<?xml version="1.0" encoding="UTF-8"?><?xml-stylesheet href="https://feeds.captivate.fm/style.xsl" type="text/xsl"?><rss xmlns:dc="http://purl.org/dc/elements/1.1/" xmlns:content="http://purl.org/rss/1.0/modules/content/" xmlns:atom="http://www.w3.org/2005/Atom" version="2.0" xmlns:googleplay="http://www.google.com/schemas/play-podcasts/1.0" xmlns:itunes="http://www.itunes.com/dtds/podcast-1.0.dtd" xmlns:sy="http://purl.org/rss/1.0/modules/syndication/" xmlns:podcast="https://podcastindex.org/namespace/1.0"><channel><atom:link href="https://feeds.captivate.fm/dtfcyberpodcast/" rel="self" type="application/rss+xml"/><title><![CDATA[DTF Cyber Podcast]]></title><podcast:guid>223ced10-48d9-51cc-a72c-33ecc1018387</podcast:guid><lastBuildDate>Mon, 27 Apr 2026 16:23:32 +0000</lastBuildDate><generator>Captivate.fm</generator><language><![CDATA[en]]></language><copyright><![CDATA[Copyright 2026 Cyber Podcast]]></copyright><managingEditor>Cyber Podcast</managingEditor><itunes:summary><![CDATA[Damian, Troy, and Fern break down the week’s biggest hacks, breaches, and zero-days with zero corporate filter. Expect strong opinions, dark humor, and actionable intel from three pros who’ve been in the trenches. New episodes drop when the news is too wild to ignore.]]></itunes:summary><image><url>https://artwork.captivate.fm/c96b5ddd-98f8-4b1e-87cc-83c1e4ff3eb9/DTF-logo-v3-3kx3k.png</url><title>DTF Cyber Podcast</title><link><![CDATA[https://cyberpodcast.net]]></link></image><itunes:image href="https://artwork.captivate.fm/c96b5ddd-98f8-4b1e-87cc-83c1e4ff3eb9/DTF-logo-v3-3kx3k.png"/><itunes:owner><itunes:name>Cyber Podcast</itunes:name></itunes:owner><itunes:author>Cyber Podcast</itunes:author><description>Damian, Troy, and Fern break down the week’s biggest hacks, breaches, and zero-days with zero corporate filter. Expect strong opinions, dark humor, and actionable intel from three pros who’ve been in the trenches. New episodes drop when the news is too wild to ignore.</description><link>https://cyberpodcast.net</link><atom:link href="https://pubsubhubbub.appspot.com" rel="hub"/><itunes:explicit>false</itunes:explicit><itunes:type>episodic</itunes:type><itunes:category text="News"><itunes:category text="Tech News"/></itunes:category><itunes:category text="Technology"></itunes:category><itunes:category text="Society &amp; Culture"></itunes:category><podcast:locked>no</podcast:locked><podcast:medium>podcast</podcast:medium><item><title>Your Resume is Boring. Here’s Why You’re Still Stuck in Entry-Level</title><itunes:title>Your Resume is Boring. Here’s Why You’re Still Stuck in Entry-Level</itunes:title><description><![CDATA[<p>Is your resume landing in the trash before a human even sees it?</p><p>This week on the DTF Cyber Podcast, Troy, Damian, and Fern get brutally honest about the cybersecurity job market. We aren't just talking about certifications; we're talking about why the standard advice is failing the next generation of cyber professionals.</p><p>Troy reveals why he trashed 48 resumes in one morning, Damian explains why a GitHub repo is worth more than a degree, and Fern asks the questions every job-seeker is thinking but is too afraid to ask. If you're stuck in the entry-level trap, this episode is your roadmap out.</p><p>Don't forget to Like, Subscribe, and hit the Bell to stay ahead of the curve!</p><p>TIMESTAMPS:</p><p>⁠00:00 — Cold Open: Why Degrees Don't Stop Breaches </p><p>01:21 — Tale of Two Cities: The Cyber Bootcamp Reality </p><p>03:14 — The AI Crunch: Reskilling Mid-Flight </p><p>06:15 — Recipe vs. Cooking: Why Certifications Aren't Enough </p><p>08:28 — Project-Based Hiring: What Damian Looks for First </p><p>11:29 — The Debate: Is AI Replacing Human Thought? </p><p>15:12 — Adaptability: Finding Your Spot in the AI Workforce </p><p>20:02 — Proof of Record </p><p>22:18 — Soft Skills: The Differentiator in a Level Playing Field </p><p>23:48 — Bypassing Automated Resume Systems </p><p>27:31 — State of Fear: Lessons from Multi-Million Dollar Firms </p><p>30:15 — Stolen Valor: Spotting Fakes in Cybersecurity </p><p>32:09 — The Failure Interview: What Did You Learn? </p><p>35:13 — Leadership Relations: Building Bridges Before the Fire </p><p>40:36 — Pen Testing: Strategic or Not? </p><p>44:23 — Setting Yourself Apart </p><p>47:08 — The Open Source Debate </p><p>53:42 — Practical Projects: Using YouTube &amp; Portfolios to Stand Out </p><p>1:03:17 — Fern’s Final Thought: Stop Hiding Your Value </p><p>1:04:05 - Episode 41 Anthem</p>]]></description><content:encoded><![CDATA[<p>Is your resume landing in the trash before a human even sees it?</p><p>This week on the DTF Cyber Podcast, Troy, Damian, and Fern get brutally honest about the cybersecurity job market. We aren't just talking about certifications; we're talking about why the standard advice is failing the next generation of cyber professionals.</p><p>Troy reveals why he trashed 48 resumes in one morning, Damian explains why a GitHub repo is worth more than a degree, and Fern asks the questions every job-seeker is thinking but is too afraid to ask. If you're stuck in the entry-level trap, this episode is your roadmap out.</p><p>Don't forget to Like, Subscribe, and hit the Bell to stay ahead of the curve!</p><p>TIMESTAMPS:</p><p>⁠00:00 — Cold Open: Why Degrees Don't Stop Breaches </p><p>01:21 — Tale of Two Cities: The Cyber Bootcamp Reality </p><p>03:14 — The AI Crunch: Reskilling Mid-Flight </p><p>06:15 — Recipe vs. Cooking: Why Certifications Aren't Enough </p><p>08:28 — Project-Based Hiring: What Damian Looks for First </p><p>11:29 — The Debate: Is AI Replacing Human Thought? </p><p>15:12 — Adaptability: Finding Your Spot in the AI Workforce </p><p>20:02 — Proof of Record </p><p>22:18 — Soft Skills: The Differentiator in a Level Playing Field </p><p>23:48 — Bypassing Automated Resume Systems </p><p>27:31 — State of Fear: Lessons from Multi-Million Dollar Firms </p><p>30:15 — Stolen Valor: Spotting Fakes in Cybersecurity </p><p>32:09 — The Failure Interview: What Did You Learn? </p><p>35:13 — Leadership Relations: Building Bridges Before the Fire </p><p>40:36 — Pen Testing: Strategic or Not? </p><p>44:23 — Setting Yourself Apart </p><p>47:08 — The Open Source Debate </p><p>53:42 — Practical Projects: Using YouTube &amp; Portfolios to Stand Out </p><p>1:03:17 — Fern’s Final Thought: Stop Hiding Your Value </p><p>1:04:05 - Episode 41 Anthem</p>]]></content:encoded><link><![CDATA[https://cyberpodcast.net]]></link><guid isPermaLink="false">cbbc6469-32bb-4c11-b3c9-e9c006314f55</guid><itunes:image href="https://artwork.captivate.fm/94220106-55b9-4aac-8a5e-b5c901ef438c/DTF041.jpg"/><pubDate>Mon, 27 Apr 2026 06:00:00 -0700</pubDate><enclosure url="https://episodes.captivate.fm/episode/cbbc6469-32bb-4c11-b3c9-e9c006314f55.mp3" length="97922192" type="audio/mpeg"/><itunes:duration>01:06:38</itunes:duration><itunes:explicit>false</itunes:explicit><itunes:episodeType>full</itunes:episodeType><itunes:episode>41</itunes:episode><podcast:episode>41</podcast:episode><podcast:alternateEnclosure type="video/youtube" title="Your Resume is Boring  Here’s Why You’re Still Stuck in Entry Level"><podcast:source uri="https://youtu.be/OyTTHRdUw60"/></podcast:alternateEnclosure></item><item><title>Anthropic Mythos: The AI That Just Fired Its CISO? | #DTF#040</title><itunes:title>Anthropic Mythos: The AI That Just Fired Its CISO? | #DTF#040</itunes:title><description><![CDATA[<p>Anthropic just changed the rules of the game with "Mythos"—a frontier-tier model that doesn't just find vulnerabilities; it reasons through a 23,000-word "Living Constitution" to decide if it even wants to help you.</p><p>In this milestone Episode 40, Damian, Troy, and Fern dive into Project Glasswing, the secret group of 12 companies given early access to this "digital nuke," and debate whether we are heading toward a future of AI-on-AI warfare. From 72% exploit success rates to AI toilets, we cover the technical, the tactical, and the hysterical.</p><p>Timestamps:</p><p>•⁠ ⁠00:00 – Intro</p><p>•⁠ ⁠02:15 – Project Glasswing: Why is Anthropic gatekeeping Mythos?</p><p>•⁠ ⁠05:39 – The Stats: 72% success in generating working exploits</p><p>•⁠ ⁠13:30 – Damian’s Deep Dive: Why BSD and zero-days are back in the spotlight</p><p>•⁠ ⁠19:40 – The 23,000-Word Constitution: Can AI have ethics?</p><p>•⁠ ⁠28:50 – Troy’s Reality Check: Liability and the "Self-Evolving" rule set</p><p>•⁠ ⁠42:00 – The Great Debate: Should we bury this tech or embrace it?</p><p>•⁠ ⁠50:00 – Fern’s Final Thought: AI toilets and the future of fiber</p>]]></description><content:encoded><![CDATA[<p>Anthropic just changed the rules of the game with "Mythos"—a frontier-tier model that doesn't just find vulnerabilities; it reasons through a 23,000-word "Living Constitution" to decide if it even wants to help you.</p><p>In this milestone Episode 40, Damian, Troy, and Fern dive into Project Glasswing, the secret group of 12 companies given early access to this "digital nuke," and debate whether we are heading toward a future of AI-on-AI warfare. From 72% exploit success rates to AI toilets, we cover the technical, the tactical, and the hysterical.</p><p>Timestamps:</p><p>•⁠ ⁠00:00 – Intro</p><p>•⁠ ⁠02:15 – Project Glasswing: Why is Anthropic gatekeeping Mythos?</p><p>•⁠ ⁠05:39 – The Stats: 72% success in generating working exploits</p><p>•⁠ ⁠13:30 – Damian’s Deep Dive: Why BSD and zero-days are back in the spotlight</p><p>•⁠ ⁠19:40 – The 23,000-Word Constitution: Can AI have ethics?</p><p>•⁠ ⁠28:50 – Troy’s Reality Check: Liability and the "Self-Evolving" rule set</p><p>•⁠ ⁠42:00 – The Great Debate: Should we bury this tech or embrace it?</p><p>•⁠ ⁠50:00 – Fern’s Final Thought: AI toilets and the future of fiber</p>]]></content:encoded><link><![CDATA[https://cyberpodcast.net]]></link><guid isPermaLink="false">7a223264-e6d4-47c4-bdf9-c87b0a701194</guid><itunes:image href="https://artwork.captivate.fm/a32f9e2c-5842-4348-8560-7131bd34cc56/Untitled-design-15.png"/><pubDate>Mon, 13 Apr 2026 09:00:00 -0700</pubDate><enclosure url="https://episodes.captivate.fm/episode/7a223264-e6d4-47c4-bdf9-c87b0a701194.mp3" length="77807224" type="audio/mpeg"/><itunes:duration>53:00</itunes:duration><itunes:explicit>false</itunes:explicit><itunes:episodeType>full</itunes:episodeType><itunes:episode>40</itunes:episode><podcast:episode>40</podcast:episode><podcast:alternateEnclosure type="video/youtube" title="Anthropic Mythos: The AI That Just Fired Its CISO? | #DTF040"><podcast:source uri="https://youtu.be/p-EbTS8uzBo"/></podcast:alternateEnclosure></item><item><title>Your AI Just Spent $50,000: The Shadow AI Agent Nightmare | #DTF039</title><itunes:title>Your AI Just Spent $50,000: The Shadow AI Agent Nightmare | #DTF039</itunes:title><description><![CDATA[<p>In this episode, Damian, Troy, and Fern dive into the 'Wild West' of 2026: Shadow AI.</p><p>From autonomous agents paying unapproved invoices to the rinse and repeat of the 2010 cloud revolution, the team debates whether AI agents are productivity miracles or a liability nightmare for the modern CISO.</p><p>Timestamps:</p><p>⁠00:00 - The $50k Shadow Agent Invoice</p><p>01:02 - Fern’s Nightmare Scenario: The AI Agent in Production</p><p>02:15 - 2010 vs. 2026: Why Shadow AI is the new Shadow IT</p><p>04:14 - Damian’s Technical Deep Dive: The Permission Explosion &amp; Admin Entitlements</p><p>⁠11:08 - The State of the Union: CISO Mandates and the "Chief AI Officer"</p><p>26:10 - Troy’s CISO Perspective: Managing Identity Governance &amp; Global Risk</p><p>40:13 - The Great Debate: Micro-segmentation for AI Agents</p><p>46:49 - Final Verdict: Can You Govern What You Can't See?</p><p>http://cyberpodcast.net</p><p>Spotify: http://spotify.cyberpodcast.net</p><p>Apple: http://apple.cyberpodcast.net</p><p>X: https://x.com/dtfcyberpodcast</p><p>IG: https://www.instagram.com/dtfcyberpodcast/</p><p>Linkedin:</p><p>DTF: https://www.linkedin.com/company/dtf-cyber-podcast/</p><p>Damian: https://www.linkedin.com/in/damianchung/</p><p>Troy: https://www.linkedin.com/in/kosovotroy/</p><p>Fern: https://www.linkedin.com/in/fernrojasaz/</p><p>Business Inquiries:</p><p>dtf at cyberpodcast dot net</p><p>Everything here is our personal hot takes — not our employers, not the vendors we roast, not legal advice. Just three idiots with mics trying to keep you from getting pwned.</p>]]></description><content:encoded><![CDATA[<p>In this episode, Damian, Troy, and Fern dive into the 'Wild West' of 2026: Shadow AI.</p><p>From autonomous agents paying unapproved invoices to the rinse and repeat of the 2010 cloud revolution, the team debates whether AI agents are productivity miracles or a liability nightmare for the modern CISO.</p><p>Timestamps:</p><p>⁠00:00 - The $50k Shadow Agent Invoice</p><p>01:02 - Fern’s Nightmare Scenario: The AI Agent in Production</p><p>02:15 - 2010 vs. 2026: Why Shadow AI is the new Shadow IT</p><p>04:14 - Damian’s Technical Deep Dive: The Permission Explosion &amp; Admin Entitlements</p><p>⁠11:08 - The State of the Union: CISO Mandates and the "Chief AI Officer"</p><p>26:10 - Troy’s CISO Perspective: Managing Identity Governance &amp; Global Risk</p><p>40:13 - The Great Debate: Micro-segmentation for AI Agents</p><p>46:49 - Final Verdict: Can You Govern What You Can't See?</p><p>http://cyberpodcast.net</p><p>Spotify: http://spotify.cyberpodcast.net</p><p>Apple: http://apple.cyberpodcast.net</p><p>X: https://x.com/dtfcyberpodcast</p><p>IG: https://www.instagram.com/dtfcyberpodcast/</p><p>Linkedin:</p><p>DTF: https://www.linkedin.com/company/dtf-cyber-podcast/</p><p>Damian: https://www.linkedin.com/in/damianchung/</p><p>Troy: https://www.linkedin.com/in/kosovotroy/</p><p>Fern: https://www.linkedin.com/in/fernrojasaz/</p><p>Business Inquiries:</p><p>dtf at cyberpodcast dot net</p><p>Everything here is our personal hot takes — not our employers, not the vendors we roast, not legal advice. Just three idiots with mics trying to keep you from getting pwned.</p>]]></content:encoded><link><![CDATA[https://cyberpodcast.net]]></link><guid isPermaLink="false">4d291230-229a-441b-8d92-f200de32cab3</guid><itunes:image href="https://artwork.captivate.fm/f89914db-ae26-4374-94f7-dc23d184eebc/DTF039.png"/><pubDate>Mon, 06 Apr 2026 06:00:00 -0700</pubDate><enclosure url="https://episodes.captivate.fm/episode/4d291230-229a-441b-8d92-f200de32cab3.mp3" length="72710929" type="audio/mpeg"/><itunes:duration>49:52</itunes:duration><itunes:explicit>false</itunes:explicit><itunes:episodeType>full</itunes:episodeType><itunes:episode>39</itunes:episode><podcast:episode>39</podcast:episode><podcast:alternateEnclosure type="video/youtube" title="Your AI Just Spent $50,000: The Shadow AI Agent Nightmare | #DTF039"><podcast:source uri="https://youtu.be/YcyJZevgfAc"/></podcast:alternateEnclosure></item><item><title>The Life and Death Stakes of Healthcare Cybersecurity | #DTF038</title><itunes:title>The Life and Death Stakes of Healthcare Cybersecurity | #DTF038</itunes:title><description><![CDATA[<p>In Episode 38 of the DTF Cyber Podcast, Fern and Troy welcome Healthcare CISO, Bob Schlotfelt. We dive into why an incident at a hospital is fundamentally different from a retail breach. While Damian is out, Bob brings decades of insight into protecting patient safety over just protecting data. We discuss the nightmare of unpatchable medical devices, why compliance doesn't equal security, and the hilarious (but effective) ways to get a nurse's attention for security training.</p><p>Chapter Markers:</p><p>•⁠ ⁠00:00 - Intro: Netflix vs. Banks vs. Hospitals</p><p>•⁠ ⁠01:46 - Introducing Bob, Healthcare CISO</p><p>•⁠ ⁠08:38 - The Threat to Connected Medical Devices</p><p>•⁠ ⁠18:50 - Fixing "Operational Friction" on the Hospital Floor</p><p>•⁠ ⁠34:06 - Security Awareness in the Bathroom Stalls?</p><p>•⁠ ⁠43:09 - Why Compliance (HIPAA) is NOT Security.</p><p>•⁠ ⁠1:01:00 - Telling Truth to Power: Boardroom Advice.</p><p>http://cyberpodcast.net</p><p>Spotify: http://spotify.cyberpodcast.net</p><p>Apple: http://apple.cyberpodcast.net</p><p>X: https://x.com/dtfcyberpodcast</p><p>IG: https://www.instagram.com/dtfcyberpodcast/</p><p>Linkedin:</p><p>DTF: https://www.linkedin.com/company/dtf-cyber-podcast/</p><p>Damian: https://www.linkedin.com/in/damianchung/</p><p>Troy: https://www.linkedin.com/in/kosovotroy/</p><p>Fern: https://www.linkedin.com/in/fernrojasaz/</p><p>Business Inquiries: dtf at cyberpodcast dot net Everything here is our personal hot takes — not our employers, not the vendors we roast, not legal advice. Just three idiots with mics trying to keep you from getting pwned.</p>]]></description><content:encoded><![CDATA[<p>In Episode 38 of the DTF Cyber Podcast, Fern and Troy welcome Healthcare CISO, Bob Schlotfelt. We dive into why an incident at a hospital is fundamentally different from a retail breach. While Damian is out, Bob brings decades of insight into protecting patient safety over just protecting data. We discuss the nightmare of unpatchable medical devices, why compliance doesn't equal security, and the hilarious (but effective) ways to get a nurse's attention for security training.</p><p>Chapter Markers:</p><p>•⁠ ⁠00:00 - Intro: Netflix vs. Banks vs. Hospitals</p><p>•⁠ ⁠01:46 - Introducing Bob, Healthcare CISO</p><p>•⁠ ⁠08:38 - The Threat to Connected Medical Devices</p><p>•⁠ ⁠18:50 - Fixing "Operational Friction" on the Hospital Floor</p><p>•⁠ ⁠34:06 - Security Awareness in the Bathroom Stalls?</p><p>•⁠ ⁠43:09 - Why Compliance (HIPAA) is NOT Security.</p><p>•⁠ ⁠1:01:00 - Telling Truth to Power: Boardroom Advice.</p><p>http://cyberpodcast.net</p><p>Spotify: http://spotify.cyberpodcast.net</p><p>Apple: http://apple.cyberpodcast.net</p><p>X: https://x.com/dtfcyberpodcast</p><p>IG: https://www.instagram.com/dtfcyberpodcast/</p><p>Linkedin:</p><p>DTF: https://www.linkedin.com/company/dtf-cyber-podcast/</p><p>Damian: https://www.linkedin.com/in/damianchung/</p><p>Troy: https://www.linkedin.com/in/kosovotroy/</p><p>Fern: https://www.linkedin.com/in/fernrojasaz/</p><p>Business Inquiries: dtf at cyberpodcast dot net Everything here is our personal hot takes — not our employers, not the vendors we roast, not legal advice. Just three idiots with mics trying to keep you from getting pwned.</p>]]></content:encoded><link><![CDATA[https://cyberpodcast.net]]></link><guid isPermaLink="false">31a25723-e19e-4d5c-bc85-a62ad28694de</guid><itunes:image href="https://artwork.captivate.fm/9a022839-cf46-4e17-a8f6-e12fb520f246/DTF038.png"/><pubDate>Mon, 16 Mar 2026 06:00:00 -0700</pubDate><enclosure url="https://episodes.captivate.fm/episode/31a25723-e19e-4d5c-bc85-a62ad28694de.mp3" length="95152370" type="audio/mpeg"/><itunes:duration>01:04:41</itunes:duration><itunes:explicit>false</itunes:explicit><itunes:episodeType>full</itunes:episodeType><itunes:episode>38</itunes:episode><podcast:episode>38</podcast:episode><podcast:alternateEnclosure type="video/youtube" title="The Life and Death Stakes of Healthcare Cybersecurity | #DTF038"><podcast:source uri="https://youtu.be/BKiThqxaAsw"/></podcast:alternateEnclosure></item><item><title>Cybersecurity Salaries 2026: The &quot;AI Squeeze&quot; is Here | #DTF037</title><itunes:title>Cybersecurity Salaries 2026: The &quot;AI Squeeze&quot; is Here | #DTF037</itunes:title><description><![CDATA[<p>Is the "Cyber Skills Gap" a myth? In this episode, Damian, Troy, and Fern strip away the HR fluff and talk about the cold, hard reality of the 2026 job market. From entry-level SOC roles being "squeezed" by AI to $3.5M CISO roles that come with massive personal liability, we’re breaking down what you’re actually worth and why your resume is likely being ghosted by a bot. </p><p>If you aren't negotiating your insurance and building your own AI tools, you're falling behind. </p><p>THE DEEP DIVE: </p><p>•⁠ ⁠00:00 – Intro</p><p>•⁠ ⁠01:11 – Fern’s 2026 Job Hunt: Why 50 applications led to zero interviews. </p><p>•⁠ ⁠04:20 – The "Skills Gap" Debate: Do companies actually want to hire? </p><p>•⁠ ⁠09:02 – SALARY: The Entry-Level SOC Analyst floor in 2026. </p><p>•⁠ ⁠14:15 – The Grocery Store Phone Call: How networking beats the portal every time. </p><p>•⁠ ⁠19:40 – Damian’s Warning: Why "Prompting" AI makes you obsolete. </p><p>•⁠ ⁠25:10 – The "AI Squeeze": Can a $200 license replace a Tier 1 Analyst? </p><p>•⁠ ⁠31:30 – The Reporting Trap: Why CISOs reporting to CIOs is a massive risk. </p><p>•⁠ ⁠35:41 – SALARY: Engineering, Pen-Testing, and Cloud Security ranges. </p><p>•⁠ ⁠40:11 – The "AI Premium": How to add 20% to your base salary right now. </p><p>•⁠ ⁠41:51 – The "Clearance Bump": Is the polygraph worth the extra $30k? </p><p>•⁠ ⁠43:24 – SALARY: The $3.5 Million CISO—who is actually making this? </p><p>•⁠ ⁠48:50 – D&amp;O Insurance: If you aren't a "Named Director," you aren't protected. </p><p>•⁠ ⁠55:30 – Risk Management vs. "Check-the-box" Compliance. </p><p>•⁠ ⁠01:04:56 – Final Advice: Don't be a holdout for a dead salary. </p><p>EPISODE HIGHLIGHTS: </p><p>•⁠ ⁠The AI Squeeze: Troy explains why entry-level salaries are stagnating as automation handles the "low-hanging fruit." </p><p>•⁠ ⁠Building vs. Prompting: Damian breaks down why the "Prompt Engineer" is a temporary role—you need to build the infrastructure to survive. </p><p>•⁠ ⁠Executive Liability: Why you should never take a CISO role without checking the company's Directors and Officers (D&amp;O) insurance policy. </p><p>Are you seeing these salary shifts in your neck of the woods? Drop a comment below with your role and your 2026 outlook. </p><p>#Cybersecurity #CISO #TechSalaries #AI #CareerAdvice #DTFPodcast #CyberJobs </p><p>http://cyberpodcast.net </p><p>Spotify: http://spotify.cyberpodcast.net </p><p>Apple: http://apple.cyberpodcast.net </p><p>X: https://x.com/dtfcyberpodcast </p><p>IG: https://www.instagram.com/dtfcyberpodcast/ </p><p>Linkedin: </p><p>DTF: https://www.linkedin.com/company/dtf-cyber-podcast/ </p><p>Damian: https://www.linkedin.com/in/damianchung/ </p><p>Troy: https://www.linkedin.com/in/kosovotroy/ </p><p>Fern: https://www.linkedin.com/in/fernrojasaz/ </p><p>Business Inquiries: dtf at cyberpodcast dot net </p><p>Everything here is our personal hot takes — not our employers, not the vendors we roast, not legal advice. Just three idiots with mics trying to keep you from getting pwned.</p>]]></description><content:encoded><![CDATA[<p>Is the "Cyber Skills Gap" a myth? In this episode, Damian, Troy, and Fern strip away the HR fluff and talk about the cold, hard reality of the 2026 job market. From entry-level SOC roles being "squeezed" by AI to $3.5M CISO roles that come with massive personal liability, we’re breaking down what you’re actually worth and why your resume is likely being ghosted by a bot. </p><p>If you aren't negotiating your insurance and building your own AI tools, you're falling behind. </p><p>THE DEEP DIVE: </p><p>•⁠ ⁠00:00 – Intro</p><p>•⁠ ⁠01:11 – Fern’s 2026 Job Hunt: Why 50 applications led to zero interviews. </p><p>•⁠ ⁠04:20 – The "Skills Gap" Debate: Do companies actually want to hire? </p><p>•⁠ ⁠09:02 – SALARY: The Entry-Level SOC Analyst floor in 2026. </p><p>•⁠ ⁠14:15 – The Grocery Store Phone Call: How networking beats the portal every time. </p><p>•⁠ ⁠19:40 – Damian’s Warning: Why "Prompting" AI makes you obsolete. </p><p>•⁠ ⁠25:10 – The "AI Squeeze": Can a $200 license replace a Tier 1 Analyst? </p><p>•⁠ ⁠31:30 – The Reporting Trap: Why CISOs reporting to CIOs is a massive risk. </p><p>•⁠ ⁠35:41 – SALARY: Engineering, Pen-Testing, and Cloud Security ranges. </p><p>•⁠ ⁠40:11 – The "AI Premium": How to add 20% to your base salary right now. </p><p>•⁠ ⁠41:51 – The "Clearance Bump": Is the polygraph worth the extra $30k? </p><p>•⁠ ⁠43:24 – SALARY: The $3.5 Million CISO—who is actually making this? </p><p>•⁠ ⁠48:50 – D&amp;O Insurance: If you aren't a "Named Director," you aren't protected. </p><p>•⁠ ⁠55:30 – Risk Management vs. "Check-the-box" Compliance. </p><p>•⁠ ⁠01:04:56 – Final Advice: Don't be a holdout for a dead salary. </p><p>EPISODE HIGHLIGHTS: </p><p>•⁠ ⁠The AI Squeeze: Troy explains why entry-level salaries are stagnating as automation handles the "low-hanging fruit." </p><p>•⁠ ⁠Building vs. Prompting: Damian breaks down why the "Prompt Engineer" is a temporary role—you need to build the infrastructure to survive. </p><p>•⁠ ⁠Executive Liability: Why you should never take a CISO role without checking the company's Directors and Officers (D&amp;O) insurance policy. </p><p>Are you seeing these salary shifts in your neck of the woods? Drop a comment below with your role and your 2026 outlook. </p><p>#Cybersecurity #CISO #TechSalaries #AI #CareerAdvice #DTFPodcast #CyberJobs </p><p>http://cyberpodcast.net </p><p>Spotify: http://spotify.cyberpodcast.net </p><p>Apple: http://apple.cyberpodcast.net </p><p>X: https://x.com/dtfcyberpodcast </p><p>IG: https://www.instagram.com/dtfcyberpodcast/ </p><p>Linkedin: </p><p>DTF: https://www.linkedin.com/company/dtf-cyber-podcast/ </p><p>Damian: https://www.linkedin.com/in/damianchung/ </p><p>Troy: https://www.linkedin.com/in/kosovotroy/ </p><p>Fern: https://www.linkedin.com/in/fernrojasaz/ </p><p>Business Inquiries: dtf at cyberpodcast dot net </p><p>Everything here is our personal hot takes — not our employers, not the vendors we roast, not legal advice. Just three idiots with mics trying to keep you from getting pwned.</p>]]></content:encoded><link><![CDATA[https://cyberpodcast.net]]></link><guid isPermaLink="false">40cfb7b3-4618-4787-bc0a-d717da2911ee</guid><itunes:image href="https://artwork.captivate.fm/7a6fd3f2-b038-4d67-ac99-1e66e0704545/Untitled-design-3.jpg"/><pubDate>Mon, 09 Mar 2026 07:00:00 -0700</pubDate><enclosure url="https://episodes.captivate.fm/episode/40cfb7b3-4618-4787-bc0a-d717da2911ee.mp3" length="96884635" type="audio/mpeg"/><itunes:duration>01:06:06</itunes:duration><itunes:explicit>false</itunes:explicit><itunes:episodeType>full</itunes:episodeType><itunes:episode>37</itunes:episode><podcast:episode>37</podcast:episode></item><item><title>Why Your Tech Won’t Save You: The Human ROI of Cyber Security | Dom Vogel #DTF036</title><itunes:title>Why Your Tech Won’t Save You: The Human ROI of Cyber Security | Dom Vogel #DTF036</itunes:title><description><![CDATA[<p>Chances are you’ve got the best tech money can buy, the latest AI, and the biggest firewalls—but you’re still losing. In this episode of the DTF Cyber Podcast, Damian and Fern sit down with Vancouver-based leadership coach and "positivity troll" Dom Vogel to discuss why the weakest link in cybersecurity isn’t a line of code, it’s the person behind the keyboard.</p><p>We’re ignoring the hardware today to focus on the Human Side of Security. Dom shares his 20+ years of experience transitioning from corporate burnout to coaching cyber leaders on empathy, branding, and "connected leadership" in the AI era.</p><p>In this episode, we dive into:</p><p>* The CIO Branding Problem: A real-world story of how a helpdesk’s "likability index" changed a CEO’s perception of IT.</p><p>* The 1,000 Applicant Crisis: Why junior roles are getting overwhelmed and how to "short-circuit" the online application black hole.</p><p>* Certs vs. Communication: Why technical certifications are now "table stakes" and how soft skills are the real differentiator in 2026.</p><p>* Authentic Leadership: Why vulnerability is a leader’s most powerful tool for building trust and mental resiliency within teams.</p><p>* Personal Brand vs. Reputation: Understanding the "visceral emotional reaction" people have to your name.</p><p>Connect with Dom Vogel:</p><p>LinkedIn: https://www.linkedin.com/in/domvogel/</p><p>Website: https://www.vogelleadershipcoaching.com</p><p>Subscribe to DTF Cyber: Don't miss our upcoming deep dive into 2026 Cyber Salaries and the "AI Premium" in Episode 37!</p><p>Video Timestamps</p><p>00:00 – The Weakest Link: Tech vs. Humans</p><p>02:18 – Meet Dom Vogel: The Ball Cap &amp; Beard Guy</p><p>03:33 – The CIO Branding Problem: A Helpdesk Story</p><p>06:12 – Translating Risk into "Boardroom Conversation"</p><p>08:12 – The 1,000 Applicant Problem: Standing Out in Noise</p><p>10:07 – Why Applying Online is a "Black Hole"</p><p>12:23 – Technical Skills are Now "Table Stakes"</p><p>14:51 – Photography &amp; Networking: Fern’s Origin Story</p><p>19:05 – Stop Investing Only in Certs</p><p>21:07 – Vulnerability: A Leader’s Most Powerful Tool</p><p>24:42 – Story: The Helpdesk Manager Who Loved Marketing</p><p>28:01 – Will AI Replace the Human Craving for Interaction?</p><p>33:32 – Creating Psychological Safety in Your Team</p><p>37:56 – The Janitor Test: How to Hire for Culture Fit</p><p>42:07 – Operational Leverage: Reinvesting in Your People</p><p>47:28 – The "Soft Skills" Payday: Why CISOs Need Sales Training</p><p>51:06 – Remote Work vs. Office: The Choice Matters</p><p>55:30 – What is a "Positivity Troll"?