PodGrabber.com
PodGrabber Logo/Mascot - Blue Gorilla with Red Headphones

Security Now - Archive

Generated 2026-04-28 02:00:59

← Back to PodGrabber Archives

Click title to play/pause!

SN 1075: Yes. Exactly. - The Zero-Day Ticking Clock

Podcast image

Published: Unknown Date

SN 1075: Yes. Exactly. - The Zero-Day Ticking Clock Episode Details

Security leaders warn the era of AI-driven bug hunting has arrived, with Mythos uncovering hundreds of overlooked vulnerabilities in code bases as trusted as Firefox. Are defenders ready for the avalanche of exploits and the frantic race to patch? A disgruntled developer discloses multiple Windows 0-days. Microsoft purchases its own bugs in massive campaign. VeraCrypt & Wireshark suddenly lost their dev accounts. A serious problem with re-captured domain names. How might AI help to secure open source repositories. A listener wonders what we thought of Project Hail Mary. Cyber security

SN 1074: What Mythos Means - Marketing or Mayhem

Podcast image

Published: Unknown Date

SN 1074: What Mythos Means - Marketing or Mayhem Episode Details

We may already be living through the most consequential hundred days in cyber history, and the arrival of AI that can autonomously chain zero-day vulnerabilities into working exploits means the software industry's long-standing "ship it and patch it later" era is officially over. Show Notes - https://www.grc.com/sn/SN-1074-Notes.pdf Hosts: Steve Gibson and Leo Laporte Download or subscribe to Security Now at https://twit.tv/shows/security-now. You can submit a question to Security Now at the GRC Feedback Page. For 16kbps versions, transcripts, and notes (including fixes), visit Steve's site: grc.com, also the home of

SN 1073: The FCC Bans New Consumer Routers - LinkedIn's JavaScript Bombshell

Podcast image

Published: Unknown Date

SN 1073: The FCC Bans New Consumer Routers - LinkedIn's JavaScript Bombshell Episode Details

The FCC has banned all new consumer routers made outside the US, leaving networks stuck with aging, insecure hardware while blocking innovation. Find out why this sweeping move is raising eyebrows and lawsuits—and why it makes zero sense for cybersecurity. Apple's 26.4 age queries catches many by surprise. LinkedIn's 2.7 MB of privacy-invading javascript. Microsoft starts forcing Win11 24H2 to 25H2. Cisco loses source code to the Trivy supply-chain mess. Proton introduces privacy-first voice and video "Meet." GitHub to fix lagging security of its Actions feature. Cloudflare reaffirms the privacy

SN 1072: LiteLLM - Click Fix Attacks Surge

Podcast image

Published: Unknown Date

SN 1072: LiteLLM - Click Fix Attacks Surge Episode Details

An explosive supply chain hack in Light LLM nearly unleashed catastrophic malware across millions of AI systems, and it took a coder's quick thinking to catch it before it snowballed into disaster. Will California require Linux to verify its user's age. Apple's iOS 26.4 requires UK users to prove their age. Russia chooses to use home grown 5G mobile encryption. Ukraine knew the webcam was installed by Russian spies. Google moves quantum computing "Q Day" to 2029. At RSA, UK's NCSC CEO warns of vibe-coded SaaS replacements. More information about

SN 1071: Bucketsquatting - Meta and TikTok's Tracking Pixels

Podcast image

Published: Unknown Date

SN 1071: Bucketsquatting - Meta and TikTok's Tracking Pixels Episode Details

When convenience trumps caution, disaster waits in the wings. Join Steve Gibson and Mikah Sargent as they break down the jaw-dropping oversights lurking in mission-critical tax and cloud tools, and examine how a single unchecked decision can upend internet security for years. H&R Block's tax software does something SO WRONG. The Intoxalock breathalyzer calibration cyber attack. Firefox now offers a 100% free built-in VPN. TikTok and Meta's tracking pixels are so much more. Russians beg for the return of Telegram, WhatsApps and others. Never connect your crypto-wallet to an unknown

SN 1070: CISA's Free Internet Scanning - Malware Disguised as a VPN

Podcast image

Published: Unknown Date

SN 1070: CISA's Free Internet Scanning - Malware Disguised as a VPN Episode Details

Meta quietly ditches encryption for Instagram chats while TikTok also backpedals on privacy, shaking up assumptions about how much big tech really values your secrets. Meanwhile, Steve Gibson reveals why CISA's free government security scans are an absolute must for businesses—plus what he learned when GRC took the plunge. The Security Now "Caption That Photo" contest. A mega social media company says "no" to strong encryption. WhatsApp to give parents more control, Consumer bandwidth proxying is becoming a big deal. Meta buys the Moltbook duo. The EU gives up and

SN 1069: You can't hide from LLMs - Was Your Smart TV a Stealth Proxy?

Podcast image

Published: Unknown Date

SN 1069: You can't hide from LLMs - Was Your Smart TV a Stealth Proxy? Episode Details

Think your online alias keeps you safe? This episode reveals how advanced language models are making it trivial to de-anonymize users at scale, challenging everything we thought we knew about internet privacy. Anthropic & Mozilla improve Firefox's security. Apple & Google begin testing cross-platform RCS encryption. Ubuntu's SUDO starts echoing asterisks. Inviting a web proxy into your home. Apple devices cleared by Germany for NATO's use. A serious remote takeover of OpenClaw. TokTok won't encrypt messaging for visibility. Microsoft bans the term "Microslop" on Discord. Lot's of great listener feedback.

SN 1068: The Call Is Coming From Inside the House - Live From Zero Trust World 2026

Podcast image

Published: Unknown Date

SN 1068: The Call Is Coming From Inside the House - Live From Zero Trust World 2026 Episode Details

Steve Gibson and Leo Laporte host a special episode of Security Now live from ThreatLocker's Zero Trust World 2026 in Orlando, Florida. The final frontier of security is internal. Today, we have the tools, techniques and technologies to thwart attacks originating from outside our perimeter. We're now good at protecting our borders. But major high profile breaches occurring over the past several years have revealed that insufficient attention has been given to the security of our internal systems and networks. Today's greatest security weaknesses result from decades of system design,

SN 1067: KongTuke's CrashFix - Click, Paste, Pwned

Podcast image

Published: Unknown Date

SN 1067: KongTuke's CrashFix - Click, Paste, Pwned Episode Details

A crafty new breed of social engineering attack is tricking users into launching malware straight from their clipboard, exposing a fresh vulnerability in Windows that even tech pros could fall for. Leo Laporte and Steve Gibson break down how the latest ClickFix and CrashFix exploits are outsmarting traditional defenses. The lowdown on last week's "no turn" picture of the week. Is an AI-driven hacking campaign a big deal now. Clause used in multiple Mexican government attacks. Apple continues to be confronted with age restrictions. COPPA needs an exception to allow

SN 1066: Password Leakage - Zero Trust, Zero Knowledge

Podcast image

Published: Unknown Date

SN 1066: Password Leakage - Zero Trust, Zero Knowledge Episode Details

ETH Zurich's deep-dive into the world's top password managers exposes how feature overload and legacy design obscure real security flaws, forcing a rethink of what "zero knowledge" actually means for your vault. Learn why recent fixes matter—and why open source may be your safest bet. CA's warn us to urgently prepare for the inevitable. Three U.S. states attempt to ban 3D printed firearms. Denied ransom, ShinyHunters leaks 967,000 personal details. "Billions" of U.S. social security numbers leaked. Is Apple planning to add cameras to three new gadgets. No more security