Stay ahead of the latest cybersecurity trends with Cyberside Chats! Listen to our weekly podcast every Tuesday at 6:30 a.m. ET, and join us live once a month for breaking news, emerging threats, and actionable solutions. Whether you’re a cybersecurity professional or an executive looking to understand how to protect your organization, cybersecurity experts Sherri Davidoff and Matt Durrin will help you stay informed and proactively prepare for today’s top cybersecurity threats, AI-driven atta ...
…
continue reading
Chatcyberside Podcasts
What happens when the same AI tools that make coding easier also give cybercriminals new powers? In this episode of Cyberside Chats Live, we explore the rise of “vibe coding” and its darker twin, “vibe hacking.” You’ll learn how AI is reshaping software development, how attackers are turning those vibes into cybercrime, and what it means for the fu…
…
continue reading

1
The Saga Continues: More Dirt on the Salesforce–Drift Breach
16:58
16:58
Play later
Play later
Lists
Like
Liked
16:58When we first covered the Salesforce–Drift breach, we knew it was bad. Now it’s clear the impact is even bigger. Hundreds of organizations — including Cloudflare, Palo Alto Networks, Zscaler, Proofpoint, Rubrik, and even financial firms like Wealthsimple — have confirmed they were affected. The root cause? A compromised GitHub account that opened t…
…
continue reading

1
Connected App, Connected Risk: The Salesforce–Drift Incident
13:54
13:54
Play later
Play later
Lists
Like
Liked
13:54A single weak app integration opened the door for attackers to raid data from some of the world’s largest companies. Salesforce environments were hit hardest—with victims like Cloudflare, Palo Alto Networks, and Zscaler—but the blast radius also reached other SaaS platforms, including Google Workspace. In this episode of Cyberside Chats, Sherri Dav…
…
continue reading

1
Betrayal, Backdoors, and Payback: When Hackers Become the Hacked
28:51
28:51
Play later
Play later
Lists
Like
Liked
28:51Hackers aren’t untouchable—and sometimes, they become the victims. From North Korean operatives getting exposed at DEF CON, to ransomware gangs like Conti and LockBit crumbling under betrayal and rival leaks, the underground is full of double-crosses and takedowns. Now, Congress is even debating whether to bring back “letters of marque” to authoriz…
…
continue reading

1
Printer Problems: Trump, Putin, and a Costly Mistake
15:51
15:51
Play later
Play later
Lists
Like
Liked
15:51On the eve of the Trump–Putin summit, sensitive U.S. State Department documents were left sitting in a hotel printer in Anchorage. Guests stumbled on pages detailing schedules, contacts, and even a gift list—sparking international headlines and White House mockery. But the real story isn’t just about geopolitics. It’s about how unmanaged printers—a…
…
continue reading

1
Mass Salesforce Hacks: How Criminals Are Targeting the Cloud Supply Chain
14:25
14:25
Play later
Play later
Lists
Like
Liked
14:25A wave of coordinated cyberattacks has hit Salesforce customers across industries and continents, compromising millions of records from some of the world’s most recognized brands — including Google, Allianz Life, Qantas, LVMH, and even government agencies. In this episode of Cyberside Chats, Sherri Davidoff and Matt Durrin break down how the attack…
…
continue reading

1
North Korea’s Deepfake Remote Workers: How They’re Getting Inside U.S. Companies
14:28
14:28
Play later
Play later
Lists
Like
Liked
14:28On National Social Engineering Day, we’re pulling the lid off one of the most dangerous insider threat campaigns in the world — North Korea’s fake remote IT worker program. Using AI-generated résumés, real-time deepfake interviews, and U.S.-based “laptop farms,” DPRK operatives are gaining legitimate employment inside U.S. companies — funding nucle…
…
continue reading

1
The Amazon Q AI Hack: A Wake-Up Call for Developer Tool Security
21:37
21:37
Play later
Play later
Lists
Like
Liked
21:37A silent compromise, nearly a million developers affected, and no one at Amazon knew for six days. In this episode of Cyberside Chats, we’re diving into the Amazon Q AI Hack, a shocking example of how vulnerable our software development tools have become. Join hosts Sherri Davidoff and Matt Durrin as they unpack how a misconfigured GitHub token all…
…
continue reading

