The IT Privacy and Security Weekly Update.

R. Prescott Stearns Jr.

Into year six for this award-winning, light-hearted, lightweight IT privacy and security podcast that spans the globe in terms of issues covered, with topics that draw in everyone from executive to newbie, to tech specialist. Your investment of between 15 and 20 minutes a week will bring you up to speed on half a dozen current IT privacy and security stories from around the world to help you improve the management of your own privacy and security.

  1. EP 272.5 Deep Dive. fLocked and fLoaded The IT Privacy and Security Weekly update for the week ending December 30th.., 2025

    6D AGO · BONUS

    EP 272.5 Deep Dive. fLocked and fLoaded The IT Privacy and Security Weekly update for the week ending December 30th.., 2025

    The brief describes how recent incidents collectively show a rapidly evolving, increasingly interconnected global cyber threat landscape that blends financial crime, strategic espionage, physical-world risk, and systemic surveillance failures. Financially Driven Cybercrime Cybercriminals are shifting to low-interaction, trust-exploiting techniques, such as clipboard-hijacking malware masquerading as “KMSAuto” that silently replaces copied crypto wallet addresses and has impacted millions of systems. Fraudsters are also using AI-generated images and video to fake damaged goods and exploit e-commerce refund policies at scale, turning automated, trust-based processes into predictable profit channels. Strategic-Scale Data Theft Large data breaches like the Aflac incident show adversaries targeting core personal identifiers (e.g., Social Security numbers, IDs, medical data), creating permanent assets for identity theft, fraud, and social engineering rather than quick monetization. Espionage campaigns such as “Zoom Stealer” use malicious browser extensions to harvest meeting links, topics, participant data, and passwords, enabling persistent corporate spying and highly customized social-engineering attacks. Digital-Physical Convergence of Threats Demonstrations of hijacking AI-controlled robots via voice commands illustrate how user-friendly features can be weaponized, enabling cascading compromises and potential physical harm as robots infect one another and execute dangerous actions. Concepts like space “zone effect” weapons—clouds of orbital debris able to damage any satellite passing through—highlight how hostile capabilities can create indiscriminate, long-lasting risks to civilian, commercial, and military infrastructure worldwide. Insecure Surveillance as Systemic Risk Both government and private surveillance systems can become mass-exposure hazards when basic security is neglected, as seen with an unprotected national license plate database and misconfigured AI camera networks streaming footage openly. These failures turn tools designed for safety and control into uncontrolled sources of sensitive data, undermining public trust and creating new exploitation opportunities at societal scale. Strategic Implications for Leaders Threat motivations now span from opportunistic, high-volume fraud to patient, state-level operations against critical and space-based systems, requiring layered defenses tailored to varied adversaries and timelines. Emerging technologies like AI, robotics, and pervasive sensing are double-edged: they drive efficiency but also introduce new attack surfaces that must be secured from the design phase, not retrofitted later. The rapid deployment of mass monitoring without commensurate safeguards is generating systemic vulnerabilities, meaning resilience now depends as much on securing surveillance infrastructures as on defending traditional IT assets.

    15 min
  2. 12/31/2025

    fLocked and fLoaded. The IT Privacy and Security Weekly update for the week ending December 30th., 2025.

    EP 272 In this last update for 2025, we span the fAce of the globe and find out we’ve gotten fLocked and fLoaded! Cybersecurity researchers from DARKNAVY have revealed a critical vulnerability allowing commercially available humanoid robots to be hijacked via simple voice commands, with exploits rapidly propagating to nearby machines. Fraudsters in China are increasingly exploiting AI-generated photos and videos of damaged goods to secure illegitimate refunds on e-commerce platforms, challenging merchant trust and platform policies. A sophisticated campaign dubbed Zoom Stealer, attributed to Chinese threat actor DarkSpectre, has deployed malicious browser extensions to harvest sensitive corporate meeting data from millions of users. Western intelligence reports indicate Russia is advancing a novel "zone-effect" anti-satellite weapon designed to release dense pellet clouds in orbit, potentially targeting SpaceX's Starlink constellation. A 29-year-old Lithuanian national has been extradited to South Korea and charged for distributing trojanized KMSAuto software that infected 2.8 million systems with cryptocurrency clipboard hijacking malware. A vast network of roadside cameras tracking vehicles across Uzbekistan was inadvertently Insurance giant afLac is notifying approximately 22.65 million individuals of a major data breach stemming from a June 2025 cyber intrusion that exposed sensitive personal information. Find the full transcript here.

