Some insider threats are quiet and compulsive. Others come wrapped in a peanut butter sandwich. In 2021, U.S. Navy engineer Jonathan Toebbe was arrested for attempting to sell classified submarine technology to a foreign government. He wasn’t forced into it. He wasn’t coerced. He initiated the contact himself, asking for hundreds of thousands of dollars in cryptocurrency in exchange for nuclear secrets. This wasn’t a data dump or a careless mistake. It was premeditated.
It seems like Artificial Intelligence (AI) has suddenly appeared in everything, everywhere, all at once. What feels like “five minutes ago”, there was “pre-AI life”, and now we have AI assistants that speak like real people, apps that create images, music, and video from nothing, and AI agents that do work for us.
This week on the podcast, we cover a massive software supply chain compromise involving widely-used NPM packages. After that we discuss an increase in social engineering attacks called ClickFix. Finally, we end with a discussion of Senator Wyden's recent letter to the FTC demanding Microsoft being held accountable for "gross cybersecurity negligence" and whether his claims have any merit. The 443 Security Simplified is a weekly podcast that gets inside the minds of leading white-hat hackers and security researchers, covering the latest cybersecurity headlines and trends.
In this video, we put Replit’s AI coding tool to the test by asking it to create a secure note-taking app. While the tool shows off some seriously impressive abilities, it’s not without its flaws... Join me as I explore what Replit can (and can’t) do, and whether AI coding tools such as this one are ready to build reliable, secure apps.
Your SOC scrambles when alerts flood in: disparate tools, manual triage, and slow follow-through mean attackers move faster than your defenses. That gap from detection to containment stretches dwell time, increases breach impact, and drains your team. Manual tasks consume your most valuable resource—analyst attention—while every second matters in incident response.
In this video, we'll cover GitGuardian Playbooks and how to manage them in your workspace. We know that time is critical when a secrets incident occurs. That's why our platform allows you to quickly and easily automate steps of the incident response process. We call these automations "Playbooks".
Elliptic Curve Cryptography (ECC) is fast, secure and trusted by organizations around the world, including Keeper. In just 90 seconds, learn how ECC works, how it compares to RSA and why it's the go-to encryption method for securing modern communication.