
Securing Government Digital Identity in the Age of AI, Deepfakes and Quantum Risk
Federal officials and industry experts warned that as government services digitize, robust identity assurance is essential to prevent sophisticated fraud, AI-enabled impersonation and emerging quantum risks. The GSA’s federal identity and cyber security division supports agencies with centralized resources (idmanagement.gov), PKI policy oversight and hands‑on playbooks—including DARPA‑backed deepfake detection experiments—to help implement identity‑first, zero‑trust approaches. Speakers emphasized reliance on commercial vendors for proofing and continuous verification, and urged agencies to adopt adaptable, regularly reassessed strategies that combine detection, mitigation and sandboxed testing. The conversation framed identity as the foundational element of federal cybersecurity and service delivery.

Beyond Vendor Risk: Real-Time GRC, AI, and Protecting App User Data - Jadee Hanson - CSP #221
The episode centers on Vanta’s Agentic Trust platform and its role in protecting application user data through real‑time governance, risk, and compliance (GRC). Host Jessica Hoffman interviews JD Hanson, Vanta’s security and technology lead, who explains how the company uses...

🔴 Feb 9's Top Cyber News NOW! - Ep 1064
Episode 1064 of Simply Cyber’s Daily Cyber Threat Brief recapped the most pressing cybersecurity developments on February 9, 2026, ranging from AI‑assistant abuse to federal hardware mandates. The show highlighted OpenClaw’s new partnership with Google‑owned VirusTotal, which hashes each uploaded skill and checks...

Accelerating Incident Detection and Response I CIO Talk Network
The CIO Talk Network episode focuses on the growing difficulty enterprises face in detecting and responding to security incidents. Host Sanjor Bal and Paul Corp CISO Nares Fidila discuss how manual, skill‑dependent processes and numerous handoffs—especially for endpoint alerts—extend dwell...

Privacy Isn't What I Thought It Was
In the latest Techlore video, host Henry reflects on a decade‑long obsession with extreme privacy measures and argues that privacy should be viewed as a means to achieve broader goals rather than a final destination. He walks through the technical toys...

How 1 iPhone FOILED the FBI
Apple’s Lockdown Mode prevented the FBI from extracting data from a Washington Post reporter’s iPhone during a recent home raid, according to court filings and TechRadar. Agents seized multiple devices, forced the reporter to unlock a work MacBook with her...

ClawdBot Full Tutorial for Beginners: SECURE Setup Guide
The video is a step‑by‑step tutorial on deploying ClawdBot (also known as OpenClaw) with a focus on airtight security. It warns that many quick‑fire YouTube guides leave critical vulnerabilities, exposing API keys, email accounts, and even crypto wallets to attackers....

Why Everyone Should Use an Ad Blocker (AdGuard Interview)
The Techlore Talk interview with Andre from AdGuard centers on why modern users should adopt an ad‑blocking solution and how the company has expanded beyond simple browser extensions. Starting as a premium ad blocker in 2009, AdGuard now offers DNS‑level...

HackTheBox - Signed
The video walks through solving the HackTheBox "Signed" machine, an assumed‑breach challenge centered on a Microsoft SQL Server 2022 instance. Starting with default credentials, the presenter demonstrates initial enumeration, discovers that the guest account lacks XP cmd shell privileges, and pivots to...

JHT Course Launch: Dark Web 2 - CTI Researcher
The video is a step‑by‑step tutorial on building a responsive login page using HTML, CSS, and a touch of JavaScript. It begins with a clean HTML boilerplate, emphasizing a mobile‑first approach and setting up a container for the form elements....

🔴 Feb 6's Top Cyber News NOW! - Ep 1063
The episode of Simply Cyber’s Daily Cyber Threat Brief opened with host Dr. Gerald Ogier welcoming listeners and outlining the show’s format—daily cyber headlines, community interaction, and CPE credit opportunities. The centerpiece of the news roundup was Substack’s admission of...

Rethinking Segmentation for Better Security I CIO Talk Network
In this CIO Talk Network episode, host Sanjal interviews Ariel Zitlin, CTO and co‑founder of Guardicore, about why traditional network segmentation is no longer sufficient for modern enterprises. The discussion highlights how the proliferation of cloud, bare‑metal, virtualization, and container...

AI in Cybersecurity for SOC Analysts
The Simply Cyber Fireside chat brings together veteran SOC practitioners Wade Wells and Hayden Covington to explore how artificial intelligence is reshaping day‑to‑day security operations. The conversation centers on concrete AI‑driven workflows—using large‑language models to draft detection rule descriptions,...

The Value of AI - Where Is the Data?
The video centers on the difficulty of quantifying AI’s true business value due to a lack of robust data. The speaker acknowledges personal benefits—helping her husband and herself write—but stresses that beyond anecdotal wins, the impact remains fuzzy, especially when...

I DDoS'd Myself (Don't Do This)
The video walks through a live demonstration of a denial‑of‑service attack performed on the presenter’s own web server, illustrating both a simple ICMP ping flood and a distributed variant. The host warns viewers that such activities are illegal without permission...

This NEW Setting Locks Down WhatsApp
WhatsApp unveiled a new "lockdown" setting that lets users secure their entire account with a single tap. The feature is positioned as a "nuclear option" for those who demand the highest level of privacy, instantly switching every privacy toggle to...

Don't Take Crypto Security for Granted Ft. Ian Rogers From Ledger
The Breakpoint 2025 panel in Abu Dhabi featured Ian Rogers, Chief Experience Officer at Ledger, discussing how crypto security and user experience have matured. Rogers framed the current era as a transition from the speculative boom of 2021 to a...