</p><p>59:54 – Personal Brand vs. Reputation: What They Say When You Leave</p><p>01:05:02 – How Content Creation Leads to Job Offers</p><p>http://cyberpodcast.net</p><p>Spotify: http://spotify.cyberpodcast.net</p><p>Apple: http://apple.cyberpodcast.net</p><p>X: https://x.com/dtfcyberpodcast</p><p>IG: https://www.instagram.com/dtfcyberpodcast/</p><p>Linkedin:</p><p>DTF: https://www.linkedin.com/company/dtf-cyber-podcast/</p><p>Damian: https://www.linkedin.com/in/damianchung/</p><p>Troy: https://www.linkedin.com/in/kosovotroy/</p><p>Fern: https://www.linkedin.com/in/fernrojasaz/</p><p>Business Inquiries: dtf at cyberpodcast dot net</p><p>Everything here is our personal hot takes — not our employers, not the vendors we roast, not legal advice. Just three idiots with mics trying to keep you from getting pwned.</p>]]></description><content:encoded><![CDATA[<p>Chances are you’ve got the best tech money can buy, the latest AI, and the biggest firewalls—but you’re still losing. In this episode of the DTF Cyber Podcast, Damian and Fern sit down with Vancouver-based leadership coach and "positivity troll" Dom Vogel to discuss why the weakest link in cybersecurity isn’t a line of code, it’s the person behind the keyboard.</p><p>We’re ignoring the hardware today to focus on the Human Side of Security. Dom shares his 20+ years of experience transitioning from corporate burnout to coaching cyber leaders on empathy, branding, and "connected leadership" in the AI era.</p><p>In this episode, we dive into:</p><p>* The CIO Branding Problem: A real-world story of how a helpdesk’s "likability index" changed a CEO’s perception of IT.</p><p>* The 1,000 Applicant Crisis: Why junior roles are getting overwhelmed and how to "short-circuit" the online application black hole.</p><p>* Certs vs. Communication: Why technical certifications are now "table stakes" and how soft skills are the real differentiator in 2026.</p><p>* Authentic Leadership: Why vulnerability is a leader’s most powerful tool for building trust and mental resiliency within teams.</p><p>* Personal Brand vs. Reputation: Understanding the "visceral emotional reaction" people have to your name.</p><p>Connect with Dom Vogel:</p><p>LinkedIn: https://www.linkedin.com/in/domvogel/</p><p>Website: https://www.vogelleadershipcoaching.com</p><p>Subscribe to DTF Cyber: Don't miss our upcoming deep dive into 2026 Cyber Salaries and the "AI Premium" in Episode 37!</p><p>Video Timestamps</p><p>00:00 – The Weakest Link: Tech vs. Humans</p><p>02:18 – Meet Dom Vogel: The Ball Cap &amp; Beard Guy</p><p>03:33 – The CIO Branding Problem: A Helpdesk Story</p><p>06:12 – Translating Risk into "Boardroom Conversation"</p><p>08:12 – The 1,000 Applicant Problem: Standing Out in Noise</p><p>10:07 – Why Applying Online is a "Black Hole"</p><p>12:23 – Technical Skills are Now "Table Stakes"</p><p>14:51 – Photography &amp; Networking: Fern’s Origin Story</p><p>19:05 – Stop Investing Only in Certs</p><p>21:07 – Vulnerability: A Leader’s Most Powerful Tool</p><p>24:42 – Story: The Helpdesk Manager Who Loved Marketing</p><p>28:01 – Will AI Replace the Human Craving for Interaction?</p><p>33:32 – Creating Psychological Safety in Your Team</p><p>37:56 – The Janitor Test: How to Hire for Culture Fit</p><p>42:07 – Operational Leverage: Reinvesting in Your People</p><p>47:28 – The "Soft Skills" Payday: Why CISOs Need Sales Training</p><p>51:06 – Remote Work vs. Office: The Choice Matters</p><p>55:30 – What is a "Positivity Troll"?</p><p>59:54 – Personal Brand vs. Reputation: What They Say When You Leave</p><p>01:05:02 – How Content Creation Leads to Job Offers</p><p>http://cyberpodcast.net</p><p>Spotify: http://spotify.cyberpodcast.net</p><p>Apple: http://apple.cyberpodcast.net</p><p>X: https://x.com/dtfcyberpodcast</p><p>IG: https://www.instagram.com/dtfcyberpodcast/</p><p>Linkedin:</p><p>DTF: https://www.linkedin.com/company/dtf-cyber-podcast/</p><p>Damian: https://www.linkedin.com/in/damianchung/</p><p>Troy: https://www.linkedin.com/in/kosovotroy/</p><p>Fern: https://www.linkedin.com/in/fernrojasaz/</p><p>Business Inquiries: dtf at cyberpodcast dot net</p><p>Everything here is our personal hot takes — not our employers, not the vendors we roast, not legal advice. Just three idiots with mics trying to keep you from getting pwned.</p>]]></content:encoded><link><![CDATA[https://cyberpodcast.net]]></link><guid isPermaLink="false">fba05eb2-bbf6-4f7a-a5be-73de93088586</guid><itunes:image href="https://artwork.captivate.fm/e009b9c1-a8d4-4f3d-8500-e8a4482f875b/DTF036-audio.png"/><pubDate>Mon, 02 Mar 2026 07:00:00 -0700</pubDate><enclosure url="https://episodes.captivate.fm/episode/fba05eb2-bbf6-4f7a-a5be-73de93088586.mp3" length="105639950" type="audio/mpeg"/><itunes:duration>01:12:52</itunes:duration><itunes:explicit>false</itunes:explicit><itunes:episodeType>full</itunes:episodeType><itunes:episode>36</itunes:episode><podcast:episode>36</podcast:episode><podcast:alternateEnclosure type="video/youtube" title="Why Your Tech Won’t Save You: The Human ROI of Cyber Security | Dom Vogel #DTF036"><podcast:source uri="https://youtu.be/psD1-hdEWzU"/></podcast:alternateEnclosure></item><item><title>72 Hours to Report or Else: The New Compliance Nightmare</title><itunes:title>72 Hours to Report or Else: The New Compliance Nightmare</itunes:title><description><![CDATA[<p>In this episode, Damian, Troy, and Fern dive into the heated controversy surrounding new federal reporting mandates. We explore the "Feds vs. Firewalls" dynamic: does mandatory reporting actually help stop the bad guys, or is it just a massive resource drain on teams already fighting for their lives?</p><p>We break down the 72-hour reporting window for significant incidents and the even tighter 24-hour requirement if you decide to pay a ransom. From the ambiguity of what defines a "significant incident" to the personal liability risks for CISOs, we’re looking at the real-world implications of these 2026 directives.</p><p>Key topics include:</p><p>* The struggle between immediate threat response and mandatory paperwork.</p><p>* How the SBA size threshold might pull 30,000 "non-critical" companies into these rules.</p><p>* The "minimum viable content" framework for initial reports.</p><p>* Why the "don’t pay" mantra is harder to follow when human lives are on the line.</p><p>Timestamps</p><p>00:00 – Intro</p><p>02:46 – The Car Crash Analogy: Should you call 911 or save the body?</p><p>03:55 – Defining Critical Infrastructure: Telecom, Energy, and Gas.</p><p>04:41 – The Ticking Clock: Does the 72 hours start at detection or declaration?</p><p>05:15 – The 24-Hour Ransom Rule: What happens if you pay?</p><p>06:48 – Private Sector Concerns: Will this extend beyond the 16 critical sectors?</p><p>09:34 – The Executive War Room: Who is responsible for the communications?</p><p>10:47 – Partnering with the FBI: Intel sharing vs. criminal investigation</p><p>12:23 – Global Context: The EU’s 24-hour "Early Warning" requirement</p><p>15:03 – The Resource Drain: Why incident responders are in revolt</p><p>16:59 – CISA vs. FBI: Simplifying the reporting paperwork</p><p>20:49 – The ROI of Reporting: What’s in it for the private company?</p><p>21:49 – The 30,000 Entity Controversy: Mid-sized companies as "covered entities"</p><p>25:56 – Cyber Awareness: Learning from past incidents to prevent future attacks</p><p>28:56 – "Minimum Viable Content": Reporting when facts are still changing</p><p>34:00 – Legal Risks: Consent to search and "anything you say can be used against you"</p><p>36:59 – The "Office Space" Effect: Bureaucracy vs. Collaboration.</p><p>40:41 – Voluntary vs. Mandated: The role of ISACs and InfraGard.</p><p>48:22 – The Moral Dilemma: Why outlawing ransom payments is complicated</p><p>51:13 – 2026 Deadlines: Upcoming CISA Town Halls and feedback loops.</p><p>54:33 – Career Implications: Will GRC finally get the respect it deserves?</p><p>http://cyberpodcast.net</p><p>Spotify: http://spotify.cyberpodcast.net</p><p>Apple: http://apple.cyberpodcast.net</p><p>X: https://x.com/dtfcyberpodcast</p><p>IG: https://www.instagram.com/dtfcyberpodcast/</p><p>Linkedin:</p><p>DTF: https://www.linkedin.com/company/dtf-cyber-podcast/</p><p>Damian: https://www.linkedin.com/in/damianchung/</p><p>Troy: https://www.linkedin.com/in/kosovotroy/</p><p>Fern: https://www.linkedin.com/in/fernrojasaz/</p><p>Business Inquiries: dtf at cyberpodcast dot net</p><p>Everything here is our personal hot takes — not our employers, not the vendors we roast, not legal advice. Just three idiots with mics trying to keep you from getting pwned.</p>]]></description><content:encoded><![CDATA[<p>In this episode, Damian, Troy, and Fern dive into the heated controversy surrounding new federal reporting mandates. We explore the "Feds vs. Firewalls" dynamic: does mandatory reporting actually help stop the bad guys, or is it just a massive resource drain on teams already fighting for their lives?</p><p>We break down the 72-hour reporting window for significant incidents and the even tighter 24-hour requirement if you decide to pay a ransom. From the ambiguity of what defines a "significant incident" to the personal liability risks for CISOs, we’re looking at the real-world implications of these 2026 directives.</p><p>Key topics include:</p><p>* The struggle between immediate threat response and mandatory paperwork.</p><p>* How the SBA size threshold might pull 30,000 "non-critical" companies into these rules.</p><p>* The "minimum viable content" framework for initial reports.</p><p>* Why the "don’t pay" mantra is harder to follow when human lives are on the line.</p><p>Timestamps</p><p>00:00 – Intro</p><p>02:46 – The Car Crash Analogy: Should you call 911 or save the body?</p><p>03:55 – Defining Critical Infrastructure: Telecom, Energy, and Gas.</p><p>04:41 – The Ticking Clock: Does the 72 hours start at detection or declaration?</p><p>05:15 – The 24-Hour Ransom Rule: What happens if you pay?</p><p>06:48 – Private Sector Concerns: Will this extend beyond the 16 critical sectors?</p><p>09:34 – The Executive War Room: Who is responsible for the communications?</p><p>10:47 – Partnering with the FBI: Intel sharing vs. criminal investigation</p><p>12:23 – Global Context: The EU’s 24-hour "Early Warning" requirement</p><p>15:03 – The Resource Drain: Why incident responders are in revolt</p><p>16:59 – CISA vs. FBI: Simplifying the reporting paperwork</p><p>20:49 – The ROI of Reporting: What’s in it for the private company?</p><p>21:49 – The 30,000 Entity Controversy: Mid-sized companies as "covered entities"</p><p>25:56 – Cyber Awareness: Learning from past incidents to prevent future attacks</p><p>28:56 – "Minimum Viable Content": Reporting when facts are still changing</p><p>34:00 – Legal Risks: Consent to search and "anything you say can be used against you"</p><p>36:59 – The "Office Space" Effect: Bureaucracy vs. Collaboration.</p><p>40:41 – Voluntary vs. Mandated: The role of ISACs and InfraGard.</p><p>48:22 – The Moral Dilemma: Why outlawing ransom payments is complicated</p><p>51:13 – 2026 Deadlines: Upcoming CISA Town Halls and feedback loops.</p><p>54:33 – Career Implications: Will GRC finally get the respect it deserves?</p><p>http://cyberpodcast.net</p><p>Spotify: http://spotify.cyberpodcast.net</p><p>Apple: http://apple.cyberpodcast.net</p><p>X: https://x.com/dtfcyberpodcast</p><p>IG: https://www.instagram.com/dtfcyberpodcast/</p><p>Linkedin:</p><p>DTF: https://www.linkedin.com/company/dtf-cyber-podcast/</p><p>Damian: https://www.linkedin.com/in/damianchung/</p><p>Troy: https://www.linkedin.com/in/kosovotroy/</p><p>Fern: https://www.linkedin.com/in/fernrojasaz/</p><p>Business Inquiries: dtf at cyberpodcast dot net</p><p>Everything here is our personal hot takes — not our employers, not the vendors we roast, not legal advice. Just three idiots with mics trying to keep you from getting pwned.</p>]]></content:encoded><link><![CDATA[https://cyberpodcast.net]]></link><guid isPermaLink="false">43347df4-8b77-4b12-8eae-170a8fcfbe2c</guid><itunes:image href="https://artwork.captivate.fm/5ed7afc8-7288-4715-9564-9f8d5df3650a/DTF035-AUdio.png"/><pubDate>Mon, 23 Feb 2026 07:00:00 -0700</pubDate><enclosure url="https://episodes.captivate.fm/episode/43347df4-8b77-4b12-8eae-170a8fcfbe2c.mp3" length="93642378" type="audio/mpeg"/><itunes:duration>01:03:47</itunes:duration><itunes:explicit>false</itunes:explicit><itunes:episodeType>full</itunes:episodeType><itunes:episode>35</itunes:episode><podcast:episode>35</podcast:episode><podcast:alternateEnclosure type="video/youtube" title="72 Hours to Report or Else: The New Compliance Nightmare | #DTF035"><podcast:source uri="https://youtu.be/koaTMuK25OY"/></podcast:alternateEnclosure></item><item><title>OpenClaw: The Dangerous Evolution of Autonomous AI Agents</title><itunes:title>OpenClaw: The Dangerous Evolution of Autonomous AI Agents</itunes:title><description><![CDATA[<p>In this episode of the DTF Cyber Podcast, Damian, Troy , and Fern dive into the rapid and often confusing shift from tools like Clawdbot to Moltbot and finally OpenClaw. They discuss why these autonomous agents are more than just a productivity trend—they represent a significant new attack surface for the modern enterprise.</p><p>From the "Toddler with a Chainsaw" analogy to the risk of "Shadow AI" in the workplace, we break down the security implications of giving AI bots unfettered access to your network and credentials.</p><p>00:00 – Intro</p><p>01:19 – The rebranding maze: From Clawdbot to OpenClaw</p><p>02:35 – What is an AI bot? First impressions of autonomous control</p><p>05:02 – The "Poor Installation" risk and isolated environments</p><p>07:21 – The "Age of Ultron" scenario: Efficiency vs. Security</p><p>08:45 – Privacy concerns: Bots with access to banking and travel rewards</p><p>10:15 – The Starbucks test: Automation vs. user friction</p><p>12:15 – When AI goes rogue: Extortion and covering tracks in closed environments</p><p>16:04 – Third-party AI risk and the lifespan of autonomous agents</p><p>18:24 – Shadow AI: Bots as the new high-tech "mouse jiggler"</p><p>20:19 – Inherited Identity: When bots gain your admin privileges</p><p>21:40 – Advice for Organizations: How to check your environment for OpenClaw</p><p>26:36 – A nightmare for the SoC: Signals, logs, and new attack surfaces</p><p>28:53 – 6,000 actions a minute: Why human analysts can't keep up</p><p>37:38 – The "Toddler with a Chainsaw" warning</p><p>42:07 – Action Items: Three steps to secure AI in your organization</p><p>55:35 – Lessons from outages: Why you shouldn't "open the world" on day one!</p>]]></description><content:encoded><![CDATA[<p>In this episode of the DTF Cyber Podcast, Damian, Troy , and Fern dive into the rapid and often confusing shift from tools like Clawdbot to Moltbot and finally OpenClaw. They discuss why these autonomous agents are more than just a productivity trend—they represent a significant new attack surface for the modern enterprise.</p><p>From the "Toddler with a Chainsaw" analogy to the risk of "Shadow AI" in the workplace, we break down the security implications of giving AI bots unfettered access to your network and credentials.</p><p>00:00 – Intro</p><p>01:19 – The rebranding maze: From Clawdbot to OpenClaw</p><p>02:35 – What is an AI bot? First impressions of autonomous control</p><p>05:02 – The "Poor Installation" risk and isolated environments</p><p>07:21 – The "Age of Ultron" scenario: Efficiency vs. Security</p><p>08:45 – Privacy concerns: Bots with access to banking and travel rewards</p><p>10:15 – The Starbucks test: Automation vs. user friction</p><p>12:15 – When AI goes rogue: Extortion and covering tracks in closed environments</p><p>16:04 – Third-party AI risk and the lifespan of autonomous agents</p><p>18:24 – Shadow AI: Bots as the new high-tech "mouse jiggler"</p><p>20:19 – Inherited Identity: When bots gain your admin privileges</p><p>21:40 – Advice for Organizations: How to check your environment for OpenClaw</p><p>26:36 – A nightmare for the SoC: Signals, logs, and new attack surfaces</p><p>28:53 – 6,000 actions a minute: Why human analysts can't keep up</p><p>37:38 – The "Toddler with a Chainsaw" warning</p><p>42:07 – Action Items: Three steps to secure AI in your organization</p><p>55:35 – Lessons from outages: Why you shouldn't "open the world" on day one!</p>]]></content:encoded><link><![CDATA[https://cyberpodcast.net]]></link><guid isPermaLink="false">8f8baff7-9c10-423d-830d-cacde6be75de</guid><itunes:image href="https://artwork.captivate.fm/97614a9b-205f-47cf-91e3-53b8932542d2/dtf034-2.jpg"/><pubDate>Mon, 16 Feb 2026 08:00:00 -0700</pubDate><enclosure url="https://episodes.captivate.fm/episode/8f8baff7-9c10-423d-830d-cacde6be75de.mp3" length="85682501" type="audio/mpeg"/><itunes:duration>57:12</itunes:duration><itunes:explicit>false</itunes:explicit><itunes:episodeType>full</itunes:episodeType><itunes:episode>34</itunes:episode><podcast:episode>34</podcast:episode></item><item><title>When the World is on Fire: Mental Health and Cyber Incidents</title><itunes:title>When the World is on Fire: Mental Health and Cyber Incidents</itunes:title><description><![CDATA[<p>Is the constant wave of alerts keeping you up at 3 a.m.?</p><p>In this episode of the DTF Cyber Podcast, industry veterans Damian, Troy, and Fern dive deep into the reality of mental health and burnout in the cybersecurity industry. Special guest CISO, Vito Rocco jumps deep into this conversation.</p><p>With 78% of professionals feeling stressed out and 62% citing alert overload as a primary cause, it's clear the industry needs a culture shift. We discuss the pressures of catastrophic risk , the fear of missing critical alerts, and actionable strategies for leaders and analysts to combat fatigue—from tuning systems to building empathy.</p><p>Plus, we explore the importance of diverse leadership and setting personal boundaries in a 24/7 world. If you are feeling stressed out and think you need help, please don't go through it alone—seek support from friends, leadership, or a mental health professional.</p><p>Timestamps:</p><p>00:00 - Intro: The reality of cybersecurity exhaustion.</p><p>04:19 - 78% of the industry is stressed: The anticipation and reality of major incidents. 07:33 - The hidden stress of the SOC: Alert overload, perfectionism, and the fear of missing the "big one."</p><p>12:50 - Building the pipeline: Training talent from within vs. hunting for unicorns. 15:06 - Beating alert fatigue: How to automate, tune the noise, and grow from entry-level to senior analyst.</p><p>18:24 - Burnout isn't just about workload: Why empathy and recognition from leadership matter.</p><p>23:05 - Building a support system: The importance of therapy and talking it out.</p><p>25:05 - Leadership strategies: Connecting with your team beyond transactional work. 35:37 - Why you must use your PTO (and the trap of "Unlimited PTO").</p><p>42:25 - Setting personal boundaries and managing communication in a 24/7 global team.</p><p>53:07 - Using turnover rates as a measurement for team health.</p><p>1:07:48 - The power of diverse leadership and the rise of female CISOs.</p><p>1:18:01 - Conclusion and final thoughts on seeking help.</p><p>http://cyberpodcast.net</p><p>Spotify: http://spotify.cyberpodcast.net</p><p>Apple: http://apple.cyberpodcast.net</p><p>X: https://x.com/dtfcyberpodcast</p><p>IG: https://www.instagram.com/dtfcyberpodcast/</p><p>Linkedin:</p><p>DTF: https://www.linkedin.com/company/dtf-cyber-podcast/</p><p>Damian: https://www.linkedin.com/in/damianchung/</p><p>Troy: https://www.linkedin.com/in/kosovotroy/</p><p>Fern: https://www.linkedin.com/in/fernrojasaz/</p><p>Business Inquiries: dtf at cyberpodcast dot net</p><p>Everything here is our personal hot takes — not our employers, not the vendors we roast, not legal advice. Just three idiots with mics trying to keep you from getting pwned.</p>]]></description><content:encoded><![CDATA[<p>Is the constant wave of alerts keeping you up at 3 a.m.?</p><p>In this episode of the DTF Cyber Podcast, industry veterans Damian, Troy, and Fern dive deep into the reality of mental health and burnout in the cybersecurity industry. Special guest CISO, Vito Rocco jumps deep into this conversation.</p><p>With 78% of professionals feeling stressed out and 62% citing alert overload as a primary cause, it's clear the industry needs a culture shift. We discuss the pressures of catastrophic risk , the fear of missing critical alerts, and actionable strategies for leaders and analysts to combat fatigue—from tuning systems to building empathy.</p><p>Plus, we explore the importance of diverse leadership and setting personal boundaries in a 24/7 world. If you are feeling stressed out and think you need help, please don't go through it alone—seek support from friends, leadership, or a mental health professional.</p><p>Timestamps:</p><p>00:00 - Intro: The reality of cybersecurity exhaustion.</p><p>04:19 - 78% of the industry is stressed: The anticipation and reality of major incidents. 07:33 - The hidden stress of the SOC: Alert overload, perfectionism, and the fear of missing the "big one."</p><p>12:50 - Building the pipeline: Training talent from within vs. hunting for unicorns. 15:06 - Beating alert fatigue: How to automate, tune the noise, and grow from entry-level to senior analyst.</p><p>18:24 - Burnout isn't just about workload: Why empathy and recognition from leadership matter.</p><p>23:05 - Building a support system: The importance of therapy and talking it out.</p><p>25:05 - Leadership strategies: Connecting with your team beyond transactional work. 35:37 - Why you must use your PTO (and the trap of "Unlimited PTO").</p><p>42:25 - Setting personal boundaries and managing communication in a 24/7 global team.</p><p>53:07 - Using turnover rates as a measurement for team health.</p><p>1:07:48 - The power of diverse leadership and the rise of female CISOs.</p><p>1:18:01 - Conclusion and final thoughts on seeking help.</p><p>http://cyberpodcast.net</p><p>Spotify: http://spotify.cyberpodcast.net</p><p>Apple: http://apple.cyberpodcast.net</p><p>X: https://x.com/dtfcyberpodcast</p><p>IG: https://www.instagram.com/dtfcyberpodcast/</p><p>Linkedin:</p><p>DTF: https://www.linkedin.com/company/dtf-cyber-podcast/</p><p>Damian: https://www.linkedin.com/in/damianchung/</p><p>Troy: https://www.linkedin.com/in/kosovotroy/</p><p>Fern: https://www.linkedin.com/in/fernrojasaz/</p><p>Business Inquiries: dtf at cyberpodcast dot net</p><p>Everything here is our personal hot takes — not our employers, not the vendors we roast, not legal advice. Just three idiots with mics trying to keep you from getting pwned.</p>]]></content:encoded><link><![CDATA[https://cyberpodcast.net]]></link><guid isPermaLink="false">cca812dc-0520-48fa-89e2-a9f6ece530eb</guid><itunes:image href="https://artwork.captivate.fm/8b8ae223-bf06-460e-ac7a-232f41eebb0e/DTF033.png"/><pubDate>Mon, 02 Feb 2026 07:00:00 -0700</pubDate><enclosure url="https://episodes.captivate.fm/episode/cca812dc-0520-48fa-89e2-a9f6ece530eb.mp3" length="119960042" type="audio/mpeg"/><itunes:duration>01:22:02</itunes:duration><itunes:explicit>false</itunes:explicit><itunes:episodeType>full</itunes:episodeType><itunes:episode>33</itunes:episode><podcast:episode>33</podcast:episode></item><item><title>8 Ways to Jumpstart Your Cybersecurity Career in 2026 | #DTF032</title><itunes:title>8 Ways to Jumpstart Your Cybersecurity Career in 2026 | #DTF032</itunes:title><description><![CDATA[<p>2026 is here, and the cybersecurity job market is evolving. Whether you are trying to break into the industry or land your next senior role, the playbook has changed.</p><p>In this episode of the DTF Cyber Podcast, Fern and Troy are joined by Gary Perkins (CISO at CISO Global) to break down 8 actionable steps you can take right now to jumpstart your career. From building public red team projects to mastering new attack toolchains like the Flipper Zero, we cover the technical and soft skills that hiring managers actually look for.</p><p>We also dive into why networking is your #1 asset, how to contribute to open source projects, and why "learning to script" is non-negotiable for modern security pros.</p><p>🚀 In this episode, we cover:</p><p>Why you need a public GitHub portfolio (even if you aren't a dev).</p><p>How to legally perform "hunts" in your current job to gain experience.</p><p>The difference between "scripting" and "developing" and why Python/Bash helps.</p><p>Why reading non-cyber books can actually make you a better CISO.</p><p><br></p><p>👇 Jump to the 8 Career Hacks:</p><p>00:00:00 - Intro: Welcome back to 2026!</p><p>00:01:02 - Meet Gary Perkins, CISO at CISO Global</p><p>00:07:43 - #1: Build One Public Red Team Project Quarterly</p><p>00:14:00 - #2: Master a New Attack Toolchain (Flipper Zero, Bloodhound, etc.)</p><p>00:21:16 - #3: Contribute to Open Source Security Projects</p><p>00:29:16 - #4: Perform a Weekly Hunt in a Real Environment</p><p>00:43:35 - #5: Learn to Script Your Own Tools (Python &amp; Bash)</p><p>00:51:18 - #6: Network Like Your Career Depends On It</p><p>01:02:17 - #7: Read a Non-Cyber Book (The Phoenix Project, Leaders Eat Last)</p><p>01:07:42 - #8: Teach Something Publicly</p><p>01:16:20 - Bonus Resource: The Threat Intelligence Support Unit (TISU) Cohort</p><p><br></p><p>📚 Resources &amp; Mentions:</p><p><br></p><p>Book: The Phoenix Project</p><p><br></p><p>Book: Leaders Eat Last by Simon Sinek</p><p><br></p><p>Organization: Threat Intelligence Support Unit (TISU) - Free Cybersecurity Cohort</p><p>https://www.eventcreate.com/e/tisu8</p><p><br></p><p>Connect with the Guest: Gary Perkins (CISO Global)</p><p>https://www.linkedin.com/in/perkinsgary/</p><p><br></p><p>Subscribe for more no-nonsense cyber insights! #Cybersecurity #InfoSec #CareerAdvice #RedTeam #BlueTeam #CISO #TechCareers #2026</p><p><br></p><p><br></p><p><br></p><p>http://cyberpodcast.net</p><p><br></p><p>Spotify: http://spotify.cyberpodcast.net</p><p>Apple: http://apple.cyberpodcast.net</p><p>X: https://x.com/dtfcyberpodcast</p><p>IG: https://www.instagram.com/dtfcyberpodcast/</p><p>Linkedin:</p><p>DTF: https://www.linkedin.com/company/dtf-cyber-podcast/</p><p>Damian: https://www.linkedin.com/in/damianchung/</p><p>Troy: https://www.linkedin.com/in/kosovotroy/</p><p>Fern: https://www.linkedin.com/in/fernrojasaz/</p><p><br></p><p>Business Inquiries: dtf at cyberpodcast dot net</p><p><br></p><p>Everything here is our personal hot takes — not our employers, not the vendors we roast, not legal advice. Just three idiots with mics trying to keep you from getting pwned.</p>]]></description><content:encoded><![CDATA[<p>2026 is here, and the cybersecurity job market is evolving. Whether you are trying to break into the industry or land your next senior role, the playbook has changed.</p><p>In this episode of the DTF Cyber Podcast, Fern and Troy are joined by Gary Perkins (CISO at CISO Global) to break down 8 actionable steps you can take right now to jumpstart your career. From building public red team projects to mastering new attack toolchains like the Flipper Zero, we cover the technical and soft skills that hiring managers actually look for.</p><p>We also dive into why networking is your #1 asset, how to contribute to open source projects, and why "learning to script" is non-negotiable for modern security pros.</p><p>🚀 In this episode, we cover:</p><p>Why you need a public GitHub portfolio (even if you aren't a dev).</p><p>How to legally perform "hunts" in your current job to gain experience.</p><p>The difference between "scripting" and "developing" and why Python/Bash helps.</p><p>Why reading non-cyber books can actually make you a better CISO.</p><p><br></p><p>👇 Jump to the 8 Career Hacks:</p><p>00:00:00 - Intro: Welcome back to 2026!</p><p>00:01:02 - Meet Gary Perkins, CISO at CISO Global</p><p>00:07:43 - #1: Build One Public Red Team Project Quarterly</p><p>00:14:00 - #2: Master a New Attack Toolchain (Flipper Zero, Bloodhound, etc.)