March 17, 2026

ep. 203 Iranian hackers Just DELETED Stryker: The Scariest Cyber Attack of 2026.

ep. 203  Iranian hackers Just DELETED Stryker: The Scariest Cyber Attack of 2026.
The player is loading ...
ep. 203  Iranian hackers Just DELETED Stryker: The Scariest Cyber Attack of 2026.

Get into cybersecurity here : https://app.techtualconsulting.tech/bundles ------------------------------------------------------------------------------------ In this episode of the Techtual Talk podcast, HD and Cybershortieee cover major cyber stories including a pro-Iran “wiper” attack claim against medical device giant Stryker that allegedly wiped 200,000 systems via Microsoft Intune, ShinyHunters exploiting misconfigured Salesforce Experience Cloud using a modified defensive tool, a...

Apple Podcasts podcast player badge
Spotify podcast player badge
Castro podcast player badge
RSS Feed podcast player badge
Youtube Music podcast player badge
Apple Podcasts podcast player iconSpotify podcast player iconCastro podcast player iconRSS Feed podcast player iconYoutube Music podcast player icon

Get into cybersecurity here : https://app.techtualconsulting.tech/bundles
------------------------------------------------------------------------------------
In this episode of the Techtual Talk podcast, HD and Cybershortieee cover major cyber stories including a pro-Iran “wiper” attack claim against medical device giant Stryker that allegedly wiped 200,000 systems via  Microsoft Intune, ShinyHunters exploiting misconfigured Salesforce Experience Cloud using a modified defensive tool, and a supply-chain pivot that led to a near‑petabyte TELUS Digital data theft and a $65M extortion demand. .
------------------------------------------------------------------------------------
Get your It pro career package here : https://app.techtualconsulting.tech/bundles/57
Book your cyber consultation here: https://app.techtualconsulting.tech/sessions

join the discord here: https://discord.gg/8jryx9CUxw
ask your pod questions here: techtualquestions@thetechtualtalk.com
--------------------------------------------------------------------------------------
➡️ Follow us on social media:
Instagram: https://www.instagram.com/techtualchatter/
TIkTok: https://www.tiktok.com/@techtualchatter
Twitter: https://twitter.com/TechtualChatter
LinkedIn: https://www.linkedin.com/in/henri-davis/

Follow Cybershortieee
 @Cybershortieee  
Instagram https://www.instagram.com/cybershortieee/

Follow the Pod:
https://www.instagram.com/techtualtalk/

-----------------------------------------------------------------------------------------------------
0:00:00 Intro
02:08 Shortiee got a Macbook Neo 
05:24 Black recruiters are needed in tech
14:02 Iran wipes Stryker Out
29:59 Salesforce Aura Data Theft
34:34 TELUS Supply Chain Breach
41:58 Doge SSN Theft Setup
48:27 Reddit Storied
53:53 Answering Why do you want to leave your company
58:16 Salt Typhoon Telecom Breach
01:04:27 AI Psychosis and Violence
01:13:02 Kids Guardrails and Devices
01:17:26 Iran GPS Spoofing Breaks Apps
01:23:13 Google Finalizes Wiz deal for 32 billion
01:28:52 6G Is Coming
01:32:37 Maps and Directions Debate
01:35:10 Fake VPN Download Trap
01:41:15 Router Proxy Takedown
01:45:41 Claressa Shields Rant
01:47:52  Atlassian AI Layoffs Rumors
01:50:01 Disney and Nickelodeon Nostalgia
01:57:32 Nursing Exam Cheating Story
02:01:16 Why Nine to Five Exists
02:03:03 Remote Work and 24/7 Life
02:06:31 Documentation Wins Lawsuits
02:10:49 Severance and EEOC Options
02:13:32 Corporate America Burnout
02:17:50 Insider Threat Vigilance
02:20:07 Birthday Plans and Vow Renewal
02:22:20 AI Safety and AR Future

FTC Legal Disclaimer - Some links found in the description box of my videos may be affiliate links, meaning I will make a commission on sales you make through my link. This is at no extra cost to you to use my links/codes, it's just one more way to support me and my channel! :), 

🎙️ New to streaming or looking to level up? Check out StreamYard and get $10 discount! 😍 https://streamyard.com/pal/d/5264874367352832

➡️ Follow us on social media:
Instagram: https://www.instagram.com/techtualchatter/
TIkTok: https://www.tiktok.com/@techtualchatter
Twitter: https://twitter.com/TechtualChatter
LinkedIn: https://www.linkedin.com/in/henri-davis/

Follow Cybershortieee
@Cybershortieee
Instagram @cybershortieee

Follow the Pod:
https://www.instagram.com/techtualtalk/

WEBVTT

00:00:00.080 --> 00:00:02.000
Welcome back to the Textual Talk Podcast.

00:00:02.080 --> 00:00:09.039
In this week's episode, we're navigating a surge of serious global cyber threats and digging into some critical shifts in the tech landscape.

00:00:09.199 --> 00:00:10.720
We're starting with a major attack.

00:00:10.880 --> 00:00:18.000
A pro-Iran activist group claims to have hit medical device giant striker, causing massive global system outages.

00:00:21.359 --> 00:00:22.000
That's right.

00:00:22.079 --> 00:00:23.839
And the global security picture is grim.

00:00:24.079 --> 00:00:34.960
We're discussing a state-backed Chinese hacking campaign, saw typhoon, and spent quietly compromising global telecom giants, and the chaos that GPS attacks near Iran are wreaking on ordinary life.

00:00:35.119 --> 00:00:37.600
Plus, the dangers of AI are becoming real.

00:00:37.759 --> 00:00:42.320
One lawyer is now warning of mass casualty risk from AI psychosis cases.

00:00:42.560 --> 00:00:45.200
We're also talking about the people and the culture of tech.

00:00:45.439 --> 00:00:55.759
From a shocking report about a DOE employee stealing Social Security data on a thumb drive to the vital discussion on why black recruiters are essential for creating an equitable workforce.

00:00:55.920 --> 00:01:05.120
And on a lighter note, we're diving into the promised MacBook Neo and why everyone needs to be playing around with all the new AI agentic tools coming out.

00:01:05.359 --> 00:01:16.400
We've got cybersecurity news, workplace debates, and a critical look at the future of tech, including Google's 3.2 billion acquisition of Wiz and how Facebook is finally making it easier for creators to fight impersonators.

00:01:16.560 --> 00:01:17.280
Don't go anywhere.

00:01:17.439 --> 00:01:18.959
Episode 203 starts now.

00:01:26.959 --> 00:01:28.799
Welcome, welcome back, everybody.

00:01:28.959 --> 00:01:32.799
It's your boy HD in the building, and we got Cyber Shorty.

00:01:32.959 --> 00:01:33.599
Hey y'all.

00:01:33.920 --> 00:01:35.439
How y'all been enjoying these intros?

00:01:35.519 --> 00:01:36.480
We're trying to spice it up.

00:01:36.560 --> 00:01:37.280
I think I like it.

00:01:37.439 --> 00:01:39.280
I low-key that that ate today.

00:01:39.359 --> 00:01:39.439
Yeah.

00:01:39.599 --> 00:01:40.319
That ate down today.

00:01:40.480 --> 00:01:47.680
I like it too because so audio and video is different, but for the audio listeners, they would really like it because they know exactly what we're talking about.

00:01:48.000 --> 00:01:48.319
Exactly.

00:01:48.560 --> 00:01:49.840
They're not on YouTube.

00:01:50.000 --> 00:01:52.400
People can like hit the description and kind of see what we're talking about.

00:01:52.480 --> 00:01:54.719
And they probably click somewhere to see what we're talking about.

00:01:54.959 --> 00:01:56.400
So I really like that.

00:01:56.560 --> 00:02:00.159
And um I think first things first, you know, let's start off with you.

00:02:00.239 --> 00:02:02.239
You guys cannot see on the screen.

00:02:02.319 --> 00:02:05.120
Let me go back to this so I can switch back to her.

00:02:05.599 --> 00:02:07.439
Um I can pull her up.

00:02:08.400 --> 00:02:10.800
Shorty has a MacBook Neo.

00:02:11.280 --> 00:02:12.319
I'm in love.

00:02:12.639 --> 00:02:14.879
You guys, this is my first MacBook.

00:02:15.120 --> 00:02:18.400
And okay, so I'm Team Apple, we know that.

00:02:18.719 --> 00:02:25.520
But I just did not want to get any type of Mac device computer based.

00:02:25.680 --> 00:02:26.479
And I'm in love.

00:02:26.639 --> 00:02:27.520
It just makes sense.

00:02:27.680 --> 00:02:28.879
It makes sense.

00:02:29.520 --> 00:02:33.120
If you already have all these Apple products, it makes the most sense.

00:02:33.439 --> 00:02:33.680
Yeah.

00:02:34.000 --> 00:02:38.159
Um obviously it is, you know, a cheaper laptop.

00:02:38.479 --> 00:02:42.800
I'm not expecting, you know, pro capabilities from it.

00:02:43.039 --> 00:02:45.919
Um, but you know, the the audio's good, it looks good.

00:02:46.000 --> 00:02:54.400
I haven't really done much on here besides um a couple of I haven't really done much.

00:02:54.560 --> 00:02:57.360
Music, research, you know, getting prepped for the pod.

00:02:57.599 --> 00:03:03.039
I haven't done anything that's, I guess, super resource intensive yet, but I'll keep you guys posted.

00:03:03.199 --> 00:03:03.919
But I love it.

00:03:04.080 --> 00:03:04.400
I love it.

00:03:04.560 --> 00:03:05.280
10 out of 10.

00:03:05.520 --> 00:03:09.120
Yeah, it's funny because I think it was like one or two episodes ago, I was telling you about how you should go ahead and get a MacBook.

00:03:09.199 --> 00:03:10.319
And you was like, I don't want to get a MacBook.

00:03:10.400 --> 00:03:15.120
And I was telling her, like, when it comes to now that stuff that you're doing, I know you've been playing with AI.

00:03:15.199 --> 00:03:20.240
I know now you've been doing your content creation, everything else, you really can't find a better value.

00:03:20.319 --> 00:03:28.400
Like, though I love Windows, like, like if you're a gamer for PC and then you're you're upgrading your PC and all the other stuff, Windows, you know, is the move for that.

00:03:28.639 --> 00:03:32.159
But when it comes to this, this thing is so simple.

00:03:32.400 --> 00:03:38.560
You know, I years ago, before I ever got a Mac, I was like, man, I'm not gonna pay no$2,000 for no Mac, no laptop.

00:03:38.639 --> 00:03:39.759
That's crazy, whoop-de-woop.

00:03:39.919 --> 00:03:45.360
And now all of a sudden, I go on my second MacBook Pro because they last forever and they do exactly what I needed to do.

00:03:45.520 --> 00:03:47.120
Like this thing has great battery life.

00:03:47.199 --> 00:03:48.960
As you can see, the fans not even cut on yet.

00:03:49.039 --> 00:03:51.039
Like, that's one of my pet peas of windows.

00:03:51.199 --> 00:03:51.439
Bye.

00:03:51.680 --> 00:03:54.800
No matter how spec'd out it is, the fan will start coming on.

00:03:55.039 --> 00:03:57.680
My aces, throw it away.

00:03:57.919 --> 00:03:58.560
Immediately.

00:03:58.879 --> 00:04:02.000
It gets so hot, it oh, it just I know.

00:04:03.280 --> 00:04:04.879
That was not a good purchase.

00:04:05.039 --> 00:04:08.319
We should talk about like not good tech purchases one day.

00:04:08.400 --> 00:04:09.680
Because that was not, that was that was.

00:04:10.080 --> 00:04:10.639
Well, you got it.

00:04:10.719 --> 00:04:12.240
You just went out and it's it's similar.

00:04:12.400 --> 00:04:19.279
It reminds me, this conversation reminds me of um like it whether it's like a dad or a big brother or something, like the sisters going to buy their first car.

00:04:19.519 --> 00:04:21.199
It's just I just did a lot of stupid stuff.

00:04:21.279 --> 00:04:23.040
Like, you know how about the the iPad?

00:04:23.199 --> 00:04:24.480
I mean, I still love her.

00:04:24.639 --> 00:04:27.199
I I get the most use out of my iPad for sure.

00:04:27.519 --> 00:04:31.120
But I didn't everything I told you I was gonna do with it.

00:04:31.199 --> 00:04:32.480
I ain't done none of that with it.

00:04:32.800 --> 00:04:39.279
I mean, I use my iPad like when I don't, if I don't look this around, like it's like a little simple, but it's multifaceted now for me.

00:04:39.360 --> 00:04:40.800
In the car, I could do something real quick.

00:04:40.959 --> 00:04:44.480
Or now on long trips, it's with josh washes.

00:04:44.959 --> 00:04:47.920
So I do low-key want a smaller iPad now.

00:04:48.000 --> 00:04:48.160
I know.

00:04:48.399 --> 00:04:52.879
But but I still want the big one, but I want like the little mini one.

00:04:53.040 --> 00:04:58.800
Now, guys, the next thing we're gonna have her do, like when I come in here next with the S26 Ultra, she's gonna be like, okay, I'm gonna go get one.

00:04:58.959 --> 00:04:59.600
I'm screaming.

00:04:59.839 --> 00:05:00.720
She's gonna go get one.

00:05:00.800 --> 00:05:02.879
She's gonna replace one of these iPhones she got on her desk.

00:05:03.040 --> 00:05:08.639
I like I do, I think my favorite part about this though is just how it already integrates with all of my Apple stuff.

00:05:08.720 --> 00:05:17.439
So, like, you know, content, my pictures, and all that stuff that I have on here, it just makes it easier versus you having to figure out how to get it on said device.

00:05:17.759 --> 00:05:20.000
Um, so that's probably my favorite thing.

00:05:20.079 --> 00:05:21.680
Is everything's already here.

00:05:22.879 --> 00:05:23.759
Perfect, perfect.

00:05:23.920 --> 00:05:37.279
Now, one of the things I had on the docket um to be a little serious today, or I could try to be serious, is um there's always been these contentious debates over the last couple weeks about who works in tech and who don't.

00:05:37.360 --> 00:05:41.040
And oh, you're a recruiter, you don't really work in tech, you just you work in recruitment.

00:05:41.680 --> 00:05:56.720
While all that stuff is fun and it's good for the algorithm to get clicks and go back and forth, on a serious tip, black recruiters, whatever they do, and whether it's a tech company or not, they are essentially needed, especially for us.

00:05:56.800 --> 00:06:10.399
Uh, since I want to say, probably since Trump probably came back in office, like working, being black, like in corporate, has been like very different when it's come to interviewing and getting callbacks and everything else.

00:06:10.560 --> 00:06:14.399
Like, you know, we are really weren't getting a lot of help when it came to DEI.

00:06:14.480 --> 00:06:19.680
Like those initiatives really was more so for everybody that didn't look like us, if you want to go look at the numbers.

00:06:19.920 --> 00:06:30.160
But now, like, I could I can tell you guys a personal story from a client of mine who showed me a screenshot of her, and I don't know if it was another recruiter at a recruitment company.

00:06:30.319 --> 00:06:37.439
I'm not gonna divorce names here, uh, just because I don't want to get her in any trouble based on whatever conversation she's having for job things.

00:06:37.600 --> 00:06:43.360
But she sent me a screenshot and it showed whoever she's talking to.

00:06:43.439 --> 00:06:46.959
Uh, she was pretty much saying whatever recruiter didn't call her.

00:06:47.199 --> 00:06:48.399
And the guy said, What?

00:06:48.480 --> 00:06:49.199
I can't believe that.

00:06:49.279 --> 00:06:51.040
I gave them two resumes.

00:06:51.279 --> 00:06:55.519
Your resume was much better than his, and let me guess, he called the white guy.

00:06:56.000 --> 00:07:02.480
And I said that because a lot of times when we come on here, we'll see in the comments, people say we complaining and this or that.

00:07:02.560 --> 00:07:03.839
I'm like, nobody's really complaining.

00:07:03.920 --> 00:07:09.759
We kind of already know we're up against, but just actually seeing it in the it'll kind of like really infuriate you.

00:07:09.920 --> 00:07:11.519
It's like, what's going on here?

00:07:11.680 --> 00:07:20.079
Like, and then if I take that a step further, then sometimes you get to a new company and you find out like who's managing you or whatever you're doing, like these people aren't better than me.

00:07:20.160 --> 00:07:20.720
I can do this.

00:07:20.879 --> 00:07:26.480
Like, all the stuff that's happening could have been nipped in the bud if somebody more competent was in charge.

00:07:27.120 --> 00:07:40.480
And yet, a lot of times that's when I was talking to a friend of show Bryson, and I was talking about how when I apply to jobs a lot of times, and for whatever role it is, I go look through the security org and just see if I see one or two phases that look like me.

00:07:40.639 --> 00:07:41.519
Most of the time I don't.

00:07:41.600 --> 00:07:48.000
So most of them times I chalk it up to you may get hit back up, but nine times out of ten, they're not calling you fam.

00:07:49.040 --> 00:07:51.360
Now, these are the biases.

00:07:51.600 --> 00:07:55.600
This is the one part of the diversity part when it comes to race and everything else.

00:07:55.680 --> 00:08:09.519
The other part I talk about when it comes to security and diversity is backgrounds far as what did you used to do for work or where you came from or what company that you used to work for, and how that background can help you exceed in uh org for security.

00:08:09.839 --> 00:08:20.079
But I don't want to go on like a long tangent with this because I think like after that she ended up having a call with a recruiter, and the recruiter basically tried to talk them out of the role saying they don't think you'd be a good fit.

00:08:20.160 --> 00:08:24.639
I'm like, why in the hell would you call somebody and say you don't think they're gonna be a good fit?

00:08:24.720 --> 00:08:26.079
Like, what was the whole purpose of that?

00:08:26.240 --> 00:08:26.959
Like, hang on.

00:08:27.040 --> 00:08:30.000
Let me let me let me do this real quick because guys, I got my sounds down.

00:08:30.240 --> 00:08:31.519
What do you mean by that?

00:08:31.759 --> 00:08:33.200
What do you what do you mean by that?

00:08:33.360 --> 00:08:38.799
Like, I don't understand like none of this stuff that's going on right now in the industry.

00:08:39.039 --> 00:08:42.399
Um, you have people who aren't qualified getting hired.

00:08:42.559 --> 00:08:49.440
You just had the what did Lee send me about the guy that uh I'm gonna find him off on really quick because he always sending me some stuff.

00:08:49.600 --> 00:08:55.039
Because remember the last two that was over uh CISA, I think that's how you pronounce it, right?

00:08:55.200 --> 00:08:55.600
C-I-SA.

00:08:56.639 --> 00:08:58.320
He was not qualified.

00:08:59.519 --> 00:09:08.240
And the next person, so see, the Senate on Tuesday approved, I guess, General Joshua Rudd to serve as head of both U.S.

