AiCyber.Land

Bryce Kunz

Join industry experts and thought leaders as we dive deep into how artificial intelligence is transforming cybersecurity, shaping defense strategies, and creating new opportunities in the digital landscape.

  1. MAR 22

    AiCyber.Land #16 - Hacked by an Image: The Terrifying New AI Threat

    Is AI a doomsday machine or the ultimate productivity tool? In this episode of the AI Cyberland Podcast, we dive deep into the five biggest risks of AI, according to Anthropic's CEO Dario Amodei. Then, we explore Moltbot, the "spicy" new personal AI assistant everyone's talking about... and the massive security flaws that could give hackers the keys to your digital life. --- IN THIS EPISODE: Welcome back to the AI Cyberland Podcast! Your hosts Bryce and Shelby are back to break down the biggest news at the intersection of AI and cybersecurity. First, we tackle a provocative new blog post from Anthropic CEO Dario Amodei, titled "The Adolescence of Technology." Is he right that 50% of white-collar jobs could vanish in two years? We debate his predictions and explore the five major risks he outlines for humanity, from rogue AIs and engineered bioweapons to the rise of totalitarian control. We also discuss Anthropic's fascinating solution: an "AI Constitution" designed to give models a moral compass. Next, have you ever wished for a personal assistant to manage your life? Meet Moltbot (formerly Clawbot), the open-source, self-hosted AI that can manage your calendar, answer your emails, and even check you in for flights. But with great power comes great risk! We uncover the shocking cybersecurity research from Jameson O'Reilly, who found critical vulnerabilities in the platform—including a clever supply chain attack and a devastating account takeover exploit using a simple image file (SVG). Learn how he did it and why serving user content from your main domain is a recipe for disaster. Finally, we unpack a new survey of over 2,000 cybersecurity professionals. A staggering 99% of SOC analysts are already using AI! We reveal the top three AI-related threats they're most concerned about for the future: Shadow AI, prompt injection, and data leakage. Stick around for some rapid-fire good news about NASA's Artemis 2 mission, a potential cure for pancreatic cancer, and a must-watch new sci-fi show coming to Apple TV! --- KEY MOMENTS: ⏱️ KEY MOMENTS: 02:55 - Anthropic CEO's 5 Biggest Risks for an AI-Powered Future 11:38 - Could an Unstable Loner Use AI to Engineer a Super-Virus? 20:26 - Meet Moltbot: The AI Personal Assistant That Does Everything 30:48 - "Eating Lobster Souls": How a Researcher Hacked the AI Assistant 43:37 - 99% of Cyber Pros Use AI: Shocking New Survey Results 47:30 - The Top 3 AI Security Threats for 2026 Revealed --- What do you think is the biggest risk posed by AI? And would you be willing to try a personal AI assistant like Moltbot after hearing about its vulnerabilities? Let us know your thoughts in the comments below! If you enjoyed this deep dive, be sure to hit the LIKE button, SUBSCRIBE to the AI Cyberland Podcast, and ring that notification bell so you never miss an update on the future of AI and security!

