Talkin' Bout [Infosec] News

Black Hills Information Security

A weekly Podcast with BHIS and Friends. We discuss notable Infosec, and infosec-adjacent news stories gathered by our community news team. Join us live on YouTube, Monday's at 4:30PM ET

  1. Live From WWHF Mile High 2026 – 2026-02-11

    5H AGO

    Live From WWHF Mile High 2026 – 2026-02-11

    Live from Wild West Hackin’ Fest Denver 2026, the Black Hills Information Security crew brings their signature mix of sharp security insight and off-the-cuff banter to a packed in-person audience. This episode centers on a controversial Notepad update that introduced Markdown rendering—along with a potential remote code execution (RCE) issue. The hosts unpack what this says about modern software bloat, “vibe coding,” and the growing push to embed AI into everything—whether it belongs there or not. They also explore the implications of Discord's Age verification requirements, AI-generated code, including OpenAI’s latest Codex model, and debate whether we’re headed toward a wave of AI-assisted vulnerabilities. Join us LIVE on Mondays, 4:30pm EST.A weekly Podcast with BHIS and Friends. We discuss notable Infosec, and infosec-adjacent news stories gathered by our community news team.https://www.youtube.com/@BlackHillsInformationSecurity Chat with us on Discord! - https://discord.gg/bhis🔴live-chat Chapters (00:00) - PreShow Banter™ — Corey Olympics (02:23) - Story # 1: Critical Notepad vulnerability reignites criticism of Microsoft’s forced AI features (07:42) - Story # 2: Discord will require a face scan or ID for full access next month (10:17) - Story # 3: 2026-01-14: The Day the telnet Died (15:04) - Story # 5: BeyondTrust Remote Access Products 0-Day Vulnerability Allows Remote Code Execution (16:32) - Story # GRITREP: 0APT and the Victims Who Weren’t (20:54) - The advanced advancement of AI models Click here to watch a video of this episode. Creators & Guests John Strand - Host Corey Ham - Host Derek Banks - Guest Andrew Krug - Guest Chadd Watson - Guest Hayden Covington - Host Click here to view the episode transcript. LinksStory # 1: Critical Notepad vulnerability reignites criticism of Microsoft’s forced AI featuresStory # 2: Discord will require a face scan or ID for full access next monthStory # 3: 2026-01-14: The Day the telnet DiedStory # 5: BeyondTrust Remote Access Products 0-Day Vulnerability Allows Remote Code ExecutionStory # GRITREP: 0APT and the Victims Who Weren’t🔗 Register for FREE Infosec Webcasts, Anti-casts & Summits  https://poweredbybhis.com Brought to you by: Black Hills Information Security  https://www.blackhillsinfosec.com Antisyphon Training https://www.antisyphontraining.com/ Active Countermeasures https://www.activecountermeasures.com Wild West Hackin Fest https://wildwesthackinfest.com