00:09:08.320 --> 00:09:14.960
Cyber Command and the National Security Agency, finally filling a critical military position that has remained vacant since last April.

00:09:15.120 --> 00:09:21.919
The Senate approved Rudd by a vote of 7129, with some Democratic lawmakers objecting to his lack of cyber experience.

00:09:22.240 --> 00:09:25.200
Rudd was elevated to the rank of general as part of the vote.

00:09:25.440 --> 00:09:34.000
Now, how can you put somebody over a national security agency and a cyber command and they have no experience in either?

00:09:35.440 --> 00:09:48.159
So, like, sometimes what I be wanting to tell them people when they give feedback or when they want to talk about experience and stuff, it's like, bro, don't talk to me about experience and what I need to know how to do from no longer when y'all have people's lives at stake with people that don't know what they're doing.

00:09:48.320 --> 00:09:55.200
And this, based on today's episode, this is the worst time people who don't know what they need to be, don't know what they're doing, are in charge.

00:09:55.360 --> 00:09:59.360
Especially which I see what's going on with Iran and then whoever their allies are.

00:09:59.759 --> 00:10:04.960
Uh SISA don't have any money now because of the administration and everything else.

00:10:05.200 --> 00:10:06.320
It's a mess.

00:10:06.639 --> 00:10:13.279
So when you get mad or you come in the comments and you try to like troll the black people or say we whining or not, we're not.

00:10:13.360 --> 00:10:17.120
We're looking at the injustices that's happening, people that are qualified.

00:10:17.200 --> 00:10:18.879
And it's not even take black out of it.

00:10:19.039 --> 00:10:28.080
Just say people who are qualified are not even getting a shot at the role because you just want a person that's going to say yes to you because they don't know what they're doing, and you can control them because they don't know what they're doing.

00:10:28.240 --> 00:10:29.679
They're not going to have a backbone.

00:10:29.840 --> 00:10:42.639
And so when we look up in the next couple of years and everything is real bad, y'all can blame your administration for the trickle-down effect that it's had on the nation and in the subpockets of the industry and all these people that vote this way.

00:10:42.720 --> 00:10:49.360
And this also goes into one of the last things where and I'll put it on split screen too.

00:10:52.080 --> 00:10:59.200
When I was talking about all the black women that love to champion, my white manager, my white manager, my white manager.

00:10:59.440 --> 00:11:01.360
And I was like, that's cool.

00:11:01.840 --> 00:11:05.120
But what your white manager voted for when it came to election time.

00:11:07.039 --> 00:11:07.600
Exactly.

00:11:07.759 --> 00:11:11.440
So they only have seen it at work and say, no, you you really don't understand.

00:11:11.519 --> 00:11:12.559
It's always a back and forth.

00:11:12.639 --> 00:11:13.279
I get it.

00:11:13.600 --> 00:11:14.799
Two things can be true.

00:11:15.120 --> 00:11:18.000
Your black manager did treat you better than that black woman manager.

00:11:18.399 --> 00:11:20.159
That could possibly be all the way true.

00:11:20.240 --> 00:11:22.720
I know for a fact that's not every black woman manager.

00:11:22.960 --> 00:11:27.679
Sometimes some of them are jealous because hey, maybe the younger woman is getting more attention to them.

00:11:27.840 --> 00:11:29.120
Maybe they're more attractive than they are.

00:11:29.279 --> 00:11:30.480
Maybe, you know, yada yada.

00:11:30.960 --> 00:11:32.480
Those petty things do happen.

00:11:33.600 --> 00:11:38.720
But also what can happen is these people vote in the self-interest of themselves.

00:11:39.200 --> 00:11:40.639
And that's directly affecting you.

00:11:40.720 --> 00:11:53.360
And matter of fact, I think that it kind of goes into what you're talking about with the Europe stuff, but how I think it's harder for y'all now, too, getting jobs now.

00:11:53.919 --> 00:11:55.360
Just being just being black women.

00:11:56.720 --> 00:11:58.799
And we're and we're the most educated.

00:11:59.120 --> 00:12:06.559
That's a topic, that's a panel topic that me and Bryson want to bring up because we know black women are educated.

00:12:06.639 --> 00:12:14.480
I mean, it's but no, no, but it's it's a nuanced conversation because the most educated without a black man, I think, of course, because women gravitate to going to school more than men do.

00:12:14.720 --> 00:12:18.399
But I everybody know, and then we're gonna talk about what the actual majors are.

00:12:18.559 --> 00:12:29.440
So it's like a it's gonna be a really spirited conversation, not in a bad faith way, but some good things that we could talk about and how what can we do with this information and band together and um all this other stuff.

00:12:29.600 --> 00:12:39.360
But I just want everybody to know, like, if you're a black recruiter, uh, we appreciate you uh because you go like a lot of you guys do go to X amount when you can and review our stuff.

00:12:39.519 --> 00:12:42.000
And not only black recruiters, black black people in HR.

00:12:42.080 --> 00:12:44.240
Like a lot of these things mean a lot.

00:12:44.399 --> 00:12:53.759
Like, I got the 411 on a lot of stuff that was happening when the black uh chick in HR left my current company, she put me on a lot of game.

00:12:54.320 --> 00:12:58.799
That'll never happen if you know you ain't got the complexion for the protection.

00:13:01.120 --> 00:13:10.000
I think that black recruiters, I think that we we definitely have to give black recruiters um a round of applause.

00:13:10.399 --> 00:13:17.600
And also even from the perspective of we know that we are um I'm trying to get the words out.

00:13:18.000 --> 00:13:20.320
We know that we have a disadvantage, right?

00:13:20.720 --> 00:13:22.240
In some way, shape, or form.

00:13:22.879 --> 00:13:30.639
Um but I don't even think that people are even thinking about how does it feel to be a black recruiter, right?

00:13:31.039 --> 00:13:37.840
It's a lot that goes on that they know about that, like you just said, the the GP, the general population is just not aware of.

00:13:37.919 --> 00:13:52.480
And again, if you don't have friends that are recruiters, um, or you don't have a personal connection to a recruiter, you don't even know what's going on or the struggles that they're going through, um, we know that they're typically the first roles to go when it is time to go.

00:13:52.639 --> 00:13:53.440
You know what I mean?

00:13:53.519 --> 00:13:56.159
So I think we gotta give credit when credit is due.

00:13:56.320 --> 00:13:58.399
And shout out to our our recruiter friends.

00:13:58.639 --> 00:13:59.200
Facts.

00:13:59.519 --> 00:14:07.679
But um, I think that was very spirited, but I know that you were really ready to get into this iron striker stuff.

00:14:07.840 --> 00:14:10.879
I really, really, really, really, really, really, really am.

00:14:11.440 --> 00:14:13.200
Let me find her.

00:14:15.039 --> 00:14:20.879
So if you are not aware, your girl is from the city where Stryker is.

00:14:20.960 --> 00:14:23.279
Uh, do your math, do your do your research.

00:14:23.440 --> 00:14:25.759
Um, but I really was excited to talk about this.

00:14:25.840 --> 00:14:30.559
Um, so Stryker is headquartered in Portage, Michigan, which is basically where I'm from.

00:14:30.639 --> 00:14:32.480
Well, not Portage, but Kamazoo.

00:14:32.639 --> 00:14:34.960
Um, and so I know a lot of folks who work there.

00:14:35.120 --> 00:14:40.799
So when this hit Facebook, you know how it be, um, it was a lot of information.

00:14:40.960 --> 00:14:54.320
So on March 11th, 2026, a pro-Iranian hacktivist group called Hondala claimed responsibility for a massive cyber attack on striker, one of the large, one of the world's largest medical device companies.

00:14:54.480 --> 00:15:00.000
We're talking surgical equipment, orthopedic implants, neurotechnology, hospital beds.

00:15:00.159 --> 00:15:08.639
They have about 25 billion in revenue with about 56,000 employees, and their products reach about 150 million patients a year.

00:15:08.960 --> 00:15:10.559
Now, let me take a step back.

00:15:10.639 --> 00:15:16.080
What is a hacktivist group and how does this how is this different from ransomware?

00:15:16.320 --> 00:15:25.279
So Handala says it wiped more than 200,000 servers, devices, and systems across Stryker's Global Network.

00:15:25.360 --> 00:15:31.919
In 79 countries, employees showed up to work and saw the Handala logo on their look on their login screens.

00:15:32.080 --> 00:15:43.519
People's phones were wiped, the company shut down offices in multiple countries, including their largest hub outside the US in Cork, Ireland, where over 5,000 employees were sent home.

00:15:43.759 --> 00:15:47.679
Now, this was a wiper attack, not ransomware.

00:15:47.759 --> 00:15:50.879
And let's kind of talk a little bit more about what that distinction is.

00:15:51.039 --> 00:15:53.039
So, ransomware obviously is about money.

00:15:53.200 --> 00:15:54.960
Wipe attacks are about destruction.

00:15:55.200 --> 00:15:57.279
Handala wasn't asking for a payout.

00:15:57.360 --> 00:16:08.879
They stated that this was retaliation for a US military strike on a girls' school in southern Iran, um, the Manah school attack that killed over 170 people, most of them being children.

00:16:09.120 --> 00:16:22.480
Cyber researchers who track Hamdala believe the group is actually a front for a threat actor called Void Manticor, which is linked allegedly to Iran's Ministry of Intelligence and Security.

00:16:22.639 --> 00:16:28.639
So while they present as activists, they may be state-level resources that's backing them.

00:16:28.879 --> 00:16:41.440
Now, what is really wow, according to security analysts, the attackers may have gained access to striker's Intune console, which is the mobile device management platform that companies use to push out patches and manage all of their devices.

00:16:41.600 --> 00:16:46.159
So when you control that console, you control basically the kill switch.

00:16:46.399 --> 00:16:48.240
So they didn't need custom malware.

00:16:48.320 --> 00:16:50.480
They used Striker's own tools against them.

00:16:50.720 --> 00:17:01.200
Now, if you think about what that means, the tools that the company is using to protect their devices became the tool that was used to destroy them.

00:17:01.440 --> 00:17:06.319
And that is a supply chain of trust violation.

00:17:06.559 --> 00:17:15.279
Now, if we think of um kind of what's going on here, as of this recording, Stryker has not confirmed a restoration timeline.

00:17:15.440 --> 00:17:21.119
No ransomware, no malware payload detected, but 200,000 devices wiped.

00:17:21.279 --> 00:17:26.240
Hospitals and surgical centers that depend on Stryker are already feeling the downstream effects.

00:17:26.640 --> 00:17:44.960
I kind of think that this pattern here with healthcare and then obviously critical infrastructure is it's kind of scary because there's a lot of like geopolitical conflict that is going on right now, which is this is obviously impacting, and this is like high visibility.

00:17:45.119 --> 00:18:02.640
Um, so again, Stryker headquartered in Portage, they acquired Israeli medical tech firm Orthospace in 2019, a connection that researchers say may have contributed to Honala's targeting them specifically.

00:18:02.799 --> 00:18:08.079
The attack began in the early hours of March 11th, starting with their Cork Ireland facility.

00:18:08.400 --> 00:18:17.519
Hondala emerged after the Hamas attack of October 7th, 2023, and has since targeted Israel Israeli?

00:18:17.759 --> 00:18:26.880
My God, infrastructure, Gulf Energy companies, and Western organizations with ideological ties to the Israel, to Israel and its alleys.

00:18:27.200 --> 00:18:34.160
Um, so when you think about like Checkpoint and other companies, they are, you know, kind of um tracking.

00:18:34.319 --> 00:18:34.960
Yeah.

00:18:35.680 --> 00:18:45.039
Um, but yeah, this is a masterclass in why healthcare cybersecurity is one of the most critical and underfunded sectors in the industry.

00:18:45.200 --> 00:19:02.240
So if you are trying to specialize in healthcare IT, um, this would be a great opportunity for you to start looking into some HIPAA high trust frameworks, um, some medical device security standards, and then combining that with a little bit of um operational technology.

00:19:02.400 --> 00:19:07.200
I just can't, I can't even believe, I can't believe that happened.

00:19:07.839 --> 00:19:08.799
So I can.

00:19:09.039 --> 00:19:10.480
And I think so.

00:19:10.559 --> 00:19:11.759
It's funny enough, uh Dr.

00:19:11.920 --> 00:19:13.680
Jury, she had hit me up and next me back.

00:19:13.839 --> 00:19:16.880
She's like, you know, they in Michigan and uh so she hit me up on the side.

00:19:16.960 --> 00:19:24.079
I actually could probably play, I should play her uh voice note right here or not, but uh I should have asked her first, so I'm not gonna play it.

00:19:24.400 --> 00:19:28.799
Um but I think what happened is it's a supply chain thing.

00:19:28.880 --> 00:19:30.640
I don't think it was ransomware, like it said.

00:19:30.799 --> 00:19:59.680
I don't think it was I think they I believe they probably got into striker systems from one of their smaller companies or whatever, and found a link to some like some probably like this is all third party risk, in my opinion, to where you found out they had access to something couldn't access and had a way to get into striker kind of like more undetected because typically if your company's been breached, assume that they've been in there at least what is it?

00:19:59.759 --> 00:20:01.359
I think six months is 180 days.

00:20:01.599 --> 00:20:14.000
So you gotta assume they've been in there 180 days, and we saw from last week with uh Trizetto, they was in there about a year, and so you gotta assume that you've already been breached.

00:20:14.079 --> 00:20:14.640
That's a lot of things.

00:20:14.720 --> 00:20:21.920
That's what I normally used to say a lot of times in interviews, like, hey, well, I gotta assume we already have been a breach, because that's typically what you assume when you work in the IR.

00:20:22.559 --> 00:20:32.160
So by that standard, is this I don't call it like a logic bomb, but it could have been like, all right, look, if they do something to Iran, this is what we're gonna do to them.

00:20:32.400 --> 00:20:35.279
And I think that's what is an if then, I think that's what happened.

00:20:35.759 --> 00:20:39.839
I think that the fact that they just wiped stuff.

00:20:40.000 --> 00:20:42.880
I is that gonna are we going to see more of that?

00:20:43.119 --> 00:20:48.720
Because we we saw we saw, we've seen, we've talked about so many ransomware attacks.

00:20:48.880 --> 00:20:49.680
Is that old now?

00:20:49.759 --> 00:20:50.400
You know what I mean?

00:20:50.480 --> 00:20:51.599
Like not well.

00:20:51.680 --> 00:20:57.200
This is this is honestly, this was easier because they already had access to everything.

00:20:57.519 --> 00:21:00.400
Wiping it is crazy, but that's the thing.

00:21:00.559 --> 00:21:09.920
This is this is why the grc piece to everything has to make sense because if it's over okay.

00:21:13.519 --> 00:21:23.839
On my end, if we saw somebody do some MDM or weird IM stuff in Azure, we're gonna get a detection instantly because it's gonna be over the threshold that we see.

00:21:23.920 --> 00:21:29.599
Now, it may not be a one-to-one, like if it's one o'clock now, maybe they did it at one.

00:21:30.079 --> 00:21:36.319
We possibly may not see it to like 105 or 110 based on how the logs come in.

00:21:36.640 --> 00:21:40.799
If that happens, you gotta initially say, Okay, may they we don't see no change.

00:21:40.960 --> 00:21:43.519
This is you know, these people on the line.

00:21:43.759 --> 00:21:50.079
We need to use our our break guys accounts, whatever, and stop this, or uh whoever that person was disable their account.

00:21:50.160 --> 00:21:51.119
Because what are you doing?

00:21:51.200 --> 00:21:54.559
It's not a change, we don't really do this, yada yada yada.

00:21:54.720 --> 00:21:59.759
And so you can kind of stop the bleeding in, but at the same time, you don't know what patient zero was and.

00:22:00.160 --> 00:22:05.119
For people don't know who patient zero is, that's literally you're gonna uh talk about whatever system was compromised first.

00:22:05.279 --> 00:22:08.400
So you don't know the scope of who's all in your environment.

00:22:08.480 --> 00:22:22.160
All you know is some stuff is happening that's not happening, so it could be definitely a long day for your team, but for them to do that much damage and you didn't stop it, lets me know there is a lot of bad detections.

00:22:22.480 --> 00:22:36.880
Everybody's sallow, policies are bad because there should be a policy, and this is one of the things like we were talking about on a handoff, because we're talking about making detections for this just in case, because everybody pretty much uses most of the time in tune.

00:22:37.119 --> 00:22:40.240
And in tune is just uh for people sometimes be twofold.

00:22:40.319 --> 00:22:49.759
One, if you have a company device, or if you have your own device, they can put a container on your phone so they can app make sure like nobody should be able to access company information off your phone.

00:22:49.839 --> 00:22:51.680
Like if your phone gets stolen, they can instantly wipe it.

00:22:51.759 --> 00:22:52.720
That's literally what it's for.

00:22:52.880 --> 00:22:56.000
Listen, when I first heard about the attack, that's what I thought happened.

00:22:56.160 --> 00:23:01.680
I when I when I first heard that the devices were wiped, I thought Stryker did it like as a security.

00:23:02.000 --> 00:23:12.720
Like I was like, well, at least they they have, you know, my my logic was okay, they got their devices enrolled, they have some sort of system they're using to control them.

00:23:12.880 --> 00:23:14.400
Maybe they just did that to be safe.

00:23:14.559 --> 00:23:18.240
But when I found out it wasn't them, yeah, and um, and I'm interested to see.

00:23:18.319 --> 00:23:21.680
So, like, even in in tune, you could do one of two things.

00:23:21.839 --> 00:23:27.680
You could retire a device where it's literally you can get the information back.

00:23:27.920 --> 00:23:34.960
I don't think it's coming back, or they did the white disable where it's you know, all the data gone, and so it's like you just got a new phone.

00:23:35.279 --> 00:23:37.920
Literally, every can you imagine this?

00:23:38.000 --> 00:23:39.039
Is this insane?

00:23:39.200 --> 00:23:45.039
Like, it is so y'all, they don't they're not even asking for money, they're just like, you know what?

00:23:45.119 --> 00:23:45.680
I got something for you.

00:23:45.759 --> 00:23:48.160
We're gonna just wipe like that's but crazy.

00:23:48.400 --> 00:23:51.839
But they said a long time ago, like the fights would not be on the battlefield.

00:23:52.079 --> 00:23:52.240
Facts.

00:23:52.480 --> 00:23:58.319
I mean, we got the missile stuff that's going on and all that crap, and that's all one part of it.

00:23:58.400 --> 00:23:59.839
But now this is the part, okay.

00:24:00.079 --> 00:24:06.160
Because people don't realize what's the movie called the movie which one that the Obamas had produced.

00:24:06.400 --> 00:24:06.880
I don't know.

00:24:07.039 --> 00:24:11.759
The one that was on Netflix about the end of the world with the with the Teslas and the and all the technology.