    1h 5m
  2. MAR 22

    AiCyber.Land #15 - The AGI Debate: OpenAI vs. Google's Top Minds

    Is AI a cybersecurity revolution or a recipe for disaster? In this episode, we dive into the wild world where AI agents are now autonomously finding zero-day exploits and a simple folder on your computer could be the riskiest thing you open all day. Plus, we explore the shocking story of how a ChatGPT health tip landed someone in the ER and unpack the heated debate from Davos over the timeline for AGI. --- Welcome back to the AI cyberland podcast! Join your hosts, Bryce and Shelby, as they navigate the latest in AI, cybersecurity, and a healthy dose of nonsense. This week, we're unpacking some mind-bending developments: 🤖 AI Learns to Hack: We break down a brand-new report from researcher Sean Healin where AI models like GPT were pitted against a JavaScript interpreter. The result? The AI didn't just find vulnerabilities; it created novel "exploit chains" from known techniques, effectively generating zero-day attacks. This is leading to what some call the "industrialization of intrusion," where hacking becomes a matter of budget, not just skill. 📂 The Most Dangerous Folder on Your Computer: A security researcher discovered a shocking new vulnerability in VS Code and other IDEs. By crafting a special hidden folder with a task.json file, an attacker could trick your AI coding assistant (like Copilot) into automatically executing malicious commands. We connect this to real-world tactics used by North Korean threat actors and what it means for developers everywhere. 🧂 When AI Health Advice Goes Wrong: In a cautionary tale for the ages, we share the story of a man who asked ChatGPT for a salt substitute and ended up with paranoia and hallucinations after following its advice for three months. It's a stark reminder of the risks of blindly trusting LLMs for medical information and highlights the importance of using AI as a tool to prepare for, not replace, expert advice. 🔮 The Great AGI Debate: The world's top AI minds clashed at Davos over when we'll reach Artificial General Intelligence. On one side, the CEOs of OpenAI and Anthropic claim AGI is imminent, with predictions of replacing all software engineers within a year. On the other, experts from Google DeepMind and Meta argue that we're nowhere close, claiming current LLMs lack the physical understanding of the world to ever achieve true human-level intelligence. We dissect the arguments, the financial incentives, and where we think things are really headed. Plus, we discuss the underrated power of "scaffolding" around AI models, our dream home features, and a fascinating biological tangent about the original distributed processing network: the octopus! --- KEY MOMENTS: ⏱️ KEY MOMENTS: 01:25 - Icebreaker: Dream Home Features (Lazy Rivers & Lego Rooms) 03:24 - AI vs. AI: A Hacking Competition to Find New Exploits 13:44 - Warning: This VS Code Flaw Can Get You Hacked 21:28 - Cautionary Tale: When AI Medical Advice Goes Terribly Wrong 32:23 - The Great AGI Debate: Will AI Take All Our Jobs? 45:40 - How an Octopus's Brains Explain the Future of AI Agents --- What's your take? Are we on the verge of AGI, or is it all hype? Have you ever had a scary experience with AI-generated advice? Let us know your thoughts in the comments below! If you enjoyed this deep dive into the cyber-world of AI, hit that LIKE button, and be sure to SUBSCRIBE so you don't miss our weekly episodes. Visit our website: aiccyber.land

    52 min
  3. MAR 22

    AiCyber.Land #14 - This New Tech Reads Your Mind (No Surgery Needed)

    From mind-controlled wheelchairs to hackable AI agents, the future is here and it's wild! In this episode, cybersecurity pros Bryce and Shelby break down the coolest—and creepiest—tech news, including a hands-on lab where you can learn to hack AI and the humanoid robots set to take over factory floors. --- **What We're Unpacking In This Episode:** Welcome back to the pod! Join hosts and cybersecurity experts Bryce and Shelby as they unpack the most fascinating stories at the intersection of AI and security. First up, Shelby introduces a game-changing tool for security pros: the "Breach to Fix Labs." It's a hands-on environment where you can learn to exploit and patch real-world AI vulnerabilities like SQL injection and log poisoning, all based on actual incident reports. Then, Bryce dives into the wild world of tech unveiled at the Consumer Electronics Show (CES). We're talking humanoid robots like the Ozobot that are already being snapped up by car manufacturers to perform tasks humans can't, and the mind-blowing "NQ" earpieces that can read your brainwaves to control a wheelchair—no surgery required! Of course, we also explore the dark side: the privacy implications of brain-computer interfaces and the potential for ads beamed directly into your thoughts. Finally, we discuss the rising challenge of securing agent-to-agent (A2A) networks. As AIs become more autonomous, how do we protect them? We explore Cisco's new open-source A2A scanner, a framework designed to prevent threats like agent impersonation and indirect prompt injection. This is essential listening for anyone building or securing the next generation of AI systems. --- **Key Moments:** ⏱️ KEY MOMENTS: 00:24 - Meet Your Cybersecurity Hosts, Bryce & Shelby 01:44 - New AI Hacking Lab: Practice on Real-World Vulnerabilities 07:27 - The Robotics War is Here: Highlights from CES 2024 11:40 - Mind-Control Tech: Brainwaves, Earpieces & The Future of BCIs 25:03 - Securing AI Agents: Cisco's New Scanner & The "Reverse CAPTCHA" Idea 35:55 - Are You "WEIRD"? A Surprising Psychology Concept --- **Join the Conversation!** What was your favorite story from this episode? Are you excited about brain-computer interfaces or totally freaked out? Let us know in the comments below! If you love deep dives into the world of AI and cybersecurity, make sure to hit that subscribe button and ring the bell so you never miss an update.

    48 min
  4. MAR 22

    AiCyber.Land #13 - Is AI Better at Hacking or Defending?

