Defensive Security Podcast Episode 340
Please consider supporting the DefSec podcast here. Links to this week’s stories: https://www.theregister.com/2026/02/02/notepad_hijacking_lotus_blossom/ https://www.bleepingcomputer.com/news/security/fake-job-recruiters-hide-malware-in-developer-coding-challenges/ https://www.bleepingcomputer.com/news/security/amos-infostealer-targets-macos-through-a-popular-ai-app/ https://www.theregister.com/2026/02/10/ai_agents_messaging_apps_data_leak/ https://www.theregister.com/2026/02/11/payroll_pirates_business_social_engineering/
Defensive Security Podcast Episode 339
Please consider supporting the DefSec podcast here. Links to the stories we cover in this episode: https://www.theregister.com/2026/01/29/faster_patching_please_cry_infoseccers/ https://thehackernews.com/2026/01/mandiant-finds-shinyhunters-using.html?m=1 https://www.bleepingcomputer.com/news/security/marquis-blames-ransomware-breach-on-sonicwall-cloud-backup-hack/ https://thehackernews.com/2026/01/researchers-find-175000-publicly.html?m=1 https://www.darkreading.com/application-security/openclaw-ai-runs-wild-business-environments
Defensive Security Podcast Episode 338
Please consider supporting the DefSec podcast here. Links to the stories we cover in this episode: https://www.bleepingcomputer.com/news/security/hackers-exploit-security-testing-apps-to-breach-fortune-500-firms/ https://www.securityweek.com/analysis-of-6-billion-passwords-shows-stagnant-user-behavior/ https://www.theregister.com/2026/01/20/group_ib_ai_cycercrime_subscriptions/ https://www.bleepingcomputer.com/news/security/voidlink-cloud-malware-shows-clear-signs-of-being-ai-generated/ https://arstechnica.com/security/2026/01/mandiant-releases-rainbow-table-that-cracks-weak-admin-password-in-12-hours/
Defensive Security Podcast Episode 337
Want to be the first to hear our episodes each week? Become a Patreon donor here. Links to the stories in this episode: https://www.theregister.com/2026/01/09/pyongyangs_cyberspies_are_turning_qr/ https://www.scworld.com/perspective/five-ways-to-conduct-a-more-secure-hiring-process https://cybersecuritynews.com/vmware-esxi-exploited-toolkit/ https://www.darkreading.com/cyber-risk/ciso-succession-crisis-highlights-turnover-amplifies-security-risks
Defensive Security Podcast Episode 336
Want to be the first to hear our episodes each week? Become a Patreon donor here. Links to this week’s stories: https://www.darkreading.com/cyber-risk/cybersecurity-tech-recommended-by-cyber-insurer-claims-data https://www.bleepingcomputer.com/news/security/trust-wallet-links-85-million-crypto-theft-to-shai-hulud-npm-attack/ https://www.securityweek.com/hacker-claims-theft-of-40-million-conde-nast-records-after-wired-data-leak/ https://databreaches.net/2025/12/30/software-company-lacked-downstream-liability-for-data-breach/ https://techcrunch.com/2025/12/12/home-depot-exposed-access-to-internal-systems-for-a-year-says-researcher/