorism)</a></p><p><a href="https://securelist.com/prilex-atm-pos-malware-evolution/107551/" rel="noopener noreferrer" target="_blank">https://securelist.com/prilex-atm-pos-malware-evolution/107551/</a></p><p><a href="https://securelist.com/atm-pos-malware-landscape-2020-2022/107656/" rel="noopener noreferrer" target="_blank">https://securelist.com/atm-pos-malware-landscape-2020-2022/107656/</a></p><p><br></p><p><strong>🇦🇺 Edwin Kwan, Sydney, Australia</strong></p><p>Whatfuscator: An analysis of malicious open source packages</p><p><a href="https://www.endorlabs.com/blog/whatfuscator-malicious-open-source-packages-and-other-beasts" rel="noopener noreferrer" target="_blank">https://www.endorlabs.com/blog/whatfuscator-malicious-open-source-packages-and-other-beasts</a></p><p><br></p>]]></description><content:encoded><![CDATA[<p>Hey! It's 5:05 on Thursday, January 12th, 2023. From the Sourced Podcast Network in New York City, this is your host, Pokie Huang. Stories in today's episode come from <strong>Edwin Kwan</strong> in Australia on Whatfuscator: an analysis of malicious open source packages, <strong>Olimpiu Pop</strong> in Romania on part three of Kaspersky's crimeware financial cybercrime trends 2022 and a quick follow up on what's going on with the airlines now with our Executive Producer <strong>Mark Miller</strong> in New York City. </p><p>Let's get to it!</p><p><strong>🇺🇸</strong> <strong>Mark Miller, New York City</strong></p><p>Update on what’s going on with the airlines now?</p><p>New York Times: <a href="https://www.nytimes.com/live/2023/01/11/business/faa-flights-grounded" rel="noopener noreferrer" target="_blank">https://www.nytimes.com/live/2023/01/11/business/faa-flights-grounded</a></p><p>Flight Aware: <a href="https://flightaware.com/" rel="noopener noreferrer" target="_blank">https://flightaware.com/</a></p><p>The Flight Misery Map: <a href="https://flightaware.com/miserymap/" rel="noopener noreferrer" target="_blank">https://flightaware.com/miserymap/</a></p><p><strong>🇷🇴 Olimpiu Pop, Transylvania, Romania</strong></p><p>Part 3 of Kaspersky Crimeware Financial Cybercrime Trends 2022</p><p><a href="https://securelist.com/crimeware-financial-cyberthreats-2023/108005/" rel="noopener noreferrer" target="_blank">https://securelist.com/crimeware-financial-cyberthreats-2023/108005/</a></p><p><a href="https://en.wikipedia.org/wiki/YOLO_(aphorism)" rel="noopener noreferrer" target="_blank">https://en.wikipedia.org/wiki/YOLO_(aphorism)</a></p><p><a href="https://securelist.com/prilex-atm-pos-malware-evolution/107551/" rel="noopener noreferrer" target="_blank">https://securelist.com/prilex-atm-pos-malware-evolution/107551/</a></p><p><a href="https://securelist.com/atm-pos-malware-landscape-2020-2022/107656/" rel="noopener noreferrer" target="_blank">https://securelist.com/atm-pos-malware-landscape-2020-2022/107656/</a></p><p><br></p><p><strong>🇦🇺 Edwin Kwan, Sydney, Australia</strong></p><p>Whatfuscator: An analysis of malicious open source packages</p><p><a href="https://www.endorlabs.com/blog/whatfuscator-malicious-open-source-packages-and-other-beasts" rel="noopener noreferrer" target="_blank">https://www.endorlabs.com/blog/whatfuscator-malicious-open-source-packages-and-other-beasts</a></p><p><br></p>]]></content:encoded><link><![CDATA[https://3zozb9fxlbueipjyapmaas.captivate.fm/episode/episode-54-its-5-05-thursday-january-12-2023]]></link><guid isPermaLink="false">21b912b3-c245-4a2d-bfe9-2a50adc62e5d</guid><itunes:image href="https://artwork.captivate.fm/26b2c599-ae38-4678-910d-482d47dd0cd1/rdXRR3_17QikCr3V6tyF2oVU.png"/><dc:creator><![CDATA[Contributors from Around the World]]></dc:creator><pubDate>Thu, 12 Jan 2023 16:45:00 -0400</pubDate><enclosure url="https://dts.podtrac.com/redirect.mp3/podcasts.captivate.fm/media/14ead4a4-6e0b-4661-bbb6-1a7c7383e98f/2023-01-12-505-Episode-54-converted.mp3" length="4884571" type="audio/mpeg"/><itunes:duration>06:47</itunes:duration><itunes:explicit>false</itunes:explicit><itunes:episodeType>full</itunes:episodeType><itunes:season>1</itunes:season><itunes:episode>54</itunes:episode><itunes:season>1</itunes:season><podcast:episode>54</podcast:episode><podcast:season>1</podcast:season><itunes:author>Contributors from Around the World</itunes:author></item><item><title>Episode #53 - It&apos;s 5:05, Wednesday, January 11, 2023</title><itunes:title>Episode #53 - It&apos;s 5:05, Wednesday, January 11, 2023</itunes:title><description><![CDATA[<p><strong>Hey! It’s 5:05, Wednesday , January 11, 2023. </strong>From the Sourced Podcast Network in New York City, this is your host, Pokie Huang. Stories in today’s episode come from <strong>Derek Weeks </strong>in Maryland on school is out for 31,000 students, <strong>Katy Craig </strong>in California on Microsoft and ChatGPT: A bid on the future, <strong>Kadi Grigg </strong>in Virginia on Mint mobile taking on ChatGPT to write a commercial, <strong>Edwin Kwan </strong>in Australia on critical vulnerabilities in connected cars.&nbsp;</p><p>Today’s episode begins with<strong> </strong>our Executive Producer <strong>Mark Miller</strong> on what’s going on with the airlines now?</p><p>Let’s get to it!</p><p><strong>🇺🇸</strong> <strong>Mark Miller, New York City</strong></p><p>What’s going on with the airlines now?</p><p>New York Times: <a href="https://www.nytimes.com/live/2023/01/11/business/faa-flights-grounded" rel="noopener noreferrer" target="_blank">https://www.nytimes.com/live/2023/01/11/business/faa-flights-grounded</a></p><p>Flight Aware: <a href="https://flightaware.com/" rel="noopener noreferrer" target="_blank">https://flightaware.com/</a></p><p>The Flight Misery Map: <a href="https://flightaware.com/miserymap/" rel="noopener noreferrer" target="_blank">https://flightaware.com/miserymap/</a></p><p><strong>🇦🇺 Edwin Kwan, Sydney, Australia</strong></p><p>Critical Vulnerabilities in Connected Cars</p><p><a href="https://samcurry.net/web-hackers-vs-the-auto-industry/" rel="noopener noreferrer" target="_blank">https://samcurry.net/web-hackers-vs-the-auto-industry/</a></p><p><a href="https://505updates.com/december-5-2022/" rel="noopener noreferrer" target="_blank">https://505updates.com/december-5-2022/</a></p><p><strong>🇺🇸</strong> <strong>Kadi Grigg, Alexandria, Virginia</strong></p><p>Mint Mobile taking on ChatGPT to write a commercialw</p><p><a href="https://www.fastcompany.com/90833253/ryan-reynolds-used-chatgpt-to-make-a-mint-mobile-ad-and-the-results-were-mildly-terrifying" rel="noopener noreferrer" target="_blank">https://www.fastcompany.com/90833253/ryan-reynolds-used-chatgpt-to-make-a-mint-mobile-ad-and-the-results-were-mildly-terrifying</a>&nbsp;</p><p><a href="https://www.cyberscoop.com/chatgpt-ai-malware/" rel="noopener noreferrer" target="_blank">https://www.cyberscoop.com/chatgpt-ai-malware/</a> -Katy Craig previously reported on this on jan 9th ep. 48</p><p><a href="https://505updates.com/january-4-2023/" rel="noopener noreferrer" target="_blank">https://505updates.com/january-4-2023/</a> - Episode ft. Katy Craig’s report</p><p><br></p><p><strong>🇺🇸</strong> <strong>Katy Craig, San Diego, California</strong></p><p>Microsoft and ChatGPT: A bid on the future</p><p><a href="https://www.businessinsider.com/microsoft-openai-investment-the-smartest-1-billion-ever-spent-2023-1?amp" rel="noopener noreferrer" target="_blank">https://www.businessinsider.com/microsoft-openai-investment-the-smartest-1-billion-ever-spent-2023-1?amp</a></p><p><a href="https://www.theinformation.com/articles/ghost-writer-microsoft-looks-to-add-openais-chatbot-technology-to-word-email" rel="noopener noreferrer" target="_blank">https://www.theinformation.com/articles/ghost-writer-microsoft-looks-to-add-openais-chatbot-technology-to-word-email</a></p><p><a href="https://nypost.com/2022/12/06/scary-chatgpt-could-render-google-obsolete-in-two-years/" rel="noopener noreferrer" target="_blank">https://nypost.com/2022/12/06/scary-chatgpt-could-render-google-obsolete-in-two-years/</a></p><p><a href="https://fortune.com/2023/01/06/openai-valuation-ai-chatgpt-microsoft-bing-google-search/" rel="noopener noreferrer" target="_blank">https://fortune.com/2023/01/06/openai-valuation-ai-chatgpt-microsoft-bing-google-search/</a></p><p><br></p><p><strong>🇺🇸</strong> <strong>Derek Weeks, Bethesda, Maryland</strong></p><p>School is out for 31,000 students</p><p><a...]]></description><content:encoded><![CDATA[<p><strong>Hey! It’s 5:05, Wednesday , January 11, 2023. </strong>From the Sourced Podcast Network in New York City, this is your host, Pokie Huang. Stories in today’s episode come from <strong>Derek Weeks </strong>in Maryland on school is out for 31,000 students, <strong>Katy Craig </strong>in California on Microsoft and ChatGPT: A bid on the future, <strong>Kadi Grigg </strong>in Virginia on Mint mobile taking on ChatGPT to write a commercial, <strong>Edwin Kwan </strong>in Australia on critical vulnerabilities in connected cars.&nbsp;</p><p>Today’s episode begins with<strong> </strong>our Executive Producer <strong>Mark Miller</strong> on what’s going on with the airlines now?</p><p>Let’s get to it!</p><p><strong>🇺🇸</strong> <strong>Mark Miller, New York City</strong></p><p>What’s going on with the airlines now?</p><p>New York Times: <a href="https://www.nytimes.com/live/2023/01/11/business/faa-flights-grounded" rel="noopener noreferrer" target="_blank">https://www.nytimes.com/live/2023/01/11/business/faa-flights-grounded</a></p><p>Flight Aware: <a href="https://flightaware.com/" rel="noopener noreferrer" target="_blank">https://flightaware.com/</a></p><p>The Flight Misery Map: <a href="https://flightaware.com/miserymap/" rel="noopener noreferrer" target="_blank">https://flightaware.com/miserymap/</a></p><p><strong>🇦🇺 Edwin Kwan, Sydney, Australia</strong></p><p>Critical Vulnerabilities in Connected Cars</p><p><a href="https://samcurry.net/web-hackers-vs-the-auto-industry/" rel="noopener noreferrer" target="_blank">https://samcurry.net/web-hackers-vs-the-auto-industry/</a></p><p><a href="https://505updates.com/december-5-2022/" rel="noopener noreferrer" target="_blank">https://505updates.com/december-5-2022/</a></p><p><strong>🇺🇸</strong> <strong>Kadi Grigg, Alexandria, Virginia</strong></p><p>Mint Mobile taking on ChatGPT to write a commercialw</p><p><a href="https://www.fastcompany.com/90833253/ryan-reynolds-used-chatgpt-to-make-a-mint-mobile-ad-and-the-results-were-mildly-terrifying" rel="noopener noreferrer" target="_blank">https://www.fastcompany.com/90833253/ryan-reynolds-used-chatgpt-to-make-a-mint-mobile-ad-and-the-results-were-mildly-terrifying</a>&nbsp;</p><p><a href="https://www.cyberscoop.com/chatgpt-ai-malware/" rel="noopener noreferrer" target="_blank">https://www.cyberscoop.com/chatgpt-ai-malware/</a> -Katy Craig previously reported on this on jan 9th ep. 48</p><p><a href="https://505updates.com/january-4-2023/" rel="noopener noreferrer" target="_blank">https://505updates.com/january-4-2023/</a> - Episode ft. Katy Craig’s report</p><p><br></p><p><strong>🇺🇸</strong> <strong>Katy Craig, San Diego, California</strong></p><p>Microsoft and ChatGPT: A bid on the future</p><p><a href="https://www.businessinsider.com/microsoft-openai-investment-the-smartest-1-billion-ever-spent-2023-1?amp" rel="noopener noreferrer" target="_blank">https://www.businessinsider.com/microsoft-openai-investment-the-smartest-1-billion-ever-spent-2023-1?amp</a></p><p><a href="https://www.theinformation.com/articles/ghost-writer-microsoft-looks-to-add-openais-chatbot-technology-to-word-email" rel="noopener noreferrer" target="_blank">https://www.theinformation.com/articles/ghost-writer-microsoft-looks-to-add-openais-chatbot-technology-to-word-email</a></p><p><a href="https://nypost.com/2022/12/06/scary-chatgpt-could-render-google-obsolete-in-two-years/" rel="noopener noreferrer" target="_blank">https://nypost.com/2022/12/06/scary-chatgpt-could-render-google-obsolete-in-two-years/</a></p><p><a href="https://fortune.com/2023/01/06/openai-valuation-ai-chatgpt-microsoft-bing-google-search/" rel="noopener noreferrer" target="_blank">https://fortune.com/2023/01/06/openai-valuation-ai-chatgpt-microsoft-bing-google-search/</a></p><p><br></p><p><strong>🇺🇸</strong> <strong>Derek Weeks, Bethesda, Maryland</strong></p><p>School is out for 31,000 students</p><p><a href="https://www.bleepingcomputer.com/news/security/iowa-s-largest-school-district-cancels-classes-after-cyberattack/" rel="noopener noreferrer" target="_blank">https://www.bleepingcomputer.com/news/security/iowa-s-largest-school-district-cancels-classes-after-cyberattack/</a></p>]]></content:encoded><link><![CDATA[https://3zozb9fxlbueipjyapmaas.captivate.fm/episode/episode-53-its-5-05-wednesday-january-11-2023]]></link><guid isPermaLink="false">33f71505-bf6f-4272-b013-eb104709211e</guid><itunes:image href="https://artwork.captivate.fm/885827fc-34a7-4ad8-97ed-73f12daed116/lAl2p-1PfViGYxcw-SrZlBXS.png"/><dc:creator><![CDATA[Contributors from Around the World]]></dc:creator><pubDate>Wed, 11 Jan 2023 16:45:00 -0400</pubDate><enclosure url="https://dts.podtrac.com/redirect.mp3/podcasts.captivate.fm/media/475710e0-7d23-4fea-85ff-dc0bf9aa0e50/2023-01-11-505-Episode-53-converted.mp3" length="7970042" type="audio/mpeg"/><itunes:duration>11:04</itunes:duration><itunes:explicit>false</itunes:explicit><itunes:episodeType>full</itunes:episodeType><itunes:season>1</itunes:season><itunes:episode>53</itunes:episode><itunes:season>1</itunes:season><podcast:episode>53</podcast:episode><podcast:season>1</podcast:season><itunes:author>Contributors from Around the World</itunes:author></item><item><title>Episode #52 - It&apos;s 5:05, Tuesday, January 10, 2023</title><itunes:title>Episode #52 - It&apos;s 5:05, Tuesday, January 10, 2023</itunes:title><description><![CDATA[<p><strong>Hey… It’s 5:05, Tuesday , January 10, 2023. </strong>From the Sourced Podcast Network in New York City, this is your host, Pokie Huang. Stories in today’s episode come from <strong>Olimpiu Pop </strong>in Romania on part two of Kaspersky’s crimeware and financial cyber threats in 2022, <strong>Katy Craig</strong> in California on Seattle school district sues tech giants for harming kids, <strong>Trac Bannon </strong>in Pennsylvania on bypassing Captcha and using DevOps to steal cryptomining resources, Edwin Kwan in Australia on More than 100,000 Australian government logins discovered on dark web.</p><p>Let’s get to it!</p><p><strong>🇷🇴 Olimpiu Pop, Transylvania, Romania</strong></p><p>Part II of Kaspersky’s Crimeware Financial Cyber Threats 2022</p><p><a href="https://en.wikipedia.org/wiki/Platform_as_a_service" rel="noopener noreferrer" target="_blank">https://en.wikipedia.org/wiki/Platform_as_a_service</a></p><p><a href="https://en.wikipedia.org/wiki/Infrastructure_as_a_service" rel="noopener noreferrer" target="_blank">https://en.wikipedia.org/wiki/Infrastructure_as_a_service</a></p><p><a href="https://en.wikipedia.org/wiki/Software_as_a_service" rel="noopener noreferrer" target="_blank">https://en.wikipedia.org/wiki/Software_as_a_service</a></p><p><a href="https://encyclopedia.kaspersky.com/glossary/malware-as-a-service-maas" rel="noopener noreferrer" target="_blank">https://encyclopedia.kaspersky.com/glossary/malware-as-a-service-maas</a></p><p><a href="https://securelist.com/crimeware-financial-cyberthreats-2023/108005/" rel="noopener noreferrer" target="_blank">https://securelist.com/crimeware-financial-cyberthreats-2023/108005/</a></p><p><a href="https://securelist.com/initial-access-data-price-on-the-dark-web/106740/" rel="noopener noreferrer" target="_blank">https://securelist.com/initial-access-data-price-on-the-dark-web/106740/</a></p><p><a href="https://securelist.com/emotet-modules-and-recent-attacks/106290/" rel="noopener noreferrer" target="_blank">https://securelist.com/emotet-modules-and-recent-attacks/106290/</a></p><p><a href="https://www.kaspersky.com/blog/harly-trojan-subscriber/45573/" rel="noopener noreferrer" target="_blank">https://www.kaspersky.com/blog/harly-trojan-subscriber/45573/</a></p><p><strong>🇺🇸</strong> <strong>Tracy (Trac) Bannon, Camp Hill, Pennsylvania</strong></p><p>Bypassing Captcha and&nbsp; Using DevOps to Steal Cryptomining Resources.</p><p><a href="https://unit42.paloaltonetworks.com/purpleurchin-steals-cloud-resources/" rel="noopener noreferrer" target="_blank">https://unit42.paloaltonetworks.com/purpleurchin-steals-cloud-resources/</a></p><p><a href="https://thehackernews.com/2023/01/hackers-using-captcha-bypass-tactics-in.html" rel="noopener noreferrer" target="_blank">https://thehackernews.com/2023/01/hackers-using-captcha-bypass-tactics-in.html</a></p><p><a href="https://imagemagick.org/script/convert.php" rel="noopener noreferrer" target="_blank">https://imagemagick.org/script/convert.php</a></p><p><a href="https://thehackernews.com/2022/10/new-cryptojacking-campaign-targeting.html" rel="noopener noreferrer" target="_blank">https://thehackernews.com/2022/10/new-cryptojacking-campaign-targeti</a></p><p><br></p><p><strong>🇺🇸</strong> <strong>Katy Craig, San Diego, California</strong></p><p>Seattle school district sues tech giants for harming kids</p><p><a href="https://www.huffpost.com/entry/seattle-school-district-social-media-lawsuit-youth-mental-health_n_63ba4e45e4b0b2e150683fd9" rel="noopener noreferrer" target="_blank">Seattle Schools Sue Tech Giants Over Social Media Harm</a></p><p><br></p><p><strong>🇦🇺 Edwin Kwan, Sydney, Australia</strong></p><p>More than 100,000 Australian Government Logins Discovered on Dark Web</p><p><a href="https://www.afr.com/technology/more-than-100-000-suspected-government-logins-found-in-massive-breach-20230106-p5cauf" rel="noopener noreferrer"...]]></description><content:encoded><![CDATA[<p><strong>Hey… It’s 5:05, Tuesday , January 10, 2023. </strong>From the Sourced Podcast Network in New York City, this is your host, Pokie Huang. Stories in today’s episode come from <strong>Olimpiu Pop </strong>in Romania on part two of Kaspersky’s crimeware and financial cyber threats in 2022, <strong>Katy Craig</strong> in California on Seattle school district sues tech giants for harming kids, <strong>Trac Bannon </strong>in Pennsylvania on bypassing Captcha and using DevOps to steal cryptomining resources, Edwin Kwan in Australia on More than 100,000 Australian government logins discovered on dark web.</p><p>Let’s get to it!</p><p><strong>🇷🇴 Olimpiu Pop, Transylvania, Romania</strong></p><p>Part II of Kaspersky’s Crimeware Financial Cyber Threats 2022</p><p><a href="https://en.wikipedia.org/wiki/Platform_as_a_service" rel="noopener noreferrer" target="_blank">https://en.wikipedia.org/wiki/Platform_as_a_service</a></p><p><a href="https://en.wikipedia.org/wiki/Infrastructure_as_a_service" rel="noopener noreferrer" target="_blank">https://en.wikipedia.org/wiki/Infrastructure_as_a_service</a></p><p><a href="https://en.wikipedia.org/wiki/Software_as_a_service" rel="noopener noreferrer" target="_blank">https://en.wikipedia.org/wiki/Software_as_a_service</a></p><p><a href="https://encyclopedia.kaspersky.com/glossary/malware-as-a-service-maas" rel="noopener noreferrer" target="_blank">https://encyclopedia.kaspersky.com/glossary/malware-as-a-service-maas</a></p><p><a href="https://securelist.com/crimeware-financial-cyberthreats-2023/108005/" rel="noopener noreferrer" target="_blank">https://securelist.com/crimeware-financial-cyberthreats-2023/108005/</a></p><p><a href="https://securelist.com/initial-access-data-price-on-the-dark-web/106740/" rel="noopener noreferrer" target="_blank">https://securelist.com/initial-access-data-price-on-the-dark-web/106740/</a></p><p><a href="https://securelist.com/emotet-modules-and-recent-attacks/106290/" rel="noopener noreferrer" target="_blank">https://securelist.com/emotet-modules-and-recent-attacks/106290/</a></p><p><a href="https://www.kaspersky.com/blog/harly-trojan-subscriber/45573/" rel="noopener noreferrer" target="_blank">https://www.kaspersky.com/blog/harly-trojan-subscriber/45573/</a></p><p><strong>🇺🇸</strong> <strong>Tracy (Trac) Bannon, Camp Hill, Pennsylvania</strong></p><p>Bypassing Captcha and&nbsp; Using DevOps to Steal Cryptomining Resources.</p><p><a href="https://unit42.paloaltonetworks.com/purpleurchin-steals-cloud-resources/" rel="noopener noreferrer" target="_blank">https://unit42.paloaltonetworks.com/purpleurchin-steals-cloud-resources/</a></p><p><a href="https://thehackernews.com/2023/01/hackers-using-captcha-bypass-tactics-in.html" rel="noopener noreferrer" target="_blank">https://thehackernews.com/2023/01/hackers-using-captcha-bypass-tactics-in.html</a></p><p><a href="https://imagemagick.org/script/convert.php" rel="noopener noreferrer" target="_blank">https://imagemagick.org/script/convert.php</a></p><p><a href="https://thehackernews.com/2022/10/new-cryptojacking-campaign-targeting.html" rel="noopener noreferrer" target="_blank">https://thehackernews.com/2022/10/new-cryptojacking-campaign-targeti</a></p><p><br></p><p><strong>🇺🇸</strong> <strong>Katy Craig, San Diego, California</strong></p><p>Seattle school district sues tech giants for harming kids</p><p><a href="https://www.huffpost.com/entry/seattle-school-district-social-media-lawsuit-youth-mental-health_n_63ba4e45e4b0b2e150683fd9" rel="noopener noreferrer" target="_blank">Seattle Schools Sue Tech Giants Over Social Media Harm</a></p><p><br></p><p><strong>🇦🇺 Edwin Kwan, Sydney, Australia</strong></p><p>More than 100,000 Australian Government Logins Discovered on Dark Web</p><p><a href="https://www.afr.com/technology/more-than-100-000-suspected-government-logins-found-in-massive-breach-20230106-p5cauf" rel="noopener noreferrer" target="_blank">https://www.afr.com/technology/more-than-100-000-suspected-government-logins-found-in-massive-breach-20230106-p5cauf</a></p><p><br></p>]]></content:encoded><link><![CDATA[https://3zozb9fxlbueipjyapmaas.captivate.fm/episode/episode-52-its-5-05-tuesday-january-10-2023]]></link><guid isPermaLink="false">f38bc5f3-d26b-4f03-8224-775f11caddde</guid><itunes:image href="https://artwork.captivate.fm/676f4779-81a2-4d38-a86a-a4c2fddb87d4/bckl2TQ_mgdSW2ewbB64iG5z.png"/><dc:creator><![CDATA[Contributors from Around the World]]></dc:creator><pubDate>Tue, 10 Jan 2023 16:45:00 -0400</pubDate><enclosure url="https://dts.podtrac.com/redirect.mp3/podcasts.captivate.fm/media/f8d44601-6f43-44dc-836a-a4667d710210/2023-01-10-505-Episode-52-converted.mp3" length="7093268" type="audio/mpeg"/><itunes:duration>09:51</itunes:duration><itunes:explicit>false</itunes:explicit><itunes:episodeType>full</itunes:episodeType><itunes:season>1</itunes:season><itunes:episode>52</itunes:episode><itunes:season>1</itunes:season><podcast:episode>52</podcast:episode><podcast:season>1</podcast:season><itunes:author>Contributors from Around the World</itunes:author></item><item><title>Episode #51 - It&apos;s 5:05, Monday, January 9, 2023</title><itunes:title>Episode #51 - It&apos;s 5:05, Monday, January 9, 2023</itunes:title><description><![CDATA[<p><strong>Hey! It’s 5:05, Monday , January 9, 2023. </strong>From the Sourced Podcast Network in New York City, this is your host, Pokie Huang. Stories in today’s episode come from <strong>Olimpiu Pop </strong>in Romania on part one of how accurately did Kaspersky’s SecureList predict crimeware and financial cyber threats in 2022, <strong>Edwin Kwan </strong>in Australia on analysis of leaked AWS keys in Python package index, <strong>Katy Craig </strong>in California on new attack vector in Amazon Web Services, <strong>Mark Miller </strong>in New York City on documentation that’s better than “Good Enough”.</p><p>Today’s episode begins with <strong>Derek Weeks </strong>in Maryland on the $5 data breach payment</p><p>Let’s get to it!</p><p><strong>🇺🇸</strong> <strong>Derek Weeks, Bethesda, Maryland</strong></p><p>The $5 data breach payment</p><p><a href="https://www.cnbc.com/2022/12/28/payments-from-equifax-settlement-over-2017-data-breach-are-going-out.html" rel="noopener noreferrer" target="_blank">https://www.cnbc.com/2022/12/28/payments-from-equifax-settlement-over-2017-data-breach-are-going-out.html</a></p><p><a href="https://twitter.com/kevinmitnick/status/1612155172914094080" rel="noopener noreferrer" target="_blank">https://twitter.com/kevinmitnick/status/1612155172914094080</a></p><p><a href="https://twitter.com/MsMJsays/status/1607868512617340930" rel="noopener noreferrer" target="_blank">https://twitter.com/MsMJsays/status/1607868512617340930</a></p><p><strong>🇺🇸</strong> <strong>Mark Miller, New York City</strong></p><p>Documentation that's better than "Good Enough"</p><p>Fix Bosch Condensing Dryer F03 - Extreme Sump Cleaning (click the “Popular” button)</p><p><a href="https://www.youtube.com/watch?v=7q-2zAiBFyw" rel="noopener noreferrer" target="_blank">https://www.youtube.com/watch?v=7q-2zAiBFyw</a></p><p>MITEEman on YouTube</p><p><a href="https://www.youtube.com/@miteeman/featured" rel="noopener noreferrer" target="_blank">https://www.youtube.com/@miteeman/featured</a></p><p><strong>🇺🇸</strong> <strong>Katy Craig, San Diego, California</strong></p><p>New attack vector in Amazon Web Services</p><p><a href="https://www.mitiga.io/blog/elastic-ip-hijacking-a-new-attack-vector-in-aws" rel="noopener noreferrer" target="_blank">https://www.mitiga.io/blog/elastic-ip-hijacking-a-new-attack-vector-in-aws</a></p><p><a href="https://aws.amazon.com/about-aws/whats-new/2022/10/amazon-virtual-private-cloud-vpc-transfer-elastic-ip-addresses-between-aws-accounts" rel="noopener noreferrer" target="_blank">https://aws.amazon.com/about-aws/whats-new/2022/10/amazon-virtual-private-cloud-vpc-transfer-elastic-ip-addresses-between-aws-accounts</a></p><p><br></p><p><strong>🇦🇺 Edwin Kwan, Sydney, Australia</strong></p><p>Analysis of Leaked AWS Keys in Python Package Index</p><p><a href="https://tomforb.es/i-scanned-every-package-on-pypi-and-found-57-live-aws-keys/" rel="noopener noreferrer" target="_blank">https://tomforb.es/i-scanned-every-package-on-pypi-and-found-57-live-aws-keys/</a></p><p><br></p><p><strong>🇷🇴 Olimpiu Pop, Transylvania, Romania</strong></p><p>How accurately did Kaspersky’s SecureList predict crimeware and financial cyber threats in 2022 Part I</p><p><a href="https://securelist.com/cyberthreats-to-financial-organizations-in-2022/104974/" rel="noopener noreferrer" target="_blank">https://securelist.com/cyberthreats-to-financial-organizations-in-2022/104974/</a></p><p><a href="https://securelist.com/crimeware-financial-cyberthreats-2023/108005/" rel="noopener noreferrer" target="_blank">https://securelist.com/crimeware-financial-cyberthreats-2023/108005/</a></p><p><a href="https://securelist.com/self-spreading-stealer-attacks-gamers-via-youtube/107407/" rel="noopener noreferrer" target="_blank">https://securelist.com/self-spreading-stealer-attacks-gamers-via-youtube/107407/</a></p><p><a href="https://securelist.com/onionpoison-infected-tor-browser-installer-youtube/107627/" rel="noopener noreferrer"...]]></description><content:encoded><![CDATA[<p><strong>Hey! It’s 5:05, Monday , January 9, 2023. </strong>From the Sourced Podcast Network in New York City, this is your host, Pokie Huang. Stories in today’s episode come from <strong>Olimpiu Pop </strong>in Romania on part one of how accurately did Kaspersky’s SecureList predict crimeware and financial cyber threats in 2022, <strong>Edwin Kwan </strong>in Australia on analysis of leaked AWS keys in Python package index, <strong>Katy Craig </strong>in California on new attack vector in Amazon Web Services, <strong>Mark Miller </strong>in New York City on documentation that’s better than “Good Enough”.</p><p>Today’s episode begins with <strong>Derek Weeks </strong>in Maryland on the $5 data breach payment</p><p>Let’s get to it!</p><p><strong>🇺🇸</strong> <strong>Derek Weeks, Bethesda, Maryland</strong></p><p>The $5 data breach payment</p><p><a href="https://www.cnbc.com/2022/12/28/payments-from-equifax-settlement-over-2017-data-breach-are-going-out.html" rel="noopener noreferrer" target="_blank">https://www.cnbc.com/2022/12/28/payments-from-equifax-settlement-over-2017-data-breach-are-going-out.html</a></p><p><a href="https://twitter.com/kevinmitnick/status/1612155172914094080" rel="noopener noreferrer" target="_blank">https://twitter.com/kevinmitnick/status/1612155172914094080</a></p><p><a href="https://twitter.com/MsMJsays/status/1607868512617340930" rel="noopener noreferrer" target="_blank">https://twitter.com/MsMJsays/status/1607868512617340930</a></p><p><strong>🇺🇸</strong> <strong>Mark Miller, New York City</strong></p><p>Documentation that's better than "Good Enough"</p><p>Fix Bosch Condensing Dryer F03 - Extreme Sump Cleaning (click the “Popular” button)</p><p><a href="https://www.youtube.com/watch?v=7q-2zAiBFyw" rel="noopener noreferrer" target="_blank">https://www.youtube.com/watch?v=7q-2zAiBFyw</a></p><p>MITEEman on YouTube</p><p><a href="https://www.youtube.com/@miteeman/featured" rel="noopener noreferrer" target="_blank">https://www.youtube.com/@miteeman/featured</a></p><p><strong>🇺🇸</strong> <strong>Katy Craig, San Diego, California</strong></p><p>New attack vector in Amazon Web Services</p><p><a href="https://www.mitiga.io/blog/elastic-ip-hijacking-a-new-attack-vector-in-aws" rel="noopener noreferrer" target="_blank">https://www.mitiga.io/blog/elastic-ip-hijacking-a-new-attack-vector-in-aws</a></p><p><a href="https://aws.amazon.com/about-aws/whats-new/2022/10/amazon-virtual-private-cloud-vpc-transfer-elastic-ip-addresses-between-aws-accounts" rel="noopener noreferrer" target="_blank">https://aws.amazon.com/about-aws/whats-new/2022/10/amazon-virtual-private-cloud-vpc-transfer-elastic-ip-addresses-between-aws-accounts</a></p><p><br></p><p><strong>🇦🇺 Edwin Kwan, Sydney, Australia</strong></p><p>Analysis of Leaked AWS Keys in Python Package Index</p><p><a href="https://tomforb.es/i-scanned-every-package-on-pypi-and-found-57-live-aws-keys/" rel="noopener noreferrer" target="_blank">https://tomforb.es/i-scanned-every-package-on-pypi-and-found-57-live-aws-keys/</a></p><p><br></p><p><strong>🇷🇴 Olimpiu Pop, Transylvania, Romania</strong></p><p>How accurately did Kaspersky’s SecureList predict crimeware and financial cyber threats in 2022 Part I</p><p><a href="https://securelist.com/cyberthreats-to-financial-organizations-in-2022/104974/" rel="noopener noreferrer" target="_blank">https://securelist.com/cyberthreats-to-financial-organizations-in-2022/104974/</a></p><p><a href="https://securelist.com/crimeware-financial-cyberthreats-2023/108005/" rel="noopener noreferrer" target="_blank">https://securelist.com/crimeware-financial-cyberthreats-2023/108005/</a></p><p><a href="https://securelist.com/self-spreading-stealer-attacks-gamers-via-youtube/107407/" rel="noopener noreferrer" target="_blank">https://securelist.com/self-spreading-stealer-attacks-gamers-via-youtube/107407/</a></p><p><a href="https://securelist.com/onionpoison-infected-tor-browser-installer-youtube/107627/" rel="noopener noreferrer" target="_blank">https://securelist.com/onionpoison-infected-tor-browser-installer-youtube/107627/</a></p><p><a href="https://www.theregister.com/2022/07/06/astralocker-ransomware-shutters-operations/" rel="noopener noreferrer" target="_blank">https://www.theregister.com/2022/07/06/astralocker-ransomware-shutters-operations/</a></p><p><a href="https://twitter.com/chainalysis/status/1580312145451180032" rel="noopener noreferrer" target="_blank">https://twitter.com/chainalysis/status/1580312145451180032</a></p><p><a href="https://www.businesswire.com/news/home/20221027005148/en/Solidus-Labs-Unveils-First-of-its-kind-Web3-AML-Solution-Flagging-Close-to-200000-Rug-Pulls-and-Smart-Contract-Scams-That-Make-Up-8-of-All-Ethereum-Tokens" rel="noopener noreferrer" target="_blank">https://www.businesswire.com/news/home/20221027005148/en/Solidus-Labs-Unveils-First-of-its-kind-Web3-AML-Solution-Flagging-Close-to-200000-Rug-Pulls-and-Smart-Contract-Scams-That-Make-Up-8-of-All-Ethereum-Tokens</a></p><p><a href="https://www.interpol.int/en/News-and-Events/News/2021/Joint-global-ransomware-operation-sees-arrests-and-criminal-network-dismantled" rel="noopener noreferrer" target="_blank">https://www.interpol.int/en/News-and-Events/News/2021/Joint-global-ransomware-operation-sees-arrests-and-criminal-network-dismantled</a></p><p><a href="https://www.kaspersky.com/about/press-releases/2022_no-more-ransom-helped-more-than-15-million-people-decrypt-their-devices" rel="noopener noreferrer" target="_blank">https://www.kaspersky.com/about/press-releases/2022_no-more-ransom-helped-more-than-15-million-people-decrypt-their-devices</a></p><p><a href="https://securelist.com/new-ransomware-trends-in-2022/106457/#conti-cross-platform-functionality" rel="noopener noreferrer" target="_blank">https://securelist.com/new-ransomware-trends-in-2022/106457/#conti-cross-platform-functionality</a></p><p><a href="https://securelist.com/new-ransomware-trends-in-2022/106457/#freeud-brand-new-ransomware-with-wiper-capabilities" rel="noopener noreferrer" target="_blank">https://securelist.com/new-ransomware-trends-in-2022/106457/#freeud-brand-new-ransomware-with-wiper-capabilities</a></p>]]></content:encoded><link><![CDATA[https://3zozb9fxlbueipjyapmaas.captivate.fm/episode/episode-51-its-5-05-monday-january-9-2023]]></link><guid isPermaLink="false">7973b0d8-75c2-4a76-a53c-08a287ebdfe2</guid><itunes:image href="https://artwork.captivate.fm/8db63044-9669-4307-8b36-d915f7ed756b/40sOsHVpz71ZHGIWp6nA9u4Y.png"/><dc:creator><![CDATA[Contributors from Around the World]]></dc:creator><pubDate>Mon, 09 Jan 2023 16:45:00 -0400</pubDate><enclosure url="https://dts.podtrac.com/redirect.mp3/podcasts.captivate.fm/media/efb0e49f-303a-486f-8823-ee910197d0d9/2023-01-09-505-Episode-51-converted.mp3" length="10070287" type="audio/mpeg"/><itunes:duration>13:59</itunes:duration><itunes:explicit>false</itunes:explicit><itunes:episodeType>full</itunes:episodeType><itunes:season>1</itunes:season><itunes:episode>51</itunes:episode><itunes:season>1</itunes:season><podcast:episode>51</podcast:episode><podcast:season>1</podcast:season><itunes:author>Contributors from Around the World</itunes:author></item><item><title>Episode #50 - It&apos;s 5:05, Friday, January 6, 2023</title><itunes:title>Episode #50 - It&apos;s 5:05, Friday, January 6, 2023</itunes:title><description><![CDATA[<p><strong>Hey… It’s 5:05, Friday , January 6, 2023. </strong>From the Sourced Podcast Network in New York City, this is your host, Pokie Huang. Stories in today’s episode come from <strong>Trac Bannon </strong>in Pennsylvania on Iranian drones, US components, secondary markets, <strong>Edwin Kwan </strong>in Australia on Slack’s Github repository compromised, <strong>Katy Craig</strong> in California on White House’s IoT labels, <strong>Olimpiu Pop </strong>in Romania on three teachings from 2022 for a safer cyber ecosystem, <strong>Kadi Grigg</strong> i n Virginia on is cyber insurable?