Talkin' Bout [Infosec] News
Talkin' Bout [Infosec] News

Talkin' Bout [Infosec] News

Black Hills Information Security

Overview
Episodes

Details

A weekly Podcast with BHIS and Friends. We discuss notable Infosec, and infosec-adjacent news stories gathered by our community news team. Join us live on YouTube, Monday's at 4:30PM ET

Recent Episodes

US Defense Chief Uploads Secret Into to ChatGTP - 2026-02-02
FEB 5, 2026
US Defense Chief Uploads Secret Into to ChatGTP - 2026-02-02
Join us LIVE on Mondays, 4:30pm EST.A weekly Podcast with BHIS and Friends. We discuss notable Infosec, and infosec-adjacent news stories gathered by our community news team.https://www.youtube.com/@BlackHillsInformationSecurityChat with us on Discord! - https://discord.gg/bhis🔴live-chatThis episode breaks down recent reports of sensitive information being shared with AI tools and what that means for security and operations. The discussion covers OPSEC failures, common misuse of ChatGPT in professional environments, how data actually flows through AI systems, and what organizations should (and shouldn’t) worry about. The hosts focus on practical risk, realistic threat models, and actionable lessons for security teams navigating AI adoption.Chapters(00:00) - PreShow Banter™ — Robot Drivers (06:29) - US Defense Chief Uploads Secret Into to ChatGTP - 2026-02-02 (09:54) - Story # 1: US cyber defense chief accidentally uploaded secret government info to ChatGPT (19:03) - Story # 2: Hackers can bypass npm’s Shai-Hulud defenses via Git dependencies (23:01) - Story # 3: Notepad++ Official Update Mechanism Hijacked to Deliver Malware to Select Users (26:30) - Story # 4: Millions of Gmail, Facebook and other account credentials exposed (30:55) - Story # 5: Exposed Moltbook Database Let Anyone Take Control of Any AI Agent on the Site (36:13) - Story # 6: County pays $600,000 to pentesters it arrested for assessing courthouse security (39:12) - Story # 7: Costco reportedly removes RAM from its display PCs to prevent tech-savvy shoplifters, customers claim — GPUs also absent across stores as PC parts become a hot commodity (41:13) - Story # 8: Claude Sonnet 5 Is Imminent — And It Could Be a Generation Ahead of Google (45:09) - Story # 9: Researchers Find 175,000 Publicly Exposed Ollama AI Servers Across 130 Countries (48:49) - Story # 10: Match, Hinge, OkCupid, and Panera Bread breached by ransomware group (52:05) - Story # 11: Hunterbrook says Ubiquiti powering Russian battlefield communications in Ukraine (54:28) - Story # 12: Attack on Renewable Energy Plants (56:26) - Story # 13: Disrupting the World's Largest Residential Proxy Network | Google Cloud Blog LinksStory # 1: US cyber defense chief accidentally uploaded secret government info to ChatGPTStory # 2: Hackers can bypass npm’s Shai-Hulud defenses via Git dependenciesStory # 3: Notepad++ Official Update Mechanism Hijacked to Deliver Malware to Select UsersStory # 4: Millions of Gmail, Facebook and other account credentials exposedStory # 5: Exposed Moltbook Database Let Anyone Take Control of Any AI Agent on the SiteStory # 6: County pays $600,000 to pentesters it arrested for assessing courthouse securityStory # 7: Costco reportedly removes RAM from its display PCs to prevent tech-savvy shoplifters, customers claim — GPUs also absent across stores as PC parts become a hot commodityStory # 8: Claude Sonnet 5 Is Imminent — And It Could Be a Generation Ahead of GoogleStory # 9: Researchers Find 175,000 Publicly Exposed Ollama AI Servers Across 130 CountriesStory # 10: Match, Hinge, OkCupid, and Panera Bread breached by ransomware groupStory # 11: Hunterbrook says Ubiquiti powering Russian battlefield communications in UkraineStory # 12: Attack on Renewable Energy PlantsStory # 13: Disrupting the World’s Largest Residential