    Is AI a cybersecurity super-weapon or a super-vulnerability? This week, Shelby and Bryce dive deep into the chaotic crossroads of AI and cyber defense. We're breaking down a bombshell CISA report that warns against letting AI take the reins of our critical infrastructure, exploring why AI-generated code is riddled with security flaws nearly 50% of the time, and revealing why insurance companies are getting cold feet about covering AI-related disasters. IN THIS EPISODE: Welcome back to the pod! Get ready for a wild ride through the latest AI and cybersecurity headlines that caught our eye. First up, we dissect a new 25-page report from CISA on using AI in Operational Technology (OT). What is OT? Think power grids, water systems, and dams – the tech that runs our physical world. CISA's advice is clear: be VERY cautious. We break down their recommendations, from keeping AI in a "read-only" analysis role to the absolute necessity of a human-in-the-loop with a kill switch. Then, the ultimate showdown: Is AI better at attacking or defending? Shelby walks us through a fascinating study where AI agents battled it out in a Capture The Flag (CTF) competition. The initial results might surprise you, but the real twist comes when you add one crucial real-world constraint: "don't break anything!" We discuss why in the real world, the advantage might flip to the attackers. But wait, there's more! If you're using AI to help you code, you NEED to hear this. A new report found that AI introduces security vulnerabilities in 45% of the code it generates—and a shocking 70% for Java! We discuss why this is happening and the simple prompts you can use to protect your projects. We'll also cover: - Anthropic's stunning research showing AI can find and exploit vulnerabilities in smart contracts, potentially worth hundreds of millions of dollars. - A Chinese company that... named its new robot after a Terminator. Seriously. - Why the insurance industry is terrified of the "black box" of AI and is trying to write it out of their policies. From government warnings to billion-dollar exploits, we've got it all. Grab your tinfoil hat (we've got a conspiracy corner, too!) and join the conversation! ⏱️ KEY MOMENTS: 00:28 - CISA's New Report on AI in Critical Infrastructure 06:43 - Did China Just Name a Robot After The Terminator? 08:09 - AI vs. AI: Who Wins in a Cyber Attack? 09:01 - The Real Bottleneck for Ransomware Gangs (It's Not Hacking) 22:06 - Warning: 45% of AI-Generated Code Is Vulnerable 29:58 - How AI Can Hack Blockchain & Smart Contracts for Millions 40:40 - Insurance Companies Refuse to Cover AI Risks JOIN THE CONVERSATION: What's your take? Is AI the future of cyber defense, or are we automating our own demise? Let us know your thoughts in the comments below! If you enjoyed this breakdown, make sure to hit that LIKE button, SUBSCRIBE for more weekly insights, and ring the bell so you never miss an update.

    54 min
  5. MAR 22

    AiCyber.Land #12 - This AI Attack Can Read Your Encrypted Chats

    Can an AI solve a logic puzzle that requires over a MILLION steps? We're breaking down how researchers are pushing LLMs to their absolute limits using the classic Towers of Hanoi challenge. But that's not all—we also uncover a shocking new cybersecurity threat called 'WhisperLeak' that could expose your private AI chats, even if they're encrypted! IN THIS EPISODE: Welcome back to the pod! In this episode, we're diving deep into the latest news at the intersection of AI and cybersecurity. First up, we explore the mind-bending 'Towers of Hanoi' puzzle. Standard LLMs are great at reasoning, but they stumble on massive, multi-step tasks. We break down how researchers at Cognizant AI Lab built the 'Maker' system—an ingenious orchestrator that guides existing LLMs to solve this million-step problem with ZERO errors! Find out how techniques like agent decomposition and voting are revolutionizing AI accuracy. Then, we shift gears to a critical cybersecurity vulnerability called 'WhisperLeak'. Discovered by Microsoft researchers, this side-channel attack can figure out the TOPIC of your encrypted conversations with an LLM, not by breaking the encryption, but by analyzing the size and timing of data packets. We discuss the real-world implications, from personal privacy ("Dr. GPT," anyone?) to corporate espionage, and the potential defenses being developed. Finally, we touch on the heated political debate surrounding AI regulation, a fascinating new 3D modeling tool from Meta, and a hilarious trivia question that will change what you think you know about pyramids. ⏱️ KEY MOMENTS: 00:25 - AI vs. The Million-Step Puzzle (Towers Of Hanoi) 07:03 - The AI Arms Race: ChatGPT's 5-Hour Task Limit 10:54 - Putting "Dr. GPT" To The Test With Real Medical Data 14:49 - Whisper Leak: The Attack That Eavesdrops On Encrypted AI Chats 26:18 - Trump's Plan To Sue States Over AI Safety Laws 36:34 - Mind-Blowing AI Turns 2D Photos Into 3D Models JOIN THE CONVERSATION: What was the most surprising story for you? The million-step AI puzzle, the WhisperLeak attack, or the future of AI regulation? Let us know your thoughts in the comments below! If you love staying up-to-date with the latest in AI and cyber security, don't forget to hit that LIKE button and SUBSCRIBE for more! Your support helps us keep making this content.