</p><p>Today’s episode begins with our Executive Producer <strong>Mark Miller</strong> reporting live from New York City on the global outage at Target stores.</p><p>Let’s get to it!</p><p><strong>🇺🇸</strong> <strong>Mark Miller, New York City</strong></p><p>Global Outage at Target Stores</p><p><a href="https://www.reddit.com/r/Target/comments/103z4sl/system_down/" rel="noopener noreferrer" target="_blank">https://www.reddit.com/r/Target/comments/103z4sl/system_down/</a></p><p><strong>🇺🇸</strong> <strong>Kadi Grigg, Alexandria, Virginia</strong></p><p>Is Cyber Insurable?</p><p><a href="https://www.swissinfo.ch/eng/business/cyber-attacks-set-to-become--uninsurable---says-zurich-chief/48161718?utm_campaign=swi-rss&amp;utm_source=multiple&amp;utm_medium=rss&amp;utm_content=o" rel="noopener noreferrer" target="_blank">https://www.swissinfo.ch/eng/business/cyber-attacks-set-to-become--uninsurable---says-zurich-chief/48161718?utm_campaign=swi-rss&amp;utm_source=multiple&amp;utm_medium=rss&amp;utm_content=o</a>&nbsp;</p><p><strong>🇷🇴 Olimpiu Pop, Transylvania, Romania</strong></p><p>Three Teachings From 2022 For a Safer CyberEcosystem</p><p><a href="https://www.computerweekly.com/feature/Cyber-security-professionals-share-their-biggest-lessons-of-2022" rel="noopener noreferrer" target="_blank">https://www.computerweekly.com/feature/Cyber-security-professionals-share-their-biggest-lessons-of-2022</a></p><p><a href="https://www.computerweekly.com/news/252528192/Iranian-APT-seen-exploiting-GitHub-repository-as-C2-mechanism" rel="noopener noreferrer" target="_blank">https://www.computerweekly.com/news/252528192/Iranian-APT-seen-exploiting-GitHub-repository-as-C2-mechanism</a></p><p><br></p><p><strong>🇺🇸</strong> <strong>Katy Craig, San Diego, California</strong></p><p>White House’s IoT Labels</p><p><a href="https://securityintelligence.com/articles/how-white-house-new-iot-labels-improve-security/" rel="noopener noreferrer" target="_blank">https://securityintelligence.com/articles/how-white-house-new-iot-labels-improve-security/</a></p><p><br></p><p><strong>🇦🇺 Edwin Kwan, Sydney, Australia</strong></p><p>Slack’s GitHub repository Compromised</p><p><a href="https://slack.com/intl/en-au/blog/news/slack-security-update" rel="noopener noreferrer" target="_blank">https://slack.com/intl/en-au/blog/news/slack-security-update</a></p><p><br></p><p><strong>🇺🇸</strong> <strong>Tracy (Trac) Bannon, Camp Hill, Pennsylvania</strong></p><p>Iranian Drones, US Components, Secondary Markets</p><p><a href="https://storymaps.arcgis.com/stories/7a394153c87947d8a602c3927609f572" rel="noopener noreferrer" target="_blank">https://storymaps.arcgis.com/stories/7a394153c87947d8a602c3927609f572</a>&nbsp;</p><p><a href="https://www.pmddtc.state.gov/ddtc_public?id=ddtc_kb_article_page&amp;sys_id=24d528fddbfc930044f9ff621f961987" rel="noopener noreferrer" target="_blank">https://www.pmddtc.state.gov/ddtc_public?id=ddtc_kb_article_page&amp;sys_id=24d528fddbfc930044f9ff621f961987</a></p><p><a href="https://www.csis.org/analysis/improved-export-controls-enforcement-technology-needed-us-national-security" rel="noopener noreferrer" target="_blank">https://www.csis.org/analysis/improved-export-controls-enforcement-technology-needed-us-national-security</a>&nbsp;</p><p><a...]]></description><content:encoded><![CDATA[<p><strong>Hey… It’s 5:05, Friday , January 6, 2023. </strong>From the Sourced Podcast Network in New York City, this is your host, Pokie Huang. Stories in today’s episode come from <strong>Trac Bannon </strong>in Pennsylvania on Iranian drones, US components, secondary markets, <strong>Edwin Kwan </strong>in Australia on Slack’s Github repository compromised, <strong>Katy Craig</strong> in California on White House’s IoT labels, <strong>Olimpiu Pop </strong>in Romania on three teachings from 2022 for a safer cyber ecosystem, <strong>Kadi Grigg</strong> i n Virginia on is cyber insurable?</p><p>Today’s episode begins with our Executive Producer <strong>Mark Miller</strong> reporting live from New York City on the global outage at Target stores.</p><p>Let’s get to it!</p><p><strong>🇺🇸</strong> <strong>Mark Miller, New York City</strong></p><p>Global Outage at Target Stores</p><p><a href="https://www.reddit.com/r/Target/comments/103z4sl/system_down/" rel="noopener noreferrer" target="_blank">https://www.reddit.com/r/Target/comments/103z4sl/system_down/</a></p><p><strong>🇺🇸</strong> <strong>Kadi Grigg, Alexandria, Virginia</strong></p><p>Is Cyber Insurable?</p><p><a href="https://www.swissinfo.ch/eng/business/cyber-attacks-set-to-become--uninsurable---says-zurich-chief/48161718?utm_campaign=swi-rss&amp;utm_source=multiple&amp;utm_medium=rss&amp;utm_content=o" rel="noopener noreferrer" target="_blank">https://www.swissinfo.ch/eng/business/cyber-attacks-set-to-become--uninsurable---says-zurich-chief/48161718?utm_campaign=swi-rss&amp;utm_source=multiple&amp;utm_medium=rss&amp;utm_content=o</a>&nbsp;</p><p><strong>🇷🇴 Olimpiu Pop, Transylvania, Romania</strong></p><p>Three Teachings From 2022 For a Safer CyberEcosystem</p><p><a href="https://www.computerweekly.com/feature/Cyber-security-professionals-share-their-biggest-lessons-of-2022" rel="noopener noreferrer" target="_blank">https://www.computerweekly.com/feature/Cyber-security-professionals-share-their-biggest-lessons-of-2022</a></p><p><a href="https://www.computerweekly.com/news/252528192/Iranian-APT-seen-exploiting-GitHub-repository-as-C2-mechanism" rel="noopener noreferrer" target="_blank">https://www.computerweekly.com/news/252528192/Iranian-APT-seen-exploiting-GitHub-repository-as-C2-mechanism</a></p><p><br></p><p><strong>🇺🇸</strong> <strong>Katy Craig, San Diego, California</strong></p><p>White House’s IoT Labels</p><p><a href="https://securityintelligence.com/articles/how-white-house-new-iot-labels-improve-security/" rel="noopener noreferrer" target="_blank">https://securityintelligence.com/articles/how-white-house-new-iot-labels-improve-security/</a></p><p><br></p><p><strong>🇦🇺 Edwin Kwan, Sydney, Australia</strong></p><p>Slack’s GitHub repository Compromised</p><p><a href="https://slack.com/intl/en-au/blog/news/slack-security-update" rel="noopener noreferrer" target="_blank">https://slack.com/intl/en-au/blog/news/slack-security-update</a></p><p><br></p><p><strong>🇺🇸</strong> <strong>Tracy (Trac) Bannon, Camp Hill, Pennsylvania</strong></p><p>Iranian Drones, US Components, Secondary Markets</p><p><a href="https://storymaps.arcgis.com/stories/7a394153c87947d8a602c3927609f572" rel="noopener noreferrer" target="_blank">https://storymaps.arcgis.com/stories/7a394153c87947d8a602c3927609f572</a>&nbsp;</p><p><a href="https://www.pmddtc.state.gov/ddtc_public?id=ddtc_kb_article_page&amp;sys_id=24d528fddbfc930044f9ff621f961987" rel="noopener noreferrer" target="_blank">https://www.pmddtc.state.gov/ddtc_public?id=ddtc_kb_article_page&amp;sys_id=24d528fddbfc930044f9ff621f961987</a></p><p><a href="https://www.csis.org/analysis/improved-export-controls-enforcement-technology-needed-us-national-security" rel="noopener noreferrer" target="_blank">https://www.csis.org/analysis/improved-export-controls-enforcement-technology-needed-us-national-security</a>&nbsp;</p><p><a href="https://amp-cnn-com.cdn.ampproject.org/c/s/amp.cnn.com/cnn/2023/01/04/politics/iranian-drone-parts-13-us-companies-ukraine-russia/index.html" rel="noopener noreferrer" target="_blank">https://amp-cnn-com.cdn.ampproject.org/c/s/amp.cnn.com/cnn/2023/01/04/politics/iranian-drone-parts-13-us-companies-ukraine-russia/index.html</a></p>]]></content:encoded><link><![CDATA[https://3zozb9fxlbueipjyapmaas.captivate.fm/episode/episode-50-its-5-05-friday-january-6-2023]]></link><guid isPermaLink="false">1118ac16-308e-4b23-969c-b0effc01b455</guid><itunes:image href="https://artwork.captivate.fm/3b98c743-a4c9-4cfa-bd68-b2dfa2133360/R-CUpsf4aX-YFOWqmf1EImNj.png"/><dc:creator><![CDATA[Contributors from Around the World]]></dc:creator><pubDate>Fri, 06 Jan 2023 16:45:00 -0400</pubDate><enclosure url="https://dts.podtrac.com/redirect.mp3/podcasts.captivate.fm/media/e04b4b54-d2b8-45eb-acf7-aa90255a9a94/2023-01-07-505-Episode-50-U-converted.mp3" length="9647730" type="audio/mpeg"/><itunes:duration>13:24</itunes:duration><itunes:explicit>false</itunes:explicit><itunes:episodeType>full</itunes:episodeType><itunes:season>1</itunes:season><itunes:episode>50</itunes:episode><itunes:season>1</itunes:season><podcast:episode>50</podcast:episode><podcast:season>1</podcast:season><itunes:author>Contributors from Around the World</itunes:author></item><item><title>Episode #49 - It&apos;s 5:05, Thursday, January 5 , 2023</title><itunes:title>Episode #49 - It&apos;s 5:05, Thursday, January 5 , 2023</itunes:title><description><![CDATA[<p><strong>Hey… It’s 5:05, Thursday , January 5, 2023. </strong>From the Sourced Podcast Network in New York City, this is your host, Pokie Huang. Stories in today’s episode come from <strong>Olimpiu Pop </strong>in Romania on attacks on power grid in Ukraine and US put pressure on transmission gear, <strong>Katy Craig</strong> in California on New York’s power move and <strong>Edwin Kwan </strong>in Australia on CircleCI security incident immediate actions.</p><p>Let’s get to it!</p><p><strong>🇷🇴 Olimpiu Pop, Transylvania, Romania</strong></p><p>Attacks On Power Grid In Ukriane And US Put Pressure On Transmission Gear</p><p><a href="https://www.eenews.net/articles/attacks-on-grid-infrastructure-in-4-states-raise-alarm/" rel="noopener noreferrer" target="_blank">https://www.eenews.net/articles/attacks-on-grid-infrastructure-in-4-states-raise-alarm/</a></p><p><a href="https://www.politico.com/news/2022/12/26/physical-attacks-electrical-grid-peak-00075216" rel="noopener noreferrer" target="_blank">https://www.politico.com/news/2022/12/26/physical-attacks-electrical-grid-peak-00075216</a></p><p><a href="https://www-wired-com.cdn.ampproject.org/c/s/www.wired.com/story/attacks-us-electrical-grid-security-roundup/amp" rel="noopener noreferrer" target="_blank">https://www-wired-com.cdn.ampproject.org/c/s/www.wired.com/story/attacks-us-electrical-grid-security-roundup/amp</a></p><p><a href="https://www.forbes.com/sites/craighooper/2023/01/04/with-electrical-grids-under-assault-us-and-ukraine-seek-scarce-transmission-gear/?sh=7082997d325f" rel="noopener noreferrer" target="_blank">https://www.forbes.com/sites/craighooper/2023/01/04/with-electrical-grids-under-assault-us-and-ukraine-seek-scarce-transmission-gear/?sh=7082997d325f</a></p><p><a href="https://edition.cnn.com/2022/09/28/energy/nord-stream-pipelines-leaks-explainer-intl/index.html" rel="noopener noreferrer" target="_blank">https://edition.cnn.com/2022/09/28/energy/nord-stream-pipelines-leaks-explainer-intl/index.html</a></p><p><strong>🇺🇸</strong> <strong>Katy Craig, San Diego, California</strong></p><p>New York’s Power Move</p><p><a href="https://www.governor.ny.gov/news/governor-hochul-signs-nation-leading-legislation-protect-energy-grid-cyber-threats" rel="noopener noreferrer" target="_blank">https://www.governor.ny.gov/news/governor-hochul-signs-nation-leading-legislation-protect-energy-grid-cyber-threats</a></p><p><strong>🇦🇺 Edwin Kwan, Sydney, Australia</strong></p><p>CircleCI security incident immediate actions</p><p><a href="https://circleci.com/blog/january-4-2023-security-alert/" rel="noopener noreferrer" target="_blank">https://circleci.com/blog/january-4-2023-security-alert/</a></p><p><br></p>]]></description><content:encoded><![CDATA[<p><strong>Hey… It’s 5:05, Thursday , January 5, 2023. </strong>From the Sourced Podcast Network in New York City, this is your host, Pokie Huang. Stories in today’s episode come from <strong>Olimpiu Pop </strong>in Romania on attacks on power grid in Ukraine and US put pressure on transmission gear, <strong>Katy Craig</strong> in California on New York’s power move and <strong>Edwin Kwan </strong>in Australia on CircleCI security incident immediate actions.</p><p>Let’s get to it!</p><p><strong>🇷🇴 Olimpiu Pop, Transylvania, Romania</strong></p><p>Attacks On Power Grid In Ukriane And US Put Pressure On Transmission Gear</p><p><a href="https://www.eenews.net/articles/attacks-on-grid-infrastructure-in-4-states-raise-alarm/" rel="noopener noreferrer" target="_blank">https://www.eenews.net/articles/attacks-on-grid-infrastructure-in-4-states-raise-alarm/</a></p><p><a href="https://www.politico.com/news/2022/12/26/physical-attacks-electrical-grid-peak-00075216" rel="noopener noreferrer" target="_blank">https://www.politico.com/news/2022/12/26/physical-attacks-electrical-grid-peak-00075216</a></p><p><a href="https://www-wired-com.cdn.ampproject.org/c/s/www.wired.com/story/attacks-us-electrical-grid-security-roundup/amp" rel="noopener noreferrer" target="_blank">https://www-wired-com.cdn.ampproject.org/c/s/www.wired.com/story/attacks-us-electrical-grid-security-roundup/amp</a></p><p><a href="https://www.forbes.com/sites/craighooper/2023/01/04/with-electrical-grids-under-assault-us-and-ukraine-seek-scarce-transmission-gear/?sh=7082997d325f" rel="noopener noreferrer" target="_blank">https://www.forbes.com/sites/craighooper/2023/01/04/with-electrical-grids-under-assault-us-and-ukraine-seek-scarce-transmission-gear/?sh=7082997d325f</a></p><p><a href="https://edition.cnn.com/2022/09/28/energy/nord-stream-pipelines-leaks-explainer-intl/index.html" rel="noopener noreferrer" target="_blank">https://edition.cnn.com/2022/09/28/energy/nord-stream-pipelines-leaks-explainer-intl/index.html</a></p><p><strong>🇺🇸</strong> <strong>Katy Craig, San Diego, California</strong></p><p>New York’s Power Move</p><p><a href="https://www.governor.ny.gov/news/governor-hochul-signs-nation-leading-legislation-protect-energy-grid-cyber-threats" rel="noopener noreferrer" target="_blank">https://www.governor.ny.gov/news/governor-hochul-signs-nation-leading-legislation-protect-energy-grid-cyber-threats</a></p><p><strong>🇦🇺 Edwin Kwan, Sydney, Australia</strong></p><p>CircleCI security incident immediate actions</p><p><a href="https://circleci.com/blog/january-4-2023-security-alert/" rel="noopener noreferrer" target="_blank">https://circleci.com/blog/january-4-2023-security-alert/</a></p><p><br></p>]]></content:encoded><link><![CDATA[https://3zozb9fxlbueipjyapmaas.captivate.fm/episode/episode-49-its-5-05-thursday-january-5-2023]]></link><guid isPermaLink="false">00893dad-b1c3-4797-beaa-227243c1edaa</guid><itunes:image href="https://artwork.captivate.fm/54215270-f0dd-42b2-8b6c-065e58aa2a27/a1AhJooEQoKBFW2Z0KUn3ulb.png"/><dc:creator><![CDATA[Contributors from Around the World]]></dc:creator><pubDate>Thu, 05 Jan 2023 16:45:00 -0400</pubDate><enclosure url="https://dts.podtrac.com/redirect.mp3/podcasts.captivate.fm/media/dd1a45fb-094e-456d-8a26-5f5694e6cf9a/2023-01-05-505-Episode-49-converted.mp3" length="6794844" type="audio/mpeg"/><itunes:duration>07:05</itunes:duration><itunes:explicit>false</itunes:explicit><itunes:episodeType>full</itunes:episodeType><itunes:season>1</itunes:season><itunes:episode>49</itunes:episode><itunes:season>1</itunes:season><podcast:episode>49</podcast:episode><podcast:season>1</podcast:season><itunes:author>Contributors from Around the World</itunes:author></item><item><title>Episode #48 - It&apos;s 5:05, Wednesday, January 4, 2023</title><itunes:title>Episode #48 - It&apos;s 5:05, Wednesday, January 4, 2023</itunes:title><description><![CDATA[<p><strong>Hey… It’s 5:05, Wednesday , January 4, 2023. </strong>From the Sourced Podcast Network in New York City, this is your host, Pokie Huang. Stories in today’s episode come from <strong>Edwin Kwan</strong> in Australia on Queensland University of Technology suffers Ransomware Attack, <strong>Katy Craig </strong>in California on PwnGPT, <strong>Olimpiu Pop</strong> in Romania on Jarviz 0.1.0 is released to provide a solution to inspect the content of Java Archives, <strong>&nbsp;Kadi Grigg</strong> in Virginia on Gorilla toolkit is now abandonware.</p><p>Today’s episode begins with <strong>Trac Bannon </strong>in Pennsylvania on ethics and unethical hacking? Is this some kind of joke?</p><p>Let’s get to it!</p><p><strong>﻿🇺🇸</strong> <strong>Tracy (Trac) Bannon, Camp Hill, Pennsylvania</strong></p><p>Ethics and Unethical Hacking?&nbsp; Is this some kind of joke?</p><p><a href="https://www.engadget.com/lock-bit-ransomware-gang-apologizes-sick-kids-attack-224245439.html" rel="noopener noreferrer" target="_blank">https://www.engadget.com/lock-bit-ransomware-gang-apologizes-sick-kids-attack-224245439.html</a></p><p><a href="https://www.bleepingcomputer.com/news/security/ransomware-gang-apologizes-gives-sickkids-hospital-free-decryptor/" rel="noopener noreferrer" target="_blank">https://www.bleepingcomputer.com/news/security/ransomware-gang-apologizes-gives-sickkids-hospital-free-decryptor/</a></p><p><a href="https://twitter.com/AlvieriD/status/1609253113436700678?s=20&amp;t=hLelspGcmLxOXfsYyHJxGg" rel="noopener noreferrer" target="_blank">https://twitter.com/AlvieriD/status/1609253113436700678?s=20&amp;t=hLelspGcmLxOXfsYyHJxGg</a></p><p><strong>🇺🇸</strong> <strong>Kadi Grigg, Alexandria, Virginia</strong></p><p>Gorilla Toolkit Is Now Abandonware</p><p><a href="https://thenewstack.io/gorilla-toolkit-open-source-project-becomes-abandonware/" rel="noopener noreferrer" target="_blank">https://thenewstack.io/gorilla-toolkit-open-source-project-becomes-abandonware/</a>&nbsp;</p><p><a href="https://www.darkreading.com/application-security/how-hackers-infiltrate-open-source-projects" rel="noopener noreferrer" target="_blank">https://www.darkreading.com/application-security/how-hackers-infiltrate-open-source-projects</a>&nbsp;</p><p><br></p><p><strong>🇷🇴 Olimpiu Pop, Transylvania, Romania</strong></p><p>Jarviz 0.1.0 is released to provide a solution to inspect the content of Java Archives</p><p>​​<a href="https://andresalmiray.com/jarviz-0-1-0-has-been-released/" rel="noopener noreferrer" target="_blank">https://andresalmiray.com/jarviz-0-1-0-has-been-released/</a></p><p>&nbsp;</p><p><strong>🇺🇸</strong> <strong>Katy Craig, San Diego, California</strong></p><p>PwnGPT</p><p><a href="https://www.cyberscoop.com/chatgpt-ai-malware/" rel="noopener noreferrer" target="_blank">https://www.cyberscoop.com/chatgpt-ai-malware/</a></p><p><a href="https://research.checkpoint.com/2022/opwnai-ai-that-can-save-the-day-or-hack-it-away/" rel="noopener noreferrer" target="_blank">https://research.checkpoint.com/2022/opwnai-ai-that-can-save-the-day-or-hack-it-away/</a></p><p><strong>🇦🇺 Edwin Kwan, Sydney, Australia</strong></p><p>Queensland University of Technology suffers Ransomware Attack</p><p><a href="https://www.bleepingcomputer.com/news/security/royal-ransomware-claims-attack-on-queensland-university-of-technology/" rel="noopener noreferrer" target="_blank">https://www.bleepingcomputer.com/news/security/royal-ransomware-claims-attack-on-queensland-university-of-technology/</a></p>]]></description><content:encoded><![CDATA[<p><strong>Hey… It’s 5:05, Wednesday , January 4, 2023. </strong>From the Sourced Podcast Network in New York City, this is your host, Pokie Huang. Stories in today’s episode come from <strong>Edwin Kwan</strong> in Australia on Queensland University of Technology suffers Ransomware Attack, <strong>Katy Craig </strong>in California on PwnGPT, <strong>Olimpiu Pop</strong> in Romania on Jarviz 0.1.0 is released to provide a solution to inspect the content of Java Archives, <strong>&nbsp;Kadi Grigg</strong> in Virginia on Gorilla toolkit is now abandonware.</p><p>Today’s episode begins with <strong>Trac Bannon </strong>in Pennsylvania on ethics and unethical hacking? Is this some kind of joke?</p><p>Let’s get to it!</p><p><strong>﻿🇺🇸</strong> <strong>Tracy (Trac) Bannon, Camp Hill, Pennsylvania</strong></p><p>Ethics and Unethical Hacking?&nbsp; Is this some kind of joke?</p><p><a href="https://www.engadget.com/lock-bit-ransomware-gang-apologizes-sick-kids-attack-224245439.html" rel="noopener noreferrer" target="_blank">https://www.engadget.com/lock-bit-ransomware-gang-apologizes-sick-kids-attack-224245439.html</a></p><p><a href="https://www.bleepingcomputer.com/news/security/ransomware-gang-apologizes-gives-sickkids-hospital-free-decryptor/" rel="noopener noreferrer" target="_blank">https://www.bleepingcomputer.com/news/security/ransomware-gang-apologizes-gives-sickkids-hospital-free-decryptor/</a></p><p><a href="https://twitter.com/AlvieriD/status/1609253113436700678?s=20&amp;t=hLelspGcmLxOXfsYyHJxGg" rel="noopener noreferrer" target="_blank">https://twitter.com/AlvieriD/status/1609253113436700678?s=20&amp;t=hLelspGcmLxOXfsYyHJxGg</a></p><p><strong>🇺🇸</strong> <strong>Kadi Grigg, Alexandria, Virginia</strong></p><p>Gorilla Toolkit Is Now Abandonware</p><p><a href="https://thenewstack.io/gorilla-toolkit-open-source-project-becomes-abandonware/" rel="noopener noreferrer" target="_blank">https://thenewstack.io/gorilla-toolkit-open-source-project-becomes-abandonware/</a>&nbsp;</p><p><a href="https://www.darkreading.com/application-security/how-hackers-infiltrate-open-source-projects" rel="noopener noreferrer" target="_blank">https://www.darkreading.com/application-security/how-hackers-infiltrate-open-source-projects</a>&nbsp;</p><p><br></p><p><strong>🇷🇴 Olimpiu Pop, Transylvania, Romania</strong></p><p>Jarviz 0.1.0 is released to provide a solution to inspect the content of Java Archives</p><p>​​<a href="https://andresalmiray.com/jarviz-0-1-0-has-been-released/" rel="noopener noreferrer" target="_blank">https://andresalmiray.com/jarviz-0-1-0-has-been-released/</a></p><p>&nbsp;</p><p><strong>🇺🇸</strong> <strong>Katy Craig, San Diego, California</strong></p><p>PwnGPT</p><p><a href="https://www.cyberscoop.com/chatgpt-ai-malware/" rel="noopener noreferrer" target="_blank">https://www.cyberscoop.com/chatgpt-ai-malware/</a></p><p><a href="https://research.checkpoint.com/2022/opwnai-ai-that-can-save-the-day-or-hack-it-away/" rel="noopener noreferrer" target="_blank">https://research.checkpoint.com/2022/opwnai-ai-that-can-save-the-day-or-hack-it-away/</a></p><p><strong>🇦🇺 Edwin Kwan, Sydney, Australia</strong></p><p>Queensland University of Technology suffers Ransomware Attack</p><p><a href="https://www.bleepingcomputer.com/news/security/royal-ransomware-claims-attack-on-queensland-university-of-technology/" rel="noopener noreferrer" target="_blank">https://www.bleepingcomputer.com/news/security/royal-ransomware-claims-attack-on-queensland-university-of-technology/</a></p>]]></content:encoded><link><![CDATA[https://3zozb9fxlbueipjyapmaas.captivate.fm/episode/episode-48-its-5-05-wednesday-january-4-2023]]></link><guid isPermaLink="false">7cf5cee2-1e57-4149-82a5-4e3a635e15d7</guid><itunes:image href="https://artwork.captivate.fm/1e2050d8-1e31-4f91-b141-5631c9c8a1c8/M9IB1AdjJBaxMMTXBdMf8lUT.png"/><dc:creator><![CDATA[Contributors from Around the World]]></dc:creator><pubDate>Wed, 04 Jan 2023 16:45:00 -0400</pubDate><enclosure url="https://dts.podtrac.com/redirect.mp3/podcasts.captivate.fm/media/d1e886dc-cd29-4b72-a179-9649a14d655b/2023-01-04-505-Episode-48-U-converted.mp3" length="10783808" type="audio/mpeg"/><itunes:duration>11:14</itunes:duration><itunes:explicit>false</itunes:explicit><itunes:episodeType>full</itunes:episodeType><itunes:season>1</itunes:season><itunes:episode>48</itunes:episode><itunes:season>1</itunes:season><podcast:episode>48</podcast:episode><podcast:season>1</podcast:season><itunes:author>Contributors from Around the World</itunes:author></item><item><title>Episode #47 - It&apos;s 5:05, Tuesday, January 3, 2023</title><itunes:title>Episode #47 - It&apos;s 5:05, Tuesday, January 3, 2023</itunes:title><description><![CDATA[<p><strong>It’s 5:05, Tuesday , January 3, 2023. </strong>From the Sourced Podcast Network in New York City, this is your host, Pokie Huang. Stories in today’s episode come from <strong>Olimpiu Pop </strong>in Romania on Firefox for iOS and Android kernel vulnerabilities reported in week 51 of 2022, <strong>Katy Craig</strong> in California on Southwest’s culture problem, <strong>Edwin Kwan</strong> in Australia on Google home smart speaker wiretap vulnerability.</p><p>Today’s episode begins with <strong>Derek Weeks </strong>in Maryland on your code or a derivative? The next thing we need for AI is an evaluation of original content versus a derivative.</p><p>Let’s get to it!</p><p><strong>﻿🇺🇸</strong> <strong>Derek Weeks, Bethesda, Maryland</strong></p><p>Your code or a derivative? The next thing we need for AI is an evaluation of original content versus a derivative</p><p><a href="https://www.itprotoday.com/development-techniques-and-management/does-ai-assisted-coding-violate-open-source-licenses" rel="noopener noreferrer" target="_blank">https://www.itprotoday.com/development-techniques-and-management/does-ai-assisted-coding-violate-open-source-licenses</a></p><p><strong>🇦🇺 Edwin Kwan, Sydney, Australia</strong></p><p>Google Home Smart Speaker Wiretap vulnerability</p><p><a href="https://downrightnifty.me/blog/2022/12/26/hacking-google-home.html" rel="noopener noreferrer" target="_blank">https://downrightnifty.me/blog/2022/12/26/hacking-google-home.html</a></p><p><strong>🇺🇸</strong> <strong>Katy Craig, San Diego, California</strong></p><p>Southwest’s Culture Problem</p><p><a href="https://www.reddit.com/r/SouthwestAirlines/comments/zyao44/the_real_problem_with_the_software_at_southwest/" rel="noopener noreferrer" target="_blank">https://www.reddit.com/r/SouthwestAirlines/comments/zyao44/the_real_problem_with_the_software_at_southwest/</a></p><p><a href="https://www.wsj.com/articles/southwest-meltdown-shows-airlines-need-tighter-software-integration-11672687980" rel="noopener noreferrer" target="_blank">https://www.wsj.com/articles/southwest-meltdown-shows-airlines-need-tighter-software-integration-11672687980</a></p><p><br></p><p><strong>🇷🇴 Olimpiu Pop, Transylvania, Romania</strong></p><p>Firefox for iOS and Android kernel vulnerabilities reported in week 51 of 2022 </p><p><a href="https://source.android.com/docs/security/bulletin/pixel/2022-12-01" rel="noopener noreferrer" target="_blank">https://source.android.com/docs/security/bulletin/pixel/2022-12-01</a></p><p><a href="https://nvd.nist.gov/vuln/detail/CVE-2022-1887" rel="noopener noreferrer" target="_blank">https://nvd.nist.gov/vuln/detail/CVE-2022-1887</a></p><p><a href="https://www.mozilla.org/en-US/security/advisories/mfsa2022-23/" rel="noopener noreferrer" target="_blank">https://www.mozilla.org/en-US/security/advisories/mfsa2022-23/</a></p><p><a href="https://www.cisa.gov/uscert/ncas/bulletins/sb22-361#low" rel="noopener noreferrer" target="_blank">https://www.cisa.gov/uscert/ncas/bulletins/sb22-361</a></p><p><a href="https://www.cisa.gov/known-exploited-vulnerabilities-catalog" rel="noopener noreferrer" target="_blank">https://www.cisa.gov/known-exploited-vulnerabilities-catalog</a></p><p><a href="https://www.tibco.com/support/advisories/2018/04/tibco-security-advisory-april-17-2018-tibco-jasperreports-2018-5430" rel="noopener noreferrer" target="_blank">https://www.tibco.com/support/advisories/2018/04/tibco-security-advisory-april-17-2018-tibco-jasperreports-2018-5430</a></p><p><a href="https://www.tibco.com/support/advisories/2019/03/tibco-security-advisory-march-6-2019-tibco-jasperreports-library-2018-18809" rel="noopener noreferrer" target="_blank">https://www.tibco.com/support/advisories/2019/03/tibco-security-advisory-march-6-2019-tibco-jasperreports-library-2018-18809</a></p><p><br></p>]]></description><content:encoded><![CDATA[<p><strong>It’s 5:05, Tuesday , January 3, 2023. </strong>From the Sourced Podcast Network in New York City, this is your host, Pokie Huang. Stories in today’s episode come from <strong>Olimpiu Pop </strong>in Romania on Firefox for iOS and Android kernel vulnerabilities reported in week 51 of 2022, <strong>Katy Craig</strong> in California on Southwest’s culture problem, <strong>Edwin Kwan</strong> in Australia on Google home smart speaker wiretap vulnerability.