Proxy Network | Google Cloud BlogWade & Hayden on Simply Cyber - https://www.youtube.com/live/c_lUP5gR15IHayden’s Class - https://www.antisyphontraining.com/product/foundations-of-security-operations-with-hayden-covington/Mishaal’s Class - https://www.antisyphontraining.com/product/next-level-osint-with-mishaal-khan/🔗 Register for FREE Infosec Webcasts, Anti-casts & Summits https://poweredbybhis.comBrought to you by:Black Hills Information Security https://www.blackhillsinfosec.comAntisyphon Traininghttps://www.antisyphontraining.com/Active Countermeasureshttps://www.activecountermeasures.comWild West Hackin Festhttps://wildwesthackinfest.com
play-circle icon
64 MIN
TikTok's invasive Privacy Policy - 2026-01-26
JAN 28, 2026
TikTok's invasive Privacy Policy - 2026-01-26
Join us LIVE on Mondays, 4:30pm EST.A weekly Podcast with BHIS and Friends. We discuss notable Infosec, and infosec-adjacent news stories gathered by our community news team.https://www.youtube.com/@BlackHillsInformationSecurityChat with us on Discord! - https://discord.gg/bhis🔴live-chatIn this episode, the hosts break down TikTok’s latest privacy policy and why it’s raising serious red flags. They discuss how the app expands data collection and tracking, what that means for user privacy, and the broader security implications—especially concerns around data access and China. Along the way, the conversation connects these changes to ongoing TikTok ban discussions, real-world risk for individuals and organizations, and what users should consider if they continue using the platform. The episode mixes technical insight with practical takeaways, making the privacy risks easy to understand without losing nuance.Chapters:(00:00) - PreShow Banter™ — Electroshock Therapy (02:28) - 2026-01-26 (07:33) - Story # 1: Fortinet confirms critical FortiCloud auth bypass not fully patched (14:27) - Story # 2: Hackers exploit critical telnetd auth bypass flaw to get root (17:37) - Story # 3: Clara Hawking’s Post on TikTok's Pivacy Policy (24:05) - Story # 4: Supreme Court to hear Facebook pixel tracking case (31:02) - Story # 5: Google accused of grooming kids after child receives this email (34:38) - Story # 6: House of Lords backs legislation to ban social media for children under 16 (35:47) - Story # 6b: Australia has banned social media for kids under 16. How does it work? (42:20) - Story # 7: Why Software Blocks Won’t Stop Illegally 3D Printed Guns (And What Actually Might) (48:29) - Story # 8: 1Password adds pop-up warnings for suspected phishing sites (52:09) - ClawdBot / Moltbot Links:Story # 1: Fortinet confirms critical FortiCloud auth bypass not fully patchedStory # 2: Hackers exploit critical telnetd auth bypass flaw to get rootStory # 3: Clara Hawking’s Post on TikTok’s Pivacy PolicyStory # 4: Supreme Court to hear Facebook pixel tracking caseStory # 5: Google accused of grooming kids after child receives this emailStory # 6: House of Lords backs legislation to ban social media for children under 16Story # 6b: Australia has banned social media for kids under 16. How does it work?Story # 7: Why Software Blocks Won’t Stop Illegally 3D Printed Guns (And What Actually Might)Story # 8: 1Password adds pop-up warnings for suspected phishing sitesClawdBot / MoltbotTroy’s WorkshopANTI-CAST: Effective AI for Practical SecOps Workflows w/ Hayden Covington🔗 Register for FREE Infosec Webcasts, Anti-casts & Summits https://poweredbybhis.comBrought to you by:Black Hills Information Security https://www.blackhillsinfosec.comAntisyphon Traininghttps://www.antisyphontraining.com/Active Countermeasureshttps://www.activecountermeasures.comWild West Hackin Festhttps://wildwesthackinfest.com
play-circle icon
63 MIN
Chinese firms drop US and Israeli cybersecurity software - 2026-01-19
JAN 20, 2026
