エピソード

  • The Mythos Dilemma: AI, Zero-Days, and Project Glasswing
    2026/04/08

    Anthropic's latest frontier model, Claude Mythos Preview, has demonstrated an unprecedented ability to autonomously discover and exploit zero-day vulnerabilities in critical software. Recognizing the extreme dual-use risks of these capabilities falling into the wrong hands, Anthropic has made the unprecedented decision to withhold the model from general public release. Instead, the model is being deployed through Project Glasswing, a collaborative initiative with major tech industry partners aimed at using this powerful AI exclusively to secure the world's digital infrastructure.

    https://cisomarketplace.com/blog/project-glasswing-claude-mythos-cybersecurity

    https://cisomarketplace.com/blog/claude-mythos-leak-cybersecurity-stocks-crash-2026

    https://www.anthropic.com/glasswing

    Sponsors:

    www.cisomarketplace.com

    続きを読む 一部表示
    26 分
  • Decoding CCPA: Navigating Cybersecurity Audits and Existing Frameworks
    2026/04/06

    Dive into the nuances of California's new CCPA cybersecurity audit requirements and discover how they redefine the standard for "reasonable security". We explore how businesses can strategically leverage existing NIST, ISO, or CIS assessments as a foundation, while identifying the critical scope mismatches they must "top off" to ensure compliance. Tune in for a practical, four-step roadmap to navigate CalPrivacy's 18 evaluation components and prepare your organization's data protection strategy for the next wave of regulatory scrutiny.

    Sponsors:

    www.compliancehub.wiki

    www.cisomarketplace.com

    続きを読む 一部表示
    17 分
  • Encrypted Extortion: Inside Latin America's Cybercrime Boom
    2026/04/05
    Dive into the rapidly evolving cyber threat landscape of Latin America and the Caribbean, where financially motivated threat actors are increasingly exploiting rapid digital adoption to target the region's largest economies. We explore how cybercriminals and hacktivist collectives like FiveFamilies are utilizing encrypted platforms like Telegram and WhatsApp to distribute banking trojans, deploy double-extortion ransomware against critical industries, and launch highly convincing AI-driven social engineering attacks. Join us as we unpack the tactics of these digital adversaries and discuss the urgent need for modernized infrastructure and public-private collaboration to secure the LAC region's digital future. Sponsors: www.myprivacy.blog www.breached.company
    続きを読む 一部表示
    不明
  • Growing Up Digital: Safeguarding Youth in the EU
    2026/04/04

    Explore the evolving landscape of youth digital protection across the European Union, where groundbreaking laws like the GDPR and the Digital Services Act (DSA) are being deployed to shield minors from data exploitation and harmful content. As emerging innovations like immersive virtual environments, neuromarketing, and AI-generated deepfakes introduce unprecedented risks to children's mental privacy and cognitive development, the battle for digital safety is becoming increasingly complex. Join us as we examine how local and regional authorities are stepping up to bridge the gap between high-level regulations and frontline realities, transforming overarching policies into tangible, community-based safeguards for families and schools.

    Sponsors:

    www.myprivacy.blog

    www.compliancehub.wiki

    続きを読む 一部表示
    24 分
  • Panic, Privacy, and Protecting Youth: Unpacking Child Online Safety Laws
    2026/04/04

    This podcast dives into the current wave of Child Online Safety Legislation (COSL), such as the Kids Online Safety Act (KOSA), to unpack the political and societal forces driving these bipartisan bills. We critically examine the prevailing narrative that social media is the primary cause of the youth mental health crisis, exploring how "moral panics" over technology often ignore complex social realities. Furthermore, we discuss the potential unintended consequences of these legislative efforts, including severe threats to data privacy, free expression, and the well-being of marginalized youth through mandated age verification and expanded parental surveillance.

    Sponsors:

    www.myprivacy.blog

    www.cisomarketplace.com

    続きを読む 一部表示
    23 分
  • The Illusion of Trust: Fake Compliance and the LiteLLM Hack
    2026/03/28

    This episode dives into the massive compliance fraud orchestrated by Delve, a Y Combinator-backed startup that generated hundreds of identical, fabricated SOC 2 reports using rubber-stamping certification mills. We explore how this "compliance theater" collided with a real-world supply chain attack when LiteLLM, a company boasting Delve-generated certifications, was breached through a compromised vulnerability scanner called Trivy. Ultimately, we unpack the devastating consequences of prioritizing automated compliance badges over actual security controls, and what this structural failure means for enterprise vendor risk management in 2026.

    • https://compliancehub.wiki/litellm-delve-soc2-trust-chain-compliance-failure-2026
    • https://breached.company/litellm-supply-chain-attack-teampcp-trivy-pypi-2026
    • https://compliancehub.wiki/delve-compliance-startup-fake-soc2-audit-scandal
    • https://cisomarketplace.com/blog/auditor-vs-assessor-compliance-trust-2026

    Sponsors

    www.compliancehub.wiki

    www.cisomarketplace.com

    www.breached.company

    続きを読む 一部表示
    48 分
  • Il CISO del 2026: Architetti della Fiducia Digitale
    2026/03/27

    Il ruolo del Chief Information Security Officer si è radicalmente trasformato da una funzione puramente informatica a una posizione strategica a livello esecutivo, focalizzata sul rischio digitale dell'intera azienda. Spinti dalla rapida adozione dell'intelligenza artificiale agentica, dall'espansione delle identità non umane e dalle nuove e severe normative globali come la Direttiva NIS2 dell'UE, i CISO sono ora essenziali per garantire la resilienza operativa e proteggere la continuità aziendale. Questo podcast esplora come i moderni leader della sicurezza stiano colmando il divario tra la tecnologia e il consiglio di amministrazione per combattere le minacce alla velocità delle macchine e navigare in un panorama normativo sempre più complesso.

    English: https://www.podbean.com/ew/pb-r9v3x-1a73307

    Sponsors:

    www.cisomarketplace.com

    www.breached.company

    続きを読む 一部表示
    23 分
  • Weaponizing Trust: The TeamPCP Campaign and the Age of Cascading Failure
    2026/03/26

    The cyber threat landscape is experiencing a massive paradigm shift, as adversaries move away from isolated network breaches to industrialize the compromise of global digital supply chains. This episode breaks down the unprecedented March 2026 TeamPCP campaign, exploring how attackers weaponized the trusted Trivy vulnerability scanner, compromised the widely used LiteLLM AI package, and unleashed the self-propagating Shai-Hulud worm across the npm ecosystem. We also examine how the growing use of artificial intelligence by threat actors, the exploitation of unmonitored edge devices, and the rise of destructive wiper attacks against critical infrastructure are forcing organizations to adopt zero-trust models and continuous resilience strategies.

    https://breached.company/litellm-supply-chain-attack-teampcp-trivy-pypi-2026

    https://compliancehub.wiki/delve-compliance-startup-fake-soc2-audit-scandal

    Sponsors:

    www.cisomarketplace.com

    www.breached.company

    続きを読む 一部表示
    41 分