    33 min
  2. US Defense Chief Uploads Secret Into to ChatGTP - 2026-02-02

    FEB 5

    US Defense Chief Uploads Secret Into to ChatGTP - 2026-02-02

    Join us LIVE on Mondays, 4:30pm EST.A weekly Podcast with BHIS and Friends. We discuss notable Infosec, and infosec-adjacent news stories gathered by our community news team.https://www.youtube.com/@BlackHillsInformationSecurity Chat with us on Discord! - https://discord.gg/bhis🔴live-chat This episode breaks down recent reports of sensitive information being shared with AI tools and what that means for security and operations. The discussion covers OPSEC failures, common misuse of ChatGPT in professional environments, how data actually flows through AI systems, and what organizations should (and shouldn’t) worry about. The hosts focus on practical risk, realistic threat models, and actionable lessons for security teams navigating AI adoption. Chapters (00:00) - PreShow Banter™ — Robot Drivers (06:29) - US Defense Chief Uploads Secret Into to ChatGTP - 2026-02-02 (09:54) - Story # 1: US cyber defense chief accidentally uploaded secret government info to ChatGPT (19:03) - Story # 2: Hackers can bypass npm’s Shai-Hulud defenses via Git dependencies (23:01) - Story # 3: Notepad++ Official Update Mechanism Hijacked to Deliver Malware to Select Users (26:30) - Story # 4: Millions of Gmail, Facebook and other account credentials exposed (30:55) - Story # 5: Exposed Moltbook Database Let Anyone Take Control of Any AI Agent on the Site (36:13) - Story # 6: County pays $600,000 to pentesters it arrested for assessing courthouse security (39:12) - Story # 7: Costco reportedly removes RAM from its display PCs to prevent tech-savvy shoplifters, customers claim — GPUs also absent across stores as PC parts become a hot commodity (41:13) - Story # 8: Claude Sonnet 5 Is Imminent — And It Could Be a Generation Ahead of Google (45:09) - Story # 9: Researchers Find 175,000 Publicly Exposed Ollama AI Servers Across 130 Countries (48:49) - Story # 10: Match, Hinge, OkCupid, and Panera Bread breached by ransomware group (52:05) - Story # 11: Hunterbrook says Ubiquiti powering Russian battlefield communications in Ukraine (54:28) - Story # 12: Attack on Renewable Energy Plants (56:26) - Story # 13: Disrupting the World's Largest Residential Proxy Network | Google Cloud Blog LinksStory # 1: US cyber defense chief accidentally uploaded secret government info to ChatGPTStory # 2: Hackers can bypass npm’s Shai-Hulud defenses via Git dependenciesStory # 3: Notepad++ Official Update Mechanism Hijacked to Deliver Malware to Select UsersStory # 4: Millions of Gmail, Facebook and other account credentials exposedStory # 5: Exposed Moltbook Database Let Anyone Take Control of Any AI Agent on the SiteStory # 6: County pays $600,000 to pentesters it arrested for assessing courthouse securityStory # 7: Costco reportedly removes RAM from its display PCs to prevent tech-savvy shoplifters, customers claim — GPUs also absent across stores as PC parts become a hot commodityStory # 8: Claude Sonnet 5 Is Imminent — And It Could Be a Generation Ahead of GoogleStory # 9: Researchers Find 175,000 Publicly Exposed Ollama AI Servers Across 130 CountriesStory # 10: Match, Hinge, OkCupid, and Panera Bread breached by ransomware groupStory # 11: Hunterbrook says Ubiquiti powering Russian battlefield communications in UkraineStory # 12: Attack on Renewable Energy PlantsStory # 13: Disrupting the World’s Largest Residential Proxy Network | Google Cloud BlogWade & Hayden on Simply Cyber - https://www.youtube.com/live/c_lUP5gR15I Hayden’s Class - https://www.antisyphontraining.com/product/foundations-of-security-operations-with-hayden-covington/ Mishaal’s Class - https://www.antisyphontraining.com/product/next-level-osint-with-mishaal-khan/ 🔗 Register for FREE Infosec Webcasts, Anti-casts & Summits  https://poweredbybhis.com Brought to you by: Black Hills Information Security  https://www.blackhillsinfosec.com Antisyphon Training https://www.antisyphontraining.com/ Active Countermeasures https://www.activecountermeasures.com Wild West Hackin Fest https://wildwesthackinfest.com