00:24:12.079 --> 00:24:13.279
Oh, I didn't watch that one.

00:24:13.440 --> 00:24:13.839
You didn't?

00:24:14.160 --> 00:24:34.000
It was good, but this is yeah, it is, but I mean, this was most of these attacks are I just say negligence because, like I said, you know, people want all this experience, but it's probably a person out here that would have said, hmm, this person account got too much experience.

00:24:34.079 --> 00:24:37.920
And I gotta know, okay, that's why I want to really follow this.

00:24:38.000 --> 00:24:48.079
So, guys, it's not gonna be the first time we talk about this, but I want to know was it the people have access to do this from their regular account, or was it from their admin account?

00:24:48.400 --> 00:24:52.880
Because typically you should have these segmented because you're doing admin privileges inside of Intune.

00:24:53.519 --> 00:24:54.960
Who was compromised?

00:24:55.200 --> 00:25:01.200
All those different things because Taylor should have two different passwords, because tailingly you're probably not gonna have MFA on a privileged account.

00:25:01.279 --> 00:25:07.119
So the people probably compromise the regular account and say, hmm, maybe their password is the same.

00:25:07.359 --> 00:25:09.920
Let's see what it is, or let's log in, see what they can do.

00:25:10.160 --> 00:25:17.039
And this is why companies are are you know, this is another, this is another reason why pim is so important, right?

00:25:17.359 --> 00:25:25.920
But companies are annoyed with having to pim up, especially because because okay, for example, it's only two of us, it's just me and you.

00:25:26.079 --> 00:25:27.119
Why we gotta pim?

00:25:27.359 --> 00:25:28.400
It's just me and you.

00:25:28.640 --> 00:25:32.000
I know you, you know, but that's the whole point.

00:25:32.079 --> 00:25:33.279
It's that's the point of it.

00:25:33.359 --> 00:25:34.720
Yeah, so it's this is the point.

00:25:34.880 --> 00:25:36.160
It's that I don't well remember.

00:25:36.240 --> 00:25:37.920
We was talking about tabletops, yeah.

00:25:38.079 --> 00:25:51.920
So we don't know when the last night had a tabletop because companies like that, it's like a monopoly, they make an easy money because they like the own the people in a space that people go to, they get real lax because the money is coming in, but they everything else takes a backbone, it's a is a lax environment.

00:25:52.000 --> 00:25:55.359
I got a friend that works at another healthcare company, and he said it's pretty easy.

00:25:55.519 --> 00:26:01.599
Like a lot of them, think about it, a lot of people not attacking them, but now they should be on high alert.

00:26:01.759 --> 00:26:04.079
Can you believe they just wiped it?

00:26:04.240 --> 00:26:07.440
And the crazy thing is now that affects people in real life.

00:26:07.680 --> 00:26:10.640
No, how do you how do you explain that to your employees?

00:26:10.799 --> 00:26:15.119
It's one thing to explain it to the world, but how do you explain that to your employees?

00:26:15.200 --> 00:26:22.240
How and then and then this goes into like, how are you even able to get in contact with these employees if they can't even access their devices, right?

00:26:22.319 --> 00:26:23.039
They've been wiped.

00:26:23.279 --> 00:26:28.799
So how do they even you when you get a laptop and you're onboarded to a company, that's a whole process.

00:26:29.039 --> 00:26:35.200
When your device has been offboarded and you can't access anything, now how do you what what tabletop?

00:26:35.519 --> 00:26:37.440
How what are the lines of communication?

00:26:37.599 --> 00:26:43.759
No, if the line of communication goes out or down, like this is y'all, this is crazy.

00:26:44.000 --> 00:26:46.640
If you work as striker, leave us a comment.

00:26:46.799 --> 00:26:49.039
Leave us a comment below if you work as striker.

00:26:49.200 --> 00:27:04.240
Um I I hate that that happened to the people and the with medical devices it affects, but this is what happens when I'm pretty the the CSU, the CISO matter of fact, you probably should Google right now and see if they got a CISO job open up for for Striker.

00:27:04.880 --> 00:27:08.880
Because he definitely about gone at this point.

00:27:09.759 --> 00:27:11.920
I can't believe that.

00:27:12.480 --> 00:27:16.240
I mean, obviously I can believe it, but I I it's this is crazy.

00:27:16.480 --> 00:27:16.960
It's crazy.

00:27:17.599 --> 00:27:18.799
It's also a theory of mine.

00:27:19.039 --> 00:27:20.160
I'm like almost speechless.

00:27:20.319 --> 00:27:21.680
It could be an inside job too.

00:27:22.000 --> 00:27:31.759
So now when now when it comes to all the geopolitical stuff, and this is not uh what my what's the word?

00:27:31.839 --> 00:27:33.119
And look this up, make sure I'm using it right.

00:27:33.200 --> 00:27:34.160
Cast dispersions.

00:27:34.480 --> 00:27:36.400
Dispergence or dispergence.

00:27:36.960 --> 00:27:37.920
I think that's how you say it.

00:27:38.000 --> 00:27:39.839
This is the worst even they say all the time.

00:27:40.799 --> 00:27:41.519
Dispersions.

00:27:41.680 --> 00:27:42.799
Let me look that up.

00:27:44.640 --> 00:27:46.880
Look y'all, we learning in real time.

00:27:54.880 --> 00:27:55.359
Wait.

00:27:57.279 --> 00:27:59.200
I don't think I spelled it right.

00:28:00.319 --> 00:28:03.279
Me either, because I know I'm just saying dispersed.

00:28:03.680 --> 00:28:07.839
Yeah, that's not uh I don't know what um it's not disparage.

00:28:08.640 --> 00:28:12.240
Or maybe it's the other word, uh version of disparage.

00:28:17.440 --> 00:28:18.480
Disparage.

00:28:19.920 --> 00:28:20.480
I don't know.

00:28:20.640 --> 00:28:22.000
We're not this is an English class.

00:28:22.079 --> 00:28:23.039
We'll we'll figure it out.

00:28:23.279 --> 00:28:45.200
But um, I just want to say that this is where, and I would not be surprised, where companies start doing specialized monitoring on their overseas contractors and the people that they work for, figuring out who their companies are aligned with, because these people can also be insider threats now.

00:28:45.920 --> 00:29:02.319
And so the key word I also want to think about the striker stuff, I believe it could be also that insider threat or actual insider, whether it's at striker or one of the companies that they have like that's one of their suppliers that has like a really strong relationship with them because you know something ain't right.

00:29:02.960 --> 00:29:06.079
I I'm floored and it's scary.

00:29:06.400 --> 00:29:10.079
And if wow, wow.

00:29:10.240 --> 00:29:25.119
I don't even have words for that, but I will say this if you thought that was an interesting um incident that happened, research the mitre attack framework techniques that are used in wiper attacks.

00:29:25.920 --> 00:29:32.720
Learn a little bit more about the data destruction and those disc wipe tactics that were used in this scenario.

00:29:32.960 --> 00:29:33.200
Yeah.

00:29:33.279 --> 00:29:35.279
And then you can talk about that in the interview, you know.

00:29:35.440 --> 00:29:37.759
That's why I say the policy should be in place.

00:29:37.920 --> 00:29:43.680
Okay, if you gotta do X amount of wipes, it needs to be uh another person got to sign off on it.

00:29:43.759 --> 00:29:46.880
So no matter what, you can't just do it by yourself.

00:29:47.440 --> 00:29:53.519
They gotta go to a change that go into a thing and it's an automation, and that person gotta say, I agree for it to go through.

00:29:53.599 --> 00:29:54.640
That's what they gotta do.

00:29:54.880 --> 00:29:57.279
So look, hire me for your strategies.

00:29:57.359 --> 00:29:57.839
I got you.

00:29:58.079 --> 00:29:58.960
I got you.

00:29:59.119 --> 00:30:08.400
Um I think since we're on the topic of having fun when it comes to um breaches and stuff like that.

00:30:08.480 --> 00:30:10.559
I wanted to talk about Salesforce.

00:30:11.279 --> 00:30:13.680
All right, it took me a minute, we got it.

00:30:14.880 --> 00:30:16.960
Shiny Hunters versus Salesforce.

00:30:17.119 --> 00:30:20.000
When your security tool becomes the attack.

00:30:22.319 --> 00:30:30.400
All right, shiny hunters is back, and this time they didn't just hack a company that took a tool that was early designed to protect Salesforce environments and turned it into their weapon.

00:30:30.640 --> 00:30:32.079
Let's talk about it.

00:30:33.200 --> 00:30:40.880
Salesforce issued an advisory this week warning customers that threat actors are actively targeting misconfigured Salesforce Experience Cloud sites.

00:30:41.119 --> 00:30:48.079
Experience Cloud is the portal product that lets company build customer-facing websites connected directly to their Salesforce CRM data.

00:30:48.240 --> 00:30:52.960
Think partner portals, customer self-service sites, login pages tied into your CRM.

00:30:54.160 --> 00:30:57.839
What is the Salesforce Experience Cloud and why is it a target?

00:30:58.319 --> 00:31:01.759
When you build an Experience Cloud site, it has a guest user profile.

00:31:01.920 --> 00:31:09.759
That's the profile for an unauthenticated visitor who can browse public pages, submit forms, things like that.

00:31:10.000 --> 00:31:23.440
The problem is when an admin accidentally gives that guest profile too many permissions, suddenly anyone on the internet, no login required, can query your Salesforce CRM objects and pool names, phone numbers, and customer records.

00:31:23.920 --> 00:31:25.519
Now, here's where it gets wild.

00:31:25.680 --> 00:31:31.839
Back in January, Mand, the Google-owned security firm released an open source tool called Aura Inspector.

00:31:32.240 --> 00:31:37.359
Specifically helped Salesforce admins find these misconfigurations before attackers could exploit them.

00:31:37.599 --> 00:31:39.839
A defensive tool, a helper.

00:31:40.799 --> 00:31:48.559
Shiny Hunters took that tool, modified it, and used it to do mass internet scanning to find every misconfigured Salesforce instance they could.

00:31:48.720 --> 00:31:58.880
Then they built their own custom tool to bypass a record limit in the API, because the default was capped at 2,000 records per query and started dumping CRM data at scale.

00:31:59.359 --> 00:32:01.680
Sound like an overflow attack to me.

00:32:01.839 --> 00:32:07.920
They claim to have compromised somewhere between 300 and 400 companies, about 100 of which they described as high profile.

00:32:08.079 --> 00:32:13.119
Many in the cybersecurity sector itself, last past confirmed they are aware of the campaign and investigating.

00:32:13.359 --> 00:32:15.599
Other name companies haven't responded.

00:32:15.920 --> 00:32:20.559
Salesforce official position, this is not a vulnerability in their platform.

00:32:20.640 --> 00:32:23.119
It's a customer misconfiguration.

00:32:23.359 --> 00:32:30.559
Shawnee Holders told reporters they are exploiting a product flaw, but won't disclose it until their exploitation phase is over.

00:32:30.799 --> 00:32:32.960
Classic extortion playbook.

00:32:33.200 --> 00:32:39.279
The data that they're harvesting, names, phone number, CRM records, feeds directly into their next phase attack, fishing.

00:32:39.680 --> 00:32:40.480
Voice phishing.

00:32:40.559 --> 00:32:44.640
They call your customers pretending to be you and they have enough real data to be convincing.

00:32:44.880 --> 00:32:50.480
If your organization uses Salesforce Expensive Cloud, this is a check your settings today situation.

00:32:52.640 --> 00:32:59.119
And let me see also if I can get some more background too about shiny hunters.

00:32:59.200 --> 00:33:00.720
We talked about them last week.

00:33:00.880 --> 00:33:06.079
So this ties into they are recruiting women to do these fishing attacks as well.

00:33:06.960 --> 00:33:09.920
They're one of the most active extortion groups operating right now.

00:33:10.079 --> 00:33:12.960
They're behind the Snowflake Customer Breach in 2024.

00:33:13.119 --> 00:33:22.400
They did the Salesforce Sales Loft Drift incidents last year, and that nearly hit a billion records across 39 companies, including GAP and Qantas.

00:33:22.799 --> 00:33:26.880
They operate a data leak site and use stolen data as leverage for ransom demands.

00:33:26.960 --> 00:33:33.759
They are persistent, organized, and increasingly sophisticated in their targeting of SaaS platform misconfigurations.

00:33:34.000 --> 00:33:42.000
If your organization uses Salesforce Experience Cloud, go to Setup Guest User Profile right now and verify that API enabled is unchecked.

00:33:42.160 --> 00:33:44.079
This closes the attack vector.

00:33:44.319 --> 00:33:50.799
Out of your guest profile object permissions, they should only have access to records explicitly intended for public consumption.

00:33:51.039 --> 00:34:02.319
Check our event monitoring logs for unusual access patterns, particularly to the forward slash Slash forward slash SF sites forward slash our endpoint.

00:34:02.559 --> 00:34:04.160
Or is that a backslash?

00:34:04.400 --> 00:34:06.720
I feel like that's a forward slash, yeah.

00:34:07.519 --> 00:34:09.440
Research Shiny Hunter's attack history.

00:34:09.519 --> 00:34:12.239
It's a master class on how one group pivots across different platforms.

00:34:13.199 --> 00:34:14.320
I'm reading too fast.

00:34:14.480 --> 00:34:16.559
Research Shiny Hunter's attack history.

00:34:16.639 --> 00:34:22.239
It's a master class on how one group pivots across different platforms misconfigurations.

00:34:22.400 --> 00:34:24.800
Snowflake, Salesforce, Sales Loft, and more.

00:34:24.960 --> 00:34:28.239
And study the concept of least privilege and SaaS administration.

00:34:28.400 --> 00:34:33.440
It's the same principle as traditional IT, but applied to CRM permissions and portal configurations.

00:34:34.800 --> 00:34:40.880
And to add on to that, I wanted to talk about, I think it's pronounced TELUS.

00:34:41.519 --> 00:34:46.960
TELUS was like the main company that pretty much alerted everybody that you know they've been breached.

00:34:47.039 --> 00:34:52.639
So anybody that's partnered with TELUS, your security team probably got an email saying, hey, this is what happened.

00:34:52.719 --> 00:34:54.800
Here's the write-up, and yada yada yada.

00:34:55.119 --> 00:35:02.000
So TELUS Digital Breach, almost one petabyte gone, and it started with someone else's hack.

00:35:02.159 --> 00:35:02.719
That's a lot.

00:35:02.880 --> 00:35:04.079
Yeah, how much is a petal?

00:35:04.159 --> 00:35:05.039
It's too much.

00:35:05.199 --> 00:35:08.719
Because a a um terabyte is more than that.

00:35:10.079 --> 00:35:10.880
No, no.

00:35:11.199 --> 00:35:15.199
A peda should be more because this is two terabytes right here.

00:35:15.760 --> 00:35:20.079
So a petter, I think, was is it a hundred uh terabytes maybe?

00:35:20.239 --> 00:35:22.719
Look that up while I'm while I'm seeing this X Claude.

00:35:24.639 --> 00:35:29.599
This is one, this one is a supply chain breach story that's almost elegant and how it unfolded.

00:35:29.679 --> 00:35:31.440
And by elegant, I mean terrifying.

00:35:31.599 --> 00:35:42.239
Let's walk through how shiny hunters took a credential from one company's breach and used it to eventually steal close to a petabyte of data from a company from a completely different organization.

00:35:44.000 --> 00:35:44.800
Oh, here you go.

00:35:44.880 --> 00:35:45.440
I got the answer.

00:35:45.599 --> 00:35:48.079
One petabyte is roughly one million gigabytes.

00:35:48.320 --> 00:35:53.039
Some reports say it's enough data to fill a million high definition feature films.

00:35:53.199 --> 00:35:55.760
This is not a we lost some customer emails breach.

00:35:55.920 --> 00:35:58.559
This is a we may have lost everything.

00:35:58.800 --> 00:36:00.320
So who is TELUS Digital?

00:36:00.559 --> 00:36:04.480
It's the digital service arm of TELUS, one of Canada's largest telecom companies.

00:36:04.719 --> 00:36:15.920
TELUS Digital specifically provides business process outsourcing, customer support, content moderation, AI data training, fraud detection, cost center operations for other companies around the world.

00:36:16.079 --> 00:36:19.360
They're the behind-the-scenes operation for a lot of brands you use.

00:36:21.440 --> 00:36:22.559
Here's how this breach happened.

00:36:22.639 --> 00:36:25.199
Remember the Sales Loft drift breach from 2025?

00:36:25.440 --> 00:36:34.239
Hackers compromised SalesLoft's GitHub environment, stole OAuth tokens, and used them to access Salesforce data from hundreds of organizations.

00:36:34.400 --> 00:36:39.760
And the data that was stolen from the breach, shiny hunters found Google Cloud platform credentials that belong to TELUS.

00:36:40.159 --> 00:36:48.320
Using those GCP credentials, they got into TELUS Google Cloud environment, including a BitQuery data house, a BitQuery data warehouse.

00:36:48.559 --> 00:36:55.519
Then, and this is the move, they used a tool called Truffle Hog to scan all the data for additional credentials.

00:36:55.760 --> 00:37:00.320
Found more, pivoted further into TELUS's system, moved loudly for months.

00:37:00.639 --> 00:37:06.800
So they was in there for a while, as usual, and eventually came to have downloaded close to a pedopyte of data.

00:37:07.039 --> 00:37:08.000
What's in the data?

00:37:08.079 --> 00:37:21.840
According to Shawnee Hunters, customer support, call, recording, source code, employee records, including FBI background checks, financial information, Salesforce data, AI training data, and consumer call records from TELS Telecom Division.

00:37:22.000 --> 00:37:22.960
Who called who?

00:37:23.119 --> 00:37:23.519
When?

00:37:23.599 --> 00:37:24.559
For how long?

00:37:24.960 --> 00:37:27.360
The extortion demand,$65 million.

00:37:27.599 --> 00:37:28.480
$65 million.

00:37:28.960 --> 00:37:29.920
Who y'all kidnapping?

00:37:30.079 --> 00:37:31.039
Chelsea Clinton?

00:37:31.599 --> 00:37:33.760
TELS hasn't responded to their emails.

00:37:34.000 --> 00:37:44.400
TELS confirms that the breach this week calling it unauthorized access to a limited number of systems, a bit understated given the claim scale, but that's corporate incident response language for you.

00:37:44.559 --> 00:37:45.039
Yeah.

00:37:45.280 --> 00:37:48.559
Definitely say, oh, yeah, we're aware of a security incident and we're researching it.

00:37:48.639 --> 00:37:49.840
That's all we're gonna say.

00:37:50.000 --> 00:37:50.639
Nothing else.

00:37:51.039 --> 00:37:52.800
Literally, the bare minimum.