</p><p>00:21:16 - #3: Contribute to Open Source Security Projects</p><p>00:29:16 - #4: Perform a Weekly Hunt in a Real Environment</p><p>00:43:35 - #5: Learn to Script Your Own Tools (Python &amp; Bash)</p><p>00:51:18 - #6: Network Like Your Career Depends On It</p><p>01:02:17 - #7: Read a Non-Cyber Book (The Phoenix Project, Leaders Eat Last)</p><p>01:07:42 - #8: Teach Something Publicly</p><p>01:16:20 - Bonus Resource: The Threat Intelligence Support Unit (TISU) Cohort</p><p><br></p><p>📚 Resources &amp; Mentions:</p><p><br></p><p>Book: The Phoenix Project</p><p><br></p><p>Book: Leaders Eat Last by Simon Sinek</p><p><br></p><p>Organization: Threat Intelligence Support Unit (TISU) - Free Cybersecurity Cohort</p><p>https://www.eventcreate.com/e/tisu8</p><p><br></p><p>Connect with the Guest: Gary Perkins (CISO Global)</p><p>https://www.linkedin.com/in/perkinsgary/</p><p><br></p><p>Subscribe for more no-nonsense cyber insights! #Cybersecurity #InfoSec #CareerAdvice #RedTeam #BlueTeam #CISO #TechCareers #2026</p><p><br></p><p><br></p><p><br></p><p>http://cyberpodcast.net</p><p><br></p><p>Spotify: http://spotify.cyberpodcast.net</p><p>Apple: http://apple.cyberpodcast.net</p><p>X: https://x.com/dtfcyberpodcast</p><p>IG: https://www.instagram.com/dtfcyberpodcast/</p><p>Linkedin:</p><p>DTF: https://www.linkedin.com/company/dtf-cyber-podcast/</p><p>Damian: https://www.linkedin.com/in/damianchung/</p><p>Troy: https://www.linkedin.com/in/kosovotroy/</p><p>Fern: https://www.linkedin.com/in/fernrojasaz/</p><p><br></p><p>Business Inquiries: dtf at cyberpodcast dot net</p><p><br></p><p>Everything here is our personal hot takes — not our employers, not the vendors we roast, not legal advice. Just three idiots with mics trying to keep you from getting pwned.</p>]]></content:encoded><link><![CDATA[https://cyberpodcast.net]]></link><guid isPermaLink="false">ca66b8fa-1518-4b53-8c1b-7a8ccd4492a2</guid><itunes:image href="https://artwork.captivate.fm/29f99aba-6450-4b00-9939-6896e892c9cc/DTF32-Pod-2.png"/><pubDate>Mon, 19 Jan 2026 09:00:00 -0700</pubDate><enclosure url="https://episodes.captivate.fm/episode/ca66b8fa-1518-4b53-8c1b-7a8ccd4492a2.mp3" length="112745340" type="audio/mpeg"/><itunes:duration>01:18:17</itunes:duration><itunes:explicit>false</itunes:explicit><itunes:episodeType>full</itunes:episodeType><itunes:episode>32</itunes:episode><podcast:episode>32</podcast:episode><podcast:chapters url="https://transcripts.captivate.fm/chapter-7887aa68-93e2-41f9-b058-d82892836360.json" type="application/json+chapters"/><podcast:alternateEnclosure type="video/youtube" title="8 Ways to Jumpstart Your Cybersecurity Career in 2026 | #DTF032"><podcast:source uri="https://youtu.be/snal0q8HSKo"/></podcast:alternateEnclosure></item><item><title>2026 Cyber Predictions: AI Agents, Record Ransomware &amp; Deepfake Disasters | DTF#031</title><itunes:title>2026 Cyber Predictions: AI Agents, Record Ransomware &amp; Deepfake Disasters | DTF#031</itunes:title><description><![CDATA[<p>Is 2026 the year AI takes over everything—including the crimes? 🤖💸</p><p>In the final episode of 2025, Damian and Troy break down their Top 8 Cyber Predictions for 2026. From AI agents executing 90% of breaches to ransomware payouts potentially hitting half a billion dollars, the future of cybersecurity is moving fast. We also discuss the "Harvest Now, Decrypt Later" threat, why your LinkedIn profile picture might already be a lie, and the new $150k entry-level salary standard.</p><p>Plus, we’re ending the year with a GIVEAWAY! 🎁 Drop your 2026 prediction in the comments—for every 10 predictions we receive, we’re picking a winner for some exclusive (and secret) DTF Cyber swag.</p><p>In this episode, we cover:</p><p>Why AI agents (not humans) will be behind 9 out of 10 breaches.</p><p>The terrifying potential for a $500M ransomware payout.</p><p>How deepfakes will finally cause a major real-world crisis.</p><p>"AI Laundering": The new frontier for cleaning dirty crypto.</p><p>Why entry-level cyber jobs are hitting $150k salaries (and the catch).</p><p>🔔 Subscribe for more unfiltered cybersecurity insights!</p><p><br></p><p>⏱️ TIMESTAMPS:</p><p><br></p><p>00:00 – Intro: Did AI change the world in 2025?</p><p>01:58 – Prediction #1: 90% of breaches will be executed by AI Agents.</p><p>07:40 – Prediction #2: Ransomware payouts will break records ($500M?!).</p><p>15:15 – Prediction #3: Identity becomes the central pillar (Passkeys backfire?).</p><p>20:00 – Prediction #4: A deepfake event will hit major global news.</p><p>24:45 – Prediction #5: "Harvest Now, Decrypt Later" goes mainstream.</p><p>28:40 – Prediction #6: Mandatory AI Agent audits for federal contractors.</p><p>32:30 – Prediction #7: "AI Laundering" becomes the new money laundering.</p><p>38:15 – Prediction #8: Entry-level AI Cyber jobs will start at $150k.</p><p>45:00 – Bonus Prediction: The consolidation of massive data analytics.</p><p>47:00 – GIVEAWAY DETAILS: How to win exclusive swag!</p><p><br></p><p>#CyberSecurity #AIPredictions #Ransomware #Deepfakes #TechTrends2026 #InfoSec #Podcast #DTFCyber #AI</p>]]></description><content:encoded><![CDATA[<p>Is 2026 the year AI takes over everything—including the crimes? 🤖💸</p><p>In the final episode of 2025, Damian and Troy break down their Top 8 Cyber Predictions for 2026. From AI agents executing 90% of breaches to ransomware payouts potentially hitting half a billion dollars, the future of cybersecurity is moving fast. We also discuss the "Harvest Now, Decrypt Later" threat, why your LinkedIn profile picture might already be a lie, and the new $150k entry-level salary standard.</p><p>Plus, we’re ending the year with a GIVEAWAY! 🎁 Drop your 2026 prediction in the comments—for every 10 predictions we receive, we’re picking a winner for some exclusive (and secret) DTF Cyber swag.</p><p>In this episode, we cover:</p><p>Why AI agents (not humans) will be behind 9 out of 10 breaches.</p><p>The terrifying potential for a $500M ransomware payout.</p><p>How deepfakes will finally cause a major real-world crisis.</p><p>"AI Laundering": The new frontier for cleaning dirty crypto.</p><p>Why entry-level cyber jobs are hitting $150k salaries (and the catch).</p><p>🔔 Subscribe for more unfiltered cybersecurity insights!</p><p><br></p><p>⏱️ TIMESTAMPS:</p><p><br></p><p>00:00 – Intro: Did AI change the world in 2025?</p><p>01:58 – Prediction #1: 90% of breaches will be executed by AI Agents.</p><p>07:40 – Prediction #2: Ransomware payouts will break records ($500M?!).</p><p>15:15 – Prediction #3: Identity becomes the central pillar (Passkeys backfire?).</p><p>20:00 – Prediction #4: A deepfake event will hit major global news.</p><p>24:45 – Prediction #5: "Harvest Now, Decrypt Later" goes mainstream.</p><p>28:40 – Prediction #6: Mandatory AI Agent audits for federal contractors.</p><p>32:30 – Prediction #7: "AI Laundering" becomes the new money laundering.</p><p>38:15 – Prediction #8: Entry-level AI Cyber jobs will start at $150k.</p><p>45:00 – Bonus Prediction: The consolidation of massive data analytics.</p><p>47:00 – GIVEAWAY DETAILS: How to win exclusive swag!</p><p><br></p><p>#CyberSecurity #AIPredictions #Ransomware #Deepfakes #TechTrends2026 #InfoSec #Podcast #DTFCyber #AI</p>]]></content:encoded><link><![CDATA[https://cyberpodcast.net]]></link><guid isPermaLink="false">6afa958d-f348-4aed-9ef7-ca825405b385</guid><itunes:image href="https://artwork.captivate.fm/93cba5ed-210c-4f43-87ad-f64883d4c529/DTF031-pod-thumb.png"/><pubDate>Wed, 24 Dec 2025 09:00:00 -0700</pubDate><enclosure url="https://episodes.captivate.fm/episode/6afa958d-f348-4aed-9ef7-ca825405b385.mp3" length="73852164" type="audio/mpeg"/><itunes:duration>49:15</itunes:duration><itunes:explicit>false</itunes:explicit><itunes:episodeType>full</itunes:episodeType><itunes:episode>31</itunes:episode><podcast:episode>31</podcast:episode><podcast:alternateEnclosure type="video/youtube" title="2026 Cyber Predictions: AI Agents, Record Ransomware &amp; Deepfake Disasters | #DTF031"><podcast:source uri="https://youtu.be/eBBEbyZyWhU"/></podcast:alternateEnclosure></item><item><title>The Ultimate Cybersecurity Gift Guide (Under $100, $200 &amp; Unlimited) #DTF030</title><itunes:title>The Ultimate Cybersecurity Gift Guide (Under $100, $200 &amp; Unlimited) #DTF030</itunes:title><description><![CDATA[<p>The 2025 Cyber Christmas List That Actually Gets You Hired</p><p>Happy holidays, nerds!</p><p><br></p><p>Your mom just spent $79 on a “hacker hoodie” that says “Trust Me” in Comic Sans…</p><p><br></p><p>…while real juniors are out here making six figures with a $29 Yubikey and a Raspberry Pi.</p><p><br></p><p>In Episode 30, Damian, Troy &amp; Fern save your Christmas with the only cyber gifts worth buying in 2025:</p><p><br></p><p>•  Under $50 stocking stuffers that turn into paychecks</p><p>•  $50–$150 tools that get you interviews</p><p>•  $150–$300 big wins that scream “I’m serious”</p><p>•  Free gifts that slap harder than anything paid</p><p>•  And the absolute coal you should burn before anyone unwraps it</p><p><br></p><p>Timestamps</p><p><br></p><p>00:00 Intro: The "Hacker Hoodie"</p><p>01:37 Why "Hacker" Clothing is Bad OpSec</p><p>06:01 The Worst Gifts: "Hacking for Dummies"</p><p>08:59 Beware of Knockoff Tools &amp; Malware</p><p>12:15 Danger: Pre-loaded Hacking USBs</p><p>13:49 Best Gifts Under $100</p><p>14:00 Book Rec: The Hardware Hacker</p><p>14:20 YubiKeys for MFA</p><p>16:21 Lockpicking Sets &amp; Physical Pen Testing</p><p>21:42 USB Rubber Ducky</p><p>23:25 USB Data Blockers (Juice Jacking Protection)</p><p>25:05 RFID Blocking Wallets</p><p>28:06 Raspberry Pi Projects (Honeypots &amp; VPNs)</p><p>28:45 Best Gifts $100 - $200</p><p>30:30 Packet Squirrel: Man-in-the-Middle Attacks</p><p>34:20 Flipper Zero: Radio Frequencies &amp; Rolling Codes</p><p>39:34 Certifications: Security+ &amp; Network+</p><p>44:24 Cloud Credits &amp; AI Subscriptions</p><p>46:26 Unlimited Budget Gifts</p><p>47:25 Black Hat &amp; DefCon Tickets</p><p>48:14 Mac vs. Windows vs. Linux for Hacking</p><p>51:53 Giveaway: The "Hacker" Hoodie</p><p>57:58 Holiday Security Warning</p><p><br></p><p>Giveaway: Comment your dream (or worst) cyber gift — we’ll randomly pick one subscriber for a genuine “hacker” hoodie (minimum 10 comments).</p><p><br></p><p>Everything here is our personal hot takes — not our employers, not legal advice.</p><p>Just three idiots with mics trying to keep you from bad gifts.</p><p><br></p><p>— Damian, Troy &amp; Fern</p><p>DTF Cyber Podcast</p><p><br></p><p>#CyberGifts #Christmas2025 #CyberSecurity #Infosec #Career</p><p><br></p><p>http://cyberpodcast.net</p><p><br></p><p>Spotify: http://spotify.cyberpodcast.net</p><p>Apple: http://apple.cyberpodcast.net</p><p>X: https://x.com/dtfcyberpodcast</p><p>IG: https://www.instagram.com/dtfcyberpodcast/</p><p>Linkedin:</p><p>DTF: https://www.linkedin.com/company/dtf-cyber-podcast/</p><p>Damian: https://www.linkedin.com/in/damianchung/</p><p>Troy: https://www.linkedin.com/in/kosovotroy/</p><p>Fern: https://www.linkedin.com/in/fernrojasaz/</p><p><br></p><p>Business Inquiries: dtf at cyberpodcast dot net</p><p><br></p><p>Everything here is our personal hot takes — not our employers, not the vendors we roast, not legal advice. Just three idiots with mics trying to keep you from getting pwned.</p>]]></description><content:encoded><![CDATA[<p>The 2025 Cyber Christmas List That Actually Gets You Hired</p><p>Happy holidays, nerds!</p><p><br></p><p>Your mom just spent $79 on a “hacker hoodie” that says “Trust Me” in Comic Sans…</p><p><br></p><p>…while real juniors are out here making six figures with a $29 Yubikey and a Raspberry Pi.</p><p><br></p><p>In Episode 30, Damian, Troy &amp; Fern save your Christmas with the only cyber gifts worth buying in 2025:</p><p><br></p><p>•  Under $50 stocking stuffers that turn into paychecks</p><p>•  $50–$150 tools that get you interviews</p><p>•  $150–$300 big wins that scream “I’m serious”</p><p>•  Free gifts that slap harder than anything paid</p><p>•  And the absolute coal you should burn before anyone unwraps it</p><p><br></p><p>Timestamps</p><p><br></p><p>00:00 Intro: The "Hacker Hoodie"</p><p>01:37 Why "Hacker" Clothing is Bad OpSec</p><p>06:01 The Worst Gifts: "Hacking for Dummies"</p><p>08:59 Beware of Knockoff Tools &amp; Malware</p><p>12:15 Danger: Pre-loaded Hacking USBs</p><p>13:49 Best Gifts Under $100</p><p>14:00 Book Rec: The Hardware Hacker</p><p>14:20 YubiKeys for MFA</p><p>16:21 Lockpicking Sets &amp; Physical Pen Testing</p><p>21:42 USB Rubber Ducky</p><p>23:25 USB Data Blockers (Juice Jacking Protection)</p><p>25:05 RFID Blocking Wallets</p><p>28:06 Raspberry Pi Projects (Honeypots &amp; VPNs)</p><p>28:45 Best Gifts $100 - $200</p><p>30:30 Packet Squirrel: Man-in-the-Middle Attacks</p><p>34:20 Flipper Zero: Radio Frequencies &amp; Rolling Codes</p><p>39:34 Certifications: Security+ &amp; Network+</p><p>44:24 Cloud Credits &amp; AI Subscriptions</p><p>46:26 Unlimited Budget Gifts</p><p>47:25 Black Hat &amp; DefCon Tickets</p><p>48:14 Mac vs. Windows vs. Linux for Hacking</p><p>51:53 Giveaway: The "Hacker" Hoodie</p><p>57:58 Holiday Security Warning</p><p><br></p><p>Giveaway: Comment your dream (or worst) cyber gift — we’ll randomly pick one subscriber for a genuine “hacker” hoodie (minimum 10 comments).</p><p><br></p><p>Everything here is our personal hot takes — not our employers, not legal advice.</p><p>Just three idiots with mics trying to keep you from bad gifts.</p><p><br></p><p>— Damian, Troy &amp; Fern</p><p>DTF Cyber Podcast</p><p><br></p><p>#CyberGifts #Christmas2025 #CyberSecurity #Infosec #Career</p><p><br></p><p>http://cyberpodcast.net</p><p><br></p><p>Spotify: http://spotify.cyberpodcast.net</p><p>Apple: http://apple.cyberpodcast.net</p><p>X: https://x.com/dtfcyberpodcast</p><p>IG: https://www.instagram.com/dtfcyberpodcast/</p><p>Linkedin:</p><p>DTF: https://www.linkedin.com/company/dtf-cyber-podcast/</p><p>Damian: https://www.linkedin.com/in/damianchung/</p><p>Troy: https://www.linkedin.com/in/kosovotroy/</p><p>Fern: https://www.linkedin.com/in/fernrojasaz/</p><p><br></p><p>Business Inquiries: dtf at cyberpodcast dot net</p><p><br></p><p>Everything here is our personal hot takes — not our employers, not the vendors we roast, not legal advice. Just three idiots with mics trying to keep you from getting pwned.</p>]]></content:encoded><link><![CDATA[https://cyberpodcast.net]]></link><guid isPermaLink="false">569b1e0d-7c9e-43f8-84f1-98b67e9ae6cc</guid><itunes:image href="https://artwork.captivate.fm/862bb184-85fe-4005-a3a1-8d8f1f1e20b8/DTF030-thumbnail.png"/><pubDate>Wed, 17 Dec 2025 10:00:00 -0700</pubDate><enclosure url="https://episodes.captivate.fm/episode/569b1e0d-7c9e-43f8-84f1-98b67e9ae6cc.mp3" length="87214407" type="audio/mpeg"/><itunes:duration>58:51</itunes:duration><itunes:explicit>false</itunes:explicit><itunes:episodeType>full</itunes:episodeType><itunes:episode>30</itunes:episode><podcast:episode>30</podcast:episode><podcast:alternateEnclosure type="video/youtube" title="The Ultimate Cybersecurity Gift Guide (Under $100, $200 &amp; Unlimited) #DTF030"><podcast:source uri="https://youtu.be/DBZOVffwXvI"/></podcast:alternateEnclosure></item><item><title>Your Google Account Just Got Hacked – And You Didn’t Click Anything</title><itunes:title>Your Google Account Just Got Hacked – And You Didn’t Click Anything</itunes:title><description><![CDATA[<p>2.5 billion daily account-takeover attempts.</p><p>That’s one every 34 microseconds.</p><p>Damian, Troy &amp; Fern go full send-it mode on the 2025 ATO playbook: SIM swaps, session-token theft, MFA fatigue bombing, rogue QR codes, deep-fake family scams, and the OAuth tokens you granted in 2017 that are still wide open.</p><p>Timestamps</p><p>00:00 – Intro</p><p>05:20 – SIM swaps &amp; losing your phone number in minutes</p><p>09:40 – Why password resets are useless (session tokens survive)</p><p>14:20 – MFA fatigue / push-notification bombing</p><p>19:10 – OAuth &amp; old third-party app tokens nobody revokes</p><p>24:30 – Rogue QR codes at restaurants &amp; hotels</p><p>30:15 – Enterprise reality – weekly O365 token theft</p><p>37:40 – Non-human identities &amp; service-account sprawl</p><p>44:50 – Passkeys in 2026 – will increase ATO risk if misconfigured</p><p>51:00 – Public Wi-Fi, juice jacking &amp; QR code myths</p><p>58:00 – Closing thoughts</p><p><br></p><p>Discord (coming soon) </p><p><br></p><p>#AccountTakeover #SIMSwap #MFAFatigue #CyberSecurity #Infosec #ZeroTrust</p><p><br></p><p>https://www.fcc.gov/consumers/scam-alert/grandparent-scams-get-more-sophisticated</p><p><br></p><p>https://newsroom.servicenow.com/press-releases/details/2025/ServiceNow-to-Expand-Security-Portfolio-With-Acquisition-of-Vezas-Leading-AI-native-Identity-Security-Platform/default.aspx</p><p><br></p><p>https://thehackernews.com/2025/04/customer-account-takeovers-multi.html</p><p><br></p><p>https://www.gartner.com/reviews/market/identity-threat-detection-and-response-itdr</p><p><br></p><p>http://cyberpodcast.net</p><p><br></p><p>Spotify: http://spotify.cyberpodcast.net</p><p>Apple: http://apple.cyberpodcast.net</p><p>X: https://x.com/dtfcyberpodcast</p><p>IG: https://www.instagram.com/dtfcyberpodcast/</p><p>Linkedin:</p><p>DTF: https://www.linkedin.com/company/dtf-cyber-podcast/</p><p>Damian: https://www.linkedin.com/in/damianchung/</p><p>Troy: https://www.linkedin.com/in/kosovotroy/</p><p>Fern: https://www.linkedin.com/in/fernrojasaz/</p><p><br></p><p>Business Inquiries: dtf at cyberpodcast dot net</p><p><br></p><p>Everything here is our personal hot takes — not our employers, not the vendors we roast, not legal advice. Just three idiots with mics trying to keep you from getting pwned.</p>]]></description><content:encoded><![CDATA[<p>2.5 billion daily account-takeover attempts.</p><p>That’s one every 34 microseconds.</p><p>Damian, Troy &amp; Fern go full send-it mode on the 2025 ATO playbook: SIM swaps, session-token theft, MFA fatigue bombing, rogue QR codes, deep-fake family scams, and the OAuth tokens you granted in 2017 that are still wide open.</p><p>Timestamps</p><p>00:00 – Intro</p><p>05:20 – SIM swaps &amp; losing your phone number in minutes</p><p>09:40 – Why password resets are useless (session tokens survive)</p><p>14:20 – MFA fatigue / push-notification bombing</p><p>19:10 – OAuth &amp; old third-party app tokens nobody revokes</p><p>24:30 – Rogue QR codes at restaurants &amp; hotels</p><p>30:15 – Enterprise reality – weekly O365 token theft</p><p>37:40 – Non-human identities &amp; service-account sprawl</p><p>44:50 – Passkeys in 2026 – will increase ATO risk if misconfigured</p><p>51:00 – Public Wi-Fi, juice jacking &amp; QR code myths</p><p>58:00 – Closing thoughts</p><p><br></p><p>Discord (coming soon) </p><p><br></p><p>#AccountTakeover #SIMSwap #MFAFatigue #CyberSecurity #Infosec #ZeroTrust</p><p><br></p><p>https://www.fcc.gov/consumers/scam-alert/grandparent-scams-get-more-sophisticated</p><p><br></p><p>https://newsroom.servicenow.com/press-releases/details/2025/ServiceNow-to-Expand-Security-Portfolio-With-Acquisition-of-Vezas-Leading-AI-native-Identity-Security-Platform/default.aspx</p><p><br></p><p>https://thehackernews.com/2025/04/customer-account-takeovers-multi.html</p><p><br></p><p>https://www.gartner.com/reviews/market/identity-threat-detection-and-response-itdr</p><p><br></p><p>http://cyberpodcast.net</p><p><br></p><p>Spotify: http://spotify.cyberpodcast.net</p><p>Apple: http://apple.cyberpodcast.net</p><p>X: https://x.com/dtfcyberpodcast</p><p>IG: https://www.instagram.com/dtfcyberpodcast/</p><p>Linkedin:</p><p>DTF: https://www.linkedin.com/company/dtf-cyber-podcast/</p><p>Damian: https://www.linkedin.com/in/damianchung/</p><p>Troy: https://www.linkedin.com/in/kosovotroy/</p><p>Fern: https://www.linkedin.com/in/fernrojasaz/</p><p><br></p><p>Business Inquiries: dtf at cyberpodcast dot net</p><p><br></p><p>Everything here is our personal hot takes — not our employers, not the vendors we roast, not legal advice. Just three idiots with mics trying to keep you from getting pwned.</p>]]></content:encoded><link><![CDATA[https://cyberpodcast.net]]></link><guid isPermaLink="false">2c8c40f2-9e4c-4f0f-a953-25a202f6cd1d</guid><itunes:image href="https://artwork.captivate.fm/3b3b1a3b-b6e2-4171-89df-d4957a85472f/DTF029-pod-2.png"/><pubDate>Tue, 09 Dec 2025 10:15:00 -0700</pubDate><enclosure url="https://episodes.captivate.fm/episode/2c8c40f2-9e4c-4f0f-a953-25a202f6cd1d.mp3" length="152803338" type="audio/mpeg"/><itunes:duration>01:03:40</itunes:duration><itunes:explicit>false</itunes:explicit><itunes:episodeType>full</itunes:episodeType><itunes:episode>29</itunes:episode><podcast:episode>29</podcast:episode><podcast:alternateEnclosure type="video/youtube" title="Your Account Just Got Hacked – And You Didn’t Click Anything #DTF029"><podcast:source uri="https://youtu.be/z2Mkh_eWFfc"/></podcast:alternateEnclosure></item><item><title>AI Just Hacked the World With Almost No Humans Involved</title><itunes:title>AI Just Hacked the World With Almost No Humans Involved</itunes:title><description><![CDATA[<p>Anthropic’s new report is a wake-up call: hackers turned Claude into a near-autonomous espionage agent that handled 90% of the attack chain by itself. The future is officially here… and it’s terrifying.</p><p>We go deep on how they did it, why current defenses are cooked, and what defenders need to do yesterday.</p><p>Timestamps</p><p>00:00 – The scariest line Anthropic has ever published</p><p>01:17 – “Set it and forget it” – the new AI attack paradigm</p><p>04:04 – Breaking attacks into tiny, undetectable chunks</p><p>13:48 – Attackers flipped the script: 90% AI, 10% human</p><p>17:26 – Why defense has to 10x its speed right now</p><p>27:11 – SOC automation, log nightmares &amp; the data problem nobody’s solved</p><p>33:18 – Thousands of API calls/sec + AI writing its own evasion logic</p><p>40:31 – Regulation debate: should frontier models be locked down?</p><p>51:38 – Back to basics… but the basics just changed forever</p><p>55:21 – Raw reactions: “Is this even real?”</p><p>58:09 – The silver lining (yes, there is one)</p><p>01:03:13 – When’s the next one coming? </p><p>Like if this freaked you out, comment your biggest fear for 2026, and smash subscribe — the AI cyber war just started.</p><p>#AICyberAttack #ClaudeAI #Cybersecurity #AgenticAI # infosec</p><p><br></p><p><br></p><p>http://cyberpodcast.net</p><p><br></p><p>Spotify: http://spotify.cyberpodcast.net</p><p>Apple: http://apple.cyberpodcast.net</p><p>X: https://x.com/dtfcyberpodcast</p><p>IG: https://www.instagram.com/dtfcyberpodcast/</p><p><br></p><p>Linkedin:</p><p>DTF: https://www.linkedin.com/company/dtf-cyber-podcast/</p><p>Damian: https://www.linkedin.com/in/damianchung/</p><p>Troy: https://www.linkedin.com/in/kosovotroy/</p><p>Fern: https://www.linkedin.com/in/fernrojasaz/</p><p><br></p><p>Business Inquiries: dtf at cyberpodcast dot net</p>]]></description><content:encoded><![CDATA[<p>Anthropic’s new report is a wake-up call: hackers turned Claude into a near-autonomous espionage agent that handled 90% of the attack chain by itself. The future is officially here… and it’s terrifying.</p><p>We go deep on how they did it, why current defenses are cooked, and what defenders need to do yesterday.</p><p>Timestamps</p><p>00:00 – The scariest line Anthropic has ever published</p><p>01:17 – “Set it and forget it” – the new AI attack paradigm</p><p>04:04 – Breaking attacks into tiny, undetectable chunks</p><p>13:48 – Attackers flipped the script: 90% AI, 10% human</p><p>17:26 – Why defense has to 10x its speed right now</p><p>27:11 – SOC automation, log nightmares &amp; the data problem nobody’s solved</p><p>33:18 – Thousands of API calls/sec + AI writing its own evasion logic</p><p>40:31 – Regulation debate: should frontier models be locked down?</p><p>51:38 – Back to basics… but the basics just changed forever</p><p>55:21 – Raw reactions: “Is this even real?”</p><p>58:09 – The silver lining (yes, there is one)</p><p>01:03:13 – When’s the next one coming? </p><p>Like if this freaked you out, comment your biggest fear for 2026, and smash subscribe — the AI cyber war just started.</p><p>#AICyberAttack #ClaudeAI #Cybersecurity #AgenticAI # infosec</p><p><br></p><p><br></p><p>http://cyberpodcast.net</p><p><br></p><p>Spotify: http://spotify.cyberpodcast.net</p><p>Apple: http://apple.cyberpodcast.net</p><p>X: https://x.com/dtfcyberpodcast</p><p>IG: https://www.instagram.com/dtfcyberpodcast/</p><p><br></p><p>Linkedin:</p><p>DTF: https://www.linkedin.com/company/dtf-cyber-podcast/</p><p>Damian: https://www.linkedin.com/in/damianchung/</p><p>Troy: https://www.linkedin.com/in/kosovotroy/</p><p>Fern: https://www.linkedin.com/in/fernrojasaz/</p><p><br></p><p>Business Inquiries: dtf at cyberpodcast dot net</p>]]></content:encoded><link><![CDATA[https://cyberpodcast.net]]></link><guid isPermaLink="false">eea5a608-109f-44f6-9ba3-e3fa0bb1915f</guid><itunes:image href="https://artwork.captivate.fm/7e819ca2-41a2-4420-8dd5-9b363f8fef05/DTF028-apple.png"/><pubDate>Thu, 27 Nov 2025 09:00:00 -0700</pubDate><enclosure url="https://episodes.captivate.fm/episode/eea5a608-109f-44f6-9ba3-e3fa0bb1915f.mp3" length="91739637" type="audio/mpeg"/><itunes:duration>01:03:02</itunes:duration><itunes:explicit>false</itunes:explicit><itunes:episodeType>full</itunes:episodeType><itunes:episode>28</itunes:episode><podcast:episode>28</podcast:episode><podcast:chapters url="https://transcripts.captivate.fm/chapter-4785c556-eebf-4885-8d9f-cb64f3486742.json" type="application/json+chapters"/><podcast:alternateEnclosure type="video/youtube" title="DTF028 YT Version"><podcast:source uri="https://youtu.be/kRVHeuQkzis"/></podcast:alternateEnclosure></item><item><title>60+ Cybersecurity Tools Per Company: Fix Tool Sprawl Chaos Now</title><itunes:title>60+ Cybersecurity Tools Per Company: Fix Tool Sprawl Chaos Now</itunes:title><description><![CDATA[<p>The average company now runs 60+ cybersecurity tools — more apps than most people have on their phone. Is this making us safer… or just creating chaos, alert fatigue, and million-dollar shelf ware?</p><p>In this episode, Damian, Troy, and Fern rip apart the tool sprawl epidemic: why CISOs are drowning in overlapping platforms, how 7% of IT budget became the “standard,” when best-of-breed actually beats single-vendor, and how to start consolidating before you go insane.</p><p>Real talk from three practitioners who’ve lived the nightmare.</p><p>Timestamps (short &amp; sweet edition)</p><p>00:00 – 60+ tools per company… are we actually safer?</p><p>03:17 – The 7% of IT budget “rule” – is it enough?</p><p>06:21 – Cybersecurity isn’t insurance, it’s risk mitigation</p><p>11:05 – Shelfware nightmare: tools bought, never used</p><p>14:30 – Single-vendor vs best-of-breed debate</p><p>28:40 – The shiny new toy problem every CISO faces</p><p>36:20 – Analyst alert fatigue is real</p><p>40:05 – Best-of-breed wins when tools actually talk</p><p>47:36 – You need a 3–5 year roadmap (even if you won’t be there)</p><p>49:02 – AI wasn’t on anyone’s 5-year plan… now what?</p><p>51:09 – Pro tips for CISOs &amp; analysts</p><p>54:35 – Wrap-up &amp; see you next week!</p><p><br></p><p>Subscribe so you never miss the raw truth about cybersecurity.</p><p>🔔 Turn on notifications – new episode every Monday!</p><p>💬 Comment: How many security tools does YOUR org actually use?</p><p>#Cybersecurity #ToolSprawl #CybersecurityTools #CISO #BestOfBreed #SecurityConsolidation #DTFCyberPodcast</p><p><br></p><p><br></p><p>Linkedin:</p><p>Damian: https://www.linkedin.com/in/damianchung/</p><p>Troy: https://www.linkedin.com/in/kosovotroy/</p><p>Fern: https://www.linkedin.com/in/fernrojasaz/</p><p><br></p><p>Business Inquiries: dtf at cyberpodcast dot net</p>]]></description><content:encoded><![CDATA[<p>The average company now runs 60+ cybersecurity tools — more apps than most people have on their phone. Is this making us safer… or just creating chaos, alert fatigue, and million-dollar shelf ware?</p><p>In this episode, Damian, Troy, and Fern rip apart the tool sprawl epidemic: why CISOs are drowning in overlapping platforms, how 7% of IT budget became the “standard,” when best-of-breed actually beats single-vendor, and how to start consolidating before you go insane.</p><p>Real talk from three practitioners who’ve lived the nightmare.</p><p>Timestamps (short &amp; sweet edition)</p><p>00:00 – 60+ tools per company… are we actually safer?</p><p>03:17 – The 7% of IT budget “rule” – is it enough?</p><p>06:21 – Cybersecurity isn’t insurance, it’s risk mitigation</p><p>11:05 – Shelfware nightmare: tools bought, never used</p><p>14:30 – Single-vendor vs best-of-breed debate</p><p>28:40 – The shiny new toy problem every CISO faces</p><p>36:20 – Analyst alert fatigue is real</p><p>40:05 – Best-of-breed wins when tools actually talk</p><p>47:36 – You need a 3–5 year roadmap (even if you won’t be there)</p><p>49:02 – AI wasn’t on anyone’s 5-year plan… now what?</p><p>51:09 – Pro tips for CISOs &amp; analysts</p><p>54:35 – Wrap-up &amp; see you next week!</p><p><br></p><p>Subscribe so you never miss the raw truth about cybersecurity.</p><p>🔔 Turn on notifications – new episode every Monday!