    1h 5m
  3. TikTok's invasive Privacy Policy - 2026-01-26

    JAN 28

    TikTok's invasive Privacy Policy - 2026-01-26

    Join us LIVE on Mondays, 4:30pm EST.A weekly Podcast with BHIS and Friends. We discuss notable Infosec, and infosec-adjacent news stories gathered by our community news team.https://www.youtube.com/@BlackHillsInformationSecurity Chat with us on Discord! - https://discord.gg/bhis🔴live-chat In this episode, the hosts break down TikTok’s latest privacy policy and why it’s raising serious red flags. They discuss how the app expands data collection and tracking, what that means for user privacy, and the broader security implications—especially concerns around data access and China. Along the way, the conversation connects these changes to ongoing TikTok ban discussions, real-world risk for individuals and organizations, and what users should consider if they continue using the platform. The episode mixes technical insight with practical takeaways, making the privacy risks easy to understand without losing nuance. Chapters: (00:00) - PreShow Banter™ — Electroshock Therapy (02:28) - 2026-01-26 (07:33) - Story # 1: Fortinet confirms critical FortiCloud auth bypass not fully patched (14:27) - Story # 2: Hackers exploit critical telnetd auth bypass flaw to get root (17:37) - Story # 3: Clara Hawking’s Post on TikTok's Pivacy Policy (24:05) - Story # 4: Supreme Court to hear Facebook pixel tracking case (31:02) - Story # 5: Google accused of grooming kids after child receives this email (34:38) - Story # 6: House of Lords backs legislation to ban social media for children under 16 (35:47) - Story # 6b: Australia has banned social media for kids under 16. How does it work? (42:20) - Story # 7: Why Software Blocks Won’t Stop Illegally 3D Printed Guns (And What Actually Might) (48:29) - Story # 8: 1Password adds pop-up warnings for suspected phishing sites (52:09) - ClawdBot / Moltbot Links:Story # 1: Fortinet confirms critical FortiCloud auth bypass not fully patchedStory # 2: Hackers exploit critical telnetd auth bypass flaw to get rootStory # 3: Clara Hawking’s Post on TikTok’s Pivacy PolicyStory # 4: Supreme Court to hear Facebook pixel tracking caseStory # 5: Google accused of grooming kids after child receives this emailStory # 6: House of Lords backs legislation to ban social media for children under 16Story # 6b: Australia has banned social media for kids under 16. How does it work?Story # 7: Why Software Blocks Won’t Stop Illegally 3D Printed Guns (And What Actually Might)Story # 8: 1Password adds pop-up warnings for suspected phishing sitesClawdBot / MoltbotTroy’s WorkshopANTI-CAST: Effective AI for Practical SecOps Workflows w/ Hayden Covington🔗 Register for FREE Infosec Webcasts, Anti-casts & Summits  https://poweredbybhis.com Brought to you by: Black Hills Information Security  https://www.blackhillsinfosec.com Antisyphon Training https://www.antisyphontraining.com/ Active Countermeasures https://www.activecountermeasures.com Wild West Hackin Fest https://wildwesthackinfest.com