</p><p>Today’s episode begins with <strong>Derek Weeks </strong>in Maryland on your code or a derivative? The next thing we need for AI is an evaluation of original content versus a derivative.</p><p>Let’s get to it!</p><p><strong>﻿🇺🇸</strong> <strong>Derek Weeks, Bethesda, Maryland</strong></p><p>Your code or a derivative? The next thing we need for AI is an evaluation of original content versus a derivative</p><p><a href="https://www.itprotoday.com/development-techniques-and-management/does-ai-assisted-coding-violate-open-source-licenses" rel="noopener noreferrer" target="_blank">https://www.itprotoday.com/development-techniques-and-management/does-ai-assisted-coding-violate-open-source-licenses</a></p><p><strong>🇦🇺 Edwin Kwan, Sydney, Australia</strong></p><p>Google Home Smart Speaker Wiretap vulnerability</p><p><a href="https://downrightnifty.me/blog/2022/12/26/hacking-google-home.html" rel="noopener noreferrer" target="_blank">https://downrightnifty.me/blog/2022/12/26/hacking-google-home.html</a></p><p><strong>🇺🇸</strong> <strong>Katy Craig, San Diego, California</strong></p><p>Southwest’s Culture Problem</p><p><a href="https://www.reddit.com/r/SouthwestAirlines/comments/zyao44/the_real_problem_with_the_software_at_southwest/" rel="noopener noreferrer" target="_blank">https://www.reddit.com/r/SouthwestAirlines/comments/zyao44/the_real_problem_with_the_software_at_southwest/</a></p><p><a href="https://www.wsj.com/articles/southwest-meltdown-shows-airlines-need-tighter-software-integration-11672687980" rel="noopener noreferrer" target="_blank">https://www.wsj.com/articles/southwest-meltdown-shows-airlines-need-tighter-software-integration-11672687980</a></p><p><br></p><p><strong>🇷🇴 Olimpiu Pop, Transylvania, Romania</strong></p><p>Firefox for iOS and Android kernel vulnerabilities reported in week 51 of 2022 </p><p><a href="https://source.android.com/docs/security/bulletin/pixel/2022-12-01" rel="noopener noreferrer" target="_blank">https://source.android.com/docs/security/bulletin/pixel/2022-12-01</a></p><p><a href="https://nvd.nist.gov/vuln/detail/CVE-2022-1887" rel="noopener noreferrer" target="_blank">https://nvd.nist.gov/vuln/detail/CVE-2022-1887</a></p><p><a href="https://www.mozilla.org/en-US/security/advisories/mfsa2022-23/" rel="noopener noreferrer" target="_blank">https://www.mozilla.org/en-US/security/advisories/mfsa2022-23/</a></p><p><a href="https://www.cisa.gov/uscert/ncas/bulletins/sb22-361#low" rel="noopener noreferrer" target="_blank">https://www.cisa.gov/uscert/ncas/bulletins/sb22-361</a></p><p><a href="https://www.cisa.gov/known-exploited-vulnerabilities-catalog" rel="noopener noreferrer" target="_blank">https://www.cisa.gov/known-exploited-vulnerabilities-catalog</a></p><p><a href="https://www.tibco.com/support/advisories/2018/04/tibco-security-advisory-april-17-2018-tibco-jasperreports-2018-5430" rel="noopener noreferrer" target="_blank">https://www.tibco.com/support/advisories/2018/04/tibco-security-advisory-april-17-2018-tibco-jasperreports-2018-5430</a></p><p><a href="https://www.tibco.com/support/advisories/2019/03/tibco-security-advisory-march-6-2019-tibco-jasperreports-library-2018-18809" rel="noopener noreferrer" target="_blank">https://www.tibco.com/support/advisories/2019/03/tibco-security-advisory-march-6-2019-tibco-jasperreports-library-2018-18809</a></p><p><br></p>]]></content:encoded><link><![CDATA[https://3zozb9fxlbueipjyapmaas.captivate.fm/episode/episode-47-its-5-05-tuesday-january-3-2023]]></link><guid isPermaLink="false">81b74ded-1054-4467-9e96-7c771ea2a1fc</guid><itunes:image href="https://artwork.captivate.fm/895b5073-a854-4764-9c7c-1ba2f22bee2b/_7UHtEc8sSgjVBAe7jpT7y-e.png"/><dc:creator><![CDATA[Contributors from Around the World]]></dc:creator><pubDate>Tue, 03 Jan 2023 16:45:00 -0400</pubDate><enclosure url="https://dts.podtrac.com/redirect.mp3/podcasts.captivate.fm/media/2aeedcd2-46ce-44d0-8636-cc7a81b331bb/2023-01-03-505-Episode-47-U-converted.mp3" length="11509458" type="audio/mpeg"/><itunes:duration>11:59</itunes:duration><itunes:explicit>false</itunes:explicit><itunes:episodeType>full</itunes:episodeType><itunes:season>1</itunes:season><itunes:episode>47</itunes:episode><itunes:season>1</itunes:season><podcast:episode>47</podcast:episode><podcast:season>1</podcast:season><itunes:author>Contributors from Around the World</itunes:author></item><item><title>Episode #46 - It&apos;s 5:05, Monday, January 2, 2023</title><itunes:title>Episode #46 - It&apos;s 5:05, Monday, January 2, 2023</itunes:title><description><![CDATA[<p><strong>It’s 5:05, Monday, January 2, 2023. </strong>From the Sourced Podcast Network in New York City, this is your host, Pokie Huang. Stories in today’s episode come from <strong>Edwin Kwan </strong>in Australia on PyTorch dependency confusion attack, <strong>Trac Bannon</strong> in Pennsylvania on office space inspired cyber theft, <strong>Olimpiu Pop </strong>in Romania on Linux Kernel vulnerability allows RCE on SMB3 servers.</p><p>Today’s episode begins with <strong>Katy Craig</strong> in California on smartphone sidechannel attack.&nbsp;</p><p>Let’s get to it!</p><p><strong>🇺🇸</strong> <strong>Katy Craig, San Diego, California</strong></p><p>Smartphone Sidechannel Attack</p><p><a href="https://arxiv.org/pdf/2212.12151.pdf" rel="noopener noreferrer" target="_blank">https://arxiv.org/pdf/2212.12151.pdf</a></p><p><strong>🇷🇴 Olimpiu Pop, Transylvania, Romania</strong></p><p>Linux Kernel Vulnerability Allows RC On SMB3 Servers</p><p><a href="https://www.zerodayinitiative.com/advisories/ZDI-22-1690/" rel="noopener noreferrer" target="_blank">https://www.zerodayinitiative.com/advisories/ZDI-22-1690/</a></p><p><a href="https://lore.kernel.org/lkml/62b2ab15-3675-71bf-2ea6-6376cd0b3b6c@linuxfoundation.org/" rel="noopener noreferrer" target="_blank">https://lore.kernel.org/lkml/62b2ab15-3675-71bf-2ea6-6376cd0b3b6c@linuxfoundation.org/</a></p><p><strong>🇺🇸</strong> <strong>Tracy (Trac) Bannon, Camp Hill, Pennsylvania</strong></p><p>Office Space Inspired Cyber Theft</p><p><a href="https://www.scribd.com/document/617139119/Ex-Zulily-engineer-charged-for-alleged-theft-scheme-inspired-by-Office-Space" rel="noopener noreferrer" target="_blank">https://www.scribd.com/document/617139119/Ex-Zulily-engineer-charged-for-alleged-theft-scheme-inspired-by-Office-Space</a></p><p><a href="https://www.cnn.com/2022/12/30/us/office-space-inspired-washington-software-engineer-thief/index.html" rel="noopener noreferrer" target="_blank">https://www.cnn.com/2022/12/30/us/office-space-inspired-washington-software-engineer-thief/index.html</a></p><p><strong>🇦🇺 Edwin Kwan, Sydney, Australia</strong></p><p>PyTorch Dependency Confusion Attack&nbsp;</p><p><a href="https://pytorch.org/blog/compromised-nightly-dependency/" rel="noopener noreferrer" target="_blank">https://pytorch.org/blog/compromised-nightly-dependency/</a></p><p><a href="https://www.bleepingcomputer.com/news/security/pytorch-discloses-malicious-dependency-chain-compromise-over-holidays/" rel="noopener noreferrer" target="_blank">https://www.bleepingcomputer.com/news/security/pytorch-discloses-malicious-dependency-chain-compromise-over-holidays/</a></p>]]></description><content:encoded><![CDATA[<p><strong>It’s 5:05, Monday, January 2, 2023. </strong>From the Sourced Podcast Network in New York City, this is your host, Pokie Huang. Stories in today’s episode come from <strong>Edwin Kwan </strong>in Australia on PyTorch dependency confusion attack, <strong>Trac Bannon</strong> in Pennsylvania on office space inspired cyber theft, <strong>Olimpiu Pop </strong>in Romania on Linux Kernel vulnerability allows RCE on SMB3 servers.</p><p>Today’s episode begins with <strong>Katy Craig</strong> in California on smartphone sidechannel attack.&nbsp;</p><p>Let’s get to it!</p><p><strong>🇺🇸</strong> <strong>Katy Craig, San Diego, California</strong></p><p>Smartphone Sidechannel Attack</p><p><a href="https://arxiv.org/pdf/2212.12151.pdf" rel="noopener noreferrer" target="_blank">https://arxiv.org/pdf/2212.12151.pdf</a></p><p><strong>🇷🇴 Olimpiu Pop, Transylvania, Romania</strong></p><p>Linux Kernel Vulnerability Allows RC On SMB3 Servers</p><p><a href="https://www.zerodayinitiative.com/advisories/ZDI-22-1690/" rel="noopener noreferrer" target="_blank">https://www.zerodayinitiative.com/advisories/ZDI-22-1690/</a></p><p><a href="https://lore.kernel.org/lkml/62b2ab15-3675-71bf-2ea6-6376cd0b3b6c@linuxfoundation.org/" rel="noopener noreferrer" target="_blank">https://lore.kernel.org/lkml/62b2ab15-3675-71bf-2ea6-6376cd0b3b6c@linuxfoundation.org/</a></p><p><strong>🇺🇸</strong> <strong>Tracy (Trac) Bannon, Camp Hill, Pennsylvania</strong></p><p>Office Space Inspired Cyber Theft</p><p><a href="https://www.scribd.com/document/617139119/Ex-Zulily-engineer-charged-for-alleged-theft-scheme-inspired-by-Office-Space" rel="noopener noreferrer" target="_blank">https://www.scribd.com/document/617139119/Ex-Zulily-engineer-charged-for-alleged-theft-scheme-inspired-by-Office-Space</a></p><p><a href="https://www.cnn.com/2022/12/30/us/office-space-inspired-washington-software-engineer-thief/index.html" rel="noopener noreferrer" target="_blank">https://www.cnn.com/2022/12/30/us/office-space-inspired-washington-software-engineer-thief/index.html</a></p><p><strong>🇦🇺 Edwin Kwan, Sydney, Australia</strong></p><p>PyTorch Dependency Confusion Attack&nbsp;</p><p><a href="https://pytorch.org/blog/compromised-nightly-dependency/" rel="noopener noreferrer" target="_blank">https://pytorch.org/blog/compromised-nightly-dependency/</a></p><p><a href="https://www.bleepingcomputer.com/news/security/pytorch-discloses-malicious-dependency-chain-compromise-over-holidays/" rel="noopener noreferrer" target="_blank">https://www.bleepingcomputer.com/news/security/pytorch-discloses-malicious-dependency-chain-compromise-over-holidays/</a></p>]]></content:encoded><link><![CDATA[https://3zozb9fxlbueipjyapmaas.captivate.fm/episode/episode-46-its-5-05-monday-january-2-2023]]></link><guid isPermaLink="false">c799c14c-122b-4897-8b40-be49425d0875</guid><itunes:image href="https://artwork.captivate.fm/e7fbfaac-9fbc-449a-a870-2c41c0f45ac2/vHTPuflwOnVn8w8oHHoPC8Sq.png"/><dc:creator><![CDATA[Contributors from Around the World]]></dc:creator><pubDate>Mon, 02 Jan 2023 16:45:00 -0400</pubDate><enclosure url="https://dts.podtrac.com/redirect.mp3/podcasts.captivate.fm/media/0d606aef-6664-45c8-a9a9-71d4e44249e2/2023-01-02-505-Episode-46-converted.mp3" length="8382287" type="audio/mpeg"/><itunes:duration>08:44</itunes:duration><itunes:explicit>false</itunes:explicit><itunes:episodeType>full</itunes:episodeType><itunes:season>1</itunes:season><itunes:episode>46</itunes:episode><itunes:season>1</itunes:season><podcast:episode>46</podcast:episode><podcast:season>1</podcast:season><itunes:author>Contributors from Around the World</itunes:author></item><item><title>Episode #45 - It&apos;s 5:05, Friday , December 30, 2022</title><itunes:title>Episode #45 - It&apos;s 5:05, Friday , December 30, 2022</itunes:title><description><![CDATA[<p><strong>It’s 5:05, Friday, December 30, 2022. </strong>From the Sourced Podcast Network in New York City, this is your host, Pokie Huang. Stories in today’s episode come from <strong>Olimpiu Pop </strong>in Romania on his part 4 of Ukraine cyber war analysis, <strong>Dan Whiting </strong>in Washington, DC, talks about how to keep your kids safe from connected toys, <strong>Edwin Kwan </strong>in Australia with a report on parental control apps come packaged with malware, <strong>Katy Craig</strong> in California on biometrics devices sold on eBay holds sensitive data, <strong>DJ Schleen</strong> in Colorado on the cyber criminals who aren’t bringing home the bacon anymore.</p><p>Today’s episode begins with <strong>Trac Bannon</strong> in Pennsylvania on ALERT: Github suffering from spamming surge.</p><p>Let’s get to it!</p><p><strong>🇺🇸</strong> <strong>Tracy (Trac) Bannon, Camp Hill, Pennsylvania</strong></p><p>ALERT: GitHub Suffering from Spamming Surge</p><p><a href="https://twitter.com/_JohnHammond/status/1608257989017993217" rel="noopener noreferrer" target="_blank">https://twitter.com/_JohnHammond/status/1608257989017993217</a></p><p><a href="https://github.com/uBlockOrigin/uAssets/discussions/14904#discussioncomment-4530059" rel="noopener noreferrer" target="_blank">https://github.com/uBlockOrigin/uAssets/discussions/14904#discussioncomment-4530059</a></p><p><a href="https://github.blog/" rel="noopener noreferrer" target="_blank">https://github.blog/</a></p><p><strong>🇺🇸</strong> <strong>DJ Schleen, Golden, Colorado</strong></p><p>The Cyber Criminals who aren't bringing home the bacon anymore</p><p><a href="https://nationaltoday.com/national-bacon-day/" rel="noopener noreferrer" target="_blank">https://nationaltoday.com/national-bacon-day/</a></p><p><a href="https://techcrunch.com/2022/12/30/meet-the-cybercriminals-2022/" rel="noopener noreferrer" target="_blank">https://techcrunch.com/2022/12/30/meet-the-cybercriminals-2022/</a></p><p><a href="https://www.cisa.gov/uscert/ncas/alerts/aa21-265a" rel="noopener noreferrer" target="_blank">https://www.cisa.gov/uscert/ncas/alerts/aa21-265a</a></p><p><strong>🇺🇸</strong> <strong>Katy Craig, San Diego, California</strong></p><p>Biometrics Device Sold on eBay Holds Sensitive Data</p><p><a href="https://www.msn.com/en-us/news/technology/biometric-devices-sold-on-ebay-reportedly-contained-sensitive-us-military-data/ar-AA15HCZG" rel="noopener noreferrer" target="_blank">https://www.msn.com/en-us/news/technology/biometric-devices-sold-on-ebay-reportedly-contained-sensitive-us-military-data/ar-AA15HCZG</a>&nbsp;</p><p><a href="https://www.nytimes.com/2022/12/27/technology/for-sale-on-ebay-a-military-database-of-fingerprints-and-iris-scans.html" rel="noopener noreferrer" target="_blank">https://www.nytimes.com/2022/12/27/technology/for-sale-on-ebay-a-military-database-of-fingerprints-and-iris-scans.html</a></p><p><strong>🇦🇺 Edwin Kwan, Sydney, Australia</strong></p><p>Parental Control Apps Come Packaged with Malware</p><p><a href="https://sec-consult.com/blog/detail/the-hidden-costs-of-parental-control-apps/" rel="noopener noreferrer" target="_blank">https://sec-consult.com/blog/detail/the-hidden-costs-of-parental-control-apps/</a></p><p><strong>🇺🇸</strong> <strong>Dan Whiting, Washington, DC</strong></p><p>Keep your kids safe from connected toys</p><p><a href="https://www.wired.com/story/how-to-set-up-kids-smart-toys/" rel="noopener noreferrer" target="_blank">https://www.wired.com/story/how-to-set-up-kids-smart-toys/</a></p><p><strong>🇷🇴 Olimpiu Pop, Transylvania, Romania</strong></p><p>Ukraine Cyber War Analysis Part 4 - Poisoned open-source repositories, weaponizing open-source software</p><p><a href="https://www.bleepingcomputer.com/news/security/big-sabotage-famous-npm-package-deletes-files-to-protest-ukraine-war/" rel="noopener noreferrer"...]]></description><content:encoded><![CDATA[<p><strong>It’s 5:05, Friday, December 30, 2022. </strong>From the Sourced Podcast Network in New York City, this is your host, Pokie Huang. Stories in today’s episode come from <strong>Olimpiu Pop </strong>in Romania on his part 4 of Ukraine cyber war analysis, <strong>Dan Whiting </strong>in Washington, DC, talks about how to keep your kids safe from connected toys, <strong>Edwin Kwan </strong>in Australia with a report on parental control apps come packaged with malware, <strong>Katy Craig</strong> in California on biometrics devices sold on eBay holds sensitive data, <strong>DJ Schleen</strong> in Colorado on the cyber criminals who aren’t bringing home the bacon anymore.</p><p>Today’s episode begins with <strong>Trac Bannon</strong> in Pennsylvania on ALERT: Github suffering from spamming surge.</p><p>Let’s get to it!</p><p><strong>🇺🇸</strong> <strong>Tracy (Trac) Bannon, Camp Hill, Pennsylvania</strong></p><p>ALERT: GitHub Suffering from Spamming Surge</p><p><a href="https://twitter.com/_JohnHammond/status/1608257989017993217" rel="noopener noreferrer" target="_blank">https://twitter.com/_JohnHammond/status/1608257989017993217</a></p><p><a href="https://github.com/uBlockOrigin/uAssets/discussions/14904#discussioncomment-4530059" rel="noopener noreferrer" target="_blank">https://github.com/uBlockOrigin/uAssets/discussions/14904#discussioncomment-4530059</a></p><p><a href="https://github.blog/" rel="noopener noreferrer" target="_blank">https://github.blog/</a></p><p><strong>🇺🇸</strong> <strong>DJ Schleen, Golden, Colorado</strong></p><p>The Cyber Criminals who aren't bringing home the bacon anymore</p><p><a href="https://nationaltoday.com/national-bacon-day/" rel="noopener noreferrer" target="_blank">https://nationaltoday.com/national-bacon-day/</a></p><p><a href="https://techcrunch.com/2022/12/30/meet-the-cybercriminals-2022/" rel="noopener noreferrer" target="_blank">https://techcrunch.com/2022/12/30/meet-the-cybercriminals-2022/</a></p><p><a href="https://www.cisa.gov/uscert/ncas/alerts/aa21-265a" rel="noopener noreferrer" target="_blank">https://www.cisa.gov/uscert/ncas/alerts/aa21-265a</a></p><p><strong>🇺🇸</strong> <strong>Katy Craig, San Diego, California</strong></p><p>Biometrics Device Sold on eBay Holds Sensitive Data</p><p><a href="https://www.msn.com/en-us/news/technology/biometric-devices-sold-on-ebay-reportedly-contained-sensitive-us-military-data/ar-AA15HCZG" rel="noopener noreferrer" target="_blank">https://www.msn.com/en-us/news/technology/biometric-devices-sold-on-ebay-reportedly-contained-sensitive-us-military-data/ar-AA15HCZG</a>&nbsp;</p><p><a href="https://www.nytimes.com/2022/12/27/technology/for-sale-on-ebay-a-military-database-of-fingerprints-and-iris-scans.html" rel="noopener noreferrer" target="_blank">https://www.nytimes.com/2022/12/27/technology/for-sale-on-ebay-a-military-database-of-fingerprints-and-iris-scans.html</a></p><p><strong>🇦🇺 Edwin Kwan, Sydney, Australia</strong></p><p>Parental Control Apps Come Packaged with Malware</p><p><a href="https://sec-consult.com/blog/detail/the-hidden-costs-of-parental-control-apps/" rel="noopener noreferrer" target="_blank">https://sec-consult.com/blog/detail/the-hidden-costs-of-parental-control-apps/</a></p><p><strong>🇺🇸</strong> <strong>Dan Whiting, Washington, DC</strong></p><p>Keep your kids safe from connected toys</p><p><a href="https://www.wired.com/story/how-to-set-up-kids-smart-toys/" rel="noopener noreferrer" target="_blank">https://www.wired.com/story/how-to-set-up-kids-smart-toys/</a></p><p><strong>🇷🇴 Olimpiu Pop, Transylvania, Romania</strong></p><p>Ukraine Cyber War Analysis Part 4 - Poisoned open-source repositories, weaponizing open-source software</p><p><a href="https://www.bleepingcomputer.com/news/security/big-sabotage-famous-npm-package-deletes-files-to-protest-ukraine-war/" rel="noopener noreferrer" target="_blank">https://www.bleepingcomputer.com/news/security/big-sabotage-famous-npm-package-deletes-files-to-protest-ukraine-war/</a></p><p><a href="https://github.com/RIAEvangelist/peacenotwar/blob/main/WITH-LOVE-FROM-AMERICA.txt" rel="noopener noreferrer" target="_blank">https://github.com/RIAEvangelist/peacenotwar/blob/main/WITH-LOVE-FROM-AMERICA.txt</a></p><p><a href="https://securelist.com/reassessing-cyberwarfare-lessons-learned-in-2022/108328/" rel="noopener noreferrer" target="_blank">https://securelist.com/reassessing-cyberwarfare-lessons-learned-in-2022/108328/</a></p>]]></content:encoded><link><![CDATA[https://3zozb9fxlbueipjyapmaas.captivate.fm/episode/episode-45-its-5-05-friday-december-30-2022]]></link><guid isPermaLink="false">fa8c7a09-17cc-404a-9bac-21d7eb713a20</guid><itunes:image href="https://artwork.captivate.fm/8a8629cf-1366-43cb-a1ce-ea25affa9ea1/EwIjlM2_TqQpVnS-Wz8aYLBV.png"/><dc:creator><![CDATA[Contributors from Around the World]]></dc:creator><pubDate>Fri, 30 Dec 2022 16:45:00 -0400</pubDate><enclosure url="https://dts.podtrac.com/redirect.mp3/podcasts.captivate.fm/media/499a22d9-3739-4566-b1d2-e86b70e9355a/2022-12-30-505-Episode-45-lastest-updated-converted.mp3" length="10761311" type="audio/mpeg"/><itunes:duration>11:13</itunes:duration><itunes:explicit>false</itunes:explicit><itunes:episodeType>full</itunes:episodeType><itunes:season>1</itunes:season><itunes:episode>45</itunes:episode><itunes:season>1</itunes:season><podcast:episode>45</podcast:episode><podcast:season>1</podcast:season><itunes:author>Contributors from Around the World</itunes:author></item><item><title>Episode #44 - It&apos;s 5:05, Thursday, December 29, 2022</title><itunes:title>Episode #44 - It&apos;s 5:05, Thursday, December 29, 2022</itunes:title><description><![CDATA[<p><strong>It’s 5:05, Thursday, December 29, 2022. </strong>From the Sourced Podcast Network in New York City, this is your host, Pokie Huang. Stories in today’s episode come from <strong>Katy Craig </strong>in California with an update on Meta &amp; Cambridge Analytica, <strong>DJ Schleen </strong>in Colorado on punt the AI and just write the code yourself,<strong>Olimpiu Pop</strong> in Romania with his part 3 of Ukraine Cyber War analysis, <strong>Edwin Kwan </strong>in Australia on cyber attack on Australian universities.</p><p>Let’s get to it!</p><p><br></p><p><strong><span class="ql-cursor">﻿</span>🇺🇸</strong> <strong>Katy Craig, San Diego, California</strong></p><p>Update on Meta &amp; Cambridge Analytica</p><p><a href="https://fingfx.thomsonreuters.com/gfx/legaldocs/gkplwwkebvb/12232022facebook_settle.pdf" rel="noopener noreferrer" target="_blank">https://fingfx.thomsonreuters.com/gfx/legaldocs/gkplwwkebvb/12232022facebook_settle.pdf</a></p><p><a href="https://www.netflix.com/title/80117542" rel="noopener noreferrer" target="_blank">https://www.netflix.com/title/80117542</a>&nbsp;</p><p><a href="https://www.bbc.com/news/technology-64075067?zephr-modal-register" rel="noopener noreferrer" target="_blank">https://www.bbc.com/news/technology-64075067?zephr-modal-register</a></p><p><strong>🇺🇸</strong> <strong>DJ Schleen, Golden, Colorado</strong></p><p>Punt the AI and just write the code yourself</p><p><a href="https://techcrunch.com/2022/12/28/code-generating-ai-can-introduce-security-vulnerabilities-study-finds/" rel="noopener noreferrer" target="_blank">https://techcrunch.com/2022/12/28/code-generating-ai-can-introduce-security-vulnerabilities-study-finds/</a></p><p><a href="https://beta.openai.com/docs/guides/code" rel="noopener noreferrer" target="_blank">https://beta.openai.com/docs/guides/code</a></p><p><a href="https://nypost.com/2022/12/26/students-using-chatgpt-to-cheat-professor-warns/" rel="noopener noreferrer" target="_blank">https://nypost.com/2022/12/26/students-using-chatgpt-to-cheat-professor-warns/</a></p><p><a href="https://beta.openai.com/docs/guides/safety-best-practices" rel="noopener noreferrer" target="_blank">https://beta.openai.com/docs/guides/safety-best-practices</a></p><p><strong>🇷🇴 Olimpiu Pop, Transylvania, Romania</strong></p><p>Ukraine Cyber War Analysis Part 3 - Taking sides</p><p><a href="https://journals.sagepub.com/doi/full/10.1177/00027642221118264" rel="noopener noreferrer" target="_blank">https://journals.sagepub.com/doi/full/10.1177/00027642221118264</a></p><p><a href="https://securelist.com/reassessing-cyberwarfare-lessons-learned-in-2022/108328/" rel="noopener noreferrer" target="_blank">https://securelist.com/reassessing-cyberwarfare-lessons-learned-in-2022/108328/</a></p><p><a href="https://mobile.twitter.com/cpartisans" rel="noopener noreferrer" target="_blank">https://mobile.twitter.com/cpartisans</a></p><p><a href="https://www.msn.com/en-us/news/world/anonymous-declares-cyber-war-against-pro-russian-hacker-group-killnet/ar-AAXClKn" rel="noopener noreferrer" target="_blank">https://www.msn.com/en-us/news/world/anonymous-declares-cyber-war-against-pro-russian-hacker-group-killnet/ar-AAXClKn</a></p><p><a href="https://securityaffairs.co/wordpress/138906/hacktivism/killnet-ddos-european-parliament.html" rel="noopener noreferrer" target="_blank">https://securityaffairs.co/wordpress/138906/hacktivism/killnet-ddos-european-parliament.html</a></p><p><strong>🇦🇺 Edwin Kwan, Sydney, Australia</strong></p><p>Cyber Attack on Australian Universities</p><p><a href="https://www.msn.com/en-au/news/australia/queensland-university-of-technology-shuts-it-systems-after-being-hit-by-ransomware-attack/ar-AA15ymSq" rel="noopener noreferrer" target="_blank">https://www.msn.com/en-au/news/australia/queensland-university-of-technology-shuts-it-systems-after-being-hit-by-ransomware-attack/ar-AA15ymSq</a></p><p><br></p>]]></description><content:encoded><![CDATA[<p><strong>It’s 5:05, Thursday, December 29, 2022. </strong>From the Sourced Podcast Network in New York City, this is your host, Pokie Huang. Stories in today’s episode come from <strong>Katy Craig </strong>in California with an update on Meta &amp; Cambridge Analytica, <strong>DJ Schleen </strong>in Colorado on punt the AI and just write the code yourself,<strong>Olimpiu Pop</strong> in Romania with his part 3 of Ukraine Cyber War analysis, <strong>Edwin Kwan </strong>in Australia on cyber attack on Australian universities.</p><p>Let’s get to it!</p><p><br></p><p><strong><span class="ql-cursor">﻿</span>🇺🇸</strong> <strong>Katy Craig, San Diego, California</strong></p><p>Update on Meta &amp; Cambridge Analytica</p><p><a href="https://fingfx.thomsonreuters.com/gfx/legaldocs/gkplwwkebvb/12232022facebook_settle.pdf" rel="noopener noreferrer" target="_blank">https://fingfx.thomsonreuters.com/gfx/legaldocs/gkplwwkebvb/12232022facebook_settle.pdf</a></p><p><a href="https://www.netflix.com/title/80117542" rel="noopener noreferrer" target="_blank">https://www.netflix.com/title/80117542</a>&nbsp;</p><p><a href="https://www.bbc.com/news/technology-64075067?zephr-modal-register" rel="noopener noreferrer" target="_blank">https://www.bbc.com/news/technology-64075067?zephr-modal-register</a></p><p><strong>🇺🇸</strong> <strong>DJ Schleen, Golden, Colorado</strong></p><p>Punt the AI and just write the code yourself</p><p><a href="https://techcrunch.com/2022/12/28/code-generating-ai-can-introduce-security-vulnerabilities-study-finds/" rel="noopener noreferrer" target="_blank">https://techcrunch.com/2022/12/28/code-generating-ai-can-introduce-security-vulnerabilities-study-finds/</a></p><p><a href="https://beta.openai.com/docs/guides/code" rel="noopener noreferrer" target="_blank">https://beta.openai.com/docs/guides/code</a></p><p><a href="https://nypost.com/2022/12/26/students-using-chatgpt-to-cheat-professor-warns/" rel="noopener noreferrer" target="_blank">https://nypost.com/2022/12/26/students-using-chatgpt-to-cheat-professor-warns/</a></p><p><a href="https://beta.openai.com/docs/guides/safety-best-practices" rel="noopener noreferrer" target="_blank">https://beta.openai.com/docs/guides/safety-best-practices</a></p><p><strong>🇷🇴 Olimpiu Pop, Transylvania, Romania</strong></p><p>Ukraine Cyber War Analysis Part 3 - Taking sides</p><p><a href="https://journals.sagepub.com/doi/full/10.1177/00027642221118264" rel="noopener noreferrer" target="_blank">https://journals.sagepub.com/doi/full/10.1177/00027642221118264</a></p><p><a href="https://securelist.com/reassessing-cyberwarfare-lessons-learned-in-2022/108328/" rel="noopener noreferrer" target="_blank">https://securelist.com/reassessing-cyberwarfare-lessons-learned-in-2022/108328/</a></p><p><a href="https://mobile.twitter.com/cpartisans" rel="noopener noreferrer" target="_blank">https://mobile.twitter.com/cpartisans</a></p><p><a href="https://www.msn.com/en-us/news/world/anonymous-declares-cyber-war-against-pro-russian-hacker-group-killnet/ar-AAXClKn" rel="noopener noreferrer" target="_blank">https://www.msn.com/en-us/news/world/anonymous-declares-cyber-war-against-pro-russian-hacker-group-killnet/ar-AAXClKn</a></p><p><a href="https://securityaffairs.co/wordpress/138906/hacktivism/killnet-ddos-european-parliament.html" rel="noopener noreferrer" target="_blank">https://securityaffairs.co/wordpress/138906/hacktivism/killnet-ddos-european-parliament.html</a></p><p><strong>🇦🇺 Edwin Kwan, Sydney, Australia</strong></p><p>Cyber Attack on Australian Universities</p><p><a href="https://www.msn.com/en-au/news/australia/queensland-university-of-technology-shuts-it-systems-after-being-hit-by-ransomware-attack/ar-AA15ymSq" rel="noopener noreferrer" target="_blank">https://www.msn.com/en-au/news/australia/queensland-university-of-technology-shuts-it-systems-after-being-hit-by-ransomware-attack/ar-AA15ymSq</a></p><p><br></p>]]></content:encoded><link><![CDATA[https://3zozb9fxlbueipjyapmaas.captivate.fm/episode/episode-44-its-5-05-thursday-december-29-2022]]></link><guid isPermaLink="false">b59f0914-a7b3-4469-8cc4-6ba12c87da94</guid><itunes:image href="https://artwork.captivate.fm/93f5c120-5d9c-4672-a63a-4347344c4d43/zdadeUZ94pVo4akaEFs9bzbj.png"/><dc:creator><![CDATA[Contributors from Around the World]]></dc:creator><pubDate>Thu, 29 Dec 2022 16:45:00 -0400</pubDate><enclosure url="https://dts.podtrac.com/redirect.mp3/podcasts.captivate.fm/media/8ca93fd4-87a0-4382-b4a5-d8dabeba3947/2022-12-29-505-Episode-44-converted.mp3" length="9060635" type="audio/mpeg"/><itunes:duration>09:26</itunes:duration><itunes:explicit>false</itunes:explicit><itunes:episodeType>full</itunes:episodeType><itunes:season>1</itunes:season><itunes:episode>44</itunes:episode><itunes:season>1</itunes:season><podcast:episode>44</podcast:episode><podcast:season>1</podcast:season><itunes:author>Contributors from Around the World</itunes:author></item><item><title>Episode #43 - It&apos;s 5:05, Wednesday, December 28, 2022</title><itunes:title>Episode #43 - It&apos;s 5:05, Wednesday, December 28, 2022</itunes:title><description><![CDATA[<p><strong>It’s 5:05, Wednesday, December 28, 2022. </strong>From the Sourced Podcast Network in New York City, this is your host, Pokie Huang. Stories in today’s episode come from <strong>Edwin Kwan </strong>in Australia<strong> </strong>on Guardian newspaper hit by ransomware attack, <strong>Trac Bannon </strong>in Pennsylvania on imposter SDK found in Python repository, <strong>Katy Craig </strong>in California on Amazon Prime Air, <strong>Dan Whiting</strong> in Washington, DC on TikTok ban.</p><p>Today’s episode begins with <strong>Olimpiu Pop</strong> in Romania on part two of Ukraine cyber war events.&nbsp;&nbsp;</p><p>Let’s get to it!