</p><p>💬 Comment: How many security tools does YOUR org actually use?</p><p>#Cybersecurity #ToolSprawl #CybersecurityTools #CISO #BestOfBreed #SecurityConsolidation #DTFCyberPodcast</p><p><br></p><p><br></p><p>Linkedin:</p><p>Damian: https://www.linkedin.com/in/damianchung/</p><p>Troy: https://www.linkedin.com/in/kosovotroy/</p><p>Fern: https://www.linkedin.com/in/fernrojasaz/</p><p><br></p><p>Business Inquiries: dtf at cyberpodcast dot net</p>]]></content:encoded><link><![CDATA[https://cyberpodcast.net]]></link><guid isPermaLink="false">7c0764a2-da1a-4361-8fee-f237587c89d6</guid><itunes:image href="https://artwork.captivate.fm/5fcd2870-53c7-4eeb-a351-95f58bb3a408/DTF27-Apple.png"/><pubDate>Mon, 17 Nov 2025 09:20:00 -0700</pubDate><enclosure url="https://episodes.captivate.fm/episode/7c0764a2-da1a-4361-8fee-f237587c89d6.mp3" length="78701455" type="audio/mpeg"/><itunes:duration>54:09</itunes:duration><itunes:explicit>false</itunes:explicit><itunes:episodeType>full</itunes:episodeType><itunes:episode>27</itunes:episode><podcast:episode>27</podcast:episode><podcast:alternateEnclosure type="video/youtube" title="60+ Cybersecurity Tools Per Company: Fix Tool Sprawl Chaos Now"><podcast:source uri="https://youtu.be/k0SSSczQjVY"/></podcast:alternateEnclosure></item><item><title>CEO Teams Scam EXPOSED: $106M Louvre Heist Used Password ‘louvre’</title><itunes:title>CEO Teams Scam EXPOSED: $106M Louvre Heist Used Password ‘louvre’</itunes:title><description><![CDATA[<p>In this eye-opening episode of the DTF Cyber Podcast, hosts Damian, Troy, and Fern tackle the theme of trust in cybersecurity. From external hackers spoofing CEOs in Microsoft Teams to incident response firms secretly double-dipping in ransomware negotiations, and a shocking $106M heist at the Louvre enabled by the password “louvre,” the crew explores real-world threats and defenses. Plus, tips on security training, OSINT risks, mental health in cyber, and protecting against title fraud.</p><p> </p><p>Whether you’re in security or just curious, this episode reminds us: trust but verify—or pay the price.</p><p>Timestamps:</p><p>00:00 – Intro</p><p>01:00 – Microsoft Teams Spoofing Vulnerability Exposed</p><p>04:30 – Process Over Tech: Training for Wire Fraud &amp; Deepfakes</p><p>08:00 – Data &amp; Identity: Top CISO Concerns</p><p>15:32 – CEO Outreach? Double-Check the Source</p><p>17:31 – Gamified Training: Making Awareness Stick</p><p>20:06 – Why Annual Training Fails—Go Quarterly</p><p>26:34 – Instincts Matter: If It Feels Off, Verify</p><p>28:18 – IR Brokers Gone Rogue: Representing Both Sides</p><p>39:49 – Vetting Vendors &amp; Diversifying Suppliers</p><p>42:31 – White-Collar Crime Triggers &amp; Mental Health Support</p><p>46:04 – If There’s Money, Expect Cheaters</p><p>47:28 – The Louvre Heist: Bucket Trucks &amp; Weak Passwords</p><p>50:06 – Camera Password “Louvre” Since 2014</p><p>52:10 – Complacency Kills: Beyond Default Passwords</p><p>01:07:13 – Title Fraud Scams: Lock Your House &amp; Car Titles</p><p>01:10:05 – AI-Fueled Fraud in the Digital Age</p><p>01:12:35 – Threat Spectrum: External to Insider Risks</p><p>01:15:11 – Pro Tip: Ask a Security Expert—Don’t Guess</p><p><br></p><p>Subscribe for unfiltered cyber insights every week.</p><p><br></p><p>🔔 Enable notifications—don’t miss an episode!</p><p>💬 Comment below: Ever spot a spoofed message in Teams? Share your story!</p><p>#Cybersecurity #DTFCyberPodcast #MicrosoftTeams #Ransomware #LouvreHeist #TrustButVerify #InsiderThreats #SecurityTraining</p><p><br></p><p><br></p><p><br></p><p>Articles:</p><p><br></p><p>https://thehackernews.com/2025/11/microsoft-teams-bugs-let-attackers.html</p><p><br></p><p>https://arstechnica.com/security/2025/11/fbi-arrests-ransomware-clean-up-experts-for-planting-ransomware/?utm_campaign=dhtwitter&amp;utm_content=%3Cmedia_url%3E&amp;utm_medium=social&amp;utm_source=twitter</p><p><br></p><p>https://cybernews.com/news/louvre-password-heist/</p><p><br></p><p><br></p><p>Linkedin:</p><p>Damian: https://www.linkedin.com/in/damianchung/</p><p>Troy: https://www.linkedin.com/in/kosovotroy/</p><p>Fern: https://www.linkedin.com/in/fernrojasaz/</p><p><br></p><p>Business Inquiries: dtf at cyberpodcast dot net</p>]]></description><content:encoded><![CDATA[<p>In this eye-opening episode of the DTF Cyber Podcast, hosts Damian, Troy, and Fern tackle the theme of trust in cybersecurity. From external hackers spoofing CEOs in Microsoft Teams to incident response firms secretly double-dipping in ransomware negotiations, and a shocking $106M heist at the Louvre enabled by the password “louvre,” the crew explores real-world threats and defenses. Plus, tips on security training, OSINT risks, mental health in cyber, and protecting against title fraud.</p><p> </p><p>Whether you’re in security or just curious, this episode reminds us: trust but verify—or pay the price.</p><p>Timestamps:</p><p>00:00 – Intro</p><p>01:00 – Microsoft Teams Spoofing Vulnerability Exposed</p><p>04:30 – Process Over Tech: Training for Wire Fraud &amp; Deepfakes</p><p>08:00 – Data &amp; Identity: Top CISO Concerns</p><p>15:32 – CEO Outreach? Double-Check the Source</p><p>17:31 – Gamified Training: Making Awareness Stick</p><p>20:06 – Why Annual Training Fails—Go Quarterly</p><p>26:34 – Instincts Matter: If It Feels Off, Verify</p><p>28:18 – IR Brokers Gone Rogue: Representing Both Sides</p><p>39:49 – Vetting Vendors &amp; Diversifying Suppliers</p><p>42:31 – White-Collar Crime Triggers &amp; Mental Health Support</p><p>46:04 – If There’s Money, Expect Cheaters</p><p>47:28 – The Louvre Heist: Bucket Trucks &amp; Weak Passwords</p><p>50:06 – Camera Password “Louvre” Since 2014</p><p>52:10 – Complacency Kills: Beyond Default Passwords</p><p>01:07:13 – Title Fraud Scams: Lock Your House &amp; Car Titles</p><p>01:10:05 – AI-Fueled Fraud in the Digital Age</p><p>01:12:35 – Threat Spectrum: External to Insider Risks</p><p>01:15:11 – Pro Tip: Ask a Security Expert—Don’t Guess</p><p><br></p><p>Subscribe for unfiltered cyber insights every week.</p><p><br></p><p>🔔 Enable notifications—don’t miss an episode!</p><p>💬 Comment below: Ever spot a spoofed message in Teams? Share your story!</p><p>#Cybersecurity #DTFCyberPodcast #MicrosoftTeams #Ransomware #LouvreHeist #TrustButVerify #InsiderThreats #SecurityTraining</p><p><br></p><p><br></p><p><br></p><p>Articles:</p><p><br></p><p>https://thehackernews.com/2025/11/microsoft-teams-bugs-let-attackers.html</p><p><br></p><p>https://arstechnica.com/security/2025/11/fbi-arrests-ransomware-clean-up-experts-for-planting-ransomware/?utm_campaign=dhtwitter&amp;utm_content=%3Cmedia_url%3E&amp;utm_medium=social&amp;utm_source=twitter</p><p><br></p><p>https://cybernews.com/news/louvre-password-heist/</p><p><br></p><p><br></p><p>Linkedin:</p><p>Damian: https://www.linkedin.com/in/damianchung/</p><p>Troy: https://www.linkedin.com/in/kosovotroy/</p><p>Fern: https://www.linkedin.com/in/fernrojasaz/</p><p><br></p><p>Business Inquiries: dtf at cyberpodcast dot net</p>]]></content:encoded><link><![CDATA[https://cyberpodcast.net]]></link><guid isPermaLink="false">fba84eb5-b881-48fc-bb0d-09e865a0cf3d</guid><itunes:image href="https://artwork.captivate.fm/ae40cbfa-b267-4a9e-ba20-14f6d2d51e7f/DTF026.png"/><pubDate>Mon, 10 Nov 2025 09:00:00 -0700</pubDate><enclosure url="https://episodes.captivate.fm/episode/fba84eb5-b881-48fc-bb0d-09e865a0cf3d.mp3" length="111402308" type="audio/mpeg"/><itunes:duration>01:15:32</itunes:duration><itunes:explicit>false</itunes:explicit><itunes:episodeType>full</itunes:episodeType><itunes:episode>26</itunes:episode><podcast:episode>26</podcast:episode><podcast:alternateEnclosure type="video/youtube" title="CEO Teams Scam EXPOSED: $106M Louvre Heist Used Password ‘louvre’"><podcast:source uri="https://youtu.be/Ml_y-JdXLGI"/></podcast:alternateEnclosure></item><item><title>Do You Need Cybersecurity Certs for a 6-Figure Job? #DTF025</title><itunes:title>Do You Need Cybersecurity Certs for a 6-Figure Job? #DTF025</itunes:title><description><![CDATA[<p>Dive into the wild world of cybersecurity certifications on this episode of the DTF Cyber Podcast! Hosts Damien, Troy, and Fern break down whether certs are the golden ticket to a six-figure cyber career, or if passion, experience, and networking matter more. From entry-level tips like CompTIA Security+ to gold standards like CISSP, they share real talk on getting hired, avoiding burnout, and building a standout resume in today's tough job market. Perfect for newbies, mid-career pros, or anyone pivoting into cyber.</p><p>🔥 Key Topics:</p><p>Do you really need certs to break into cyber?</p><p>Best beginner certs vs. advanced ones</p><p>The power of home labs, side projects, and networking</p><p>Avoiding the "cert collector" trap</p><p>Mid-career advice for layoffs and upskilling</p><p>🚀 Subscribe for more raw cyber insights, hit the bell for notifications, and drop your cert stories in the comments! Email us at dtf@cyberpodcast.net or connect on LinkedIn.</p><p>Timestamps:</p><p>00:00 - From data breaches to six-figure hacker-hunter dreams</p><p>03:15 - Fern's confession</p><p>06:24 - Continuing education like doctors – Do you need certs to start?</p><p>08:03 - No "one cert" guarantees a job – Stand out with initiative</p><p>11:08 - Chasing money vs. passion: Burnout risks in cyber</p><p>15:35 - "Love your job, never work a day" – Finding your cyber niche</p><p>18:19 - New grads: Focus on certs, experience,  or networking first?</p><p>19:29 - Damien's hiring advice: Internships over  Ivy League degrees</p><p>22:31 - Entry-level picks: CompTIA Security+, CEH – Show initiative</p><p>23:28 - Home labs &amp; side projects: Build and talk about them!</p><p>29:33 - Python scripting: The invaluable skill that lands big roles</p><p>32:31 - Mid-career: CISSP for screening, but tailor to your path </p><p>36:15 - Avoid silos: Broaden skills in big vs. small companies</p><p>38:35 - SANS certs: Pricey but powerful </p><p>40:14 - Retention: Invest in training, build culture</p><p>46:36 - Beat AI resume scanners: Network to bypass bots</p><p>50:21 - Salary expectations &amp; red flags in job apps</p><p>53:23 - Late-career: Network trumps certs</p><p>54:04 - Final tips: Local meetups, be bold, ask for what you want</p><p>58:05 - Pro networking hack:</p><p>59:27 - Magic tricks as icebreakers? </p><p><br></p><p>#Cybersecurity #Certs #CISSP #SecurityPlus #CyberCareer #DTFPodcast</p><p><br></p><p>Linkedin:</p><p>Damian: https://www.linkedin.com/in/damianchung/</p><p>Troy: https://www.linkedin.com/in/kosovotroy/</p><p>Fern: https://www.linkedin.com/in/fernrojasaz/</p><p><br></p><p>Business Inquiries: dtf at cyberpodcast dot net</p>]]></description><content:encoded><![CDATA[<p>Dive into the wild world of cybersecurity certifications on this episode of the DTF Cyber Podcast! Hosts Damien, Troy, and Fern break down whether certs are the golden ticket to a six-figure cyber career, or if passion, experience, and networking matter more. From entry-level tips like CompTIA Security+ to gold standards like CISSP, they share real talk on getting hired, avoiding burnout, and building a standout resume in today's tough job market. Perfect for newbies, mid-career pros, or anyone pivoting into cyber.</p><p>🔥 Key Topics:</p><p>Do you really need certs to break into cyber?</p><p>Best beginner certs vs. advanced ones</p><p>The power of home labs, side projects, and networking</p><p>Avoiding the "cert collector" trap</p><p>Mid-career advice for layoffs and upskilling</p><p>🚀 Subscribe for more raw cyber insights, hit the bell for notifications, and drop your cert stories in the comments! Email us at dtf@cyberpodcast.net or connect on LinkedIn.</p><p>Timestamps:</p><p>00:00 - From data breaches to six-figure hacker-hunter dreams</p><p>03:15 - Fern's confession</p><p>06:24 - Continuing education like doctors – Do you need certs to start?</p><p>08:03 - No "one cert" guarantees a job – Stand out with initiative</p><p>11:08 - Chasing money vs. passion: Burnout risks in cyber</p><p>15:35 - "Love your job, never work a day" – Finding your cyber niche</p><p>18:19 - New grads: Focus on certs, experience,  or networking first?</p><p>19:29 - Damien's hiring advice: Internships over  Ivy League degrees</p><p>22:31 - Entry-level picks: CompTIA Security+, CEH – Show initiative</p><p>23:28 - Home labs &amp; side projects: Build and talk about them!</p><p>29:33 - Python scripting: The invaluable skill that lands big roles</p><p>32:31 - Mid-career: CISSP for screening, but tailor to your path </p><p>36:15 - Avoid silos: Broaden skills in big vs. small companies</p><p>38:35 - SANS certs: Pricey but powerful </p><p>40:14 - Retention: Invest in training, build culture</p><p>46:36 - Beat AI resume scanners: Network to bypass bots</p><p>50:21 - Salary expectations &amp; red flags in job apps</p><p>53:23 - Late-career: Network trumps certs</p><p>54:04 - Final tips: Local meetups, be bold, ask for what you want</p><p>58:05 - Pro networking hack:</p><p>59:27 - Magic tricks as icebreakers? </p><p><br></p><p>#Cybersecurity #Certs #CISSP #SecurityPlus #CyberCareer #DTFPodcast</p><p><br></p><p>Linkedin:</p><p>Damian: https://www.linkedin.com/in/damianchung/</p><p>Troy: https://www.linkedin.com/in/kosovotroy/</p><p>Fern: https://www.linkedin.com/in/fernrojasaz/</p><p><br></p><p>Business Inquiries: dtf at cyberpodcast dot net</p>]]></content:encoded><link><![CDATA[https://cyberpodcast.net]]></link><guid isPermaLink="false">731480f1-f494-4e60-860d-1aaa3f1f1b2d</guid><itunes:image href="https://artwork.captivate.fm/27227da0-1862-435d-8bc3-9bff98ad32e8/DTF25-apple.png"/><pubDate>Mon, 03 Nov 2025 08:00:00 -0700</pubDate><enclosure url="https://episodes.captivate.fm/episode/731480f1-f494-4e60-860d-1aaa3f1f1b2d.mp3" length="90476572" type="audio/mpeg"/><itunes:duration>01:02:25</itunes:duration><itunes:explicit>false</itunes:explicit><itunes:episodeType>full</itunes:episodeType><itunes:episode>25</itunes:episode><podcast:episode>25</podcast:episode><podcast:chapters url="https://transcripts.captivate.fm/chapter-539b66ef-dbad-44cb-abf4-4a9caf5b66ec.json" type="application/json+chapters"/><podcast:alternateEnclosure type="video/youtube" title="Do You Need Cybersecurity Certs for a 6 Figure Job DTF025"><podcast:source uri="https://youtu.be/618ktR-BVLM"/></podcast:alternateEnclosure></item><item><title>CISO Budget Hacks: $2B Negotiator Reveals How to Win Funding &amp; Crush Vendor BS | #DTF024</title><itunes:title>CISO Budget Hacks: $2B Negotiator Reveals How to Win Funding &amp; Crush Vendor BS | #DTF024</itunes:title><description><![CDATA[<p>Join hosts Fern and Troy as they sit down with legendary negotiator and cybersecurity expert Jean Shapiro (formerly of American Express) for an in-depth discussion on navigating cybersecurity budgets, building trust with vendors, leveraging crises for improvement, and fostering a culture of transparency. From managing $2B budgets to avoiding sales pitfalls and tying security to business impact, Jean shares real-world insights from her decades in the field. Whether you’re dealing with ransomware recovery, brand protection, or innovation funding, this episode is packed with gold nuggets for CISOs, security leaders, and vendors alike.</p><p>If you enjoy raw, unfiltered conversations on cyber defense, hit that LIKE button, SUBSCRIBE for more episodes, and drop a comment below: What’s your biggest budgeting challenge in cybersecurity?</p><p>🔗 Listen on Spotify/Apple Podcasts:</p><p>spotify.cyberpodcast.net</p><p>apple.cyberpodcast.net</p><p>#Cybersecurity #CISOBudget #SecurityFunding #VendorManagement #Ransomware #CISOAdvice</p><p><br></p><p>Timestamps:</p><p>00:00 – Intro &amp; Jean Shapiro’s Epic Entrance </p><p>03:27 – Why Non-Tech Leaders Struggle to Understand Security</p><p>06:10 – Educating Buyers Through Breach News &amp; Real-World Examples</p><p>09:06 – Gold Nugget #1: Never Let a Good Crisis Go to Waste</p><p>12:36 – Building a Culture of Transparency (No Finger-Pointing)</p><p>16:21 – Partnering with CIOs: Fixing Legacy Issues Without Blame</p><p>18:46 – Getting Budget: Tie Security to Revenue Loss &amp; Business Impact</p><p>23:29 – Risk &amp; Brand Protection in Budget Conversations</p><p>26:11 – Risks Breakdown: Litigation, Regulation, Operational Downtime</p><p>28:00 – Ransomware Myths: Why Paying Isn’t a Quick Fix</p><p>31:56 – Frameworks (NIST, MITRE ATT&amp;CK) for Data-Driven Budgets</p><p>37:32 – Carving Out Budget for Innovation &amp; AI Tools</p><p>40:46 – Tips: Align with Strategic Initiatives (Don’t Just Slap AI on It)</p><p>43:02 – Sales Call Frustrations: “What Keeps You Up at Night?”</p><p>47:19 – Protecting Proprietary Info in Vendor Calls (No Recordings!)</p><p>51:23 – Post-Sale Support: Don’t Ghost After the Deal</p><p>55:38 – Burning Vendor Bridges: When to Replace Tools</p><p>58:03 – Sales Ghosting Between Roles: It Bites Back</p><p>1:05:16 – Sales Incentives Exposed: Why Renewals Get Weird</p><p>1:10:20 – Negotiating with VARs: Avoid Desperation Deals</p><p>1:19:00 – Closing Thoughts: Know Your Numbers, Talk Business Language</p><p><br></p><p>Thanks for watching! Stay secure out there. </p><p><br></p><p>Linkedin:</p><p>Damian: https://www.linkedin.com/in/damianchung/</p><p>Troy: https://www.linkedin.com/in/kosovotroy/</p><p>Fern: https://www.linkedin.com/in/fernrojasaz/</p>]]></description><content:encoded><![CDATA[<p>Join hosts Fern and Troy as they sit down with legendary negotiator and cybersecurity expert Jean Shapiro (formerly of American Express) for an in-depth discussion on navigating cybersecurity budgets, building trust with vendors, leveraging crises for improvement, and fostering a culture of transparency. From managing $2B budgets to avoiding sales pitfalls and tying security to business impact, Jean shares real-world insights from her decades in the field. Whether you’re dealing with ransomware recovery, brand protection, or innovation funding, this episode is packed with gold nuggets for CISOs, security leaders, and vendors alike.</p><p>If you enjoy raw, unfiltered conversations on cyber defense, hit that LIKE button, SUBSCRIBE for more episodes, and drop a comment below: What’s your biggest budgeting challenge in cybersecurity?</p><p>🔗 Listen on Spotify/Apple Podcasts:</p><p>spotify.cyberpodcast.net</p><p>apple.cyberpodcast.net</p><p>#Cybersecurity #CISOBudget #SecurityFunding #VendorManagement #Ransomware #CISOAdvice</p><p><br></p><p>Timestamps:</p><p>00:00 – Intro &amp; Jean Shapiro’s Epic Entrance </p><p>03:27 – Why Non-Tech Leaders Struggle to Understand Security</p><p>06:10 – Educating Buyers Through Breach News &amp; Real-World Examples</p><p>09:06 – Gold Nugget #1: Never Let a Good Crisis Go to Waste</p><p>12:36 – Building a Culture of Transparency (No Finger-Pointing)</p><p>16:21 – Partnering with CIOs: Fixing Legacy Issues Without Blame</p><p>18:46 – Getting Budget: Tie Security to Revenue Loss &amp; Business Impact</p><p>23:29 – Risk &amp; Brand Protection in Budget Conversations</p><p>26:11 – Risks Breakdown: Litigation, Regulation, Operational Downtime</p><p>28:00 – Ransomware Myths: Why Paying Isn’t a Quick Fix</p><p>31:56 – Frameworks (NIST, MITRE ATT&amp;CK) for Data-Driven Budgets</p><p>37:32 – Carving Out Budget for Innovation &amp; AI Tools</p><p>40:46 – Tips: Align with Strategic Initiatives (Don’t Just Slap AI on It)</p><p>43:02 – Sales Call Frustrations: “What Keeps You Up at Night?”</p><p>47:19 – Protecting Proprietary Info in Vendor Calls (No Recordings!)</p><p>51:23 – Post-Sale Support: Don’t Ghost After the Deal</p><p>55:38 – Burning Vendor Bridges: When to Replace Tools</p><p>58:03 – Sales Ghosting Between Roles: It Bites Back</p><p>1:05:16 – Sales Incentives Exposed: Why Renewals Get Weird</p><p>1:10:20 – Negotiating with VARs: Avoid Desperation Deals</p><p>1:19:00 – Closing Thoughts: Know Your Numbers, Talk Business Language</p><p><br></p><p>Thanks for watching! Stay secure out there. </p><p><br></p><p>Linkedin:</p><p>Damian: https://www.linkedin.com/in/damianchung/</p><p>Troy: https://www.linkedin.com/in/kosovotroy/</p><p>Fern: https://www.linkedin.com/in/fernrojasaz/</p>]]></content:encoded><link><![CDATA[https://cyberpodcast.net]]></link><guid isPermaLink="false">6c7819ec-5dec-4443-91c8-4da9cfe1f1d3</guid><itunes:image href="https://artwork.captivate.fm/cbba3cc2-66a0-47e1-b26a-c32dda5e0948/DTF24-apple.png"/><pubDate>Wed, 29 Oct 2025 09:00:00 -0700</pubDate><enclosure url="https://episodes.captivate.fm/episode/6c7819ec-5dec-4443-91c8-4da9cfe1f1d3.mp3" length="119095721" type="audio/mpeg"/><itunes:duration>01:22:23</itunes:duration><itunes:explicit>false</itunes:explicit><itunes:episodeType>full</itunes:episodeType><itunes:episode>24</itunes:episode><podcast:episode>24</podcast:episode><podcast:chapters url="https://transcripts.captivate.fm/chapter-8a6a680d-a155-4d4d-bdf5-9b4c5a132bdc.json" type="application/json+chapters"/><podcast:alternateEnclosure type="video/youtube" title="CISO Budget Hacks: $2B Negotiator Reveals How to Win Funding &amp; Crush Vendor BS | #DTF024"><podcast:source uri="https://youtu.be/FtQIXBmdCbU"/></podcast:alternateEnclosure></item><item><title>The Battle of the CISOs: Technical vs Non-Technical #DTF023</title><itunes:title>The Battle of the CISOs: Technical vs Non-Technical #DTF023</itunes:title><description><![CDATA[<p>Welcome to Episode 23 of the DTF Cyber Podcast! 🎙️ Join our hosts as they dive into the evolving world of cybersecurity leadership, exploring what it takes to be a CISO in 2025. From technical acumen vs. business savvy to AI’s revolutionary impact on the industry, we unpack critical insights for aspiring and seasoned security pros. Plus, hear about Vegas’s tight-knit cyber community, data breach lessons, and the F1 party vibe! ​￼​💻 Don’t miss this mix of career advice, tech trends, and real-world stories. Subscribe for weekly cyber insights! 🚀 #Cybersecurity #CISO #AIinCybersecurity #DataBreaches #VegasCyber</p><p>Timestamps:</p><p><strong>00:00 —Intro &amp; Vegas F1 Excitement</strong></p><p>The crew kicks off with Formula 1 hype, Vegas nightlife, and how local cyber pros turn big events into networking gold.</p><p><strong>06:35 — The CISO Role Debate</strong></p><p>Do you need deep technical chops or business instincts to lead? The team unpacks the “technical vs. strategic” clash lighting up LinkedIn.</p><p><strong>14:23 - The Castle &amp; Sword Analogy</strong></p><p>Defending your organization like a kingdom;  strategy, trust, and the danger of “fighting every battle yourself.”</p><p><strong>20:10 — Stats, Pay Gaps &amp; AI’s Influence</strong></p><p>Why technical CISOs earn more, how AI is reshaping cybersecurity, and why partnership beats isolation.</p><p><strong>28:27 —  AI’s Impact on Cybersecurity</strong></p><p>Working alongside business units to secure AI-driven projects — and the risks of “vibe-coding” without controls.</p><p><strong>33:17 - Leadership Humility</strong></p><p>The power of admitting mistakes: how transparency builds trust and kills ego-driven cyber culture.</p><p><strong>36:01  — SOC Lifers &amp; Innovation</strong></p><p>Why some pros never leave the trenches — balancing hands-on skill with creative problem-solving.</p><p><strong>41:01  — The Hybrid Advantage</strong></p><p>Why the best CISOs blend technical depth, business vision, and empathy to lead modern security teams.</p><p><strong>45:28 — VARs, Pizza &amp; Procurement</strong></p><p>How to question vendors the smart way — and why “what fails” matters more than “what sells.”</p><p><strong>49:45 — Data Retention &amp; Breaches</strong></p><p>Third-party risk, compliance headaches, and why storing IDs “just in case” creates future breaches.</p><p><strong>54:34 — Breach Fatigue</strong></p><p>Lessons from a 70,000-user data leak — protecting your identity and regaining trust in a breach-saturated world.</p><p>Topic Links:</p><p><a href="https://www.linkedin.com/posts/geoffhancockcyberexecutive_ciso-ceo-activity-7384226546804449280-UtjG/?utm_source=share&amp;utm_medium=member_ios&amp;rcm=ACoAAAPdJL0B8xce6ECZfPNPS2Hp24evoT2uY0E" rel="noopener noreferrer" target="_blank">https://www.linkedin.com/posts/geoffhancockcyberexecutive_ciso-ceo-activity-7384226546804449280-UtjG/?utm_source=share&amp;utm_medium=member_ios&amp;rcm=ACoAAAPdJL0B8xce6ECZfPNPS2Hp24evoT2uY0E</a></p><p><a href="https://cybersecuritynews-com.cdn.ampproject.org/c/s/cybersecuritynews.com/discord-data-breach-sensitive-data/amp/" rel="noopener noreferrer" target="_blank">https://cybersecuritynews-com.cdn.ampproject.org/c/s/cybersecuritynews.com/discord-data-breach-sensitive-data/amp/</a></p><p>Connect with Us:</p><p>	•	Follow DTF Cyber Podcast on X for updates!</p><p>	•	Share your thoughts in the comments! What’s your take on the CISO role in 2025?</p>]]></description><content:encoded><![CDATA[<p>Welcome to Episode 23 of the DTF Cyber Podcast! 🎙️ Join our hosts as they dive into the evolving world of cybersecurity leadership, exploring what it takes to be a CISO in 2025. From technical acumen vs. business savvy to AI’s revolutionary impact on the industry, we unpack critical insights for aspiring and seasoned security pros. Plus, hear about Vegas’s tight-knit cyber community, data breach lessons, and the F1 party vibe! ​￼​💻 Don’t miss this mix of career advice, tech trends, and real-world stories. Subscribe for weekly cyber insights! 🚀 #Cybersecurity #CISO #AIinCybersecurity #DataBreaches #VegasCyber</p><p>Timestamps:</p><p><strong>00:00 —Intro &amp; Vegas F1 Excitement</strong></p><p>The crew kicks off with Formula 1 hype, Vegas nightlife, and how local cyber pros turn big events into networking gold.</p><p><strong>06:35 — The CISO Role Debate</strong></p><p>Do you need deep technical chops or business instincts to lead? The team unpacks the “technical vs. strategic” clash lighting up LinkedIn.</p><p><strong>14:23 - The Castle &amp; Sword Analogy</strong></p><p>Defending your organization like a kingdom;  strategy, trust, and the danger of “fighting every battle yourself.”</p><p><strong>20:10 — Stats, Pay Gaps &amp; AI’s Influence</strong></p><p>Why technical CISOs earn more, how AI is reshaping cybersecurity, and why partnership beats isolation.</p><p><strong>28:27 —  AI’s Impact on Cybersecurity</strong></p><p>Working alongside business units to secure AI-driven projects — and the risks of “vibe-coding” without controls.</p><p><strong>33:17 - Leadership Humility</strong></p><p>The power of admitting mistakes: how transparency builds trust and kills ego-driven cyber culture.</p><p><strong>36:01  — SOC Lifers &amp; Innovation</strong></p><p>Why some pros never leave the trenches — balancing hands-on skill with creative problem-solving.</p><p><strong>41:01  — The Hybrid Advantage</strong></p><p>Why the best CISOs blend technical depth, business vision, and empathy to lead modern security teams.</p><p><strong>45:28 — VARs, Pizza &amp; Procurement</strong></p><p>How to question vendors the smart way — and why “what fails” matters more than “what sells.”</p><p><strong>49:45 — Data Retention &amp; Breaches</strong></p><p>Third-party risk, compliance headaches, and why storing IDs “just in case” creates future breaches.</p><p><strong>54:34 — Breach Fatigue</strong></p><p>Lessons from a 70,000-user data leak — protecting your identity and regaining trust in a breach-saturated world.</p><p>Topic Links:</p><p><a href="https://www.linkedin.com/posts/geoffhancockcyberexecutive_ciso-ceo-activity-7384226546804449280-UtjG/?utm_source=share&amp;utm_medium=member_ios&amp;rcm=ACoAAAPdJL0B8xce6ECZfPNPS2Hp24evoT2uY0E" rel="noopener noreferrer" target="_blank">https://www.linkedin.com/posts/geoffhancockcyberexecutive_ciso-ceo-activity-7384226546804449280-UtjG/?utm_source=share&amp;utm_medium=member_ios&amp;rcm=ACoAAAPdJL0B8xce6ECZfPNPS2Hp24evoT2uY0E</a></p><p><a href="https://cybersecuritynews-com.cdn.ampproject.org/c/s/cybersecuritynews.com/discord-data-breach-sensitive-data/amp/" rel="noopener noreferrer" target="_blank">https://cybersecuritynews-com.cdn.ampproject.org/c/s/cybersecuritynews.com/discord-data-breach-sensitive-data/amp/</a></p><p>Connect with Us:</p><p>	•	Follow DTF Cyber Podcast on X for updates!</p><p>	•	Share your thoughts in the comments! What’s your take on the CISO role in 2025?