    1h 3m
  4. Chinese firms drop US and Israeli cybersecurity software - 2026-01-19

    JAN 20

    Chinese firms drop US and Israeli cybersecurity software - 2026-01-19

    Join us LIVE on Mondays, 4:30pm EST.A weekly Podcast with BHIS and Friends. We discuss notable Infosec, and infosec-adjacent news stories gathered by our community news team.https://www.youtube.com/@BlackHillsInformationSecurity Chat with us on Discord! - https://discord.gg/bhis🔴live-chat 🔗 Register for FREE Infosec Webcasts, Anti-casts & Summits –  https://poweredbybhis.com This episode is a rapid-fire cybersecurity news roundup covering multiple headlines and what they mean for defenders. The crew debates reports that Chinese firms are dropping U.S. and Israeli security vendors, then pivots into breach fallout, malware activity, and real-world attacker behavior. Along the way, they unpack how geopolitics affects procurement, why supply-chain dependencies make “bans” messy, and what happens when organizations swap tools fast.  Expect candid takes on ransomware trends, enterprise security operations, and where hype collides with implementation. The hosts also riff on incident response realities, risk management, and what security teams should watch for next—plus plenty of side commentary and humor in between. Chapters (00:00) - PreShow Banter™ — Podcast Banter (04:13) - Chinese firms to stop using US and Israeli cybersecurity software - 2026-01-19 (08:56) - Story # 1: Exclusive: Beijing tells Chinese firms to stop using US and Israeli cybersecurity software, sources say (13:42) - Story # 2: Tennessee man to plead guilty to hacking Supreme Court’s electronic case filing system (16:25) - Story # 3: Hacker gets seven years for breaching Rotterdam and Antwerp ports (18:20) - Story # 4: 33-year-old Dutchman arrested for enableing criminals to test malware for antivirus programs. (20:02) - Story # 5: Army to ‘kill NIPR’ at multiple locations in commercial internet experiment (27:41) - Story # 6: Hungary grants asylum to former Polish minister implicated in spyware probe (29:12) - Story # 7: California orders Elon Musk’s AI company to immediately stop sharing sexual deepfakes (41:47) - Story # 8: ServiceNow BodySnatcher flaw highlights risks of rushed AI integrations (49:30) - Story # 8b: BodySnatcher (CVE-2025-12420): A Broken Authentication and Agentic Hijacking Vulnerability in ServiceNow (55:29) - CTF Winners (59:19) - ChickenSec: KFC app 'more secure' than Manage My Health, expert claims LinksStory # 1: Exclusive: Beijing tells Chinese firms to stop using US and Israeli cybersecurity software, sources sayStory # 2: Tennessee man to plead guilty to hacking Supreme Court’s electronic case filing systemStory # 3: Hacker gets seven years for breaching Rotterdam and Antwerp portsStory # 4: 33-year-old Dutchman arrested for enableing criminals to test malware for antivirus programs.Story # 5: Army to ‘kill NIPR’ at multiple locations in commercial internet experimentStory # 6: Hungary grants asylum to former Polish minister implicated in spyware probeStory # 7: California orders Elon Musk’s AI company to immediately stop sharing sexual deepfakesStory # 8: ServiceNow BodySnatcher flaw highlights risks of rushed AI integrationsStory # 8b: BodySnatcher (CVE-2025-12420): A Broken Authentication and Agentic Hijacking Vulnerability in ServiceNowChickenSec: KFC app ‘more secure’ than Manage My Health, expert claims Brought to you by: Black Hills Information Security  https://www.blackhillsinfosec.com Antisyphon Training https://www.antisyphontraining.com/ Active Countermeasures https://www.activecountermeasures.com Wild West Hackin Fest https://wildwesthackinfest.com

    1h 3m
  5. BreachForums Doomsday - 2026-01-12

    JAN 14

    BreachForums Doomsday - 2026-01-12

    Join us LIVE on Mondays, 4:30pm EST.A weekly Podcast with BHIS and Friends. We discuss notable Infosec, and infosec-adjacent news stories gathered by our community news team.https://www.youtube.com/@BlackHillsInformationSecurity Chat with us on Discord! - https://discord.gg/bhis🔴live-chat 🔗 Register for FREE webcasts, summits, and workshops - https://poweredbybhis.com In this episode, we break down the “Doomsday” incident: a major breach forum gets breached, reminding everyone that even cybercriminal communities suffer constant OPSEC failures. We cover what leaked, why these underground markets keep imploding, and how infighting, reused infrastructure, weak authentication, and sloppy identity hygiene turn “elite hackers” into easy targets. Then we connect the dots to law enforcement’s latest crypto actions—how DOJ seizures and mixer investigations work, why blockchain tracing matters, and what criminals try (and fail) to do to hide money flows. Finally, we translate the news into practical defense: validate breach intel, monitor for credential stuffing, enable MFA, use unique passwords, and tighten access logs. Whether you’re a defender, creator, or online, this is the real-world cybercrime story behind the headlines. Chapters(00:00) - PreShow Banter™ — Task Overflow (02:29) - BreachForums Doomsday - 2026-01-12 (05:09) - Story # 1; Did DOJ Prosecutors Violate Trump’s Executive Order by Selling the Forfeited Samourai Wallet Bitcoin? (15:42) - Story # 2: Cloudflare defies Italy’s Piracy Shield, won’t block websites on 1.1.1.1 DNS (23:04) - Story # 3: California bans data broker reselling health data of millions (28:13) - Story # 4: Apple picks Google’s Gemini to run AI-powered Siri coming this year (36:00) - Story # 5: Ragebait as a phishing tactic (38:00) - Story # 6: Doomsday For Cybercriminals — Data Breach Of Major Dark Web Forum (40:31) - Story # 7: The Great VM Escape: ESXi Exploitation in the Wild (45:39) - Story # 8: OpenAI says ChatGPT won't use your health information to train its models (46:23) - Story # 8b: Anthropic brings Claude to healthcare with HIPAA-ready Enterprise tools (50:15) - Story # 9: Max severity Ni8mare flaw lets hackers hijack n8n servers (53:05) - Story # 10: Instagram Denies Data Breach, Fixes Unsolicited Password Reset Requests (56:49) - Reporter remembers saving animals a year after L.A. wildfires (57:52) - CTF Winners LinksStory # 1; Did DOJ Prosecutors Violate Trump’s Executive Order by Selling the Forfeited Samourai Wallet Bitcoin?Story # 2: Cloudflare defies Italy’s Piracy Shield, won’t block websites on 1.1.1.1 DNSStory # 3: California bans data broker reselling health data of millionsStory # 4: Apple picks Google’s Gemini to run AI-powered Siri coming this yearStory # 5: Ragebait as a phishing tacticStory # 6: Doomsday For Cybercriminals — Data Breach Of Major Dark Web ForumStory # 7: The Great VM Escape: ESXi Exploitation in the WildStory # 8: OpenAI says ChatGPT won’t use your health information to train its modelsStory # 8b: Anthropic brings Claude to healthcare with HIPAA-ready Enterprise toolsStory # 9: Max severity Ni8mare flaw lets hackers hijack n8n serversStory # 10: Instagram Denies Data Breach, Fixes Unsolicited Password Reset RequestsReporter remembers saving animals a year after L.A. wildfires Brought to you by:Black Hills Information Security https://www.blackhillsinfosec.com Antisyphon Traininghttps://www.antisyphontraining.com/ Active Countermeasureshttps://www.activecountermeasures.com Wild West Hackin Fest - Join us for our Hybrid Conference and Pre-Conference Traininghttps://wildwesthackinfest.com