    19 min
  3. 12/25/2025

    EP 271.5 Deep Dive. Santa and The IT Privacy and Security Weekly update for the week ending December 23rd., 2025

    Our daily digital tools—browsers, apps, and smart devices—offer convenience but also expose us to hidden security risks. This guide reveals how ordinary technologies can imperil privacy and safety, focusing on three major areas: browser extensions, typo-prone website visits, and internet-connected cameras. The Hidden Spy on Your Browser Browser extensions, designed to block ads or save passwords, can also harvest personal data or hide malware. Researchers recently found popular Chromium extensions secretly recording entire conversations with AI chatbots such as ChatGPT and Gemini—logging prompts, responses, and timestamps, then transmitting them to outside servers. Many of these tools were deceptively labeled as privacy enhancers and featured in official stores, masking their data collection practices under carefully worded policies. Another danger, exemplified by the GhostPoster malware campaign on Firefox, showed how malicious code can bypass security. The attackers embedded it in an image file within the extension’s icon—an area security software rarely scans. The code then downloaded additional payloads from remote servers in timed stages to avoid detection. Together, these examples illustrate that browser extensions can function as open doors for data theft and hidden malware, exploiting misplaced trust. When a Typo Becomes a Trap Even something as minor as mistyping a web address now carries serious risk. A "parked domain"—an inactive site often resembling a misspelled version of a popular URL—has become a common tool for cybercriminals. Once relatively harmless, these domains are now overwhelmingly malicious. According to Infoblox research, over 90% of visits to parked domains result in exposure to scams, illegal content, or automatic malware downloads, compared to less than 5% a decade ago. Simply visiting one of these pages can trigger pop-ups for fake antivirus subscriptions, redirect you to scam sites, or silently infect your device. In today’s environment, a typo is no longer an inconvenience—it’s a gateway to immediate compromise. The Camera That Turns on You Internet-connected security cameras promise safety but can create severe privacy breaches when poorly secured. A massive hack in South Korea exposed footage from over 120,000 cameras in homes, clinics, and salons, which hackers later sold online. Most intrusions stemmed from weak or unchanged default passwords. This event underscores that devices we install for protection can become surveillance tools for attackers if we fail to secure them properly. Staying Smart and Safe The dangers from compromised extensions, malicious parked domains, and insecure cameras highlight one shared truth: convenience often conceals risk. To navigate safely, users should: 1. Question their tools—research extensions or apps and limit unnecessary permissions. 2. Avoid careless mistakes—double-check URLs before pressing enter. 3. Secure devices—use strong, unique passwords and update firmware regularly. Ultimately, cyber safety depends on ongoing vigilance rather than one-time fixes. Like Santa in a playful ESET report who “tightened his security” after a fictional data breach, users too can—and must—strengthen their defenses. Staying alert, skeptical, and proactive transforms technology from a source of danger into a safer partner in modern life.

    14 min
  4. 12/24/2025

    Santa and The IT Privacy and Security Weekly update for the week ending December 23rd., 2025

