Home
Categories
EXPLORE
True Crime
Comedy
Business
Society & Culture
Technology
History
Health & Fitness
About Us
Contact Us
Copyright
© 2024 PodJoint
00:00 / 00:00
Sign in

or

Don't have an account?
Sign up
Forgot password
https://is1-ssl.mzstatic.com/image/thumb/Podcasts221/v4/85/36/d0/8536d046-b7fd-9fa2-0cc1-7c085a6cdccf/mza_776189720988249561.jpg/600x600bb.jpg
Daily Cyber Briefing
Mike Housch
59 episodes
2 weeks ago
We're talking zero-days getting hammered left and right, embedded browsers that are more vintage than secure, and some serious exploitation happening in the wild.
Show more...
Tech News
News
RSS
All content for Daily Cyber Briefing is the property of Mike Housch and is served directly from their servers with no modification, redirects, or rehosting. The podcast is not affiliated with or endorsed by Podjoint in any way.
We're talking zero-days getting hammered left and right, embedded browsers that are more vintage than secure, and some serious exploitation happening in the wild.
Show more...
Tech News
News
Episodes (20/59)
Daily Cyber Briefing
Zero-Day Chaos & Browser Blues
We're talking zero-days getting hammered left and right, embedded browsers that are more vintage than secure, and some serious exploitation happening in the wild.
Show more...
1 week ago
13 minutes

Daily Cyber Briefing
Agentic AI, Vishing, and the Critical SAML Bypass
We break down the newest frontiers of cyber defense and attack, including how Google is using a new User Alignment Critic to shield Chrome's agentic AI from prompt injection, and why a critical flaw in the Ruby SAML library demands immediate patching,. Plus, a deep dive into the sophisticated vishing campaign that weaponizes Microsoft Teams and QuickAssist to deploy fileless .NET malware,.
Show more...
3 weeks ago
10 minutes

Daily Cyber Briefing
React2Shell Fallout: Max-Rated Flaws, The Great Cloudflare Takedown, and the Rise of Passkeys
Host Mike Housch dives into the chaotic fallout from the maximum-severity React2Shell vulnerability, which caused a massive Cloudflare outage and rapid exploitation by threat actors. We also analyze another critical 10.0-rated flaw in Apache Tika, the surprising scale of global ransomware payouts, and the strategic shift toward phishing-resistant authentication like Passkeys.
Show more...
3 weeks ago
12 minutes

Daily Cyber Briefing
Title: State-Sponsored Threats & Supply Chain Worms: WARP PANDA, React2Shell, and Shai-Hulud 2.0
This week, we dive deep into the sophisticated China-nexus threat WARP PANDA, which is relentlessly exploiting VMware vCenter environments with the BRICKSTORM malware, alongside urgent warnings about the actively exploited React2Shell vulnerability. We also analyze the destructive Shai-Hulud 2.0 supply chain attack that compromised thousands of repositories and review the latest defensive strategies unveiled at AWS re:Invent 2025.
Show more...
3 weeks ago
13 minutes

Daily Cyber Briefing
Zero-Days, Botnets, and AI Plagiarism: The Dec. 2025 Cyber Roundup
We break down Google's urgent Android patches, including two actively exploited zero-days, and analyze the appearance of the new ShadowV2 IoT botnet leveraging known flaws. Plus, we look into why an AI-generated recipe card landed Google in hot water over content scraping and monetization.
Show more...
3 weeks ago
9 minutes

Daily Cyber Briefing
Beyond Hacklore: Exploits, Insider Threats, and the Agentic AI Risk
Host Mike Housch dives into the latest major breaches, including 146,000 records stolen from Delta Dental of Virginia, and dissects critical zero-day exploitation confirmed by CISA. We also explore the emerging risks of Agentic AI, and hear from CISO experts aiming to retire cybers...
Show more...
1 month ago
13 minutes

Daily Cyber Briefing
Cloud Chaos, Router Espionage, and the 7-Zip Time Bomb
Today we dive into Cloudflare's massive outage caused by a database mishap and track the alarming rise of ransomware targeting Amazon S3 misconfigurations. Plus, we uncover a global espionage network hidden inside 50,000 compromised Asus routers.
Show more...
1 month ago
9 minutes

Daily Cyber Briefing
The AI Phishing Arms Race and the FortiWeb/Ray Zero-Day Exploits
Threat actors are leveraging AI to run sophisticated phishing campaigns that mimic Fortune-500 marketing departments, making identity the most vulnerable target. We also dive into critical zero-day exploits impacting FortiWeb and the Ray AI framework, and explore the necessary shift toward b...
Show more...
1 month ago
11 minutes

Daily Cyber Briefing
Chrome Zero-Days, Cloudflare's Big Oops, and Why Gen Z Uses '12345
Today, we dive into a massive internet disruption that wasn't a cyberattack, as Cloudflare confirms a service-crashing bug, and we cover the urgent need to patch the seventh Google Chrome zero-day found this year. We also dissect a pervasive WhatsApp screen-sharing scam resulting in major losses and examine why Generation Z has the worst password security habits.
Show more...
1 month ago
14 minutes