</p>]]></content:encoded><link><![CDATA[https://cyberpodcast.net]]></link><guid isPermaLink="false">780b0587-0e23-4000-b99d-02524d87df17</guid><itunes:image href="https://artwork.captivate.fm/1ba59028-c3c4-411a-9b20-bd649a68aee2/DTF023-Pod-Thumb.png"/><pubDate>Fri, 24 Oct 2025 07:00:00 -0700</pubDate><enclosure url="https://episodes.captivate.fm/episode/780b0587-0e23-4000-b99d-02524d87df17.mp3" length="90963683" type="audio/mpeg"/><itunes:duration>01:02:50</itunes:duration><itunes:explicit>false</itunes:explicit><itunes:episodeType>full</itunes:episodeType><itunes:episode>23</itunes:episode><podcast:episode>23</podcast:episode><podcast:chapters url="https://transcripts.captivate.fm/chapter-b87059ba-d3dd-4da2-b5d9-29e9180832c8.json" type="application/json+chapters"/><podcast:alternateEnclosure type="video/youtube" title="To be ********* or not to be: That is the question"><podcast:source uri="https://youtu.be/0sOpSMDvIBU"/></podcast:alternateEnclosure></item><item><title>Trust But Verify: The Hidden Cost of AI Hallucinations #DTF022</title><itunes:title>Trust But Verify: The Hidden Cost of AI Hallucinations #DTF022</itunes:title><description><![CDATA[<p>Join Damian, Troy, and Fern on Episode 22 of the DTF Cyber Podcast (@DTFCyberPodcast) as we tear into Deloitte’s $290K AI hallucination disaster—fake references, a misquoted judge, and a botched Australian government report that’s shaking trust in AI.  From AI’s role in cyber chaos to practical tips for validation, we’ve got CISOs and tech lovers covered. </p><p>Timestamps (Extracted from Transcript):</p><p>Timestamps (Extracted from Transcript):</p><p>00:00 – 01:26 | Intro: AI Hallucinations &amp; Holiday Banter</p><p>01:26 – 15:34 | Cyber News: Deloitte’s AI-Generated Report</p><p>15:34 – 30:06 | Deep Dive: Accountability &amp; Ethics Fallout</p><p>30:06 – 43:10 | AI Ethics in Security &amp; Vendor Data Use</p><p>43:10 – 57:12 | Audits, Maturity Scores &amp; Frameworks</p><p>57:12 – 01:09:49 | Outro: Real Talk on Jobs, AI &amp; Accountability</p><p>Links:</p><p>•  Fortune Article: https://fortune.com/2025/10/07/deloitte-ai-australia-government-report-hallucinations-technology-290000-refund/</p><p>•  NIST AI RMF: https://www.nist.gov/itl/ai-risk-management-framework</p><p>•  Join us on X: https://x.com/DTFCyberPodcast</p><p>•  AI Ethics Cheat Sheet: [Link to PDF - TBD]</p><p>Subscribe: Catch our weekly cyber takedowns! Smash that bell and join the DTF crew fighting hype, one ethical byte at a time. 🛡️</p><p><br></p><p><br></p><p><br></p><p>Linkedin:</p><p>Damian: https://www.linkedin.com/in/damianchung/</p><p>Troy: https://www.linkedin.com/in/kosovotroy/</p><p>Fern: https://www.linkedin.com/in/fernrojasaz/</p><p><br></p><p>Business Inquiries: dtf at cyberpodcast dot net</p>]]></description><content:encoded><![CDATA[<p>Join Damian, Troy, and Fern on Episode 22 of the DTF Cyber Podcast (@DTFCyberPodcast) as we tear into Deloitte’s $290K AI hallucination disaster—fake references, a misquoted judge, and a botched Australian government report that’s shaking trust in AI.  From AI’s role in cyber chaos to practical tips for validation, we’ve got CISOs and tech lovers covered. </p><p>Timestamps (Extracted from Transcript):</p><p>Timestamps (Extracted from Transcript):</p><p>00:00 – 01:26 | Intro: AI Hallucinations &amp; Holiday Banter</p><p>01:26 – 15:34 | Cyber News: Deloitte’s AI-Generated Report</p><p>15:34 – 30:06 | Deep Dive: Accountability &amp; Ethics Fallout</p><p>30:06 – 43:10 | AI Ethics in Security &amp; Vendor Data Use</p><p>43:10 – 57:12 | Audits, Maturity Scores &amp; Frameworks</p><p>57:12 – 01:09:49 | Outro: Real Talk on Jobs, AI &amp; Accountability</p><p>Links:</p><p>•  Fortune Article: https://fortune.com/2025/10/07/deloitte-ai-australia-government-report-hallucinations-technology-290000-refund/</p><p>•  NIST AI RMF: https://www.nist.gov/itl/ai-risk-management-framework</p><p>•  Join us on X: https://x.com/DTFCyberPodcast</p><p>•  AI Ethics Cheat Sheet: [Link to PDF - TBD]</p><p>Subscribe: Catch our weekly cyber takedowns! Smash that bell and join the DTF crew fighting hype, one ethical byte at a time. 🛡️</p><p><br></p><p><br></p><p><br></p><p>Linkedin:</p><p>Damian: https://www.linkedin.com/in/damianchung/</p><p>Troy: https://www.linkedin.com/in/kosovotroy/</p><p>Fern: https://www.linkedin.com/in/fernrojasaz/</p><p><br></p><p>Business Inquiries: dtf at cyberpodcast dot net</p>]]></content:encoded><link><![CDATA[https://cyberpodcast.net]]></link><guid isPermaLink="false">4ffc4778-c85d-4e9a-8e7d-d87198d9234f</guid><itunes:image href="https://artwork.captivate.fm/cf79cb6f-a5b8-4e41-96a1-b0ce86057357/DTF022.png"/><pubDate>Mon, 13 Oct 2025 09:00:00 -0700</pubDate><enclosure url="https://episodes.captivate.fm/episode/4ffc4778-c85d-4e9a-8e7d-d87198d9234f.mp3" length="100927458" type="audio/mpeg"/><itunes:duration>01:09:58</itunes:duration><itunes:explicit>false</itunes:explicit><itunes:episodeType>full</itunes:episodeType><itunes:episode>22</itunes:episode><podcast:episode>22</podcast:episode><podcast:chapters url="https://transcripts.captivate.fm/chapter-d314a487-d80e-4f75-89fb-c6008b3e6d79.json" type="application/json+chapters"/><podcast:alternateEnclosure type="video/youtube" title="Trust But Verify: The Hidden Cost of AI Hallucinations #DTF022"><podcast:source uri="https://youtu.be/9W3VDF4PYUw"/></podcast:alternateEnclosure></item><item><title>Ransomware Hits Europe&apos;s Airports – Travel Cyber Survival Guide! #DTF021</title><itunes:title>Ransomware Hits Europe&apos;s Airports – Travel Cyber Survival Guide! #DTF021</itunes:title><description><![CDATA[<p>Buckle up for a wild ride through cyber chaos at 30,000 feet! With Damian out slaying dragons elsewhere, Troy and Fern team up with special guest Shannon Wilkinson (Troy's better half, CIO/CISO at Findlay Auto, and reigning "double belt cyber champ"). We dissect the September 2025 ransomware meltdown that grounded 63+ flights at Heathrow, Brussels, and Berlin—thanks to a Collins Aerospace supply chain hack. From botched check-ins to a shocking UK arrest in under a week, we unpack the third-party terror, AI's automation pitfalls, and why your next layover could be a hacker's playground. Plus: Real talk on business impact analysis (BIA), dodging "juice jacking," VPN myths, and why employees aren't your "weakest link" (but untrained ones sure are). Shannon drops gems from her new book on AI ethics, and we roast everything from fast-food kiosks to boardroom budget battles. Laughs, lessons, and low-hanging fruit alerts—because if airports can crash, so can your data. Stay encrypted, travelers! 🚨✈️</p><p>Timestamps:</p><p>00:00 - Ransomware Grounds Europe – Collins hack chaos.</p><p>02:59 - Tech Couples – Can they unplug?</p><p>05:11 - Airport Attack – Heathrow arrests &amp; CrowdStrike déjà vu.</p><p>08:07 - AI Trap – Automation gone wrong.</p><p>14:39 - Boardroom Battles – Layoffs vs. efficiency.</p><p>19:34 - AI Revolution – Jobs, tools, &amp; reality check.</p><p>27:52 - BIA 101 – Spot risks before chaos.</p><p>33:25 - Cyber Risk in Dollars – Board storytelling without FUD.</p><p>40:43 - Cyber Spend – $2B budgets &amp; quick wins.</p><p>45:25 - Employees – Weak link or weapon?</p><p>47:24 - SMS Scams – Bill panic &amp; verification tips.</p><p>49:35 - Travel Security – VPNs, hotspots, identity fabrics.</p><p>53:51 - Hotspot Hype – Cell signals vs. VPN traps.</p><p>57:51 - Juice Jacking – Airport USB risks explained.</p><p>01:03:16 - Book Spotlight </p><p>01:06:23 - Sales Tactics Roast – Cupcakes as cold calls.</p><p>01:10:02 - Wrap-Up</p><p>Grab Shannon's book: "Prompted, Not Present" on Amazon – DM her on LinkedIn for a signed copy!</p><p>Love the pod? Smash that 👍, subscribe for weekly cyber roasts, and drop your wildest travel hack fail in the comments. New eps every Monday—next up: Deepfakes in the wild?</p><p>🔗 Full episodes &amp; merch: dtfcypberpodcast.net</p><p>📱 Follow us: YouTube @DTFCyberPodcast | X @DTFCyberPodecast | LinkedIn</p><p>#Ransomware #AirportHack #TravelCybersecurity #AIEthics #CyberPodcast #DTFCyber #SupplyChainAttack #VPNtips #JuiceJacking #BusinessResilience</p><p><br></p><p>Articles:</p><p>https://www.theguardian.com/world/2025/sep/22/flight-delays-europe-cyber-attack-heathrow-brussels-berlin</p><p><br></p><p>https://levelblue.com/blogs/security-essentials/securing-your-digital-footprint-while-traveling-in-2025</p><p><br></p><p>Shannon's Book: </p><p>https://www.amazon.com/Prompted-Not-Present-Reclaiming-Thoughtful/dp/B0FF5D87S9/ref=sr_1_1?crid=2BIWF9F0E79D6&amp;dib=eyJ2IjoiMSJ9.X1QHcoWjhBDfHDtebgE0l4gwmpAfCC5WWrEVbCo-sygfPtSsH6pEv62iZnv9oFIQlhSqfObQU_AqUtM-T389Uh2Wp-nU71BK5Ht-XMU0LmlLRqWNUvmPgpdGXv4btnYZIsMXucdOo6EPaGeVckxFncbhY4BrmwSI0mdVEvbIivynUqp9JhrHyZFn-c7OihOlA6QW6gYMu2IhE0w_KVSjMA.GK0phjXd49yIOHuQSahz5k88KN5tbvARge-P1ntZs4g&amp;dib_tag=se&amp;keywords=shannon+wilkinson&amp;qid=1759709566&amp;sprefix=shannon+wilk%2Caps%2C134&amp;sr=8-1</p><p><br></p><p>Linkedin:</p><p>Shannon: https://www.linkedin.com/in/swilkinsoncyber/</p><p>Damian: https://www.linkedin.com/in/damianchung/</p><p>Troy: https://www.linkedin.com/in/kosovotroy/</p><p>Fern: https://www.linkedin.com/in/fernrojasaz/</p><p><br></p><p>Business Inquiries: dtf at cyberpodcast dot net</p>]]></description><content:encoded><![CDATA[<p>Buckle up for a wild ride through cyber chaos at 30,000 feet! With Damian out slaying dragons elsewhere, Troy and Fern team up with special guest Shannon Wilkinson (Troy's better half, CIO/CISO at Findlay Auto, and reigning "double belt cyber champ"). We dissect the September 2025 ransomware meltdown that grounded 63+ flights at Heathrow, Brussels, and Berlin—thanks to a Collins Aerospace supply chain hack. From botched check-ins to a shocking UK arrest in under a week, we unpack the third-party terror, AI's automation pitfalls, and why your next layover could be a hacker's playground. Plus: Real talk on business impact analysis (BIA), dodging "juice jacking," VPN myths, and why employees aren't your "weakest link" (but untrained ones sure are). Shannon drops gems from her new book on AI ethics, and we roast everything from fast-food kiosks to boardroom budget battles. Laughs, lessons, and low-hanging fruit alerts—because if airports can crash, so can your data. Stay encrypted, travelers! 🚨✈️</p><p>Timestamps:</p><p>00:00 - Ransomware Grounds Europe – Collins hack chaos.</p><p>02:59 - Tech Couples – Can they unplug?</p><p>05:11 - Airport Attack – Heathrow arrests &amp; CrowdStrike déjà vu.</p><p>08:07 - AI Trap – Automation gone wrong.</p><p>14:39 - Boardroom Battles – Layoffs vs. efficiency.</p><p>19:34 - AI Revolution – Jobs, tools, &amp; reality check.</p><p>27:52 - BIA 101 – Spot risks before chaos.</p><p>33:25 - Cyber Risk in Dollars – Board storytelling without FUD.</p><p>40:43 - Cyber Spend – $2B budgets &amp; quick wins.</p><p>45:25 - Employees – Weak link or weapon?</p><p>47:24 - SMS Scams – Bill panic &amp; verification tips.</p><p>49:35 - Travel Security – VPNs, hotspots, identity fabrics.</p><p>53:51 - Hotspot Hype – Cell signals vs. VPN traps.</p><p>57:51 - Juice Jacking – Airport USB risks explained.</p><p>01:03:16 - Book Spotlight </p><p>01:06:23 - Sales Tactics Roast – Cupcakes as cold calls.</p><p>01:10:02 - Wrap-Up</p><p>Grab Shannon's book: "Prompted, Not Present" on Amazon – DM her on LinkedIn for a signed copy!</p><p>Love the pod? Smash that 👍, subscribe for weekly cyber roasts, and drop your wildest travel hack fail in the comments. New eps every Monday—next up: Deepfakes in the wild?</p><p>🔗 Full episodes &amp; merch: dtfcypberpodcast.net</p><p>📱 Follow us: YouTube @DTFCyberPodcast | X @DTFCyberPodecast | LinkedIn</p><p>#Ransomware #AirportHack #TravelCybersecurity #AIEthics #CyberPodcast #DTFCyber #SupplyChainAttack #VPNtips #JuiceJacking #BusinessResilience</p><p><br></p><p>Articles:</p><p>https://www.theguardian.com/world/2025/sep/22/flight-delays-europe-cyber-attack-heathrow-brussels-berlin</p><p><br></p><p>https://levelblue.com/blogs/security-essentials/securing-your-digital-footprint-while-traveling-in-2025</p><p><br></p><p>Shannon's Book: </p><p>https://www.amazon.com/Prompted-Not-Present-Reclaiming-Thoughtful/dp/B0FF5D87S9/ref=sr_1_1?crid=2BIWF9F0E79D6&amp;dib=eyJ2IjoiMSJ9.X1QHcoWjhBDfHDtebgE0l4gwmpAfCC5WWrEVbCo-sygfPtSsH6pEv62iZnv9oFIQlhSqfObQU_AqUtM-T389Uh2Wp-nU71BK5Ht-XMU0LmlLRqWNUvmPgpdGXv4btnYZIsMXucdOo6EPaGeVckxFncbhY4BrmwSI0mdVEvbIivynUqp9JhrHyZFn-c7OihOlA6QW6gYMu2IhE0w_KVSjMA.GK0phjXd49yIOHuQSahz5k88KN5tbvARge-P1ntZs4g&amp;dib_tag=se&amp;keywords=shannon+wilkinson&amp;qid=1759709566&amp;sprefix=shannon+wilk%2Caps%2C134&amp;sr=8-1</p><p><br></p><p>Linkedin:</p><p>Shannon: https://www.linkedin.com/in/swilkinsoncyber/</p><p>Damian: https://www.linkedin.com/in/damianchung/</p><p>Troy: https://www.linkedin.com/in/kosovotroy/</p><p>Fern: https://www.linkedin.com/in/fernrojasaz/</p><p><br></p><p>Business Inquiries: dtf at cyberpodcast dot net</p>]]></content:encoded><link><![CDATA[https://cyberpodcast.net]]></link><guid isPermaLink="false">300a8573-c1ca-4e2d-9230-09aa9c79ccaa</guid><itunes:image href="https://artwork.captivate.fm/71c1dc6b-3e87-4f73-9057-18dee546c31e/DTF021-pod-thumb-2.png"/><pubDate>Mon, 06 Oct 2025 09:00:00 -0700</pubDate><enclosure url="https://episodes.captivate.fm/episode/300a8573-c1ca-4e2d-9230-09aa9c79ccaa.mp3" length="105610072" type="audio/mpeg"/><itunes:duration>01:13:10</itunes:duration><itunes:explicit>false</itunes:explicit><itunes:episodeType>full</itunes:episodeType><itunes:episode>21</itunes:episode><podcast:episode>21</podcast:episode><podcast:chapters url="https://transcripts.captivate.fm/chapter-406c9c12-d581-43e2-aeaa-e2fc99594ee1.json" type="application/json+chapters"/><podcast:alternateEnclosure type="video/youtube" title="Wings Clipped: Ransomware Hits Europe&apos;s Airports – Travel Cyber Survival Guide! #DTF021"><podcast:source uri="https://youtu.be/fPX3_wF4orc"/></podcast:alternateEnclosure></item><item><title>When AI Goes Rogue: Exposing the Risks of Autonomous Agents #DTF020</title><itunes:title>When AI Goes Rogue: Exposing the Risks of Autonomous Agents #DTF020</itunes:title><description><![CDATA[<p>Welcome to Episode 20 of the DTF Cyber Podcast! 🚨 Join hosts Damian and Fern, with special guest Gary Chan, the Security Mentalist, as they dive into the wild world of rogue AI agents—autonomous systems that wreak havoc when they go off-script. From AI browsers falling for phishing scams to coding agents wiping out databases and chatbots selling $76,000 SUVs for a buck, we unpack real-world incidents shaking the cybersecurity world in 2025. Gary’s psychological manipulation expertise reveals how AI vulnerabilities mirror human tricks, making this a must-watch for tech pros and curious minds alike! 🧠💻</p><p>🔔 Subscribe to @DTFCyberPodcast for weekly cybersecurity deep dives: youtube.com/@DTFCyberPodcast</p><p>💬 Drop your rogue AI stories in the comments and let us know what topics you want next!</p><p>📩 Want Gary’s security mentalism for your company? Visit https://www.gschan2000.com</p><p>Timestamps</p><p>00:00 - Intro: Damian and Fern set the stage for rogue AI agents, introducing Gary Chan with a WWE-style entrance!</p><p>03:27 - Guest Spotlight: Gary explains security mentalism—blending psychological tricks with cybersecurity awareness.</p><p>08:59 - Perplexity’s Comet AI Browser Exploit: How this AI browser got tricked into buying fake items and leaking data.</p><p>27:02 - Replit AI Database Disaster: A coding agent deletes a production database and fakes logs to cover it up!</p><p>42:45 - Chevrolet Chatbot Fiasco: A chatbot “sells” a $76,000 Tahoe for $1 via social engineering.</p><p>54:42 - Roundtable: AI Risks &amp; Fixes: 80% of companies face rogue AI—how do we secure these agents?</p><p>68:47 - Outro &amp; Takeaways: Key lessons on testing, governance, and trusting AI, plus a call to subscribe!</p><p>Key Topics</p><p>Perplexity Comet Exploit: How phishing and prompt injection led to unauthorized purchases and data leaks.</p><p>Replit Database Wipeout: A coding AI’s catastrophic error and attempt to hide it.</p><p>Chevrolet Chatbot Blunder: Social engineering tricks a bot into absurd deals, raising liability questions.</p><p>Mitigations: Testing in dev environments, strict permissions, and rollback plans to tame rogue AI.</p><p>Gary’s Take: How mentalism reveals AI’s susceptibility to manipulation, with tips for secure deployment.</p><p><br></p><p>Security Mentalist:</p><p>https://www.gschan2000.com</p><p><br></p><p>Article 1: </p><p>https://www.bleepingcomputer.com/news/security/perplexitys-comet-ai-browser-tricked-into-buying-fake-items-online/</p><p><br></p><p>Article 2: </p><p>https://www.tomshardware.com/tech-industry/artificial-intelligence/ai-coding-platform-goes-rogue-during-code-freeze-and-deletes-entire-company-database-replit-ceo-apologizes-after-ai-engine-says-it-made-a-catastrophic-error-in-judgment-and-destroyed-all-production-data</p><p><br></p><p>Article 3: </p><p>https://www.upworthy.com/prankster-tricks-a-gm-dealership-chatbot-to-sell-him-a-76000-chevy-tahoe-for-ex1</p><p><br></p><p>Article 4:</p><p>https://www.digit.fyi/80-of-firms-say-their-ai-agents-have-taken-rogue-actions/?utm_source=chatgpt.com</p><p><br></p><p><br></p><p><br></p><p>Linkedin:</p><p>Gary Chan: https://www.linkedin.com/in/gschan2000/</p><p>Damian: https://www.linkedin.com/in/damianchung/</p><p>Troy: https://www.linkedin.com/in/kosovotroy/</p><p>Fern: https://www.linkedin.com/in/fernrojasaz/</p><p><br></p><p>Business Inquiries: dtf at cyberpodcast dot net</p>]]></description><content:encoded><![CDATA[<p>Welcome to Episode 20 of the DTF Cyber Podcast! 🚨 Join hosts Damian and Fern, with special guest Gary Chan, the Security Mentalist, as they dive into the wild world of rogue AI agents—autonomous systems that wreak havoc when they go off-script. From AI browsers falling for phishing scams to coding agents wiping out databases and chatbots selling $76,000 SUVs for a buck, we unpack real-world incidents shaking the cybersecurity world in 2025. Gary’s psychological manipulation expertise reveals how AI vulnerabilities mirror human tricks, making this a must-watch for tech pros and curious minds alike! 🧠💻</p><p>🔔 Subscribe to @DTFCyberPodcast for weekly cybersecurity deep dives: youtube.com/@DTFCyberPodcast</p><p>💬 Drop your rogue AI stories in the comments and let us know what topics you want next!</p><p>📩 Want Gary’s security mentalism for your company? Visit https://www.gschan2000.com</p><p>Timestamps</p><p>00:00 - Intro: Damian and Fern set the stage for rogue AI agents, introducing Gary Chan with a WWE-style entrance!</p><p>03:27 - Guest Spotlight: Gary explains security mentalism—blending psychological tricks with cybersecurity awareness.</p><p>08:59 - Perplexity’s Comet AI Browser Exploit: How this AI browser got tricked into buying fake items and leaking data.</p><p>27:02 - Replit AI Database Disaster: A coding agent deletes a production database and fakes logs to cover it up!</p><p>42:45 - Chevrolet Chatbot Fiasco: A chatbot “sells” a $76,000 Tahoe for $1 via social engineering.</p><p>54:42 - Roundtable: AI Risks &amp; Fixes: 80% of companies face rogue AI—how do we secure these agents?</p><p>68:47 - Outro &amp; Takeaways: Key lessons on testing, governance, and trusting AI, plus a call to subscribe!</p><p>Key Topics</p><p>Perplexity Comet Exploit: How phishing and prompt injection led to unauthorized purchases and data leaks.</p><p>Replit Database Wipeout: A coding AI’s catastrophic error and attempt to hide it.</p><p>Chevrolet Chatbot Blunder: Social engineering tricks a bot into absurd deals, raising liability questions.</p><p>Mitigations: Testing in dev environments, strict permissions, and rollback plans to tame rogue AI.</p><p>Gary’s Take: How mentalism reveals AI’s susceptibility to manipulation, with tips for secure deployment.</p><p><br></p><p>Security Mentalist:</p><p>https://www.gschan2000.com</p><p><br></p><p>Article 1: </p><p>https://www.bleepingcomputer.com/news/security/perplexitys-comet-ai-browser-tricked-into-buying-fake-items-online/</p><p><br></p><p>Article 2: </p><p>https://www.tomshardware.com/tech-industry/artificial-intelligence/ai-coding-platform-goes-rogue-during-code-freeze-and-deletes-entire-company-database-replit-ceo-apologizes-after-ai-engine-says-it-made-a-catastrophic-error-in-judgment-and-destroyed-all-production-data</p><p><br></p><p>Article 3: </p><p>https://www.upworthy.com/prankster-tricks-a-gm-dealership-chatbot-to-sell-him-a-76000-chevy-tahoe-for-ex1</p><p><br></p><p>Article 4:</p><p>https://www.digit.fyi/80-of-firms-say-their-ai-agents-have-taken-rogue-actions/?utm_source=chatgpt.com</p><p><br></p><p><br></p><p><br></p><p>Linkedin:</p><p>Gary Chan: https://www.linkedin.com/in/gschan2000/</p><p>Damian: https://www.linkedin.com/in/damianchung/</p><p>Troy: https://www.linkedin.com/in/kosovotroy/</p><p>Fern: https://www.linkedin.com/in/fernrojasaz/</p><p><br></p><p>Business Inquiries: dtf at cyberpodcast dot net</p>]]></content:encoded><link><![CDATA[https://cyberpodcast.net]]></link><guid isPermaLink="false">20b8d3a8-087b-41bf-9ad3-d08a1ce73f1f</guid><itunes:image href="https://artwork.captivate.fm/5cc3d41c-d2ea-41ec-a1ab-36132f7dd4cc/Untitled-design-9.png"/><pubDate>Mon, 15 Sep 2025 08:00:00 -0700</pubDate><enclosure url="https://episodes.captivate.fm/episode/20b8d3a8-087b-41bf-9ad3-d08a1ce73f1f.mp3" length="103794411" type="audio/mpeg"/><itunes:duration>01:11:26</itunes:duration><itunes:explicit>false</itunes:explicit><itunes:episodeType>full</itunes:episodeType><itunes:episode>20</itunes:episode><podcast:episode>20</podcast:episode><podcast:chapters url="https://transcripts.captivate.fm/chapter-3539f064-3f98-49e4-8293-dc49c7cc7588.json" type="application/json+chapters"/><podcast:alternateEnclosure type="video/youtube" title="When AI Goes Rogue: Exposing the Risks of Autonomous Agents #DTF020"><podcast:source uri="https://youtu.be/-LLrEPktkB4"/></podcast:alternateEnclosure></item><item><title>Why Third-Party Apps Can Put You at Risk! #DTF019</title><itunes:title>Why Third-Party Apps Can Put You at Risk! #DTF019</itunes:title><description><![CDATA[<p>Welcome to Episode 19 of the DTF Cyber Podcast, where Damian, Troy, and Fern dive into the wild world of cybersecurity with our special guest, Lester Godsey, CISO at Arizona State University! This week, we unpack the massive Salesloft Drift supply chain breach that rocked companies like Cloudflare, Palo Alto Networks, and Zscaler. From OAuth token risks to third and fourth-party vulnerabilities, we break down what went wrong, why it matters, and how to protect your organization from the next supply chain nightmare. Expect technical deep dives, real-world insights, and our signature banter—because even in chaos, we keep it real. Subscribe, like, and join us every Monday for more cyber talk!</p><p>Follow us on X: @DTFCyberPodcast</p><p>Watch on YouTube: https://www.youtube.com/@DTFCyberPodcast</p><p>Timestamps</p><p>00:00 - Intro: Welcome to the DTF Cyber Podcast</p><p>00:33 - Guest Introduction: Meet Lester Godsey, ASU’s CISO</p><p>01:41 - Lester’s 8-Hour Retirement &amp; Transition to Private Sector</p><p>03:12 - Talk Track 1: The Breach Breakdown – Salesloft Drift Incident</p><p>04:49 - Why Third-Party Risk Management (TPRM) Needs More Hype</p><p>06:26 - The Skills Gap in Governance, Risk, and Compliance (GRC)</p><p>09:57 - Do CISOs Need to Be Super Technical? The Debate</p><p>13:22 - Talk Track 2: OAuth Token Risks – The Double-Edged Sword</p><p>18:04 - Analogies: Amazon Garage Access vs. OAuth Token Exposure</p><p>23:20 - Talk Track 3: Third and Fourth-Party Risks – Hidden Layers</p><p>26:30 - Vendor Transparency and Proactive Disclosure</p><p>29:01 - Shadow IT and the Challenges of Vendor Visibility</p><p>31:20 - Talk Track 4: Mitigation Strategies – Auditing and Non-Human Identities</p><p>36:02 - Managing Up: Communicating Risks to Leadership</p><p>39:15 - Gen Z Slang and Workplace Communication Challenges</p><p>43:32 - Recap: Key Takeaways on OAuth, Audits, and Risk</p><p>47:46 - Future Topics: Non-Human Identities and Agentic AI</p><p>51:02 - Actionable Advice: Audit Your OAuth Tokens Now</p><p>54:41 - Closing Thoughts from Troy, Damian, Fern, and Lester</p><p><br></p><p>What You’ll Learn</p><p><br></p><p>- How attackers exploited OAuth tokens in the Salesloft Drift breach</p><p>- The cascading risks of third and fourth-party vendors</p><p>- Practical steps to audit and secure OAuth tokens and APIs</p><p>- Why non-human identity management is critical for modern cybersecurity</p><p><br></p><p>Have you audited your OAuth tokens lately? Drop your thoughts on supply chain risks in the comments or hit us up on X (@DTFCyberPodcast). If you found this episode helpful, smash that like button, subscribe, and share with your cyber crew! Let’s stay one step ahead of the hackers. </p><p><br></p><p>#Cybersecurity #SupplyChainSecurity #OAuthRisks #DTFCyberPodcast</p><p><br></p><p>Linkedin:</p><p>Damian: https://www.linkedin.com/in/damianchung/</p><p>Troy: https://www.linkedin.com/in/kosovotroy/</p><p>Fern: https://www.linkedin.com/in/fernrojasaz/</p><p><br></p><p>Business Inquiries: dtf at cyberpodcast dot net</p>]]></description><content:encoded><![CDATA[<p>Welcome to Episode 19 of the DTF Cyber Podcast, where Damian, Troy, and Fern dive into the wild world of cybersecurity with our special guest, Lester Godsey, CISO at Arizona State University! This week, we unpack the massive Salesloft Drift supply chain breach that rocked companies like Cloudflare, Palo Alto Networks, and Zscaler. From OAuth token risks to third and fourth-party vulnerabilities, we break down what went wrong, why it matters, and how to protect your organization from the next supply chain nightmare. Expect technical deep dives, real-world insights, and our signature banter—because even in chaos, we keep it real. Subscribe, like, and join us every Monday for more cyber talk!</p><p>Follow us on X: @DTFCyberPodcast</p><p>Watch on YouTube: https://www.youtube.com/@DTFCyberPodcast</p><p>Timestamps</p><p>00:00 - Intro: Welcome to the DTF Cyber Podcast</p><p>00:33 - Guest Introduction: Meet Lester Godsey, ASU’s CISO</p><p>01:41 - Lester’s 8-Hour Retirement &amp; Transition to Private Sector</p><p>03:12 - Talk Track 1: The Breach Breakdown – Salesloft Drift Incident</p><p>04:49 - Why Third-Party Risk Management (TPRM) Needs More Hype</p><p>06:26 - The Skills Gap in Governance, Risk, and Compliance (GRC)</p><p>09:57 - Do CISOs Need to Be Super Technical? The Debate</p><p>13:22 - Talk Track 2: OAuth Token Risks – The Double-Edged Sword</p><p>18:04 - Analogies: Amazon Garage Access vs. OAuth Token Exposure</p><p>23:20 - Talk Track 3: Third and Fourth-Party Risks – Hidden Layers</p><p>26:30 - Vendor Transparency and Proactive Disclosure</p><p>29:01 - Shadow IT and the Challenges of Vendor Visibility</p><p>31:20 - Talk Track 4: Mitigation Strategies – Auditing and Non-Human Identities</p><p>36:02 - Managing Up: Communicating Risks to Leadership</p><p>39:15 - Gen Z Slang and Workplace Communication Challenges</p><p>43:32 - Recap: Key Takeaways on OAuth, Audits, and Risk</p><p>47:46 - Future Topics: Non-Human Identities and Agentic AI</p><p>51:02 - Actionable Advice: Audit Your OAuth Tokens Now</p><p>54:41 - Closing Thoughts from Troy, Damian, Fern, and Lester</p><p><br></p><p>What You’ll Learn</p><p><br></p><p>- How attackers exploited OAuth tokens in the Salesloft Drift breach</p><p>- The cascading risks of third and fourth-party vendors</p><p>- Practical steps to audit and secure OAuth tokens and APIs</p><p>- Why non-human identity management is critical for modern cybersecurity</p><p><br></p><p>Have you audited your OAuth tokens lately? Drop your thoughts on supply chain risks in the comments or hit us up on X (@DTFCyberPodcast). If you found this episode helpful, smash that like button, subscribe, and share with your cyber crew! Let’s stay one step ahead of the hackers. </p><p><br></p><p>#Cybersecurity #SupplyChainSecurity #OAuthRisks #DTFCyberPodcast</p><p><br></p><p>Linkedin:</p><p>Damian: https://www.linkedin.com/in/damianchung/</p><p>Troy: https://www.linkedin.com/in/kosovotroy/</p><p>Fern: https://www.linkedin.com/in/fernrojasaz/</p><p><br></p><p>Business Inquiries: dtf at cyberpodcast dot net</p>]]></content:encoded><link><![CDATA[https://cyberpodcast.net]]></link><guid isPermaLink="false">d211e3de-c54e-43c2-8170-3c6fc3efadfa</guid><itunes:image href="https://artwork.captivate.fm/a89c5022-8a91-4fad-a8c0-011f0f5a0b67/DTF019-3kx3k.png"/><pubDate>Mon, 08 Sep 2025 08:00:00 -0700</pubDate><enclosure url="https://episodes.captivate.fm/episode/d211e3de-c54e-43c2-8170-3c6fc3efadfa.mp3" length="82440341" type="audio/mpeg"/><itunes:duration>56:29</itunes:duration><itunes:explicit>false</itunes:explicit><itunes:episodeType>full</itunes:episodeType><itunes:episode>19</itunes:episode><podcast:episode>19</podcast:episode><podcast:chapters url="https://transcripts.captivate.fm/chapter-c231539a-4561-4d74-abfc-430a4c7eac14.json" type="application/json+chapters"/><podcast:alternateEnclosure type="video/youtube" title="Why Third-Party Apps Can Put You at Risk! #DTF019"><podcast:source uri="https://youtu.be/kootiHihpTo"/></podcast:alternateEnclosure></item><item><title>Why Cybersecurity Training is Often Ignored #DTF018</title><itunes:title>Why Cybersecurity Training is Often Ignored #DTF018</itunes:title><description><![CDATA[<p>🎙️ Welcome to the DTF Cyber Podcast! In Episode 18, “Why Cybersecurity Training is Often Ignored,” we dive into the real struggles of staying sharp in cyber roles. From budget battles to justifying big conferences like Black Hat and RSA, this episode uncovers why training gets sidelined—and how to fight back! 