
The February 12 episode of Simply Cyber’s Daily Cyber Threat Brief, hosted by Dr. Gerald Oer, opened with community shout‑outs, sponsor plugs for Flare, Material, and Threat Locker, and a reminder that each show earns half a CPE credit for listeners. The core of the broadcast focused on a new ransomware campaign uncovered by Huntress, where a “Crazy” gang leveraged legitimate employee‑monitoring software (Net Monitor) and remote‑support tools (SimpleHelp) to infiltrate corporate networks, disable Windows Defender, and hunt for cryptocurrency wallets. The attackers exploited stolen SSL‑VPN credentials that lacked multifactor authentication, installed monitoring agents to spy on screens, transfer files, and execute PowerShell commands for persistence, including enabling the local administrator account. By disguising malicious binaries under benign names, they evaded detection while establishing multiple footholds, a tactic reminiscent of “smash‑and‑grab” ransomware groups like Lapsus and Scattered Spider. Host Gerald emphasized the vendor‑agnostic lesson: any internet‑facing authentication must be protected by MFA, and organizations should audit and tightly control remote‑access and monitoring utilities. He also raised the ethical debate around employee surveillance, noting that while such tools can be legitimate, they become high‑value targets for threat actors when left unchecked. The takeaway for security teams is clear: enforce MFA on VPNs, implement continuous monitoring of privileged tool usage, and conduct regular reviews of remote‑access software to mitigate the risk of weaponized monitoring solutions. Failure to act could expose enterprises to ransomware extortion, data theft, and operational disruption.

The Smart Buildings Academy podcast episode 533 introduces BACnet over SC (Secure Connect) as the next‑generation transport for building automation networks. It explains why the legacy BACnet over IP—built on UDP, plain‑text messaging, and broadcast discovery—was adequate for isolated control...

The weekly Threatwire roundup spotlights a cascade of cyber‑security headlines, with the OpenClaw ecosystem taking center stage. The host warns that nearly 50,000 OpenClaw control panels are publicly exposed, many vulnerable to remote code execution, and that 1.5 million API...

The video underscores a growing urgency for organizations to adopt quantum‑resistant security measures as regulators set definitive timelines for compliance. By establishing a clear due date, policymakers are forcing enterprises to confront the reality that data collected today could be...

The episode of Simply Cyber’s Daily Cyber Threat Brief, hosted by Dr. Gerald Ogier, delivers the day’s top eight cybersecurity headlines while fostering a lively community of professionals. After a brief welcome and sponsor shout‑outs, the show pivots to the...

Acting ICE director Todd Lyons told lawmakers that U.S. Immigration and Customs Enforcement does not maintain any database tracking American citizens or protesters. He repeatedly denied that agents photograph or catalog First Amendment activity, and declined to explain an incident...

Two Connecticut residents have been indicted on federal fraud charges for siphoning roughly $3 million from online sports‑betting platforms. Prosecutors allege the duo orchestrated a multi‑year scheme that leveraged stolen personal data to open and fund thousands of gambling accounts. The indictment...

The FBI Anchorage Field Office, led by Assistant Special Agent Brandon Waddle, announced Operation Winter Shield, a nationwide cyber‑security campaign aimed at bolstering the digital defenses of Alaskans and the broader United States. The initiative distills lessons from real‑world investigations into...

The episode of Simply Cyber’s Daily Cyber Threat Brief on February 10, 2026 centered on a new espionage campaign attributed to the China‑linked APT group UNC 3886, which targeted all four major telecom operators in Singapore using a zero‑day exploit and sophisticated rootkits. According...

The video walks users through configuring Protective DNS log push, emphasizing a one‑time account upgrade for organizations onboarded before April 2023. It outlines the feature’s capacity to create up to four direct pushes to either an AWS S3 bucket or a...

The video walks through configuring alert sets within the Protective DNS Resolver management console, detailing both DNS event alerts and system event alerts for organizations. DNS event alerts trigger when queries match CISA‑global or agency‑specific filtering policies, allowing allow, block, or...

The video explains how to authorize sources to route traffic to a Protective DNS resolver, a required step before configuring internal destinations. Authorized sources are individual IP addresses (IPv4, IPv6, or SSE providers) grouped into logical "source sets" that reflect...

Protective DNS’s Policy Editor lets organizations create, manage and customize DNS filtering rules that sit at an upstream resolver for roaming and mobile devices. Policies exist at two levels—global (CISA-managed) and organizational—and can be static (rule-based) or dynamic (threat-feed driven),...

Protective DNS’s Resolver Logs feature lets organization users with reporting roles preview, filter, download and schedule full DNS query extracts from the management dashboard. Users can filter by source set, authorized source, policy, record type, name and time range, preview...

