Are You Leaving the Backdoor Open for Hackers?
Off The Mic David Moulton Off The Mic David Moulton

Are You Leaving the Backdoor Open for Hackers?

What Caught My Attention This Week?

  • China Breaches U.S. Treasury: A stark reminder of the dangers lurking in supply chain vulnerabilities.

  • AI Deepfakes Target Elections: Sanctions reveal how Russia and Iran weaponize disinformation campaigns.

  • Chrome Extensions Compromised: Trusted tools turned into silent data thieves by hackers.

And on Threat Vector this week, I had a conversation with Margaret Kelly about the hidden dangers of cloud misconfigurations. From loose permissions to exposed infrastructure, we explored how these gaps are a dream for nation-state attackers like those behind the Treasury breach. This is a reminder that fixing your cloud is no longer optional—it’s urgent.

Read More
North Korean Hackers Master the Art of Invisibility
Off The Mic David Moulton Off The Mic David Moulton

North Korean Hackers Master the Art of Invisibility

What Caught My Attention This Week?

  • Unit 42 revealed Silent Skimmer

  • Germany’s New Law: A Win for Security Researchers

  • Snowflake Data Breach Arrest

And on Threat Vector this week, I had a conversation with Assaf Dahan about what makes North Korean hackers a cyber force to be reckoned with. Their motivations go beyond financial gain to include sabotage, espionage, and political influence.

Read More
Iran’s Cyber Arsenal Blends Deepfakes with Disruption
Off The Mic David Moulton Off The Mic David Moulton

Iran’s Cyber Arsenal Blends Deepfakes with Disruption

Kyle Wilhoit and Michal Goldstein join me on Threat Vector to discuss how adaptive, intelligence-led incident response is key to tackling hybrid threats like deepfakes, doxing, ransomware, and stealthy espionage campaigns. From Iran’s disinformation playbook to China’s prolonged intrusions, war rooms must be ready for it all. Plus, Macron’s Strava leak highlights the privacy risks of location-tracking apps.

Read More