💻🔒</p><p>🔑 Key Topics:</p><p>•  Why training costs (like $8,000 SANS courses) scare off CEOs</p><p>•  Budget hacks: Vendor deals, free meetups (e.g., Phoenix East Valley), and LinkedIn Learning</p><p>•  Justifying conferences with ROI (reports, team training)</p><p>•  Employee initiative vs. leadership responsibility</p><p>•  Training as part of compensation and culture</p><p>•  Staying ahead with job research and the “seven whys”</p><p>😂 Bonus: Hear about the hostel pinkeye saga—a lesson in cost-cutting gone wild!</p><p>📌 Timestamps:</p><p>0:00:00 - Intro: Staying Up-to-Date</p><p>0:02:34 - Budgeting Challenges</p><p>0:09:05 - Vendor Training Tricks</p><p>0:18:23 - Justifying Conferences</p><p>0:36:02 - Free Training Options</p><p>0:43:10 - Employee &amp; Leader Roles</p><p>0:54:26 - Black Hat Cost Breakdown</p><p>1:05:26 - Closing Tips</p><p>💬 Drop your training hacks in the comments! Subscribe @DTFCyberPodcast for more cyber realness. Join us next week—stay safe!</p><p>🔗 Full Episode: [Link to Episode 18]</p><p>🌐 Learn more: https://www.youtube.com/@DTFCyberPodcast</p><p>#Cybersecurity #Training #BlackHat #RSAConference #CyberCareer #DTFCyberPodcast</p><p>Phoenix Cyber Meetup:</p><p>EVSec https://www.meetup.com/evsecaz</p><p><br></p><p>SANS pricing: </p><p>https://www.sans.org/cyber-security-courses/advanced-security-essentials-enterprise-defender</p><p><br></p><p>UI/UX:</p><p>https://www.linkedin.com/posts/cyber-uxcellence_a-milestone-moment-for-ux-in-cybersecurity-activity-7361758949525622785-Rsha?utm_source=social_share_send&amp;utm_medium=member_desktop_web&amp;rcm=ACoAAAPdJL0B8xce6ECZfPNPS2Hp24evoT2uY0E</p><p><br></p><p>Online Training Resources: </p><p>https://explore.skillbuilder.aws/learn (AWS Skill Builder – Security Learning Plans)</p><p>https://www.cloudskillsboost.google/ (Google Cloud Skills Boost – Security Labs &amp; Quests)</p><p><br></p><p>Use of "Five Why's" : </p><p>https://www.corporatecomplianceinsights.com/want-better-incident-response-keep-asking-why/</p><p><br></p><p>Phoenix Community Meetup Groups:</p><p>https://owasp.org/www-chapter-phoenix/ (OWASP Phoenix)</p><p>https://engage.isaca.org/phoenixchapter/home (ISACA Phoenix Chapter)</p><p>https://isc2chapterphoenix.org/ (ISC2 Phoenix Chapter)</p><p><br></p><p>Linkedin:</p><p>Damian: https://www.linkedin.com/in/damianchung/</p><p>Troy: https://www.linkedin.com/in/kosovotroy/</p><p>Fern: https://www.linkedin.com/in/fernrojasaz/</p><p><br></p><p>Business Inquiries: dtf at cyberpodcast dot net</p>]]></description><content:encoded><![CDATA[<p>🎙️ Welcome to the DTF Cyber Podcast! In Episode 18, “Why Cybersecurity Training is Often Ignored,” we dive into the real struggles of staying sharp in cyber roles. From budget battles to justifying big conferences like Black Hat and RSA, this episode uncovers why training gets sidelined—and how to fight back! 💻🔒</p><p>🔑 Key Topics:</p><p>•  Why training costs (like $8,000 SANS courses) scare off CEOs</p><p>•  Budget hacks: Vendor deals, free meetups (e.g., Phoenix East Valley), and LinkedIn Learning</p><p>•  Justifying conferences with ROI (reports, team training)</p><p>•  Employee initiative vs. leadership responsibility</p><p>•  Training as part of compensation and culture</p><p>•  Staying ahead with job research and the “seven whys”</p><p>😂 Bonus: Hear about the hostel pinkeye saga—a lesson in cost-cutting gone wild!</p><p>📌 Timestamps:</p><p>0:00:00 - Intro: Staying Up-to-Date</p><p>0:02:34 - Budgeting Challenges</p><p>0:09:05 - Vendor Training Tricks</p><p>0:18:23 - Justifying Conferences</p><p>0:36:02 - Free Training Options</p><p>0:43:10 - Employee &amp; Leader Roles</p><p>0:54:26 - Black Hat Cost Breakdown</p><p>1:05:26 - Closing Tips</p><p>💬 Drop your training hacks in the comments! Subscribe @DTFCyberPodcast for more cyber realness. Join us next week—stay safe!</p><p>🔗 Full Episode: [Link to Episode 18]</p><p>🌐 Learn more: https://www.youtube.com/@DTFCyberPodcast</p><p>#Cybersecurity #Training #BlackHat #RSAConference #CyberCareer #DTFCyberPodcast</p><p>Phoenix Cyber Meetup:</p><p>EVSec https://www.meetup.com/evsecaz</p><p><br></p><p>SANS pricing: </p><p>https://www.sans.org/cyber-security-courses/advanced-security-essentials-enterprise-defender</p><p><br></p><p>UI/UX:</p><p>https://www.linkedin.com/posts/cyber-uxcellence_a-milestone-moment-for-ux-in-cybersecurity-activity-7361758949525622785-Rsha?utm_source=social_share_send&amp;utm_medium=member_desktop_web&amp;rcm=ACoAAAPdJL0B8xce6ECZfPNPS2Hp24evoT2uY0E</p><p><br></p><p>Online Training Resources: </p><p>https://explore.skillbuilder.aws/learn (AWS Skill Builder – Security Learning Plans)</p><p>https://www.cloudskillsboost.google/ (Google Cloud Skills Boost – Security Labs &amp; Quests)</p><p><br></p><p>Use of "Five Why's" : </p><p>https://www.corporatecomplianceinsights.com/want-better-incident-response-keep-asking-why/</p><p><br></p><p>Phoenix Community Meetup Groups:</p><p>https://owasp.org/www-chapter-phoenix/ (OWASP Phoenix)</p><p>https://engage.isaca.org/phoenixchapter/home (ISACA Phoenix Chapter)</p><p>https://isc2chapterphoenix.org/ (ISC2 Phoenix Chapter)</p><p><br></p><p>Linkedin:</p><p>Damian: https://www.linkedin.com/in/damianchung/</p><p>Troy: https://www.linkedin.com/in/kosovotroy/</p><p>Fern: https://www.linkedin.com/in/fernrojasaz/</p><p><br></p><p>Business Inquiries: dtf at cyberpodcast dot net</p>]]></content:encoded><link><![CDATA[https://cyberpodcast.net]]></link><guid isPermaLink="false">4d595c83-b9ee-468e-ad5e-050910154cff</guid><itunes:image href="https://artwork.captivate.fm/0da316bb-124c-4a8a-962d-abe0db5a9a4f/Untitled-design-2.jpg"/><pubDate>Mon, 01 Sep 2025 07:00:00 -0700</pubDate><enclosure url="https://episodes.captivate.fm/episode/4d595c83-b9ee-468e-ad5e-050910154cff.mp3" length="101158568" type="audio/mpeg"/><itunes:duration>01:09:23</itunes:duration><itunes:explicit>false</itunes:explicit><itunes:episodeType>full</itunes:episodeType><itunes:episode>18</itunes:episode><podcast:episode>18</podcast:episode><podcast:chapters url="https://transcripts.captivate.fm/chapter-4a67eff0-e9b2-43b4-a24c-7c78f5f56c6e.json" type="application/json+chapters"/><podcast:alternateEnclosure type="video/youtube" title="Why Cybersecurity Training is Often Ignored #DTF018"><podcast:source uri="https://youtu.be/NfGkwaDDT2k"/></podcast:alternateEnclosure></item><item><title>Is Your Mobile Phone Secretly at Risk? #DFT017</title><itunes:title>Is Your Mobile Phone Secretly at Risk? #DFT017</itunes:title><description><![CDATA[<p>In Episode 17 of the **DTF Cyber Podcast**, hosts Damian, Troy, and Fern tackle three cybersecurity threats that could impact your daily life: zero-day exploits on mobile devices, hardware-based attacks via webcams and laptops, and ATM/network breaches using physical devices. Drawing from recent 2025 incidents like Apple's CVE-2025-43300, Lenovo's "BadCam" flaw, and the "CAKETAP" rootkit, they break down risks, share practical tips on patching, privacy, and layered defenses, and emphasize resilience over perfect prevention. Whether you're an iPhone user, remote worker, or ATM frequenter, this episode delivers actionable insights with the trio's signature banter and real-world stories.</p><p>🔔 Subscribe to **DTF Cyber Podcast** for weekly cybersecurity discussions: https://www.youtube.com/@DTFCyberPodcast</p><p>👍 Like, comment, and share your biggest patching pet peeve below!</p><p>📱 Follow us on X: @DTFCyberPodcast</p><p>**Timestamps:**</p><p>00:00 - Intro: Episode overview and personal impacts of zero-days, webcams, and ATMs</p><p>01:12 - Zero-Day Exploits: Apple vulnerabilities, myths about iOS security, and patching urgency</p><p>04:23 - MDM and Privacy: Balancing BYOD risks, EU regulations, and employee monitoring</p><p>07:14 - Browser and App Patching: Managing third-party tools and auto-updates</p><p>10:01 - Data Leaks via Cloud Tools: OneDrive instances and insider threats</p><p>12:24 - VPNs and Privacy Concerns: User paranoia and employer trust</p><p>15:02 - Work-Life Balance: Salary expectations vs. 24/7 access</p><p>18:09 - AI-Accelerated Exploits: Threat actors weaponizing patches in hours</p><p>23:52 - IT vs. Security: Balancing rapid patching with testing</p><p>26:05 - Hardware Attacks: Webcams as entry points (BadCam exploit)</p><p>29:01 - Firmware Risks: Updating drivers and BIOS vulnerabilities</p><p>32:39 - Physical Access Threats: Hotel room espionage and lost devices</p><p>35:34 - Convenience vs. Security: Reducing user friction in tools</p><p>40:03 - Proof-of-Concept Testing: Involving non-tech users for adoption</p><p>43:32 - ATM Breaches: Raspberry Pi rootkits and network compromises</p><p>46:13 - Card Skimmers vs. Deeper Hacks: Physical-cyber blends</p><p>49:39 - Financial Tips: Separating accounts and credit card protections</p><p>52:33 - Anomaly Detection: Monitoring for Raspberry Pi drops and flippers</p><p>56:47 - Defense in Depth: Layers, resilience, and rapid response</p><p>58:08 - Closing Thoughts: Patch promptly, understand policies, and stay vigilant</p><p><br></p><p>#Cybersecurity #ZeroDay #WebcamHacks #ATMBreaches #DTFCyberPodcast #CyberTips #AppleSecurity #HardwareVulnerabilities #NetworkSecurity</p><p><br></p><p>### Zero-Day Exploits</p><p>1. **Link**: https://safe.security/resources/blog/most-likely-damaging-cyber-threats-vulnerabilities-2025/</p><p>   - **Relevance**: Discusses 2025 zero-day trends, including Apple’s CVE-2025-43300, aligning with the podcast’s focus on mobile device vulnerabilities and rapid patching needs.</p><p><br></p><p>2. **Link**: https://stonefly.com/resources/zero-day-exploits-cyber-threats-you-cant-see-coming</p><p>   - **Relevance**: Covers AI’s role in scaling zero-day attacks, matching Troy’s discussion of AI reverse-engineering patches and Fern’s point about targeting unpatched devices.</p><p><br></p><p>### Hardware-Based Attacks</p><p>3. **Link**: https://www.datasunrise.com/zero-day-exploit/</p><p>   - **Relevance**: Explores hardware vulnerabilities like firmware flaws, tying to "BadCam" and "ReVault" exploits and Troy’s emphasis on BIOS/driver risks.</p><p><br></p><p>4. **Link**: https://www.blackfog.com/zero-day-security-exploits/</p><p>   - **Relevance**: Details hardware-based zero-day risks, supporting Damian’s hotel room espionage concerns and Troy’s firmware update focus.</p><p><br></p><p>### ATM and Network Breaches</p><p>5. **Link**: https://www.greynoise.io/blog/2025s-biggest-cybersecurity-threats-exposed</p><p>   - **Relevance**: Addresses infrastructure attacks, aligning with the CAKETAP rootkit incident and the hosts’ discussion of physical device vulnerabilities.</p><p><br></p><p>Linkedin:</p><p>Damian: https://www.linkedin.com/in/damianchung/</p><p>Troy: https://www.linkedin.com/in/kosovotroy/</p><p>Fern: https://www.linkedin.com/in/fernrojasaz/</p><p><br></p><p>Business Inquiries: dtf at cyberpodcast dot net</p>]]></description><content:encoded><![CDATA[<p>In Episode 17 of the **DTF Cyber Podcast**, hosts Damian, Troy, and Fern tackle three cybersecurity threats that could impact your daily life: zero-day exploits on mobile devices, hardware-based attacks via webcams and laptops, and ATM/network breaches using physical devices. Drawing from recent 2025 incidents like Apple's CVE-2025-43300, Lenovo's "BadCam" flaw, and the "CAKETAP" rootkit, they break down risks, share practical tips on patching, privacy, and layered defenses, and emphasize resilience over perfect prevention. Whether you're an iPhone user, remote worker, or ATM frequenter, this episode delivers actionable insights with the trio's signature banter and real-world stories.</p><p>🔔 Subscribe to **DTF Cyber Podcast** for weekly cybersecurity discussions: https://www.youtube.com/@DTFCyberPodcast</p><p>👍 Like, comment, and share your biggest patching pet peeve below!</p><p>📱 Follow us on X: @DTFCyberPodcast</p><p>**Timestamps:**</p><p>00:00 - Intro: Episode overview and personal impacts of zero-days, webcams, and ATMs</p><p>01:12 - Zero-Day Exploits: Apple vulnerabilities, myths about iOS security, and patching urgency</p><p>04:23 - MDM and Privacy: Balancing BYOD risks, EU regulations, and employee monitoring</p><p>07:14 - Browser and App Patching: Managing third-party tools and auto-updates</p><p>10:01 - Data Leaks via Cloud Tools: OneDrive instances and insider threats</p><p>12:24 - VPNs and Privacy Concerns: User paranoia and employer trust</p><p>15:02 - Work-Life Balance: Salary expectations vs. 24/7 access</p><p>18:09 - AI-Accelerated Exploits: Threat actors weaponizing patches in hours</p><p>23:52 - IT vs. Security: Balancing rapid patching with testing</p><p>26:05 - Hardware Attacks: Webcams as entry points (BadCam exploit)</p><p>29:01 - Firmware Risks: Updating drivers and BIOS vulnerabilities</p><p>32:39 - Physical Access Threats: Hotel room espionage and lost devices</p><p>35:34 - Convenience vs. Security: Reducing user friction in tools</p><p>40:03 - Proof-of-Concept Testing: Involving non-tech users for adoption</p><p>43:32 - ATM Breaches: Raspberry Pi rootkits and network compromises</p><p>46:13 - Card Skimmers vs. Deeper Hacks: Physical-cyber blends</p><p>49:39 - Financial Tips: Separating accounts and credit card protections</p><p>52:33 - Anomaly Detection: Monitoring for Raspberry Pi drops and flippers</p><p>56:47 - Defense in Depth: Layers, resilience, and rapid response</p><p>58:08 - Closing Thoughts: Patch promptly, understand policies, and stay vigilant</p><p><br></p><p>#Cybersecurity #ZeroDay #WebcamHacks #ATMBreaches #DTFCyberPodcast #CyberTips #AppleSecurity #HardwareVulnerabilities #NetworkSecurity</p><p><br></p><p>### Zero-Day Exploits</p><p>1. **Link**: https://safe.security/resources/blog/most-likely-damaging-cyber-threats-vulnerabilities-2025/</p><p>   - **Relevance**: Discusses 2025 zero-day trends, including Apple’s CVE-2025-43300, aligning with the podcast’s focus on mobile device vulnerabilities and rapid patching needs.</p><p><br></p><p>2. **Link**: https://stonefly.com/resources/zero-day-exploits-cyber-threats-you-cant-see-coming</p><p>   - **Relevance**: Covers AI’s role in scaling zero-day attacks, matching Troy’s discussion of AI reverse-engineering patches and Fern’s point about targeting unpatched devices.</p><p><br></p><p>### Hardware-Based Attacks</p><p>3. **Link**: https://www.datasunrise.com/zero-day-exploit/</p><p>   - **Relevance**: Explores hardware vulnerabilities like firmware flaws, tying to "BadCam" and "ReVault" exploits and Troy’s emphasis on BIOS/driver risks.</p><p><br></p><p>4. **Link**: https://www.blackfog.com/zero-day-security-exploits/</p><p>   - **Relevance**: Details hardware-based zero-day risks, supporting Damian’s hotel room espionage concerns and Troy’s firmware update focus.</p><p><br></p><p>### ATM and Network Breaches</p><p>5. **Link**: https://www.greynoise.io/blog/2025s-biggest-cybersecurity-threats-exposed</p><p>   - **Relevance**: Addresses infrastructure attacks, aligning with the CAKETAP rootkit incident and the hosts’ discussion of physical device vulnerabilities.</p><p><br></p><p>Linkedin:</p><p>Damian: https://www.linkedin.com/in/damianchung/</p><p>Troy: https://www.linkedin.com/in/kosovotroy/</p><p>Fern: https://www.linkedin.com/in/fernrojasaz/</p><p><br></p><p>Business Inquiries: dtf at cyberpodcast dot net</p>]]></content:encoded><link><![CDATA[https://cyberpodcast.net]]></link><guid isPermaLink="false">d6697ef1-aca6-4024-a9d7-14afbc6a8586</guid><itunes:image href="https://artwork.captivate.fm/24730cd2-c889-4c49-87cf-37af9d7128ee/MANAGING-ZERO-DAYS.png"/><pubDate>Mon, 25 Aug 2025 07:00:00 -0700</pubDate><enclosure url="https://episodes.captivate.fm/episode/d6697ef1-aca6-4024-a9d7-14afbc6a8586.mp3" length="88648919" type="audio/mpeg"/><itunes:duration>01:00:50</itunes:duration><itunes:explicit>false</itunes:explicit><itunes:episodeType>full</itunes:episodeType><itunes:episode>17</itunes:episode><podcast:episode>17</podcast:episode><podcast:chapters url="https://transcripts.captivate.fm/chapter-6440e983-f9e0-40b3-abad-76d6be951dea.json" type="application/json+chapters"/></item><item><title>Cyber Risks Unmasked: Reporting the Threats #DTF016</title><itunes:title>Cyber Risks Unmasked: Reporting the Threats #DTF016</itunes:title><description><![CDATA[<p>Join hosts Damian, Troy, and Fern for Episode 16 of the DTF Cyber Podcast, featuring special guest Dina Mathers, CISO at Carvana. Recorded on August 18, 2025, this episode dives deep into three critical topics shaping the cybersecurity landscape. From measuring the impact of cyber spend to uncovering widespread weaknesses in critical infrastructure, we unpack it all with real-world insights and actionable strategies. Whether you're a seasoned pro or just starting out, this episode is packed with "nuggets of gold" to elevate your game. Don't miss the banter on DTF dinners, the debate on best-of-breed vs. platforms, and why security leaders might just be the best salespeople in the world. Subscribe for more cyber realness every Monday!</p><p>0:00:00 - Intro: Special guest Dina Mathers</p><p>0:05:51 - Metrics debate: Spend as % of revenue/IT budget vs. data-driven approaches</p><p>0:07:24 - Key KPIs: MTTD/MTTR, patching speed, phishing rates</p><p>0:09:16 - Budgeting strategies: Industry benchmarks, risk-based cases, storytelling</p><p>0:12:20 - Tool overlap woes: 30% waste per Gartner 2023; best-of-breed vs. platforms</p><p>0:14:52 - Pro tips: Carve innovation funds for startups/POCs; audit tools yearly for ROI</p><p>0:25:00 - How poor metrics blindspot funding, leaving orgs vulnerable</p><p>0:28:40 - Real-world angles: Procurement pushback, business use cases</p><p>0:32:32 - Career advice: Be proactive, relate news to your env, automate tasks</p><p>0:40:00 - Basics failures: Weak creds, poor segmentation, no logging</p><p>0:45:26 - Critical infra gaps: 16 domains, antiquated systems, public-private partnerships</p><p>0:52:07 - Fixes: Layer security, asset inventory, periodic table mapping, empower teams</p><p>0:58:25 - Tease: Non-human identities (NHI) as future ep topic</p><p>1:00:01 - Fern's thought: Security leaders as elite salespeople</p><p>1:03:42 - Nuggets: Don't store creds in browsers; strong infra passwords; storytelling sells</p><p>1:05:46 - Shoutouts to Dina, past eps references, listen twice for gold</p><p>1:06:15 - Outro</p><p>Articles:</p><p>https://www.wsj.com/articles/how-to-measure-cybersecurity-spending-wsj-readers-weigh-in-12e2b06b</p><p><br></p><p>https://securityboulevard.com/2025/08/cisa-coast-guard-hunt-engagement-offer-path-to-protect-critical-infrastructure/</p><p><br></p><p>"Periodic Table" : </p><p>https://www.balbix.com/blog/six-step-cyber-insurance-policy-playbook/</p><p><br></p><p>Linkedin:</p><p><br></p><p>Dina Mathers: https://www.linkedin.com/in/dinamathers/</p><p>Damian: https://www.linkedin.com/in/damianchung/</p><p>Troy: https://www.linkedin.com/in/kosovotroy/</p><p>Fern: https://www.linkedin.com/in/fernrojasaz/</p><p><br></p><p>Business Inquiries: dtf at cyberpodcast dot net</p>]]></description><content:encoded><![CDATA[<p>Join hosts Damian, Troy, and Fern for Episode 16 of the DTF Cyber Podcast, featuring special guest Dina Mathers, CISO at Carvana. Recorded on August 18, 2025, this episode dives deep into three critical topics shaping the cybersecurity landscape. From measuring the impact of cyber spend to uncovering widespread weaknesses in critical infrastructure, we unpack it all with real-world insights and actionable strategies. Whether you're a seasoned pro or just starting out, this episode is packed with "nuggets of gold" to elevate your game. Don't miss the banter on DTF dinners, the debate on best-of-breed vs. platforms, and why security leaders might just be the best salespeople in the world. Subscribe for more cyber realness every Monday!</p><p>0:00:00 - Intro: Special guest Dina Mathers</p><p>0:05:51 - Metrics debate: Spend as % of revenue/IT budget vs. data-driven approaches</p><p>0:07:24 - Key KPIs: MTTD/MTTR, patching speed, phishing rates</p><p>0:09:16 - Budgeting strategies: Industry benchmarks, risk-based cases, storytelling</p><p>0:12:20 - Tool overlap woes: 30% waste per Gartner 2023; best-of-breed vs. platforms</p><p>0:14:52 - Pro tips: Carve innovation funds for startups/POCs; audit tools yearly for ROI</p><p>0:25:00 - How poor metrics blindspot funding, leaving orgs vulnerable</p><p>0:28:40 - Real-world angles: Procurement pushback, business use cases</p><p>0:32:32 - Career advice: Be proactive, relate news to your env, automate tasks</p><p>0:40:00 - Basics failures: Weak creds, poor segmentation, no logging</p><p>0:45:26 - Critical infra gaps: 16 domains, antiquated systems, public-private partnerships</p><p>0:52:07 - Fixes: Layer security, asset inventory, periodic table mapping, empower teams</p><p>0:58:25 - Tease: Non-human identities (NHI) as future ep topic</p><p>1:00:01 - Fern's thought: Security leaders as elite salespeople</p><p>1:03:42 - Nuggets: Don't store creds in browsers; strong infra passwords; storytelling sells</p><p>1:05:46 - Shoutouts to Dina, past eps references, listen twice for gold</p><p>1:06:15 - Outro</p><p>Articles:</p><p>https://www.wsj.com/articles/how-to-measure-cybersecurity-spending-wsj-readers-weigh-in-12e2b06b</p><p><br></p><p>https://securityboulevard.com/2025/08/cisa-coast-guard-hunt-engagement-offer-path-to-protect-critical-infrastructure/</p><p><br></p><p>"Periodic Table" : </p><p>https://www.balbix.com/blog/six-step-cyber-insurance-policy-playbook/</p><p><br></p><p>Linkedin:</p><p><br></p><p>Dina Mathers: https://www.linkedin.com/in/dinamathers/</p><p>Damian: https://www.linkedin.com/in/damianchung/</p><p>Troy: https://www.linkedin.com/in/kosovotroy/</p><p>Fern: https://www.linkedin.com/in/fernrojasaz/</p><p><br></p><p>Business Inquiries: dtf at cyberpodcast dot net</p>]]></content:encoded><link><![CDATA[https://cyberpodcast.net]]></link><guid isPermaLink="false">a22b63de-d43e-4af0-ab5d-699d11a68b5b</guid><itunes:image href="https://artwork.captivate.fm/bfd7b323-9f9c-4302-818d-7e4fd1cd31d2/pod-thumb-DTF16.png"/><pubDate>Mon, 18 Aug 2025 09:00:00 -0700</pubDate><enclosure url="https://episodes.captivate.fm/episode/a22b63de-d43e-4af0-ab5d-699d11a68b5b.mp3" length="96348232" type="audio/mpeg"/><itunes:duration>01:06:43</itunes:duration><itunes:explicit>false</itunes:explicit><itunes:episodeType>full</itunes:episodeType><itunes:episode>16</itunes:episode><podcast:episode>16</podcast:episode><podcast:chapters url="https://transcripts.captivate.fm/chapter-e33913c1-9cdd-4730-b392-1eb7a708132d.json" type="application/json+chapters"/><podcast:alternateEnclosure type="video/youtube" title="Cyber Risks Unmasked: Reporting the Threats #DTF016"><podcast:source uri="https://youtu.be/8fJn7sAQQ-8"/></podcast:alternateEnclosure></item><item><title>What Really Happened at Black Hat This Year? #DTF015</title><itunes:title>What Really Happened at Black Hat This Year? #DTF015</itunes:title><description><![CDATA[<p>Join Damian, Troy, and Fern on Episode 15 of the DTF Cyber Podcast as they dive into a hilarious and insightful recap of Black Hat 2025 in Las Vegas! From Fern's first-time adventures and networking wins to debunking Wi-Fi myths, swag horror stories, and industry trends like AI SOCs, this episode is packed with real-talk for cyber pros and newcomers alike. Whether you're in security or just curious, get the lowdown on making conferences affordable, avoiding vendor traps, and planning for next year—including a DTF meetup pledge!</p><p>Don't miss out—subscribe to the DTF Cyber Podcast for weekly cyber insights: https://link.cyberpodcast.net</p><p>Timestamps:</p><p>00:00:00 - Intro: Welcome to Black Hat Recap Week</p><p>00:00:37 - Fern’s First Black Hat: Late Nights and Cool Vibes</p><p>00:01:38 - Debunking Wi-Fi/Bluetooth Myths at Hacker Cons</p><p>00:05:51 - Meeting Fans and Approaching Cyber Celebs</p><p>00:08:20 - Helping Newcomers: Introducing Stephanie to Luminaries</p><p>00:11:27 - Networking Without a Ticket: Black Hat on a Budget</p><p>00:12:25 - Rising Costs Push Networking to Hallways and Bars</p><p>00:15:40 - Affordable Vegas: $500 for Flights, Hotels, and Fun</p><p>00:16:54 - Sessions vs. Stealth Demos: What’s Worth It?</p><p>00:21:20- UI/UX Excellence Awards: Judging, Categories, and Passion for Intuitive Cyber Tools</p><p>00:37:48 - AI SOCs, Cloud Backups, and Ransomware Trends</p><p>00:38:12 - Swag Fails: Urinal Cakes and Branded Alexas</p><p>00:44:06 - Vendor Raffles: Super Bowl Tickets and Hidden Agendas</p><p>00:47:00 - AI Notetakers in Sales: Privacy vs. Convenience</p><p>00:51:53 - Branded Shirts and Avoiding LinkedIn Disasters</p><p>00:53:00 - Wrapping Up: Missed Events and DEF CON FOMO</p><p>00:56:21 - DTF Meetup Pledge for Black Hat 2026</p><p>00:57:00 - Outro: See You Next Week!</p><p><br></p><p>Hit like if you survived Black Hat (or wish you did), comment your wildest conference story, and subscribe for more unfiltered cyber chats with Damian, Troy, and Fern! #DTFCyber #BlackHat2025 #CybersecurityPodcast</p><p><br></p><p>Cyber UXcellence Awards</p><p>https://www.prnewswire.com/news-releases/mindgrub-announces-winners-of-inaugural-cyber-uxcellence-awards-at-black-hat-usa-2025-302523814.html</p><p><br></p><p>Linkedin:</p><p>Damian: https://www.linkedin.com/in/damianchung/</p><p>Troy: https://www.linkedin.com/in/kosovotroy/</p><p>Fern: https://www.linkedin.com/in/fernrojasaz/</p><p><br></p><p>Business Inquiries: dtf at cyberpodcast dot net</p>]]></description><content:encoded><![CDATA[<p>Join Damian, Troy, and Fern on Episode 15 of the DTF Cyber Podcast as they dive into a hilarious and insightful recap of Black Hat 2025 in Las Vegas! From Fern's first-time adventures and networking wins to debunking Wi-Fi myths, swag horror stories, and industry trends like AI SOCs, this episode is packed with real-talk for cyber pros and newcomers alike. Whether you're in security or just curious, get the lowdown on making conferences affordable, avoiding vendor traps, and planning for next year—including a DTF meetup pledge!</p><p>Don't miss out—subscribe to the DTF Cyber Podcast for weekly cyber insights: https://link.cyberpodcast.net</p><p>Timestamps:</p><p>00:00:00 - Intro: Welcome to Black Hat Recap Week</p><p>00:00:37 - Fern’s First Black Hat: Late Nights and Cool Vibes</p><p>00:01:38 - Debunking Wi-Fi/Bluetooth Myths at Hacker Cons</p><p>00:05:51 - Meeting Fans and Approaching Cyber Celebs</p><p>00:08:20 - Helping Newcomers: Introducing Stephanie to Luminaries</p><p>00:11:27 - Networking Without a Ticket: Black Hat on a Budget</p><p>00:12:25 - Rising Costs Push Networking to Hallways and Bars</p><p>00:15:40 - Affordable Vegas: $500 for Flights, Hotels, and Fun</p><p>00:16:54 - Sessions vs. Stealth Demos: What’s Worth It?</p><p>00:21:20- UI/UX Excellence Awards: Judging, Categories, and Passion for Intuitive Cyber Tools</p><p>00:37:48 - AI SOCs, Cloud Backups, and Ransomware Trends</p><p>00:38:12 - Swag Fails: Urinal Cakes and Branded Alexas</p><p>00:44:06 - Vendor Raffles: Super Bowl Tickets and Hidden Agendas</p><p>00:47:00 - AI Notetakers in Sales: Privacy vs. Convenience</p><p>00:51:53 - Branded Shirts and Avoiding LinkedIn Disasters</p><p>00:53:00 - Wrapping Up: Missed Events and DEF CON FOMO</p><p>00:56:21 - DTF Meetup Pledge for Black Hat 2026</p><p>00:57:00 - Outro: See You Next Week!