The video walks through user management in the Protective DNS management application, showing how managers add organizational users, assign roles, and control access. By default new users receive read-only access to dashboards, policies, threat analysis and organization info; additional roles...

The panel discussion, hosted by Rusei’s Jamie McColl, examined the United Kingdom’s current cyber‑security posture in the wake of high‑profile 2025 breaches at major retailers and Jaguar Land Rover. Participants—including NCSC chief technical officer Ollie Whitehouse, former NCSC chief Kieran Martin,...

Speakers argue that relying solely on rented cloud GPU resources is discouraging AI research because usage-based billing forces researchers to limit experimentation. They advocate for on-premises GPU infrastructure—capitalized once and reused over long lifecycles—to enable sustained exploration, hand down hardware...

Coalition highlighted the rapid cascade from disclosure to exploitation in the recent React-to-Shell vulnerability, which targeted React server components and left Next.js-hosted sites especially exposed. The firm said threat actors began scanning immediately after disclosure and that working exploits appeared...

The video addresses the timeline and practical implications of quantum computing for blockchain security, emphasizing that a quantum adversary capable of breaking today’s cryptographic primitives is unlikely to appear for roughly fifteen years. While the speaker cautions against complacency, he...

The Department of Homeland Security’s Office of Inspector General has opened an audit into DHS privacy practices, focusing initially on Immigration and Customs Enforcement and the Office of Biometric Identity Management to examine how personally identifiable information and biometric data...

Federal officials and industry experts warned that as government services digitize, robust identity assurance is essential to prevent sophisticated fraud, AI-enabled impersonation and emerging quantum risks. The GSA’s federal identity and cyber security division supports agencies with centralized resources (idmanagement.gov),...

The episode centers on Vanta’s Agentic Trust platform and its role in protecting application user data through real‑time governance, risk, and compliance (GRC). Host Jessica Hoffman interviews JD Hanson, Vanta’s security and technology lead, who explains how the company uses...

Episode 1064 of Simply Cyber’s Daily Cyber Threat Brief recapped the most pressing cybersecurity developments on February 9, 2026, ranging from AI‑assistant abuse to federal hardware mandates. The show highlighted OpenClaw’s new partnership with Google‑owned VirusTotal, which hashes each uploaded skill and checks...

The CIO Talk Network episode focuses on the growing difficulty enterprises face in detecting and responding to security incidents. Host Sanjor Bal and Paul Corp CISO Nares Fidila discuss how manual, skill‑dependent processes and numerous handoffs—especially for endpoint alerts—extend dwell...

In the latest Techlore video, host Henry reflects on a decade‑long obsession with extreme privacy measures and argues that privacy should be viewed as a means to achieve broader goals rather than a final destination. He walks through the technical toys...

Apple’s Lockdown Mode prevented the FBI from extracting data from a Washington Post reporter’s iPhone during a recent home raid, according to court filings and TechRadar. Agents seized multiple devices, forced the reporter to unlock a work MacBook with her...

The video is a step‑by‑step tutorial on deploying ClawdBot (also known as OpenClaw) with a focus on airtight security. It warns that many quick‑fire YouTube guides leave critical vulnerabilities, exposing API keys, email accounts, and even crypto wallets to attackers....

The Techlore Talk interview with Andre from AdGuard centers on why modern users should adopt an ad‑blocking solution and how the company has expanded beyond simple browser extensions. Starting as a premium ad blocker in 2009, AdGuard now offers DNS‑level...

The video walks through solving the HackTheBox "Signed" machine, an assumed‑breach challenge centered on a Microsoft SQL Server 2022 instance. Starting with default credentials, the presenter demonstrates initial enumeration, discovers that the guest account lacks XP cmd shell privileges, and pivots to...

The video is a step‑by‑step tutorial on building a responsive login page using HTML, CSS, and a touch of JavaScript. It begins with a clean HTML boilerplate, emphasizing a mobile‑first approach and setting up a container for the form elements....

The episode of Simply Cyber’s Daily Cyber Threat Brief opened with host Dr. Gerald Ogier welcoming listeners and outlining the show’s format—daily cyber headlines, community interaction, and CPE credit opportunities. The centerpiece of the news roundup was Substack’s admission of...

In this CIO Talk Network episode, host Sanjal interviews Ariel Zitlin, CTO and co‑founder of Guardicore, about why traditional network segmentation is no longer sufficient for modern enterprises. The discussion highlights how the proliferation of cloud, bare‑metal, virtualization, and container...