</p><p><strong><span class="ql-cursor">﻿</span>🇷🇴 Olimpiu Pop, Transylvania, Romania</strong></p><p>Ukraine Cyber War Analysis - Part 2</p><p><a href="https://en.wikipedia.org/wiki/Dragobete" rel="noopener noreferrer" target="_blank">https://en.wikipedia.org/wiki/Dragobete</a></p><p><a href="https://twitter.com/netblocks/status/1498365220107997191?ref_src=twsrc%5Etfw%7Ctwcamp%5Etweetembed%7Ctwterm%5E1498365220107997191%7Ctwgr%5E%7Ctwcon%5Es1_&amp;ref_url=https%3A%2F%2Fnetblocks.org%2Freports%2Finternet-disruptions-registered-as-russia-moves-in-on-ukraine-W80p4k8K" rel="noopener noreferrer" target="_blank">https://twitter.com/netblocks/status/1498365220107997191?ref_src=twsrc%5Etfw%7Ctwcamp%5Etweetembed%7Ctwterm%5E1498365220107997191%7Ctwgr%5E%7Ctwcon%5Es1_&amp;ref_url=https%3A%2F%2Fnetblocks.org%2Freports%2Finternet-disruptions-registered-as-russia-moves-in-on-ukraine-W80p4k8K</a></p><p><a href="https://www.reuters.com/business/energy/satellite-outage-knocks-out-control-enercon-wind-turbines-2022-02-28/" rel="noopener noreferrer" target="_blank">https://www.reuters.com/business/energy/satellite-outage-knocks-out-control-enercon-wind-turbines-2022-02-28/</a></p><p><a href="https://novayagazeta.ru/articles/2022/02/24/my-budem-stremitsia-k-demilitarizatsii-i-denatsifikatsii-ukrainy-putin-obiavil-o-nachale-spetsoperatsii-v-ukraine-news" rel="noopener noreferrer" target="_blank">https://novayagazeta.ru/articles/2022/02/24/my-budem-stremitsia-k-demilitarizatsii-i-denatsifikatsii-ukrainy-putin-obiavil-o-nachale-spetsoperatsii-v-ukraine-news</a></p><p><a href="https://web.archive.org/web/20220313011410/https:/prozorro.gov.ua/tender/UA-2020-12-23-008256-c" rel="noopener noreferrer" target="_blank">https://web.archive.org/web/20220313011410/https:/prozorro.gov.ua/tender/UA-2020-12-23-008256-c</a></p><p><a href="https://www.viasat.com/space-innovation/satellite-fleet/ka-sat/" rel="noopener noreferrer" target="_blank">https://www.viasat.com/space-innovation/satellite-fleet/ka-sat/</a></p><p><a href="https://news.viasat.com/blog/corporate/ka-sat-network-cyber-attack-overview" rel="noopener noreferrer" target="_blank">https://news.viasat.com/blog/corporate/ka-sat-network-cyber-attack-overview</a></p><p><a href="https://www.viasat.com/space-innovation/satellite-fleet/ka-sat/" rel="noopener noreferrer" target="_blank">https://www.viasat.com/space-innovation/satellite-fleet/ka-sat/</a></p><p><a href="https://news.viasat.com/blog/corporate/ka-sat-network-cyber-attack-overview" rel="noopener noreferrer" target="_blank">https://news.viasat.com/blog/corporate/ka-sat-network-cyber-attack-overview</a></p><p><a href="https://www.sentinelone.com/labs/acidrain-a-modem-wiper-rains-down-on-europe/" rel="noopener noreferrer" target="_blank">https://www.sentinelone.com/labs/acidrain-a-modem-wiper-rains-down-on-europe/</a></p><p><a href="https://www.govinfo.gov/content/pkg/CRPT-117srpt122/html/CRPT-117srpt122.htm" rel="noopener noreferrer" target="_blank">https://www.govinfo.gov/content/pkg/CRPT-117srpt122/html/CRPT-117srpt122.htm</a></p><p><strong>🇺🇸</strong> <strong>Dan Whiting, Washington, DC</strong></p><p>TikTok Ban</p><p><a href="https://www.forbes.com/sites/emilybaker-white/2022/12/22/tiktok-tracks-forbes-journalists-bytedance" rel="noopener noreferrer"...]]></description><content:encoded><![CDATA[<p><strong>It’s 5:05, Wednesday, December 28, 2022. </strong>From the Sourced Podcast Network in New York City, this is your host, Pokie Huang. Stories in today’s episode come from <strong>Edwin Kwan </strong>in Australia<strong> </strong>on Guardian newspaper hit by ransomware attack, <strong>Trac Bannon </strong>in Pennsylvania on imposter SDK found in Python repository, <strong>Katy Craig </strong>in California on Amazon Prime Air, <strong>Dan Whiting</strong> in Washington, DC on TikTok ban.</p><p>Today’s episode begins with <strong>Olimpiu Pop</strong> in Romania on part two of Ukraine cyber war events.&nbsp;&nbsp;</p><p>Let’s get to it!</p><p><strong><span class="ql-cursor">﻿</span>🇷🇴 Olimpiu Pop, Transylvania, Romania</strong></p><p>Ukraine Cyber War Analysis - Part 2</p><p><a href="https://en.wikipedia.org/wiki/Dragobete" rel="noopener noreferrer" target="_blank">https://en.wikipedia.org/wiki/Dragobete</a></p><p><a href="https://twitter.com/netblocks/status/1498365220107997191?ref_src=twsrc%5Etfw%7Ctwcamp%5Etweetembed%7Ctwterm%5E1498365220107997191%7Ctwgr%5E%7Ctwcon%5Es1_&amp;ref_url=https%3A%2F%2Fnetblocks.org%2Freports%2Finternet-disruptions-registered-as-russia-moves-in-on-ukraine-W80p4k8K" rel="noopener noreferrer" target="_blank">https://twitter.com/netblocks/status/1498365220107997191?ref_src=twsrc%5Etfw%7Ctwcamp%5Etweetembed%7Ctwterm%5E1498365220107997191%7Ctwgr%5E%7Ctwcon%5Es1_&amp;ref_url=https%3A%2F%2Fnetblocks.org%2Freports%2Finternet-disruptions-registered-as-russia-moves-in-on-ukraine-W80p4k8K</a></p><p><a href="https://www.reuters.com/business/energy/satellite-outage-knocks-out-control-enercon-wind-turbines-2022-02-28/" rel="noopener noreferrer" target="_blank">https://www.reuters.com/business/energy/satellite-outage-knocks-out-control-enercon-wind-turbines-2022-02-28/</a></p><p><a href="https://novayagazeta.ru/articles/2022/02/24/my-budem-stremitsia-k-demilitarizatsii-i-denatsifikatsii-ukrainy-putin-obiavil-o-nachale-spetsoperatsii-v-ukraine-news" rel="noopener noreferrer" target="_blank">https://novayagazeta.ru/articles/2022/02/24/my-budem-stremitsia-k-demilitarizatsii-i-denatsifikatsii-ukrainy-putin-obiavil-o-nachale-spetsoperatsii-v-ukraine-news</a></p><p><a href="https://web.archive.org/web/20220313011410/https:/prozorro.gov.ua/tender/UA-2020-12-23-008256-c" rel="noopener noreferrer" target="_blank">https://web.archive.org/web/20220313011410/https:/prozorro.gov.ua/tender/UA-2020-12-23-008256-c</a></p><p><a href="https://www.viasat.com/space-innovation/satellite-fleet/ka-sat/" rel="noopener noreferrer" target="_blank">https://www.viasat.com/space-innovation/satellite-fleet/ka-sat/</a></p><p><a href="https://news.viasat.com/blog/corporate/ka-sat-network-cyber-attack-overview" rel="noopener noreferrer" target="_blank">https://news.viasat.com/blog/corporate/ka-sat-network-cyber-attack-overview</a></p><p><a href="https://www.viasat.com/space-innovation/satellite-fleet/ka-sat/" rel="noopener noreferrer" target="_blank">https://www.viasat.com/space-innovation/satellite-fleet/ka-sat/</a></p><p><a href="https://news.viasat.com/blog/corporate/ka-sat-network-cyber-attack-overview" rel="noopener noreferrer" target="_blank">https://news.viasat.com/blog/corporate/ka-sat-network-cyber-attack-overview</a></p><p><a href="https://www.sentinelone.com/labs/acidrain-a-modem-wiper-rains-down-on-europe/" rel="noopener noreferrer" target="_blank">https://www.sentinelone.com/labs/acidrain-a-modem-wiper-rains-down-on-europe/</a></p><p><a href="https://www.govinfo.gov/content/pkg/CRPT-117srpt122/html/CRPT-117srpt122.htm" rel="noopener noreferrer" target="_blank">https://www.govinfo.gov/content/pkg/CRPT-117srpt122/html/CRPT-117srpt122.htm</a></p><p><strong>🇺🇸</strong> <strong>Dan Whiting, Washington, DC</strong></p><p>TikTok Ban</p><p><a href="https://www.forbes.com/sites/emilybaker-white/2022/12/22/tiktok-tracks-forbes-journalists-bytedance" rel="noopener noreferrer" target="_blank">https://www.forbes.com/sites/emilybaker-white/2022/12/22/tiktok-tracks-forbes-journalists-bytedance</a></p><p><a href="https://www.washingtonpost.com/technology/2022/12/22/tiktoks-chinese-owner-fires-workers-who-gathered-data-journalists/" rel="noopener noreferrer" target="_blank">https://www.washingtonpost.com/technology/2022/12/22/tiktoks-chinese-owner-fires-workers-who-gathered-data-journalists/</a></p><p><a href="https://www.nytimes.com/2022/12/22/technology/byte-dance-tik-tok-internal-investigation.html" rel="noopener noreferrer" target="_blank">https://www.nytimes.com/2022/12/22/technology/byte-dance-tik-tok-internal-investigation.html</a></p><p><strong>🇺🇸</strong> <strong>Katy Craig, San Diego, California</strong></p><p>Amazon Prime Air</p><p>https://fox40.com/news/local-news/lockeford-california-prime-air-amazon-delivery-drones/</p><p>https://thehill.com/homenews/3786630-amazon-begins-drone-deliveries-in-2-u-s-cities/</p><p><strong>🇺🇸</strong> <strong>Tracy (Trac) Bannon, Camp Hill, Pennsylvania</strong></p><p>Imposter SDK Found in Python Repository</p><p><a href="https://www.reversinglabs.com/blog/sentinelsneak-malicious-pypi-module-poses-as-security-sdk" rel="noopener noreferrer" target="_blank">https://www.reversinglabs.com/blog/sentinelsneak-malicious-pypi-module-poses-as-security-sdk</a>&nbsp;</p><p><a href="https://www.reversinglabs.com/blog/the-state-of-software-supply-chain-security" rel="noopener noreferrer" target="_blank">https://www.reversinglabs.com/blog/the-state-of-software-supply-chain-security</a></p><p><a href="https://thehackernews.com/2022/12/researchers-discover-malicious-pypi.html" rel="noopener noreferrer" target="_blank">https://thehackernews.com/2022/12/researchers-discover-</a></p><p><a href="https://thehackernews.com/2022/12/researchers-discover-malicious-pypi.html" rel="noopener noreferrer" target="_blank">Malicious-pypi.html</a></p><p><strong>🇦🇺 Edwin Kwan, Sydney, Australia</strong></p><p>Guardian Newspaper Hit by Ransomware Attack</p><p>https://www.theguardian.com/media/2022/dec/21/guardian-hit-by-serious-it-incident-believed-to-be-ransomware-attack</p><p><br></p>]]></content:encoded><link><![CDATA[https://3zozb9fxlbueipjyapmaas.captivate.fm/episode/episode-43-its-5-05-wednesday-december-28-2022]]></link><guid isPermaLink="false">3cfd046c-1094-42d6-8a92-9ca176406d83</guid><itunes:image href="https://artwork.captivate.fm/37a67bc5-2b09-47e3-aa0e-f2cf2bc8b332/pYlsxbhAH21AvmGFAggBP_mN.png"/><dc:creator><![CDATA[Contributors from Around the World]]></dc:creator><pubDate>Wed, 28 Dec 2022 16:45:00 -0400</pubDate><enclosure url="https://dts.podtrac.com/redirect.mp3/podcasts.captivate.fm/media/c49e3456-9907-4081-aabe-fccf1cd3b038/2022-12-28-505-Episode-43-converted.mp3" length="9463095" type="audio/mpeg"/><itunes:duration>09:51</itunes:duration><itunes:explicit>false</itunes:explicit><itunes:episodeType>full</itunes:episodeType><itunes:season>1</itunes:season><itunes:episode>43</itunes:episode><itunes:season>1</itunes:season><podcast:episode>43</podcast:episode><podcast:season>1</podcast:season><itunes:author>Contributors from Around the World</itunes:author></item><item><title>Episode #42 - It&apos;s 5:05, Tuesday, December 27, 2022</title><itunes:title>Episode #42 - It&apos;s 5:05, Tuesday, December 27, 2022</itunes:title><description><![CDATA[<p><strong>It’s 5:05, Tuesday, December 27, 2022. </strong>From the Sourced Podcast Network in New York City, this is your host, Pokie Huang. Stories in today’s episode come from <strong>Katy Craig in California </strong>on don’t give up your data, <strong>Edwin Kwan </strong>in Australia on Github to require 2FA for all users by the end of 2023, <strong>DJ Schleen </strong>&nbsp;in Colorado on dust of the security crystal ball, it’s almost 2023.</p><p>Today’s episode begins our Executive Producer <strong>Mark Miller</strong> in New York City on the LastPass story isn’t getting any better.</p><p>Let’s get to it!</p><p><strong>🇺🇸</strong> <strong>Mark Miller, New York City</strong></p><p>The LastPass story isn’t getting any better</p><p>LastPass: Notice of Recent Security Incident</p><p><a href="https://blog.lastpass.com/2022/12/notice-of-recent-security-incident/" rel="noopener noreferrer" target="_blank">https://blog.lastpass.com/2022/12/notice-of-recent-security-incident/</a></p><p>What’s in a PR statement: LastPass breach explained</p><p><a href="https://palant.info/2022/12/26/whats-in-a-pr-statement-lastpass-breach-explained/" rel="noopener noreferrer" target="_blank">https://palant.info/2022/12/26/whats-in-a-pr-statement-lastpass-breach-explained/</a></p><p>Wladimir Palant: Who I Am</p><p><a href="https://palant.info/about/" rel="noopener noreferrer" target="_blank">https://palant.info/about/</a></p><p><strong>🇺🇸</strong> <strong>Katy Craig, San Diego, California</strong></p><p>Don’t Give Up Your Data</p><p><a href="https://epic.org/issues/consumer-privacy/data-brokers/" rel="noopener noreferrer" target="_blank">https://epic.org/issues/consumer-privacy/data-brokers/</a></p><p><a href="https://www.politico.com/news/2022/12/21/data-brokers-privacy-federal-government-00072600" rel="noopener noreferrer" target="_blank">https://www.politico.com/news/2022/12/21/data-brokers-privacy-federal-government-00072600</a> </p><p><strong>🇦🇺 Edwin Kwan, Sydney, Australia</strong></p><p>GitHub to require 2FA for all user by end of 2023</p><p>https://www.bleepingcomputer.com/news/security/github-to-require-all-users-to-enable-2fa-by-the-end-of-2023/</p><p><strong>🇺🇸</strong> <strong>DJ Schleen, Golden, Colorado</strong></p><p>Dust off the Security Crystal Ball, its almost 2023</p><p><a href="https://securityboulevard-com.cdn.ampproject.org/c/s/securityboulevard.com/2022/12/here-comes-2023-rezilions-security-predictions/amp/" rel="noopener noreferrer" target="_blank">https://securityboulevard-com.cdn.ampproject.org/c/s/securityboulevard.com/2022/12/here-comes-2023-rezilions-security-predictions/amp/</a></p>]]></description><content:encoded><![CDATA[<p><strong>It’s 5:05, Tuesday, December 27, 2022. </strong>From the Sourced Podcast Network in New York City, this is your host, Pokie Huang. Stories in today’s episode come from <strong>Katy Craig in California </strong>on don’t give up your data, <strong>Edwin Kwan </strong>in Australia on Github to require 2FA for all users by the end of 2023, <strong>DJ Schleen </strong>&nbsp;in Colorado on dust of the security crystal ball, it’s almost 2023.</p><p>Today’s episode begins our Executive Producer <strong>Mark Miller</strong> in New York City on the LastPass story isn’t getting any better.</p><p>Let’s get to it!</p><p><strong>🇺🇸</strong> <strong>Mark Miller, New York City</strong></p><p>The LastPass story isn’t getting any better</p><p>LastPass: Notice of Recent Security Incident</p><p><a href="https://blog.lastpass.com/2022/12/notice-of-recent-security-incident/" rel="noopener noreferrer" target="_blank">https://blog.lastpass.com/2022/12/notice-of-recent-security-incident/</a></p><p>What’s in a PR statement: LastPass breach explained</p><p><a href="https://palant.info/2022/12/26/whats-in-a-pr-statement-lastpass-breach-explained/" rel="noopener noreferrer" target="_blank">https://palant.info/2022/12/26/whats-in-a-pr-statement-lastpass-breach-explained/</a></p><p>Wladimir Palant: Who I Am</p><p><a href="https://palant.info/about/" rel="noopener noreferrer" target="_blank">https://palant.info/about/</a></p><p><strong>🇺🇸</strong> <strong>Katy Craig, San Diego, California</strong></p><p>Don’t Give Up Your Data</p><p><a href="https://epic.org/issues/consumer-privacy/data-brokers/" rel="noopener noreferrer" target="_blank">https://epic.org/issues/consumer-privacy/data-brokers/</a></p><p><a href="https://www.politico.com/news/2022/12/21/data-brokers-privacy-federal-government-00072600" rel="noopener noreferrer" target="_blank">https://www.politico.com/news/2022/12/21/data-brokers-privacy-federal-government-00072600</a> </p><p><strong>🇦🇺 Edwin Kwan, Sydney, Australia</strong></p><p>GitHub to require 2FA for all user by end of 2023</p><p>https://www.bleepingcomputer.com/news/security/github-to-require-all-users-to-enable-2fa-by-the-end-of-2023/</p><p><strong>🇺🇸</strong> <strong>DJ Schleen, Golden, Colorado</strong></p><p>Dust off the Security Crystal Ball, its almost 2023</p><p><a href="https://securityboulevard-com.cdn.ampproject.org/c/s/securityboulevard.com/2022/12/here-comes-2023-rezilions-security-predictions/amp/" rel="noopener noreferrer" target="_blank">https://securityboulevard-com.cdn.ampproject.org/c/s/securityboulevard.com/2022/12/here-comes-2023-rezilions-security-predictions/amp/</a></p>]]></content:encoded><link><![CDATA[https://3zozb9fxlbueipjyapmaas.captivate.fm/episode/episode-42-its-5-05-tuesday-december-27-2022]]></link><guid isPermaLink="false">4ca4c4cd-b565-4eb3-9364-53aa94258ee0</guid><itunes:image href="https://artwork.captivate.fm/55384c9b-58ca-47d5-ad13-701c1f52c8d5/wztk85VO74V0k96vIoyONQ1w.png"/><dc:creator><![CDATA[Contributors from Around the World]]></dc:creator><pubDate>Tue, 27 Dec 2022 16:45:00 -0400</pubDate><enclosure url="https://dts.podtrac.com/redirect.mp3/podcasts.captivate.fm/media/437f927d-5fd1-49c8-845e-e20d27e180b6/2022-12-27-505-Episode-42-converted.mp3" length="9634041" type="audio/mpeg"/><itunes:duration>10:02</itunes:duration><itunes:explicit>false</itunes:explicit><itunes:episodeType>full</itunes:episodeType><itunes:season>1</itunes:season><itunes:episode>42</itunes:episode><itunes:season>1</itunes:season><podcast:episode>42</podcast:episode><podcast:season>1</podcast:season><itunes:author>Contributors from Around the World</itunes:author></item><item><title>Episode #41 - It&apos;s 5:05, Monday, December 26, 2022</title><itunes:title>Episode #41 - It&apos;s 5:05, Monday, December 26, 2022</itunes:title><description><![CDATA[<p><strong>It’s 5:05, Monday, December 26, 2022. </strong>From the Sourced Podcast Network in New York City, this is your host, Pokie Huang. Stories in today’s episode come from <strong>Edwin Kwon</strong> in Australia, on LastPass suffers second data breach this year. And more on LastPass with <strong>Mark Miller</strong> in New York City - Delete my LastPass account? I’m not sure. Fight me.<strong>Trac Bannon</strong> in Pennsylvania, on adding more oversight layers to speed things up? <strong>Katy Craig</strong> in California, on cybersecurity audit of NASA and <strong>Olimpiu Pop in Romania</strong>, on Ukraine cyberware analysis.</p><p>Let’s get to it!</p><p><strong>🇦🇺 Edwin Kwan, Sydney, Australia</strong></p><p>LastPass suffers second data breach this year</p><p>https://www.bleepingcomputer.com/news/security/lastpass-hackers-stole-customer-vault-data-in-cloud-storage-breach/amp/</p><p><strong>🇺🇸</strong> <strong>Mark Miller, New York City</strong></p><p>Delete my LastPass account? I’m not sure. Fight me.</p><p>LastPass: Notice of Recent Security Incident</p><p><a href="https://blog.lastpass.com/2022/12/notice-of-recent-security-incident/" rel="noopener noreferrer" target="_blank">https://blog.lastpass.com/2022/12/notice-of-recent-security-incident/</a></p><p>Andrew Johnson, Insightful Update on LastPass Breach</p><p><a href="https://www.linkedin.com/posts/andrew-johnson-7b29b93_lastpass-lastpass-hacked-activity-7012507887449116672-jRsq?utm_source=share&amp;utm_medium=member_desktop" rel="noopener noreferrer" target="_blank">https://www.linkedin.com/posts/andrew-johnson-7b29b93_lastpass-lastpass-hacked-activity-7012507887449116672-jRsq</a></p><p>LastPass: Hackers Stole User Data and Encrypted Password Vaults</p><p><a href="https://www.hackread.com/lastpass-encrypted-password-vaults-stolen/" rel="noopener noreferrer" target="_blank">https://www.hackread.com/lastpass-encrypted-password-vaults-stolen/</a></p><p><strong>🇺🇸</strong> <strong>Tracy (Trac) Bannon, Camp Hill, Pennsylvania</strong></p><p>Adding more oversight layers to speed things up?</p><p><a href="https://www.fedscoop.com/fedramp-reform-measures-enacted-as-biden-signs-ndaa-into-law/" rel="noopener noreferrer" target="_blank">https://www.fedscoop.com/fedramp-reform-measures-enacted-as-biden-signs-ndaa-into-law/</a></p><p><a href="https://www.congress.gov/bill/117th-congress/house-bill/7900" rel="noopener noreferrer" target="_blank">https://www.congress.gov/bill/117th-congress/house-bill/7900</a>&nbsp;</p><p><a href="https://www.congress.gov/bill/117th-congress/house-bill/8956/text" rel="noopener noreferrer" target="_blank">https://www.congress.gov/bill/117th-congress/house-bill/8956/text</a>&nbsp;</p><p><a href="https://hub.schellman.com/blog/common-pitfalls-when-pursuing-fedramp" rel="noopener noreferrer" target="_blank">https://hub.schellman.com/blog/common-pitfalls-when-pursuing-fedramp</a></p><p><strong>🇺🇸</strong> <strong>Katy Craig, San Diego, California</strong></p><p>Cybersecurity Audit of NASA</p><p><a href="https://oig.nasa.gov/audits/auditReports.html" rel="noopener noreferrer" target="_blank">https://oig.nasa.gov/audits/auditReports.html</a></p><p><a href="https://oig.nasa.gov/docs/IG-22-009.pdf" rel="noopener noreferrer" target="_blank">https://oig.nasa.gov/docs/IG-22-009.pdf</a></p><p><a href="https://oig.nasa.gov/docs/ML-22-001.pdf" rel="noopener noreferrer" target="_blank">https://oig.nasa.gov/docs/ML-22-001.pdf</a></p><p><strong>🇷🇴 Olimpiu Pop, Transylvania, Romania</strong></p><p>Ukraine Cyberware Analysis</p><p><a href="https://en.wikipedia.org/wiki/Romanian_Revolution" rel="noopener noreferrer" target="_blank">https://en.wikipedia.org/wiki/Romanian_Revolution</a></p><p><a href="https://securelist.com/reassessing-cyberwarfare-lessons-learned-in-2022/108328/" rel="noopener noreferrer" target="_blank">https://securelist.com/reassessing-cyberwarfare-lessons-learned-in-2022/108328/</a></p><p><a...]]></description><content:encoded><![CDATA[<p><strong>It’s 5:05, Monday, December 26, 2022. </strong>From the Sourced Podcast Network in New York City, this is your host, Pokie Huang. Stories in today’s episode come from <strong>Edwin Kwon</strong> in Australia, on LastPass suffers second data breach this year. And more on LastPass with <strong>Mark Miller</strong> in New York City - Delete my LastPass account? I’m not sure. Fight me.<strong>Trac Bannon</strong> in Pennsylvania, on adding more oversight layers to speed things up? <strong>Katy Craig</strong> in California, on cybersecurity audit of NASA and <strong>Olimpiu Pop in Romania</strong>, on Ukraine cyberware analysis.</p><p>Let’s get to it!</p><p><strong>🇦🇺 Edwin Kwan, Sydney, Australia</strong></p><p>LastPass suffers second data breach this year</p><p>https://www.bleepingcomputer.com/news/security/lastpass-hackers-stole-customer-vault-data-in-cloud-storage-breach/amp/</p><p><strong>🇺🇸</strong> <strong>Mark Miller, New York City</strong></p><p>Delete my LastPass account? I’m not sure. Fight me.</p><p>LastPass: Notice of Recent Security Incident</p><p><a href="https://blog.lastpass.com/2022/12/notice-of-recent-security-incident/" rel="noopener noreferrer" target="_blank">https://blog.lastpass.com/2022/12/notice-of-recent-security-incident/</a></p><p>Andrew Johnson, Insightful Update on LastPass Breach</p><p><a href="https://www.linkedin.com/posts/andrew-johnson-7b29b93_lastpass-lastpass-hacked-activity-7012507887449116672-jRsq?utm_source=share&amp;utm_medium=member_desktop" rel="noopener noreferrer" target="_blank">https://www.linkedin.com/posts/andrew-johnson-7b29b93_lastpass-lastpass-hacked-activity-7012507887449116672-jRsq</a></p><p>LastPass: Hackers Stole User Data and Encrypted Password Vaults</p><p><a href="https://www.hackread.com/lastpass-encrypted-password-vaults-stolen/" rel="noopener noreferrer" target="_blank">https://www.hackread.com/lastpass-encrypted-password-vaults-stolen/</a></p><p><strong>🇺🇸</strong> <strong>Tracy (Trac) Bannon, Camp Hill, Pennsylvania</strong></p><p>Adding more oversight layers to speed things up?</p><p><a href="https://www.fedscoop.com/fedramp-reform-measures-enacted-as-biden-signs-ndaa-into-law/" rel="noopener noreferrer" target="_blank">https://www.fedscoop.com/fedramp-reform-measures-enacted-as-biden-signs-ndaa-into-law/</a></p><p><a href="https://www.congress.gov/bill/117th-congress/house-bill/7900" rel="noopener noreferrer" target="_blank">https://www.congress.gov/bill/117th-congress/house-bill/7900</a>&nbsp;</p><p><a href="https://www.congress.gov/bill/117th-congress/house-bill/8956/text" rel="noopener noreferrer" target="_blank">https://www.congress.gov/bill/117th-congress/house-bill/8956/text</a>&nbsp;</p><p><a href="https://hub.schellman.com/blog/common-pitfalls-when-pursuing-fedramp" rel="noopener noreferrer" target="_blank">https://hub.schellman.com/blog/common-pitfalls-when-pursuing-fedramp</a></p><p><strong>🇺🇸</strong> <strong>Katy Craig, San Diego, California</strong></p><p>Cybersecurity Audit of NASA</p><p><a href="https://oig.nasa.gov/audits/auditReports.html" rel="noopener noreferrer" target="_blank">https://oig.nasa.gov/audits/auditReports.html</a></p><p><a href="https://oig.nasa.gov/docs/IG-22-009.pdf" rel="noopener noreferrer" target="_blank">https://oig.nasa.gov/docs/IG-22-009.pdf</a></p><p><a href="https://oig.nasa.gov/docs/ML-22-001.pdf" rel="noopener noreferrer" target="_blank">https://oig.nasa.gov/docs/ML-22-001.pdf</a></p><p><strong>🇷🇴 Olimpiu Pop, Transylvania, Romania</strong></p><p>Ukraine Cyberware Analysis</p><p><a href="https://en.wikipedia.org/wiki/Romanian_Revolution" rel="noopener noreferrer" target="_blank">https://en.wikipedia.org/wiki/Romanian_Revolution</a></p><p><a href="https://securelist.com/reassessing-cyberwarfare-lessons-learned-in-2022/108328/" rel="noopener noreferrer" target="_blank">https://securelist.com/reassessing-cyberwarfare-lessons-learned-in-2022/108328/</a></p><p><a href="https://twitter.com/search?q=%23UkraineWar" rel="noopener noreferrer" target="_blank">https://twitter.com/search?q=%23UkraineWar</a></p><p><br></p>]]></content:encoded><link><![CDATA[https://3zozb9fxlbueipjyapmaas.captivate.fm/episode/episode-41-its-5-05-monday-december-26-2022]]></link><guid isPermaLink="false">e4dfd809-63a0-4ab8-b452-b6d825e6cf3f</guid><itunes:image href="https://artwork.captivate.fm/648f05df-7127-4252-82a5-3804c37c9762/VS4mCl57COAt4Ku5vfxZcB-g.png"/><dc:creator><![CDATA[Contributors from Around the World]]></dc:creator><pubDate>Mon, 26 Dec 2022 16:45:00 -0400</pubDate><enclosure url="https://dts.podtrac.com/redirect.mp3/podcasts.captivate.fm/media/1e506846-b470-459c-b3dc-720292504fa9/2022-12-26-505-Episode-41-converted.mp3" length="11442550" type="audio/mpeg"/><itunes:duration>11:55</itunes:duration><itunes:explicit>false</itunes:explicit><itunes:episodeType>full</itunes:episodeType><itunes:season>1</itunes:season><itunes:episode>41</itunes:episode><itunes:season>1</itunes:season><podcast:episode>41</podcast:episode><podcast:season>1</podcast:season><itunes:author>Contributors from Around the World</itunes:author></item><item><title>Episode #40 - It&apos;s 5:05, Friday, December 23, 2022</title><itunes:title>Episode #40 - It&apos;s 5:05, Friday, December 23, 2022</itunes:title><description><![CDATA[<p><strong>It’s 5:05, Friday, December 23, 2022. Happy Holidays! </strong>From the Sourced Podcast Network in New York City, this is your host, Pokie Huang. Stories in today’s episode come from <strong>Edwin Kwon</strong> in Australia, on behind the scenes of Optus response's to their data breach. <strong>Olimpiu Pop in Romania</strong>, with a report on cybersecurity and foreign interference in the EU information ecosystem, <strong>Trac Bannon</strong> in Pennsylvania, on open source: always the season for giving and myself on New York’s taxi dispatch got hacked.&nbsp;</p><p>Today’s episode begins with <strong>Katy Craig</strong> in California on introduction to Amazon Sidewalk</p><p>Let’s get to it!</p><p><strong>🇺🇸</strong> <strong>Katy Craig, San Diego, California</strong></p><p>Introduction to Amazon Sidewalk</p><p><a href="https://www.amazon.com/Amazon-Sidewalk/b?node=21328123011" rel="noopener noreferrer" target="_blank">https://www.amazon.com/Amazon-Sidewalk/b?node=21328123011</a></p><p><a href="https://m.media-amazon.com/images/G/01/sidewalk/final_privacy_security_whitepaper.pdf" rel="noopener noreferrer" target="_blank">https://m.media-amazon.com/images/G/01/sidewalk/final_privacy_security_whitepaper.pdf</a></p><p><strong>🇺🇸</strong> <strong>Pokie Huang, New York City</strong></p><p>New York’s taxi dispatch got hacked</p><p><a href="https://www.theregister.com/2022/12/20/jrk_nyc_russian_hacking/" rel="noopener noreferrer" target="_blank">https://www.theregister.com/2022/12/20/jrk_nyc_russian_hacking/</a></p><p><strong>🇷🇴 Olimpiu Pop, Transylvania, Romania</strong></p><p>Cybersecurity and Foreign Interference in the EU Information Ecosystem</p><p><a href="https://www.enisa.europa.eu/news/cybersecurity-foreign-interference-in-the-eu-information-ecosystem" rel="noopener noreferrer" target="_blank">https://www.enisa.europa.eu/news/cybersecurity-foreign-interference-in-the-eu-information-ecosystem</a></p><p><a href="https://www.enisa.europa.eu/publications/foreign-information-manipulation-interference-fimi-and-cybersecurity-threat-landscape" rel="noopener noreferrer" target="_blank">https://www.enisa.europa.eu/publications/foreign-information-manipulation-interference-fimi-and-cybersecurity-threat-landscape</a></p><p><a href="https://www.fbi.gov/wanted/cyber/russian-interference-in-2016-u-s-elections" rel="noopener noreferrer" target="_blank">https://www.fbi.gov/wanted/cyber/russian-interference-in-2016-u-s-elections</a></p><p><a href="https://www.theguardian.com/uk-news/2020/jan/04/cambridge-analytica-data-leak-global-election-manipulation" rel="noopener noreferrer" target="_blank">https://www.theguardian.com/uk-news/2020/jan/04/cambridge-analytica-data-leak-global-election-manipulation</a></p><p><br></p><p><strong>🇦🇺 Edwin Kwan, Sydney, Australia</strong></p><p>Behind the scenes of Optus response's to their data breach</p><p><a href="https://www.afr.com/technology/inside-the-optus-hack-that-woke-up-australia-20221123-p5c0lm" rel="noopener noreferrer" target="_blank">https://www.afr.com/technology/inside-the-optus-hack-that-woke-up-australia-20221123-p5c0lm</a></p><p><br></p><p><strong>🇺🇸</strong> <strong>Tracy (Trac) Bannon, Camp Hill, Pennsylvania</strong></p><p>Open Source: Always the Season for Giving</p><p><a href="https://digital-strategy.ec.europa.eu/en/library/study-about-impact-open-source-software-and-hardware-technological-independence-competitiveness-and" rel="noopener noreferrer" target="_blank">https://digital-strategy.ec.europa.eu/en/library/study-about-impact-open-source-software-and-hardware-technological-independence-competitiveness-and</a></p><p><a href="https://www.zdnet.com/article/open-source-software-is-it-about-free-or-is-it-about-freedom/" rel="noopener noreferrer" target="_blank">https://www.zdnet.com/article/open-source-software-is-it-about-free-or-is-it-about-freedom/</a>&nbsp;</p><p><a href="https://www.redhat.com/en/blog/value-open-source" rel="noopener noreferrer"...]]></description><content:encoded><![CDATA[<p><strong>It’s 5:05, Friday, December 23, 2022. Happy Holidays! </strong>From the Sourced Podcast Network in New York City, this is your host, Pokie Huang. Stories in today’s episode come from <strong>Edwin Kwon</strong> in Australia, on behind the scenes of Optus response's to their data breach. <strong>Olimpiu Pop in Romania</strong>, with a report on cybersecurity and foreign interference in the EU information ecosystem, <strong>Trac Bannon</strong> in Pennsylvania, on open source: always the season for giving and myself on New York’s taxi dispatch got hacked.&nbsp;</p><p>Today’s episode begins with <strong>Katy Craig</strong> in California on introduction to Amazon Sidewalk</p><p>Let’s get to it!