Security Now (Audio)

Security Now (Audio)

Podcast5 episodes summarized

SN 1074: What Mythos Means - Marketing or Mayhem

0Apr 15, 2026

Security expert Steve Gibson analyzes Anthropic's new Mythos AI model, which demonstrates superhuman capability in discovering software vulnerabilities. While Anthropic claims the model is too dangerous to release publicly, Gibson examines the evidence and concludes this represents a watershed moment for cybersecurity that exposes widespread flaws in existing software.

TechnicalDiscussionAnthropic Mythos AI modelSoftware vulnerability discoveryZero-day exploits

SN 1073: The FCC Bans New Consumer Routers - LinkedIn's JavaScript Bombshell

2h 52mApr 8, 2026

Steve Gibson analyzes the FCC's ban on all new foreign-made consumer routers, explaining why it's arbitrary and ineffective. The show also covers LinkedIn's 2.7MB JavaScript surveillance code that scans users' computers for over 6,000 browser extensions, and touches on Apple's new age verification requirements in the UK.

NewsTechnicalFCC Router BanLinkedIn JavaScript SurveillanceApple Age Verification

SN 1072: LiteLLM - Click Fix Attacks Surge

2h 49mApr 1, 2026

Steve Gibson and Leo Laporte discuss the LiteLLM PyPI exploit, a sophisticated supply chain attack that infected the popular AI proxy service with credential-stealing malware. The attack, executed by Team PCP, exploited a compromised security scanner (Trivy) to inject malware that would have affected 3.4 million daily downloads, but was caught due to a coding error that caused systems to crash.

TechnicalNewsLiteLLM Supply Chain AttackAge Verification LawsClickFix Vulnerabilities

SN 1071: Bucketsquatting - Meta and TikTok's Tracking Pixels

2h 47mMar 25, 2026

Steve Gibson and guest host Micah Sargent discuss a critical security flaw in H&R Block's tax software that installs an untrustworthy root certificate with accessible private keys. They also cover 'bucket squatting' - a major vulnerability where attackers hijack abandoned Amazon S3 buckets to compromise software supply chains.

TechnicalNewsH&R Block Certificate VulnerabilityBucket SquattingSupply Chain Security

SN 1070: CISA's Free Internet Scanning - Malware Disguised as a VPN

2h 46mMar 18, 2026

Steve Gibson discusses various cybersecurity topics including social media companies backing away from end-to-end encryption, malware disguised as VPN software, and his positive experience with CISA's free internet scanning service. He also addresses questions about AI-generated code and shares insights from security researchers about current threats.

TechnicalNewsEnd-to-end encryptionVPN malwareCISA internet scanning

Get AI summaries like this delivered to your inbox daily