The Simply Cyber Fireside chat brings together veteran SOC practitioners Wade Wells and Hayden Covington to explore how artificial intelligence is reshaping day‑to‑day security operations. The conversation centers on concrete AI‑driven workflows—using large‑language models to draft detection rule descriptions,...

The video centers on the difficulty of quantifying AI’s true business value due to a lack of robust data. The speaker acknowledges personal benefits—helping her husband and herself write—but stresses that beyond anecdotal wins, the impact remains fuzzy, especially when...

The video walks through a live demonstration of a denial‑of‑service attack performed on the presenter’s own web server, illustrating both a simple ICMP ping flood and a distributed variant. The host warns viewers that such activities are illegal without permission...

WhatsApp unveiled a new "lockdown" setting that lets users secure their entire account with a single tap. The feature is positioned as a "nuclear option" for those who demand the highest level of privacy, instantly switching every privacy toggle to...

The Breakpoint 2025 panel in Abu Dhabi featured Ian Rogers, Chief Experience Officer at Ledger, discussing how crypto security and user experience have matured. Rogers framed the current era as a transition from the speculative boom of 2021 to a...

The video examines a newly filed lawsuit accusing WhatsApp of violating its end‑to‑end encryption promises by allowing Meta employees to read private messages. The complaint asserts that Meta engineers can obtain unfettered access to any user’s chat history simply by...

The episode documents a hands‑on trial of Claudebot—now renamed Moltbot—an open‑source AI agent that can act on a user’s desktop, calendar and email. The host invites the bot into a Riverside podcast via Telegram, then walks through granting microphone, camera...

A hidden cybercrime-fighting unit inside Bitdefender’s Bucharest headquarters, known as the Draco team, spent over two years dismantling a major ransomware gang by developing free decryptor tools that ultimately forced the criminals to cease operations and saved victims more than...

The video explains that large language models (LLMs) are vulnerable to two distinct attack vectors—prompt injection and prompt hacking—where malicious text can override system instructions or bypass safety filters. Prompt injection occurs when an LLM consumes external content, such as a...

The video walks through the Hack The Box "Imagery" machine, a Flask‑based web application exposing a gallery, login, and bug‑report functionality. The presenter begins with standard port scanning, identifies HTTP on port 8000, and confirms the service runs WorkZug on...

The video explains zero‑trust security, a model where no user, device, or request is trusted by default and must be continuously verified, authenticated, and authorized. It argues that as hackers become more sophisticated, traditional perimeter defenses are insufficient, making zero‑trust...

The video spotlights a newly disclosed “Whisper Pair” vulnerability that lets attackers hijack Bluetooth headphones and earbuds supporting Google’s Fast Pair protocol, alongside brief rundowns of recent Logitech and Telegram security flaws. Researchers found that many manufacturers fail to enforce the...

The video introduces Twin Gate, a service that lets users connect to their home Wi‑Fi network from anywhere without a traditional VPN. By deploying a lightweight connector—often on a Raspberry Pi—owners gain point‑to‑point access to any device on their LAN,...

The video titled “Your Phone Remembers Everything” highlights how modern smartphones continuously record user activity, debunking the myth that incognito or private modes erase digital footprints. The presenter demonstrates unified logs that capture everything from opened files to physical movement across...
![🔴 [PAYLOAD REVIEW] WiFi Pineapple Pager 📟🍍](/cdn-cgi/image/width=1200,quality=75,format=auto,fit=cover/https://i.ytimg.com/vi/Er7XwjwmfIU/maxresdefault.jpg)
The live stream focused on reviewing and integrating community‑submitted payloads and themes for the Wi‑Fi Pineapple Pager, a portable network‑assessment device. Host Jason walked viewers through the pull‑payload utility, demonstrating how entering a PR number (e.g., 97) fetches and tests...

Kevin Dela Rosa presented the Autonomous Video Hunter, an AI‑driven system that extracts real‑time open‑source intelligence from video streams. Built on his startup Cloud Glue, the proof‑of‑concept combines multimodal video processing, large‑language‑model planning, and a suite of vision and audio tools...

The DEF CON 33 Recon Village session, led by Sean Jones and Robert Rosio, explored the art and science of deep‑cover operations within cyber‑criminal ecosystems. The presenters argued that human intelligence (HUMINT) remains indispensable, especially when automated scrapers and...

John Dilgen, a cyber‑threat intelligence analyst at Reliquest, presented at DEF CON 33’s Recon Village a deep dive titled “Inside the Shadows: Tracking Ransomware‑as‑a‑Service (RaaS) Groups and Evolving Cyber Threats.” He framed the discussion around the staggering $124 billion annual ransomware cost...