Chinese firms drop US and Israeli cybersecurity software - 2026-01-19
Join us LIVE on Mondays, 4:30pm EST.A weekly Podcast with BHIS and Friends. We discuss notable Infosec, and infosec-adjacent news stories gathered by our community news team.https://www.youtube.com/@BlackHillsInformationSecurityChat with us on Discord! - https://discord.gg/bhis🔴live-chat🔗 Register for FREE Infosec Webcasts, Anti-casts & Summits – https://poweredbybhis.comThis episode is a rapid-fire cybersecurity news roundup covering multiple headlines and what they mean for defenders. The crew debates reports that Chinese firms are dropping U.S. and Israeli security vendors, then pivots into breach fallout, malware activity, and real-world attacker behavior. Along the way, they unpack how geopolitics affects procurement, why supply-chain dependencies make “bans” messy, and what happens when organizations swap tools fast. Expect candid takes on ransomware trends, enterprise security operations, and where hype collides with implementation. The hosts also riff on incident response realities, risk management, and what security teams should watch for next—plus plenty of side commentary and humor in between.Chapters(00:00) - PreShow Banter™ — Podcast Banter (04:13) - Chinese firms to stop using US and Israeli cybersecurity software - 2026-01-19 (08:56) - Story # 1: Exclusive: Beijing tells Chinese firms to stop using US and Israeli cybersecurity software, sources say (13:42) - Story # 2: Tennessee man to plead guilty to hacking Supreme Court’s electronic case filing system (16:25) - Story # 3: Hacker gets seven years for breaching Rotterdam and Antwerp ports (18:20) - Story # 4: 33-year-old Dutchman arrested for enableing criminals to test malware for antivirus programs. (20:02) - Story # 5: Army to ‘kill NIPR’ at multiple locations in commercial internet experiment (27:41) - Story # 6: Hungary grants asylum to former Polish minister implicated in spyware probe (29:12) - Story # 7: California orders Elon Musk’s AI company to immediately stop sharing sexual deepfakes (41:47) - Story # 8: ServiceNow BodySnatcher flaw highlights risks of rushed AI integrations (49:30) - Story # 8b: BodySnatcher (CVE-2025-12420): A Broken Authentication and Agentic Hijacking Vulnerability in ServiceNow (55:29) - CTF Winners (59:19) - ChickenSec: KFC app 'more secure' than Manage My Health, expert claims LinksStory # 1: Exclusive: Beijing tells Chinese firms to stop using US and Israeli cybersecurity software, sources sayStory # 2: Tennessee man to plead guilty to hacking Supreme Court’s electronic case filing systemStory # 3: Hacker gets seven years for breaching Rotterdam and Antwerp portsStory # 4: 33-year-old Dutchman arrested for enableing criminals to test malware for antivirus programs.Story # 5: Army to ‘kill NIPR’ at multiple locations in commercial internet experimentStory # 6: Hungary grants asylum to former Polish minister implicated in spyware probeStory # 7: California orders Elon Musk’s AI company to immediately stop sharing sexual deepfakesStory # 8: ServiceNow BodySnatcher flaw highlights risks of rushed AI integrationsStory # 8b: BodySnatcher (CVE-2025-12420): A Broken Authentication and Agentic Hijacking Vulnerability in ServiceNowChickenSec: KFC app ‘more secure’ than Manage My Health, expert claimsBrought to you by:Black Hills Information Security https://www.blackhillsinfosec.comAntisyphon Traininghttps://www.antisyphontraining.com/Active Countermeasureshttps://www.activecountermeasures.comWild West Hackin Festhttps://wildwesthackinfest.com
play-circle icon
63 MIN
BreachForums Doomsday - 2026-01-12
JAN 14, 2026
BreachForums Doomsday - 2026-01-12