    1h 1m
  6. US Cyberattacks on Venezuela - 2026-01-05

    JAN 9

    US Cyberattacks on Venezuela - 2026-01-05

    Join us LIVE on Mondays, 4:30pm EST.A weekly Podcast with BHIS and Friends. We discuss notable Infosec, and infosec-adjacent news stories gathered by our community news team.https://www.youtube.com/@BlackHillsInformationSecurity Chat with us on Discord! - https://discord.gg/bhis🔴live-chat 🔗 Register for FREE webcasts, summits, and workshops - https://poweredbybhis.com In this episode, we break down the growing debate around U.S. cyber operations against Venezuela—and what it means for modern cyber warfare, critical infrastructure security, and geopolitics. The conversation explores how nation-state attacks can target a country’s power grid, the challenges of attributing cyberattacks, and why industrial control systems (ICS/SCADA) remain a high-impact battleground. We also discuss the strategic value (and risks) of disrupting energy infrastructure, how these campaigns compare to other real-world incidents, and what defenders can learn to better protect utilities and national systems. Chapters (00:00) - PreShow Banter™ — Undisclosed Closets (09:07) - US Cyberattacks on Venezuela - 2026-01-05 (10:16) - Story # 1:Trump suggests US used cyberattacks to turn off lights in Venezuela during strikes (11:14) - Story # 1b: There Were BGP Anomalies During The Venezuela Blackout (21:06) - Story # 1c: Pizza index of war: Late-night traffic near Pentagon surges again as US strikes Venezuela (32:40) - Story # 2: Finland seizes ship suspected of damaging subsea cable in Baltic Sea (35:11) - Story # 3: US cybersecurity experts plead guilty to BlackCat ransomware attacks (35:46) - Story # 4: MongoDB Vulnerability CVE-2025-14847 Under Active Exploitation Worldwide (39:06) - Story # 5: Hackers claim to hack Resecurity, firm says it was a honeypot (42:06) - Story # 6: NordVPN denies breach claims, says attackers have "dummy data" (42:35) - Story # 7: Hackers say they have stolen 40 million Condé Nast Records - here's how to stay safe (43:43) - Story # 8: Hacker Dressed As Pink Power Ranger Dismantles Racist Websites Live on Stage (47:13) - Story # 9: NYC mayoral inauguration bans Flipper Zero, Raspberry Pi devices (52:18) - Story # 10: Manufacturer issues remote kill command to disable smart vacuum after engineer blocks it from collecting data — user revives it with custom hardware and Python scripts to run offline (55:15) - Story # 11: Ben Jordan Exposes Severe Security Vulnerabilities in Flock Surveillance Cameras (57:26) - Story # 11b: We Tracked Ourselves with Exposed Flock Cameras LinksStory # 1:Trump suggests US used cyberattacks to turn off lights in Venezuela during strikesStory # 1b: There Were BGP Anomalies During The Venezuela BlackoutStory # 1c: Pizza index of war: Late-night traffic near Pentagon surges again as US strikes VenezuelaStory # 2: Finland seizes ship suspected of damaging subsea cable in Baltic SeaStory # 3: US cybersecurity experts plead guilty to BlackCat ransomware attacksStory # 4: MongoDB Vulnerability CVE-2025-14847 Under Active Exploitation WorldwideStory # 5: Hackers claim to hack Resecurity, firm says it was a honeypotStory # 6: NordVPN denies breach claims, says attackers have “dummy data”Story # 7: Hackers say they have stolen 40 million Condé Nast Records - here’s how to stay safeStory # 8: Hacker Dressed As Pink Power Ranger Dismantles Racist Websites Live on StageStory # 9: NYC mayoral inauguration bans Flipper Zero, Raspberry Pi devicesStory # 10: Manufacturer issues remote kill command to disable smart vacuum after engineer blocks it from collecting data — user revives it with custom hardware and Python scripts to run offlineStory # 11: Ben Jordan Exposes Severe Security Vulnerabilities in Flock Surveillance CamerasStory # 11b: We Tracked Ourselves with Exposed Flock Cameras Brought to you by: Black Hills Information Security  https://www.blackhillsinfosec.com Antisyphon Training https://www.antisyphontraining.com/ Active Countermeasures https://www.activecountermeasures.com Wild West Hackin Fest https://wildwesthackinfest.com

