PodParley PodParley
#
Title
1

Security Debt: The Risk Nobody is Reporting

2

Claude Code Leak: What Security Leaders Need to Know About AI Coding Agents

3

The “Hacking Ray” Is Here: AI, Project Glasswing, and the End of Hidden Vulnerabilities

4

We don’t break in, we badge in

5

Stryker Attack Analysis: Cybersecurity and insurance perspectives

6

Mass Exploitation 2.0: Web Platforms Under Attack

7

Is Anthropic a Pentagon “Supply Chain Risk”?

8

Google Gemini Changed the Rules: Are Your API Keys Exposed?

9

Opus 4.6: Changing the Pace of Software Exploitation Description

10

Nancy Guthrie’s Recovered Footage: The Reality of Residual Data

11

Ransomware Gangs Are Teaming Up

12

Top Threat of 2026: The AI Visibility and Control Gap

13

The Verizon Outage and the Cost of Concentration

14

Data Is Hazardous Material: How Data Brokers Telematics and Over-Collection Are Reshaping Cyber Risk

15

Venezuela’s Blackout: Cybercrime Domino Effect

16

What the Epstein Files Teach Us About Redaction and AI

17

Amazon's Warning: The New Reality of Initial Access

18

AI Broke Trust: Identity Has to Step Up in 2026

19

The 5 New-ish Microsoft Security Features to Roll Out in 2026

20

The Extension That Spied on You: Inside ShadyPanda’s 7-Year Attack

21

Inside Jobs: How CrowdStrike, DigitalMint & Tesla Got Burned

22

Made in China—Hacked Everywhere?

23

Holiday Hackers—The 2025 AI Fraud Boom

24

LOUVRE Was the Password?! Cybersecurity Lessons from the Heist

25

Poisoned Search: How Hackers Turn Google Results into Backdoors

26

The AWS Outage and Hidden Fourth-Party Risks

27

Ransomware in the Fast Lane: Lessons from the Jaguar Land Rover Attack

28

The Power of “Why” – Communicating Cybersecurity Effectively

29

Shutdown Fallout: The Cybersecurity Information Sharing Act Expires

30

Inside the Spider’s Web: What Indictments Reveal About Scattered Spider

31

Vibe Hacking: The Dark Side of AI Coding

32

The Saga Continues: More Dirt on the Salesforce–Drift Breach

33

Connected App, Connected Risk: The Salesforce–Drift Incident

34

Betrayal, Backdoors, and Payback: When Hackers Become the Hacked

35

Printer Problems: Trump, Putin, and a Costly Mistake

36

Mass Salesforce Hacks: How Criminals Are Targeting the Cloud Supply Chain

37

North Korea’s Deepfake Remote Workers: How They’re Getting Inside U.S. Companies

38

The Amazon Q AI Hack: A Wake-Up Call for Developer Tool Security

39

Iran’s Cyber Surge: Attacks Intensify in 2025

40

Leaked and Loaded: DOGE’s API Key Crisis

41

Holiday Horror Stories: Why Hackers Love Long Weekends

42

Federal Cybersecurity Rollbacks: What Got Cut—And What Still Stands

43

No Lock, Just Leak

44

The AI Insider Threat: EchoLeak and the Rise of Zero-Click Exploits

45

When AI Goes Rogue: Blackmail, Shutdowns, and the Rise of High-Agency Machines

46

Retailgeddon Reloaded: Beyond Card Theft, Into Chaos

47

How Hackers Get In: Penetration Testing Secrets from the Front Line

48

Afterlife Access: Cybersecurity Planning for When You’re Gone

49

The LockBit Leak: When Hackers Get a Taste of Their Own Medicine

50

Network for Rent: The Criminal Market Built on Outdated Routers

51

Hacker AI: Smarter Attacks, Faster Exploits, Higher Stakes

52

Quantum Shift: How Cybersecurity Must Evolve Now

53

Red Alert: CISA's Budget Cuts and the Fallout for Defenders

54

23andMe: Breaches, Bankruptcy, and Security

55

"Unmasking Shadow IT: Navigating Unauthorized Communication Tools Like Signal"

56

The Encryption Battle: Security Savior or Cyber Risk?

57

Deepfakes & Voice Phishing: The New Frontier of Cybercrime

58

Wiretapped: How Hackers Infiltrated Global Telecom Networks

59

When Microsoft Goes Down: Cyber Risk & Resilience

60

Abandoned S3 Buckets – A Goldmine for Hackers

61

Ransomware Watch: Ghost, RansomHub, and the Latest Trends

62

Software Exploits – The Fast-Paced Threat Landscape of 2025

63

The OPM Security Debacle: Rogue Servers, Data Risks & What’s Next

64

DeepSeek or Deep Risk? The AI Power Play With China

65

The Silk Road, a Pardon, and the Future of Cybercrime

66

When the FBI Becomes Your IT Department

67

Cyber Trust or Bust? The New FTC Cyber Trust Mark

68

2025 Cybersecurity Priorities: The Top 3 Moves to Make