Join us LIVE on Mondays, 4:30pm EST.A weekly Podcast with BHIS and Friends. We discuss notable Infosec, and infosec-adjacent news stories gathered by our community news team.https://www.youtube.com/@BlackHillsInformationSecurityChat with us on Discord! - https://discord.gg/bhis🔴live-chat🔗 Register for FREE webcasts, summits, and workshops - https://poweredbybhis.comIn this episode, we break down the “Doomsday” incident: a major breach forum gets breached, reminding everyone that even cybercriminal communities suffer constant OPSEC failures. We cover what leaked, why these underground markets keep imploding, and how infighting, reused infrastructure, weak authentication, and sloppy identity hygiene turn “elite hackers” into easy targets. Then we connect the dots to law enforcement’s latest crypto actions—how DOJ seizures and mixer investigations work, why blockchain tracing matters, and what criminals try (and fail) to do to hide money flows. Finally, we translate the news into practical defense: validate breach intel, monitor for credential stuffing, enable MFA, use unique passwords, and tighten access logs. Whether you’re a defender, creator, or online, this is the real-world cybercrime story behind the headlines.Chapters(00:00) - PreShow Banter™ — Task Overflow (02:29) - BreachForums Doomsday - 2026-01-12 (05:09) - Story # 1; Did DOJ Prosecutors Violate Trump’s Executive Order by Selling the Forfeited Samourai Wallet Bitcoin? (15:42) - Story # 2: Cloudflare defies Italy’s Piracy Shield, won’t block websites on 1.1.1.1 DNS (23:04) - Story # 3: California bans data broker reselling health data of millions (28:13) - Story # 4: Apple picks Google’s Gemini to run AI-powered Siri coming this year (36:00) - Story # 5: Ragebait as a phishing tactic (38:00) - Story # 6: Doomsday For Cybercriminals — Data Breach Of Major Dark Web Forum (40:31) - Story # 7: The Great VM Escape: ESXi Exploitation in the Wild (45:39) - Story # 8: OpenAI says ChatGPT won't use your health information to train its models (46:23) - Story # 8b: Anthropic brings Claude to healthcare with HIPAA-ready Enterprise tools (50:15) - Story # 9: Max severity Ni8mare flaw lets hackers hijack n8n servers (53:05) - Story # 10: Instagram Denies Data Breach, Fixes Unsolicited Password Reset Requests (56:49) - Reporter remembers saving animals a year after L.A. wildfires (57:52) - CTF Winners LinksStory # 1; Did DOJ Prosecutors Violate Trump’s Executive Order by Selling the Forfeited Samourai Wallet Bitcoin?Story # 2: Cloudflare defies Italy’s Piracy Shield, won’t block websites on 1.1.1.1 DNSStory # 3: California bans data broker reselling health data of millionsStory # 4: Apple picks Google’s Gemini to run AI-powered Siri coming this yearStory # 5: Ragebait as a phishing tacticStory # 6: Doomsday For Cybercriminals — Data Breach Of Major Dark Web ForumStory # 7: The Great VM Escape: ESXi Exploitation in the WildStory # 8: OpenAI says ChatGPT won’t use your health information to train its modelsStory # 8b: Anthropic brings Claude to healthcare with HIPAA-ready Enterprise toolsStory # 9: Max severity Ni8mare flaw lets hackers hijack n8n serversStory # 10: Instagram Denies Data Breach, Fixes Unsolicited Password Reset RequestsReporter remembers saving animals a year after L.A. wildfiresBrought to you by:Black Hills Information Security https://www.blackhillsinfosec.comAntisyphon Traininghttps://www.antisyphontraining.com/Active Countermeasureshttps://www.activecountermeasures.comWild West Hackin Fest - Join us for our Hybrid Conference and Pre-Conference Traininghttps://wildwesthackinfest.com
play-circle icon
61 MIN
US Cyberattacks on Venezuela - 2026-01-05
JAN 8, 2026
US Cyberattacks on Venezuela - 2026-01-05
