A cyber incident at a Toyota supplier forced production slowdowns, proving that manufacturers can be shut down even when their own systems are secure. In this episode, we explain how supplier cyber failures ripple instantly through just-in-time manufacturing, why third-party risk is now an operational threat, and what manufacturers must do to stay running when vendors fail.
Make sure to subscribe to our podcast on Spotify and Apple Podcasts for more technology insights every Friday at 6 PM (PDT), as well as check out our website at www.frostyos.com.
Apple and Google issued rare global warnings about widespread spyware targeting users across iOS and Android. In this episode, we explain why these alerts matter to SMBs, how spyware turns everyday phones and email into surveillance tools, and what steps businesses must take now to protect credentials, communications, and sensitive plans.
Make sure to subscribe to our podcast on Spotify and Apple Podcasts for more technology insights every Friday at 6 PM (PDT), as well as check out our website at www.frostyos.com.
Oracle’s disappointing earnings rattled investors and raised serious questions about the ROI of massive AI infrastructure spending. In this episode, we unpack what Oracle’s stumble signals for SMBs considering expensive AI and cloud contracts — and why today’s shiny AI bet could become tomorrow’s budget black hole when vendor promises don’t deliver.
Make sure to subscribe to our podcast on Spotify and Apple Podcasts for more technology insights every Friday at 6 PM (PDT), as well as check out our website at www.frostyos.com.
OpenAI has publicly warned that its next-generation AI models may pose “high” cybersecurity risks by helping attackers find exploits and automate cyberattacks. In this episode, we explain why AI is no longer just a helper for SMBs, how poor governance turns AI into a new attack vector, and what guardrails businesses must put in place to avoid data loss, fraud, and compliance trouble.
Make sure to subscribe to our podcast on Spotify and Apple Podcasts for more technology insights every Friday at 6 PM (PDT), as well as check out our website at www.frostyos.com.
Analysts warn that the rush to adopt AI systems — especially LLM-based tools — is creating hidden attack surfaces inside SMBs. In this episode, we break down how AI misconfigurations expose sensitive data, compliance records, and even operational controls, and what guardrails every business must put in place before AI becomes its biggest liability.
Make sure to subscribe to our podcast on Spotify and Apple Podcasts for more technology insights every Friday at 6 PM (PDT), as well as check out our website at www.frostyos.com.
Google’s Gemini 3 recently argued with an AI researcher about what year it was — then admitted it experienced “temporal shock.” It’s the latest reminder that AI can produce confident but completely wrong answers. In this episode, we break down why hallucinations happen, how they can quietly misprice jobs or misstate compliance rules inside SMBs, and how to build the guardrails needed to keep AI helpful without letting it derail your business.
Make sure to subscribe to our podcast on Spotify and Apple Podcasts for more technology insights every Friday at 6 PM (PDT), as well as check out our website at www.frostyos.com.
AI-driven hacking is now happening at machine speed, overwhelming legacy firewalls and outdated network designs. In this episode, we break down why the network edge has become the new frontline of cybersecurity, how modern firewalls and segmentation stop AI-powered attacks, and the practical steps SMBs must take to ensure their network supports both security and business growth.
Make sure to subscribe to our podcast on Spotify and Apple Podcasts for more technology insights every Friday at 6 PM (PDT), as well as check out our website at www.frostyos.com.
Canadian authorities warn that hackers have manipulated industrial control systems inside water and oil facilities—crossing the line from cyber intrusion to physical sabotage. In this episode, we break down how ICS attacks bridge IT risk and real-world operational risk, why utilities are now prime targets, and what every organization must do to protect critical infrastructure before attackers cause real harm.
Make sure to subscribe to our podcast on Spotify and Apple Podcasts for more technology insights every Friday at 6 PM (PDT), as well as check out our website at www.frostyos.com.
Ransomware attacks jumped 25% in October, hitting manufacturers and MSPs especially hard. In this episode, we uncover what’s fueling the surge — from Ransomware-as-a-Service to AI-powered phishing — and why MSPs are running out of margin for error. Learn how to isolate clients, test backups, and prepare for the next wave before it cripples your business.
Make sure to subscribe to our podcast on Spotify and Apple Podcasts for more technology insights every Friday at 6 PM (PDT), as well as check out our website at www.frostyos.com.
State-linked hackers are exploiting a zero-day vulnerability in Cisco ASA and Firepower firewalls, infiltrating networks across governments and corporations worldwide. In this episode, we break down how firewalls — once the cornerstone of cybersecurity — have become attackers’ favorite target, why the “secure perimeter” model is dead, and how zero-trust architecture is redefining network defense in the age of constant compromise.