    49 min
  6. JAN 12

    AiCyber.Land #11 - How ChatGPT Is Cracking "Unbeatable" Malware

    Is AI the ultimate weapon for hackers, or the ultimate tool for defenders? In this episode, we expose the dark side of the AI boom with a rise in malicious apps, but also reveal how researchers are using ChatGPT to outsmart one of the world's sneakiest malware strains, X Loader. Plus, is the AI stock market about to pop? The investor from 'The Big Short' thinks so, and we've got the details. Join Shelby and Bryce for another packed episode where we unravel the latest in AI and cybersecurity! First up, we're taking a chilling look at X Loader, a malware so notoriously difficult to analyze it gives security pros nightmares. We'll break down its sneaky tactics, from just-in-time decryption that makes memory dumps useless to camouflaging its command-and-control servers in a sea of noise. But there's a new sheriff in town: AI. Discover how researchers at Checkpoint are now using ChatGPT's web interface to dramatically speed up reverse engineering—a game-changer for cyber defense! Then, Bryce shares a pro-tip for developers drowning in 'dependency hell.' If you're tired of setting up multiple MCP servers, you need to hear about the MCP store in Docker Desktop that's making life so much easier. From tech to stocks, we pivot to a bombshell prediction from Michael Burry (the legendary investor from 'The Big Short'). He believes the profits of major AI tech companies are overstated by as much as 30%! Find out why the 6-year lifespan they claim for their Nvidia chips might actually be closer to 2, and what that means for the AI bubble. Finally, we issue a crucial warning about the explosion of copycat and malicious AI apps. With 17 billion downloads last year, opportunists are flooding the market with everything from 'commercial parasites' that steal your data to full-blown Trojan spyware. We'll share examples and remind you how to stay safe in the new AI-powered world. ⏱️ KEY MOMENTS: 00:23 - Inside The Notorious 'X Loader' Malware 06:09 - Using ChatGPT For Advanced Malware Analysis 09:40 - Pro Tip: Solving 'Dependency Hell' With Docker Desktop 12:46 - The 'Big Short' Investor's Warning On The AI Bubble 19:41 - Cybersecurity's Secret Societies: 'Chattam House Rules' 25:11 - Warning: The Rise Of Malicious & Fake AI Apps 34:50 - This AI App Tracks Sleep By Listening To You Breathe JOIN THE CONVERSATION: What did you think? Is Michael Burry right about the AI bubble, or is the hype justified? Have you spotted any of these malicious AI apps in the wild? Let us know your thoughts in the comments below! If you enjoyed this deep dive, don't forget to hit the like button, subscribe for more AI and cyber news, and ring that bell so you never miss an update!

    46 min
  7. JAN 12

    AiCyber.Land #9 - Is OpenAI Building an "Nvidia Killer" Chip?