</p><p><br></p><p>Hit like if you survived Black Hat (or wish you did), comment your wildest conference story, and subscribe for more unfiltered cyber chats with Damian, Troy, and Fern! #DTFCyber #BlackHat2025 #CybersecurityPodcast</p><p><br></p><p>Cyber UXcellence Awards</p><p>https://www.prnewswire.com/news-releases/mindgrub-announces-winners-of-inaugural-cyber-uxcellence-awards-at-black-hat-usa-2025-302523814.html</p><p><br></p><p>Linkedin:</p><p>Damian: https://www.linkedin.com/in/damianchung/</p><p>Troy: https://www.linkedin.com/in/kosovotroy/</p><p>Fern: https://www.linkedin.com/in/fernrojasaz/</p><p><br></p><p>Business Inquiries: dtf at cyberpodcast dot net</p>]]></content:encoded><link><![CDATA[https://cyberpodcast.net]]></link><guid isPermaLink="false">12b8e9a4-4086-4b43-a5ca-c666019224d8</guid><itunes:image href="https://artwork.captivate.fm/d6812ef9-8b01-43ab-906c-59f606fdd735/LGpPjIIbI-f7AGNlsOj9ApTy.png"/><pubDate>Mon, 11 Aug 2025 11:00:00 -0700</pubDate><enclosure url="https://episodes.captivate.fm/episode/12b8e9a4-4086-4b43-a5ca-c666019224d8.mp3" length="83599378" type="audio/mpeg"/><itunes:duration>57:38</itunes:duration><itunes:explicit>false</itunes:explicit><itunes:episodeType>full</itunes:episodeType><itunes:episode>15</itunes:episode><podcast:episode>15</podcast:episode><podcast:chapters url="https://transcripts.captivate.fm/chapter-52465d10-2ab5-4cb9-823d-9f15a270c6dd.json" type="application/json+chapters"/><podcast:alternateEnclosure type="video/youtube" title="What Really Happened at Black Hat This Year? #DTF015"><podcast:source uri="https://youtu.be/lIW0hIONM00"/></podcast:alternateEnclosure></item><item><title>Shadow AI: The Costly Threat Lurking in Your Company! #DTF014</title><itunes:title>Shadow AI: The Costly Threat Lurking in Your Company! #DTF014</itunes:title><description><![CDATA[<p>DTF Cyber Podcast Episode 14</p><p>Shadow AI: The Costly Threat Lurking in Your Company!</p><p>Join Damian, Troy, and “Average Fern” as they dive into the shadowy world of unauthorized AI tools in the workplace. Inspired by the latest IBM Cost of a Data Breach Report 2025, this episode uncovers how shadow AI is driving up breach costs and exposing sensitive data. Whether you’re a cybersecurity pro or just curious about tech risks, our experts break it down with real-world insights, relatable analogies, and practical advice.</p><p><br></p><p>In this episode:</p><p> • Damian and Troy explain what shadow AI really means and why it’s exploding.</p><p> • Fern asks the tough questions on risks, costs, and how to fight back.</p><p> • Plus, forward-looking tips to stay ahead of emerging threats.</p><p>Don’t miss this eye-opening discussion—subscribe for more cyber insights!</p><p><br></p><p>🔗 Related Article: https://www.cybersecuritydive.com/news/artificial-intelligence-security-shadow-ai-ibm-report/754009/ </p><p>🔗 IBM Report: Search for “IBM Cost of a Data Breach Report 2025” </p><p>🔗 Follow us on X: @DTFCyberPodcast </p><p><br></p><p>Timestamps: </p><p>0:00 - Intro: Welcome to DTF Cyber with Damian, Troy, and Fern </p><p>2:15 - What is Shadow AI? Defining the term and its rise 5:40 - How common is it? Stats from the IBM report (20% of breaches) </p><p>10:20 - Cost Breakdown: Why shadow AI adds $670K to breaches </p><p>15:05 - Data Risks: PII and IP exposure (65% and 40% stats) </p><p>20:30 - Security Holes: Lack of access controls (97% of cases) </p><p>25:45 - Spotting and Controlling Shadow AI: Practical steps for businesses </p><p>30:10 - Employee Tips: Avoiding risks as a non-IT user 35:25 - Governance Gap: Regulations vs. company responsibility </p><p>40:50 - Future Threats: What’s next for shadow AI? 45:15 - Key Advice: One tip for leaders to prevent breaches </p><p>48:00 - Outro</p><p><br></p><p>#Cybersecurity #ShadowAI #IBMReport #DataBreach #AI Risks</p><p><br></p><p>Thanks for watching! Like, comment, and share your thoughts on shadow AI below. What’s your biggest cyber concern?</p><p><br></p><p>Linkedin:</p><p>Damian: https://www.linkedin.com/in/damianchung/</p><p>Troy: https://www.linkedin.com/in/kosovotroy/</p><p>Fern: https://www.linkedin.com/in/fernrojasaz/</p><p><br></p><p>Business Inquiries: dtf at cyberpodcast dot net</p>]]></description><content:encoded><![CDATA[<p>DTF Cyber Podcast Episode 14</p><p>Shadow AI: The Costly Threat Lurking in Your Company!</p><p>Join Damian, Troy, and “Average Fern” as they dive into the shadowy world of unauthorized AI tools in the workplace. Inspired by the latest IBM Cost of a Data Breach Report 2025, this episode uncovers how shadow AI is driving up breach costs and exposing sensitive data. Whether you’re a cybersecurity pro or just curious about tech risks, our experts break it down with real-world insights, relatable analogies, and practical advice.</p><p><br></p><p>In this episode:</p><p> • Damian and Troy explain what shadow AI really means and why it’s exploding.</p><p> • Fern asks the tough questions on risks, costs, and how to fight back.</p><p> • Plus, forward-looking tips to stay ahead of emerging threats.</p><p>Don’t miss this eye-opening discussion—subscribe for more cyber insights!</p><p><br></p><p>🔗 Related Article: https://www.cybersecuritydive.com/news/artificial-intelligence-security-shadow-ai-ibm-report/754009/ </p><p>🔗 IBM Report: Search for “IBM Cost of a Data Breach Report 2025” </p><p>🔗 Follow us on X: @DTFCyberPodcast </p><p><br></p><p>Timestamps: </p><p>0:00 - Intro: Welcome to DTF Cyber with Damian, Troy, and Fern </p><p>2:15 - What is Shadow AI? Defining the term and its rise 5:40 - How common is it? Stats from the IBM report (20% of breaches) </p><p>10:20 - Cost Breakdown: Why shadow AI adds $670K to breaches </p><p>15:05 - Data Risks: PII and IP exposure (65% and 40% stats) </p><p>20:30 - Security Holes: Lack of access controls (97% of cases) </p><p>25:45 - Spotting and Controlling Shadow AI: Practical steps for businesses </p><p>30:10 - Employee Tips: Avoiding risks as a non-IT user 35:25 - Governance Gap: Regulations vs. company responsibility </p><p>40:50 - Future Threats: What’s next for shadow AI? 45:15 - Key Advice: One tip for leaders to prevent breaches </p><p>48:00 - Outro</p><p><br></p><p>#Cybersecurity #ShadowAI #IBMReport #DataBreach #AI Risks</p><p><br></p><p>Thanks for watching! Like, comment, and share your thoughts on shadow AI below. What’s your biggest cyber concern?</p><p><br></p><p>Linkedin:</p><p>Damian: https://www.linkedin.com/in/damianchung/</p><p>Troy: https://www.linkedin.com/in/kosovotroy/</p><p>Fern: https://www.linkedin.com/in/fernrojasaz/</p><p><br></p><p>Business Inquiries: dtf at cyberpodcast dot net</p>]]></content:encoded><link><![CDATA[https://cyberpodcast.net]]></link><guid isPermaLink="false">495faf52-f952-4a26-be2e-b42b1104fdf5</guid><itunes:image href="https://artwork.captivate.fm/ea0612f9-501c-44b8-90e6-01839201b94d/fMz9w6BojxijQFOEB4LBw4YK.png"/><pubDate>Mon, 04 Aug 2025 09:00:00 -0700</pubDate><enclosure url="https://episodes.captivate.fm/episode/495faf52-f952-4a26-be2e-b42b1104fdf5.mp3" length="92936969" type="audio/mpeg"/><itunes:duration>01:04:21</itunes:duration><itunes:explicit>false</itunes:explicit><itunes:episodeType>full</itunes:episodeType><itunes:episode>14</itunes:episode><podcast:episode>14</podcast:episode><podcast:chapters url="https://transcripts.captivate.fm/chapter-b9452203-358e-427c-9c39-82c4e716e1eb.json" type="application/json+chapters"/></item><item><title>Cyber Chaos: VPN Hacks, Breaches &amp; Chatbot Blunders! #DTF013</title><itunes:title>Cyber Chaos: VPN Hacks, Breaches &amp; Chatbot Blunders! #DTF013</itunes:title><description><![CDATA[<p>In this episode of the DTF Cyber Podcast (DTF013 v1), hosts Damian Chung, Troy, and Fern Rojas dive deep into the latest cybersecurity headlines, unpacking real-world incidents and sharing actionable insights to help you strengthen your defenses. From VPN breaches to third-party risks and AI chatbot vulnerabilities, we explore the common threads of identity management and zero-trust strategies that every security pro needs to know.</p><p>Key Topics Covered:</p><p>•  Ingram Micro VPN Attack: Analyzing a credential compromise that highlights the dangers of weak MFA and lateral movement in networks. Learn why zero-trust access and user education are non-negotiable.</p><p>•  Qantas Airlines Data Breach: Up to 6 million customer records exposed via a third-party platform—without financial data at risk, but a stark reminder of vendor oversight challenges. We discuss audits, prioritization, and why compliance isn’t enough.</p><p><br></p><p>•  McDonald’s AI Hiring Chatbot Vulnerability: Default credentials left unchanged, potentially leaking PII from millions of applicants. A classic case of shadow IT gone wrong, with tips on SSO, governance, and cross-departmental collaboration.</p><p><br></p><p>Timestamps: </p><p>00:00 - Intro </p><p>01:53 - Ingram Micro Incident Breakdown </p><p>25:31 - Qantas Breach Analysis </p><p>43:06 - McDonald’s Chatbot Vulnerability</p><p><br></p><p>Whether you’re a cybersecurity veteran or just starting out, this episode arms you with practical lessons from recent events. Don’t forget to like, subscribe, and hit the bell for more cyber deep dives! Share your thoughts in the comments—what’s your biggest third-party risk headache?</p><p><br></p><p><br></p><p>Articles:</p><p><br></p><p>https://www.darkreading.com/threat-intelligence/ingram-micro-ransomware-attack</p><p><br></p><p>https://www.darkreading.com/cyberattacks-data-breaches/qantas-airlines-breached-6m-customers</p><p><br></p><p>https://www.wired.com/story/mcdonalds-ai-hiring-chat-bot-paradoxai/</p><p><br></p><p><br></p><p>Linkedin:</p><p>Damian: https://www.linkedin.com/in/damianchung/</p><p>Troy: https://www.linkedin.com/in/kosovotroy/</p><p>Fern: https://www.linkedin.com/in/fernrojasaz/</p><p><br></p><p>Business Inquiries: dtf at cyberpodcast dot net</p>]]></description><content:encoded><![CDATA[<p>In this episode of the DTF Cyber Podcast (DTF013 v1), hosts Damian Chung, Troy, and Fern Rojas dive deep into the latest cybersecurity headlines, unpacking real-world incidents and sharing actionable insights to help you strengthen your defenses. From VPN breaches to third-party risks and AI chatbot vulnerabilities, we explore the common threads of identity management and zero-trust strategies that every security pro needs to know.</p><p>Key Topics Covered:</p><p>•  Ingram Micro VPN Attack: Analyzing a credential compromise that highlights the dangers of weak MFA and lateral movement in networks. Learn why zero-trust access and user education are non-negotiable.</p><p>•  Qantas Airlines Data Breach: Up to 6 million customer records exposed via a third-party platform—without financial data at risk, but a stark reminder of vendor oversight challenges. We discuss audits, prioritization, and why compliance isn’t enough.</p><p><br></p><p>•  McDonald’s AI Hiring Chatbot Vulnerability: Default credentials left unchanged, potentially leaking PII from millions of applicants. A classic case of shadow IT gone wrong, with tips on SSO, governance, and cross-departmental collaboration.</p><p><br></p><p>Timestamps: </p><p>00:00 - Intro </p><p>01:53 - Ingram Micro Incident Breakdown </p><p>25:31 - Qantas Breach Analysis </p><p>43:06 - McDonald’s Chatbot Vulnerability</p><p><br></p><p>Whether you’re a cybersecurity veteran or just starting out, this episode arms you with practical lessons from recent events. Don’t forget to like, subscribe, and hit the bell for more cyber deep dives! Share your thoughts in the comments—what’s your biggest third-party risk headache?</p><p><br></p><p><br></p><p>Articles:</p><p><br></p><p>https://www.darkreading.com/threat-intelligence/ingram-micro-ransomware-attack</p><p><br></p><p>https://www.darkreading.com/cyberattacks-data-breaches/qantas-airlines-breached-6m-customers</p><p><br></p><p>https://www.wired.com/story/mcdonalds-ai-hiring-chat-bot-paradoxai/</p><p><br></p><p><br></p><p>Linkedin:</p><p>Damian: https://www.linkedin.com/in/damianchung/</p><p>Troy: https://www.linkedin.com/in/kosovotroy/</p><p>Fern: https://www.linkedin.com/in/fernrojasaz/</p><p><br></p><p>Business Inquiries: dtf at cyberpodcast dot net</p>]]></content:encoded><link><![CDATA[https://cyberpodcast.net]]></link><guid isPermaLink="false">5ffec438-0f0d-4783-87af-817eec0c0ecf</guid><itunes:image href="https://artwork.captivate.fm/e2eac6b4-3835-423f-9f62-1a1a5253af8a/yoctYrdJ6VC5RFp2HX_KSBHo.jpg"/><pubDate>Mon, 28 Jul 2025 10:00:00 -0700</pubDate><enclosure url="https://episodes.captivate.fm/episode/5ffec438-0f0d-4783-87af-817eec0c0ecf.mp3" length="92345138" type="audio/mpeg"/><itunes:duration>01:01:41</itunes:duration><itunes:explicit>false</itunes:explicit><itunes:episodeType>full</itunes:episodeType><itunes:episode>13</itunes:episode><podcast:episode>13</podcast:episode><podcast:chapters url="https://transcripts.captivate.fm/chapter-efa36d6d-25ba-4a92-aaf5-44d1fc56b421.json" type="application/json+chapters"/><podcast:alternateEnclosure type="video/youtube" title="DTF013 v1"><podcast:source uri="https://youtu.be/jaquRtjPkbs"/></podcast:alternateEnclosure></item><item><title>Cybersecurity Skills Shortage: Landing Jobs for New Grads #DTF012</title><itunes:title>Cybersecurity Skills Shortage: Landing Jobs for New Grads #DTF012</itunes:title><description><![CDATA[<p>Welcome to Episode 12 of the DTF Cyber Podcast! 🎙️ Join hosts Damian, Troy, and Fern as they dive into the hottest topic in cybersecurity: breaking into the industry. 🛡️</p><p>In this episode, we tackle the cybersecurity skills gap, exploring why hiring managers struggle to find talent while many with cyber degrees face challenges landing roles. From the importance of networking and building trust to overcoming imposter syndrome, we share practical advice for job seekers and hiring managers alike. 🌐</p><p><br></p><p>Key topics include:</p><p><br></p><p>➡ Navigating the skills gap and unrealistic job requirements (3-5 years for "entry-level"? 🤔)</p><p>➡ The power of internships, referrals, and soft skills in landing your dream cyber job</p><p>➡ Addressing diversity in cybersecurity, including challenges faced by women and underrepresented groups</p><p>➡ Personal stories and actionable tips for building a career in this dynamic field</p><p><br></p><p>Whether you're a recent grad, a career switcher, or a hiring manager looking to build a strong team, this episode is packed with insights to help you succeed. Don’t miss out—subscribe now and join us every Monday for more cybersecurity discussions! 🚀</p><p><br></p><p>#Cybersecurity #CareerAdvice #SkillsGap #Networking #DiversityInTech #DTFCyberPodcast</p><p><br></p><p>📌 Hit that subscribe button to help us reach 500 subscribers and stay tuned for Episode 13!</p><p><br></p><p>00:00:00 — Cyber Degrees, No Jobs — What’s the Problem?</p><p>00:02:21 — Skills Gap? Or Networking Gap?</p><p>00:08:28 — Trust, Hiring, and the Risk of New Talent</p><p>00:14:07 — The Broken Job Description Problem</p><p>00:18:46 — Internships, Career Shifting &amp; Building Loyalty</p><p>00:22:20 — Soft Skills: Showing Up, Speaking Up &amp; Self-Improvement</p><p>00:31:07 — The Soft Skill Nobody Teaches: Clarity in Communication</p><p>00:38:20 — Diversity, Imposter Syndrome &amp; The Confidence Gap</p><p>00:47:02 — Networking: The Real Career Cheat Code</p><p>00:55:06 — Leadership’s Role in the Hiring Problem</p><p><br></p><p>Associated Article</p><p>https://www.techtarget.com/searchsecurity/tip/Cybersecurity-skills-gap-Why-it-exists-and-how-to-address-it</p><p><br></p><p>Linkedin:</p><p>Damian: https://www.linkedin.com/in/damianchung/</p><p>Troy: https://www.linkedin.com/in/kosovotroy/</p><p>Fern: https://www.linkedin.com/in/fernrojasaz/</p><p><br></p><p>Business Inquiries: dtf at cyberpodcast dot net</p>]]></description><content:encoded><![CDATA[<p>Welcome to Episode 12 of the DTF Cyber Podcast! 🎙️ Join hosts Damian, Troy, and Fern as they dive into the hottest topic in cybersecurity: breaking into the industry. 🛡️</p><p>In this episode, we tackle the cybersecurity skills gap, exploring why hiring managers struggle to find talent while many with cyber degrees face challenges landing roles. From the importance of networking and building trust to overcoming imposter syndrome, we share practical advice for job seekers and hiring managers alike. 🌐</p><p><br></p><p>Key topics include:</p><p><br></p><p>➡ Navigating the skills gap and unrealistic job requirements (3-5 years for "entry-level"? 🤔)</p><p>➡ The power of internships, referrals, and soft skills in landing your dream cyber job</p><p>➡ Addressing diversity in cybersecurity, including challenges faced by women and underrepresented groups</p><p>➡ Personal stories and actionable tips for building a career in this dynamic field</p><p><br></p><p>Whether you're a recent grad, a career switcher, or a hiring manager looking to build a strong team, this episode is packed with insights to help you succeed. Don’t miss out—subscribe now and join us every Monday for more cybersecurity discussions! 🚀</p><p><br></p><p>#Cybersecurity #CareerAdvice #SkillsGap #Networking #DiversityInTech #DTFCyberPodcast</p><p><br></p><p>📌 Hit that subscribe button to help us reach 500 subscribers and stay tuned for Episode 13!</p><p><br></p><p>00:00:00 — Cyber Degrees, No Jobs — What’s the Problem?</p><p>00:02:21 — Skills Gap? Or Networking Gap?</p><p>00:08:28 — Trust, Hiring, and the Risk of New Talent</p><p>00:14:07 — The Broken Job Description Problem</p><p>00:18:46 — Internships, Career Shifting &amp; Building Loyalty</p><p>00:22:20 — Soft Skills: Showing Up, Speaking Up &amp; Self-Improvement</p><p>00:31:07 — The Soft Skill Nobody Teaches: Clarity in Communication</p><p>00:38:20 — Diversity, Imposter Syndrome &amp; The Confidence Gap</p><p>00:47:02 — Networking: The Real Career Cheat Code</p><p>00:55:06 — Leadership’s Role in the Hiring Problem</p><p><br></p><p>Associated Article</p><p>https://www.techtarget.com/searchsecurity/tip/Cybersecurity-skills-gap-Why-it-exists-and-how-to-address-it</p><p><br></p><p>Linkedin:</p><p>Damian: https://www.linkedin.com/in/damianchung/</p><p>Troy: https://www.linkedin.com/in/kosovotroy/</p><p>Fern: https://www.linkedin.com/in/fernrojasaz/</p><p><br></p><p>Business Inquiries: dtf at cyberpodcast dot net</p>]]></content:encoded><link><![CDATA[https://cyberpodcast.net]]></link><guid isPermaLink="false">a4f34c02-0cb4-43a3-a2d8-b713036dbaff</guid><itunes:image href="https://artwork.captivate.fm/b3f91225-4aec-4aff-92bf-f42bca9e44bb/xNlVNsqWvPZLdrSnsnT8g2FS.png"/><pubDate>Mon, 21 Jul 2025 09:00:00 -0700</pubDate><enclosure url="https://episodes.captivate.fm/episode/a4f34c02-0cb4-43a3-a2d8-b713036dbaff.mp3" length="91338783" type="audio/mpeg"/><itunes:duration>01:02:56</itunes:duration><itunes:explicit>false</itunes:explicit><itunes:episodeType>full</itunes:episodeType><itunes:episode>12</itunes:episode><podcast:episode>12</podcast:episode><podcast:chapters url="https://transcripts.captivate.fm/chapter-17d76f1b-70ba-4ee1-bcb7-be9c1735f5f8.json" type="application/json+chapters"/><podcast:alternateEnclosure type="video/youtube" title="Cybersecurity Skills Shortage: Landing Jobs for New Grads #DTF012"><podcast:source uri="https://youtu.be/q3Jns2wv7Mw"/></podcast:alternateEnclosure></item><item><title>Why Did the DOJ Go After a Ransomware Negotiator? #DTF011</title><itunes:title>Why Did the DOJ Go After a Ransomware Negotiator? #DTF011</itunes:title><description><![CDATA[<p>#Cybersecurity #GoogleFine #Ransomware #EthicsInTech #Overemployment #RemoteWork #DTFCyberPodcast #Defcon2025</p><p>🎙️ DTF Cyber Podcast – Episode 011</p><p>Check out this week's episode of the DTF Cyber Podcast! On Monday, July 14th, hosts Damian, Troy, and Fern are joined by their very first special guest, Mike Manrod (CISO at Grand Canyon Education), also known as "DoubleM."</p><p><br></p><p>The team dives into the complex world of tech ethics with three major stories:</p><p><br></p><p>First, they tackle the news that Google has been ordered to pay $314 million for misusing Android users' cellular data. Is this a major privacy violation, or a low-priority risk for corporations focused on bigger threats? The hosts debate the real-world impact versus getting distracted by "shiny objects." </p><p><br></p><p>Next, the conversation turns to a developing story where a former ransomware negotiator is being investigated by the Department of Justice for allegedly taking kickbacks from cybercriminals. This sparks a broader discussion on business ethics, from accepting vendor gifts to the pressures facing tech leaders.</p><p><br></p><p>Finally, they explore the controversial topic of "overemployment". Is it unethical to work multiple remote jobs at once? The group discusses the difference between disclosed, ethical side-hustles and deceiving employers with mouse jigglers and C-minus work. This leads to a candid look at the "return to office" debate and what the future of work looks like in a post-COVID world.</p><p><br></p><p>Tune in for expert insights, hot takes, and a look at the ethical gray areas of cybersecurity.</p><p><br></p><p>Find our guest, Mike Manrod, presenting at Defcon Demo Labs! </p><p><br></p><p>TIMESTAMPS:</p><p>00:00:00 - Intro &amp; Topics</p><p>00:01:02 - Welcoming Our First Special Guest: Mike Manrod</p><p>00:05:04 - Google Ordered to Pay $314M for Cellular Data Use</p><p>00:24:22 - DOJ Investigates Ransomware Negotiator for Kickbacks</p><p>00:29:43 - Discussion: The Ethics of Vendor Gifts</p><p>00:45:30 - The Ethics of Being "Overemployed"</p><p>00:54:12 - The Great "Return to Office" Debate</p><p>01:04:05 - The Myth of Being a CISO</p><p>01:06:58 - Final Thoughts &amp; Outro</p><p><br></p><p>Articles in this Episode:</p><p>https://thehackernews.com/2025/07/google-ordered-to-pay-314m-for-misusing.html</p><p><br></p><p>https://www.bleepingcomputer.com/news/security/doj-investigates-ex-ransomware-negotiator-over-extortion-kickbacks/</p><p><br></p><p>https://therecord.media/russian-basketball-player-arrested-in-france-ransomware</p><p><br></p><p>https://www.businessinsider.com/overemployed-lessons-pros-cons-secretly-working-multiple-remote-jobs-2025-6</p><p><br></p><p>Linkedin:</p><p>Damian: https://www.linkedin.com/in/damianchung/</p><p>Troy: https://www.linkedin.com/in/kosovotroy/</p><p>Fern: https://www.linkedin.com/in/fernrojasaz/</p><p><br></p><p>Business Inquiries: dtf at cyberpodcast dot net</p>]]></description><content:encoded><![CDATA[<p>#Cybersecurity #GoogleFine #Ransomware #EthicsInTech #Overemployment #RemoteWork #DTFCyberPodcast #Defcon2025</p><p>🎙️ DTF Cyber Podcast – Episode 011</p><p>Check out this week's episode of the DTF Cyber Podcast! On Monday, July 14th, hosts Damian, Troy, and Fern are joined by their very first special guest, Mike Manrod (CISO at Grand Canyon Education), also known as "DoubleM."</p><p><br></p><p>The team dives into the complex world of tech ethics with three major stories:</p><p><br></p><p>First, they tackle the news that Google has been ordered to pay $314 million for misusing Android users' cellular data. Is this a major privacy violation, or a low-priority risk for corporations focused on bigger threats? The hosts debate the real-world impact versus getting distracted by "shiny objects." </p><p><br></p><p>Next, the conversation turns to a developing story where a former ransomware negotiator is being investigated by the Department of Justice for allegedly taking kickbacks from cybercriminals. This sparks a broader discussion on business ethics, from accepting vendor gifts to the pressures facing tech leaders.</p><p><br></p><p>Finally, they explore the controversial topic of "overemployment". Is it unethical to work multiple remote jobs at once? The group discusses the difference between disclosed, ethical side-hustles and deceiving employers with mouse jigglers and C-minus work. This leads to a candid look at the "return to office" debate and what the future of work looks like in a post-COVID world.</p><p><br></p><p>Tune in for expert insights, hot takes, and a look at the ethical gray areas of cybersecurity.</p><p><br></p><p>Find our guest, Mike Manrod, presenting at Defcon Demo Labs! </p><p><br></p><p>TIMESTAMPS:</p><p>00:00:00 - Intro &amp; Topics</p><p>00:01:02 - Welcoming Our First Special Guest: Mike Manrod</p><p>00:05:04 - Google Ordered to Pay $314M for Cellular Data Use</p><p>00:24:22 - DOJ Investigates Ransomware Negotiator for Kickbacks</p><p>00:29:43 - Discussion: The Ethics of Vendor Gifts</p><p>00:45:30 - The Ethics of Being "Overemployed"</p><p>00:54:12 - The Great "Return to Office" Debate</p><p>01:04:05 - The Myth of Being a CISO</p><p>01:06:58 - Final Thoughts &amp; Outro</p><p><br></p><p>Articles in this Episode:</p><p>https://thehackernews.com/2025/07/google-ordered-to-pay-314m-for-misusing.html</p><p><br></p><p>https://www.bleepingcomputer.com/news/security/doj-investigates-ex-ransomware-negotiator-over-extortion-kickbacks/</p><p><br></p><p>https://therecord.media/russian-basketball-player-arrested-in-france-ransomware</p><p><br></p><p>https://www.businessinsider.com/overemployed-lessons-pros-cons-secretly-working-multiple-remote-jobs-2025-6</p><p><br></p><p>Linkedin:</p><p>Damian: https://www.linkedin.com/in/damianchung/</p><p>Troy: https://www.linkedin.com/in/kosovotroy/</p><p>Fern: https://www.linkedin.com/in/fernrojasaz/</p><p><br></p><p>Business Inquiries: dtf at cyberpodcast dot net</p>]]></content:encoded><link><![CDATA[https://cyberpodcast.net]]></link><guid isPermaLink="false">67e5c2f3-ffe6-4395-94c9-941e82eea8b1</guid><itunes:image href="https://artwork.captivate.fm/5fab3a2c-4b89-4d87-aa64-ffa5a28ced60/5cbjzzFihCUgx7o_noQ3pFqf.png"/><pubDate>Tue, 15 Jul 2025 09:00:00 -0700</pubDate><enclosure url="https://episodes.captivate.fm/episode/67e5c2f3-ffe6-4395-94c9-941e82eea8b1.mp3" length="99175665" type="audio/mpeg"/><itunes:duration>01:08:29</itunes:duration><itunes:explicit>false</itunes:explicit><itunes:episodeType>full</itunes:episodeType><itunes:episode>11</itunes:episode><podcast:episode>11</podcast:episode><podcast:chapters url="https://transcripts.captivate.fm/chapter-be8d9ad1-7c49-4c80-b83a-bd55cada8a87.json" type="application/json+chapters"/><podcast:alternateEnclosure type="video/youtube" title="Why Did the DOJ Go After a Ransomware Negotiator? #DTF011"><podcast:source uri="https://youtu.be/QCr3QqzgXRA"/></podcast:alternateEnclosure></item><item><title>Hacking a Company to Sell to Them? What??? #DTF010</title><itunes:title>Hacking a Company to Sell to Them? What??? #DTF010</itunes:title><description><![CDATA[<p>What are some of the cyber risks to small mid-sized businesses? The latest report is out! There was also someone hacking into these small companies then trying to sell them cyber services. Is that ethical? We also cover the IntelBroker getting caught even though he was using Monero privacy coins. And finally we touch on Whatsapp being banned. What about other unauthorized encrypted communications apps? Checkout #DTF010</p><p>00:00 - Intro</p><p>01:22 - SMB Threat Report </p><p>20:43 - Unethical Hacking</p><p>39:30 - IntelBroker caught?</p><p>56:43 - WhatsApp banned on US GOV devices   </p><p>   </p><p>Articles this episode:</p><p>https://securelist.com/smb-threat-report-2025/116830/</p><p><br></p><p>https://www.bleepingcomputer.com/news/security/man-pleads-guilty-to-hacking-networks-to-pitch-security-services/</p><p><br></p><p>https://www.darkreading.com/cyberattacks-data-breaches/intebroker-suspect-arrested-charged-breaches</p><p><br></p><p>https://www.reuters.com/world/us/whatsapp-banned-us-house-representatives-devices-memo-2025-06-23/</p><p><br></p><p>Linkedin:</p><p>Damian: https://www.linkedin.com/in/damianchung/</p><p>Troy: https://www.linkedin.com/in/kosovotroy/</p><p>Fern: https://www.linkedin.com/in/fernrojasaz/</p><p><br></p><p>Business Inquiries: dtf at cyberpodcast dot net</p>]]></description><content:encoded><![CDATA[<p>What are some of the cyber risks to small mid-sized businesses? The latest report is out! There was also someone hacking into these small companies then trying to sell them cyber services. Is that ethical? We also cover the IntelBroker getting caught even though he was using Monero privacy coins. And finally we touch on Whatsapp being banned. What about other unauthorized encrypted communications apps? Checkout #DTF010</p><p>00:00 - Intro</p><p>01:22 - SMB Threat Report </p><p>20:43 - Unethical Hacking</p><p>39:30 - IntelBroker caught?