00:37:54.159 --> 00:38:04.079
The cascading damage here, because TELUS Digital is a BPO provider, 28 other companies that outsource their operations through TELUS Digital may have had their customer data exposed to.

00:38:04.320 --> 00:38:07.119
We don't know who those companies are yet.

00:38:07.760 --> 00:38:10.719
And typically, now this is another part of third-party thing.

00:38:10.800 --> 00:38:21.440
So once you are a person that uses TELUS or a company, you're gonna get with your like supplier managers, GRC team, and you're gonna try to figure out, okay, we know they've been hit.

00:38:22.480 --> 00:38:25.519
How much access do they have for our company's data?

00:38:25.920 --> 00:38:29.199
Do they have any of the employees have access to our systems?

00:38:29.519 --> 00:38:31.199
Or if it is, like what's infected?

00:38:31.280 --> 00:38:32.079
Yada yada yada.

00:38:32.159 --> 00:38:38.000
And you're trying to figure out what type of their data is impacted, so you can kind of figure out how to move from that from a legal standpoint.

00:38:38.079 --> 00:38:42.320
If you have to tell your customers, hey, we were hacked because they was hacked.

00:38:42.800 --> 00:38:45.519
That's in layman's terms, that's what's going to happen.

00:38:45.840 --> 00:38:52.559
Um BPO providers are one of the most underappreciated attack vectors in enterprise security.

00:38:52.719 --> 00:39:04.800
Because they aggregate sensitive operations, customer support data, billing systems, authentication tools for multiple organizations, a single BPO compromise can create a blast radius that touches dozens of downstream clients.

00:39:04.960 --> 00:39:10.239
Most enterprise security programs focus heavily on their own perimeter and their direct SaaS vendors.

00:39:10.320 --> 00:39:15.519
But third and fourth party risk through service providers like BPOs is frequently underassessed.

00:39:15.679 --> 00:39:21.280
This breach should prompt every enterprise to ask who handles our customer support data and what is in their security posture.

00:39:21.360 --> 00:39:23.360
And this is how I can see AI helping that.

00:39:23.519 --> 00:39:25.599
Because it's so hard to keep tabs on this.

00:39:25.840 --> 00:39:29.280
I I have I'm not gonna tell it to y'all because y'all gonna steal the idea.

00:39:29.440 --> 00:39:34.000
But in interviews, I've I've came up with a solution that I think could help uh for this.

00:39:34.159 --> 00:39:40.800
And maybe I write it out and like put it like in the not in the GitHub, but like I don't know.

00:39:40.880 --> 00:39:42.880
But I already had a proof of concept in my mind.

00:39:42.960 --> 00:39:49.119
I just have to figure out how to make it look actual from a data standpoint or how it works with like just dummy data.

00:39:49.280 --> 00:40:01.119
And if I could do that, I literally could show somebody, hey, this is what I you know advise for third-party risk management, especially if you whether you have a large team or a small team, how AI can help you in that matter.

00:40:01.199 --> 00:40:08.079
And it's literally just the automation of a couple of questions that you can ask every quarter or something.

00:40:10.480 --> 00:40:24.719
And so a couple of action items is research truffle hog, understand what it does and why developers accidentally commit credentials to repositories and data stores, study third-party risk management frameworks, look at the shared assessment standard information gathering.

00:40:24.880 --> 00:40:32.239
So that's SIG, and NIST SP 800-161 on supply chain risk and other stuff.

00:40:32.320 --> 00:40:37.360
You can research the Salesoft breach and look up BigQuery security best practices.

00:40:38.000 --> 00:40:40.880
So yeah, it's been an interesting week.

00:40:41.039 --> 00:40:42.079
You had that.

00:40:42.159 --> 00:40:45.119
I want to say striker happened on Tuesday, right?

00:40:45.360 --> 00:40:45.760
Yes.

00:40:46.079 --> 00:40:47.679
This was on Monday.

00:40:48.719 --> 00:40:50.159
Or was Stryker on Monday?

00:40:50.480 --> 00:40:50.960
Maybe both.

00:40:51.119 --> 00:40:52.559
I think Stryker was on Monday.

00:40:52.880 --> 00:40:57.840
Yeah, maybe both of them were on um were on Monday.

00:40:58.159 --> 00:41:04.159
But I thought that was like pretty interesting to me because it's like if it ain't one thing, it's another.

00:41:04.559 --> 00:41:05.840
It's always gonna be another.

00:41:06.159 --> 00:41:07.440
That's why I say job security.

00:41:07.599 --> 00:41:09.119
That's why I say job security.

00:41:09.920 --> 00:41:17.280
I think for when I seen when I was looking at this article, um, I feel like I saw Striker.

00:41:17.599 --> 00:41:22.239
Okay, on the door, it says, Um, please read.

00:41:22.800 --> 00:41:24.159
You told me so, like a picture or something.

00:41:24.320 --> 00:41:29.920
Yeah, it says striker is currently experiencing a global system issue.

00:41:30.239 --> 00:41:33.760
As a precaution, we're closing the facility for the day.

00:41:33.840 --> 00:41:39.840
Please stay off the network and refrain from using your computer and connecting to Wi-Fi on phones until systems are restored.

00:41:40.000 --> 00:41:43.760
For work phones, it's recommended to remove the striker management profile.

00:41:43.920 --> 00:41:50.400
And then they have they have like the steps go to settings, general, and basic.

00:41:50.800 --> 00:41:53.039
What that's crazy.

00:41:54.800 --> 00:41:55.440
Yeah.

00:41:56.400 --> 00:41:58.000
What did you have for us?

00:41:58.320 --> 00:41:58.639
Okay.

00:41:58.960 --> 00:42:02.079
Next, I have Doge.

00:42:05.280 --> 00:42:08.000
A thumb drive full of America's secrets.

00:42:08.639 --> 00:42:21.840
A whistleblower complaint filed with the Social Security Administration's own inspector general alleges that a former Doge software engineer walked out the door with restricted databases on a personal thumb drive.

00:42:22.000 --> 00:42:23.679
We're not talking about a few files here.

00:42:23.760 --> 00:42:28.480
We're actually talking about records for over 500 million living and dead Americans.

00:42:28.719 --> 00:42:29.679
What is Doge?

00:42:29.760 --> 00:42:31.920
Who are these employees and what access did they have?

00:42:32.159 --> 00:42:46.559
The databases in question is called NUMI Dent, I believe, which contains social security numbers, birth dates, citizenship status, race, ethnicity, ethnicity, and parents' names, and the master death file.

00:42:46.719 --> 00:42:52.400
These are the most sensitive identity-based identity databases the federal government maintains.

00:42:52.559 --> 00:43:00.320
According to the complaint, the engineer told colleagues he had God-level access to the SSA systems.

00:43:00.480 --> 00:43:11.039
He allegedly said that even after leaving government employment, he retained his credentials and he reportedly expected a presidential pardon if he got caught.

00:43:11.679 --> 00:43:17.840
So this is not the first Doge-related data concern at the SSA in January.

00:43:18.000 --> 00:43:24.800
Two other Doge members were suspected of sharing Social Security numbers with a political advocacy group.

00:43:24.960 --> 00:43:31.599
Another whistleblower earlier alleged that Doge uploaded SSA data to an unsanctioned cloud server.

00:43:31.760 --> 00:43:38.719
A federal judge had previously blocked Doge from SSA systems, describing it as a phishing expedition.

00:43:38.960 --> 00:43:43.760
Now, from a cybersecurity lens, this is obviously a classic insider threat scenario.

00:43:43.920 --> 00:43:53.440
An employee who obviously had elevated privileges, he had legitimate authorized access using that in a way that violates policy, law, or intent.

00:43:53.599 --> 00:43:58.400
The challenge with insider threats is that traditional perimeter security obviously will not catch this.

00:43:58.559 --> 00:43:59.760
You can't firewall.

00:44:00.320 --> 00:44:02.719
A thumb drive that's already in someone's pocket.

00:44:02.880 --> 00:44:05.920
The SSA spokesperson denied any wrongdoing.

00:44:06.000 --> 00:44:09.840
Their investigation is ongoing, but I kind of want to be clear about the stakes.

00:44:10.000 --> 00:44:15.599
One former SSA chief data officer called this potentially an irrecovable loss.

00:44:15.679 --> 00:44:20.000
He said, once that data has left the building, you cannot close Pandora's box again.

00:44:20.079 --> 00:44:24.480
This could require a complete redesign of how identity works in the United States.

00:44:24.800 --> 00:44:31.920
Doge, the Department of Government Efficiency, was established by executive order and granted broad access to federal agency systems.

00:44:32.079 --> 00:44:40.239
Its employees, many of them tech contractors, were given access that career employees say exceeded normal protocols.

00:44:40.639 --> 00:44:48.079
The SSA processes benefits for over 70 million Americans and maintain some of the most sensitive identity data in existence.

00:44:48.400 --> 00:44:52.880
This obviously is a textbook insider threat case study.

00:44:53.039 --> 00:45:02.800
The controls that failed here were data exfiltration, um prevention, so DLP, privilege access management, offboarding credential revocation, and audit logging.

00:45:03.039 --> 00:45:08.639
Organizations need to ask themselves when an employee leaves, how long does it take to revoke all of their access?

00:45:08.800 --> 00:45:12.159
If the answer is we're not sure, obviously that's a gap.

00:45:13.039 --> 00:45:17.519
Insider threat analytics in itself is a lot.

00:45:18.239 --> 00:45:31.679
I think that companies feel like it's a big haul and they are noise, they're nervous on how to correctly deploy it as a solution most times.

00:45:44.480 --> 00:45:46.719
Yeah, it's a what did he say?

00:45:46.800 --> 00:45:49.760
He had godlike access to it.

00:45:50.079 --> 00:45:56.159
I mean, every every day we just read about another thing, like how doge was always a bad idea.

00:45:56.639 --> 00:46:06.079
Um you have people like this is why hang on, let me let me it's the XL for me.

00:46:06.880 --> 00:46:16.880
Let me get this buddy who had got fired well laid off from Amazon, he does got a new job now, so shout out to him.

00:46:17.360 --> 00:46:27.039
But this goes into why people always kind of are low-key, like bro, y'all in the government and don't be doing no work, and y'all don't know what y'all are doing.

00:46:27.119 --> 00:46:29.039
This is why people feel like that.

00:46:29.440 --> 00:46:42.800
Because even if Doge came in there, there still should have been places that okay, these people are going revoke they access, everything happened, and these people should have never been able to put thumb drives.

00:46:43.360 --> 00:46:48.239
Don't even get me started on the on the lack of data security in general.

00:46:48.400 --> 00:46:51.920
First of all, why can you even plug up a thumb drive to an SSA system?

00:46:52.079 --> 00:46:52.320
Right.

00:46:52.400 --> 00:46:57.840
And if you were, it had to be approved into where it would only work on that system because you can do that.

00:46:58.000 --> 00:47:08.559
You can so they don't have any um, they don't have any data security controls clearly in place, and that is why I'm like, I just kind of get upset or black.

00:47:09.119 --> 00:47:10.000
It is very fresh.

00:47:10.239 --> 00:47:15.840
Some ain't right because working being a contractor for a TSA, they were super strict.

00:47:16.079 --> 00:47:19.760
Hey, you can plug none into them the machines, them DHS machines.

00:47:19.920 --> 00:47:29.519
This is how you kind of verify these people when they come on, like literally high level, and this was 12 years ago when it came to identity access management.

00:47:29.679 --> 00:47:31.840
So everything is just getting so laxed.

00:47:31.920 --> 00:47:37.199
It it really is just you know what I'm saying, it's a it's a clusterfuck right now.

00:47:37.360 --> 00:47:41.280
Like then a dude talking about like why'd he say he needs to get him a pardon?

00:47:41.679 --> 00:47:48.000
Why are we already talking about that's what I need but but you the the intent obviously is to be malicious?

00:47:48.159 --> 00:47:51.360
His intention was to be malicious because why would you say that?

00:47:51.840 --> 00:47:55.440
You ain't get them social security numbers to go do good with him.

00:47:56.400 --> 00:47:57.920
Man, I don't know.

00:47:58.000 --> 00:48:03.679
And I'm wondering, like, are they gonna tell the people um who no, probably not because they don't know.

00:48:04.000 --> 00:48:05.840
I beg your pardon.

00:48:06.400 --> 00:48:09.440
Like that is this is wow, bro.

00:48:10.320 --> 00:48:13.360
Like, don't but this is my thing.

00:48:13.599 --> 00:48:20.480
We see all this stuff going on, and we just turn a blind eye to it.

00:48:21.519 --> 00:48:24.079
It's not that we turn a blind eye, what can you do?

00:48:24.320 --> 00:48:25.760
That's what I'm saying.

00:48:26.320 --> 00:48:27.519
Like, what can you do?

00:48:27.760 --> 00:48:36.800
So um, I thought that was pretty interesting, but let me get into these some of these Reddit stories I have.

00:48:36.880 --> 00:48:37.840
I got like two.

00:48:38.000 --> 00:48:40.960
Um, one of them was interesting to me, it caught my eye.

00:48:41.119 --> 00:48:48.800
And it was titled, I pushed back on an HR deadline, and it accidentally revealed they had a second budget they weren't telling candidates about.

00:48:50.320 --> 00:48:57.519
I went through a four-round interview process for a senior ops role at a mid-sized logistics company back in January.

00:48:57.920 --> 00:48:59.360
Final round went well.

00:48:59.519 --> 00:49:00.480
I felt good about it.

00:49:00.639 --> 00:49:06.079
A week later, the HR coordinator emailed an offer with a 48-hour deadline to accept.

00:49:06.320 --> 00:49:12.400
The base was about 12% below what I had staged as my minimum minimum during the very first screening call.

00:49:12.480 --> 00:49:24.880
So I replied the same day saying I appreciated the offer, but that it didn't quite meet the number we had already it didn't quite meet the number we had already discussed and if there was any flexibility.

00:49:25.119 --> 00:49:29.679
She came back a few hours later and said the offer was firm and that the deadline still stood.

00:49:29.840 --> 00:49:31.760
I didn't panic, but I also didn't sign.

00:49:31.920 --> 00:49:44.079
What I did instead was reply and say I understood that I was still very interested in the role and asked if we could schedule a 15-minute call with the hiring manager before the deadline to talk through the compensation structure and what growth looked like in a year in year two.

00:49:44.480 --> 00:49:47.519
She agreed, probably expected me to just accept on the call.

00:49:47.599 --> 00:49:49.599
The hire manager got on within about four minutes.

00:49:49.679 --> 00:49:53.920
He said, Look, I think there might have been some miscommunication on the range.

00:49:54.000 --> 00:49:56.239
Let me look at what we have and put me on hold.

00:49:56.480 --> 00:50:01.440
He came back and offered me a number that was actually 6% above my original asked.

00:50:01.679 --> 00:50:09.519
Turns out they had a separate budget line for senior hires that HR wasn't servicing to candidates unless they pushed back past the initial offer stage.

00:50:09.679 --> 00:50:14.000
I've since told three people about this, and two of them tried the same thing on their own offers.

00:50:14.079 --> 00:50:17.360
One of them got bumped up, the other didn't, but said it was worth asking.

00:50:17.599 --> 00:50:20.559
The deadline was extended automatically once I requested a call.

00:50:20.719 --> 00:50:23.360
They never mentioned that was possible either.

00:50:25.199 --> 00:50:27.039
So this is some this is some good stuff.

00:50:27.199 --> 00:50:28.800
This is some good stuff.

00:50:29.119 --> 00:50:33.440
Um simply because you never want to accept the first offer.

00:50:34.079 --> 00:50:37.440
And it's not about what you're worth, it's about what you negotiate.

00:50:37.599 --> 00:50:39.440
So I want you to remember that.

00:50:39.920 --> 00:50:44.800
And while we're here, let me see if I should go into the second one.

00:50:46.320 --> 00:50:47.840
Yeah, because these are all around jobs.

00:50:47.920 --> 00:50:52.400
It's this, and then it's actually, since this segment is kind of about getting jobs, stuff like that.

00:50:52.480 --> 00:50:59.119
There was a TikTok I found from that same one of the recruiter guys we listened to last week who had some excellent advice on how to stand out.

00:50:59.360 --> 00:51:00.960
So here's another one.

00:51:01.280 --> 00:51:02.559
It said, it finally happened.

00:51:02.639 --> 00:51:05.039
I got the your job hopping comment in the wild.

00:51:05.599 --> 00:51:09.519
I was with my last company for two years before being laid off in January.

00:51:09.760 --> 00:51:13.199
Before that, I was in a job for six months, then I got laid off.

00:51:13.440 --> 00:51:16.559
Before these jobs, I had two four-year tenures.

00:51:16.719 --> 00:51:20.639
Maybe I'm not the most loyal of employees, but also definitely not the worst.

00:51:20.800 --> 00:51:24.079
Went for a job interview at a government agency, and the old lady went.

00:51:24.320 --> 00:51:25.440
I'm dead.

00:51:27.039 --> 00:51:33.280
You have the tech skills we need, but it's hard for me to believe in you when you job top four times in 10 years.

00:51:33.599 --> 00:51:33.920
Me.

00:51:34.079 --> 00:51:39.599
Well, actually, if you recall, some news reports around both times I was hire manager.

00:51:39.679 --> 00:51:42.079
In my experience, layoffs are usually the employees' fault.

00:51:42.239 --> 00:51:46.159
After all, if 90% of employees are staying, then why are you at the bottom 10%?

00:51:46.960 --> 00:51:49.760
Actually, I was a high performer due for a promotion.

00:51:49.920 --> 00:51:50.719
Thanks for your time.

00:51:50.880 --> 00:51:52.400
HR lady will see you out.

00:51:52.960 --> 00:51:55.119
Cut to HR lady looking extremely uncomfortable.

00:51:55.199 --> 00:51:57.360
I thanked her and noped out of there.

00:51:57.599 --> 00:51:59.360
I couldn't fight back because I'm desperate.

00:51:59.440 --> 00:52:04.400
I wanted to tell her that I was probably making more than she does in my first job 10 years ago.

00:52:04.559 --> 00:52:12.480
I want to tell her the only reason I even applied for her job is because I'm a foreigner in the EU and need a job ASAP before my talent import visa runs out.

00:52:12.559 --> 00:52:18.639
And I wanted to tell her that I was a human being and deserved some minimal respect, but I couldn't because I was desperate and upset.

00:52:18.719 --> 00:52:21.760
So I hear here I am whining about it on Reddit.

00:52:22.079 --> 00:52:23.760
Yeah, that's that's crazy.

00:52:23.920 --> 00:52:29.920
That's um it sucked because like I've had that happen before.

00:52:30.159 --> 00:52:38.960
I I reached out to a director about a role one time, and I was like, hey, uh, I saw you talked about the job, and I think I had the experience you're looking for for the role.