</p><p><strong>🇺🇸</strong> <strong>Katy Craig, San Diego, California</strong></p><p>Introduction to Amazon Sidewalk</p><p><a href="https://www.amazon.com/Amazon-Sidewalk/b?node=21328123011" rel="noopener noreferrer" target="_blank">https://www.amazon.com/Amazon-Sidewalk/b?node=21328123011</a></p><p><a href="https://m.media-amazon.com/images/G/01/sidewalk/final_privacy_security_whitepaper.pdf" rel="noopener noreferrer" target="_blank">https://m.media-amazon.com/images/G/01/sidewalk/final_privacy_security_whitepaper.pdf</a></p><p><strong>🇺🇸</strong> <strong>Pokie Huang, New York City</strong></p><p>New York’s taxi dispatch got hacked</p><p><a href="https://www.theregister.com/2022/12/20/jrk_nyc_russian_hacking/" rel="noopener noreferrer" target="_blank">https://www.theregister.com/2022/12/20/jrk_nyc_russian_hacking/</a></p><p><strong>🇷🇴 Olimpiu Pop, Transylvania, Romania</strong></p><p>Cybersecurity and Foreign Interference in the EU Information Ecosystem</p><p><a href="https://www.enisa.europa.eu/news/cybersecurity-foreign-interference-in-the-eu-information-ecosystem" rel="noopener noreferrer" target="_blank">https://www.enisa.europa.eu/news/cybersecurity-foreign-interference-in-the-eu-information-ecosystem</a></p><p><a href="https://www.enisa.europa.eu/publications/foreign-information-manipulation-interference-fimi-and-cybersecurity-threat-landscape" rel="noopener noreferrer" target="_blank">https://www.enisa.europa.eu/publications/foreign-information-manipulation-interference-fimi-and-cybersecurity-threat-landscape</a></p><p><a href="https://www.fbi.gov/wanted/cyber/russian-interference-in-2016-u-s-elections" rel="noopener noreferrer" target="_blank">https://www.fbi.gov/wanted/cyber/russian-interference-in-2016-u-s-elections</a></p><p><a href="https://www.theguardian.com/uk-news/2020/jan/04/cambridge-analytica-data-leak-global-election-manipulation" rel="noopener noreferrer" target="_blank">https://www.theguardian.com/uk-news/2020/jan/04/cambridge-analytica-data-leak-global-election-manipulation</a></p><p><br></p><p><strong>🇦🇺 Edwin Kwan, Sydney, Australia</strong></p><p>Behind the scenes of Optus response's to their data breach</p><p><a href="https://www.afr.com/technology/inside-the-optus-hack-that-woke-up-australia-20221123-p5c0lm" rel="noopener noreferrer" target="_blank">https://www.afr.com/technology/inside-the-optus-hack-that-woke-up-australia-20221123-p5c0lm</a></p><p><br></p><p><strong>🇺🇸</strong> <strong>Tracy (Trac) Bannon, Camp Hill, Pennsylvania</strong></p><p>Open Source: Always the Season for Giving</p><p><a href="https://digital-strategy.ec.europa.eu/en/library/study-about-impact-open-source-software-and-hardware-technological-independence-competitiveness-and" rel="noopener noreferrer" target="_blank">https://digital-strategy.ec.europa.eu/en/library/study-about-impact-open-source-software-and-hardware-technological-independence-competitiveness-and</a></p><p><a href="https://www.zdnet.com/article/open-source-software-is-it-about-free-or-is-it-about-freedom/" rel="noopener noreferrer" target="_blank">https://www.zdnet.com/article/open-source-software-is-it-about-free-or-is-it-about-freedom/</a>&nbsp;</p><p><a href="https://www.redhat.com/en/blog/value-open-source" rel="noopener noreferrer" target="_blank">https://www.redhat.com/en/blog/value-open-source</a></p>]]></content:encoded><link><![CDATA[https://3zozb9fxlbueipjyapmaas.captivate.fm/episode/episode-40-its-5-05-friday-december-23-2022]]></link><guid isPermaLink="false">26cd2389-67bc-4d4f-842f-8c596d9a838d</guid><itunes:image href="https://artwork.captivate.fm/c17e680e-3d0a-4093-a0a1-7620a0a7edb6/50tNVl_0yqxzefiETLHW-Ye-.png"/><dc:creator><![CDATA[Contributors from Around the World]]></dc:creator><pubDate>Fri, 23 Dec 2022 16:45:00 -0400</pubDate><enclosure url="https://dts.podtrac.com/redirect.mp3/podcasts.captivate.fm/media/fa06a3cd-1414-43e4-a90a-9926aa197c3c/2022-12-23-505-Episode-40-converted.mp3" length="9515340" type="audio/mpeg"/><itunes:duration>09:55</itunes:duration><itunes:explicit>false</itunes:explicit><itunes:episodeType>full</itunes:episodeType><itunes:season>1</itunes:season><itunes:episode>40</itunes:episode><itunes:season>1</itunes:season><podcast:episode>40</podcast:episode><podcast:season>1</podcast:season><itunes:author>Contributors from Around the World</itunes:author></item><item><title>Episode #39 - It&apos;s 5:05, Thursday, December 22, 2022</title><itunes:title>Episode #39 - It&apos;s 5:05, Thursday, December 22, 2022</itunes:title><description><![CDATA[<p><strong>It’s 5:05, Thursday, December 22, 2022. </strong>From the Sourced Podcast Network in New York City, this is your host, Pokie Huang. Stories in today’s episode come from <strong>Edwin Kwon</strong> in Australia, with a report on end-to-end encryption coming to Gmail. <strong>Katy Craig</strong> in California, on FBI public safety announcement.</p><p>Today’s episode begins with Executive Producer Mark Miller on Hey, EULA. Are you listening?</p><p>Let’s get to it!</p><p><strong>🇺🇸</strong> <strong>Mark Miller, New York City</strong></p><p>Hey, EULA. Are you listening?</p><p><a href="https://www.technologyreview.com/2022/12/19/1065306/roomba-irobot-robot-vacuums-artificial-intelligence-training-data-privacy/" rel="noopener noreferrer" target="_blank">https://www.technologyreview.com/2022/12/19/1065306/roomba-irobot-robot-vacuums-artificial-intelligence-training-data-privacy/</a></p><p><strong>🇺🇸</strong> <strong>Katy Craig, San Diego, California</strong></p><p>FBI Public Safety Announcement</p><p><a href="https://fbi.gov/news/press-releases/press-releases/fbi-and-partners-issue-national-public-safety-alert-on-financial-sextortion-schemes" rel="noopener noreferrer" target="_blank">https://fbi.gov/news/press-releases/press-releases/fbi-and-partners-issue-national-public-safety-alert-on-financial-sextortion-schemes</a>&nbsp;</p><p><strong>🇦🇺 Edwin Kwan, Sydney, Australia</strong></p><p>End-to-end Encryption Coming to Gmail</p><p><a href="https://www.bleepingcomputer.com/news/security/google-introduces-end-to-end-encryption-for-gmail-on-the-web/" rel="noopener noreferrer" target="_blank">https://www.bleepingcomputer.com/news/security/google-introduces-end-to-end-encryption-for-gmail-on-the-web/</a></p>]]></description><content:encoded><![CDATA[<p><strong>It’s 5:05, Thursday, December 22, 2022. </strong>From the Sourced Podcast Network in New York City, this is your host, Pokie Huang. Stories in today’s episode come from <strong>Edwin Kwon</strong> in Australia, with a report on end-to-end encryption coming to Gmail. <strong>Katy Craig</strong> in California, on FBI public safety announcement.</p><p>Today’s episode begins with Executive Producer Mark Miller on Hey, EULA. Are you listening?</p><p>Let’s get to it!</p><p><strong>🇺🇸</strong> <strong>Mark Miller, New York City</strong></p><p>Hey, EULA. Are you listening?</p><p><a href="https://www.technologyreview.com/2022/12/19/1065306/roomba-irobot-robot-vacuums-artificial-intelligence-training-data-privacy/" rel="noopener noreferrer" target="_blank">https://www.technologyreview.com/2022/12/19/1065306/roomba-irobot-robot-vacuums-artificial-intelligence-training-data-privacy/</a></p><p><strong>🇺🇸</strong> <strong>Katy Craig, San Diego, California</strong></p><p>FBI Public Safety Announcement</p><p><a href="https://fbi.gov/news/press-releases/press-releases/fbi-and-partners-issue-national-public-safety-alert-on-financial-sextortion-schemes" rel="noopener noreferrer" target="_blank">https://fbi.gov/news/press-releases/press-releases/fbi-and-partners-issue-national-public-safety-alert-on-financial-sextortion-schemes</a>&nbsp;</p><p><strong>🇦🇺 Edwin Kwan, Sydney, Australia</strong></p><p>End-to-end Encryption Coming to Gmail</p><p><a href="https://www.bleepingcomputer.com/news/security/google-introduces-end-to-end-encryption-for-gmail-on-the-web/" rel="noopener noreferrer" target="_blank">https://www.bleepingcomputer.com/news/security/google-introduces-end-to-end-encryption-for-gmail-on-the-web/</a></p>]]></content:encoded><link><![CDATA[https://3zozb9fxlbueipjyapmaas.captivate.fm/episode/episode-39-its-5-05-thursday-december-22-2022]]></link><guid isPermaLink="false">cd758512-fb0d-4309-bfb6-4876a32d2edd</guid><itunes:image href="https://artwork.captivate.fm/aad8a62c-b41c-4978-9687-370c699042be/Qp8gLJTfwotUI4zlFejES9-v.png"/><dc:creator><![CDATA[Contributors from Around the World]]></dc:creator><pubDate>Thu, 22 Dec 2022 16:45:00 -0400</pubDate><enclosure url="https://dts.podtrac.com/redirect.mp3/podcasts.captivate.fm/media/2a8277e9-4370-4882-9885-e0c44fb6ab34/2022-12-22-505-Episode-39-converted.mp3" length="8154883" type="audio/mpeg"/><itunes:duration>08:30</itunes:duration><itunes:explicit>false</itunes:explicit><itunes:episodeType>full</itunes:episodeType><itunes:season>1</itunes:season><itunes:episode>39</itunes:episode><itunes:season>1</itunes:season><podcast:episode>39</podcast:episode><podcast:season>1</podcast:season><itunes:author>Contributors from Around the World</itunes:author></item><item><title>Episode #38 - It&apos;s 5:05, Wednesday, December 21, 2022</title><itunes:title>Episode #38 - It&apos;s 5:05, Wednesday, December 21, 2022</itunes:title><description><![CDATA[<p><strong>It’s 5:05, Wednesday, December 21, 2022. </strong>From the Sourced Podcast Network in New York City, this is your host, Pokie Huang. Stories in today’s episode come from <strong>Olimpiu Pop</strong> in Romania, talking about ChatGPT for generating cyberattack. <strong>Trac Bannon</strong> in Pennsylvania, with a report on the increasing sophistication of Python malware, <strong>Katy Craig</strong> in California, on US cyber national mission forces and <strong>Edwin Kwan</strong> in Australia, talking about malicious cybersecurity SDK released to developers.</p><p>Today’s episode begins with <strong>Derek Weeks</strong> in Maryland talking about from unemployed to cyber target.</p><p>Let’s get to it!</p><p><strong>🇺🇸</strong> <strong>Derek Weeks, Bethesda, Maryland</strong></p><p>From unemployed to cyber target</p><p><a href="https://www.linkedin.com/feed/update/urn:li:activity:7011049036350668800/?commentUrn=urn%" rel="noopener noreferrer" target="_blank">https://www.linkedin.com/feed/update/urn:li:activity:7011049036350668800/?commentUrn=urn%3Ali%3Acomment%3A(activity%3A7011049036350668800%2C7011319740937719808)&amp;dashCommentUrn=urn%3Ali%3Afsd_comment%3A(7011319740937719808%2Curn%3Ali%3Aactivity%3A7011049036350668800)</a></p><p><strong>🇦🇺 Edwin Kwan, Sydney, Australia</strong></p><p>Malicious Cybersecurity SDK released to Developers</p><p><a href="https://www.bleepingcomputer.com/news/security/malicious-sentinelone-pypi-package-steals-data-from-developers/" rel="noopener noreferrer" target="_blank">https://www.bleepingcomputer.com/news/security/malicious-sentinelone-pypi-package-steals-data-from-developers/</a></p><p><strong>🇺🇸</strong> <strong>Katy Craig, San Diego, California</strong></p><p>US Cyber National Mission Forces</p><p><a href="https://www.cybercom.mil/Media/News/Article/3250075/the-evolution-of-cyber-newest-subordinate-unified-command-is-nations-joint-cybe/" rel="noopener noreferrer" target="_blank">https://www.cybercom.mil/Media/News/Article/3250075/the-evolution-of-cyber-newest-subordinate-unified-command-is-nations-joint-cybe/</a></p><p><strong>🇺🇸</strong> <strong>Tracy (Trac) Bannon, Camp Hill, Pennsylvania</strong></p><p>The Increasing Sophistication of Python Malware</p><p><a href="https://jfrog.com/blog/pypi-malware-creators-are-starting-to-employ-anti-debug-techniques/" rel="noopener noreferrer" target="_blank">https://jfrog.com/blog/pypi-malware-creators-are-starting-to-employ-anti-debug-techniques/</a></p><p><a href="https://www.techradar.com/news/python-malware-is-using-a-devious-new-technique" rel="noopener noreferrer" target="_blank">https://www.techradar.com/news/python-malware-is-using-a-devious-new-technique</a></p><p><strong>🇷🇴 Olimpiu Pop, Transylvania, Romania</strong></p><p>ChatGPT for generating cyberattack</p><p><a href="https://www.infoq.com/news/2022/10/ai-state-2022" rel="noopener noreferrer" target="_blank">https://www.infoq.com/news/2022/10/ai-state-2022</a></p><p><a href="https://research.checkpoint.com/2022/opwnai-ai-that-can-save-the-day-or-hack-it-away/" rel="noopener noreferrer" target="_blank">https://research.checkpoint.com/2022/opwnai-ai-that-can-save-the-day-or-hack-it-away/</a></p>]]></description><content:encoded><![CDATA[<p><strong>It’s 5:05, Wednesday, December 21, 2022. </strong>From the Sourced Podcast Network in New York City, this is your host, Pokie Huang. Stories in today’s episode come from <strong>Olimpiu Pop</strong> in Romania, talking about ChatGPT for generating cyberattack. <strong>Trac Bannon</strong> in Pennsylvania, with a report on the increasing sophistication of Python malware, <strong>Katy Craig</strong> in California, on US cyber national mission forces and <strong>Edwin Kwan</strong> in Australia, talking about malicious cybersecurity SDK released to developers.</p><p>Today’s episode begins with <strong>Derek Weeks</strong> in Maryland talking about from unemployed to cyber target.</p><p>Let’s get to it!</p><p><strong>🇺🇸</strong> <strong>Derek Weeks, Bethesda, Maryland</strong></p><p>From unemployed to cyber target</p><p><a href="https://www.linkedin.com/feed/update/urn:li:activity:7011049036350668800/?commentUrn=urn%" rel="noopener noreferrer" target="_blank">https://www.linkedin.com/feed/update/urn:li:activity:7011049036350668800/?commentUrn=urn%3Ali%3Acomment%3A(activity%3A7011049036350668800%2C7011319740937719808)&amp;dashCommentUrn=urn%3Ali%3Afsd_comment%3A(7011319740937719808%2Curn%3Ali%3Aactivity%3A7011049036350668800)</a></p><p><strong>🇦🇺 Edwin Kwan, Sydney, Australia</strong></p><p>Malicious Cybersecurity SDK released to Developers</p><p><a href="https://www.bleepingcomputer.com/news/security/malicious-sentinelone-pypi-package-steals-data-from-developers/" rel="noopener noreferrer" target="_blank">https://www.bleepingcomputer.com/news/security/malicious-sentinelone-pypi-package-steals-data-from-developers/</a></p><p><strong>🇺🇸</strong> <strong>Katy Craig, San Diego, California</strong></p><p>US Cyber National Mission Forces</p><p><a href="https://www.cybercom.mil/Media/News/Article/3250075/the-evolution-of-cyber-newest-subordinate-unified-command-is-nations-joint-cybe/" rel="noopener noreferrer" target="_blank">https://www.cybercom.mil/Media/News/Article/3250075/the-evolution-of-cyber-newest-subordinate-unified-command-is-nations-joint-cybe/</a></p><p><strong>🇺🇸</strong> <strong>Tracy (Trac) Bannon, Camp Hill, Pennsylvania</strong></p><p>The Increasing Sophistication of Python Malware</p><p><a href="https://jfrog.com/blog/pypi-malware-creators-are-starting-to-employ-anti-debug-techniques/" rel="noopener noreferrer" target="_blank">https://jfrog.com/blog/pypi-malware-creators-are-starting-to-employ-anti-debug-techniques/</a></p><p><a href="https://www.techradar.com/news/python-malware-is-using-a-devious-new-technique" rel="noopener noreferrer" target="_blank">https://www.techradar.com/news/python-malware-is-using-a-devious-new-technique</a></p><p><strong>🇷🇴 Olimpiu Pop, Transylvania, Romania</strong></p><p>ChatGPT for generating cyberattack</p><p><a href="https://www.infoq.com/news/2022/10/ai-state-2022" rel="noopener noreferrer" target="_blank">https://www.infoq.com/news/2022/10/ai-state-2022</a></p><p><a href="https://research.checkpoint.com/2022/opwnai-ai-that-can-save-the-day-or-hack-it-away/" rel="noopener noreferrer" target="_blank">https://research.checkpoint.com/2022/opwnai-ai-that-can-save-the-day-or-hack-it-away/</a></p>]]></content:encoded><link><![CDATA[https://3zozb9fxlbueipjyapmaas.captivate.fm/episode/episode-38-its-5-05-wednesday-december-21-2022]]></link><guid isPermaLink="false">e1c32ddf-ab1c-42ae-9b84-8ff9c749a83f</guid><itunes:image href="https://artwork.captivate.fm/5dbd2a27-93fb-44d5-aaeb-bd5f8b607775/t4ivtoEvMmpWubBRbOQ0IY-d.png"/><dc:creator><![CDATA[Contributors from Around the World]]></dc:creator><pubDate>Wed, 21 Dec 2022 16:45:00 -0400</pubDate><enclosure url="https://dts.podtrac.com/redirect.mp3/podcasts.captivate.fm/media/62e27598-4658-49f3-8cf8-b58d0407efe3/2022-12-21-505-Episode-38-converted.mp3" length="11244855" type="audio/mpeg"/><itunes:duration>11:43</itunes:duration><itunes:explicit>false</itunes:explicit><itunes:episodeType>full</itunes:episodeType><itunes:season>1</itunes:season><itunes:episode>38</itunes:episode><itunes:season>1</itunes:season><podcast:episode>38</podcast:episode><podcast:season>1</podcast:season><itunes:author>Contributors from Around the World</itunes:author></item><item><title>Episode #37 - It&apos;s 5:05, Tuesday, December 20, 2022</title><itunes:title>Episode #37 - It&apos;s 5:05, Tuesday, December 20, 2022</itunes:title><description><![CDATA[<p><strong>It’s 5:05, Tuesday, December 20, 2022. </strong>From the Sourced Podcast Network in New York City, this is your host, Pokie Huang. Stories in today’s episode come from <strong>Kadi Grigg</strong> in Virginia, talking about open source software in the automotive industry, <strong>Edwin Kwan</strong> in Australia, with a report on facebook post phishing attack on the rise, <strong>Katy Craig</strong> in California, talking about Epic games gets record fines and <strong>Olimpiu Pop</strong> in Romania, with a report on CISA’s vulnerability summary of week 50 of 2022.</p><p>Let’s get to it!</p><p><strong>🇺🇸</strong> <strong>Kadi Grigg, Alexandria,VA</strong></p><p>Open Source Software in the Automotive Industry</p><p><a href="https://www.automotiveworld.com/articles/driving-the-future-why-open-source-is-key-in-a-world-of-software-defined-cars/" rel="noopener noreferrer" target="_blank">https://www.automotiveworld.com/articles/driving-the-future-why-open-source-is-key-in-a-world-of-software-defined-cars/</a></p><p><strong>🇦🇺 Edwin Kwan, Sydney, Australia</strong></p><p>Facebook Post Phishing Attack on the Rise</p><p><a href="https://www.bleepingcomputer.com/news/security/phishing-attack-uses-facebook-posts-to-evade-email-security/" rel="noopener noreferrer" target="_blank">https://www.bleepingcomputer.com/news/security/phishing-attack-uses-facebook-posts-to-evade-email-security/</a></p><p><strong>🇺🇸</strong> <strong>Katy Craig, San Diego, California</strong></p><p>Epic Games Gets Record Fines</p><p><a href="https://www.ftc.gov/news-events/news/press-releases/2022/12/fortnite-video-game-maker-epic-games-pay-more-half-billion-dollars-over-ftc-allegations" rel="noopener noreferrer" target="_blank">https://www.ftc.gov/news-events/news/press-releases/2022/12/fortnite-video-game-maker-epic-games-pay-more-half-billion-dollars-over-ftc-allegations</a></p><p><strong>🇷🇴 Olimpiu Pop, Transylvania, Romania</strong></p><p>CISA’s Vulnerability Summary of Week 50/ 2022</p><p><a href="https://www.cisa.gov/uscert/ncas/bulletins/sb22-353" rel="noopener noreferrer" target="_blank">https://www.cisa.gov/uscert/ncas/bulletins/sb22-353</a></p><p><a href="https://www.cisa.gov/known-exploited-vulnerabilities-catalog" rel="noopener noreferrer" target="_blank">https://www.cisa.gov/known-exploited-vulnerabilities-catalog</a></p><p><a href="https://nvd.nist.gov/vuln/detail/CVE-2022-42856" rel="noopener noreferrer" target="_blank">https://nvd.nist.gov/vuln/detail/CVE-2022-42856</a></p><p><a href="https://support.apple.com/en-us/HT213516" rel="noopener noreferrer" target="_blank">https://support.apple.com/en-us/HT213516</a></p><p><a href="https://www.citrix.com/blogs/2022/12/13/critical-security-update-now-available-for-citrix-adc-citrix-gateway/" rel="noopener noreferrer" target="_blank">https://www.citrix.com/blogs/2022/12/13/critical-security-update-now-available-for-citrix-adc-citrix-gateway/</a></p><p><a href="https://msrc.microsoft.com/update-guide/vulnerability/CVE-2022-44698" rel="noopener noreferrer" target="_blank">https://msrc.microsoft.com/update-guide/vulnerability/CVE-2022-44698</a></p>]]></description><content:encoded><![CDATA[<p><strong>It’s 5:05, Tuesday, December 20, 2022. </strong>From the Sourced Podcast Network in New York City, this is your host, Pokie Huang. Stories in today’s episode come from <strong>Kadi Grigg</strong> in Virginia, talking about open source software in the automotive industry, <strong>Edwin Kwan</strong> in Australia, with a report on facebook post phishing attack on the rise, <strong>Katy Craig</strong> in California, talking about Epic games gets record fines and <strong>Olimpiu Pop</strong> in Romania, with a report on CISA’s vulnerability summary of week 50 of 2022.</p><p>Let’s get to it!</p><p><strong>🇺🇸</strong> <strong>Kadi Grigg, Alexandria,VA</strong></p><p>Open Source Software in the Automotive Industry</p><p><a href="https://www.automotiveworld.com/articles/driving-the-future-why-open-source-is-key-in-a-world-of-software-defined-cars/" rel="noopener noreferrer" target="_blank">https://www.automotiveworld.com/articles/driving-the-future-why-open-source-is-key-in-a-world-of-software-defined-cars/</a></p><p><strong>🇦🇺 Edwin Kwan, Sydney, Australia</strong></p><p>Facebook Post Phishing Attack on the Rise</p><p><a href="https://www.bleepingcomputer.com/news/security/phishing-attack-uses-facebook-posts-to-evade-email-security/" rel="noopener noreferrer" target="_blank">https://www.bleepingcomputer.com/news/security/phishing-attack-uses-facebook-posts-to-evade-email-security/</a></p><p><strong>🇺🇸</strong> <strong>Katy Craig, San Diego, California</strong></p><p>Epic Games Gets Record Fines</p><p><a href="https://www.ftc.gov/news-events/news/press-releases/2022/12/fortnite-video-game-maker-epic-games-pay-more-half-billion-dollars-over-ftc-allegations" rel="noopener noreferrer" target="_blank">https://www.ftc.gov/news-events/news/press-releases/2022/12/fortnite-video-game-maker-epic-games-pay-more-half-billion-dollars-over-ftc-allegations</a></p><p><strong>🇷🇴 Olimpiu Pop, Transylvania, Romania</strong></p><p>CISA’s Vulnerability Summary of Week 50/ 2022</p><p><a href="https://www.cisa.gov/uscert/ncas/bulletins/sb22-353" rel="noopener noreferrer" target="_blank">https://www.cisa.gov/uscert/ncas/bulletins/sb22-353</a></p><p><a href="https://www.cisa.gov/known-exploited-vulnerabilities-catalog" rel="noopener noreferrer" target="_blank">https://www.cisa.gov/known-exploited-vulnerabilities-catalog</a></p><p><a href="https://nvd.nist.gov/vuln/detail/CVE-2022-42856" rel="noopener noreferrer" target="_blank">https://nvd.nist.gov/vuln/detail/CVE-2022-42856</a></p><p><a href="https://support.apple.com/en-us/HT213516" rel="noopener noreferrer" target="_blank">https://support.apple.com/en-us/HT213516</a></p><p><a href="https://www.citrix.com/blogs/2022/12/13/critical-security-update-now-available-for-citrix-adc-citrix-gateway/" rel="noopener noreferrer" target="_blank">https://www.citrix.com/blogs/2022/12/13/critical-security-update-now-available-for-citrix-adc-citrix-gateway/</a></p><p><a href="https://msrc.microsoft.com/update-guide/vulnerability/CVE-2022-44698" rel="noopener noreferrer" target="_blank">https://msrc.microsoft.com/update-guide/vulnerability/CVE-2022-44698</a></p>]]></content:encoded><link><![CDATA[https://3zozb9fxlbueipjyapmaas.captivate.fm/episode/episode-37-its-5-05-tuesday-december-20-2022]]></link><guid isPermaLink="false">b15a6198-f869-44e7-92b9-027a62ae5b3e</guid><itunes:image href="https://artwork.captivate.fm/6339bb16-867c-4330-ad81-c37a4886cb8d/uX5P_DC5PZ5gupRW49lbc1IV.png"/><dc:creator><![CDATA[Contributors from Around the World]]></dc:creator><pubDate>Tue, 20 Dec 2022 16:45:00 -0400</pubDate><enclosure url="https://dts.podtrac.com/redirect.mp3/podcasts.captivate.fm/media/8d6ba8ef-569b-4270-90f2-0b741a0badb9/2022-12-20-505-Episode-37-U-converted.mp3" length="8414436" type="audio/mpeg"/><itunes:duration>08:46</itunes:duration><itunes:explicit>false</itunes:explicit><itunes:episodeType>full</itunes:episodeType><itunes:season>1</itunes:season><itunes:episode>37</itunes:episode><itunes:season>1</itunes:season><podcast:episode>37</podcast:episode><podcast:season>1</podcast:season><itunes:author>Contributors from Around the World</itunes:author></item><item><title>Episode #36 - It&apos;s 5:05, Monday, December 19, 2022</title><itunes:title>Episode #36 - It&apos;s 5:05, Monday, December 19, 2022</itunes:title><description><![CDATA[<p><strong>It’s 5:05, Monday, December 19, 2022. </strong>From the Sourced Podcast Network in New York City, this is your host, Pokie Huang. Stories in today’s episode come from <strong>Edwin Kwan</strong> in Australia with a report on software loophole allows hacking of Australian Taxation Office accounts, <strong>Trac Bannon</strong> in Pennsylvania talks about why rapid satellite innovation is a cyber threat paradise, <strong>Katy Craig</strong> in California on EU-US adequacy decision.</p><p>Today’s episode begins with Executive Producer, Mark Miller, on the dumpster fire that has become Twitter.</p><p>Let’s get to it!</p><p><strong>🇺🇸 Mark Miller, New York City</strong></p><p>The Dumpster Fire that has become Twitter</p><p>Andy Kaufman vote off SNL</p><p><a href="https://www.youtube.com/watch?v=g_30RwO6wdg" rel="noopener noreferrer" target="_blank">https://www.youtube.com/watch?v=g_30RwO6wdg</a></p><p>Twitter Users Say Elon Musk Should Quit as Boss</p><p><a href="https://www.nytimes.com/2022/12/19/business/elon-musk-quit-twitter.html" rel="noopener noreferrer" target="_blank">https://www.nytimes.com/2022/12/19/business/elon-musk-quit-twitter.html</a></p><p>Andy Kaufman Banned NBC ABC Special Full Uncut with Commercials</p><p><a href="https://www.youtube.com/watch?v=yZS6Nrjurew" rel="noopener noreferrer" target="_blank">https://www.youtube.com/watch?v=yZS6Nrjurew</a></p><p>Judd Legum on Twitter</p><p><a href="https://twitter.com/JuddLegum" rel="noopener noreferrer" target="_blank">https://twitter.com/JuddLegum</a></p><p>What is Mastodon? w/ The Wall Street Journal</p><p><a href="https://www.wsj.com/story/how-to-use-mastodon-the-social-media-platform-blocked-by-elon-musks-twitter-7751455f?mod=e2tw" rel="noopener noreferrer" target="_blank">https://www.wsj.com/story/how-to-use-mastodon-the-social-media-platform-blocked-by-elon-musks-twitter-7751455f?mod=e2tw</a></p><p><strong>🇺🇸</strong> <strong>Katy Craig, San Diego, California</strong></p><p>EU US Adequacy Decision</p><p><a href="https://ec.europa.eu/commission/presscorner/detail/en/ip_22_7631" rel="noopener noreferrer" target="_blank">https://ec.europa.eu/commission/presscorner/detail/en/ip_22_7631</a></p><p><strong>🇺🇸</strong> <strong>Tracy (Trac) Bannon, Camp Hill, Pennsylvania</strong></p><p>Rapid Satellite Innovation is a Cyber Threat Paradise</p><p><a href="https://www.reuters.com/world/europe/exclusive-us-spy-agency-probes-sabotage-satellite-internet-during-russian-2022-03-11/" rel="noopener noreferrer" target="_blank">https://www.reuters.com/world/europe/exclusive-us-spy-agency-probes-sabotage-satellite-internet-during-russian-2022-03-11/</a></p><p><a href="https://www.cisa.gov/uscert/ncas/alerts/aa22-076a" rel="noopener noreferrer" target="_blank">https://www.cisa.gov/uscert/ncas/alerts/aa22-076a</a></p><p><a href="https://www.cyberscoop.com/apt28-fancy-bear-satellite/" rel="noopener noreferrer" target="_blank">https://www.cyberscoop.com/apt28-fancy-bear-satellite/</a></p><p><a href="https://www.cyberwarcon.com/" rel="noopener noreferrer" target="_blank">https://www.cyberwarcon.com/</a></p><p><a href="https://www.cisa.gov/shields-up" rel="noopener noreferrer" target="_blank">https://www.cisa.gov/shields-up</a></p><p><strong>🇦🇺 Edwin Kwan, Sydney, Australia</strong></p><p>Software Loophole allows hacking of Australian Taxation Office accounts</p><p><a href="https://www.abc.net.au/news/2022-12-18/ato-tax-hacked-via-mygov-services-australia-exploit/101781656" rel="noopener noreferrer" target="_blank">https://www.abc.net.au/news/2022-12-18/ato-tax-hacked-via-mygov-services-australia-exploit/101781656</a></p><p><br></p>]]></description><content:encoded><![CDATA[<p><strong>It’s 5:05, Monday, December 19, 2022. </strong>From the Sourced Podcast Network in New York City, this is your host, Pokie Huang. Stories in today’s episode come from <strong>Edwin Kwan</strong> in Australia with a report on software loophole allows hacking of Australian Taxation Office accounts, <strong>Trac Bannon</strong> in Pennsylvania talks about why rapid satellite innovation is a cyber threat paradise, <strong>Katy Craig</strong> in California on EU-US adequacy decision.</p><p>Today’s episode begins with Executive Producer, Mark Miller, on the dumpster fire that has become Twitter.</p><p>Let’s get to it!</p><p><strong>🇺🇸 Mark Miller, New York City</strong></p><p>The Dumpster Fire that has become Twitter</p><p>Andy Kaufman vote off SNL</p><p><a href="https://www.youtube.com/watch?v=g_30RwO6wdg" rel="noopener noreferrer" target="_blank">https://www.youtube.com/watch?v=g_30RwO6wdg</a></p><p>Twitter Users Say Elon Musk Should Quit as Boss</p><p><a href="https://www.nytimes.com/2022/12/19/business/elon-musk-quit-twitter.html" rel="noopener noreferrer" target="_blank">https://www.nytimes.com/2022/12/19/business/elon-musk-quit-twitter.html</a></p><p>Andy Kaufman Banned NBC ABC Special Full Uncut with Commercials</p><p><a href="https://www.youtube.com/watch?v=yZS6Nrjurew" rel="noopener noreferrer" target="_blank">https://www.youtube.com/watch?v=yZS6Nrjurew</a></p><p>Judd Legum on Twitter</p><p><a href="https://twitter.com/JuddLegum" rel="noopener noreferrer" target="_blank">https://twitter.com/JuddLegum</a></p><p>What is Mastodon? w/ The Wall Street Journal</p><p><a href="https://www.wsj.com/story/how-to-use-mastodon-the-social-media-platform-blocked-by-elon-musks-twitter-7751455f?mod=e2tw" rel="noopener noreferrer" target="_blank">https://www.wsj.com/story/how-to-use-mastodon-the-social-media-platform-blocked-by-elon-musks-twitter-7751455f?mod=e2tw</a></p><p><strong>🇺🇸</strong> <strong>Katy Craig, San Diego, California</strong></p><p>EU US Adequacy Decision</p><p><a href="https://ec.europa.eu/commission/presscorner/detail/en/ip_22_7631" rel="noopener noreferrer" target="_blank">https://ec.europa.eu/commission/presscorner/detail/en/ip_22_7631</a></p><p><strong>🇺🇸</strong> <strong>Tracy (Trac) Bannon, Camp Hill, Pennsylvania</strong></p><p>Rapid Satellite Innovation is a Cyber Threat Paradise</p><p><a href="https://www.reuters.com/world/europe/exclusive-us-spy-agency-probes-sabotage-satellite-internet-during-russian-2022-03-11/" rel="noopener noreferrer" target="_blank">https://www.reuters.com/world/europe/exclusive-us-spy-agency-probes-sabotage-satellite-internet-during-russian-2022-03-11/</a></p><p><a href="https://www.cisa.gov/uscert/ncas/alerts/aa22-076a" rel="noopener noreferrer" target="_blank">https://www.cisa.gov/uscert/ncas/alerts/aa22-076a</a></p><p><a href="https://www.cyberscoop.com/apt28-fancy-bear-satellite/" rel="noopener noreferrer" target="_blank">https://www.cyberscoop.com/apt28-fancy-bear-satellite/</a></p><p><a href="https://www.cyberwarcon.com/" rel="noopener noreferrer" target="_blank">https://www.cyberwarcon.com/</a></p><p><a href="https://www.cisa.gov/shields-up" rel="noopener noreferrer" target="_blank">https://www.cisa.gov/shields-up</a></p><p><strong>🇦🇺 Edwin Kwan, Sydney, Australia</strong></p><p>Software Loophole allows hacking of Australian Taxation Office accounts</p><p><a href="https://www.abc.net.au/news/2022-12-18/ato-tax-hacked-via-mygov-services-australia-exploit/101781656" rel="noopener noreferrer" target="_blank">https://www.abc.net.au/news/2022-12-18/ato-tax-hacked-via-mygov-services-australia-exploit/101781656</a></p><p><br></p>]]></content:encoded><link><![CDATA[https://3zozb9fxlbueipjyapmaas.captivate.fm/episode/episode-36-its-5-05-monday-december-19-2022]]></link><guid isPermaLink="false">9969226e-77a1-4c48-86de-3e8d6ecd4059</guid><itunes:image href="https://artwork.captivate.fm/02e7be41-4049-42c6-88b3-9e1bca9c2eb6/h_pxEuHYHaNT-D2bb8cg01P6.png"/><dc:creator><![CDATA[Contributors from Around the World]]></dc:creator><pubDate>Mon, 19 Dec 2022 16:45:00 -0400</pubDate><enclosure url="https://dts.podtrac.com/redirect.mp3/podcasts.captivate.fm/media/9066c389-125f-4ee4-9e69-ee96afaf1114/2022-12-19-505-Episode-36-converted.mp3" length="11666891" type="audio/mpeg"/><itunes:duration>09:43</itunes:duration><itunes:explicit>false</itunes:explicit><itunes:episodeType>full</itunes:episodeType><itunes:season>1</itunes:season><itunes:episode>36</itunes:episode><itunes:season>1</itunes:season><podcast:episode>36</podcast:episode><podcast:season>1</podcast:season><itunes:author>Contributors from Around the World</itunes:author></item><item><title>Episode #35 - It&apos;s 5:05, Friday, December 16, 2022</title><itunes:title>Episode #35 - It&apos;s 5:05, Friday, December 16, 2022</itunes:title><description><![CDATA[<p><strong>It’s 5:05, Friday, December 16, 2022. </strong>From the Sourced Podcast Network in New York City, this is your host, Pokie Huang. Stories in today’s episode come from <strong>Katy Craig</strong> in California, talks about Tech Giants vs. Google Maps, <strong>Edwin Kwan</strong> in Australia with a report on an investigation into TikTok’s privacy concerns, <strong>Trac Bannon</strong> in Pennsylvania with a report on the widely used Atlassian products compromised and <strong>DJ Schleen</strong> in Colorado, talks about GitHub public repositories now include free secret scanning.