</p><p>56:43 - WhatsApp banned on US GOV devices   </p><p>   </p><p>Articles this episode:</p><p>https://securelist.com/smb-threat-report-2025/116830/</p><p><br></p><p>https://www.bleepingcomputer.com/news/security/man-pleads-guilty-to-hacking-networks-to-pitch-security-services/</p><p><br></p><p>https://www.darkreading.com/cyberattacks-data-breaches/intebroker-suspect-arrested-charged-breaches</p><p><br></p><p>https://www.reuters.com/world/us/whatsapp-banned-us-house-representatives-devices-memo-2025-06-23/</p><p><br></p><p>Linkedin:</p><p>Damian: https://www.linkedin.com/in/damianchung/</p><p>Troy: https://www.linkedin.com/in/kosovotroy/</p><p>Fern: https://www.linkedin.com/in/fernrojasaz/</p><p><br></p><p>Business Inquiries: dtf at cyberpodcast dot net</p>]]></content:encoded><link><![CDATA[https://cyberpodcast.net]]></link><guid isPermaLink="false">0f7f077a-02b9-4eac-8272-32513deee5e4</guid><itunes:image href="https://artwork.captivate.fm/0bd44ec4-525a-4a50-9255-628b5249f78f/BNfw3UmLod9sIp8JXN_cCT6S.png"/><pubDate>Mon, 30 Jun 2025 10:00:00 -0700</pubDate><enclosure url="https://episodes.captivate.fm/episode/0f7f077a-02b9-4eac-8272-32513deee5e4.mp3" length="102294841" type="audio/mpeg"/><itunes:duration>01:10:35</itunes:duration><itunes:explicit>false</itunes:explicit><itunes:episodeType>full</itunes:episodeType><itunes:episode>10</itunes:episode><podcast:episode>10</podcast:episode><podcast:chapters url="https://transcripts.captivate.fm/chapter-f597f8ff-664f-418e-8569-4915c079ec75.json" type="application/json+chapters"/><podcast:alternateEnclosure type="video/youtube" title="Hacking a Company to Sell to Them? What??? #DTF010"><podcast:source uri="https://youtu.be/HxZgvPr-QfY"/></podcast:alternateEnclosure></item><item><title>Is this the end of Bitcoin? Quantum Computing vs Crypto #DTF009</title><itunes:title>Is this the end of Bitcoin? Quantum Computing vs Crypto #DTF009</itunes:title><description><![CDATA[<p>Google Outage, Quantum Computing vs Crypto, North Korean Fake IT Workers, How to get a Cyber Job! DTF Cyber Podcast EP009</p><p>What can we learn from the massive Google outage? Some really good discussion on trying to prepare for feature changes and potential issues. Change control? A big topic lately is Quantum Computing vs Bitcoin. Does this spell out the end of cryptocurrencies as we know it? Should you still invest in crypto? And finally for everyone looking for a new cyber job, how did Troy land his new role? What are some of his tips to get that job?</p><p><br></p><p><br></p><p>Buy Shannon Wilkinson's lates book here:</p><p><br></p><p>https://www.amazon.com/dp/B0FF4D663H</p><p><br></p><p>00:00 - Intro</p><p>01:21 - Google Outage Lessons</p><p>21:04 - US Seizes 7.74M Crypto</p><p>35:58 - Quantum Computing breaking Bitcoin</p><p>50:35 - Troy's big announcement</p><p>51:31 - Tips to get a Cyber Job</p><p><br></p><p>Articles in this Episode:</p><p><br></p><p>https://www.cnbc.com/2025/06/16/google-cloud-outage-apology.html</p><p><br></p><p>https://www.forbes.com/sites/bernardmarr/2025/06/12/will-quantum-computing-kill-bitcoin/</p><p><br></p><p>https://thehackernews.com/2025/06/us-seizes-774m-in-crypto-tied-to-north.html</p><p><br></p><p>Linkedin:</p><p>Damian: https://www.linkedin.com/in/damianchung/</p><p>Troy: https://www.linkedin.com/in/kosovotroy/</p><p>Fern: https://www.linkedin.com/in/fernrojasaz/</p><p><br></p><p>Business Inquiries: dtf at cyberpodcast dot net</p>]]></description><content:encoded><![CDATA[<p>Google Outage, Quantum Computing vs Crypto, North Korean Fake IT Workers, How to get a Cyber Job! DTF Cyber Podcast EP009</p><p>What can we learn from the massive Google outage? Some really good discussion on trying to prepare for feature changes and potential issues. Change control? A big topic lately is Quantum Computing vs Bitcoin. Does this spell out the end of cryptocurrencies as we know it? Should you still invest in crypto? And finally for everyone looking for a new cyber job, how did Troy land his new role? What are some of his tips to get that job?</p><p><br></p><p><br></p><p>Buy Shannon Wilkinson's lates book here:</p><p><br></p><p>https://www.amazon.com/dp/B0FF4D663H</p><p><br></p><p>00:00 - Intro</p><p>01:21 - Google Outage Lessons</p><p>21:04 - US Seizes 7.74M Crypto</p><p>35:58 - Quantum Computing breaking Bitcoin</p><p>50:35 - Troy's big announcement</p><p>51:31 - Tips to get a Cyber Job</p><p><br></p><p>Articles in this Episode:</p><p><br></p><p>https://www.cnbc.com/2025/06/16/google-cloud-outage-apology.html</p><p><br></p><p>https://www.forbes.com/sites/bernardmarr/2025/06/12/will-quantum-computing-kill-bitcoin/</p><p><br></p><p>https://thehackernews.com/2025/06/us-seizes-774m-in-crypto-tied-to-north.html</p><p><br></p><p>Linkedin:</p><p>Damian: https://www.linkedin.com/in/damianchung/</p><p>Troy: https://www.linkedin.com/in/kosovotroy/</p><p>Fern: https://www.linkedin.com/in/fernrojasaz/</p><p><br></p><p>Business Inquiries: dtf at cyberpodcast dot net</p>]]></content:encoded><link><![CDATA[https://cyberpodcast.net]]></link><guid isPermaLink="false">e4139d00-5840-413b-8d96-2f7a7eef7101</guid><itunes:image href="https://artwork.captivate.fm/4adf5896-c10c-4606-830d-fe9550fab958/OLUqfnkHExQRmNybSovC06l8.png"/><pubDate>Mon, 30 Jun 2025 09:00:00 -0700</pubDate><enclosure url="https://episodes.captivate.fm/episode/e4139d00-5840-413b-8d96-2f7a7eef7101.mp3" length="95360557" type="audio/mpeg"/><itunes:duration>01:05:55</itunes:duration><itunes:explicit>false</itunes:explicit><itunes:episodeType>full</itunes:episodeType><itunes:episode>9</itunes:episode><podcast:episode>9</podcast:episode><podcast:chapters url="https://transcripts.captivate.fm/chapter-6c7cf950-74c0-4a90-8eeb-05016e3f0d6d.json" type="application/json+chapters"/><podcast:alternateEnclosure type="video/youtube" title="Is this the end of Bitcoin? Quantum Computing vs Crypto #DTF009"><podcast:source uri="https://youtu.be/nPX1ueonF2Q"/></podcast:alternateEnclosure></item><item><title>Airlines Selling Traveler Data? Security Leader Burnout! #DTF008</title><itunes:title>Airlines Selling Traveler Data? Security Leader Burnout! #DTF008</itunes:title><description><![CDATA[<p>DTF Cyber Podcast EP008</p><p>Airlines selling your travel data to the government. Is this a privacy concern? Should they be allowed to sell your information? The government already has the travel data for no-fly lists, but should they even need to "buy" this info? What about the news article on smartwatches breaching air gapped systems? Are devices spying on you? And for the Security Leaders and CISOs.... Are you burning out earlier than normal? This latest article says most CISOs are looking to leave their jobs. Check out this week's cyber news commentary!</p><p>0:00 - Intro</p><p>02:39 - ARC selling your information </p><p>26:51 - SmartAttack via watches </p><p>40:35- CISO burnout</p><p><br></p><p>Articles in this Episode:</p><p>https://www.malwarebytes.com/blog/news/2025/06/us-airline-industry-quietly-selling-flight-data-to-dhs</p><p><br></p><p>https://www.bleepingcomputer.com/news/security/smartattack-uses-smartwatches-to-steal-data-from-air-gapped-systems/</p><p><br></p><p>https://www.csoonline.com/article/3998246/53-of-cyber-department-leaders-eyeing-the-exit.html</p><p><br></p><p>Linkedin:</p><p>Damian: https://www.linkedin.com/in/damianchung/</p><p>Troy: https://www.linkedin.com/in/kosovotroy/</p><p>Fern: https://www.linkedin.com/in/fernrojasaz/</p><p><br></p><p>Business Inquiries: dtf at cyberpodcast dot net</p>]]></description><content:encoded><![CDATA[<p>DTF Cyber Podcast EP008</p><p>Airlines selling your travel data to the government. Is this a privacy concern? Should they be allowed to sell your information? The government already has the travel data for no-fly lists, but should they even need to "buy" this info? What about the news article on smartwatches breaching air gapped systems? Are devices spying on you? And for the Security Leaders and CISOs.... Are you burning out earlier than normal? This latest article says most CISOs are looking to leave their jobs. Check out this week's cyber news commentary!</p><p>0:00 - Intro</p><p>02:39 - ARC selling your information </p><p>26:51 - SmartAttack via watches </p><p>40:35- CISO burnout</p><p><br></p><p>Articles in this Episode:</p><p>https://www.malwarebytes.com/blog/news/2025/06/us-airline-industry-quietly-selling-flight-data-to-dhs</p><p><br></p><p>https://www.bleepingcomputer.com/news/security/smartattack-uses-smartwatches-to-steal-data-from-air-gapped-systems/</p><p><br></p><p>https://www.csoonline.com/article/3998246/53-of-cyber-department-leaders-eyeing-the-exit.html</p><p><br></p><p>Linkedin:</p><p>Damian: https://www.linkedin.com/in/damianchung/</p><p>Troy: https://www.linkedin.com/in/kosovotroy/</p><p>Fern: https://www.linkedin.com/in/fernrojasaz/</p><p><br></p><p>Business Inquiries: dtf at cyberpodcast dot net</p>]]></content:encoded><link><![CDATA[https://cyberpodcast.net]]></link><guid isPermaLink="false">ce984727-182b-4207-86b5-8dd2456ab720</guid><itunes:image href="https://artwork.captivate.fm/765fd3c4-7351-4b64-bed8-969a17f6f773/M8qY8gxE8gXf3zTQiUGFkf_e.png"/><pubDate>Mon, 30 Jun 2025 08:00:00 -0700</pubDate><enclosure url="https://episodes.captivate.fm/episode/ce984727-182b-4207-86b5-8dd2456ab720.mp3" length="97583378" type="audio/mpeg"/><itunes:duration>01:04:50</itunes:duration><itunes:explicit>false</itunes:explicit><itunes:episodeType>full</itunes:episodeType><itunes:episode>8</itunes:episode><podcast:episode>8</podcast:episode><podcast:chapters url="https://transcripts.captivate.fm/chapter-9c086b64-eab8-4f2e-b98a-38f9205cb224.json" type="application/json+chapters"/><podcast:alternateEnclosure type="video/youtube" title="Airlines Selling Traveler Data? Security Leader Burnout! #DTF008"><podcast:source uri="https://youtu.be/EhbXuckJlRw"/></podcast:alternateEnclosure></item><item><title>ChatGPT Privacy Concerns? AT&amp;T Data Breach! #DTF007</title><itunes:title>ChatGPT Privacy Concerns? AT&amp;T Data Breach! #DTF007</itunes:title><description><![CDATA[<p>DTF Cyber Podcast EP007</p><p>Recent news highlights how OpenAI must retain ChatGPT logs, raising concerns about user privacy. Additionally, the AT&amp;T hack from 2021 has resurfaced, potentially exposing sensitive information again. These events underscore the importance of data privacy and cybersecurity in the digital age. #OpenAI #ChatGPT #DataPrivacy #ATTHack #sensitiveinformation </p><p><br></p><p>Use code: cyberpodcast10</p><p>Get 10% off the registration for CruiseCon West, the Flagship of Cybersecurity</p><p>https://cruisecon.com/</p><p><br></p><p>2:00- Open AI Court Order</p><p>26:00 - AT&amp;T Breach Data Released</p><p>40:30 - CruiseCon West 2025</p><p>45:55 - Cyber Resilience</p><p><br></p><p>Articles:</p><p><br></p><p>https://arstechnica.com/tech-policy/2025/06/openai-says-court-forcing-it-to-save-all-chatgpt-logs-is-a-privacy-nightmare/</p><p><br></p><p>https://www.theverge.com/news/681280/openai-storing-deleted-chats-nyt-lawsuit</p><p><br></p><p>https://www.bleepingcomputer.com/news/security/old-atandt-data-leak-repackaged-to-link-ssns-dobs-to-49m-phone-numbers/</p><p><br></p><p>Linkedin:</p><p>Damian: https://www.linkedin.com/in/damianchung/</p><p>Troy: https://www.linkedin.com/in/kosovotroy/</p><p>Fern: https://www.linkedin.com/in/fernrojasaz/</p><p><br></p><p>Business Inquiries: dtf at cyberpodcast dot net</p><p>cyberpodcast.net</p>]]></description><content:encoded><![CDATA[<p>DTF Cyber Podcast EP007</p><p>Recent news highlights how OpenAI must retain ChatGPT logs, raising concerns about user privacy. Additionally, the AT&amp;T hack from 2021 has resurfaced, potentially exposing sensitive information again. These events underscore the importance of data privacy and cybersecurity in the digital age. #OpenAI #ChatGPT #DataPrivacy #ATTHack #sensitiveinformation </p><p><br></p><p>Use code: cyberpodcast10</p><p>Get 10% off the registration for CruiseCon West, the Flagship of Cybersecurity</p><p>https://cruisecon.com/</p><p><br></p><p>2:00- Open AI Court Order</p><p>26:00 - AT&amp;T Breach Data Released</p><p>40:30 - CruiseCon West 2025</p><p>45:55 - Cyber Resilience</p><p><br></p><p>Articles:</p><p><br></p><p>https://arstechnica.com/tech-policy/2025/06/openai-says-court-forcing-it-to-save-all-chatgpt-logs-is-a-privacy-nightmare/</p><p><br></p><p>https://www.theverge.com/news/681280/openai-storing-deleted-chats-nyt-lawsuit</p><p><br></p><p>https://www.bleepingcomputer.com/news/security/old-atandt-data-leak-repackaged-to-link-ssns-dobs-to-49m-phone-numbers/</p><p><br></p><p>Linkedin:</p><p>Damian: https://www.linkedin.com/in/damianchung/</p><p>Troy: https://www.linkedin.com/in/kosovotroy/</p><p>Fern: https://www.linkedin.com/in/fernrojasaz/</p><p><br></p><p>Business Inquiries: dtf at cyberpodcast dot net</p><p>cyberpodcast.net</p>]]></content:encoded><link><![CDATA[https://cyberpodcast.net]]></link><guid isPermaLink="false">d8f5c61c-34fa-4b0f-bb5f-368d867ea420</guid><itunes:image href="https://artwork.captivate.fm/c96b5ddd-98f8-4b1e-87cc-83c1e4ff3eb9/DTF-logo-v3-3kx3k.png"/><pubDate>Mon, 09 Jun 2025 09:00:00 -0700</pubDate><enclosure url="https://episodes.captivate.fm/episode/d8f5c61c-34fa-4b0f-bb5f-368d867ea420.mp3" length="99583162" type="audio/mpeg"/><itunes:duration>01:07:00</itunes:duration><itunes:explicit>false</itunes:explicit><itunes:episodeType>full</itunes:episodeType><itunes:episode>7</itunes:episode><podcast:episode>7</podcast:episode><podcast:chapters url="https://transcripts.captivate.fm/chapter-c34b0d84-3079-422f-8fd0-4d751406ab81.json" type="application/json+chapters"/><podcast:alternateEnclosure type="video/youtube" title="ChatGPT Privacy Concerns? AT&amp;T Data Breach! #DTF007"><podcast:source uri="https://youtu.be/esmS_cAtdtc"/></podcast:alternateEnclosure></item><item><title>Did Reddit Just Get Fooled By AI Bots? Fake AI Company? #DTF006</title><itunes:title>Did Reddit Just Get Fooled By AI Bots? Fake AI Company? #DTF006</itunes:title><description><![CDATA[<p>DTF Cyber Podcast EP006</p><p>Was it ethical for researchers to us AI on reddit in conversations without letting users know? This AI successfully persuaded users. Should we be worried in the the information wars with AI bots? We also discuss the Getty lawsuit against an AI platform for using their images to train their LLM. What about an AI company that used real developers vs the AI they said they were using? Check out this episode of the DTF Cyber Podcast!</p><p>00:00 - Intro</p><p>01:00 - Reddit AI Experiment</p><p>14:00 - Getty Lawsuit</p><p>31:30 - Builder AI - Fake AI</p><p>49:20 - Crypto Kidnapping</p><p>Articles in this Episode:</p><p>https://www.newscientist.com/article/2478336-reddit-users-were-subjected-to-ai-powered-experiment-without-consent/</p><p><br></p><p>https://www.cnbc.com/2025/05/28/getty-ceo-stability-ai-lawsuit-doesnt-cover-industry-mass-theft.html</p><p><br></p><p>https://www.binance.com/en/square/post/24723372076545</p><p><br></p><p>https://abcnews.go.com/US/nypd-detectives-crypto-torture-kidnapping-case/story?id=122325180</p><p><br></p><p>Linkedin:</p><p>Damian: https://www.linkedin.com/in/damianchung/</p><p>Troy: https://www.linkedin.com/in/kosovotroy/</p><p>Fern: https://www.linkedin.com/in/fernrojasaz/</p><p><br></p><p>Business Inquiries: dtf at cyberpodcast dot net</p>]]></description><content:encoded><![CDATA[<p>DTF Cyber Podcast EP006</p><p>Was it ethical for researchers to us AI on reddit in conversations without letting users know? This AI successfully persuaded users. Should we be worried in the the information wars with AI bots? We also discuss the Getty lawsuit against an AI platform for using their images to train their LLM. What about an AI company that used real developers vs the AI they said they were using? Check out this episode of the DTF Cyber Podcast!</p><p>00:00 - Intro</p><p>01:00 - Reddit AI Experiment</p><p>14:00 - Getty Lawsuit</p><p>31:30 - Builder AI - Fake AI</p><p>49:20 - Crypto Kidnapping</p><p>Articles in this Episode:</p><p>https://www.newscientist.com/article/2478336-reddit-users-were-subjected-to-ai-powered-experiment-without-consent/</p><p><br></p><p>https://www.cnbc.com/2025/05/28/getty-ceo-stability-ai-lawsuit-doesnt-cover-industry-mass-theft.html</p><p><br></p><p>https://www.binance.com/en/square/post/24723372076545</p><p><br></p><p>https://abcnews.go.com/US/nypd-detectives-crypto-torture-kidnapping-case/story?id=122325180</p><p><br></p><p>Linkedin:</p><p>Damian: https://www.linkedin.com/in/damianchung/</p><p>Troy: https://www.linkedin.com/in/kosovotroy/</p><p>Fern: https://www.linkedin.com/in/fernrojasaz/</p><p><br></p><p>Business Inquiries: dtf at cyberpodcast dot net</p>]]></content:encoded><link><![CDATA[https://cyberpodcast.net]]></link><guid isPermaLink="false">a93f1bcc-753e-422b-9a22-608f5e8385fc</guid><itunes:image href="https://artwork.captivate.fm/7109da73-548b-4ddc-9f0c-0ecdfc56bdd6/dj8Oif1bKaF9qZAZMOSNrmuW.jpg"/><pubDate>Mon, 09 Jun 2025 09:00:00 -0700</pubDate><enclosure url="https://episodes.captivate.fm/episode/a93f1bcc-753e-422b-9a22-608f5e8385fc.mp3" length="122424549" type="audio/mpeg"/><itunes:duration>01:02:50</itunes:duration><itunes:explicit>false</itunes:explicit><itunes:episodeType>full</itunes:episodeType><itunes:episode>6</itunes:episode><podcast:episode>6</podcast:episode><podcast:chapters url="https://transcripts.captivate.fm/chapter-46f42dea-d288-4f85-a054-61de2952c880.json" type="application/json+chapters"/><podcast:alternateEnclosure type="video/youtube" title="Did Reddit Just Get Fooled By AI Bots? Fake AI Company? #DTF006"><podcast:source uri="https://youtu.be/PZMHWvUWfgQ"/></podcast:alternateEnclosure></item><item><title>Is Your Browser Safe From Dangerous Extensions? $400M Cyber Incident! #DTF005</title><itunes:title>Is Your Browser Safe From Dangerous Extensions? $400M Cyber Incident! #DTF005</itunes:title><description><![CDATA[<p>DTF Cyber Podcast EP005</p><p>What's up with these chrome extensions? 100s of malicious ones removed by Google. What are the threats and how should you protect your organization? Marks and Spencer in the UK also reported losses of $400M due to a cyber incident. How much should a cyber program spend to protect against this type of risk? Check out the full episode!</p><p>00:00:00 - Topics Intro</p><p>00:01:21 - Google Chrome Extensions Hijacking your information</p><p>00:17:30 - Marks and Spencer $400M Incident</p><p>00:37:40 - Text Scams around Toll Road Fees</p><p>00:48:59 - Krebs On Security DDOS Attack</p><p>Joe Sullivan Charity</p><p>https://www.joesullivansecurity.com/ukraine-friends/</p><p><br></p><p><br></p><p>Articles:</p><p>https://thehackernews.com/2025/05/100-fake-chrome-extensions-found.html</p><p><br></p><p>https://www.bleepingcomputer.com/news/security/marks-and-spencer-faces-402-million-profit-hit-after-cyberattack/</p><p><br></p><p>https://www.bankinfosecurity.com/change-healthcare-attack-cost-estimate-reaches-nearly-29b-a-26541</p><p><br></p><p>https://appleinsider.com/articles/25/05/06/googles-default-search-payments-to-apple-at-risk-in-antitrust-lawsuit</p><p><br></p><p>https://krebsonsecurity.com/2025/05/krebsonsecurity-hit-with-near-record-6-3-tbps-ddos/</p><p><br></p><p>Linkedin:</p><p>Damian: https://www.linkedin.com/in/damianchung/</p><p>Troy: https://www.linkedin.com/in/kosovotroy/</p><p>Fern: https://www.linkedin.com/in/fernrojasaz/</p><p><br></p><p>Business Inquiries: dtf at cyberpodcast dot net</p>]]></description><content:encoded><![CDATA[<p>DTF Cyber Podcast EP005</p><p>What's up with these chrome extensions? 100s of malicious ones removed by Google. What are the threats and how should you protect your organization? Marks and Spencer in the UK also reported losses of $400M due to a cyber incident. How much should a cyber program spend to protect against this type of risk? Check out the full episode!</p><p>00:00:00 - Topics Intro</p><p>00:01:21 - Google Chrome Extensions Hijacking your information</p><p>00:17:30 - Marks and Spencer $400M Incident</p><p>00:37:40 - Text Scams around Toll Road Fees</p><p>00:48:59 - Krebs On Security DDOS Attack</p><p>Joe Sullivan Charity</p><p>https://www.joesullivansecurity.com/ukraine-friends/</p><p><br></p><p><br></p><p>Articles:</p><p>https://thehackernews.com/2025/05/100-fake-chrome-extensions-found.html</p><p><br></p><p>https://www.bleepingcomputer.com/news/security/marks-and-spencer-faces-402-million-profit-hit-after-cyberattack/</p><p><br></p><p>https://www.bankinfosecurity.com/change-healthcare-attack-cost-estimate-reaches-nearly-29b-a-26541</p><p><br></p><p>https://appleinsider.com/articles/25/05/06/googles-default-search-payments-to-apple-at-risk-in-antitrust-lawsuit</p><p><br></p><p>https://krebsonsecurity.com/2025/05/krebsonsecurity-hit-with-near-record-6-3-tbps-ddos/</p><p><br></p><p>Linkedin:</p><p>Damian: https://www.linkedin.com/in/damianchung/</p><p>Troy: https://www.linkedin.com/in/kosovotroy/</p><p>Fern: https://www.linkedin.com/in/fernrojasaz/</p><p><br></p><p>Business Inquiries: dtf at cyberpodcast dot net</p>]]></content:encoded><link><![CDATA[https://cyberpodcast.net]]></link><guid isPermaLink="false">e0e8eca3-4cc5-4cc4-bfba-14936b95b947</guid><itunes:image href="https://artwork.captivate.fm/595ed7db-4f2a-418b-88bc-0e0a4b4ec118/UCXhyuQv7wezTVsVf-LZWAS_.png"/><pubDate>Mon, 26 May 2025 09:00:00 -0700</pubDate><enclosure url="https://episodes.captivate.fm/episode/e0e8eca3-4cc5-4cc4-bfba-14936b95b947.mp3" length="79324685" type="audio/mpeg"/><itunes:duration>54:27</itunes:duration><itunes:explicit>false</itunes:explicit><itunes:episodeType>full</itunes:episodeType><itunes:episode>5</itunes:episode><podcast:episode>5</podcast:episode><podcast:chapters url="https://transcripts.captivate.fm/chapter-05fe63e3-fc8a-4104-a4be-730de761f1ef.json" type="application/json+chapters"/><podcast:alternateEnclosure type="video/youtube" title="Is Your Browser Safe From Dangerous Extensions? $400M Cyber Incident! #DTF005"><podcast:source uri="https://youtu.be/POAGC-wdoJc"/></podcast:alternateEnclosure></item><item><title>Coinbase Data Exfiltrated: $20M Hacker Bounty. AI is changing cyber careers #DTF004</title><itunes:title>Coinbase Data Exfiltrated: $20M Hacker Bounty. AI is changing cyber careers #DTF004</itunes:title><description><![CDATA[<p>DTF Cyber Podcast EP004</p><p>Coinbase has insiders exfiltrate data and someone tries to make $20M off the data via extortion/ransom. Coinbase turns the tables and offers $20M for a bounty on the hackers! There is a discussion on what happened to cause the data loss in the first place and how we rate the Coinbase response.</p><p>There is a study suggesting that AI will change jobs. How does AI impact cyber jobs for anyone in growing their career, or looking to graduate soon?</p><p><br></p><p>The FBI issues a deepfake voice and video message warning. Check out this week's cyber discussions with Damian, Troy, and Fern.</p><p><br></p><p>00:00:00 - Intro</p><p>00:00:53 - Coinbase: Was it ransomware or extortion? </p><p>00:30:01 - Offshore labor, low-cost risk, and insider threats</p><p>00:45:01 - AI is coming for your job — or is it?      </p><p>01:02:21 - FBI warns AI is impersonating&nbsp;officials</p><p><br></p><p>Articles:</p><p>https://www.cnbc.com/2025/05/15/coinbase-says-hackers-bribed-staff-to-steal-customer-data-and-are-demanding-20-million-ransom.html</p><p><br></p><p>https://www.linkedin.com/pulse/ai-driven-agentification-work-impact-jobs-20242030-poweredbywiti-zbyfc/</p><p><br></p><p>https://www.cnn.com/2025/05/15/politics/fbi-warning-hackers-ai-voice-messages</p><p><br></p><p>Linkedin:</p><p>Damian: https://www.linkedin.com/in/damianchung/</p><p>Troy: https://www.linkedin.com/in/kosovotroy/</p><p>Fern: https://www.linkedin.com/in/fernrojasaz/</p><p><br></p><p>Business Inquiries: dtf at cyberpodcast dot net</p>]]></description><content:encoded><![CDATA[<p>DTF Cyber Podcast EP004</p><p>Coinbase has insiders exfiltrate data and someone tries to make $20M off the data via extortion/ransom. Coinbase turns the tables and offers $20M for a bounty on the hackers! There is a discussion on what happened to cause the data loss in the first place and how we rate the Coinbase response.</p><p>There is a study suggesting that AI will change jobs. How does AI impact cyber jobs for anyone in growing their career, or looking to graduate soon?</p><p><br></p><p>The FBI issues a deepfake voice and video message warning. Check out this week's cyber discussions with Damian, Troy, and Fern.</p><p><br></p><p>00:00:00 - Intro</p><p>00:00:53 - Coinbase: Was it ransomware or extortion? </p><p>00:30:01 - Offshore labor, low-cost risk, and insider threats</p><p>00:45:01 - AI is coming for your job — or is it?      </p><p>01:02:21 - FBI warns AI is impersonating&nbsp;officials</p><p><br></p><p>Articles:</p><p>https://www.cnbc.com/2025/05/15/coinbase-says-hackers-bribed-staff-to-steal-customer-data-and-are-demanding-20-million-ransom.html</p><p><br></p><p>https://www.linkedin.com/pulse/ai-driven-agentification-work-impact-jobs-20242030-poweredbywiti-zbyfc/</p><p><br></p><p>https://www.cnn.com/2025/05/15/politics/fbi-warning-hackers-ai-voice-messages</p><p><br></p><p>Linkedin:</p><p>Damian: https://www.linkedin.com/in/damianchung/</p><p>Troy: https://www.linkedin.com/in/kosovotroy/</p><p>Fern: https://www.linkedin.com/in/fernrojasaz/</p><p><br></p><p>Business Inquiries: dtf at cyberpodcast dot net</p>]]></content:encoded><link><![CDATA[https://cyberpodcast.net]]></link><guid isPermaLink="false">6060a2e7-388d-4ae9-9719-53686b464c62</guid><itunes:image href="https://artwork.captivate.fm/b8db10a4-0a5a-4731-a210-c7bb6d281995/xNEkd64N-npkqGPp6AkKW4Xv.png"/><pubDate>Mon, 26 May 2025 09:00:00 -0700</pubDate><enclosure url="https://episodes.captivate.fm/episode/6060a2e7-388d-4ae9-9719-53686b464c62.mp3" length="104544301" type="audio/mpeg"/><itunes:duration>01:11:29</itunes:duration><itunes:explicit>false</itunes:explicit><itunes:episodeType>full</itunes:episodeType><itunes:episode>4</itunes:episode><podcast:episode>4</podcast:episode><podcast:chapters url="https://transcripts.captivate.fm/chapter-81250d56-5c10-4d22-803a-0713da249ef0.json" type="application/json+chapters"/><podcast:alternateEnclosure type="video/youtube" title="Coinbase Data Exfiltrated: $20M Hacker Bounty. AI is changing cyber careers #DTF004"><podcast:source uri="https://youtu.be/ow_Y7F0pY4g"/></podcast:alternateEnclosure></item><item><title>$4M Crypto Stolen! Google AI Browser, Malvertising Threats #DTF003</title><itunes:title>$4M Crypto Stolen! Google AI Browser, Malvertising Threats #DTF003</itunes:title><description><![CDATA[<p>0:00 - Episode Topic Review</p><p>04:35:00 - Crypto Concerns around Social Engineering Scams and Robberies</p><p>18:50:00 - Browser Attacks and how Google is Leveraging AI to combat the risk </p><p>36:50:00 - Malvertising imitates a free tool used by many tech teams - RVTools</p><p><br></p><p>Linkedin:</p><p>Damian: https://www.linkedin.com/in/damianchung/</p><p>Troy: https://www.linkedin.com/in/kosovotroy/</p><p>Fern: https://www.linkedin.com/in/fernrojasaz/</p><p><br></p><p>Business Inquiries: dtf at cyberpodcast dot net</p>]]></description><content:encoded><![CDATA[<p>0:00 - Episode Topic Review</p><p>04:35:00 - Crypto Concerns around Social Engineering Scams and Robberies</p><p>18:50:00 - Browser Attacks and how Google is Leveraging AI to combat the risk </p><p>36:50:00 - Malvertising imitates a free tool used by many tech teams - RVTools</p><p><br></p><p>Linkedin:</p><p>Damian: https://www.linkedin.com/in/damianchung/</p><p>Troy: https://www.linkedin.com/in/kosovotroy/</p><p>Fern: https://www.linkedin.com/in/fernrojasaz/</p><p><br></p><p>Business Inquiries: dtf at cyberpodcast dot net</p>]]></content:encoded><link><![CDATA[https://cyberpodcast.net]]></link><guid isPermaLink="false">885c4042-db1b-4b3d-b4f0-474d444ca523</guid><itunes:image href="https://artwork.captivate.fm/553c910f-9d49-4e42-be05-bb3739abaa1d/AFnpBmVIuU9qjevwc3z2LeEu.png"/><pubDate>Mon, 12 May 2025 10:00:00 -0700</pubDate><enclosure url="https://episodes.captivate.fm/episode/885c4042-db1b-4b3d-b4f0-474d444ca523.mp3" length="95488497" type="audio/mpeg"/><itunes:duration>01:04:58</itunes:duration><itunes:explicit>false</itunes:explicit><itunes:episodeType>full</itunes:episodeType><itunes:episode>3</itunes:episode><podcast:episode>3</podcast:episode><podcast:chapters url="https://transcripts.captivate.fm/chapter-079448b3-2391-4fc8-a5fd-7d7f4457252d.json" type="application/json+chapters"/></item><item><title>RSA Recap, Zoom HIjacking, Remote Worker Scams</title><itunes:title>RSA Recap, Zoom HIjacking, Remote Worker Scams</itunes:title><description><![CDATA[<p>00:04:08 : RSA Recap</p><p>00:27:10 : Remote Worker Scams</p><p>00:52:29: Unprotected S3 Buckets</p><p>1:05:19 : Recap </p>]]></description><content:encoded><![CDATA[<p>00:04:08 : RSA Recap</p><p>00:27:10 : Remote Worker Scams</p><p>00:52:29: Unprotected S3 Buckets</p><p>1:05:19 : Recap </p>]]></content:encoded><link><![CDATA[https://cyberpodcast.net]]></link><guid isPermaLink="false">9f87c628-a17e-4c5d-b323-1cdc02da874b</guid><itunes:image href="https://artwork.captivate.fm/3a1a99fc-cb1f-456e-80da-b7e46a2b5c6a/9F-uPtgCQ9onjkf_QhVv6dZc.png"/><pubDate>Mon, 05 May 2025 10:00:00 -0700</pubDate><enclosure url="https://episodes.captivate.fm/episode/9f87c628-a17e-4c5d-b323-1cdc02da874b.mp3" length="103356302" type="audio/mpeg"/><itunes:duration>01:11:25</itunes:duration><itunes:explicit>false</itunes:explicit><itunes:episodeType>full</itunes:episodeType><itunes:episode>2</itunes:episode><podcast:episode>2</podcast:episode><podcast:chapters url="https://transcripts.captivate.fm/chapter-ebf08ef3-19b7-4a71-8f54-cc8fecdf0f78.json" type="application/json+chapters"/></item></channel></rss>