NEW Lawsuit Could Destroy WhatsApp
The video examines a newly filed lawsuit accusing WhatsApp of violating its end‑to‑end encryption promises by allowing Meta employees to read private messages. The complaint asserts that Meta engineers can obtain unfettered access to any user’s chat history simply by...

I Gave Clawdbot (Now Moltbot) Access to My Computer, Calendar, and Emails: Here’s What Happened
The episode documents a hands‑on trial of Claudebot—now renamed Moltbot—an open‑source AI agent that can act on a user’s desktop, calendar and email. The host invites the bot into a Riverside podcast via Telegram, then walks through granting microphone, camera...

I Flew to Romania to Find Hackers Who Fight Hackers
A hidden cybercrime-fighting unit inside Bitdefender’s Bucharest headquarters, known as the Draco team, spent over two years dismantling a major ransomware gang by developing free decryptor tools that ultimately forced the criminals to cease operations and saved victims more than...

Hacking AI without Code
The video explains that large language models (LLMs) are vulnerable to two distinct attack vectors—prompt injection and prompt hacking—where malicious text can override system instructions or bypass safety filters. Prompt injection occurs when an LLM consumes external content, such as a...

HackTheBox - Imagery
The video walks through the Hack The Box "Imagery" machine, a Flask‑based web application exposing a gallery, login, and bug‑report functionality. The presenter begins with standard port scanning, identifies HTTP on port 8000, and confirms the service runs WorkZug on...

What Is Zero Trust? (And Why Hackers Hate It)
The video explains zero‑trust security, a model where no user, device, or request is trusted by default and must be continuously verified, authenticated, and authorized. It argues that as hackers become more sophisticated, traditional perimeter defenses are insufficient, making zero‑trust...

NEW Bluetooth Headphone Hack Is Real and Bad
The video spotlights a newly disclosed “Whisper Pair” vulnerability that lets attackers hijack Bluetooth headphones and earbuds supporting Google’s Fast Pair protocol, alongside brief rundowns of recent Logitech and Telegram security flaws. Researchers found that many manufacturers fail to enforce the...

ACCESS Your Home Network From ANYWHERE
The video introduces Twin Gate, a service that lets users connect to their home Wi‑Fi network from anywhere without a traditional VPN. By deploying a lightweight connector—often on a Raspberry Pi—owners gain point‑to‑point access to any device on their LAN,...

Your Phone Remembers Everything
The video titled “Your Phone Remembers Everything” highlights how modern smartphones continuously record user activity, debunking the myth that incognito or private modes erase digital footprints. The presenter demonstrates unified logs that capture everything from opened files to physical movement across...
![🔴 [PAYLOAD REVIEW] WiFi Pineapple Pager 📟🍍](/cdn-cgi/image/width=1200,quality=75,format=auto,fit=cover/https://i.ytimg.com/vi/Er7XwjwmfIU/maxresdefault.jpg)
🔴 [PAYLOAD REVIEW] WiFi Pineapple Pager 📟🍍
The live stream focused on reviewing and integrating community‑submitted payloads and themes for the Wi‑Fi Pineapple Pager, a portable network‑assessment device. Host Jason walked viewers through the pull‑payload utility, demonstrating how entering a PR number (e.g., 97) fetches and tests...

DEF CON 33 Recon Village - Autonomous Video Hunter AI Agents for Real Time OSINT - Kevin Dela Rosa
Kevin Dela Rosa presented the Autonomous Video Hunter, an AI‑driven system that extracts real‑time open‑source intelligence from video streams. Built on his startup Cloud Glue, the proof‑of‑concept combines multimodal video processing, large‑language‑model planning, and a suite of vision and audio tools...

DEF CON 33 Recon Village - Inside the Shadows Tracking RaaS Groups, Cyber Threats - John Dilgen
John Dilgen, a cyber‑threat intelligence analyst at Reliquest, presented at DEF CON 33’s Recon Village a deep dive titled “Inside the Shadows: Tracking Ransomware‑as‑a‑Service (RaaS) Groups and Evolving Cyber Threats.” He framed the discussion around the staggering $124 billion annual ransomware cost...

DEF CON 33 Recon Village - How to Become One of Them: Deep Cover Ops - Sean Jones, Kaloyan Ivanov
The DEF CON 33 Recon Village session, led by Sean Jones and Robert Rosio, explored the art and science of deep‑cover operations within cyber‑criminal ecosystems. The presenters argued that human intelligence (HUMINT) remains indispensable, especially when automated scrapers and...

Top 10 Things To Do After Installing Kali Linux
The video walks viewers through the first ten practical steps after installing Kali Linux, emphasizing hands‑on reconnaissance rather than passive watching. It begins with Nmap, showing how to scan a local subnet (e.g., 192.168.0.0/24) on public Wi‑Fi, add fast‑scan flags,...

SUED For Screenshotting Your TV (Every Second)
The video spotlights a wave of Texas‑filed lawsuits accusing major smart‑TV manufacturers of covertly capturing a screenshot of whatever appears on the screen every second – a practice known as Automated Content Recognition (ACR). Brands such as Highense, LG,...

7 Tips & Hacks for Ultimate Password Manager Security
The video, hosted by security expert Josh on All Things Secured, walks viewers through seven practical tips for hardening the use of any password manager, using Proton Pass as the demonstration platform. While the content is sponsored by Proton, the...

200 Million User Records... Breached
The video centers on a massive data breach affecting premium members of a streaming platform known as "the Hub," where a cyber‑criminal group called Shiny Hunters claims to have exfiltrated 94 GB of data comprising over 200 million user records. The stolen...

HackTheBox - WhiteRabbit
The video walks viewers through the Hack The Box “WhiteRabbit” machine, beginning with a standard Nmap scan that reveals three open ports: SSH on 22, HTTP on 80 served by Caddy, and a secondary SSH on 2222 likely running inside...