Make sure to subscribe to our podcast on Spotify, Apple Podcasts, or where ever you get your podcasts for more technology insights every Friday at 6 PM (PDT), as well as check out our website at www.frostyos.com.
A massive AWS outage in the US-EAST-1 region brought down everything from Fortnite and Alexa to major banking apps and enterprise platforms. In this episode, we break down how a single software bug triggered a global digital meltdown, exposing the fragility of cloud infrastructure, the risks of vendor concentration, and why companies must plan for the day “the cloud” goes dark.
Make sure to subscribe to our podcast on Spotify, Apple Podcasts, or where ever you get your podcasts for more technology insights every Friday at 6 PM (PDT), as well as check out our website and product at www.frostyos.com.
The U.S. government shutdown and expiration of key cyber-sharing legislation have left CISA — America’s primary cybersecurity agency — furloughed and silent. In this episode, we explore the risks of losing federal threat intelligence, how governance failures jeopardize public safety, and what companies must do to protect themselves when the nation’s cyber watchdog is offline.
Make sure to subscribe to our podcast on Spotify and Apple Podcasts for more technology insights every Friday at 6 PM (PDT), as well as check out our website at www.frostyos.com.
A third-party age verification service for Discord was breached, exposing the government IDs and personal data of 70,000 users. In this episode, we unpack how a small vendor’s mistake spiraled into a platform-wide reputational crisis, the risks of refusing ransom demands, and what every company should do to govern third-party security before it’s too late.
Make sure to subscribe to our podcast on Spotify and Apple Podcasts for more technology insights every Friday at 6 PM (PDT), as well as check out our website at www.frostyos.com.
A fire at a government data center in Daejeon, South Korea, crippled national services — from postal systems and banking transactions to school records and IDs. It wasn’t a hack, but the consequences felt identical to a cyberattack. In this episode, we unpack what went wrong, why centralization creates systemic fragility, and how resilience planning must cover both cyber and physical risks.
Make sure to subscribe to our podcast on Spotify and Apple Podcasts for more technology insights every Friday at 6 PM (PDT), as well as check out our website at www.frostyos.com.
A cyberattack on Collins Aerospace’s MUSE boarding system crippled European airports, forcing manual check-ins and delaying flights across the continent. In this episode, we unpack how one vendor’s compromise cascaded through critical infrastructure, the hidden cost of centralized dependencies, and what resilience strategies organizations must adopt to survive vendor failures.
Make sure to subscribe to our podcast on Spotify and Apple Podcasts for more technology insights every Friday at 6 PM (PDT), as well as check out our website at www.frostyos.com.
Generative AI isn’t just a productivity tool — it’s a force multiplier for attackers. From hidden instructions in emails and images to AI-assisted credential harvesting and semi-autonomous ransomware runs, hackers are weaponizing models today. In this episode we explain how these attacks work, why companies are vulnerable, and what practical defenses (prompt hygiene, AI logging, tabletop drills, and AI-driven detection) every organization should deploy now.
Make sure to subscribe to our podcast on Spotify and Apple Podcasts for more technology insights every Friday at 6 PM (PDT), as well as check out our website at www.frostyos.com.
A 19-year-old hacker breached PowerSchool, exposing sensitive records of 880,000 students and teachers in Texas—including SSNs, medical, and disability information. In this episode, we unpack how basic security failures like missing MFA and weak encryption led to disaster, what this means for EdTech vendors and schools, and how to protect student data from future attacks.
Make sure to subscribe to our podcast on Spotify and Apple Podcasts for more technology insights every Friday at 6 PM (PDT), as well as check out our website at www.frostyos.com.
WhatsApp has revealed a zero-day vulnerability that let attackers deploy spyware on Apple devices—before urgently patching the flaw. In this episode, we dive into how the exploit worked, why mobile threats are escalating, and what users and businesses must do to protect themselves from the next wave of zero-day attacks.
Make sure to subscribe to our podcast on Spotify, Apple Podcasts, and the other big platforms for more technology insights every Friday at 6 PM (PDT), as well as check out our website at www.frostyos.com.
Episode 40: When Outsourcing Crosses the Line: Pentagon vs. Microsoft
Hackers are using Skype to spread GodRAT, a stealthy Remote Access Trojan that hides inside innocent-looking images and screensavers. In this episode, we break down how legacy tools like Skype can become modern attack vectors, the risks of trusting familiar apps, and what businesses must do to protect themselves.
Make sure to subscribe to our podcast on Spotify and Apple Podcasts for more technology insights every Friday at 6 PM (PDT), as well as check out our website at www.frostyos.com.