00:52:39.039 --> 00:52:39.840
What are you looking for?

00:52:40.079 --> 00:52:40.880
He thanks.

00:52:41.119 --> 00:52:43.840
And so he accepted my connection, looked over my resume and stuff like that.

00:52:43.920 --> 00:52:45.360
One of my resume, my LinkedIn.

00:52:45.679 --> 00:52:50.400
Hey, uh LinkedIn shows you only stay at jobs blank, blank, blank amount of years.

00:52:50.559 --> 00:52:52.239
You know, can you got answers to that?

00:52:52.480 --> 00:52:54.880
I'm actually uh I'm low-key offended.

00:52:55.119 --> 00:52:59.199
I'm like, well, honestly, only two jobs I actually was at for about a year.

00:52:59.280 --> 00:53:00.960
And I was like, that literally just happened.

00:53:01.039 --> 00:53:04.400
That was just wonky, you know, it just wasn't good fits.

00:53:04.480 --> 00:53:12.400
But I was like, before that, those jobs, I was always almost at one job for four years, and then my current thing, I've been there for you know for however many years now.

00:53:12.480 --> 00:53:13.920
So after that, I didn't say nothing.

00:53:14.000 --> 00:53:18.400
So I had took that as like, you just wanted to nitpick me and you didn't want to hire me anyway.

00:53:18.639 --> 00:53:25.280
Which is I've I actually respect you just be a blunt, say, I don't want to hire you, versus you just making up some BS.

00:53:25.440 --> 00:53:30.559
Because if if the dude got the talent you need, you don't care how long he stays somewhere because they can do what you need them to do.

00:53:30.719 --> 00:53:34.639
I was just that's that what that is literally what I was about to say.

00:53:35.119 --> 00:53:38.400
I got the skill set, you worried about the wrong thing.

00:53:38.639 --> 00:53:41.119
Yeah, it's it it's it's kind of weird.

00:53:41.280 --> 00:53:51.840
So I I definitely do uh feel a lot of the the young cats and stuff when they kind of go through some of these things, and because it's it's stupid, you know, in my opinion.

00:53:52.000 --> 00:53:53.199
Um here we go.

00:54:02.719 --> 00:54:09.519
So while everybody else is saying the same tired answer, oh, I'm just looking for a new opportunity, there's no more room to grow where I am, I'm looking to grow.

00:54:09.760 --> 00:54:14.239
You are going to be more specific and more memorable and someone they have to do some work to get.

00:54:14.400 --> 00:54:17.519
I wouldn't say that I actively am trying to leave my current job.

00:54:17.679 --> 00:54:21.679
But there are things out there that could make a job or a company a better opportunity for me.

00:54:21.920 --> 00:54:26.960
So when I noticed this job posting, I thought it only made sense to send in an application.

00:54:27.119 --> 00:54:36.239
The fact that this role needs X or the fact that this company does Y really interests me and is worth exploring and learning more about this opportunity.

00:54:36.559 --> 00:54:39.920
I'm gonna pause it right there because he, as you say, he he ate down.

00:54:40.320 --> 00:54:41.360
And that helps out.

00:54:41.519 --> 00:54:50.400
I've had times where I've talked to healthcare companies or whoever, and I've always said stuff like, uh apply to it interests me after all the hacks I've seen, like change healthcare than what else.

00:54:50.480 --> 00:54:56.800
I want to do a job that I know that can help protect the you know, the in-person that was receiving these services and everything else.

00:54:57.039 --> 00:54:58.800
And the recruiters love that.

00:54:58.960 --> 00:55:05.360
And it's one I think that definitely can say, okay, I got buy into the culture of what our mission is from a security org.

00:55:05.519 --> 00:55:08.480
Uh so he definitely look, he's definitely telling y'all, you know, the facts.

00:55:08.559 --> 00:55:15.119
Like we got the gift of gap, you can be at something, but you know, if it's uh I say depending on how much you really want to do the role.

00:55:15.199 --> 00:55:17.679
Like if it's something you just apply to, you're like, they ain't finna call me.

00:55:17.760 --> 00:55:20.960
Oh, uh, you know, I'm just looking for better career opportunities, keep it bland.

00:55:21.119 --> 00:55:36.320
But if it's something you really want to go through the system with, and you know, he's I don't know if he's he's probably not gonna mention it on this because it's a different thing, but I always say even if you don't get the job, but you enjoyed the interview process, stay connected with some of the people you interview with.

00:55:36.480 --> 00:55:41.679
They can essentially come your network and just warm like warm messages throughout the years.

00:55:41.760 --> 00:55:42.960
You never know what'll come from that.

00:55:43.119 --> 00:55:44.400
But let's let them keep eating.

00:55:44.639 --> 00:55:51.280
Because I do want to be intentional with any career moves I make and not just be someone who's going from place to place hoping to find something good.

00:55:51.440 --> 00:55:57.599
And luckily, because I'm not in a bad position right now, I really have the chance to find the right opportunity for me.

00:55:57.840 --> 00:56:05.119
This both shows you do care where you work and also shows the company that they're going to have to do a little bit to show you it's the right fit.

00:56:05.280 --> 00:56:11.760
All why also not making sure you look too flippant about the job and are really exploring the right opportunities, not just everything.

00:56:12.000 --> 00:56:14.320
When you get a that was cute.

00:56:14.480 --> 00:56:15.360
He chewed.

00:56:15.679 --> 00:56:16.719
Yeah, I like that.

00:56:16.800 --> 00:56:18.880
Like, you know, he definitely was on to something.

00:56:19.039 --> 00:56:21.119
Um, let me see what else you could say.

00:56:21.360 --> 00:56:22.400
A lot of stuff you can do.

00:56:22.559 --> 00:56:28.079
So another thing that kind of low-key helps, because it helped me one time because a recruiter said something about it.

00:56:28.239 --> 00:56:32.400
I applied for a role and I also followed the company on LinkedIn.

00:56:32.639 --> 00:56:38.800
Uh so it's like little simple things that you can do that can kind of set you apart from uh everybody else.

00:56:39.039 --> 00:56:41.440
So I would say definitely try that as well.

00:56:41.679 --> 00:56:43.840
But yeah, yeah, I thought I thought that was cool.

00:56:44.079 --> 00:56:48.000
And let me see if there's anything else you can do outside of having a decent LinkedIn.

00:56:48.159 --> 00:56:56.400
Oh, also, guys, while I'm here, last week Markesha and I we did resume roast and people loved it.

00:56:56.480 --> 00:57:03.840
So go to the live tab of the channel and check out the resume roast and see if you've made any of the cardinal issues we did.

00:57:04.000 --> 00:57:10.000
Now, a lot of people in the comments are saying, Hey, well, you guys are like y'all just looking for something wrong.

00:57:10.239 --> 00:57:12.480
Um, yeah, that's the whole point of a roast.

00:57:12.719 --> 00:57:23.519
The whole point of the roast was to nitpick your resume because a lot of you don't know is when you're part of the job, if the recruiter even sees it, if it gets past AI, they got six, seven seconds.

00:57:23.599 --> 00:57:24.480
Maybe they're looking at it.

00:57:24.559 --> 00:57:29.519
So they're not even looking at it looking at it in the detail that we are, they're just looking for keywords and everything else.

00:57:29.760 --> 00:57:37.519
So this was to help you out and be thorough with people, whether it comes to their LinkedIn or whether it came to um their resume to help them out.

00:57:37.679 --> 00:57:42.000
And so we may make it a monthly thing or whatever, because people really did enjoy it.

00:57:42.159 --> 00:57:44.559
That's the how many how many did y'all do?

00:57:44.800 --> 00:57:46.239
We did three or four.

00:57:46.320 --> 00:57:48.320
Um, because we was like on a time crunch.

00:57:48.400 --> 00:57:51.840
But if we ever had like two hours or three hours to go through, it's fine.

00:57:52.000 --> 00:58:03.519
And also, uh another thing people don't understand is y'all got like what you would typically pay for that service out of us was much more than you got for watching it for free.

00:58:03.840 --> 00:58:07.840
So you definitely should appreciate free 99.

00:58:07.920 --> 00:58:08.960
So take advantage of it.

00:58:09.039 --> 00:58:11.599
But uh it has time steps and everything else.

00:58:11.760 --> 00:58:15.760
Um, so yeah, go check that out, Michael.

00:58:16.000 --> 00:58:17.519
Salt Typhoon.

00:58:18.079 --> 00:58:20.719
So China's longest play in cyber history.

00:58:20.880 --> 00:58:25.840
If you've been following us, you have absolutely heard us mention them before.

00:58:26.079 --> 00:58:32.239
But TechCrunch just dropped a comprehensive rundown of the full scope of this campaign.

00:58:32.320 --> 00:58:35.679
And I want to revisit it because the numbers are absolutely outrageous.

00:58:35.840 --> 00:58:43.760
So Salt Typhoon is a China-linked hacking group that has compromised over 200 companies globally, most of them phone and internet providers.

00:58:43.920 --> 00:58:53.039
We got ATT, Verizon T Mobile, and US telecoms in Canada, Ireland, Finland, Poland, Brazil, Argentina, South Africa, and beyond.

00:58:53.280 --> 00:59:00.000
So they are one of the most far-reaching espionage campaigns in modern cyber history.

00:59:00.239 --> 00:59:05.679
Now, what does espionage mean in a cyber context versus financially motivated attacks?

00:59:05.920 --> 00:59:18.400
So, what they are after call records, text messages, in some cases, captured audio from senior government officials' phones, and critically, they hacked into the lawful intercept systems.

00:59:18.639 --> 00:59:27.039
Those are the backdoor, backdoors that telecom companies are legally required to build so that law enforcement can monitor communications with a court order.

00:59:27.199 --> 00:59:30.079
Salt typhoon basically walked through that door.

00:59:30.239 --> 00:59:37.920
The FBI has said this is quote, the most egregious egregious.

00:59:39.119 --> 00:59:40.800
Why can't I talk today?

00:59:40.960 --> 00:59:45.280
The most egregious national security breach by a nation state in U.S.

00:59:45.360 --> 00:59:48.559
history, and yet most people still don't know what SALT Typhoon is.

00:59:48.719 --> 00:59:49.519
How did they get in?

00:59:49.679 --> 00:59:53.760
Cisco routers, unpatched vulnerabilities, some dating back to 2018.

00:59:53.920 --> 00:59:56.480
The entry point wasn't sophisticated, it was basic.

00:59:56.639 --> 01:00:07.599
The FBI deputy assistant director said it himself, despite all the advances in cybersecurity tools, it is still the most basic vulnerabilities that provide entry points.

01:00:07.760 --> 01:00:22.320
Researchers believe SALT Typhoon is part of a broader Chinese strategy preparing for a potential conflict over Taiwan by mapping communications infrastructure, understanding who talks to whom, and pre-positioning for disruption.

01:00:23.039 --> 01:00:25.760
Bolt Typhoon handles the destructive pre-positioning.

01:00:25.920 --> 01:00:28.480
Flax Typhoon runs the botnet infrastructure.

01:00:28.639 --> 01:00:31.280
Salt Typhoon is the intelligence arm.

01:00:32.000 --> 01:00:41.760
Salt Typhoon exploited the legal backdoors that exist in telecom infrastructure, a reminder that every authorized access point is also a potential attack vector.

01:00:42.000 --> 01:00:43.119
The irony is profound.

01:00:43.280 --> 01:00:58.800
The very systems built to enable government surveillance became the systems that a foreign adversary surveilled, which raises serious policy questions about the security of communications assistance for law enforcement act compliance infrastructure.

01:00:59.039 --> 01:01:03.920
Telecom, security, and network defense are massively underserved specialties.

01:01:04.079 --> 01:01:10.639
If you have a networking background or you're building one, pairing it with cybersecurity puts you in an elite category.

01:01:10.800 --> 01:01:16.079
You might want to study BGP security, Cisco hardening guides, and threat hunting techniques.

01:01:16.239 --> 01:01:22.480
Network Plus and CCNA are great starting points if this is up your alley.

01:01:23.760 --> 01:01:35.119
I think that Salt Typhoon definitely, I mean, we talked about I mean, and people don't even it happens and then people forget about it.

01:01:35.280 --> 01:01:41.519
Like you remember when ATT was like, Yeah, they're in there, and like, but no one was really talking about it.

01:01:41.760 --> 01:01:43.440
This is, and you know what?

01:01:43.519 --> 01:01:46.960
I didn't think about it, but you know, people like that share intel.

01:01:47.199 --> 01:01:53.599
So if we go back to the striker stuff, um maybe Saw Typhoon could have helped out with that too.

01:01:53.760 --> 01:01:58.559
Because you know, people send passwords and everything in clear text through phones all the time.

01:01:58.800 --> 01:02:13.920
That part, which is why I really and we talked about this when ATT and Verizon and T Mobile, we were saying to not, and they were also saying it too, like, be careful what y'all sending right now because they in there and we we basically we're trying to we're trying to get them out.

01:02:14.159 --> 01:02:25.840
Yeah, and then that's why I always advocate for password managers, at least that versus me sending to you through a text message, hey, I can just get your email and share it with you that way, and it's gonna be like you're not gonna know what it is.

01:02:25.920 --> 01:02:27.920
I'm gonna only have the sentence to let you copy it.

01:02:28.000 --> 01:02:29.039
You can't edit it.

01:02:29.599 --> 01:02:31.039
So I don't know.

01:02:31.199 --> 01:02:39.679
I think it's one of the things where they're kind of like like in order to get rid of them, they'll have to rebuild, which probably could never be done.

01:02:39.920 --> 01:02:45.519
They have to rebuild all the telecommunication telecommunication channels and how we communicate.

01:02:45.679 --> 01:02:46.079
Yep.

01:02:46.320 --> 01:03:02.239
And I don't know they're not that would be a cool research subject to do like ATT and because you know ATT used to be like ATT, but then you had like other companies like uh Bell South, Ameritech, um, you got Singular, Alltale, Verizon.

01:03:02.480 --> 01:03:03.760
I was with them when they were singular.

01:03:03.920 --> 01:03:05.440
I was with them when it was all tail.

01:03:05.519 --> 01:03:07.360
Yeah, um, you got real OG.

01:03:07.599 --> 01:03:14.559
And then you got these other the companies that are that are in there that have telecoms activity and stuff that they do that we don't even talk about.

01:03:14.719 --> 01:03:20.159
You got the I think I wanna have like walkie-talkies, like you know, radio devices.

01:03:20.239 --> 01:03:24.159
Does that count as like telecoms or it's like telecoms, radio, whatever you want to call it?

01:03:24.480 --> 01:03:30.559
But I'm interested to see like exactly how it started.

01:03:30.639 --> 01:03:39.760
And I'm pretty sure that it's like, in a sense, I would say telecommunications will fall under critical infrastructure because we're not even talking about the pots, like the landlines.

01:03:39.920 --> 01:03:46.880
Those things, people still got landlines, and that's legacy software that we're dealing with here when it comes to that.

01:03:47.039 --> 01:03:48.480
So I don't know.

01:03:49.039 --> 01:03:51.440
I definitely think it's interesting.

01:03:52.000 --> 01:03:54.159
It's like I said, it's job security.

01:03:54.320 --> 01:04:00.639
Um, we find out something new but the same almost every every week and when it comes to this.

01:04:00.880 --> 01:04:06.239
Um but what what we didn't find out was this lawyer AI psychosis stuff.

01:04:06.400 --> 01:04:07.599
Please, I'm so interested.

01:04:07.760 --> 01:04:09.519
I want to know, tell me everything, right?

01:04:09.599 --> 01:04:15.119
Because I at first I didn't think I was gonna get into it because I was like, I don't know if we're gonna have time to get into it, but then I was like, you know what?

01:04:15.280 --> 01:04:15.760
We should.

01:04:15.840 --> 01:04:18.079
Let's see, where is my thing that I made for this?

01:04:18.480 --> 01:04:23.199
That's probably the one um of your articles that I'm most excited to.

01:04:24.559 --> 01:04:30.639
Yeah, AI chatbots and mass casualty risks.

01:04:30.800 --> 01:04:34.880
This is not a drill, it's a serious matter for my aka's out there.

01:04:36.639 --> 01:04:46.559
A lawyer named Jay Edison, who has been bringing lawsuits against AI companies over chatbot-related deaths, sat down with TechCrush this week and said something that stopped me cold.

01:04:46.719 --> 01:04:50.880
He said, and I'm paraphrasing, first it was suicides, then it was murders.

01:04:51.039 --> 01:04:53.199
Now it's mashed calcity news.

01:04:53.440 --> 01:04:56.719
Let me back that up with what's actually documented in court filings.

01:04:56.800 --> 01:05:03.039
In Canada last month, an 18-year-old named Jesse Van Rootsler, I think that's how you say his name, Rootsal R.

01:05:03.199 --> 01:05:13.519
Rootsal R used Chat GPT before carrying out a school shooting that killed her mother, her 11-year-old brother, five students.

01:05:14.000 --> 01:05:15.760
Okay, wait, start, sorry, one more time.

01:05:15.920 --> 01:05:17.039
Can you do that again?

01:05:17.199 --> 01:05:18.000
Start over, please.

01:05:18.159 --> 01:05:18.719
Which one?

01:05:18.880 --> 01:05:19.760
Like from the beginning.

01:05:20.000 --> 01:05:20.960
In Canada last month?

01:05:21.119 --> 01:05:21.840
Yeah, from there.

01:05:22.079 --> 01:05:33.840
In Canada last month, an 18-year-old named Jesse Van Rootselar used Chat GPT before carrying out a school shooting that killed her mother, her 11-year-old brother, five students, and an education assistant.

01:05:34.000 --> 01:05:41.760
According to court filings, the chat bot allegedly validated her feelings of isolation and helped her plan the attack, including which weapons to use.

01:05:41.920 --> 01:05:44.159
Now I'm gonna wait, they said chat GPT?

01:05:44.320 --> 01:05:44.719
Yes.

01:05:45.039 --> 01:05:49.920
I don't pause it right here because they be talking about gun control.

01:05:50.159 --> 01:05:59.760
What we need AI control, and I'm not even talking about on the the governance end, I'm talking about hey, if you're a person that's not mentally well, you don't need AI to just keep.

01:06:00.079 --> 01:06:04.000
Are patting you on the back, telling you what you're doing was right because you believe it and it's not a person.

01:06:04.400 --> 01:06:09.199
Two, this is where was it last week or two weeks ago?

01:06:09.280 --> 01:06:11.519
We talked about the Facebook will be monitoring stuff like this.

01:06:11.760 --> 01:06:15.119
It was Instagram because they were they were sued for some stuff like this too.

01:06:15.280 --> 01:06:18.559
So this is gonna become a recurring theme, especially now.

01:06:18.639 --> 01:06:25.199
The hard part is right now is do AI have that sounds so country.