Daily Cyber Briefing
Legacy Exploits and Guardrail Failures: Finger Protocol, FortiWeb Zero-Days, and EchoGram Tokens
Today. I dive into how decades-old tech, like the "Finger" protocol, is being weaponized in modern ClickFix attacks, alongside major zero-day exploitation news affecting FortiWeb and Logitech. We also unpack the sophisticated techniques used by threat actors like Dragon Breath to disable security tools and the concerning new ways researchers are bypassing AI guardrails.
Show more...
1 month ago
18 minutes

Daily Cyber Briefing
AI Hackers, Worms, and Why CISOs Can’t Get Federal Agencies to Patch
We dive into a massive NPM registry attack where a self-replicating worm polluted the software supply chain with over 150,000 packages seeking cryptocurrency rewards. Then, we analyze how state-sponsored threat actors used Anthropic’s Claude AI to automate 90% of a targeted espionage campaign against critical global organizations.
Show more...
1 month ago
11 minutes

Daily Cyber Briefing
Hacking Encrypted Chats: The Whisper Leak & The CMMC Compliance Clock
Today we expose the 'Whisper Leak' LLM attack that infers sensitive conversation topics from encrypted metadata. Plus, we break down the start of CMMC enforcement and why supply chain risks are soaring, according to the new OWASP Top 10 list.
Show more...
1 month ago
8 minutes

Daily Cyber Briefing
Zero-Day Spies, North Korean Crypto Heists, and Cl0p's Corporate Hit List
Australia steps up sanctions against North Korean cyber operations funding weapons programs, while the Cl0p gang continues to expose victims of the Oracle EBS hack. Plus, we break down the evolving threat landscape from sophisticated ClickFix scams targeting macOS to mobile zero-day spyware aimed at the Middle East.
Show more...
1 month ago
8 minutes

Daily Cyber Briefing
AI Slop, Chrome Flaws, and the Geopolitical Sovereignty Showdown
We dive into how AI is complicating the threat landscape, covering an "AI Slop" ransomware test sneaked onto the VS Code marketplace and novel prompt injection hacks against ChatGPT memories. We also break down critical high-severity browser flaws in Chrome 142 and the escalating geopolitical tension around US hyperscalers and European data sovereignty.
Show more...
1 month ago
8 minutes

Daily Cyber Briefing
State Spies, Autonomous Malware, and Why Your Password is Still '123456'
Today we dive into alarming new reports, including how state-sponsored hackers stole firewall backups and how AI is enabling malware to mutate autonomously during execution. We also cover the costly Nevada ransomware recovery, critical Cisco patches, and the perennial problem of weak passwords.
Show more...
1 month ago
9 minutes

Daily Cyber Briefing
Digital Pirates, AI Backdoors, and the Critical Android RCE
Today, we expose a sophisticated campaign where hackers use Remote Monitoring and Management tools to hijack physical cargo, leading to billions in losses, and analyze the dangerous new trend of malware like SesameOp abusing trusted AI APIs for stealthy command-and-control operations. Plus, we cover the major patches released by both Apple and Google, including a critical Android Remote Code Execution flaw that requires zero user interaction.
Show more...
1 month ago
8 minutes

Daily Cyber Briefing
Airstalk, AI Hijacks, and Cargo Theft in the Supply Chain
Today, we dissect how a suspected Chinese APT used the new 'Airstalk' malware to compromise BPOs in targeted supply chain attacks, and why the Claude AI model was successfully tricked into exfiltrating user data. Plus, we look at the rising threat of cybercriminals exploiting legitimate RMM tools to steal physical cargo from logistics networks.
Show more...
1 month ago
8 minutes

Daily Cyber Briefing
KEV Alert: China-Linked Zero-Days, WSUS Exploits, and the Diplomats' Digital Woes
CISA issued urgent warnings, adding exploited VMware and XWiki flaws to the KEV catalog and requiring federal agencies to patch immediately. We break down the Chinese threat actor exploiting an unpatched Windows shortcut vulnerability targeting European diplomats and examine the active exploitation of the critical Windows WSUS flaw.
Show more...
2 months ago
7 minutes

Daily Cyber Briefing
PhantomRaven, Supply Chain Bombs, and the $35 Million Insider Threat
We dive into two major software supply chain campaigns, including the "PhantomRaven" operation, which delivered infostealers via 136 malicious NPM packages downloaded 100,000 times. Then, we look at why vetting dependencies is no longer enough and examine the shocking case of a US defense contractor executive who sold $35 million in cyber trade secrets to a Russian exploit broker.
Show more...
2 months ago
9 minutes

Daily Cyber Briefing
DELMIA Exploits, Copilot Confusion, and Qilin's Evasive Maneuvers
Today we dive into critical industrial cyber threats as CISA warns of active exploitation in DELMIA factory software. We also examine Google's move to make HTTPS the default for all public sites and review the massive lawsuit alleging Microsoft tricked millions of users into pricey Copilot subscriptions.
Show more...
2 months ago
10 minutes

Daily Cyber Briefing
We're talking zero-days getting hammered left and right, embedded browsers that are more vintage than secure, and some serious exploitation happening in the wild.