SN 1075: Yes. Exactly. - The Zero-Day Ticking Clock

Published: Unknown Date
SN 1075: Yes. Exactly. - The Zero-Day Ticking Clock Episode Details
Security leaders warn the era of AI-driven bug hunting has arrived, with Mythos uncovering hundreds of overlooked vulnerabilities in code bases as trusted as Firefox. Are defenders ready for the avalanche of exploits and the frantic race to patch? A disgruntled developer discloses multiple Windows 0-days. Microsoft purchases its own bugs in massive campaign. VeraCrypt & Wireshark suddenly lost their dev accounts. A serious problem with re-captured domain names. How might AI help to secure open source repositories. A listener wonders what we thought of Project Hail Mary. Cyber security
SN 1074: What Mythos Means - Marketing or Mayhem

Published: Unknown Date
SN 1074: What Mythos Means - Marketing or Mayhem Episode Details
We may already be living through the most consequential hundred days in cyber history, and the arrival of AI that can autonomously chain zero-day vulnerabilities into working exploits means the software industry's long-standing "ship it and patch it later" era is officially over. Show Notes - https://www.grc.com/sn/SN-1074-Notes.pdf Hosts: Steve Gibson and Leo Laporte Download or subscribe to Security Now at https://twit.tv/shows/security-now. You can submit a question to Security Now at the GRC Feedback Page. For 16kbps versions, transcripts, and notes (including fixes), visit Steve's site: grc.com, also the home of
SN 1073: The FCC Bans New Consumer Routers - LinkedIn's JavaScript Bombshell

Published: Unknown Date
SN 1073: The FCC Bans New Consumer Routers - LinkedIn's JavaScript Bombshell Episode Details
The FCC has banned all new consumer routers made outside the US, leaving networks stuck with aging, insecure hardware while blocking innovation. Find out why this sweeping move is raising eyebrows and lawsuitsâand why it makes zero sense for cybersecurity. Apple's 26.4 age queries catches many by surprise. LinkedIn's 2.7 MB of privacy-invading javascript. Microsoft starts forcing Win11 24H2 to 25H2. Cisco loses source code to the Trivy supply-chain mess. Proton introduces privacy-first voice and video "Meet." GitHub to fix lagging security of its Actions feature. Cloudflare reaffirms the privacy
SN 1072: LiteLLM - Click Fix Attacks Surge

Published: Unknown Date
SN 1072: LiteLLM - Click Fix Attacks Surge Episode Details
An explosive supply chain hack in Light LLM nearly unleashed catastrophic malware across millions of AI systems, and it took a coder's quick thinking to catch it before it snowballed into disaster. Will California require Linux to verify its user's age. Apple's iOS 26.4 requires UK users to prove their age. Russia chooses to use home grown 5G mobile encryption. Ukraine knew the webcam was installed by Russian spies. Google moves quantum computing "Q Day" to 2029. At RSA, UK's NCSC CEO warns of vibe-coded SaaS replacements. More information about
SN 1071: Bucketsquatting - Meta and TikTok's Tracking Pixels

Published: Unknown Date
SN 1071: Bucketsquatting - Meta and TikTok's Tracking Pixels Episode Details
When convenience trumps caution, disaster waits in the wings. Join Steve Gibson and Mikah Sargent as they break down the jaw-dropping oversights lurking in mission-critical tax and cloud tools, and examine how a single unchecked decision can upend internet security for years. H&R Block's tax software does something SO WRONG. The Intoxalock breathalyzer calibration cyber attack. Firefox now offers a 100% free built-in VPN. TikTok and Meta's tracking pixels are so much more. Russians beg for the return of Telegram, WhatsApps and others. Never connect your crypto-wallet to an unknown
SN 1070: CISA's Free Internet Scanning - Malware Disguised as a VPN

Published: Unknown Date
SN 1070: CISA's Free Internet Scanning - Malware Disguised as a VPN Episode Details
Meta quietly ditches encryption for Instagram chats while TikTok also backpedals on privacy, shaking up assumptions about how much big tech really values your secrets. Meanwhile, Steve Gibson reveals why CISA's free government security scans are an absolute must for businessesâplus what he learned when GRC took the plunge. The Security Now "Caption That Photo" contest. A mega social media company says "no" to strong encryption. WhatsApp to give parents more control, Consumer bandwidth proxying is becoming a big deal. Meta buys the Moltbook duo. The EU gives up and
SN 1069: You can't hide from LLMs - Was Your Smart TV a Stealth Proxy?

Published: Unknown Date
SN 1069: You can't hide from LLMs - Was Your Smart TV a Stealth Proxy? Episode Details
Think your online alias keeps you safe? This episode reveals how advanced language models are making it trivial to de-anonymize users at scale, challenging everything we thought we knew about internet privacy. Anthropic & Mozilla improve Firefox's security. Apple & Google begin testing cross-platform RCS encryption. Ubuntu's SUDO starts echoing asterisks. Inviting a web proxy into your home. Apple devices cleared by Germany for NATO's use. A serious remote takeover of OpenClaw. TokTok won't encrypt messaging for visibility. Microsoft bans the term "Microslop" on Discord. Lot's of great listener feedback.
SN 1068: The Call Is Coming From Inside the House - Live From Zero Trust World 2026

Published: Unknown Date
SN 1068: The Call Is Coming From Inside the House - Live From Zero Trust World 2026 Episode Details
Steve Gibson and Leo Laporte host a special episode of Security Now live from ThreatLocker's Zero Trust World 2026 in Orlando, Florida. The final frontier of security is internal. Today, we have the tools, techniques and technologies to thwart attacks originating from outside our perimeter. We're now good at protecting our borders. But major high profile breaches occurring over the past several years have revealed that insufficient attention has been given to the security of our internal systems and networks. Today's greatest security weaknesses result from decades of system design,
SN 1067: KongTuke's CrashFix - Click, Paste, Pwned

Published: Unknown Date
SN 1067: KongTuke's CrashFix - Click, Paste, Pwned Episode Details
A crafty new breed of social engineering attack is tricking users into launching malware straight from their clipboard, exposing a fresh vulnerability in Windows that even tech pros could fall for. Leo Laporte and Steve Gibson break down how the latest ClickFix and CrashFix exploits are outsmarting traditional defenses. The lowdown on last week's "no turn" picture of the week. Is an AI-driven hacking campaign a big deal now. Clause used in multiple Mexican government attacks. Apple continues to be confronted with age restrictions. COPPA needs an exception to allow
SN 1066: Password Leakage - Zero Trust, Zero Knowledge

Published: Unknown Date
SN 1066: Password Leakage - Zero Trust, Zero Knowledge Episode Details
ETH Zurich's deep-dive into the world's top password managers exposes how feature overload and legacy design obscure real security flaws, forcing a rethink of what "zero knowledge" actually means for your vault. Learn why recent fixes matterâand why open source may be your safest bet. CA's warn us to urgently prepare for the inevitable. Three U.S. states attempt to ban 3D printed firearms. Denied ransom, ShinyHunters leaks 967,000 personal details. "Billions" of U.S. social security numbers leaked. Is Apple planning to add cameras to three new gadgets. No more security