    1h 9m
  7. Hot Take Predictions for Next Year – 2025-12-15

    12/18/2025

    Hot Take Predictions for Next Year – 2025-12-15

    Join us LIVE on Mondays, 4:30pm EST.A weekly Podcast with BHIS and Friends. We discuss notable Infosec, and infosec-adjacent news stories gathered by our community news team.https://www.youtube.com/@BlackHillsInformationSecurity Chat with us on Discord! - https://discord.gg/bhis🔴live-chat 🔗 Register for FREE webcasts, summits, and workshops - https://poweredbybhis.com Chapters (00:00) - PreShow Banter™ — testing testing (00:11) - Hot Take Predictions for Next Year – 2025-12-15 (02:10) - Story # 1: Russian kids revolt as Kremlin bans Roblox, other popular apps (10:21) - Story # 2: Google's killing off its dark web report because users didn't know what to do with it (20:05) - Story # 3: Coupang data breach traced to ex-employee who retained system access (31:13) - Story # 4: Roomba maker iRobot bought by Chinese supplier after filing for bankruptcy (34:18) - Story # 5: February report from researcher found Chinese KVM had an unclearly documented microphone and communicated with China-based servers, but many of the security issues are now addressed [Updated] (36:48) - Story # 6: When adversaries bring their own virtual machine for persistence (41:57) - Story # 7: Oh no! Hackers snuck malware inside uber-popular Windows app Notepad++ (44:20) - Hot Take Predictions for 2026 LinksStory # 1: Russian kids revolt as Kremlin bans Roblox, other popular appsStory # 2: Google’s killing off its dark web report because users didn’t know what to do with itStory # 3: Coupang data breach traced to ex-employee who retained system accessStory # 4: Roomba maker iRobot bought by Chinese supplier after filing for bankruptcyStory # 5: February report from researcher found Chinese KVM had an unclearly documented microphone and communicated with China-based servers, but many of the security issues are now addressed [Updated]Story # 6: When adversaries bring their own virtual machine for persistenceStory # 7: Oh no! Hackers snuck malware inside uber-popular Windows app Notepad++The team looks ahead to 2026 and shares practical, sometimes blunt predictions about where cybersecurity is heading. They discuss how AI will continue reshaping both offense and defense, with attackers using automation at scale while defenders struggle to operationalize AI beyond marketing hype. The conversation highlights growing risk from identity abuse, cloud misconfigurations, and insecure SaaS sprawl, noting that many breaches will still come down to basic failures rather than advanced exploits. They also predict continued burnout in security teams, more consolidation among security vendors, and increasing pressure to prove real ROI from security tools. On the positive side, the hosts see improved detection engineering, better security education, and more community-driven knowledge sharing. Overall, the message is clear: fundamentals still matter, hype won’t save you, and organizations that focus on people, process, and visibility will be better positioned for 2026. Brought to you by:Black Hills Information Security https://www.blackhillsinfosec.com Antisyphon Traininghttps://www.antisyphontraining.com/ Active Countermeasureshttps://www.activecountermeasures.com Wild West Hackin Festhttps://wildwesthackinfest.com