    EP 271. For this week’s holiday update: Santa’s naughty list exposed in data breach.  A lighthearted reminder from a past holiday hoax: even Santa's list isn't immune to data breaches. How China Built Its 'Manhattan Project' To Rival the West in AI Chips.  China's clandestine push to master extreme ultraviolet lithography signals a major leap toward semiconductor self-sufficiency, challenging Western dominance in AI-enabling technology. Apple Fined $116 Million Over App Privacy Prompts.  Italy's antitrust authority has penalized Apple €100 million for imposing stricter privacy consent requirements on third-party apps than on its own, tilting the playing field in the App Store ecosystem. Cyberattack Disrupts France's Postal & Banking Services During Christmas Rush. A major DDoS attack crippled La Poste’s online services and banking arm at the peak of the holiday season, highlighting the vulnerability of critical infrastructure during high-traffic periods. Browser Extensions With 8 Million Users Collect Extended AI Conversations. Popular Chrome and Edge extensions trusted by millions have been caught secretly harvesting full AI chat histories, raising serious concerns about privacy in everyday browsing tools. How a PNG Icon Infected 50,000 Firefox Users. A clever malware campaign hid malicious JavaScript inside innocent-looking PNG extension icons, infecting tens of thousands of Firefox users through trusted add-ons. Most Parked Domains Now Serving Malicious Content. Expired and typosquatted domains, once benign placeholders, now predominantly redirect users to scams, malware, and fraudulent sites, making casual web navigation riskier than ever. What's up with the TV? Massive Android Botnet infects 1.8 Million Devices. The Kimwolf botnet has compromised over 1.8 million Android TV boxes, turning everyday smart devices into powerful tools for proxy traffic and massive DDoS attacks. Mass Hacking of IP Cameras Leave Koreans Feeling Vulnerable in Homes, Businesses. Widespread breaches of 120,000 internet-connected cameras in South Korea exposed private footage sold online, eroding public trust in consumer surveillance technology. The FCC has barred new imports of foreign-made drones, citing unacceptable risks of espionage and disruption, with DJI-the market leader-facing the most significant impact. FSF Says Nintendo's New DRM Allows Them to Remotely Render User Devices 'Permanently Unusable' Nintendo's updated terms grant the company sweeping authority to remotely disable Switch consoles and accounts for perceived violations, sparking debate over true ownership in the digital age. This week we’ve got the sleigh piled high, so call out the reindeer and we’ll get this update out to children all over the world!

    29 min
  5. EP-270.5 Deep Dive. Honey Don't. The IT Privacy and Security Weekly update for the week ending December 16th., 2025

    12/18/2025 · BONUS

    EP-270.5 Deep Dive. Honey Don't. The IT Privacy and Security Weekly update for the week ending December 16th., 2025

    Global: Over 10,000 Docker Hub Images Found Leaking Credentials, Auth Keys The widespread exposure of sensitive keys in Docker images underscores the dangers of embedding secrets in container builds. Developers should prioritize centralized secrets management and routine scanning to prevent lasting breaches even after quick fixes. CN: Chinese Whistleblower Living In US Is Being Hunted By Beijing With US Tech This case highlights how advanced surveillance tools can erase borders, enabling persistent transnational repression. It serves as a stark reminder that personal data, once captured, can fuel harassment far beyond its intended use. EU: 193 Cybercrims Arrested, Accused of Plotting 'Violence-As-a-Service' The successful disruption of "violence-as-a-service" networks shows that coordinated law enforcement can counter the dangerous blend of online recruitment and offline crime. Continued vigilance is essential to protect communities from these evolving hybrid threats. Global: Google will shut down “unhelpful” dark web monitoring tool Google's decision to retire its dark web monitoring feature reflects the challenge of turning breach notifications into truly actionable advice. Users should seek security tools that not only alert but also guide clear, practical steps for protection. Global: Second JavaScript Exploit in Four Months Exposes Crypto Sites to Wallet Drainers Repeated supply-chain vulnerabilities in core JavaScript libraries reveal how quickly dependencies can become attack vectors. Maintaining rigorous patch management and dependency monitoring is now as critical as safeguarding cryptocurrency itself. RU: All of Russia’s Porsches Were Bricked By a Mysterious Satellite Outage The mass immobilization of connected vehicles illustrates the hidden risks of over-reliance on remote satellite systems for essential functions. As cars grow smarter, resilience against connectivity failures must become a design priority. RU: Russian Hackers Debut Simple Ransomware Service, But Store Keys In Plain Text Even motivated threat actors can sabotage their own operations through basic security oversights like hardcoding keys. This flaw reminds defenders that attacker mistakes can offer unexpected opportunities for recovery without payment. US: More Than 200 Environmental Groups Demand Halt To New US Datacenters The growing backlash against unchecked data center expansion ties AI progress directly to real-world strains on energy, water, and household bills. Balancing technological advancement with sustainable infrastructure is no longer optional but urgent for communities nationwide.