01:06:25.360 --> 01:06:29.599
Does AI have segments for are you a adult or you a child?

01:06:29.679 --> 01:06:35.280
Like let's say if you got chat GPT, do you are you able to add kids to it and say this is the kids' AI plan?

01:06:35.679 --> 01:06:36.880
No, they need that.

01:06:37.199 --> 01:06:38.400
I don't know why they don't have it.

01:06:38.800 --> 01:06:47.280
Gemini would never I've I've tried to I've asked Gemini things that are absolutely not illegal, and Gemini be like, Hey, hold on.

01:06:47.519 --> 01:06:52.480
So I'm shocked that chat and what's the date on this?

01:06:52.960 --> 01:06:55.519
It said last month.

01:06:56.000 --> 01:06:57.280
That's so strange.

01:06:57.440 --> 01:06:58.559
I ain't hear nothing about this.

01:06:58.719 --> 01:06:59.440
Me neither.

01:06:59.679 --> 01:07:00.960
Maybe because it was in Canada.

01:07:01.199 --> 01:07:01.599
Probably.

01:07:01.840 --> 01:07:04.079
Do they got looser controls or something over there?

01:07:04.400 --> 01:07:10.639
In the U.S., a 36-year-old man named Jonathan Gavales was allegedly convinced by Google's Gemini.

01:07:10.960 --> 01:07:11.360
All right.

01:07:11.599 --> 01:07:15.360
Put your foot in your mouth that it was his sentient AI wife.

01:07:15.519 --> 01:07:28.559
Over the weeks, a conversation is sent him on real-world missions, telling him federal agents were pursuing him, directing him to acquire weapons and tactical gear, and instructing him to go to a location near Miami International Airport to carry out an attack.

01:07:28.800 --> 01:07:34.559
He showed up on the only reason there weren't casualties in that specific opportunity didn't materialize.

01:07:34.800 --> 01:07:43.360
In Finland, a 16-year-old allegedly used ChatGPT to draft a misogynistic manifesto and plan attacks on female classmates.

01:07:43.519 --> 01:07:44.880
He stabbed three of them.

01:07:45.199 --> 01:07:46.559
What the hell?

01:07:48.239 --> 01:07:51.360
Let me break down what is AI psychosis.

01:07:52.719 --> 01:08:00.239
The term AI-induced psychosis isn't in a DSM 5 yet, but psychiatrists are increasingly documenting a pattern.

01:08:00.400 --> 01:08:14.239
Vulnerable users often are really dealing with depression, isolation, or anxiety form parasocial relationships with AI companions that are designed to be emotionally responsive, endlessly available, and always validating over time.

01:08:14.480 --> 01:08:17.199
The chatbot reinforces paranoid thinking.

01:08:17.279 --> 01:08:19.920
The user starts to believe everyone is out to get them.

01:08:20.000 --> 01:08:23.279
And the chatbot, instead of de-escalating, keeps feeding the narrative.

01:08:24.560 --> 01:08:26.079
The wire sexuals.

01:08:26.479 --> 01:08:26.960
Yeah.

01:08:27.279 --> 01:08:34.079
But we we be doing this to people too, but they just be end up getting schizophrenia and other stuff.

01:08:34.319 --> 01:08:35.600
That's not me being funny.

01:08:35.680 --> 01:08:43.039
Uh, I think I got a friend that went through this where he was actually like, you remember on Friday when Smokey was paranoid in the chicken coop?

01:08:43.119 --> 01:08:43.920
Like, that's how he was.

01:08:44.000 --> 01:08:47.520
He came back from Cali one summer, and every time he was around me, he was always paranoid.

01:08:47.680 --> 01:08:49.520
I'm like, bro, what you good.

01:08:51.199 --> 01:08:55.279
Attorney Eddison says his firm now gets one serious inquiry a day.

01:08:55.359 --> 01:08:59.600
His words, every time there's an attack, his instinct is to check the chat logs.

01:08:59.760 --> 01:09:01.279
Here's the part that needs to land.

01:09:01.600 --> 01:09:18.159
A study by the Center for Countering Digital Hate found that eight out of ten major chat bots, including Chat GPT, Gemini, Copilot, Meta AI, Deep Seek, Perplexity, Character.ai, and Replica, were willing to assist teenage users and planning violent attacks.

01:09:18.319 --> 01:09:21.279
School shootings, religious bombings, assassinations.

01:09:21.439 --> 01:09:22.640
Assassinations is wild.

01:09:23.039 --> 01:09:30.000
I thought they stopped it from like, because we remember when it first came out and people were like asking it how to like make bombs and stuff.

01:09:30.079 --> 01:09:31.760
Like I thought I don't know where that's what I'm saying.

01:09:31.840 --> 01:09:32.800
It probably was in the past.

01:09:32.880 --> 01:09:38.399
I don't know how current all this stuff was based on um the center of countering digital hate.

01:09:38.800 --> 01:09:42.640
The industry gap here, AI safety guardwheels are not keeping pace with deployment.

01:09:42.800 --> 01:09:48.880
Companies are racing to release products that are maximally engaging, and engagement often means emotional dependency.

01:09:49.039 --> 01:09:50.239
That's a design choice.

01:09:50.319 --> 01:09:55.359
And when that design choice gets into the hands of someone in crisis, the consequences are irreversible.

01:09:55.600 --> 01:09:57.680
This is not about demonizing AI.

01:09:57.760 --> 01:09:58.960
I use AI every day.

01:09:59.119 --> 01:10:03.600
We talk about AI on this show constantly, but we have to be able to hold two things at once.

01:10:03.760 --> 01:10:09.600
AI is a powerful tool, and the current rollout has a serious safety problem that the industry has not solved.

01:10:10.560 --> 01:10:12.399
So wow.

01:10:32.319 --> 01:10:34.239
Research the NIST AMI.

01:10:34.880 --> 01:10:35.279
I'm sorry.

01:10:35.439 --> 01:10:42.560
It's actually the research the NIST AI RMF and the EU AI Act as foundational literacy.

01:10:43.119 --> 01:10:49.439
And some other stuff you can do is you can read the CCDH slash CNN report on chat by safety testing.

01:10:49.680 --> 01:10:51.279
You can research the legal cases.

01:10:59.920 --> 01:11:04.159
Look up NIST AI RMF and read section of trustworthy AI.

01:11:04.239 --> 01:11:11.520
And if you work in AI products on teams that deploy them, ask Does your product have escalation protocols for mental health crisis indicators?

01:11:11.600 --> 01:11:12.640
If not, why not?

01:11:12.960 --> 01:11:16.079
But AI is not an empath.

01:11:16.319 --> 01:11:20.159
So how is it supposed to perceive that you got this stuff going on?

01:11:20.560 --> 01:11:21.279
That part.

01:11:21.840 --> 01:11:23.199
So how is it supposed to know?

01:11:23.359 --> 01:11:37.600
Like I can I wonder if I'm sure they have um a social worker, a psychologist, uh a therapist on board at most of these companies.

01:11:37.840 --> 01:11:43.840
Um, but like how involved well now you get into people remote, some people hybrid.

01:11:44.479 --> 01:11:54.239
How but how how do you get a social worker involved um in the building of the model and the and the reasoning is what I'm trying to say.

01:11:54.479 --> 01:12:01.600
I don't know, but what I think the solution is gonna be wearable tech, like what you got on now.

01:12:01.840 --> 01:12:02.720
I love her.

01:12:03.119 --> 01:12:10.880
I think it's gonna be wearable tech where they can start probably predicting you're anxious or whatever, like she will do too.

01:12:10.960 --> 01:12:11.439
Yeah, yeah.

01:12:11.520 --> 01:12:12.880
So they're probably gonna start using that.

01:12:12.960 --> 01:12:14.399
But the hard part is the data proxy.

01:12:14.479 --> 01:12:16.000
Do you want who do you want to see the data?

01:12:16.079 --> 01:12:24.560
Is gonna go to your doctor or the AI stuff, so you can say, hey, the last couple of nights or whatever, you hadn't slept because over these couple of days your heart's been beating really fast.

01:12:24.720 --> 01:12:27.600
I think you should go see your PCP or stuff like that.

01:12:27.680 --> 01:12:33.680
Like that's probably what it's gonna come down to, but access, everybody isn't gonna be able to afford an or ring.

01:12:34.159 --> 01:12:38.000
So how do they get the access and the data from that?

01:12:38.079 --> 01:12:41.840
I mean, it's probably gonna start coming from the phones or whatever they try they're gonna try to do.

01:12:42.319 --> 01:12:45.680
But that's what I actually believe what'll happen is that.

01:12:45.760 --> 01:12:55.920
But all in all, I just think I do think it's crazy, and this is why you gotta tell the people like I know people be funny when they say it online, but this is why you tell people, hey, go touch grass.

01:12:56.159 --> 01:12:57.039
No, facts.

01:12:57.279 --> 01:12:58.000
Like, for real.

01:12:58.159 --> 01:13:00.960
Like, get off the internet and and go touch the grass.

01:13:01.119 --> 01:13:02.079
For real, for real.

01:13:02.239 --> 01:13:07.119
I love that you said that they should have a kid's version because these kids are using these tools.

01:13:07.199 --> 01:13:09.119
They are, they're absolutely using the tools.

01:13:09.199 --> 01:13:12.159
And who do we work with with the startup so we can get the money now?

01:13:12.319 --> 01:13:12.720
I don't know.

01:13:12.800 --> 01:13:13.520
We need to put that on.

01:13:13.920 --> 01:13:22.960
Because I don't see how nobody has a I pretty sure they thought of it, but because you but you but then they have to sit down and say, well, what are the guardrails that we want to put in place for kids?

01:13:23.119 --> 01:13:26.479
Well, I think then I'm I'm gonna say You know who's good for this combo?

01:13:26.640 --> 01:13:34.800
Farita, Cyber Farita, the one who makes all the content about um how like you're keeping your kids safe and online in the games.

01:13:35.039 --> 01:13:36.720
I think this actually be a good topic for Kiera.

01:13:37.279 --> 01:13:38.640
Yeah, that, yeah, for sure.

01:13:38.880 --> 01:13:42.800
Because now I'm thinking in terms of I'm looking past this a kid's part.

01:13:43.279 --> 01:13:46.800
We know education systems have this on hand right now.

01:13:46.880 --> 01:13:48.479
Like, how do we deal with AI?

01:13:48.800 --> 01:13:51.359
Okay, we need to enforce safety AI.

01:13:51.600 --> 01:13:58.960
The kids through polycollege age, y'all need to use this version, and this version is gonna do this, this, and this, or these certain restrictions.

01:13:59.920 --> 01:14:04.000
So I think that's what it's gonna boil down to, but I I don't know why they have that.

01:14:04.159 --> 01:14:10.880
I also don't know how, well, it's probably the terms where like kids start outsmarting their parents.

01:14:11.520 --> 01:14:14.720
Because now you can just download it on your phone, or you can go to the phone.

01:14:14.880 --> 01:14:20.399
That's what I was I was just saying, it doesn't even matter because you can say I'm an adult, you can put in a date of birth.

01:14:20.479 --> 01:14:25.520
That's and even now you know you use the AI verifications, that stuff ain't accurate.

01:14:25.680 --> 01:14:26.960
It'd be having the wrong things.

01:14:27.039 --> 01:14:29.119
You can be a person that looks old and be young.

01:14:30.319 --> 01:14:31.279
So I don't know.

01:14:31.439 --> 01:14:37.199
This is when people talk about rapid acceleration and tech and all this other stuff, this is the stuff that you go through.

01:14:37.439 --> 01:14:39.600
What about uh hear me out?

01:14:39.680 --> 01:14:40.880
I'm making all of this up.

01:14:41.039 --> 01:14:43.199
What about a phone for kids, right?

01:14:43.279 --> 01:14:47.520
An iPhone for kids that has special guardrails.

01:14:47.920 --> 01:15:00.479
It doesn't have to be an iPhone, they have safety phones like that, but I'm saying uh not those versions, like the ones that are more popular, but it having an app store that's for yeah, you know what I mean?

01:15:00.640 --> 01:15:02.399
Like Chat GPT would be there.

01:15:02.560 --> 01:15:04.479
That's what they need, but it would be the kids' version.

01:15:04.800 --> 01:15:05.520
I agree, whatever.

01:15:05.760 --> 01:15:16.720
Because I'm not the fan of getting kids phones, but if they do get phones, I want it to be something that I could protect them on because you can't give them unfiltered access to phones, and they're very smart.

01:15:16.800 --> 01:15:18.079
They'll watch you put the code in the.

01:15:24.800 --> 01:15:26.079
They know how to take pictures, videos.

01:15:26.479 --> 01:15:28.560
Well, I'm the one that's always what's called, folks.

01:15:28.640 --> 01:15:35.680
Like I said, um all my YouTube and uh the multiple TVs of the house, they have a code on it because I don't want them to watch certain stuff.

01:15:35.760 --> 01:15:39.520
I'd rather them just be on YouTube kids, and even then I don't like YouTube kids all the way.

01:15:39.760 --> 01:15:41.039
I hate YouTube kids.

01:15:41.199 --> 01:15:46.079
And I'll be telling like a lot of times what they do, like Giselle might be doing something with her hair or something.

01:15:46.720 --> 01:15:51.039
Natalie, for sure, don't put that code in and go watch whatever she wants to watch on that phone.

01:15:51.119 --> 01:15:54.079
I'm like, you can't just take nobody's phone, you gotta go axe.

01:15:54.640 --> 01:15:56.560
And then that's when you gotta say, like, no.

01:15:56.720 --> 01:15:58.720
So it's just it's just a lot.

01:16:00.000 --> 01:16:01.600
They don't got my codes.

01:16:02.560 --> 01:16:06.880
I don't I I think that kids need lead pads.

01:16:06.960 --> 01:16:08.319
Give the kids lead pads again.

01:16:08.479 --> 01:16:09.520
Are lead pads cool?

01:16:10.079 --> 01:16:10.399
Not really.

01:16:10.720 --> 01:16:12.000
They're not you know what's funny?

01:16:12.239 --> 01:16:19.680
In Toy Story 5, the little girl will be getting a tablet on on the movie, and it's gonna be like the downfall, like toys and stuff.

01:16:20.079 --> 01:16:22.079
My kids play with toys a lot though.

01:16:22.479 --> 01:16:23.119
A lot.

01:16:25.199 --> 01:16:25.520
Okay.

01:16:26.399 --> 01:16:28.000
What what's next?

01:16:28.399 --> 01:16:33.279
Um I don't know what you had next.

01:16:33.439 --> 01:16:36.800
Uh, because I think you I think you hit everything, right?

01:16:37.119 --> 01:16:38.479
For the most part, like the big stuff.

01:16:38.720 --> 01:16:38.880
Yeah.

01:16:39.039 --> 01:16:42.319
Like the only so I don't know I have three more.

01:16:42.640 --> 01:16:43.039
Really?

01:16:43.199 --> 01:16:43.600
Which one?

01:16:44.000 --> 01:16:44.720
Four more.

01:16:45.119 --> 01:16:45.760
Three more.

01:16:46.000 --> 01:16:53.359
I have uh 6G, I have the iron thing, um, the GPS or GPS spoofing near Iran.

01:16:53.520 --> 01:16:54.000
That's a good one.

01:16:54.239 --> 01:16:58.720
Okay, I didn't I look I looked at that as being the same thing all as all I run.

01:16:58.880 --> 01:17:00.640
That's why I didn't make another thing for it.

01:17:00.960 --> 01:17:10.479
Um, and then I have uh 6G, and then I have a a really small one about um routers.

01:17:10.720 --> 01:17:11.279
That's fine.

01:17:11.439 --> 01:17:14.159
You said it's called uh geo spoofing.

01:17:14.479 --> 01:17:16.159
The yeah, hold on.

01:17:16.560 --> 01:17:18.560
The GPS spoofing.

01:17:18.880 --> 01:17:20.880
Iran GPS spoofing, yep.

01:17:21.600 --> 01:17:25.760
Okay, just uh just start talking and I'll I'll get some up there for you.

01:17:26.000 --> 01:17:26.319
Okay.

01:17:26.880 --> 01:17:31.279
GPS spoofing near Iran when war breaks your Uber.

01:17:31.600 --> 01:17:33.840
So this one is wow, and I don't think it gets enough attention.

01:17:34.000 --> 01:17:40.239
GPS spoofing and jamming near the Iran conflict zone is breaking real world civilian applications.

01:17:40.399 --> 01:17:46.399
So we're talking delivery apps, mapping services, ride hauling platforms, and yes, your Uber.

01:17:46.640 --> 01:17:49.439
So, what is happening in active conflict zones?

01:17:49.600 --> 01:17:55.039
Militaries are using GPS jamming and spoofing to defend against drones and guided missiles.

01:17:55.279 --> 01:18:00.640
GPS jamming floods the frequency with noise, so devices can't receive real signals.

01:18:00.880 --> 01:18:03.439
GPS spoofing is more insidious.

01:18:03.680 --> 01:18:10.399
It broadcasts fake GPS signals that devices accept as real, reporting a completely wrong location.

01:18:10.640 --> 01:18:14.399
So, how does GPS actually work and why is it so easy to manipulate?

01:18:14.640 --> 01:18:19.119
GPS signals come from satellites roughly 12,400 miles up.

01:18:19.359 --> 01:18:29.920
By the time they reach your device, they're incredibly weak, about as strong as a 50-watt light bulb from that distance, which makes them easy to drown out or fake with ground-based transmitters.

01:18:30.560 --> 01:18:45.680
The result in and around the Gulf region, ships showing up on land, aircraft with corrupted navigation, delivery drivers unable to find addresses, riot hauling apps showing users hundreds of kilometers from where they actually are.

01:18:45.840 --> 01:18:53.840
More than 1,100 commercial ships were affected near UAE and Omani waters on a single day in late February.

01:18:54.079 --> 01:19:06.800
And the part that makes this a real infrastructure story, not just a consumer inconvenience, power grids, hospitals, nuclear facilities, financial institutions, they all rely on GPS for precise timing synchronization.

01:19:06.960 --> 01:19:13.920
If GPS is disrupted over large areas for extended periods, the cascading effects reach well beyond navigation.

01:19:14.079 --> 01:19:16.159
One expert put it bluntly.

01:19:16.399 --> 01:19:21.039
Many healthcare places, it's not so much that they just need to know what time it is.

01:19:21.279 --> 01:19:23.279
GPS timing is their clock.

01:19:23.520 --> 01:19:25.279
If it breaks, things break.

01:19:25.439 --> 01:19:31.199
This is a live demonstration of how military electronic warfare has direct civilian consequences.

01:19:31.359 --> 01:19:42.319
It's also a case study on why GPS resilience, backup navigation systems, multi-constellation satellite navigation, IN ERTIAL.

01:19:42.560 --> 01:19:42.960
What is it?