    1h 2m
  8. A Live Stream From inside Lazarus Group – 2025-12-08

    12/11/2025

    A Live Stream From inside Lazarus Group – 2025-12-08

    🔗 Register for FREE Infosec Webcasts, Anti-casts & Summits –  https://poweredbybhis.com Join us LIVE on Mondays, 4:30pm EST.A weekly Podcast with BHIS and Friends. We discuss notable Infosec, and infosec-adjacent news stories gathered by our community news team.https://www.youtube.com/@BlackHillsInformationSecurity Chat with us on Discord!https://discord.gg/bhis🔴live-chat A Live Stream From inside Lazarus Group – 2025-12-08This BHIS episode blends cybersecurity humor, hacker culture, and livestream chaos as the team jokes about nation-state threats, leaked webcams, OPSEC mishaps, and technical glitches. With unscripted banter and light industry insights, it’s a fun, energetic listen for fans of ethical hacking, infosec podcasts, and behind-the-scenes security chatter. Chapters00:00 - PreShow Banter™ — Industry Leaders02:34 - A Live Stream From inside Lazarus Group – 2025-12-0804:24 - Story # 1: React2Shell (CVE-2025-55182): Everything You Need to Know About the Critical React Vulnerability08:58 - Story # 2: A Live Stream from Inside Lazarus Group’s IT Workers Scheme20:37 - Story # 3: Contractors with hacking records accused of wiping 96 govt databases26:44 - Story # 4: Apple refuses to pre-install government app on iPhones in India37:42 - Story # 5: Russia blocks Apple's FaceTime in mounting push against foreign tech platforms44:55 - Story # 6: ‘End-to-end encrypted’ smart toilet camera is not actually end-to-end encrypted57:53 - Story # 7: Flock Uses Overseas Gig Workers to Build its Surveillance AI Brought to you by: Black Hills Information Security  https://www.blackhillsinfosec.com Antisyphon Training https://www.antisyphontraining.com/ Active Countermeasures https://www.activecountermeasures.com Wild West Hackin Fest https://wildwesthackinfest.com (00:00) - 00:00 - PreShow Banter™ — Industry Leaders (02:34) - A Live Stream From inside Lazarus Group – 2025-12-08 (04:24) - Story # 1: React2Shell (CVE-2025-55182): Everything You Need to Know About the Critical React Vulnerability (08:57) - Story # 2: A Live Stream from Inside Lazarus Group’s IT Workers Scheme (20:37) - Story # 3: Contractors with hacking records accused of wiping 96 govt databases (26:44) - Story # 4: Apple refuses to pre-install government app on iPhones in India (37:41) - Story # 5: Russia blocks Apple's FaceTime in mounting push against foreign tech platforms (44:55) - Story # 6: ‘End-to-end encrypted’ smart toilet camera is not actually end-to-end encrypted (57:52) - Story # 7: Flock Uses Overseas Gig Workers to Build its Surveillance AI

    1h 4m
4.8
out of 5
92 Ratings

About

A weekly Podcast with BHIS and Friends. We discuss notable Infosec, and infosec-adjacent news stories gathered by our community news team. Join us live on YouTube, Monday's at 4:30PM ET

You Might Also Like