1
Iran’s Cyber Surge: Attacks Intensify in 2025
28:02
28:02
Play later
Play later
Lists
Like
Liked
28:02Iranian cyber operations have sharply escalated in 2025, targeting critical infrastructure, defense sectors, and global businesses—especially those linked to Israel and the U.S. From destructive malware and coordinated DDoS attacks to sophisticated hack-and-leak campaigns leveraging generative AI, Iranian threat actors are rapidly evolving. Join us…
…
continue reading
On July 13, 2025, a developer at the Department of Government Efficiency—DOGE—accidentally pushed a private xAI API key to GitHub. That key unlocked access to 52 unreleased LLMs, including Grok‑4‑0709, and remained active long after discovery. In this episode of Cyberside Chats, we examine how a single leaked credential became a national-level risk…
…
continue reading

1
Holiday Horror Stories: Why Hackers Love Long Weekends
22:09
22:09
Play later
Play later
Lists
Like
Liked
22:09Why do so many major cyberattacks happen over holiday weekends? In this episode, Sherri and Matt share their own 4th of July anxiety as security professionals—and walk through some of the most infamous attacks timed to exploit long weekends, including the Kaseya ransomware outbreak, the MOVEit breach, and the Bangladesh Bank heist. From retail brea…
…
continue reading

1
Federal Cybersecurity Rollbacks: What Got Cut—And What Still Stands
19:39
19:39
Play later
Play later
Lists
Like
Liked
19:39In June 2025, the White House issued an executive order that quietly eliminated several key federal cybersecurity requirements. In this episode of Cyberside Chats, Sherri and Matt break down exactly what changed—from the removal of secure software attestations to the rollback of authentication requirements—and what remains in place, including post-…
…
continue reading
Forget everything you thought you knew about ransomware. Today’s threat actors aren’t locking your files—they’re stealing your data and threatening to leak it unless you pay up. In this episode, we dive into the rise of data-only extortion campaigns and explore why encryption is becoming optional for cybercriminals. From real-world trends like the …
…
continue reading

1
The AI Insider Threat: EchoLeak and the Rise of Zero-Click Exploits
13:54
13:54
Play later
Play later
Lists
Like
Liked
13:54Can your AI assistant become a silent data leak? In this episode of Cyberside Chats, Sherri Davidoff and Matt Durrin break down EchoLeak, a zero-click exploit in Microsoft 365 Copilot that shows how attackers can manipulate AI systems using nothing more than an email. No clicks. No downloads. Just a cleverly crafted message that turns your AI into …
…
continue reading

1
When AI Goes Rogue: Blackmail, Shutdowns, and the Rise of High-Agency Machines
26:27
26:27
Play later
Play later
Lists
Like
Liked
26:27What happens when your AI refuses to shut down—or worse, tries to blackmail you to stay online? Join us for a riveting Cyberside Chats Live as we dig into two chilling real-world incidents: one where OpenAI’s newest model bypassed shutdown scripts during testing, and another where Anthropic’s Claude Opus 4 wrote blackmail messages and threatened us…
…
continue reading

1
Retailgeddon Reloaded: Beyond Card Theft, Into Chaos
17:57
17:57
Play later
Play later
Lists
Like
Liked
17:57Retail breaches are back — but they’ve evolved. This isn’t about skimming cards anymore. From ransomware taking down pharmacies to credential stuffing attacks hitting brand loyalty, today’s breaches are about disruption, trust, and third-party exposure. In this episode of Cyberside Chats, hosts Sherri Davidoff and Matt Durrin break down the latest …
…
continue reading

1
How Hackers Get In: Penetration Testing Secrets from the Front Line
26:24
26:24
Play later
Play later
Lists
Like
Liked
26:24Think your network is locked down? Think again. In this episode of Cyberside Chats, we’re joined by Tom Pohl, LMG Security’s head of penetration testing, whose team routinely gains domain admin access in over 90% of their engagements. How do they do it—and more importantly, how can you stop real attackers from doing the same? Tom shares the most co…
…
continue reading

1
Afterlife Access: Cybersecurity Planning for When You’re Gone
16:52
16:52
Play later
Play later
Lists
Like
Liked
16:52What happens to your digital world when you die? In this episode of Cyberside Chats, LMG Security’s Tom Pohl joins the conversation to discuss the often-overlooked cybersecurity and privacy implications of death. From encrypted files and password managers to social media and device access, we’ll explore how to ensure your loved ones can navigate yo…
…
continue reading

1
The LockBit Leak: When Hackers Get a Taste of Their Own Medicine
12:31
12:31
Play later
Play later
Lists
Like
Liked
12:31In this explosive episode of Cyberside Chats, we dive into one of the most shocking developments in ransomware history—LockBit got hacked. Join us as we unpack the breach of one of the world’s most notorious ransomware-as-a-service gangs. We explore what was leaked, why it matters, and how this leak compares to past takedowns like Conti. You'll als…
…
continue reading

