Rogue Comms Tech Found in US Power Grid – Is AI Replicating Itself?

This podcast covers recent cybersecurity threats, including rogue communication devices found in Chinese solar power inverters and risks posed by undocumented hardware in energy infrastructure. It also discusses advances in AI self-replication, browser security improvements, and privacy protections like passwordless login and data breach defenses. #PowerGridSecurity #AIReplication

Read More
Conversational AI vs. Generative AI: Finding the Perfect Balance

Generative AI significantly accelerates chatbot development by replacing manual crafting of responses with large language models (LLMs) and retrieval-augmented generation (RAG) techniques. A hybrid approach combining traditional classifiers for common questions and LLMs for infrequent queries helps optimize control, speed, and user experience. #GenerativeAI #Chatbots #RAG #ArtificialIntelligence #UserExperience

Read More
WORLDS FIRST CPU Ransomware! – BHIS – Talkin’ Bout [infosec] News 2025-05-19

This transcript provides a humorous and insightful discussion on current cybersecurity threats, including Coinbase’s breach, CPU vulnerabilities, and the use of AI in security. It highlights the risks of insider threats, nation-state cyber operations, and cybersecurity challenges with emerging technologies. #CyberSecurity, #InsiderThreats, #CPUVulnerabilities, #Ransomware, #AIRegulation

Read More
AWS, Honeywell, Marriott… What Do They Want from World Governments?

Cybersecurity leaders, including top CEOs from Amazon Web Services, Honeywell, and Marriott, are calling on global governments to harmonize cybersecurity regulations to create unified international standards. The goal is to reduce the complexity of managing different laws and regulations across countries, making cybersecurity more effective and manageable. #CyberSecurity #InternationalStandards #GlobalGovernments

Read More
How to Submit Your First Cybersecurity Talk (CFP)

This video provides a comprehensive guide on how to effectively submit a Call for Papers (CFP) for cybersecurity conferences, emphasizing confidence building, overcoming impostor syndrome, and strategic presentation tips. The speaker encourages viewers to start small, network professionally, and leverage AI tools to generate innovative talk ideas. #CyberSecurity #ConferenceTips (use hashtags for entities mentioned)

Read More
This Browser Hack Scored Me a ,000 Bug Bounty

This video explores how browsers like Chrome are integrated into various devices such as smart TVs, e-readers, and embedded systems, and discusses the security risks associated with vulnerabilities like CVE-2023-4357. It emphasizes the potential consequences of exploits in background systems and showcases how XML External Entity (XXE) vulnerabilities can be leveraged across different platforms. #Chrome #Vulnerabilities #EmbeddedSystems

Read More