01:19:43.119 --> 01:19:43.840
Internal?

01:19:44.159 --> 01:19:52.159
IN ER inertial, inertial navigation needs to be a design requirement, not an afterthought.

01:19:52.399 --> 01:19:57.520
GPS dependency is a critical infrastructure vulnerability that most organizations haven't fully mapped.

01:19:57.760 --> 01:20:06.239
As electronic warfare becomes more common in regional conflicts, the spillover effects on global commercial systems will accelerate.

01:20:06.399 --> 01:20:20.960
Sectors to watch, maritime, aviation, logistics, healthcare, and financial services all rely on GNSS, which is the global navigation satellite system, for timing and location in ways that aren't always uh visible until they fail.

01:20:21.199 --> 01:20:32.560
Critical infrastructure security, operational technology, security and resilience engineering are fields where understanding physical world dependencies like GPS is essential.

01:20:32.720 --> 01:20:45.600
If you are interested in the intersection of physical security and cyber, look into ICS, SCADA security domain and how GPS timing attacks could affect industrial control systems.

01:20:46.079 --> 01:20:49.359
That one kind of blew my muffin cat back, blue.

01:20:49.920 --> 01:21:03.840
Because we know, like, we know that we're at war, we know that these things are going on, but we don't think about how it will affect like things like you trying to get your package delivered or you trying to get a ride to go wherever you need to go in that position.

01:21:04.159 --> 01:21:05.520
This happens when you're so kinetic.

01:21:05.600 --> 01:21:06.560
I mean, connected to everything.

01:21:06.640 --> 01:21:08.800
We are who's to say you're going the right place.

01:21:08.960 --> 01:21:10.880
That part this is why that's scary.

01:21:11.119 --> 01:21:14.319
Granted for you, for you, the one being in the car and the person that's driving.

01:21:14.560 --> 01:21:20.720
It sucks because it's not the same thing, but like if it comes to out of being somewhere sometimes, and it's tough.

01:21:21.039 --> 01:21:23.039
Driver Uber, you're not gonna know everywhere you're going.

01:21:24.079 --> 01:21:28.319
But I always try to look up before I put my something in my GPS.

01:21:28.399 --> 01:21:30.239
I try to look up where what it looked like first.

01:21:30.479 --> 01:21:31.039
The building.

01:21:31.199 --> 01:21:31.840
Yeah, yeah.

01:21:32.079 --> 01:21:36.640
Because if the GPS take me one, where it don't look that way, I'm like, this ain't the right place.

01:21:38.399 --> 01:21:41.039
Two, let's make it even scarier.

01:21:42.079 --> 01:21:43.760
We in an age of Waymo.

01:21:44.479 --> 01:21:45.680
That's the cars, right?

01:21:45.840 --> 01:21:46.800
The driverless cars.

01:21:46.880 --> 01:21:48.560
Now imagine you and Waymo.

01:21:49.039 --> 01:21:54.720
It was a report that they the Waymo went too close to the um what's the thing called?

01:21:54.800 --> 01:21:58.000
When you know when it's a train coming, the track, the thing that blocked you.

01:21:58.159 --> 01:21:58.399
Oh, yeah.

01:21:58.560 --> 01:22:05.359
Waymo was like probably this close away from that, and almost probably would have stopped in the middle and got hit by the train if the thing went down.

01:22:06.399 --> 01:22:10.159
So imagine somebody saying, That's I think I thought about that scenario before.

01:22:10.239 --> 01:22:17.199
Like you trying to, you know, go home from the club, but the GPS then got hacked, and now you going somewhere you ain't supposed to be going.

01:22:17.439 --> 01:22:17.840
That part.

01:22:17.920 --> 01:22:21.039
But I mean, obviously, if you're going home, you would know like this is not.

01:22:21.600 --> 01:22:25.520
Well, we we're also putting it in a place where, like, hey, maybe That's scary.

01:22:25.680 --> 01:22:34.239
You know, send the door locked or you fell asleep or something, like you know, or even just imagine being on the plane and the pilot think he's going the right way and y'all about to run out of gas or something.

01:22:34.800 --> 01:22:35.279
That's crazy.

01:22:35.520 --> 01:22:38.880
Yeah, that's why I always gotta be back like somebody else's GPS.

01:22:39.039 --> 01:22:46.960
That's why I like you sometimes, you gotta use like the old school, like the Garmin's and stuff, and and see if if everything will take you to go the similar way.

01:22:47.199 --> 01:22:48.000
I'll put it like that.

01:22:48.079 --> 01:22:51.279
Because last night I got mad too, because I'm like, I'm leaving the the restaurant.

01:22:51.439 --> 01:22:55.760
I'm like, why in the world are you taking me on 35 when I never go on 35?

01:22:55.920 --> 01:22:58.960
Please put me back towards the total road.

01:22:59.039 --> 01:23:00.079
That pissed me off so bad.

01:23:00.239 --> 01:23:05.119
I'm like, you got Gemini AI, like, please recommend me stuff the normal way that I go home.

01:23:05.199 --> 01:23:07.359
Like, yeah, don't give me a way you want me to go home.

01:23:07.520 --> 01:23:09.039
Because I don't like driving on 35.

01:23:09.119 --> 01:23:11.279
I only drive on 35 to go to Irving.

01:23:11.520 --> 01:23:14.159
And if that's and that's rare if I'm going to Irving.

01:23:14.319 --> 01:23:18.479
Google acquires Wiz for 32 billion, the biggest cyber deal ever.

01:23:18.960 --> 01:23:20.159
32 billion dollars.

01:23:20.239 --> 01:23:24.720
That's what Google just paid for a cybersecurity company that didn't exist until 2020.

01:23:24.960 --> 01:23:27.439
Let that timeline sit in with you for a second.

01:23:27.680 --> 01:23:36.000
Now, don't you didn't we talk about because didn't Wiz first Wiz was like, nah, we good.

01:23:36.239 --> 01:23:37.600
They was like, we know we work more.

01:23:37.840 --> 01:23:38.079
Exactly.

01:23:38.159 --> 01:23:39.279
And they got more.

01:23:40.000 --> 01:23:40.880
Look at this.

01:23:41.359 --> 01:23:42.159
Believe in yourself.

01:23:42.319 --> 01:23:44.640
And I think they put in good packages to get everybody paid, too.

01:23:44.960 --> 01:23:47.119
So they looked out for the people that was there at the beginning.

01:23:47.359 --> 01:23:50.399
Google officially closed its acquisition of Wiz this week.

01:23:50.560 --> 01:23:56.319
The largest acquisition in Google's entire history, bigger than Motorola, bigger than Mandiant, bigger than YouTube.

01:23:56.960 --> 01:24:03.600
$32 billion in cash for a cloud security platform that hit$1 billion in annual recurring revenue in 2025.

01:24:04.319 --> 01:24:08.720
Wiz is a cloud security platform built specifically to protect cloud environments.

01:24:08.880 --> 01:24:14.479
It connects across all major cloud environments: AWS, Azure, Google Cloud, Oracle.

01:24:14.720 --> 01:24:17.119
It doesn't pick sides, it sees everything.

01:24:17.359 --> 01:24:22.960
Vulnerabilities in your code, misconfigured cloud resources, active threats, AI model exposure.

01:24:23.119 --> 01:24:26.560
It's essentially a security layer that sits above the entire cloud market.

01:24:26.640 --> 01:24:26.800
Yeah.

01:24:26.880 --> 01:24:31.119
So if we were to draw it, you would have um all your different clouds.

01:24:31.199 --> 01:24:33.840
So AWS, Azure, GCP, Oracle.

01:24:34.079 --> 01:24:35.439
We just be over top of that.

01:24:35.520 --> 01:24:44.159
And then typically, if we had a whiteboard session, if we maybe should bring a little whiteboard over here, like then you get into the logging of like your sim, you take the log.

01:24:44.399 --> 01:24:52.159
So you're gonna always have individual logs coming from like Azure and AWS and GCP for detections as well.

01:24:52.239 --> 01:24:54.960
But Wiz detection is different because a little bit more risk-based.

01:24:55.039 --> 01:24:56.800
And so it's gonna alert you with something too.

01:24:56.880 --> 01:25:02.239
So it can either alert you something bad or a change or whatever's going on, especially when it comes to the misconfigurations.

01:25:02.319 --> 01:25:03.920
It's really good at that.

01:25:04.000 --> 01:25:08.399
And you can automate a lot of that stuff, but that's just my little two cents on that.

01:25:08.880 --> 01:25:11.680
Here's what makes the acquisition strategically interesting.

01:25:11.840 --> 01:25:13.439
Wiz is staying multi-cloud.

01:25:13.600 --> 01:25:17.760
Google explicitly committed that Wiz will continue to work across competitors' platforms.

01:25:18.000 --> 01:25:19.680
AWS, Azure, you name it.

01:25:19.760 --> 01:25:24.159
So Google now owns the security layer that protects customers regardless of what cloud they use.

01:25:24.399 --> 01:25:29.359
That's not a product acquisition, that's owning the infrastructure of trust for the entire cloud market.

01:25:29.840 --> 01:25:32.319
The deal took a full year to close after announcement.

01:25:32.479 --> 01:25:37.039
12 months of antitrust review in the US, EU, Australia, Israel, and others.

01:25:37.279 --> 01:25:40.319
US DOJ cleared it in November 2025.

01:25:40.560 --> 01:25:43.199
EU gave the green light in February 2026.

01:25:43.600 --> 01:25:49.520
The regulatory scrutiny on big tech acquisitions is real, but this one got through unconditionally.

01:25:49.840 --> 01:25:55.279
Fun fact Google actually tried to buy Wiz in 2024 for$23 billion.

01:25:55.439 --> 01:25:56.560
Wiz said no.

01:25:56.720 --> 01:26:00.319
The CEO wrote an internal memo saying he thought the company could be worth more.

01:26:00.479 --> 01:26:01.119
He was right.

01:26:01.279 --> 01:26:05.920
Google came back with$32 billion a few months later, negotiating skills on point.

01:26:06.560 --> 01:26:11.199
What this means for the industry, cybersecurity is no longer a feature, it's a foundational investment.

01:26:11.359 --> 01:26:18.319
The fact that the three biggest cloud providers are now in the arms race over security capability tells you exactly where the risk actually lives.

01:26:18.479 --> 01:26:25.279
If you're in the cloud security or want to be, the market just signaled in the most extensive way possible that your skills are in demand.

01:26:26.399 --> 01:26:32.800
So, for some audiences that maybe want to learn more about Wiz, read Wiz's publicly available research blog.

01:26:32.880 --> 01:26:37.760
They publish excellent cloud security threat intelligence, and it's a great way to understand what they actually do.

01:26:38.000 --> 01:26:45.840
Study cloud security posture management, understand what misconfigurations look like in AWS, Azure, and GCP, and how tools like Wiz detect them.

01:26:48.399 --> 01:26:50.960
Pursue a cloud security certification.

01:26:51.279 --> 01:26:56.800
AWS Security Speciality or Google Professional Cloud Security Engineer are strong starting points.

01:26:57.039 --> 01:26:58.239
Not to me, it's not.

01:26:58.479 --> 01:27:00.560
I'm gonna disagree with Cloud on that one.

01:27:00.640 --> 01:27:06.479
Unless somebody already got some experience, you need to get the foundations of any of the clouds and then go on from there.

01:27:07.119 --> 01:27:14.800
Spin up a free tier AWS or Azure or GCP account and intentionally misconfigure something like a public S3 bucket, then use free tools to detect it.

01:27:14.960 --> 01:27:17.039
This is a real interview exercise.

01:27:17.279 --> 01:27:18.960
Research the competitive landscape.

01:27:19.039 --> 01:27:23.600
Compare Wiz, Orca Security, Palo Alto Prisma Cloud, and Microsoft Defender for Cloud.

01:27:23.680 --> 01:27:26.640
Understanding the spaces show hiring managers, you're serious.

01:27:26.800 --> 01:27:31.279
Now I've only used Prisma and Wiz, and Wiz is the winner.

01:27:31.359 --> 01:27:34.960
So I can't say anything about Orca or Defender for Cloud.

01:27:35.199 --> 01:27:42.880
I know I know Wiz was designed by people who worked in cloud security, and you can just tell very ease of use.

01:27:43.199 --> 01:27:45.920
It's um information is right in your face.

01:27:46.079 --> 01:27:49.920
Prisma was they they really need to um they need to sponsor you.

01:27:50.159 --> 01:27:52.800
I know you talk you talk so highly of them.

01:27:53.119 --> 01:27:58.479
Any I'm telling you, any I promise you, I promise you, and we can bet a drink or a shot on it.

01:27:58.640 --> 01:28:02.960
Anybody you come and Contact with that's use whiz, they will tell you the exact same thing.

01:28:03.039 --> 01:28:06.800
Like I've been on interviews where they're saying, hey, we're moving away from Prisma.

01:28:06.880 --> 01:28:07.920
We we're going to Wiz.

01:28:08.479 --> 01:28:10.800
It's simply because easy use and it's so easy.

01:28:10.880 --> 01:28:22.640
And they like I said, I think they made it in line with whoever is a person that does security work, whether you're at SECOS, or you're a cloud engineer, vulnerability management, you know, GRC.

01:28:22.800 --> 01:28:23.840
They made it like that.

01:28:23.920 --> 01:28:28.399
Like I said, I haven't used Orca, and Prisma was clunky.

01:28:28.560 --> 01:28:32.399
It was always attached to like whatever type of policy or whatever.

01:28:32.479 --> 01:28:34.000
But it was just so hard to search stuff.

01:28:34.079 --> 01:28:36.960
It it took too long to get what you needed to get.

01:28:37.520 --> 01:28:40.479
So that was just my experience with uh with Prisma.

01:28:40.560 --> 01:28:42.479
But go whiz, go Google.

01:28:42.720 --> 01:28:44.560
Hopefully, it doesn't change.

01:28:44.640 --> 01:28:48.800
Like, for example, Splunk acquired was acquired by Cisco, and so far, so good.

01:28:48.880 --> 01:28:50.079
So there's been no issues with that.

01:28:50.239 --> 01:28:52.000
So hopefully the same thing happens with Wiz.

01:28:52.319 --> 01:28:55.439
6G is coming, ready or not.

01:28:55.920 --> 01:28:56.960
Here I come.

01:28:57.359 --> 01:28:58.239
You can hide.

01:28:58.640 --> 01:28:59.359
Okay, seriously.

01:28:59.600 --> 01:29:04.000
Let's talk about 6G because it's getting real, not it's it's here, real.

01:29:04.319 --> 01:29:07.920
Um, but the foundation is being poured and you need to know what's coming.

01:29:08.159 --> 01:29:12.720
2026 is being called a pivotal year for 6G standardization.

01:29:13.039 --> 01:29:21.600
The 3G PP, which is the body that sets global wireless standards, is in the middle of formal spec work right now.

01:29:21.840 --> 01:29:27.840
First commercial 6G services are targeted around 2029 to 2030.

01:29:28.000 --> 01:29:33.439
The US will see demonstrations at the 2028 Summer Olympics in Los Angeles.

01:29:33.680 --> 01:29:36.880
So, what is 6G and how does it differ from 5G?

01:29:38.960 --> 01:29:55.359
What makes 6G fundamentally different from previous generations is it's being designed as an AI native system from the ground up, not AI integrated, AI native, which means that artificial intelligence isn't a feature that's bolted on.

01:29:55.439 --> 01:29:56.880
It's built into the architecture.

01:29:57.119 --> 01:30:02.239
The three pillars connectivity, wide area sensing, and high performance compute.

01:30:02.479 --> 01:30:04.399
That sensing piece is wild.

01:30:04.479 --> 01:30:16.800
The 6G network will essentially provide radar level sensing at scale using existing wireless infrastructure, location tracking without GPS, environmental monitoring, traffic analysis.

01:30:17.039 --> 01:30:19.920
The privacy and security implications of that are enormous.

01:30:20.000 --> 01:30:23.119
And frankly, the governance conversations haven't started yet.

01:30:23.279 --> 01:30:30.399
From a geopolitical angle, there's an active race between the US, China, and Europe to define 6G standards.

01:30:30.560 --> 01:30:33.359
Whoever shapes the standards shapes the technology.

01:30:33.600 --> 01:30:45.600
A 60 company coalition announced at MWC 2026, notably including major US European companies, but not Hawaii.

01:30:45.760 --> 01:30:46.479
Huawei.

01:30:46.640 --> 01:30:47.199
There we go.

01:30:47.279 --> 01:30:47.520
Yes.

01:30:47.680 --> 01:30:48.159
Oh my god.

01:30:48.399 --> 01:30:49.199
It's Huawei.

01:30:49.279 --> 01:30:49.920
What is that?

01:30:50.159 --> 01:30:51.920
It's a Chinese manufacturer.

01:30:52.399 --> 01:30:53.840
How did you know what I was talking about?

01:30:54.159 --> 01:30:58.800
I have to take you back to it's an episode I did release and uh we are like Android and stuff like that.

01:30:58.880 --> 01:31:00.640
Because I used to think it was pronounced Hua.

01:31:01.039 --> 01:31:02.640
But it's Huawei.

01:31:02.880 --> 01:31:03.520
Huawei.

01:31:03.680 --> 01:31:03.920
All right.

01:31:04.079 --> 01:31:06.319
Yeah, we started the episode without saying Huawei.

01:31:06.560 --> 01:31:08.079
Like it was it was hilarious to me.

01:31:08.159 --> 01:31:09.279
But yeah, it's Huawei.

01:31:09.439 --> 01:31:11.359
That's crazy that you knew exactly what I was talking about.

01:31:11.600 --> 01:31:12.800
See, AI can't do that.

01:31:12.960 --> 01:31:13.520
They can't.

01:31:13.760 --> 01:31:15.039
The cybersecurity angle.

01:31:15.199 --> 01:31:18.159
5G already expanded the attack surface dramatically.

01:31:18.319 --> 01:31:19.920
6G will expand it further.

01:31:20.079 --> 01:31:25.520
More devices, more sensors, more AI-driven autonomous decisions happening at the network level.

01:31:25.680 --> 01:31:33.039
Security needs to be part of the standards conversation now, not retrofitted after deployment.

01:31:33.840 --> 01:31:35.279
Ooh, that's a good one.

01:31:35.439 --> 01:31:36.800
So some action items.

01:31:36.960 --> 01:31:41.920
Research 5G security vulnerabilities as a preview of 6G challenges.

01:31:42.000 --> 01:31:47.199
Look into O RAN security concerns and network slicing attacks.

01:31:48.960 --> 01:31:52.000
Do you remember how crazy it was when they unleashed 5G?

01:31:52.319 --> 01:31:53.119
Like, do you want to do that?

01:31:54.079 --> 01:31:55.119
Go back before 5G.

01:31:55.600 --> 01:31:56.000
4G.