1
Network for Rent: The Criminal Market Built on Outdated Routers
9:37
9:37
Play later
Play later
Lists
Like
Liked
9:37Cybercriminals are exploiting outdated routers to build massive proxy networks that hide malware operations, fraud, and credential theft—right under the radar of enterprise defenses. In this episode, Sherri and Matt unpack the FBI’s May 2025 alert, the role of TheMoon malware, and how the Faceless proxy service industrializes anonymity for hire. Le…
…
continue reading

1
Hacker AI: Smarter Attacks, Faster Exploits, Higher Stakes
19:29
19:29
Play later
Play later
Lists
Like
Liked
19:29AI isn’t just revolutionizing business—it’s reshaping the threat landscape. Cybercriminals are now weaponizing AI to launch faster, more convincing, and more scalable attacks. From deepfake video scams to LLM-guided exploit development, the new wave of AI-driven cybercrime is already here. In this engaging and eye-opening session, Sherri and Matt s…
…
continue reading

1
Quantum Shift: How Cybersecurity Must Evolve Now
20:41
20:41
Play later
Play later
Lists
Like
Liked
20:41Quantum computing is advancing rapidly—and with it, the potential to break today’s most widely used encryption standards. In this episode of Cyberside Chats, Sherri and Matt cut through the hype to explore the real-world cybersecurity implications of quantum technology. From the looming threat to encryption to the emerging field of post-quantum cry…
…
continue reading

1
Red Alert: CISA's Budget Cuts and the Fallout for Defenders
16:01
16:01
Play later
Play later
Lists
Like
Liked
16:01CISA, the U.S. government’s lead cyber defense agency, just took a major financial hit—and the fallout could affect everyone. From layoffs and ISAC cuts to a near-shutdown of the CVE program, these changes weaken critical infrastructure for cyber defense. In this episode of Cyberside Chats, we unpack what’s been cut, how it impacts proactive servic…
…
continue reading

1
23andMe: Breaches, Bankruptcy, and Security
13:42
13:42
Play later
Play later
Lists
Like
Liked
13:42When a company built on sensitive data collapses, what happens to the information it collected? In this episode of Cyberside Chats, we examine 23andMe’s data breach, its March 2025 bankruptcy, and the uncomfortable parallels with the 2009 Flyclear shutdown. What happens to biometric or genetic data when a vendor goes under? What protections failed—…
…
continue reading

1
"Unmasking Shadow IT: Navigating Unauthorized Communication Tools Like Signal"
17:34
17:34
Play later
Play later
Lists
Like
Liked
17:34Unauthorized communication platforms—aka shadow channels—are increasingly used within enterprise and government environments, as demonstrated by the recent Signal scandal. In this week's episode of Cyberside Chats, special guest Karen Sprenger, COO at LMG Security, joins Matt Durrin to delve into the critical issue of shadow IT, focusing on recent …
…
continue reading

1
The Encryption Battle: Security Savior or Cyber Risk?
25:22
25:22
Play later
Play later
Lists
Like
Liked
25:22Governments are pushing for encryption backdoors—but at what cost? In this episode of Cyberside Chats, we break down Apple’s fight against the UK’s demands, the global backlash, and what it means for cybersecurity professionals. Are backdoors a necessary tool for law enforcement, or do they open the floodgates for cybercriminals? Join us as we expl…
…
continue reading

1
Deepfakes & Voice Phishing: The New Frontier of Cybercrime
13:46
13:46
Play later
Play later
Lists
Like
Liked
13:46AI-generated deepfakes and voice phishing attacks are rapidly evolving, tricking even the most tech-savvy professionals. In this episode of Cyberside Chats, we break down real-world cases where cybercriminals used deepfake videos, voice clones, and trusted platforms like YouTube, Google, and Apple to bypass security defenses. Learn how these scams …
…
continue reading

1
Wiretapped: How Hackers Infiltrated Global Telecom Networks
14:54
14:54
Play later
Play later
Lists
Like
Liked
14:54Recent telecom breaches have exposed a critical security risk for businesses everywhere. Nation-state hackers and cybercriminals are stealing metadata, tracking high-profile targets, and even intercepting calls—all without breaking into corporate networks. In this episode, we analyze major telecom hacks, including the Salt Typhoon breach, and share…
…
continue reading