</p><p>Let’s get to it!</p><p><strong>🇺🇸</strong> <strong>Katy Craig, San Diego, California</strong></p><p>Tech Giants vs. Google Maps</p><p><a href="https://overturemaps.org/" rel="noopener noreferrer" target="_blank">https://overturemaps.org/</a></p><p><a href="https://www.mapillary.com/about" rel="noopener noreferrer" target="_blank">https://www.mapillary.com/about</a></p><p><strong>🇦🇺 Edwin Kwan, Sydney, Australia</strong></p><p>An Investigation into TikTok's Privacy Concerns</p><p><a href="https://malwaretech.com/2022/12/tiktok-is-a-national-security-risk.html" rel="noopener noreferrer" target="_blank">https://malwaretech.com/2022/12/tiktok-is-a-national-security-risk.html</a></p><p><strong>🇺🇸</strong> <strong>Tracy (Trac) Bannon, Camp Hill, Pennsylvania</strong></p><p>Widely Used Atlassian Products Compromised</p><p><a href="https://cloudsek.com/security-flaw-in-atlassian-products-jira-confluencetrello-bitbucket-affecting-multiple-companies/" rel="noopener noreferrer" target="_blank">https://cloudsek.com/security-flaw-in-atlassian-products-jira-confluencetrello-bitbucket-affecting-multiple-companies/</a></p><p><a href="https://cloudsek.com/cyber-security-incident-at-cloudsek/" rel="noopener noreferrer" target="_blank">https://cloudsek.com/cyber-security-incident-at-cloudsek/</a></p><p><strong>🇺🇸</strong> <strong>DJ Schleen, Golden, Colorado</strong></p><p>GitHub public repositories now include free secret scanning</p><p><a href="https://github.blog/2022-12-15-leaked-a-secret-check-your-github-alerts-for-free/" rel="noopener noreferrer" target="_blank">https://github.blog/2022-12-15-leaked-a-secret-check-your-github-alerts-for-free/</a></p><p><a href="https://thehackernews.com/2022/12/github-announces-free-secret-scanning.html?m=1" rel="noopener noreferrer" target="_blank">https://thehackernews.com/2022/12/github-announces-free-secret-scanning.html?m=1</a></p><p><a href="https://apiiro.com/blog/the-secrets-about-secrets-in-code/" rel="noopener noreferrer" target="_blank">https://apiiro.com/blog/the-secrets-about-secrets-in-code/</a></p><p><br></p>]]></description><content:encoded><![CDATA[<p><strong>It’s 5:05, Friday, December 16, 2022. </strong>From the Sourced Podcast Network in New York City, this is your host, Pokie Huang. Stories in today’s episode come from <strong>Katy Craig</strong> in California, talks about Tech Giants vs. Google Maps, <strong>Edwin Kwan</strong> in Australia with a report on an investigation into TikTok’s privacy concerns, <strong>Trac Bannon</strong> in Pennsylvania with a report on the widely used Atlassian products compromised and <strong>DJ Schleen</strong> in Colorado, talks about GitHub public repositories now include free secret scanning.</p><p>Let’s get to it!</p><p><strong>🇺🇸</strong> <strong>Katy Craig, San Diego, California</strong></p><p>Tech Giants vs. Google Maps</p><p><a href="https://overturemaps.org/" rel="noopener noreferrer" target="_blank">https://overturemaps.org/</a></p><p><a href="https://www.mapillary.com/about" rel="noopener noreferrer" target="_blank">https://www.mapillary.com/about</a></p><p><strong>🇦🇺 Edwin Kwan, Sydney, Australia</strong></p><p>An Investigation into TikTok's Privacy Concerns</p><p><a href="https://malwaretech.com/2022/12/tiktok-is-a-national-security-risk.html" rel="noopener noreferrer" target="_blank">https://malwaretech.com/2022/12/tiktok-is-a-national-security-risk.html</a></p><p><strong>🇺🇸</strong> <strong>Tracy (Trac) Bannon, Camp Hill, Pennsylvania</strong></p><p>Widely Used Atlassian Products Compromised</p><p><a href="https://cloudsek.com/security-flaw-in-atlassian-products-jira-confluencetrello-bitbucket-affecting-multiple-companies/" rel="noopener noreferrer" target="_blank">https://cloudsek.com/security-flaw-in-atlassian-products-jira-confluencetrello-bitbucket-affecting-multiple-companies/</a></p><p><a href="https://cloudsek.com/cyber-security-incident-at-cloudsek/" rel="noopener noreferrer" target="_blank">https://cloudsek.com/cyber-security-incident-at-cloudsek/</a></p><p><strong>🇺🇸</strong> <strong>DJ Schleen, Golden, Colorado</strong></p><p>GitHub public repositories now include free secret scanning</p><p><a href="https://github.blog/2022-12-15-leaked-a-secret-check-your-github-alerts-for-free/" rel="noopener noreferrer" target="_blank">https://github.blog/2022-12-15-leaked-a-secret-check-your-github-alerts-for-free/</a></p><p><a href="https://thehackernews.com/2022/12/github-announces-free-secret-scanning.html?m=1" rel="noopener noreferrer" target="_blank">https://thehackernews.com/2022/12/github-announces-free-secret-scanning.html?m=1</a></p><p><a href="https://apiiro.com/blog/the-secrets-about-secrets-in-code/" rel="noopener noreferrer" target="_blank">https://apiiro.com/blog/the-secrets-about-secrets-in-code/</a></p><p><br></p>]]></content:encoded><link><![CDATA[https://3zozb9fxlbueipjyapmaas.captivate.fm/episode/episode-35-its-5-05-friday-december-16-2022]]></link><guid isPermaLink="false">765f1bef-5f25-4662-beb9-903a14aca772</guid><itunes:image href="https://artwork.captivate.fm/a7df2655-275b-4abc-a6b2-dfae822fb2d3/2IVN_7BkYrLX4XRi0Kk7itPF.png"/><dc:creator><![CDATA[Contributors from Around the World]]></dc:creator><pubDate>Fri, 16 Dec 2022 16:45:00 -0400</pubDate><enclosure url="https://dts.podtrac.com/redirect.mp3/podcasts.captivate.fm/media/76efa8da-7ede-4d4b-b4c2-f4c6ab50f7ca/2022-12-16-505-Episode-35mp3-converted.mp3" length="10007593" type="audio/mpeg"/><itunes:duration>08:20</itunes:duration><itunes:explicit>false</itunes:explicit><itunes:episodeType>full</itunes:episodeType><itunes:season>1</itunes:season><itunes:episode>35</itunes:episode><itunes:season>1</itunes:season><podcast:episode>35</podcast:episode><podcast:season>1</podcast:season><itunes:author>Contributors from Around the World</itunes:author></item><item><title>Episode #34 - It&apos;s 5:05, Thursday, December 15, 2022</title><itunes:title>Episode #34 - It&apos;s 5:05, Thursday, December 15, 2022</itunes:title><description><![CDATA[<p>It’s 5:05, on <strong>Thursday, December 15, 2022. </strong>This is your daily update of open source and cybersecurity news.This is Pokie Huang, coming from the 5:05 offices in New York City. Stories for today come from <strong>Edwin Kwan </strong>in Australia with a report on victoria fire rescue dispatch system offline due to a potential cyber attack,<strong> Trac Bannon </strong>in Pennsylvania on balancing flexibility with cyber threats,<strong> Katy Craig </strong>in California on CISA 6 new vulnerabilities and<strong> </strong>myself with a follow up on the the met opera house cyber attack.</p><p>Let’s get to it!</p><p><strong>🇦🇺 Edwin Kwan, Sydney, Australia</strong></p><p>Victoria's Fire Rescue Dispatch System offline due to potential cyber attack</p><p><a href="https://www.abc.net.au/news/2022-12-15/fire-rescue-victoria-dispatch-system-down/101775300" rel="noopener noreferrer" target="_blank">https://www.abc.net.au/news/2022-12-15/fire-rescue-victoria-dispatch-system-down/101775300</a></p><p><strong>🇺🇸</strong> <strong>Tracy (Trac) Bannon, Camp Hill, Pennsylvania</strong></p><p>Balancing Flexibility with Cyber Threats</p><p><a href="https://www.nsa.gov/Press-Room/News-Highlights/Article/Article/3239938/nsa-releases-series-on-protecting-dod-microelectronics-from-adversary-influence/" rel="noopener noreferrer" target="_blank">https://www.nsa.gov/Press-Room/News-Highlights/Article/Article/3239938/nsa-releases-series-on-protecting-dod-microelectronics-from-adversary-influence/</a></p><p><a href="https://media.defense.gov/2022/Dec/08/2003127935/-1/-1/0/CTR_DOD_MICROELECTRONICS-FPGA_BEST_PRACTICES_THREAT_CATALOG.PDF" rel="noopener noreferrer" target="_blank">https://media.defense.gov/2022/Dec/08/2003127935/-1/-1/0/CTR_DOD_MICROELECTRONICS-FPGA_BEST_PRACTICES_THREAT_CATALOG.PDF</a>&nbsp;</p><p><strong>🇺🇸</strong> <strong>Katy Craig, San Diego, California</strong></p><p>CISA 6 New Vulnerabilities</p><p><a href="https://www.cisa.gov/known-exploited-vulnerabilities-catalog" rel="noopener noreferrer" target="_blank">https://www.cisa.gov/known-exploited-vulnerabilities-catalog</a>&nbsp;</p><p><strong>🇺🇸</strong> <strong>Pokie Huang, New York City</strong></p><p>The show must go on</p><p><a href="https://www.nytimes.com/2022/12/14/arts/music/met-opera-cyberattack.html" rel="noopener noreferrer" target="_blank">https://www.nytimes.com/2022/12/14/arts/music/met-opera-cyberattack.html</a></p><p><a href="https://www.musikverein.at/" rel="noopener noreferrer" target="_blank">https://www.musikverein.at/</a></p>]]></description><content:encoded><![CDATA[<p>It’s 5:05, on <strong>Thursday, December 15, 2022. </strong>This is your daily update of open source and cybersecurity news.This is Pokie Huang, coming from the 5:05 offices in New York City. Stories for today come from <strong>Edwin Kwan </strong>in Australia with a report on victoria fire rescue dispatch system offline due to a potential cyber attack,<strong> Trac Bannon </strong>in Pennsylvania on balancing flexibility with cyber threats,<strong> Katy Craig </strong>in California on CISA 6 new vulnerabilities and<strong> </strong>myself with a follow up on the the met opera house cyber attack.</p><p>Let’s get to it!</p><p><strong>🇦🇺 Edwin Kwan, Sydney, Australia</strong></p><p>Victoria's Fire Rescue Dispatch System offline due to potential cyber attack</p><p><a href="https://www.abc.net.au/news/2022-12-15/fire-rescue-victoria-dispatch-system-down/101775300" rel="noopener noreferrer" target="_blank">https://www.abc.net.au/news/2022-12-15/fire-rescue-victoria-dispatch-system-down/101775300</a></p><p><strong>🇺🇸</strong> <strong>Tracy (Trac) Bannon, Camp Hill, Pennsylvania</strong></p><p>Balancing Flexibility with Cyber Threats</p><p><a href="https://www.nsa.gov/Press-Room/News-Highlights/Article/Article/3239938/nsa-releases-series-on-protecting-dod-microelectronics-from-adversary-influence/" rel="noopener noreferrer" target="_blank">https://www.nsa.gov/Press-Room/News-Highlights/Article/Article/3239938/nsa-releases-series-on-protecting-dod-microelectronics-from-adversary-influence/</a></p><p><a href="https://media.defense.gov/2022/Dec/08/2003127935/-1/-1/0/CTR_DOD_MICROELECTRONICS-FPGA_BEST_PRACTICES_THREAT_CATALOG.PDF" rel="noopener noreferrer" target="_blank">https://media.defense.gov/2022/Dec/08/2003127935/-1/-1/0/CTR_DOD_MICROELECTRONICS-FPGA_BEST_PRACTICES_THREAT_CATALOG.PDF</a>&nbsp;</p><p><strong>🇺🇸</strong> <strong>Katy Craig, San Diego, California</strong></p><p>CISA 6 New Vulnerabilities</p><p><a href="https://www.cisa.gov/known-exploited-vulnerabilities-catalog" rel="noopener noreferrer" target="_blank">https://www.cisa.gov/known-exploited-vulnerabilities-catalog</a>&nbsp;</p><p><strong>🇺🇸</strong> <strong>Pokie Huang, New York City</strong></p><p>The show must go on</p><p><a href="https://www.nytimes.com/2022/12/14/arts/music/met-opera-cyberattack.html" rel="noopener noreferrer" target="_blank">https://www.nytimes.com/2022/12/14/arts/music/met-opera-cyberattack.html</a></p><p><a href="https://www.musikverein.at/" rel="noopener noreferrer" target="_blank">https://www.musikverein.at/</a></p>]]></content:encoded><link><![CDATA[https://3zozb9fxlbueipjyapmaas.captivate.fm/episode/episode-34-its-5-05-thursday-december-15-2022]]></link><guid isPermaLink="false">4208c87f-b04b-4ea2-971a-d61ba6127329</guid><itunes:image href="https://artwork.captivate.fm/d26d6e55-11ed-4bcb-9f77-ce5c8db79cd5/9nUWlFUqqwM1dr3EN8uYPGDz.png"/><dc:creator><![CDATA[Contributors from Around the World]]></dc:creator><pubDate>Thu, 15 Dec 2022 16:45:00 -0400</pubDate><enclosure url="https://dts.podtrac.com/redirect.mp3/podcasts.captivate.fm/media/231ae4bb-1552-47c2-b249-ecf5083e43de/2022-12-15-505-Episode-34-converted.mp3" length="8964785" type="audio/mpeg"/><itunes:duration>07:28</itunes:duration><itunes:explicit>false</itunes:explicit><itunes:episodeType>full</itunes:episodeType><itunes:season>1</itunes:season><itunes:episode>34</itunes:episode><itunes:season>1</itunes:season><podcast:episode>34</podcast:episode><podcast:season>1</podcast:season><itunes:author>Contributors from Around the World</itunes:author></item><item><title>Episode #33 - It&apos;s 5:05, Wednesday, December 14, 2022</title><itunes:title>Episode #33 - It&apos;s 5:05, Wednesday, December 14, 2022</itunes:title><description><![CDATA[<p>It’s 5:05, on <strong>Wednesday, December 14, 2022. </strong>This is your daily update of open source and cybersecurity news.This is Pokie Huang, coming from the 5:05 offices in New York City. Stories for today come from <strong>Derek Weeks</strong> in Maryland, <strong>James Mcleod</strong> in UK, <strong>Katy Craig</strong> in California and <strong>Edwin Kwan</strong> in Australia.</p><p>Let’s get to it!</p><p><strong>🇺🇸</strong> <strong>Derek Weeks, Bethesda, Maryland</strong></p><p>Meta open sources a way to find more bad guys online</p><p><a href="https://www.newsweek.com/child-abuse-images-porn-sting-switzerland-1764750" rel="noopener noreferrer" target="_blank">https://www.newsweek.com/child-abuse-images-porn-sting-switzerland-1764750</a></p><p><a href="https://petapixel.com/2022/12/13/metas-new-open-source-content-mod-scans-for-terrorism-and-photo-based-abuse/" rel="noopener noreferrer" target="_blank">https://www.engadget.com/meta-open-source-tool-scan-terrorist-content-130952284.html</a></p><p><strong>🇬🇧 James McLeod, London, United Kingdom</strong></p><p>How far can NASA’s open source get you into space?</p><p><a href="https://github.com/nasa" rel="noopener noreferrer" target="_blank">https://github.com/nasa</a></p><p><a href="https://github.com/nasa/openmct" rel="noopener noreferrer" target="_blank">https://github.com/nasa/openmct</a></p><p><a href="https://nasa.github.io/openmct/getting-started/" rel="noopener noreferrer" target="_blank">https://nasa.github.io/openmct/getting-started/</a></p><p><a href="https://github.com/nasa/prog_models" rel="noopener noreferrer" target="_blank">https://github.com/nasa/prog_models</a></p><p><strong>🇺🇸</strong> <strong>Katy Craig, San Diego, California</strong></p><p>Quantum Preparedness Act</p><p><a href="https://www.hassan.senate.gov/news/press-releases/senate-passes-senators-hassan-and-portmans-bipartisan-bill-to-strengthen-national-security-by-preparing-for-quantum-cybersecurity-risks" rel="noopener noreferrer" target="_blank">https://www.hassan.senate.gov/news/press-releases/senate-passes-senators-hassan-and-portmans-bipartisan-bill-to-strengthen-national-security-by-preparing-for-quantum-cybersecurity-risks</a></p><p><strong>🇦🇺 Edwin Kwan, Sydney, Australia</strong></p><p>FBI's Threat Info Sharing Network Breached through Social Engineering</p><p><a href="https://krebsonsecurity.com/2022/12/fbis-vetted-info-sharing-network-infragard-hacked/" rel="noopener noreferrer" target="_blank">https://krebsonsecurity.com/2022/12/fbis-vetted-info-sharing-network-infragard-hacked/</a></p>]]></description><content:encoded><![CDATA[<p>It’s 5:05, on <strong>Wednesday, December 14, 2022. </strong>This is your daily update of open source and cybersecurity news.This is Pokie Huang, coming from the 5:05 offices in New York City. Stories for today come from <strong>Derek Weeks</strong> in Maryland, <strong>James Mcleod</strong> in UK, <strong>Katy Craig</strong> in California and <strong>Edwin Kwan</strong> in Australia.</p><p>Let’s get to it!</p><p><strong>🇺🇸</strong> <strong>Derek Weeks, Bethesda, Maryland</strong></p><p>Meta open sources a way to find more bad guys online</p><p><a href="https://www.newsweek.com/child-abuse-images-porn-sting-switzerland-1764750" rel="noopener noreferrer" target="_blank">https://www.newsweek.com/child-abuse-images-porn-sting-switzerland-1764750</a></p><p><a href="https://petapixel.com/2022/12/13/metas-new-open-source-content-mod-scans-for-terrorism-and-photo-based-abuse/" rel="noopener noreferrer" target="_blank">https://www.engadget.com/meta-open-source-tool-scan-terrorist-content-130952284.html</a></p><p><strong>🇬🇧 James McLeod, London, United Kingdom</strong></p><p>How far can NASA’s open source get you into space?</p><p><a href="https://github.com/nasa" rel="noopener noreferrer" target="_blank">https://github.com/nasa</a></p><p><a href="https://github.com/nasa/openmct" rel="noopener noreferrer" target="_blank">https://github.com/nasa/openmct</a></p><p><a href="https://nasa.github.io/openmct/getting-started/" rel="noopener noreferrer" target="_blank">https://nasa.github.io/openmct/getting-started/</a></p><p><a href="https://github.com/nasa/prog_models" rel="noopener noreferrer" target="_blank">https://github.com/nasa/prog_models</a></p><p><strong>🇺🇸</strong> <strong>Katy Craig, San Diego, California</strong></p><p>Quantum Preparedness Act</p><p><a href="https://www.hassan.senate.gov/news/press-releases/senate-passes-senators-hassan-and-portmans-bipartisan-bill-to-strengthen-national-security-by-preparing-for-quantum-cybersecurity-risks" rel="noopener noreferrer" target="_blank">https://www.hassan.senate.gov/news/press-releases/senate-passes-senators-hassan-and-portmans-bipartisan-bill-to-strengthen-national-security-by-preparing-for-quantum-cybersecurity-risks</a></p><p><strong>🇦🇺 Edwin Kwan, Sydney, Australia</strong></p><p>FBI's Threat Info Sharing Network Breached through Social Engineering</p><p><a href="https://krebsonsecurity.com/2022/12/fbis-vetted-info-sharing-network-infragard-hacked/" rel="noopener noreferrer" target="_blank">https://krebsonsecurity.com/2022/12/fbis-vetted-info-sharing-network-infragard-hacked/</a></p>]]></content:encoded><link><![CDATA[https://3zozb9fxlbueipjyapmaas.captivate.fm/episode/episode-33-its-5-05-wednesday-december-14-2022]]></link><guid isPermaLink="false">ad83bc60-c323-4941-b3a8-75ea0f7bf4ac</guid><itunes:image href="https://artwork.captivate.fm/10771a29-29e8-4d89-a8e7-786e44d45dfa/XiW2Onf-Li29rvjzYDU0fC8K.png"/><dc:creator><![CDATA[Contributors from Around the World]]></dc:creator><pubDate>Wed, 14 Dec 2022 16:45:00 -0400</pubDate><enclosure url="https://dts.podtrac.com/redirect.mp3/podcasts.captivate.fm/media/4f233517-44ba-4e51-936c-68e84bc01e7f/2022-12-14-505-Episode-33-converted.mp3" length="13282265" type="audio/mpeg"/><itunes:duration>11:04</itunes:duration><itunes:explicit>false</itunes:explicit><itunes:episodeType>full</itunes:episodeType><itunes:season>1</itunes:season><itunes:episode>33</itunes:episode><itunes:season>1</itunes:season><podcast:episode>33</podcast:episode><podcast:season>1</podcast:season><itunes:author>Contributors from Around the World</itunes:author></item><item><title>Episode #32 - It&apos;s 5:05, Tuesday, December 13, 2022</title><itunes:title>Episode #32 - It&apos;s 5:05, Tuesday, December 13, 2022</itunes:title><description><![CDATA[<p>It’s 5:05, on <strong>Tuesday, December 13 , 2022. </strong>This is your daily update of open source and cybersecurity news.This is Pokie Huang, coming from the 5:05 offices in New York City. Stories for today come from <strong>Dan Whiting</strong> in Washington, DC, <strong>Katy Craig</strong> in San Diego, California, <strong>Trac Bannon</strong> in Camp Hill, Pennsylvania, <strong>Edwin Kwan</strong> in Sydney, Australia, <strong>Olimpiu Pop</strong> in Transylvania, Romania, and myself in New York City.&nbsp;</p><p>Let’s get to it!</p><p><strong>🇺🇸</strong> <strong>Dan Whiting, Washington, DC</strong></p><p>Endor Labs' State of Dependency Management Report</p><p><a href="https://www.endorlabs.com/blog/introducing-the-state-of-dependency-management-report" rel="noopener noreferrer" target="_blank">https://www.endorlabs.com/blog/introducing-the-state-of-dependency-management-report</a></p><p><strong>🇺🇸</strong> <strong>Katy Craig, San Diego, California</strong></p><p>Katy Craig JSON WAF Bypass</p><p>https://claroty.com/team82/research/js-on-security-off-abusing-json-based-sql-to-bypass-waf</p><p><strong>🇺🇸</strong> <strong>Tracy (Trac) Bannon, Camp Hill, Pennsylvania</strong></p><p>Killer Robots and Supply Chain Risk - A bridge too far?</p><p><a href="https://apnews.com/article/police-san-francisco-government-and-politics-d26121d7f7afb070102932e6a0754aa5" rel="noopener noreferrer" target="_blank">https://apnews.com/article/police-san-francisco-government-and-politics-d26121d7f7afb070102932e6a0754aa5</a></p><p><a href="https://www.auvsi.org/commercial-ground-advocacy-initiatives" rel="noopener noreferrer" target="_blank">https://www.auvsi.org/commercial-ground-advocacy-initiatives</a></p><p><a href="https://www.c4isrnet.com/battlefield-tech/2022/12/05/san-francisco-police-approved-to-deploy-killer-robots/" rel="noopener noreferrer" target="_blank">https://www.c4isrnet.com/battlefield-tech/2022/12/05/san-francisco-police-approved-to-deploy-killer-robots/</a></p><p><a href="https://www.nytimes.com/2022/12/06/us/police-robots-san-francisco.html" rel="noopener noreferrer" target="_blank">https://www.nytimes.com/2022/12/06/us/police-robots-san-francisco.html</a></p><p><strong>🇦🇺 Edwin Kwan, Sydney, Australia</strong></p><p>Uber Suffers Data Breach Due to Supply Chain Attack</p><p><a href="https://www.bleepingcomputer.com/news/security/uber-suffers-new-data-breach-after-attack-on-vendor-info-leaked-online/" rel="noopener noreferrer" target="_blank">https://www.bleepingcomputer.com/news/security/uber-suffers-new-data-breach-after-attack-on-vendor-info-leaked-online/</a></p><p><strong>🇺🇸</strong> <strong>Pokie Huang, New York City</strong></p><p>Hospitals under cyberattack</p><p><a href="https://www.nytimes.com/2022/12/12/nyregion/brooklyn-hospital-cyberattack.html" rel="noopener noreferrer" target="_blank">https://www.nytimes.com/2022/12/12/nyregion/brooklyn-hospital-cyberattack.html</a></p><p><a href="https://www.thecity.nyc/2022/11/25/23478350/one-brooklyn-health-system-offline-kingsbrook-brookdale-interfaith-hospitals" rel="noopener noreferrer" target="_blank">https://www.thecity.nyc/2022/11/25/23478350/one-brooklyn-health-system-offline-kingsbrook-brookdale-interfaith-hospitals</a></p><p><strong>🇷🇴 Olimpiu Pop, Transylvania, Romania</strong></p><p>GitHub Copilot Business Launched Despite Legal Questions</p><p><a href="https://www.kolide.com/blog/github-copilot-isn-t-worth-the-risk" rel="noopener noreferrer" target="_blank">https://www.kolide.com/blog/github-copilot-isn-t-worth-the-risk</a></p><p><a href="https://techcrunch.com/2022/12/08/github-launches-copilot-for-business-plan-as-legal-questions-remain-unresolved/" rel="noopener noreferrer" target="_blank">https://techcrunch.com/2022/12/08/github-launches-copilot-for-business-plan-as-legal-questions-remain-unresolved/</a></p>]]></description><content:encoded><![CDATA[<p>It’s 5:05, on <strong>Tuesday, December 13 , 2022. </strong>This is your daily update of open source and cybersecurity news.This is Pokie Huang, coming from the 5:05 offices in New York City. Stories for today come from <strong>Dan Whiting</strong> in Washington, DC, <strong>Katy Craig</strong> in San Diego, California, <strong>Trac Bannon</strong> in Camp Hill, Pennsylvania, <strong>Edwin Kwan</strong> in Sydney, Australia, <strong>Olimpiu Pop</strong> in Transylvania, Romania, and myself in New York City.&nbsp;</p><p>Let’s get to it!</p><p><strong>🇺🇸</strong> <strong>Dan Whiting, Washington, DC</strong></p><p>Endor Labs' State of Dependency Management Report</p><p><a href="https://www.endorlabs.com/blog/introducing-the-state-of-dependency-management-report" rel="noopener noreferrer" target="_blank">https://www.endorlabs.com/blog/introducing-the-state-of-dependency-management-report</a></p><p><strong>🇺🇸</strong> <strong>Katy Craig, San Diego, California</strong></p><p>Katy Craig JSON WAF Bypass</p><p>https://claroty.com/team82/research/js-on-security-off-abusing-json-based-sql-to-bypass-waf</p><p><strong>🇺🇸</strong> <strong>Tracy (Trac) Bannon, Camp Hill, Pennsylvania</strong></p><p>Killer Robots and Supply Chain Risk - A bridge too far?</p><p><a href="https://apnews.com/article/police-san-francisco-government-and-politics-d26121d7f7afb070102932e6a0754aa5" rel="noopener noreferrer" target="_blank">https://apnews.com/article/police-san-francisco-government-and-politics-d26121d7f7afb070102932e6a0754aa5</a></p><p><a href="https://www.auvsi.org/commercial-ground-advocacy-initiatives" rel="noopener noreferrer" target="_blank">https://www.auvsi.org/commercial-ground-advocacy-initiatives</a></p><p><a href="https://www.c4isrnet.com/battlefield-tech/2022/12/05/san-francisco-police-approved-to-deploy-killer-robots/" rel="noopener noreferrer" target="_blank">https://www.c4isrnet.com/battlefield-tech/2022/12/05/san-francisco-police-approved-to-deploy-killer-robots/</a></p><p><a href="https://www.nytimes.com/2022/12/06/us/police-robots-san-francisco.html" rel="noopener noreferrer" target="_blank">https://www.nytimes.com/2022/12/06/us/police-robots-san-francisco.html</a></p><p><strong>🇦🇺 Edwin Kwan, Sydney, Australia</strong></p><p>Uber Suffers Data Breach Due to Supply Chain Attack</p><p><a href="https://www.bleepingcomputer.com/news/security/uber-suffers-new-data-breach-after-attack-on-vendor-info-leaked-online/" rel="noopener noreferrer" target="_blank">https://www.bleepingcomputer.com/news/security/uber-suffers-new-data-breach-after-attack-on-vendor-info-leaked-online/</a></p><p><strong>🇺🇸</strong> <strong>Pokie Huang, New York City</strong></p><p>Hospitals under cyberattack</p><p><a href="https://www.nytimes.com/2022/12/12/nyregion/brooklyn-hospital-cyberattack.html" rel="noopener noreferrer" target="_blank">https://www.nytimes.com/2022/12/12/nyregion/brooklyn-hospital-cyberattack.html</a></p><p><a href="https://www.thecity.nyc/2022/11/25/23478350/one-brooklyn-health-system-offline-kingsbrook-brookdale-interfaith-hospitals" rel="noopener noreferrer" target="_blank">https://www.thecity.nyc/2022/11/25/23478350/one-brooklyn-health-system-offline-kingsbrook-brookdale-interfaith-hospitals</a></p><p><strong>🇷🇴 Olimpiu Pop, Transylvania, Romania</strong></p><p>GitHub Copilot Business Launched Despite Legal Questions</p><p><a href="https://www.kolide.com/blog/github-copilot-isn-t-worth-the-risk" rel="noopener noreferrer" target="_blank">https://www.kolide.com/blog/github-copilot-isn-t-worth-the-risk</a></p><p><a href="https://techcrunch.com/2022/12/08/github-launches-copilot-for-business-plan-as-legal-questions-remain-unresolved/" rel="noopener noreferrer" target="_blank">https://techcrunch.com/2022/12/08/github-launches-copilot-for-business-plan-as-legal-questions-remain-unresolved/</a></p>]]></content:encoded><link><![CDATA[https://3zozb9fxlbueipjyapmaas.captivate.fm/episode/episode-32-its-5-05-tuesday-december-13-2022]]></link><guid isPermaLink="false">31a64e68-90f5-4d36-9867-f013a6c73856</guid><itunes:image href="https://artwork.captivate.fm/3e7e5a79-0bc5-478b-ba0b-a502dde96c01/EYneR09YTQ0AHXZjgm4HOFsm.png"/><dc:creator><![CDATA[Contributors from Around the World]]></dc:creator><pubDate>Tue, 13 Dec 2022 16:45:00 -0400</pubDate><enclosure url="https://dts.podtrac.com/redirect.mp3/podcasts.captivate.fm/media/60c6f34f-4168-4f02-a07d-b4c9092765c5/2022-12-13-505-Episode-32-converted.mp3" length="13490200" type="audio/mpeg"/><itunes:duration>11:14</itunes:duration><itunes:explicit>false</itunes:explicit><itunes:episodeType>full</itunes:episodeType><itunes:season>1</itunes:season><itunes:episode>32</itunes:episode><itunes:season>1</itunes:season><podcast:episode>32</podcast:episode><podcast:season>1</podcast:season><itunes:author>Contributors from Around the World</itunes:author></item><item><title>Episode #31 - It&apos;s 5:05, Monday, December 12, 2022</title><itunes:title>Episode #31 - It&apos;s 5:05, Monday, December 12, 2022</itunes:title><description><![CDATA[<p>It’s 5:05, on <strong>Monday, December 12 , 2022. </strong>This is your daily update of open source and cybersecurity news.This is Pokie Huang, coming from the 5:05 offices in New York City. Stories for today come from <strong>Katy Craig</strong> in california gives highlights from Fiscal Year 2023, The National Defense Authorization Act, <strong>Edwin Kwan</strong> in Australia reporting on Australia's largest telecommunication suggers privacy breach, <strong>Olimpiu Pop</strong> in Romania on Kali Linux newest released.</p><p>We will start today with <strong>Mark Miller</strong> in New York city on why CVE and NVD do not work</p><p>Let’s get to it!</p><p><strong>🇺🇸</strong> <strong>Mark Miller, New York City</strong></p><p>CVE / NVD doesn’t work</p><p><a href="https://blog.crashoverride.com/cve-nvd-doesnt-work-for-open-source-and-supply-chain-security" rel="noopener noreferrer" target="_blank">https://blog.crashoverride.com/cve-nvd-doesnt-work-for-open-source-and-supply-chain-security</a></p><p><strong>🇺🇸</strong> <strong>Katy Craig, San Diego, California</strong></p><p>Highlights from the FY2023 NDAA Defense Budget</p><p><a href="https://www.congress.gov/bill/117th-congress/house-bill/7900" rel="noopener noreferrer" target="_blank">H.R.7900 - 117th Congress (2021-2022): National Defense Authorization Act for Fiscal Year 2023</a>&nbsp;</p><p><a href="https://drive.google.com/file/d/1IcoeCe1IjS308p_f3xCLVRXIyO4cZEeG/view?usp=sharing" rel="noopener noreferrer" target="_blank">FY2023 NDAA k80cb.pdf</a></p><p><strong>🇦🇺 Edwin Kwan, Sydney, Australia</strong></p><p>Australia's Largest Telco Suffers Privacy Breach</p><p><a href="https://www.reuters.com/technology/australias-telstra-suffers-privacy-breach-132000-customers-impacted-2022-12-11/" rel="noopener noreferrer" target="_blank">https://www.reuters.com/technology/australias-telstra-suffers-privacy-breach-132000-customers-impacted-2022-12-11/</a></p><p><a href="https://www.itnews.com.au/news/telstra-blames-privacy-breach-on-database-misalignment-588975" rel="noopener noreferrer" target="_blank">https://www.itnews.com.au/news/telstra-blames-privacy-breach-on-database-misalignment-588975</a></p><p><strong>🇷🇴 Olimpiu Pop, Transylvania, Romania</strong></p><p>Kali Linux 2022.4 released also in Azure Marketplace</p><p><a href="https://www.kali.org/blog/kali-linux-2022-4-release/" rel="noopener noreferrer" target="_blank">https://www.kali.org/blog/kali-linux-2022-4-release/</a></p><p><a href="https://www.kali.org/tools/bloodhound.py/" rel="noopener noreferrer" target="_blank">https://www.kali.org/tools/bloodhound.py/</a></p><p><a href="https://www.kali.org/tools/certipy-ad/" rel="noopener noreferrer" target="_blank">https://www.kali.org/tools/certipy-ad/</a></p><p><a href="https://www.kali.org/tools/python-ldapdomaindump/" rel="noopener noreferrer" target="_blank">https://www.kali.org/tools/python-ldapdomaindump/</a></p><p><a href="https://www.kali.org/tools/hak5-wifi-coconut/" rel="noopener noreferrer" target="_blank">https://www.kali.org/tools/hak5-wifi-coconut/</a></p><p><a href="https://www.kali.org/tools/peass-ng/" rel="noopener noreferrer" target="_blank">https://www.kali.org/tools/peass-ng/</a></p><p><a href="https://www.kali.org/tools/rizin-cutter/" rel="noopener noreferrer" target="_blank">https://www.kali.org/tools/rizin-cutter/</a></p>]]></description><content:encoded><![CDATA[<p>It’s 5:05, on <strong>Monday, December 12 , 2022. </strong>This is your daily update of open source and cybersecurity news.This is Pokie Huang, coming from the 5:05 offices in New York City. Stories for today come from <strong>Katy Craig</strong> in california gives highlights from Fiscal Year 2023, The National Defense Authorization Act, <strong>Edwin Kwan</strong> in Australia reporting on Australia's largest telecommunication suggers privacy breach, <strong>Olimpiu Pop</strong> in Romania on Kali Linux newest released.