    17 min
  6. 12/17/2025

    Honey Don't. The IT Privacy and Security Weekly update for the week ending December 16th., 2025

    EP 270.  In this week’s update:Security researchers uncover over 10,000 publicly available Docker Hub images exposing sensitive credentials and API keys, posing severe risks to production systems and AI services.A former Chinese official now seeking asylum in the United States reveals ongoing transnational harassment by Beijing, leveraging advanced surveillance tools-including those developed by American companies.European law enforcement dismantles sophisticated "violence-as-a-service" networks in a major operation, arresting 193 suspects accused of recruiting teenagers for real-world attacks and intimidation.Google announces the upcoming shutdown of its dark web monitoring service, citing user feedback that breach alerts lacked actionable guidance for meaningful protection.A critical vulnerability in the popular React JavaScript library enables attackers to inject wallet-draining malware into legitimate cryptocurrency platforms, marking the second major supply-chain exploit in recent months.Hundreds of Porsche vehicles across Russia suddenly become inoperable due to a widespread failure in satellite-dependent anti-theft systems, leaving owners stranded amid ongoing connectivity issues.Pro-Russian threat actors launch a Telegram-based ransomware-as-a-service platform, only to undermine their own operation by carelessly hardcoding master decryption keys in plaintext.Over 230 environmental organizations urge Congress to impose a nationwide pause on new data center construction, highlighting the facilities' escalating strain on electricity, water resources, and climate goals driven by AI expansion.Let’s go have a look, but honey don’t forget the keys! Find the full transcript to the podcast here.

    20 min
  7. 12/04/2025 · BONUS

    EP 269.5 Deep Dive. Truckin' With the IT Privacy and Security Weekly update for the week ending December 2nd., 2025

    Modern security is defined less by a single network perimeter and more by a web of interconnected partners, vendors, and shared infrastructure, where one weak link can trigger widespread impact. Criminals are exploiting this by abusing trusted relationships and platforms: in logistics, attackers impersonate freight middlemen to take over identities, push fake loads, and use malicious links to compromise carrier systems and hijack real-world cargo, while a breach at a fintech provider and an IT failure shared across London councils show how third-party or shared services can ripple across many institutions. At the same time, phishing campaigns that spoof familiar tools like Calendly and major brands turn everyday business workflows into delivery channels for account takeover and abuse of ad and business platforms.Alongside this erosion of perimeter and trust, artificial intelligence introduces a new, unstable risk frontier. Research into “syntax hacking” shows that AI safety controls can be bypassed simply by changing sentence structure, revealing how current models often key on grammar rather than true meaning and leaving dangerous gaps in protections. Real-world deployments amplify these concerns: surveillance firm Flock reportedly relied on overseas gig workers to review sensitive footage to train its systems, illustrating how technically brittle AI is already entangled with serious privacy and labor issues. This moment echoes early social media, with warnings that—without strong governance—AI could evolve into a tool of control rather than shared benefit.Even as these advanced threats grow, many major incidents still stem from basic failures. A breach at Illuminate Education exposed unencrypted data for millions of students due to missing fundamentals like access controls and patching, while the Australian Bureau of Meteorology spent heavily on a website overhaul that degraded services and public trust, underscoring how poor project governance can be as damaging as outright insecurity. In response, governments and regulators are escalating both direct enforcement and strategic policy: Europol has physically dismantled a major crypto-mixing service used for money laundering, while EU lawmakers push for “digital sovereignty” by demanding EU institutions replace Microsoft tools with European alternatives. Together, these themes show a security landscape where fragile trust, immature AI governance, and unresolved basics collide with increasingly assertive institutional responses.

    14 min
4.5
out of 5
4 Ratings

About

Into year six for this award-winning, light-hearted, lightweight IT privacy and security podcast that spans the globe in terms of issues covered, with topics that draw in everyone from executive to newbie, to tech specialist. Your investment of between 15 and 20 minutes a week will bring you up to speed on half a dozen current IT privacy and security stories from around the world to help you improve the management of your own privacy and security.