    OpenAI is making a bold move to dethrone Nvidia in the AI chip market, and we've got the inside scoop on their secret strategy! In this episode, we unpack OpenAI's deals with AMD and Broadcom and predict how they plan to leapfrog the competition with purpose-built AI hardware. Plus, we dive into the scary new world of AI-powered cyber attacks and what the rise of AI means for the future of tech jobs. IN THIS EPISODE: Get ready for a deep dive into the latest shockwaves hitting the tech world! In this episode, we're breaking down the high-stakes chess match between OpenAI and Nvidia. For years, Nvidia has dominated the AI hardware space thanks to its powerful GPUs and developer-friendly CUDA platform. But OpenAI is tired of playing by their rules. We explore their new partnerships with AMD and Broadcom, and reveal our "Spidey sense" prediction: OpenAI isn't just trying to create competition; they're aiming to build hyper-specialized hardware for generative AI, potentially making today's GPUs look like ancient history. Think crypto mining ASICs, but for AI! Then, we shift gears to the dark side of AI. Shelby walks us through some alarming new cybersecurity reports: - AI-Powered Phishing: Success rates for attackers have skyrocketed from 12% to a staggering 54%. The era of poorly-spelled scam emails is officially over. - Vishing on the Rise: Voice phishing attacks are up a mind-blowing 442%. - Insurance as a Roadmap: Hackers are now targeting companies based on their cyber insurance policies, using them to calculate the perfect ransom demand. Finally, we tackle the big question: Is AI coming for our jobs? We discuss a recent Stanford study showing a drop in entry-level tech jobs and debate whether AI will create a talent vacuum or empower a new generation of creative problem-solvers. We share our top strategies for students and professionals to not just survive, but thrive in the age of AI. ⏱️ KEY MOMENTS: 00:19 - OpenAI's Plot to Dethrone Nvidia's Chip Empire 04:51 - How the Crypto Mining Craze Predicts the Future of AI Chips 05:42 - Meet Groq & Cerebras: The Secret AI Hardware Weapons 18:50 - The Era of Fake Phishing Emails Is Over (AI Attacks Are Up 442%) 24:32 - A Brilliant (and Devious) Cyber Insurance Honeypot Idea 28:25 - Is Generative AI Killing Entry-Level Tech Jobs? 50:22 - Google's New AI Tool That Finds and Fixes Bad Code CONNECT WITH US: What do you think about OpenAI's strategy? Is it a brilliant move to break Nvidia's monopoly, or a risky bet? Let us know your predictions in the comments below! If you enjoyed this breakdown of the latest in AI and cybersecurity, make sure to hit that LIKE button and SUBSCRIBE for more weekly insights. Don't forget to ring the bell so you never miss an update!

    1h 8m
  8. JAN 12

    AiCyber.Land #8 - This AI Flaw Lets Hackers Hijack Your Browser

    Is your AI browser secretly working against you? In this episode, we're diving into the mind-blowing intersection of AI and cybersecurity. We uncover "Comet Jacking," a shocking vulnerability that can hijack Perplexity's AI browser with a single malicious link, and explore the even wilder discovery that your high-performance gaming mouse might be listening to your conversations. 🎙️ IN THIS EPISODE: Join hosts Shelby and Bryce Coons for a deep dive into the latest AI and cybersecurity news that feels straight out of a sci-fi movie. We kick things off with a brand-new vulnerability dubbed "Comet Jacking," a clever prompt injection attack targeting Perplexity's AI-powered Comet browser. Find out how it works, why Perplexity's initial response caused a stir, and what this means for the future of AI-integrated web browsing. The discussion then broadens to the constant cat-and-mouse game of AI security, exploring how this new tech could resurrect old, nearly extinct cyberattacks. Bryce, a daily Comet user, shares his perspective on the risks and why we're just at the tip of the iceberg. We also pivot to a crucial topic for the cybersecurity community: the art of reporting vulnerabilities effectively. Get insider tips on how researchers can ensure their findings are taken seriously by companies. But that's not all! Prepare to have your mind blown by the "Mickey Mouse" attack, where researchers turned a regular optical mouse into a functional microphone. We'll break down the science and discuss the chilling implications for privacy. Plus, we'll cover the latest powerful AI tools from Google and OpenAI, including Gemini's new computer-use model and OpenAI's visual "Agent Builder" for creating custom AI assistants. ⏰ KEY MOMENTS: ⏱️ KEY MOMENTS: 00:30 - Comet Jacking: The New AI Browser Vulnerability 04:47 - Should Researchers Be Blamed for Unclear Bug Reports? 13:21 - Pro Tips For Reporting Security Vulnerabilities 16:47 - The Inception Attack: Can AI Reporting Systems Be Hacked? 22:26 - New Horror: Your Gaming Mouse Can Be Used As A Microphone 29:49 - The Sobering Reality of Modern Privacy & Surveillance 43:53 - How A 17-Year-Old Built A Life-Saving $500 Dialysis Machine 💬 JOIN THE CONVERSATION: What are your thoughts on AI-powered browsers? A productivity game-changer or a security nightmare? Let us know in the comments below! If you enjoyed this dive into the world of AI and cybersecurity, don't forget to hit the like button, subscribe to the channel, and ring that notification bell so you never miss an update!

    47 min

About

Join industry experts and thought leaders as we dive deep into how artificial intelligence is transforming cybersecurity, shaping defense strategies, and creating new opportunities in the digital landscape.