</p><p>We will start today with <strong>Mark Miller</strong> in New York city on why CVE and NVD do not work</p><p>Let’s get to it!</p><p><strong>🇺🇸</strong> <strong>Mark Miller, New York City</strong></p><p>CVE / NVD doesn’t work</p><p><a href="https://blog.crashoverride.com/cve-nvd-doesnt-work-for-open-source-and-supply-chain-security" rel="noopener noreferrer" target="_blank">https://blog.crashoverride.com/cve-nvd-doesnt-work-for-open-source-and-supply-chain-security</a></p><p><strong>🇺🇸</strong> <strong>Katy Craig, San Diego, California</strong></p><p>Highlights from the FY2023 NDAA Defense Budget</p><p><a href="https://www.congress.gov/bill/117th-congress/house-bill/7900" rel="noopener noreferrer" target="_blank">H.R.7900 - 117th Congress (2021-2022): National Defense Authorization Act for Fiscal Year 2023</a>&nbsp;</p><p><a href="https://drive.google.com/file/d/1IcoeCe1IjS308p_f3xCLVRXIyO4cZEeG/view?usp=sharing" rel="noopener noreferrer" target="_blank">FY2023 NDAA k80cb.pdf</a></p><p><strong>🇦🇺 Edwin Kwan, Sydney, Australia</strong></p><p>Australia's Largest Telco Suffers Privacy Breach</p><p><a href="https://www.reuters.com/technology/australias-telstra-suffers-privacy-breach-132000-customers-impacted-2022-12-11/" rel="noopener noreferrer" target="_blank">https://www.reuters.com/technology/australias-telstra-suffers-privacy-breach-132000-customers-impacted-2022-12-11/</a></p><p><a href="https://www.itnews.com.au/news/telstra-blames-privacy-breach-on-database-misalignment-588975" rel="noopener noreferrer" target="_blank">https://www.itnews.com.au/news/telstra-blames-privacy-breach-on-database-misalignment-588975</a></p><p><strong>🇷🇴 Olimpiu Pop, Transylvania, Romania</strong></p><p>Kali Linux 2022.4 released also in Azure Marketplace</p><p><a href="https://www.kali.org/blog/kali-linux-2022-4-release/" rel="noopener noreferrer" target="_blank">https://www.kali.org/blog/kali-linux-2022-4-release/</a></p><p><a href="https://www.kali.org/tools/bloodhound.py/" rel="noopener noreferrer" target="_blank">https://www.kali.org/tools/bloodhound.py/</a></p><p><a href="https://www.kali.org/tools/certipy-ad/" rel="noopener noreferrer" target="_blank">https://www.kali.org/tools/certipy-ad/</a></p><p><a href="https://www.kali.org/tools/python-ldapdomaindump/" rel="noopener noreferrer" target="_blank">https://www.kali.org/tools/python-ldapdomaindump/</a></p><p><a href="https://www.kali.org/tools/hak5-wifi-coconut/" rel="noopener noreferrer" target="_blank">https://www.kali.org/tools/hak5-wifi-coconut/</a></p><p><a href="https://www.kali.org/tools/peass-ng/" rel="noopener noreferrer" target="_blank">https://www.kali.org/tools/peass-ng/</a></p><p><a href="https://www.kali.org/tools/rizin-cutter/" rel="noopener noreferrer" target="_blank">https://www.kali.org/tools/rizin-cutter/</a></p>]]></content:encoded><link><![CDATA[https://3zozb9fxlbueipjyapmaas.captivate.fm/episode/episode-31-its-5-05-monday-december-10-2022]]></link><guid isPermaLink="false">ee431d13-84fa-4138-989e-93bc93ce3e09</guid><itunes:image href="https://artwork.captivate.fm/d0ac5f7c-2f8e-41b5-944b-3593380b4762/uLMLV4n1P8Wv_-5ECQTJ59bd.png"/><dc:creator><![CDATA[Contributors from Around the World]]></dc:creator><pubDate>Mon, 12 Dec 2022 16:45:00 -0400</pubDate><enclosure url="https://dts.podtrac.com/redirect.mp3/podcasts.captivate.fm/media/aa7bf9c9-6a6d-45cb-9551-bdfb4701fa7e/2022-12-12-505-Episode-31-converted.mp3" length="9271947" type="audio/mpeg"/><itunes:duration>07:44</itunes:duration><itunes:explicit>false</itunes:explicit><itunes:episodeType>full</itunes:episodeType><itunes:season>1</itunes:season><itunes:episode>31</itunes:episode><itunes:season>1</itunes:season><podcast:episode>31</podcast:episode><podcast:season>1</podcast:season><itunes:author>Contributors from Around the World</itunes:author></item><item><title>Episode #30 - It&apos;s 5:05, Friday, December 9, 2022</title><itunes:title>Episode #30 - It&apos;s 5:05, Friday, December 9, 2022</itunes:title><description><![CDATA[<p>It’s 5:05, on <strong>Friday, December 9 , 2022. </strong>This is your daily update of open source and cybersecurity news. This is Pokie Huang, coming from the 5:05 offices in New York City. Stories for today come from <strong>Trac Bannon</strong> in Pennsylvania, talking about the Chinese drone threat to US States and Local governments, <strong>Katy Craig</strong> in California on critical Chrome updates, <strong>Olimpiu Pop</strong> in Romania with a report on the cybercrime to reach 24.5 trillion dollars by 2027, <strong>Edwin Kwan</strong> in Australia on Medibank system wide shutdown over weekend.&nbsp;</p><p>We will start today with <strong>DJ Schleen</strong> in Colorado talking about how the Tech Lobbyists discourage government agencies from requiring SBOMs</p><p>Let’s get to it!</p><p><strong>🇺🇸</strong> <strong>DJ Schleen, Golden, Colorado</strong></p><p>Tech Lobbyists discourage government agencies from requiring SBOMs</p><p><a href="https://www.securityweek.com/big-tech-vendors-object-us-gov-sbom-mandate" rel="noopener noreferrer" target="_blank">https://www.securityweek.com/big-tech-vendors-object-us-gov-sbom-mandate</a></p><p><a href="https://www.gsa.gov/technology/technology-products-services/it-security/executive-order-14028-improving-the-nations-cybersecurity" rel="noopener noreferrer" target="_blank">https://www.gsa.gov/technology/technology-products-services/it-security/executive-order-14028-improving-the-nations-cybersecurity</a></p><p><a href="https://www.ntia.doc.gov/files/ntia/publications/sbom_at_a_glance_apr2021.pdf" rel="noopener noreferrer" target="_blank">https://www.ntia.doc.gov/files/ntia/publications/sbom_at_a_glance_apr2021.pdf</a></p><p><a href="https://www.ntia.doc.gov/files/ntia/publications/sbom_overview_20200818.pdf" rel="noopener noreferrer" target="_blank">https://www.ntia.doc.gov/files/ntia/publications/sbom_overview_20200818.pdf</a></p><p><strong>🇺🇸</strong> <strong>Tracy (Trac) Bannon, Camp Hill, Pennsylvania</strong></p><p>Chinese drone threat to US States and Local governments</p><p><a href="https://gcn.com/cybersecurity/2022/12/chinese-drones-could-expose-state-local-governments/380481/" rel="noopener noreferrer" target="_blank">https://gcn.com/cybersecurity/2022/12/chinese-drones-could-expose-state-local-governments/380481/</a></p><p><a href="https://cset.georgetown.edu/publication/banned-in-d-c/" rel="noopener noreferrer" target="_blank">https://cset.georgetown.edu/publication/banned-in-d-c/</a></p><p><a href="https://gcn.com/emerging-tech/2022/07/state-explores-drone-skyway/374808/" rel="noopener noreferrer" target="_blank">https://gcn.com/emerging-tech/2022/07/state-explores-drone-skyway/374808/</a> </p><p><strong>🇺🇸</strong> <strong>Katy Craig, San Diego, California</strong></p><p>Critical Chrome Updates</p><p><a href="https://chromereleases.googleblog.com/2022/12/stable-channel-update-for-desktop.html" rel="noopener noreferrer" target="_blank">https://chromereleases.googleblog.com/2022/12/stable-channel-update-for-desktop.html</a></p><p><a href="https://nvd.nist.gov/vuln/detail/CVE-2022-4262" rel="noopener noreferrer" target="_blank">https://nvd.nist.gov/vuln/detail/CVE-2022-4262</a></p><p><a href="https://www.cisa.gov/known-exploited-vulnerabilities-catalog" rel="noopener noreferrer" target="_blank">https://www.cisa.gov/known-exploited-vulnerabilities-catalog</a></p><p><strong>🇷🇴 Olimpiu Pop, Transylvania, Romania</strong></p><p>Cybercrime to reach 24.5 Trillion Dollars by 2027</p><p><a href="https://www.statista.com/chart/28878/expected-cost-of-cybercrime-until-2027/" rel="noopener noreferrer" target="_blank">https://www.statista.com/chart/28878/expected-cost-of-cybercrime-until-2027/</a></p><p><strong>🇦🇺 Edwin Kwan, Sydney, Australia</strong></p><p>Medibank system wide shutdown over weekend</p><p><a href="https://www.news.com.au/technology/online/hacking/medibank-set-for-systemwide-weekend-shutdown/news-story/8a8ed8a4b760574af3374a064d1d1c94" rel="noopener...]]></description><content:encoded><![CDATA[<p>It’s 5:05, on <strong>Friday, December 9 , 2022. </strong>This is your daily update of open source and cybersecurity news. This is Pokie Huang, coming from the 5:05 offices in New York City. Stories for today come from <strong>Trac Bannon</strong> in Pennsylvania, talking about the Chinese drone threat to US States and Local governments, <strong>Katy Craig</strong> in California on critical Chrome updates, <strong>Olimpiu Pop</strong> in Romania with a report on the cybercrime to reach 24.5 trillion dollars by 2027, <strong>Edwin Kwan</strong> in Australia on Medibank system wide shutdown over weekend.&nbsp;</p><p>We will start today with <strong>DJ Schleen</strong> in Colorado talking about how the Tech Lobbyists discourage government agencies from requiring SBOMs</p><p>Let’s get to it!</p><p><strong>🇺🇸</strong> <strong>DJ Schleen, Golden, Colorado</strong></p><p>Tech Lobbyists discourage government agencies from requiring SBOMs</p><p><a href="https://www.securityweek.com/big-tech-vendors-object-us-gov-sbom-mandate" rel="noopener noreferrer" target="_blank">https://www.securityweek.com/big-tech-vendors-object-us-gov-sbom-mandate</a></p><p><a href="https://www.gsa.gov/technology/technology-products-services/it-security/executive-order-14028-improving-the-nations-cybersecurity" rel="noopener noreferrer" target="_blank">https://www.gsa.gov/technology/technology-products-services/it-security/executive-order-14028-improving-the-nations-cybersecurity</a></p><p><a href="https://www.ntia.doc.gov/files/ntia/publications/sbom_at_a_glance_apr2021.pdf" rel="noopener noreferrer" target="_blank">https://www.ntia.doc.gov/files/ntia/publications/sbom_at_a_glance_apr2021.pdf</a></p><p><a href="https://www.ntia.doc.gov/files/ntia/publications/sbom_overview_20200818.pdf" rel="noopener noreferrer" target="_blank">https://www.ntia.doc.gov/files/ntia/publications/sbom_overview_20200818.pdf</a></p><p><strong>🇺🇸</strong> <strong>Tracy (Trac) Bannon, Camp Hill, Pennsylvania</strong></p><p>Chinese drone threat to US States and Local governments</p><p><a href="https://gcn.com/cybersecurity/2022/12/chinese-drones-could-expose-state-local-governments/380481/" rel="noopener noreferrer" target="_blank">https://gcn.com/cybersecurity/2022/12/chinese-drones-could-expose-state-local-governments/380481/</a></p><p><a href="https://cset.georgetown.edu/publication/banned-in-d-c/" rel="noopener noreferrer" target="_blank">https://cset.georgetown.edu/publication/banned-in-d-c/</a></p><p><a href="https://gcn.com/emerging-tech/2022/07/state-explores-drone-skyway/374808/" rel="noopener noreferrer" target="_blank">https://gcn.com/emerging-tech/2022/07/state-explores-drone-skyway/374808/</a> </p><p><strong>🇺🇸</strong> <strong>Katy Craig, San Diego, California</strong></p><p>Critical Chrome Updates</p><p><a href="https://chromereleases.googleblog.com/2022/12/stable-channel-update-for-desktop.html" rel="noopener noreferrer" target="_blank">https://chromereleases.googleblog.com/2022/12/stable-channel-update-for-desktop.html</a></p><p><a href="https://nvd.nist.gov/vuln/detail/CVE-2022-4262" rel="noopener noreferrer" target="_blank">https://nvd.nist.gov/vuln/detail/CVE-2022-4262</a></p><p><a href="https://www.cisa.gov/known-exploited-vulnerabilities-catalog" rel="noopener noreferrer" target="_blank">https://www.cisa.gov/known-exploited-vulnerabilities-catalog</a></p><p><strong>🇷🇴 Olimpiu Pop, Transylvania, Romania</strong></p><p>Cybercrime to reach 24.5 Trillion Dollars by 2027</p><p><a href="https://www.statista.com/chart/28878/expected-cost-of-cybercrime-until-2027/" rel="noopener noreferrer" target="_blank">https://www.statista.com/chart/28878/expected-cost-of-cybercrime-until-2027/</a></p><p><strong>🇦🇺 Edwin Kwan, Sydney, Australia</strong></p><p>Medibank system wide shutdown over weekend</p><p><a href="https://www.news.com.au/technology/online/hacking/medibank-set-for-systemwide-weekend-shutdown/news-story/8a8ed8a4b760574af3374a064d1d1c94" rel="noopener noreferrer" target="_blank">https://www.news.com.au/technology/online/hacking/medibank-set-for-systemwide-weekend-shutdown/news-story/8a8ed8a4b760574af3374a064d1d1c94</a></p>]]></content:encoded><link><![CDATA[https://3zozb9fxlbueipjyapmaas.captivate.fm/episode/episode-30-its-5-05-friday-december-9-2022]]></link><guid isPermaLink="false">76e43853-c4e5-4f21-b7da-8d24f90813d5</guid><itunes:image href="https://artwork.captivate.fm/dd73b561-39e5-4c98-b344-766cca71b2f5/OSPMCLmuIA6LKf-OYKo7UeeK.png"/><dc:creator><![CDATA[Contributors from Around the World]]></dc:creator><pubDate>Fri, 09 Dec 2022 16:45:00 -0400</pubDate><enclosure url="https://dts.podtrac.com/redirect.mp3/podcasts.captivate.fm/media/e4ff61e8-56b3-4a70-88b6-f285b3d13f9f/2022-12-09-505-Episode-30-converted.mp3" length="11039914" type="audio/mpeg"/><itunes:duration>09:12</itunes:duration><itunes:explicit>false</itunes:explicit><itunes:episodeType>full</itunes:episodeType><itunes:season>1</itunes:season><itunes:episode>30</itunes:episode><itunes:season>1</itunes:season><podcast:episode>30</podcast:episode><podcast:season>1</podcast:season><itunes:author>Contributors from Around the World</itunes:author></item><item><title>Episode #29 - It&apos;s 5:05, Thursday, December 8, 2022</title><itunes:title>Episode #29 - It&apos;s 5:05, Thursday, December 8, 2022</itunes:title><description><![CDATA[<p>It’s 5:05, on <strong>Thursday, December 8 , 2022. </strong>This is your daily update of open source and cybersecurity news.This is Pokie Huang, coming from the 5:05 offices in New York City. Stories for today come from&nbsp; <strong>Edwin Kwan</strong> in Australia with a report on a third major Australian data breach in three months, <strong>Katy Craig</strong> in California on Deloitte’s 2023 tech trends, <strong>DJ Schleen</strong> in Colorado with SBOM and SLSA <strong>Paulo Gouveia </strong>in Florida talking about Phishing with BeEF and myself reporting on the met opera cyber attack.&nbsp;</p><p>We will start today with Ax Sharma from Manchester, UK, talking about his article on the bias and racism inherent within ChatGPT</p><p>Let’s get to it!</p><p>🇬🇧 <strong>Ax Sharma, Manchester UK</strong></p><p>ChatGPT and its bias</p><p><a href="https://www.bleepingcomputer.com/news/technology/openais-new-chatgpt-bot-10-dangerous-things-its-capable-of/" rel="noopener noreferrer" target="_blank">https://www.bleepingcomputer.com/news/technology/openais-new-chatgpt-bot-10-dangerous-things-its-capable-of/</a></p><p><strong>🇦🇺 Edwin Kwan, Sydney, Australia</strong></p><p>Third major Australian data breach in three months</p><p><a href="https://www.vice.com/en/article/7k8apa/ransomware-gang-steals-employee-and-customer-data-from-lj-hooker" rel="noopener noreferrer" target="_blank">https://www.vice.com/en/article/7k8apa/ransomware-gang-steals-employee-and-customer-data-from-lj-hooker</a></p><p><strong>🇺🇸</strong> <strong>Katy Craig, San Diego, California</strong></p><p><a href="https://www2.deloitte.com/us/en/insights/focus/tech-trends.html?id=us:2el:3pr:diUS175897:eng:di:120722&amp;pkid=1010964#explore" rel="noopener noreferrer" target="_blank">Deloitte 2023 Tech Trends</a></p><p><a href="https://www2.deloitte.com/us/en/insights/focus/tech-trends.html?id=us:2el:3pr:diUS175897:eng:di:120722&amp;pkid=1010964#explore" rel="noopener noreferrer" target="_blank">https://www2.deloitte.com/us/en/insights/focus/tech-trends.html?id=us:2el:3pr:diUS175897:eng:di:120722&amp;pkid=1010964#explore</a></p><p><strong>🇺🇸</strong> <strong>Pokie Huang, New York City</strong></p><p>The Met Opera is under cyber attack</p><p><a href="http://maintenance.metoperafamily.org/" rel="noopener noreferrer" target="_blank">http://maintenance.metoperafamily.org/</a></p><p><a href="https://www.nytimes.com/2022/12/07/arts/met-opera-cyberattack-website.html" rel="noopener noreferrer" target="_blank">https://www.nytimes.com/2022/12/07/arts/met-opera-cyberattack-website.html</a></p><p><a href="https://twitter.com/MetOpera/status/1600626124370972672?s=20&amp;t=KovuANZjFpsPNIUkOmgqCg" rel="noopener noreferrer" target="_blank">https://twitter.com/MetOpera/status/1600626124370972672?s=20&amp;t=KovuANZjFpsPNIUkOmgqCg</a></p><p><strong>🇺🇸</strong> <strong>DJ Schleen, Golden, Colorado</strong></p><p>Add a little spice to your Software Bill of Materials with SLSA</p><p><a href="https://slsa.dev/" rel="noopener noreferrer" target="_blank">https://slsa.dev</a></p><p><a href="https://thenewstack.io/enhance-your-sbom-success-with-slsa/" rel="noopener noreferrer" target="_blank">https://thenewstack.io/enhance-your-sbom-success-with-slsa/</a></p><p><strong>🇺🇸</strong> <strong>Paulo Gouveia, Southwest Ranches, Florida</strong></p><p>Phishing with BeEF</p><p>BeEF - Official Project Websites</p><p>https://beefproject.com/</p><p>https://github.com/beefproject/beef</p><p>Cool Deployment Guides:</p><p>https://www.youtube.com/watch?v=3ogyS4KOlXc</p><p>https://www.linode.com/docs/products/tools/marketplace/guides/beef/</p><p><a href="https://www.youtube.com/watch?v=EL96fXFNLNA" rel="noopener noreferrer" target="_blank">https://www.youtube.com/watch?v=EL96fXFNLNA</a></p>]]></description><content:encoded><![CDATA[<p>It’s 5:05, on <strong>Thursday, December 8 , 2022. </strong>This is your daily update of open source and cybersecurity news.This is Pokie Huang, coming from the 5:05 offices in New York City. Stories for today come from&nbsp; <strong>Edwin Kwan</strong> in Australia with a report on a third major Australian data breach in three months, <strong>Katy Craig</strong> in California on Deloitte’s 2023 tech trends, <strong>DJ Schleen</strong> in Colorado with SBOM and SLSA <strong>Paulo Gouveia </strong>in Florida talking about Phishing with BeEF and myself reporting on the met opera cyber attack.&nbsp;</p><p>We will start today with Ax Sharma from Manchester, UK, talking about his article on the bias and racism inherent within ChatGPT</p><p>Let’s get to it!</p><p>🇬🇧 <strong>Ax Sharma, Manchester UK</strong></p><p>ChatGPT and its bias</p><p><a href="https://www.bleepingcomputer.com/news/technology/openais-new-chatgpt-bot-10-dangerous-things-its-capable-of/" rel="noopener noreferrer" target="_blank">https://www.bleepingcomputer.com/news/technology/openais-new-chatgpt-bot-10-dangerous-things-its-capable-of/</a></p><p><strong>🇦🇺 Edwin Kwan, Sydney, Australia</strong></p><p>Third major Australian data breach in three months</p><p><a href="https://www.vice.com/en/article/7k8apa/ransomware-gang-steals-employee-and-customer-data-from-lj-hooker" rel="noopener noreferrer" target="_blank">https://www.vice.com/en/article/7k8apa/ransomware-gang-steals-employee-and-customer-data-from-lj-hooker</a></p><p><strong>🇺🇸</strong> <strong>Katy Craig, San Diego, California</strong></p><p><a href="https://www2.deloitte.com/us/en/insights/focus/tech-trends.html?id=us:2el:3pr:diUS175897:eng:di:120722&amp;pkid=1010964#explore" rel="noopener noreferrer" target="_blank">Deloitte 2023 Tech Trends</a></p><p><a href="https://www2.deloitte.com/us/en/insights/focus/tech-trends.html?id=us:2el:3pr:diUS175897:eng:di:120722&amp;pkid=1010964#explore" rel="noopener noreferrer" target="_blank">https://www2.deloitte.com/us/en/insights/focus/tech-trends.html?id=us:2el:3pr:diUS175897:eng:di:120722&amp;pkid=1010964#explore</a></p><p><strong>🇺🇸</strong> <strong>Pokie Huang, New York City</strong></p><p>The Met Opera is under cyber attack</p><p><a href="http://maintenance.metoperafamily.org/" rel="noopener noreferrer" target="_blank">http://maintenance.metoperafamily.org/</a></p><p><a href="https://www.nytimes.com/2022/12/07/arts/met-opera-cyberattack-website.html" rel="noopener noreferrer" target="_blank">https://www.nytimes.com/2022/12/07/arts/met-opera-cyberattack-website.html</a></p><p><a href="https://twitter.com/MetOpera/status/1600626124370972672?s=20&amp;t=KovuANZjFpsPNIUkOmgqCg" rel="noopener noreferrer" target="_blank">https://twitter.com/MetOpera/status/1600626124370972672?s=20&amp;t=KovuANZjFpsPNIUkOmgqCg</a></p><p><strong>🇺🇸</strong> <strong>DJ Schleen, Golden, Colorado</strong></p><p>Add a little spice to your Software Bill of Materials with SLSA</p><p><a href="https://slsa.dev/" rel="noopener noreferrer" target="_blank">https://slsa.dev</a></p><p><a href="https://thenewstack.io/enhance-your-sbom-success-with-slsa/" rel="noopener noreferrer" target="_blank">https://thenewstack.io/enhance-your-sbom-success-with-slsa/</a></p><p><strong>🇺🇸</strong> <strong>Paulo Gouveia, Southwest Ranches, Florida</strong></p><p>Phishing with BeEF</p><p>BeEF - Official Project Websites</p><p>https://beefproject.com/</p><p>https://github.com/beefproject/beef</p><p>Cool Deployment Guides:</p><p>https://www.youtube.com/watch?v=3ogyS4KOlXc</p><p>https://www.linode.com/docs/products/tools/marketplace/guides/beef/</p><p><a href="https://www.youtube.com/watch?v=EL96fXFNLNA" rel="noopener noreferrer" target="_blank">https://www.youtube.com/watch?v=EL96fXFNLNA</a></p>]]></content:encoded><link><![CDATA[https://3zozb9fxlbueipjyapmaas.captivate.fm/episode/episode-29-its-5-05-thursday-december-8-2022]]></link><guid isPermaLink="false">6e3c303f-24a9-4804-b518-0a55c1b83f39</guid><itunes:image href="https://artwork.captivate.fm/07a444e4-7b87-4de1-a7fd-8b3f78a3d269/sYmrxgtvc5w4MZ4ba7wav-hd.png"/><dc:creator><![CDATA[Contributors from Around the World]]></dc:creator><pubDate>Thu, 08 Dec 2022 16:45:00 -0400</pubDate><enclosure url="https://dts.podtrac.com/redirect.mp3/podcasts.captivate.fm/media/aa6591bc-8a14-4fe2-bf28-74712c5105e6/2022-12-08-505-Episode-29-converted.mp3" length="13573269" type="audio/mpeg"/><itunes:duration>11:19</itunes:duration><itunes:explicit>false</itunes:explicit><itunes:episodeType>full</itunes:episodeType><itunes:season>1</itunes:season><itunes:episode>29</itunes:episode><itunes:season>1</itunes:season><podcast:episode>29</podcast:episode><podcast:season>1</podcast:season><itunes:author>Contributors from Around the World</itunes:author></item><item><title>Episode #28 - It&apos;s 5:05, Wednesday, December 7, 2022</title><itunes:title>Episode #28 - It&apos;s 5:05, Wednesday, December 7, 2022</itunes:title><description><![CDATA[<p>It’s 5:05, on <strong>Wednesday, December 7 , 2022. </strong>This is your daily update of open source and cybersecurity news.This is Pokie Huang, coming from the 5:05 offices in New York City. Stories for today come from <strong>Trac Bannon</strong> in Pennsylvania with a report on scamming the digital workforce, <strong>Edwin Kwan</strong> in Australia on how AirAsia poor network organization spared it from future attacks, <strong>Katy Craig</strong> in California on Apple AirTag stalking initial report and DJ Schleen in Colorado with a report on the new version of the Software Bill of Materials vulnerability scanning tool. We are going to start with a story from<strong> Dan Whiting </strong>on his use of AI and Chat GPT</p><p>Let’s get to it!</p><p><strong>🇺🇸</strong> <strong>Dan Whiting, Washington, DC</strong></p><p>ChatGPT Stack Overflow</p><p><a href="https://meta.stackoverflow.com/questions/421831/temporary-policy-chatgpt-is-banned" rel="noopener noreferrer" target="_blank">https://meta.stackoverflow.com/questions/421831/temporary-policy-chatgpt-is-banned</a></p><p><a href="https://openai.com/blog/chatgpt/" rel="noopener noreferrer" target="_blank">https://openai.com/blog/chatgpt/</a></p><p><strong>🇺🇸</strong> <strong>Tracy (Trac) Bannon, Camp Hill, Pennsylvania</strong></p><p>I’m here to help! Scamming the digital workforce.</p><p><a href="https://cybir.com/2022/cve/hijacking-connectwise-control-and-ddos/" rel="noopener noreferrer" target="_blank">https://cybir.com/2022/cve/hijacking-connectwise-control-and-ddos/</a></p><p><a href="https://www.crn.com/news/security/connectwise-patches-critical-flaw-that-could-have-infected-5-000-servers-huntress" rel="noopener noreferrer" target="_blank">https://www.crn.com/news/security/connectwise-patches-critical-flaw-that-could-have-infected-5-000-servers-huntress</a></p><p><strong>🇦🇺 Edwin Kwan, Sydney, Australia</strong></p><p>AirAsia Poor Network Organisation spared it from future attacks</p><p>https://www.databreaches.net/airasia-victim-of-ransomware-attack-passenger-and-employee-data-acquired/</p><p><a href="https://grahamcluley.com/ouch-ransomware-gang-says-it-wont-attack-airasia-again-due-to-the-chaotic-organisation-and-sloppy-security-of-hacked-companys-network/" rel="noopener noreferrer" target="_blank">https://grahamcluley.com/ouch-ransomware-gang-says-it-wont-attack-airasia-again-due-to-the-chaotic-organisation-and-sloppy-security-of-hacked-companys-network/</a></p><p><strong>🇺🇸</strong> <strong>Katy Craig, San Diego, California</strong></p><p>Apple AirTag Stalking Initial Report</p><p><a href="https://www.nytimes.com/2022/02/10/business/apple-airtags-safety.html" rel="noopener noreferrer" target="_blank">https://www.nytimes.com/2022/02/10/business/apple-airtags-safety.html</a></p><p><a href="https://www.bloomberg.com/news/articles/2022-12-06/apple-sued-by-women-over-dangerous-airtag-stalking-by-exes" rel="noopener noreferrer" target="_blank">https://www.bloomberg.com/news/articles/2022-12-06/apple-sued-by-women-over-dangerous-airtag-stalking-by-exes</a>&nbsp;</p><p><a href="https://apps.cand.uscourts.gov/newcasefilings/" rel="noopener noreferrer" target="_blank">https://apps.cand.uscourts.gov/newcasefilings/</a>&nbsp;</p><p>Hughes v. Apple, Inc., 3:22-cv-07668, U.S. District Court, Northern District (not posted yet on the Court filings page)</p><p><strong>🇺🇸</strong> <strong>DJ Schleen, Golden, Colorado</strong></p><p>Software Bill of Materials vulnerability scanning tool “bomber” announces EPSS support</p><p><a href="https://github.com/devops-kung-fu/bomber" rel="noopener noreferrer" target="_blank">https://github.com/devops-kung-fu/bomber</a></p><p><a href="https://first.org/epss" rel="noopener noreferrer" target="_blank">https://first.org/epss</a></p>]]></description><content:encoded><![CDATA[<p>It’s 5:05, on <strong>Wednesday, December 7 , 2022. </strong>This is your daily update of open source and cybersecurity news.This is Pokie Huang, coming from the 5:05 offices in New York City. Stories for today come from <strong>Trac Bannon</strong> in Pennsylvania with a report on scamming the digital workforce, <strong>Edwin Kwan</strong> in Australia on how AirAsia poor network organization spared it from future attacks, <strong>Katy Craig</strong> in California on Apple AirTag stalking initial report and DJ Schleen in Colorado with a report on the new version of the Software Bill of Materials vulnerability scanning tool. We are going to start with a story from<strong> Dan Whiting </strong>on his use of AI and Chat GPT</p><p>Let’s get to it!</p><p><strong>🇺🇸</strong> <strong>Dan Whiting, Washington, DC</strong></p><p>ChatGPT Stack Overflow</p><p><a href="https://meta.stackoverflow.com/questions/421831/temporary-policy-chatgpt-is-banned" rel="noopener noreferrer" target="_blank">https://meta.stackoverflow.com/questions/421831/temporary-policy-chatgpt-is-banned</a></p><p><a href="https://openai.com/blog/chatgpt/" rel="noopener noreferrer" target="_blank">https://openai.com/blog/chatgpt/</a></p><p><strong>🇺🇸</strong> <strong>Tracy (Trac) Bannon, Camp Hill, Pennsylvania</strong></p><p>I’m here to help! Scamming the digital workforce.</p><p><a href="https://cybir.com/2022/cve/hijacking-connectwise-control-and-ddos/" rel="noopener noreferrer" target="_blank">https://cybir.com/2022/cve/hijacking-connectwise-control-and-ddos/</a></p><p><a href="https://www.crn.com/news/security/connectwise-patches-critical-flaw-that-could-have-infected-5-000-servers-huntress" rel="noopener noreferrer" target="_blank">https://www.crn.com/news/security/connectwise-patches-critical-flaw-that-could-have-infected-5-000-servers-huntress</a></p><p><strong>🇦🇺 Edwin Kwan, Sydney, Australia</strong></p><p>AirAsia Poor Network Organisation spared it from future attacks</p><p>https://www.databreaches.net/airasia-victim-of-ransomware-attack-passenger-and-employee-data-acquired/</p><p><a href="https://grahamcluley.com/ouch-ransomware-gang-says-it-wont-attack-airasia-again-due-to-the-chaotic-organisation-and-sloppy-security-of-hacked-companys-network/" rel="noopener noreferrer" target="_blank">https://grahamcluley.com/ouch-ransomware-gang-says-it-wont-attack-airasia-again-due-to-the-chaotic-organisation-and-sloppy-security-of-hacked-companys-network/</a></p><p><strong>🇺🇸</strong> <strong>Katy Craig, San Diego, California</strong></p><p>Apple AirTag Stalking Initial Report</p><p><a href="https://www.nytimes.com/2022/02/10/business/apple-airtags-safety.html" rel="noopener noreferrer" target="_blank">https://www.nytimes.com/2022/02/10/business/apple-airtags-safety.html</a></p><p><a href="https://www.bloomberg.com/news/articles/2022-12-06/apple-sued-by-women-over-dangerous-airtag-stalking-by-exes" rel="noopener noreferrer" target="_blank">https://www.bloomberg.com/news/articles/2022-12-06/apple-sued-by-women-over-dangerous-airtag-stalking-by-exes</a>&nbsp;</p><p><a href="https://apps.cand.uscourts.gov/newcasefilings/" rel="noopener noreferrer" target="_blank">https://apps.cand.uscourts.gov/newcasefilings/</a>&nbsp;</p><p>Hughes v. Apple, Inc., 3:22-cv-07668, U.S. District Court, Northern District (not posted yet on the Court filings page)</p><p><strong>🇺🇸</strong> <strong>DJ Schleen, Golden, Colorado</strong></p><p>Software Bill of Materials vulnerability scanning tool “bomber” announces EPSS support</p><p><a href="https://github.com/devops-kung-fu/bomber" rel="noopener noreferrer" target="_blank">https://github.com/devops-kung-fu/bomber</a></p><p><a href="https://first.org/epss" rel="noopener noreferrer" target="_blank">https://first.org/epss</a></p>]]></content:encoded><link><![CDATA[https://3zozb9fxlbueipjyapmaas.captivate.fm/episode/episode-28-its-5-05-wednesday-december-7-2022]]></link><guid isPermaLink="false">561a5be4-f21b-42e5-9057-6fd6c4505f0e</guid><itunes:image href="https://artwork.captivate.fm/786032a3-e8b9-4442-9d2f-4fb8e52a3d01/M9SgjGgWyYjXRr7J1fBmN2bk.png"/><dc:creator><![CDATA[Contributors from Around the World]]></dc:creator><pubDate>Wed, 07 Dec 2022 16:45:00 -0400</pubDate><enclosure url="https://dts.podtrac.com/redirect.mp3/podcasts.captivate.fm/media/8b508199-ee45-4d1e-9d14-c246c0a1f011/2022-12-07-505-Episode-28-converted.mp3" length="14686085" type="audio/mpeg"/><itunes:duration>12:14</itunes:duration><itunes:explicit>false</itunes:explicit><itunes:episodeType>full</itunes:episodeType><itunes:season>1</itunes:season><itunes:episode>28</itunes:episode><itunes:season>1</itunes:season><podcast:episode>28</podcast:episode><podcast:season>1</podcast:season><itunes:author>Contributors from Around the World</itunes:author></item><item><title>Episode #27 - It&apos;s 5:05, Tuesday, December 6, 2022</title><itunes:title>Episode #27 - It&apos;s 5:05, Tuesday, December 6, 2022</itunes:title><description><![CDATA[<p>It’s 5:05, on <strong>Tuesday, December 6 , 2022. </strong>This is your daily update of open source and cybersecurity news.This is Pokie Huang, coming from the 5:05 offices in New York City. Stories for today come from <strong>Trace Bannon</strong> in Pennsylvania with a follow up report&nbsp; on LastPass breach, <strong>Edwin Kwan</strong> in Australia on compromised Android platform certificates used to sign malware, <strong>Olimpiu Pop</strong> in Romania on Russia coordinates cyberattacks with missile strikes&nbsp; and <strong>Mark Miller</strong> in New York City talking about writing code in with ChatGPT&nbsp;</p><p>Let’s get to it!