1
When Microsoft Goes Down: Cyber Risk & Resilience
14:57
14:57
Play later
Play later
Lists
Like
Liked
14:57The March 2025 Microsoft Outlook outage left thousands of organizations scrambling. But this wasn’t just an isolated event—recent outages from CrowdStrike, AT&T, and UK banks highlight the systemic risks businesses face. In this episode, we break down the latest Microsoft outage, discuss its impact on cyber insurance, and provide actionable steps t…
…
continue reading

1
Abandoned S3 Buckets – A Goldmine for Hackers
25:21
25:21
Play later
Play later
Lists
Like
Liked
25:21Do you think your old cloud storage is harmless? Think again. This week on Cyberside Chats, Sherri and Matt dive into shocking new research from Watchtowr that reveals how hackers can take over abandoned Amazon S3 buckets—and use them to infiltrate government agencies, Fortune 500 companies, and critical infrastructure. We’ll break down real-world …
…
continue reading

1
Ransomware Watch: Ghost, RansomHub, and the Latest Trends
14:12
14:12
Play later
Play later
Lists
Like
Liked
14:12In this episode of Cyberside Chats, we dive into the world of ransomware, focusing on the notorious Ghost Ransomware Gang. Recently flagged by the FBI and CISA, Ghost has targeted organizations in over 70 countries. We explore their methods of infiltration, with a spotlight on outdated software vulnerabilities, and discuss how organizations can for…
…
continue reading

1
Software Exploits – The Fast-Paced Threat Landscape of 2025
12:20
12:20
Play later
Play later
Lists
Like
Liked
12:20Zero-day exploits are hitting faster than ever—are you ready? This week, we dive into the U.S. Treasury breach, which we now know involved multiple zero-days, including a newly discovered flaw in BeyondTrust’s security software. Attackers aren’t just targeting IT systems anymore—they’re coming for security tools themselves to gain privileged access…
…
continue reading

1
The OPM Security Debacle: Rogue Servers, Data Risks & What’s Next
13:29
13:29
Play later
Play later
Lists
Like
Liked
13:29In this episode of Cyberside Chats, Sherri and Matt dive into a shocking new cybersecurity controversy at the Office of Personnel Management (OPM). A rogue email server, installed outside normal security controls, has raised alarms about data security risks to millions of federal employees. We compare this developing situation to the infamous 2015 …
…
continue reading

1
DeepSeek or Deep Risk? The AI Power Play With China
13:55
13:55
Play later
Play later
Lists
Like
Liked
13:55DeepSeek or DeepRisk? A new AI powerhouse is making waves—DeepSeek has skyrocketed in popularity, rivaling top AI models at a fraction of the cost. But with data stored in China and unknown security safeguards, is your organization at risk? In this episode of Cyberside Chats, Sherri Davidoff and Matt Durrin break down the cybersecurity implications…
…
continue reading

1
The Silk Road, a Pardon, and the Future of Cybercrime
12:39
12:39
Play later
Play later
Lists
Like
Liked
12:39In this episode of Cyberside Chats, we dive into the surprising pardon of Ross Ulbricht, creator of the infamous Silk Road dark web marketplace. What does this decision mean for the future of cybercrime enforcement and your organization’s security? We’ll explore the potential policy shift, how it could embolden criminals, and actionable steps you c…
…
continue reading
In this episode of Cyberside Chats, we explore the FBI’s daring takedown of PlugX malware. By commandeering the malware’s command-and-control infrastructure, the FBI forced PlugX to uninstall itself from over 4,200 devices globally. This bold move echoes similar actions from 2021, such as the removal of malicious web shells from Exchange servers. W…
…
continue reading

1
Cyber Trust or Bust? The New FTC Cyber Trust Mark
12:20
12:20
Play later
Play later
Lists
Like
Liked
12:20In Episode 2 of CyberSide Chats, Sherri Davidoff and Matt Durrin dive into the launch of the U.S. Cyber Trust Mark, a new security initiative aimed at making Internet of Things (IoT) devices more secure for consumers. As the number of connected devices continues to rise, the U.S. Cyber Trust Mark promises to help users make informed decisions about…
…
continue reading

1
2025 Cybersecurity Priorities: The Top 3 Moves to Make
23:27
23:27
Play later
Play later
Lists
Like
Liked
23:27Join hosts Sherri Davidoff and Matt Durrin in this first engaging episode of CyberSide Chats, as they dive into the top cybersecurity priorities for 2025. This insightful discussion was recorded with a live Q & A, and it covers the pervasive influence of AI, the emerging threats of deepfakes, and the complexities of managing third-party risks in an…
…
continue reading