Join us LIVE on Mondays, 4:30pm EST.A weekly Podcast with BHIS and Friends. We discuss notable Infosec, and infosec-adjacent news stories gathered by our community news team.https://www.youtube.com/@BlackHillsInformationSecurityChat with us on Discord! - https://discord.gg/bhis🔴live-chat🔗 Register for FREE webcasts, summits, and workshops - https://poweredbybhis.comIn this episode, we break down the growing debate around U.S. cyber operations against Venezuela—and what it means for modern cyber warfare, critical infrastructure security, and geopolitics. The conversation explores how nation-state attacks can target a country’s power grid, the challenges of attributing cyberattacks, and why industrial control systems (ICS/SCADA) remain a high-impact battleground. We also discuss the strategic value (and risks) of disrupting energy infrastructure, how these campaigns compare to other real-world incidents, and what defenders can learn to better protect utilities and national systems.Chapters(00:00) - PreShow Banter™ — Undisclosed Closets (09:07) - US Cyberattacks on Venezuela - 2026-01-05 (10:16) - Story # 1:Trump suggests US used cyberattacks to turn off lights in Venezuela during strikes (11:14) - Story # 1b: There Were BGP Anomalies During The Venezuela Blackout (21:06) - Story # 1c: Pizza index of war: Late-night traffic near Pentagon surges again as US strikes Venezuela (32:40) - Story # 2: Finland seizes ship suspected of damaging subsea cable in Baltic Sea (35:11) - Story # 3: US cybersecurity experts plead guilty to BlackCat ransomware attacks (35:46) - Story # 4: MongoDB Vulnerability CVE-2025-14847 Under Active Exploitation Worldwide (39:06) - Story # 5: Hackers claim to hack Resecurity, firm says it was a honeypot (42:06) - Story # 6: NordVPN denies breach claims, says attackers have "dummy data" (42:35) - Story # 7: Hackers say they have stolen 40 million Condé Nast Records - here's how to stay safe (43:43) - Story # 8: Hacker Dressed As Pink Power Ranger Dismantles Racist Websites Live on Stage (47:13) - Story # 9: NYC mayoral inauguration bans Flipper Zero, Raspberry Pi devices (52:18) - Story # 10: Manufacturer issues remote kill command to disable smart vacuum after engineer blocks it from collecting data — user revives it with custom hardware and Python scripts to run offline (55:15) - Story # 11: Ben Jordan Exposes Severe Security Vulnerabilities in Flock Surveillance Cameras (57:26) - Story # 11b: We Tracked Ourselves with Exposed Flock Cameras LinksStory # 1:Trump suggests US used cyberattacks to turn off lights in Venezuela during strikesStory # 1b: There Were BGP Anomalies During The Venezuela BlackoutStory # 1c: Pizza index of war: Late-night traffic near Pentagon surges again as US strikes VenezuelaStory # 2: Finland seizes ship suspected of damaging subsea cable in Baltic SeaStory # 3: US cybersecurity experts plead guilty to BlackCat ransomware attacksStory # 4: MongoDB Vulnerability CVE-2025-14847 Under Active Exploitation WorldwideStory # 5: Hackers claim to hack Resecurity, firm says it was a honeypotStory # 6: NordVPN denies breach claims, says attackers have “dummy data”Story # 7: Hackers say they have stolen 40 million Condé Nast Records - here’s how to stay safeStory # 8: Hacker Dressed As Pink Power Ranger Dismantles Racist Websites Live on StageStory # 9: NYC mayoral inauguration bans Flipper Zero, Raspberry Pi devicesStory # 10: Manufacturer issues remote kill command to disable smart vacuum after engineer blocks it from collecting data — user revives it with custom hardware and Python scripts to run offlineStory # 11: Ben Jordan Exposes Severe Security Vulnerabilities in Flock Surveillance CamerasStory # 11b: We Tracked Ourselves with Exposed Flock CamerasBrought to you by:Black Hills Information Security https://www.blackhillsinfosec.comAntisyphon Traininghttps://www.antisyphontraining.com/Active Countermeasureshttps://www.activecountermeasures.comWild West Hackin Festhttps://wildwesthackinfest.com
play-circle icon
69 MIN