</p><p><strong>🇺🇸 Tracy (Trac) Bannon, Camp Hill, Pennsylvania&nbsp;</strong></p><p>Flying under the radar?</p><p><a href="https://developers.google.com/search/docs/crawling-indexing/robots-meta-tag" rel="noopener noreferrer" target="_blank">https://developers.google.com/search/docs/crawling-indexing/robots-meta-tag</a></p><p><a href="https://www.goto.com/blog/our-response-to-a-recent-security-incident#" rel="noopener noreferrer" target="_blank">https://www.goto.com/blog/our-response-to-a-recent-security-incident#</a></p><p><strong>🇦🇺 Edwin Kwan, Sydney, Australia</strong></p><p>Compromised Android Platform Certificates Used to Sign Malware</p><p><a href="https://bugs.chromium.org/p/apvi/issues/detail?id=100" rel="noopener noreferrer" target="_blank">https://bugs.chromium.org/p/apvi/issues/detail?id=100</a></p><p><a href="https://www.wired.com/story/android-platform-certificates-malware/" rel="noopener noreferrer" target="_blank">https://www.wired.com/story/android-platform-certificates-malware/</a></p><p><strong>🇷🇴 Olimpiu Pop, Transylvania, Romania</strong></p><p>Russia Coordinates Cyberattacks with missile strikes</p><p><a href="https://www.microsoft.com/en-us/security/blog/2022/10/14/new-prestige-ransomware-impacts-organizations-in-ukraine-and-poland/" rel="noopener noreferrer" target="_blank">https://www.microsoft.com/en-us/security/blog/2022/10/14/new-prestige-ransomware-impacts-organizations-in-ukraine-and-poland/</a></p><p><a href="https://www.goto.com/blog/our-response-to-a-recent-security-incident#" rel="noopener noreferrer" target="_blank">https://www.goto.com/blog/our-response-to-a-recent-security-incident#</a></p><p><strong>🇺🇸</strong> <strong>Mark Miller, New York City</strong></p><p>Writing code in with ChatGPT</p><p>ChatGPT: Optimizing Language Models for Dialogue</p><p><a href="https://openai.com/blog/chatgpt/" rel="noopener noreferrer" target="_blank">https://openai.com/blog/chatgpt/</a></p><p>OpenAI</p><p><a href="https://openai.com/" rel="noopener noreferrer" target="_blank">https://openai.com/</a></p><p>Riley Goodside on Twitter</p><p><a href="https://twitter.com/goodside/status/1598129631609380864" rel="noopener noreferrer" target="_blank">https://twitter.com/goodside/status/1598129631609380864</a></p><p>James Blackwell on Twitter</p><p><a href="https://twitter.com/jwblackwell/status/1598090447854792705" rel="noopener noreferrer" target="_blank">https://twitter.com/jwblackwell/status/1598090447854792705</a></p><p>Amjad Masad on Twitter</p><p><a href="https://twitter.com/amasad/status/1598042665375105024" rel="noopener noreferrer" target="_blank">https://twitter.com/amasad/status/1598042665375105024</a></p>]]></description><content:encoded><![CDATA[<p>It’s 5:05, on <strong>Tuesday, December 6 , 2022. </strong>This is your daily update of open source and cybersecurity news.This is Pokie Huang, coming from the 5:05 offices in New York City. Stories for today come from <strong>Trace Bannon</strong> in Pennsylvania with a follow up report&nbsp; on LastPass breach, <strong>Edwin Kwan</strong> in Australia on compromised Android platform certificates used to sign malware, <strong>Olimpiu Pop</strong> in Romania on Russia coordinates cyberattacks with missile strikes&nbsp; and <strong>Mark Miller</strong> in New York City talking about writing code in with ChatGPT&nbsp;</p><p>Let’s get to it!</p><p><strong>🇺🇸 Tracy (Trac) Bannon, Camp Hill, Pennsylvania&nbsp;</strong></p><p>Flying under the radar?</p><p><a href="https://developers.google.com/search/docs/crawling-indexing/robots-meta-tag" rel="noopener noreferrer" target="_blank">https://developers.google.com/search/docs/crawling-indexing/robots-meta-tag</a></p><p><a href="https://www.goto.com/blog/our-response-to-a-recent-security-incident#" rel="noopener noreferrer" target="_blank">https://www.goto.com/blog/our-response-to-a-recent-security-incident#</a></p><p><strong>🇦🇺 Edwin Kwan, Sydney, Australia</strong></p><p>Compromised Android Platform Certificates Used to Sign Malware</p><p><a href="https://bugs.chromium.org/p/apvi/issues/detail?id=100" rel="noopener noreferrer" target="_blank">https://bugs.chromium.org/p/apvi/issues/detail?id=100</a></p><p><a href="https://www.wired.com/story/android-platform-certificates-malware/" rel="noopener noreferrer" target="_blank">https://www.wired.com/story/android-platform-certificates-malware/</a></p><p><strong>🇷🇴 Olimpiu Pop, Transylvania, Romania</strong></p><p>Russia Coordinates Cyberattacks with missile strikes</p><p><a href="https://www.microsoft.com/en-us/security/blog/2022/10/14/new-prestige-ransomware-impacts-organizations-in-ukraine-and-poland/" rel="noopener noreferrer" target="_blank">https://www.microsoft.com/en-us/security/blog/2022/10/14/new-prestige-ransomware-impacts-organizations-in-ukraine-and-poland/</a></p><p><a href="https://www.goto.com/blog/our-response-to-a-recent-security-incident#" rel="noopener noreferrer" target="_blank">https://www.goto.com/blog/our-response-to-a-recent-security-incident#</a></p><p><strong>🇺🇸</strong> <strong>Mark Miller, New York City</strong></p><p>Writing code in with ChatGPT</p><p>ChatGPT: Optimizing Language Models for Dialogue</p><p><a href="https://openai.com/blog/chatgpt/" rel="noopener noreferrer" target="_blank">https://openai.com/blog/chatgpt/</a></p><p>OpenAI</p><p><a href="https://openai.com/" rel="noopener noreferrer" target="_blank">https://openai.com/</a></p><p>Riley Goodside on Twitter</p><p><a href="https://twitter.com/goodside/status/1598129631609380864" rel="noopener noreferrer" target="_blank">https://twitter.com/goodside/status/1598129631609380864</a></p><p>James Blackwell on Twitter</p><p><a href="https://twitter.com/jwblackwell/status/1598090447854792705" rel="noopener noreferrer" target="_blank">https://twitter.com/jwblackwell/status/1598090447854792705</a></p><p>Amjad Masad on Twitter</p><p><a href="https://twitter.com/amasad/status/1598042665375105024" rel="noopener noreferrer" target="_blank">https://twitter.com/amasad/status/1598042665375105024</a></p>]]></content:encoded><link><![CDATA[https://3zozb9fxlbueipjyapmaas.captivate.fm/episode/episode-27-its-5-05-tuesday-december-6-2022]]></link><guid isPermaLink="false">4dcf64e3-22b3-45dd-b75e-bfb03ee832c4</guid><itunes:image href="https://artwork.captivate.fm/d0a2a5d5-c2b3-4f21-801b-1c48948eb27b/1pGQ-6ungwdfZNfMbg6cL0Gt.png"/><dc:creator><![CDATA[Contributors from Around the World]]></dc:creator><pubDate>Tue, 06 Dec 2022 16:45:00 -0400</pubDate><enclosure url="https://dts.podtrac.com/redirect.mp3/podcasts.captivate.fm/media/485ff660-b32e-4775-9b61-df7aa9c27845/2022-12-06-505-Episode-27-converted.mp3" length="10416110" type="audio/mpeg"/><itunes:duration>08:41</itunes:duration><itunes:explicit>false</itunes:explicit><itunes:episodeType>full</itunes:episodeType><itunes:season>1</itunes:season><itunes:episode>27</itunes:episode><itunes:season>1</itunes:season><podcast:episode>27</podcast:episode><podcast:season>1</podcast:season><itunes:author>Contributors from Around the World</itunes:author></item><item><title>Episode #26 - It&apos;s 5:05, Monday, December 5, 2022</title><itunes:title>Episode #26 - It&apos;s 5:05, Monday, December 5, 2022</itunes:title><description><![CDATA[<p>It’s 5:05, on <strong>Monday, December 5 , 2022. </strong>This is Pokie Huang, coming from the 5:05 offices in New York City. Stories for today come from <strong>Derek Weeks</strong> in Maryland reporting on connected vehicle, <strong>Edwin Kwan</strong> in Australia on Eufy doorbell camera leaking user content to cloud and <strong>Mark Miller</strong> in New York City reporting on how Lensa wants all your data.&nbsp;</p><p>Let’s get to it!</p><p><strong><span class="ql-cursor">﻿</span>🇺🇸</strong> <strong>Derek Weeks, Bethesda, Maryland</strong></p><p>Connectivity sparks curiosity</p><p><a href="https://twitter.com/samwcyo/status/1597792097175674880" rel="noopener noreferrer" target="_blank">https://twitter.com/samwcyo/status/1597792097175674880</a></p><p><br></p><p><strong>🇦🇺 Edwin Kwan, Sydney, Australia</strong></p><p>Eufy Doorbell camera Leaking User Content to Cloud</p><p><a href="https://www.macrumors.com/2022/11/29/eufy-camera-cloud-uploads-no-user-consent/" rel="noopener noreferrer" target="_blank">https://www.macrumors.com/2022/11/29/eufy-camera-cloud-uploads-no-user-consent/</a></p><p><br></p><p><strong>🇺🇸</strong> <strong>Mark Miller, New York City</strong></p><p>Lensa wants your data... all of it</p><p><a href="https://play.google.com/store/apps/datasafety?id=com.lensa.app&amp;gl=US" rel="noopener noreferrer" target="_blank">https://play.google.com/store/apps/datasafety?id=com.lensa.app&amp;gl=US</a></p><p><a href="https://lensa-ai.com/privacy" rel="noopener noreferrer" target="_blank">https://lensa-ai.com/privacy</a></p><p><br></p><p><br></p>]]></description><content:encoded><![CDATA[<p>It’s 5:05, on <strong>Monday, December 5 , 2022. </strong>This is Pokie Huang, coming from the 5:05 offices in New York City. Stories for today come from <strong>Derek Weeks</strong> in Maryland reporting on connected vehicle, <strong>Edwin Kwan</strong> in Australia on Eufy doorbell camera leaking user content to cloud and <strong>Mark Miller</strong> in New York City reporting on how Lensa wants all your data.&nbsp;</p><p>Let’s get to it!</p><p><strong><span class="ql-cursor">﻿</span>🇺🇸</strong> <strong>Derek Weeks, Bethesda, Maryland</strong></p><p>Connectivity sparks curiosity</p><p><a href="https://twitter.com/samwcyo/status/1597792097175674880" rel="noopener noreferrer" target="_blank">https://twitter.com/samwcyo/status/1597792097175674880</a></p><p><br></p><p><strong>🇦🇺 Edwin Kwan, Sydney, Australia</strong></p><p>Eufy Doorbell camera Leaking User Content to Cloud</p><p><a href="https://www.macrumors.com/2022/11/29/eufy-camera-cloud-uploads-no-user-consent/" rel="noopener noreferrer" target="_blank">https://www.macrumors.com/2022/11/29/eufy-camera-cloud-uploads-no-user-consent/</a></p><p><br></p><p><strong>🇺🇸</strong> <strong>Mark Miller, New York City</strong></p><p>Lensa wants your data... all of it</p><p><a href="https://play.google.com/store/apps/datasafety?id=com.lensa.app&amp;gl=US" rel="noopener noreferrer" target="_blank">https://play.google.com/store/apps/datasafety?id=com.lensa.app&amp;gl=US</a></p><p><a href="https://lensa-ai.com/privacy" rel="noopener noreferrer" target="_blank">https://lensa-ai.com/privacy</a></p><p><br></p><p><br></p>]]></content:encoded><link><![CDATA[https://3zozb9fxlbueipjyapmaas.captivate.fm/episode/episode-26-its-5-05-monday-december-5-2022]]></link><guid isPermaLink="false">c5c1b73d-b73f-4fd2-abdc-df5a8c4d30f9</guid><itunes:image href="https://artwork.captivate.fm/48917c40-c712-496d-b135-9b2468bfc1dc/6ET60SYQ6HEgpvayB8aOKs1j.png"/><dc:creator><![CDATA[Contributors from Around the World]]></dc:creator><pubDate>Mon, 05 Dec 2022 16:45:00 -0400</pubDate><enclosure url="https://dts.podtrac.com/redirect.mp3/podcasts.captivate.fm/media/ad0570d5-f125-4ea2-8df2-6a8972775198/2022-12-05-505-Episode-26-converted.mp3" length="8186298" type="audio/mpeg"/><itunes:duration>06:49</itunes:duration><itunes:explicit>false</itunes:explicit><itunes:episodeType>full</itunes:episodeType><itunes:season>1</itunes:season><itunes:episode>26</itunes:episode><itunes:season>1</itunes:season><podcast:episode>26</podcast:episode><podcast:season>1</podcast:season><itunes:author>Contributors from Around the World</itunes:author></item><item><title>Episode #25 - It&apos;s 5:05, Friday, December 2, 2022</title><itunes:title>Episode #25 - It&apos;s 5:05, Friday, December 2, 2022</itunes:title><description><![CDATA[<p>It’s 5:05, on <strong>Friday, December 2, 2022.</strong> Coming from the 5:05 offices in New York City, this is Mark Miller. Stories for today come from <strong>Edwin Kwan</strong> in Sydney Australia who gives an update on the Vanuatu Government which is still offline a month Cyber attack, <strong>Olimpiu Pop</strong> from Transylvania Romania talking about Cybersecurity Investments in the EU, and <strong>Trac Bannon</strong> offering a personal story about the overwhelming nature of password management.&nbsp;</p><p>Today’s episode begins with the final segment in my series on scams focusing on the elderly.&nbsp; I’ll make a few simple suggestions on things your family can do to stay safe from scammers this holiday season.</p><p>Let’s get to it!</p><p><strong>🇺🇸</strong> <strong>Mark Miller, New York City</strong></p><p><strong>It’s not about you anymore. It’s about protecting your family.</strong></p><p><strong>Anatomy of a phone scam</strong></p><p><a href="https://505updates.com/november-29-2022/" rel="noopener noreferrer" target="_blank">https://505updates.com/november-29-2022/</a></p><p><strong>Prizes and Sweepstakes</strong></p><p><a href="https://505updates.com/november-30-2022/" rel="noopener noreferrer" target="_blank">https://505updates.com/november-30-2022/</a></p><p><strong>Holiday scams with giftcards</strong></p><p><a href="https://505updates.com/december-1-2022/" rel="noopener noreferrer" target="_blank">https://505updates.com/december-1-2022/</a></p><p><strong>🇺🇸 Tracy (Trac) Bannon, Camp Hill, Pennsylvania</strong>&nbsp;</p><p>The overwhelming nature of password management: a personal story&nbsp;</p><p><a href="https://www.theverge.com/2022/11/30/23486902/lastpass-hackers-customer-information-breach" rel="noopener noreferrer" target="_blank">https://www.theverge.com/2022/11/30/23486902/lastpass-hackers-customer-information-breach</a></p><p><a href="https://blog.lastpass.com/2022/11/notice-of-recent-security-incident/" rel="noopener noreferrer" target="_blank">https://blog.lastpass.com/2022/11/notice-of-recent-security-incident/</a></p><p><strong>🇷🇴 Olimpiu Pop, Transylvania, Romania</strong></p><p>Cybersecurity Investments in the EU</p><p><a href="https://www.enisa.europa.eu/news/cybersecurity-investments-in-the-eu-is-the-money-enough-to-meet-the-new-cybersecurity-standards" rel="noopener noreferrer" target="_blank">https://www.enisa.europa.eu/news/cybersecurity-investments-in-the-eu-is-the-money-enough-to-meet-the-new-cybersecurity-standards</a></p><p><strong>🇦🇺 Edwin Kwan, Sydney, Australia</strong></p><p>Vanuatu Government still offline after a month Cyber attack</p><p><a href="https://www.theguardian.com/world/2022/nov/29/vanuatu-officials-turn-to-phone-books-and-typewriters-one-month-after-cyber-attack" rel="noopener noreferrer" target="_blank">https://www.theguardian.com/world/2022/nov/29/vanuatu-officials-turn-to-phone-books-and-typewriters-one-month-after-cyber-attack</a></p>]]></description><content:encoded><![CDATA[<p>It’s 5:05, on <strong>Friday, December 2, 2022.</strong> Coming from the 5:05 offices in New York City, this is Mark Miller. Stories for today come from <strong>Edwin Kwan</strong> in Sydney Australia who gives an update on the Vanuatu Government which is still offline a month Cyber attack, <strong>Olimpiu Pop</strong> from Transylvania Romania talking about Cybersecurity Investments in the EU, and <strong>Trac Bannon</strong> offering a personal story about the overwhelming nature of password management.&nbsp;</p><p>Today’s episode begins with the final segment in my series on scams focusing on the elderly.&nbsp; I’ll make a few simple suggestions on things your family can do to stay safe from scammers this holiday season.</p><p>Let’s get to it!</p><p><strong>🇺🇸</strong> <strong>Mark Miller, New York City</strong></p><p><strong>It’s not about you anymore. It’s about protecting your family.</strong></p><p><strong>Anatomy of a phone scam</strong></p><p><a href="https://505updates.com/november-29-2022/" rel="noopener noreferrer" target="_blank">https://505updates.com/november-29-2022/</a></p><p><strong>Prizes and Sweepstakes</strong></p><p><a href="https://505updates.com/november-30-2022/" rel="noopener noreferrer" target="_blank">https://505updates.com/november-30-2022/</a></p><p><strong>Holiday scams with giftcards</strong></p><p><a href="https://505updates.com/december-1-2022/" rel="noopener noreferrer" target="_blank">https://505updates.com/december-1-2022/</a></p><p><strong>🇺🇸 Tracy (Trac) Bannon, Camp Hill, Pennsylvania</strong>&nbsp;</p><p>The overwhelming nature of password management: a personal story&nbsp;</p><p><a href="https://www.theverge.com/2022/11/30/23486902/lastpass-hackers-customer-information-breach" rel="noopener noreferrer" target="_blank">https://www.theverge.com/2022/11/30/23486902/lastpass-hackers-customer-information-breach</a></p><p><a href="https://blog.lastpass.com/2022/11/notice-of-recent-security-incident/" rel="noopener noreferrer" target="_blank">https://blog.lastpass.com/2022/11/notice-of-recent-security-incident/</a></p><p><strong>🇷🇴 Olimpiu Pop, Transylvania, Romania</strong></p><p>Cybersecurity Investments in the EU</p><p><a href="https://www.enisa.europa.eu/news/cybersecurity-investments-in-the-eu-is-the-money-enough-to-meet-the-new-cybersecurity-standards" rel="noopener noreferrer" target="_blank">https://www.enisa.europa.eu/news/cybersecurity-investments-in-the-eu-is-the-money-enough-to-meet-the-new-cybersecurity-standards</a></p><p><strong>🇦🇺 Edwin Kwan, Sydney, Australia</strong></p><p>Vanuatu Government still offline after a month Cyber attack</p><p><a href="https://www.theguardian.com/world/2022/nov/29/vanuatu-officials-turn-to-phone-books-and-typewriters-one-month-after-cyber-attack" rel="noopener noreferrer" target="_blank">https://www.theguardian.com/world/2022/nov/29/vanuatu-officials-turn-to-phone-books-and-typewriters-one-month-after-cyber-attack</a></p>]]></content:encoded><link><![CDATA[https://3zozb9fxlbueipjyapmaas.captivate.fm/episode/episode-25-its-5-05-friday-december-2-2022]]></link><guid isPermaLink="false">992da233-62ae-4c75-8116-96939b484172</guid><itunes:image href="https://artwork.captivate.fm/7debc15f-11ad-4b6e-b089-39b8c904eb03/fVHRqbEps_wnUk4K-kfKrK82.png"/><dc:creator><![CDATA[Contributors from Around the World]]></dc:creator><pubDate>Fri, 02 Dec 2022 16:45:00 -0400</pubDate><enclosure url="https://dts.podtrac.com/redirect.mp3/podcasts.captivate.fm/media/692f7860-c551-4bf8-9079-fdaa9d3d475c/2022-12-02-505-Episode-25-converted.mp3" length="13183522" type="audio/mpeg"/><itunes:duration>10:59</itunes:duration><itunes:explicit>false</itunes:explicit><itunes:episodeType>full</itunes:episodeType><itunes:season>1</itunes:season><itunes:episode>25</itunes:episode><itunes:season>1</itunes:season><podcast:episode>25</podcast:episode><podcast:season>1</podcast:season><itunes:author>Contributors from Around the World</itunes:author></item><item><title>Episode #24 - It&apos;s 5:05, Thursday, December 1, 2022</title><itunes:title>Episode #24 - It&apos;s 5:05, Thursday, December 1, 2022</itunes:title><description><![CDATA[<p>It’s 5:05, on <strong>Thursday, December 1, 2022.</strong> Coming from the 5:05 offices in New York City, this is Mark Miller. Stories for today come from <strong>Edwin Kwan in Sydney Australia on the six gigabytes dump of up to 10 million customer's personal data from Medibank, and Pokie Huang in New York City on the TikTok invisible body challenge.&nbsp;</strong></p><p>I’ll be adding to my continuing series on scams focusing on the elderly. Today’s segment is on holiday scams with gift cards, and the difference of online payments with debit cards vs credit cards..&nbsp;</p><p>Let’s get to it!</p><p><strong>🇺🇸</strong> <strong>Mark Miller, New York City</strong></p><p>Holiday scams against the elderly</p><p>The scammers are coming for you. Here’s how to protect yourself.</p><p><a href="https://www.washingtonpost.com/business/2021/11/24/safe-online-holiday-shopping-tips/" rel="noopener noreferrer" target="_blank">https://www.washingtonpost.com/business/2021/11/24/safe-online-holiday-shopping-tips/</a></p><p><strong>🇺🇸</strong> <strong>Pokie Huang, New York City</strong></p><p>Tiktok invisible challenge</p><p><a href="https://www.techradar.com/news/hackers-are-exploiting-this-new-tiktok-craze-to-push-malware" rel="noopener noreferrer" target="_blank">https://www.techradar.com/news/hackers-are-exploiting-this-new-tiktok-craze-to-push-malware</a></p><p><a href="https://checkmarx.com/blog/attacker-uses-a-popular-tiktok-challenge-to-lure-users-into-installing-malicious-package/" rel="noopener noreferrer" target="_blank">https://checkmarx.com/blog/attacker-uses-a-popular-tiktok-challenge-to-lure-users-into-installing-malicious-package/</a></p><p><strong>🇦🇺 Edwin Kwan, Sydney, Australia</strong></p><p>Largest file dump from Medibank Breach</p><p><a href="https://amp.smh.com.au/business/companies/case-closed-medibank-hackers-release-massive-data-file-20221201-p5c2pu.html" rel="noopener noreferrer" target="_blank">https://amp.smh.com.au/business/companies/case-closed-medibank-hackers-release-massive-data-file-20221201-p5c2pu.html</a></p><p><br></p><p><br></p>]]></description><content:encoded><![CDATA[<p>It’s 5:05, on <strong>Thursday, December 1, 2022.</strong> Coming from the 5:05 offices in New York City, this is Mark Miller. Stories for today come from <strong>Edwin Kwan in Sydney Australia on the six gigabytes dump of up to 10 million customer's personal data from Medibank, and Pokie Huang in New York City on the TikTok invisible body challenge.&nbsp;</strong></p><p>I’ll be adding to my continuing series on scams focusing on the elderly. Today’s segment is on holiday scams with gift cards, and the difference of online payments with debit cards vs credit cards..&nbsp;</p><p>Let’s get to it!</p><p><strong>🇺🇸</strong> <strong>Mark Miller, New York City</strong></p><p>Holiday scams against the elderly</p><p>The scammers are coming for you. Here’s how to protect yourself.</p><p><a href="https://www.washingtonpost.com/business/2021/11/24/safe-online-holiday-shopping-tips/" rel="noopener noreferrer" target="_blank">https://www.washingtonpost.com/business/2021/11/24/safe-online-holiday-shopping-tips/</a></p><p><strong>🇺🇸</strong> <strong>Pokie Huang, New York City</strong></p><p>Tiktok invisible challenge</p><p><a href="https://www.techradar.com/news/hackers-are-exploiting-this-new-tiktok-craze-to-push-malware" rel="noopener noreferrer" target="_blank">https://www.techradar.com/news/hackers-are-exploiting-this-new-tiktok-craze-to-push-malware</a></p><p><a href="https://checkmarx.com/blog/attacker-uses-a-popular-tiktok-challenge-to-lure-users-into-installing-malicious-package/" rel="noopener noreferrer" target="_blank">https://checkmarx.com/blog/attacker-uses-a-popular-tiktok-challenge-to-lure-users-into-installing-malicious-package/</a></p><p><strong>🇦🇺 Edwin Kwan, Sydney, Australia</strong></p><p>Largest file dump from Medibank Breach</p><p><a href="https://amp.smh.com.au/business/companies/case-closed-medibank-hackers-release-massive-data-file-20221201-p5c2pu.html" rel="noopener noreferrer" target="_blank">https://amp.smh.com.au/business/companies/case-closed-medibank-hackers-release-massive-data-file-20221201-p5c2pu.html</a></p><p><br></p><p><br></p>]]></content:encoded><link><![CDATA[https://3zozb9fxlbueipjyapmaas.captivate.fm/episode/episode-24-its-5-05-thursday-december-1-2022]]></link><guid isPermaLink="false">4e8004bf-8112-4184-82b3-9de3bd488b8b</guid><itunes:image href="https://artwork.captivate.fm/1d486e58-2283-49e2-87a8-a8083bca9ad4/2TMx-qI3g36R-jRREE41HoXZ.png"/><dc:creator><![CDATA[Contributors from Around the World]]></dc:creator><pubDate>Thu, 01 Dec 2022 16:45:00 -0400</pubDate><enclosure url="https://dts.podtrac.com/redirect.mp3/podcasts.captivate.fm/media/0a7ddf0d-a4f2-43fd-8a9f-f00a3c93fd52/2022-12-01-505-Episode-24-converted.mp3" length="8458494" type="audio/mpeg"/><itunes:duration>07:03</itunes:duration><itunes:explicit>false</itunes:explicit><itunes:episodeType>full</itunes:episodeType><itunes:season>1</itunes:season><itunes:episode>24</itunes:episode><itunes:season>1</itunes:season><podcast:episode>24</podcast:episode><podcast:season>1</podcast:season><itunes:author>Contributors from Around the World</itunes:author></item><item><title>Episode #23 - It&apos;s 5:05, Wednesday, November 30, 2022</title><itunes:title>Episode #23 - It&apos;s 5:05, Wednesday, November 30, 2022</itunes:title><description><![CDATA[<p>It’s 5:05, on <strong>Wednesday, November 30, 2022.</strong> Coming from the 5:05 offices in New York City, this is Mark Miller on HumpDay here in the US. Stories for today come from <strong>Edwin Kwan in Sydney Australia on Sensitive Information of Australians on Black Market, Trace Bannon in Pennsylvania on FCC’s Ban of Equipment citing National Security Concerns, and Derek Weeks in Bethesda, Maryland reporting on Twitter’s possible use of Signal for encrypting DMs.&nbsp;&nbsp;&nbsp;</strong></p><p>We’ll start today’s episode with a follow up from yesterday’s segment on phone scamming.</p><p>Let’s get to it!</p><p><strong>🇺🇸</strong> <strong>Mark Miller, New York City</strong></p><p>The Top Phone and Email Scams the Elderly Fall For</p><p>Top Ten Scams</p><p><a href="https://fraud.org/top-ten-scams-2021/" rel="noopener noreferrer" target="_blank">https://fraud.org/top-ten-scams-2021/</a></p><p><strong>🇺🇸</strong> <strong>Tracy (Trac) Bannon, Camp Hill, Pennsylvania&nbsp;</strong></p><p>US FCC Bans Equipment citing National Security Concerns</p><p><a href="https://www.fcc.gov/document/fcc-bans-authorizations-devices-pose-national-security-threat" rel="noopener noreferrer" target="_blank">https://www.fcc.gov/document/fcc-bans-authorizations-devices-pose-national-security-threat</a></p><p><a href="https://insidedefense.com/daily-news/industry-groups-urge-lawmakers-cut-china-based-semiconductor-ban-federal-contracts" rel="noopener noreferrer" target="_blank">https://insidedefense.com/daily-news/industry-groups-urge-lawmakers-cut-china-based-semiconductor-ban-federal-contracts</a></p><p><strong>🇦🇺 Edwin Kwan, Sydney, Australia</strong></p><p>Highly Sensitive Information of Australians on Black Market following series of breaches</p><p><a href="https://www.abc.net.au/news/2022-11-28/cyber-black-market-shows-medibank-optus-hack-just-the-surface/101700974" rel="noopener noreferrer" target="_blank">https://www.abc.net.au/news/2022-11-28/cyber-black-market-shows-medibank-optus-hack-just-the-surface/101700974</a></p><p><br></p><p><strong>🇺🇸</strong> <strong>Derek Weeks, Bethesda, Maryland</strong></p><p>Twitter to have Encrypted DMs</p><p>Elon Musk's Twitter to Add Open-Source Signal Protocol for Encrypted DMs</p><p><a href="https://news.itsfoss.com/twitter-signal/" rel="noopener noreferrer" target="_blank">https://news.itsfoss.com/twitter-signal/</a></p><p><br></p><p><br></p><p><br></p>]]></description><content:encoded><![CDATA[<p>It’s 5:05, on <strong>Wednesday, November 30, 2022.</strong> Coming from the 5:05 offices in New York City, this is Mark Miller on HumpDay here in the US. Stories for today come from <strong>Edwin Kwan in Sydney Australia on Sensitive Information of Australians on Black Market, Trace Bannon in Pennsylvania on FCC’s Ban of Equipment citing National Security Concerns, and Derek Weeks in Bethesda, Maryland reporting on Twitter’s possible use of Signal for encrypting DMs.&nbsp;&nbsp;&nbsp;</strong></p><p>We’ll start today’s episode with a follow up from yesterday’s segment on phone scamming.</p><p>Let’s get to it!</p><p><strong>🇺🇸</strong> <strong>Mark Miller, New York City</strong></p><p>The Top Phone and Email Scams the Elderly Fall For</p><p>Top Ten Scams</p><p><a href="https://fraud.org/top-ten-scams-2021/" rel="noopener noreferrer" target="_blank">https://fraud.org/top-ten-scams-2021/</a></p><p><strong>🇺🇸</strong> <strong>Tracy (Trac) Bannon, Camp Hill, Pennsylvania&nbsp;</strong></p><p>US FCC Bans Equipment citing National Security Concerns</p><p><a href="https://www.fcc.gov/document/fcc-bans-authorizations-devices-pose-national-security-threat" rel="noopener noreferrer" target="_blank">https://www.fcc.gov/document/fcc-bans-authorizations-devices-pose-national-security-threat</a></p><p><a href="https://insidedefense.com/daily-news/industry-groups-urge-lawmakers-cut-china-based-semiconductor-ban-federal-contracts" rel="noopener noreferrer" target="_blank">https://insidedefense.com/daily-news/industry-groups-urge-lawmakers-cut-china-based-semiconductor-ban-federal-contracts</a></p><p><strong>🇦🇺 Edwin Kwan, Sydney, Australia</strong></p><p>Highly Sensitive Information of Australians on Black Market following series of breaches</p><p><a href="https://www.abc.net.au/news/2022-11-28/cyber-black-market-shows-medibank-optus-hack-just-the-surface/101700974" rel="noopener noreferrer" target="_blank">https://www.abc.net.au/news/2022-11-28/cyber-black-market-shows-medibank-optus-hack-just-the-surface/101700974</a></p><p><br></p><p><strong>🇺🇸</strong> <strong>Derek Weeks, Bethesda, Maryland</strong></p><p>Twitter to have Encrypted DMs</p><p>Elon Musk's Twitter to Add Open-Source Signal Protocol for Encrypted DMs</p><p><a href="https://news.itsfoss.com/twitter-signal/" rel="noopener noreferrer" target="_blank">https://news.itsfoss.com/twitter-signal/</a></p><p><br></p><p><br></p><p><br></p>]]></content:encoded><link><![CDATA[https://3zozb9fxlbueipjyapmaas.captivate.fm/episode/episode-23-its-5-05-wednesday-november-30-2022]]></link><guid isPermaLink="false">6ddf7bf3-9a5d-4c70-8e41-6d2482b6b159</guid><itunes:image href="https://artwork.captivate.fm/b03cb12a-a6a0-4860-99b0-7cce3eb3eece/Ky9G3VrDrQQdSR1nUTjP94Q8.png"/><dc:creator><![CDATA[Contributors from Around the World]]></dc:creator><pubDate>Wed, 30 Nov 2022 16:45:00 -0400</pubDate><enclosure url="https://dts.podtrac.com/redirect.mp3/podcasts.captivate.fm/media/8ea0fe3d-bf88-4746-8247-9d00cf58d69e/2022-11-30-505-Episode-23-converted.mp3" length="9313010" type="audio/mpeg"/><itunes:duration>09:42</itunes:duration><itunes:explicit>false</itunes:explicit><itunes:episodeType>full</itunes:episodeType><itunes:season>1</itunes:season><itunes:episode>23</itunes:episode><itunes:season>1</itunes:season><podcast:episode>23</podcast:episode><podcast:season>1</podcast:season><itunes:author>Contributors from Around the World</itunes:author></item></channel></rss>