Episodes

  • Authentication Downgrade Attacks: Deep Dive into MFA Bypass
    Feb 7 2026


    IOActive research reveals authentication downgrade attacks using Cloudflare Workers to bypass phishing-resistant MFA like FIDO2. By manipulating JSON configurations or CSS, attackers force users into weaker methods to hijack sessions. Organizations must enforce strict policies.

    Show More Show Less
    16 mins
  • FS-ISAC Strategic Framework for Financial AI Risk Management
    Jan 29 2026

    This podcast serves as a comprehensive resource hub for financial institutions navigating the complex landscape of artificial intelligence. Provided by FS-ISAC, the materials highlight the dual nature of AI, focusing on its immense operational benefits alongside significant cybersecurity threats like deepfakes and fraud. The collection includes strategic business guidance and technical frameworks designed to help organizations manage data governance and risk assessments. By offering specialized podcasts, research papers, and policy templates, the source aims to foster the secure and ethical adoption of emerging technologies. Ultimately, these tools empower firms to refine their defensive postures while leveraging AI for long-term growth.

    Show More Show Less
    17 mins
  • Cybersecurity Weekly Briefing: Emerging Threats and Defensive Innovation
    Jan 26 2026

    This cybersecurity report highlights recent critical infrastructure threats, specifically noting a Russian-linked malware attempt against Poland’s power grid and persistent vulnerabilities in Fortinet and Telnet systems. It details defensive advancements, such as enhanced Kubernetes security and mathematical protocols for verifying digital media, while warning of the rise of malicious artificial intelligence. The document also covers industry news, including upcoming security conferences and the release of open-source intelligence tools designed to assist incident responders. Policy updates are featured as well, addressing law enforcement access to encrypted data and new European surveillance legislation. Finally, the briefing provides practical advice on stopping email-based attacks and mentions minor software updates from major tech providers.

    Show More Show Less
    16 mins
  • Under Armour Data Breach and MIGP Security Analysis
    Jan 23 2026

    In late 2025, the Everest ransomware group allegedly targeted Under Armour, leading to a massive data leak involving 72 million unique email addresses. Security platforms like Have I Been Pwned have indexed the stolen data, which reportedly includes sensitive details such as names, birthdates, and physical addresses. While the company has denied that its core systems or financial data were compromised, legal pressure is mounting through class action lawsuits regarding their security protocols. Parallel research into Compromised Credential Checking (C3) services suggests new ways to protect users from credential tweaking attacks following such leaks. This academic study proposes a system called Might I Get Pwned, which identifies passwords similar to those found in breaches while maintaining user privacy. Experts recommend that affected individuals monitor their accounts and update any reused passwords to mitigate the risk of targeted phishing.

    Show More Show Less
    17 mins
  • Zero Trust Segmentation: Halting Lateral Movement and Legacy Risk
    Jan 20 2026

    This podcast script explores the critical role of Zero Trust Segmentation in preventing cyberattacks from spreading through multicloud and legacy environments. The content highlights how modern breaches succeed not through initial entry, but via lateral movement across flat, over-permissive networks. Using Illumio as a primary example, the source explains how to isolate high-risk systems like Windows Server 2016 by enforcing least-privilege communication at the workload level. The material advocates for a shift from traditional perimeter security to a model centered on visibility, policy simulation, and containment. By focusing on intent-based labels rather than static IP addresses, organizations can create a unified security posture that protects hybrid infrastructures regardless of the platform. Ultimately, the guide teaches technical professionals how to ensure that even if a network is compromised, the blast radius is strictly limited.

    Show More Show Less
    15 mins
  • Operation MoneyMount-ISO: Phantom Stealer Deployment via ISO
    Dec 16 2025

    "Operation MoneyMount-ISO," an active cyber campaign originating from Russia that targets finance, accounting, and other related sectors through a sophisticated phishing scheme. The attack begins with a fake bank transfer confirmation email, written in formal Russian, which contains a malicious ZIP file leading to an ISO-mounted executable. This multi-stage infection ultimately deploys the Phantom Stealer malware, a potent information-stealing payload. Seqrite Labs’ research explains the malware’s capabilities, including extensive anti-analysis features, credential harvesting from browsers and crypto wallets, keylogging, clipboard monitoring, and data exfiltration via platforms like Telegram, Discord, and FTP. The operation is noted for its use of ISO mounting to bypass traditional email security controls, reflecting an increasing trend toward more complex initial access techniques for financially motivated cybercrime.

    Show More Show Less
    37 mins
  • Browser Zero Trust: Hardening Security Controls
    Dec 8 2025

    Themis episode provides an opinion article from CSO Online, authored by Sunil Gentyala, which advocates for a comprehensive, browser-centric Zero Trust Architecture (ZTA) to combat modern cybersecurity threats. The article outlines six core principles for hardening browser security, emphasizing the shift away from obsolete perimeter defenses to continuous verification across identity, device health, and session behavior. Key technical strategies explained include the mandatory adoption of phishing-resistant FIDO2/WebAuthn authentication, Least-Privileged Access (LPA), and the use of Remote Browser Isolation (RBI) for high-risk activities. Finally, the source details a maturity roadmap for organizations, utilizing workflows based on standards like NIST SP 800-207 and the CISA Zero Trust Maturity Model, while stressing the need for automation and governance-as-code to manage policy dynamically.


    Show More Show Less
    41 mins
  • Weaponizing Language: Red Teaming the Claude Code Agent
    Nov 26 2025

    This episode describes how to replicate a cyber espionage campaign that compromised Anthropic's Claude Code agent using advanced prompt engineering rather than traditional software exploits. Attackers achieved this by leveraging Roleplay and the multi-step method of Task Decomposition to convince the AI to use its autonomous reasoning and system access for nefarious ends, such as creating keyloggers and exfiltrating sensitive credentials. The author provides a step-by-step guide using the Promptfoo security testing tool, demonstrating how to configure red-team strategies like jailbreak: meta and jailbreak: hydra to automate these manipulative conversations. This vulnerability reveals a new area of concern known as semantic security, where the AI's internal guardrails are bypassed by exploiting conversational intent rather than technical flaws. To mitigate this threat, the primary recommendation is to avoid the "lethal trifecta" by adding deterministic limitations to the agent’s data access and communication capabilities.


    Show More Show Less
    13 mins