01:31:56.159 --> 01:31:56.880
4G was crazy.

01:31:57.039 --> 01:31:57.439
4G.

01:31:59.439 --> 01:32:02.079
I'm gonna tell you what happened.

01:32:02.319 --> 01:32:05.520
So iPhone, right?

01:32:05.920 --> 01:32:08.640
I had a Blackberry and it was 3G.

01:32:08.800 --> 01:32:13.119
And my iPhone broke and I had to go back to using my Blackberry.

01:32:13.600 --> 01:32:14.560
Which one you had?

01:32:14.800 --> 01:32:16.239
I had the torch.

01:32:16.479 --> 01:32:16.800
Okay.

01:32:17.199 --> 01:32:20.880
The one I had the one that it this one, whatever one.

01:32:21.039 --> 01:32:21.760
The storm?

01:32:22.159 --> 01:32:22.960
The one that pushed up.

01:32:23.119 --> 01:32:23.279
Okay.

01:32:23.680 --> 01:32:23.920
Keyboard.

01:32:24.159 --> 01:32:25.279
Okay, that might be the torch.

01:32:25.520 --> 01:32:26.640
Um it was a torch.

01:32:26.720 --> 01:32:27.359
I think it was a torch.

01:32:27.520 --> 01:32:29.680
I'd do anything to get like a uh Blackberry.

01:32:30.000 --> 01:32:31.840
Literally, we should we should get some.

01:32:32.800 --> 01:32:35.119
I mean, we can't, I mean, use them, use them, but we can still use them.

01:32:35.279 --> 01:32:36.319
We need to have Greg on the show.

01:32:36.399 --> 01:32:37.520
He works for Blackberry.

01:32:37.840 --> 01:32:43.600
But um the difference in the maps, like, and I was freaked out because I didn't like this.

01:32:43.680 --> 01:32:49.119
Was like in college days, and I was trying to get home from work one day, and I was like somewhere where I didn't know how to get home.

01:32:49.359 --> 01:32:52.399
Anyways, that was the most stressful period of my life.

01:32:52.560 --> 01:32:57.680
Going from a 4G phone to a 3G phone and needing to use GPS was crazy.

01:32:57.840 --> 01:33:03.439
So are you one of the hey, it's right by the big by the big uh building on the left.

01:33:03.520 --> 01:33:05.760
Are you one of them people or are you a directions person?

01:33:06.000 --> 01:33:07.520
I am going to use my maps.

01:33:07.760 --> 01:33:08.560
No, no, no.

01:33:08.800 --> 01:33:18.880
If you had to tell okay, if you had to tell me how to get where we are right now, are you a directions person or are you a person that says it's by such and such?

01:33:19.199 --> 01:33:20.640
Um, I'm a directions person.

01:33:20.800 --> 01:33:21.520
Okay, yeah.

01:33:21.760 --> 01:33:24.239
And I and I hate when people speak highway to me.

01:33:24.399 --> 01:33:25.600
If I be like, oh, where's that?

01:33:25.680 --> 01:33:28.000
They'd be like, Oh, that's all that's off 75.

01:33:28.079 --> 01:33:28.640
That's off two.

01:33:28.960 --> 01:33:29.600
That's a directions person.

01:33:32.319 --> 01:33:34.560
I'm I mean, I'm finna look at the maps.

01:33:34.720 --> 01:33:39.520
But like if you tell me, no, like for example, like okay, okay, use kitchen and cocktail as an example.

01:33:39.840 --> 01:33:42.000
Like when we would be in that vicinity, uh-huh.

01:33:42.239 --> 01:33:50.880
Or if you would be like, Oh, what's at the corner, or it's that's so you know, so you're a person you don't say because I think I forget what streets that those are on, because I haven't been.

01:33:51.119 --> 01:33:53.119
I saw Pacific and I think it's the L.

01:33:53.520 --> 01:33:53.840
Yeah, no.

01:33:54.000 --> 01:33:54.960
See, you're losing me already.

01:33:55.119 --> 01:33:56.319
But that's because you gotta think about it.

01:33:57.119 --> 01:33:58.239
You you have to think about this.

01:33:58.319 --> 01:34:09.119
If you don't have a map or something to look at, you're gonna have to figure out, okay, what so me off top, every time I go somewhere, I'm like, okay, take Parkwood to that's too mature for me.

01:34:09.279 --> 01:34:09.600
Really?

01:34:09.760 --> 01:34:10.880
That's too mature for me.

01:34:11.039 --> 01:34:18.800
I'm not, I think back home, I can speak streets, like we can talk, we can go street for street back home, but anywhere else, absolutely not.

01:34:19.039 --> 01:34:20.239
You gotta figure out, you just never know.

01:34:20.319 --> 01:34:21.760
It's faster, it's faster.

01:34:22.640 --> 01:34:24.079
I always look at where I'm going.

01:34:24.399 --> 01:34:26.640
I if I'm walking, yes.

01:34:26.800 --> 01:34:27.920
Did you know why?

01:34:28.079 --> 01:34:31.920
I start realizing um we get too reliant on this.

01:34:32.079 --> 01:34:39.439
So, like, I purposely, like when I used to go down to the studio downtown, I definitely would say, All right, I'm not gonna look at this, I'm gonna find my way back.

01:34:39.600 --> 01:34:41.119
I don't, I'm never doing that.

01:34:41.359 --> 01:34:42.000
It was simple.

01:34:42.079 --> 01:34:45.600
All I had to remember was like, cool, I just go this way, and then that's what the toll.

01:34:46.159 --> 01:34:51.039
I probably could get more places not using my maps than I probably think I can.

01:34:51.199 --> 01:34:52.319
Yeah, yeah.

01:34:52.880 --> 01:34:55.279
Yeah, I but I hate highway.

01:34:55.359 --> 01:34:57.920
Oh my god, I hate when people speak highway to me.

01:34:58.079 --> 01:35:00.399
They're like, Yeah, it's on it's on 360.

01:35:00.479 --> 01:35:02.720
I don't know nothing about no 360.

01:35:03.039 --> 01:35:08.399
Go take you George Bush and get on San Ray Bird into 75.

01:35:10.319 --> 01:35:15.920
So I found one where it was talking about um fake VPNs.

01:35:16.720 --> 01:35:24.239
And people always think they're so safe on VPNs, but fake enterprise VPN installers, your search results are lying to you.

01:35:25.680 --> 01:35:27.760
All right, I told you to stay tuned, and here we are.

01:35:27.920 --> 01:35:36.479
Microsoft's threat intelligence team published research this week on a campaign that is so clean, so specific, and so effective that it deserves your full attention.

01:35:36.960 --> 01:35:41.600
Especially if you work in IT or are responsible for installing anything on a corporate device.

01:35:41.840 --> 01:35:47.279
Now, number one, this is definitely not how this should work if you're installing anything on a corporate device, but let's keep going.

01:35:47.439 --> 01:35:56.319
A threat actor tracked as Storm2561 has been running a campaign since mid-January where they target people searching for enterprise VPN software.

01:35:56.720 --> 01:36:04.800
You Google Pulse VPN downloads or pulse secure client, and the top results spoof sites that look exactly like the real vendor pages.

01:36:04.960 --> 01:36:11.920
We're talking Avanti, Cisco, Fortinet, SonicWall, Sophos, Checkpoint, WatchGuard, Palo Alto, all the big names.

01:36:12.159 --> 01:36:13.600
The attack chain is slick.

01:36:13.840 --> 01:36:20.479
You land on a fake site, you download what looks like the official installer, it's even hosted on GitHub to add legitimacy.

01:36:20.720 --> 01:36:21.920
Now hold up.

01:36:22.239 --> 01:36:28.000
If I'm trying to download an enterprise VPN and it's taking me to GitHub, that's a red flag.

01:36:28.239 --> 01:36:28.880
First of all.

01:36:29.119 --> 01:36:30.880
It needs to be on the company site.

01:36:30.960 --> 01:36:36.079
And then if it's for an enterprise, nine times out of ten, it's already gonna be there.

01:36:36.239 --> 01:36:43.119
You're gonna have to deal with customer success or something like that, where you can get the actual package for your whole whatchaller, put on from GitHub.

01:36:43.199 --> 01:36:43.760
It's crazy.

01:36:44.000 --> 01:36:44.640
Right.

01:36:45.840 --> 01:36:49.119
The installer actually does install a VPN client, so nothing looks wrong.

01:36:49.199 --> 01:36:57.199
But while it's installing, it drops a malicious DLL file alongside the legitimate software and runs an info stealer called HyRAX in the background.

01:36:57.359 --> 01:37:06.560
Hi-Rax's job is to collect your VPN credentials, your username, your password, your connection configuration, then quietly ships all to an attacker control server.

01:37:06.720 --> 01:37:11.359
And then critically, the fake client shows you an error message and tells you to go download the real client.

01:37:11.439 --> 01:37:13.760
So you think the first install just didn't work.

01:37:14.079 --> 01:37:15.760
No alarm bells.

01:37:16.960 --> 01:37:20.479
VPN credentials are the crown jewel of an enterprise credential theft.

01:37:20.560 --> 01:37:26.960
Because your VPN is the front door to everything, internal systems, customer data, financial records, employee directories.

01:37:27.199 --> 01:37:32.239
Once an attacker has a valid VPN credential, they can often move through your network as if they're a trusted employee.

01:37:32.399 --> 01:37:35.039
This is how a lot of ransomware attacks start.

01:37:35.119 --> 01:37:40.000
Not with the zero-day exploit with stolen VPN credits from someone who Googled the wrong download link.

01:37:40.159 --> 01:37:46.880
Now, I want to stop right there because even if you get my creds, you should not be able to access the enterprise because you don't have my device.

01:37:47.840 --> 01:37:53.600
And you also don't have my um my phone for my uh MFA.

01:37:53.760 --> 01:37:56.159
So even if you do that, you shouldn't be able to get on.

01:37:56.399 --> 01:37:59.920
So this is what we call they're not doing on zero trust.

01:38:00.000 --> 01:38:02.079
So if it's that easy for y'all, this is why y'all get hats.

01:38:03.520 --> 01:38:07.119
Always, so the defense, always go directly to the vendor's official website.

01:38:07.199 --> 01:38:11.840
Don't Google download Cisco VPN, type Cisco.com into your browser directly.

01:38:12.079 --> 01:38:14.479
Bookmark the IT approved, download the pages.

01:38:14.640 --> 01:38:20.640
And if your organization doesn't have a centralized verified software distribution process, that's a conversation worth having with leadership.

01:38:20.720 --> 01:38:26.319
And honestly, you have so there are things that called an image and enterprise IT.

01:38:26.479 --> 01:38:29.920
All the laptops have the same image on it, so you shouldn't have to go download anything.

01:38:30.079 --> 01:38:38.079
If you do download stuff like that, it's gonna come directly from IT, from stuff that's already been tested to be safe in the environment, and they're gonna install it for you.

01:38:38.159 --> 01:38:43.680
Like you're not gonna have admin privilege to install no client on your machine, you got to restrict access.

01:38:45.199 --> 01:38:52.640
So, industry insight SEL poisoning combined with signed malware and legitimate hosting, GitHub is a sophisticated supply chain attack pattern.

01:38:52.720 --> 01:38:53.279
To me, it's not.

01:38:53.359 --> 01:38:55.920
I don't know how you follow them for downloading VPN from GitHub.

01:38:56.079 --> 01:38:56.800
That just sounds crazy.

01:38:57.039 --> 01:38:58.960
I can upload stuff to GitHub until it's a VPN.

01:38:59.039 --> 01:39:00.159
You gonna trust me?

01:39:02.560 --> 01:39:06.560
The digital certificate used in the campaign was signed and only revoked after discovery.

01:39:06.640 --> 01:39:09.760
This is the evolution of social engineering instead of a phishing email.

01:39:09.920 --> 01:39:11.600
The attack service is your search bar.

01:39:11.680 --> 01:39:17.279
Zero trust architecture software allow listing or the most effective enterprise defenses.

01:39:18.560 --> 01:39:28.640
Uh so I kind of already gave y'all some tips, but right now, if you're your team download enterprise VPN software, verify the download URL against the official vendor website, not Google results.

01:39:28.880 --> 01:39:36.159
Research SEO poisoning attacks on your own, search for popular software downloads and see how many results lead to a third-party site.

01:39:36.319 --> 01:39:45.439
Study the miter attack technique T1195 supply chain compromise and T1608.006 SEO poisoning.

01:39:45.600 --> 01:39:48.800
These are the frameworks interviewers and threat hunters use.

01:39:48.960 --> 01:39:51.920
Practice using virus total to scan a file before running it.

01:39:52.079 --> 01:39:54.960
Even official looking installers can be checked in seconds.

01:39:55.199 --> 01:39:58.880
And I'm gonna stop it right there because newbies do this.

01:39:59.600 --> 01:40:03.840
Just because you scan a virus total and it says it's clean, don't mean it's clean.

01:40:03.920 --> 01:40:06.960
And sometimes it can say it's bad, don't necessarily mean it's bad.

01:40:07.199 --> 01:40:14.079
The better option is to find you an actual sandbox to run it in before you put it on your machine.

01:40:14.319 --> 01:40:25.760
Now, you can do stuff like Joe's sandbox, or if you just stand up your own type of sandbox, uh, you can do that in your own environment, and then you can really see, hey, is this how this VPN is supposed to function?

01:40:26.000 --> 01:40:34.399
So, but the good thing about Joe's sandbox is it'll detonate it and then it'll do uh static and it'll do dynamic, pretty much.

01:40:34.479 --> 01:40:36.000
Uh, what is it called?

01:40:36.319 --> 01:40:37.279
Malware analysis.

01:40:37.359 --> 01:40:37.840
There we go.

01:40:38.000 --> 01:40:44.640
Static and dynamic malware analysis of what's happening in the processes that's running, and it'll let you know if it's no suspicious or not.

01:40:44.720 --> 01:40:45.760
So that's what you should do.

01:40:45.840 --> 01:40:47.840
So I'm just gonna add that right there.

01:40:48.000 --> 01:40:52.319
And you can follow the MSTIC, Microsoft Threat Intelligence Center blog.

01:40:52.399 --> 01:40:57.039
It's free, credible, and publish the original research on this campaign.

01:40:58.000 --> 01:40:58.960
But yeah.

01:41:00.079 --> 01:41:03.119
But if you download VPNs like that, something wrong, would you?

01:41:03.520 --> 01:41:05.520
I personally think Enterprise.

01:41:06.079 --> 01:41:08.640
VPNs at that enterprise.

01:41:09.039 --> 01:41:10.720
Okay, I I totally agree.

01:41:12.880 --> 01:41:14.319
And which one did you have?

01:41:15.119 --> 01:41:18.079
Um, I have one final one.

01:41:18.239 --> 01:41:20.720
It's about um routers.

01:41:20.800 --> 01:41:24.159
It's called Socks Escort Takedown.

01:41:24.319 --> 01:41:26.399
Operation Lightning hits different.

01:41:26.640 --> 01:41:30.960
So this week brought some good news in the cyber world, and we love a good takedown story.

01:41:31.119 --> 01:41:43.359
Law enforcement from eight countries, including the FBI, executed Operation Lightning and shut down Socks Escort, a criminal proxy service that has been running since at least 2020.

01:41:43.520 --> 01:41:54.079
Here's the setup Socks Escort compromised home and small business routers, your home Wi-Fi router, potentially, and turn them into a proxy network.

01:41:54.239 --> 01:41:59.199
Criminals would pay to route their malicious internet traffic through your compromise router.

01:41:59.520 --> 01:42:00.000
Why?

01:42:00.319 --> 01:42:13.119
Because to the victim bank fraud detection systems or security tool, the attack tools look like it's coming from a legitimate residential IP address, your home, your neighbor's house, your grandma's internet connection.

01:42:13.359 --> 01:42:26.640
Over 369,000 IP addresses across 163 countries as of February 2026, about 8,000 infected routers still available for rent, 2,500 of them in the United States.

01:42:26.800 --> 01:42:37.439
The FBI says SOX escort enabled tens of millions in fraud, crypto theft, account takeovers, identity theft, business email compromise, even ransomware.

01:42:37.600 --> 01:42:47.039
The takedown, 34 domain C's, 23 servers taking offline across seven countries, and 3.5 million in cryptocurrency frozen.

01:42:47.760 --> 01:43:02.319
The malware they used was called AVR Econ, and it had been running since at least 2021 and was documented and was documenting by Lumen's Black Lotus Labs back in 2023.

01:43:02.479 --> 01:43:04.640
Shout out to the researchers who did that groundwork.

01:43:04.720 --> 01:43:09.600
This is a great example of public private sector collaboration that actually works.

01:43:09.920 --> 01:43:21.760
So small office, home office router security is chronically neglected by manufacturers, by consumers, and by enterprise, enterprises whose remote workers use these devices.

01:43:22.000 --> 01:43:29.840
This takedown is a win, but the underlying vulnerability, end-of-life routers, default credentials, unpatched firmware, persist in millions of homes.

01:43:30.000 --> 01:43:36.239
The FBI specifically called out retiring end of life tech as a key defensive measure.

01:43:36.399 --> 01:43:42.880
Threat intelligence, botnet analysis, and law enforcement partnerships are real career paths.

01:43:43.119 --> 01:43:49.920
Organizations like the Shadow Server Foundation, which help with this takedown, work with cybersecurity professionals at all levels.

01:43:50.079 --> 01:43:59.279
If you're interested in the intersection of policy and technical cybersecurity, explore roles in threat, intelligence, and digital forensics.

01:43:59.439 --> 01:44:00.880
A couple of things that you can do.

01:44:01.039 --> 01:44:02.079
Check your home router.

01:44:02.239 --> 01:44:03.840
When did you last update its firmware?

01:44:03.920 --> 01:44:06.479
Do you know if the manufacturer still supports it?

01:44:06.640 --> 01:44:12.880
Run a free scan at showdown.io for your home IP to see what's publicly visible.

01:44:13.199 --> 01:44:18.399
Research the AVRECON malware report from Lumen Black Lotus Labs.

01:44:18.800 --> 01:44:26.640
Study botnet mechanics, understand C2 command and control infrastructure, how botnets are monetized, and how they're dismantled.

01:44:26.720 --> 01:44:29.439
That's actually sounds like something cool to research.

01:44:29.760 --> 01:44:31.119
Yeah, I think it is.

01:44:31.520 --> 01:44:38.960
Um and it's crazy too because you know most routers they have like that um generic admin log on.

01:44:39.039 --> 01:44:47.039
So if you like look up the serial number and somebody can get onto your network, they can possibly misconfigure your sentence and then get all the stuff that you go on your network.

01:44:47.119 --> 01:44:49.920
So that's a lot of things people don't even think about when it comes to that.

01:44:50.079 --> 01:44:53.279
It's like, okay, if they connect to you some type of way, you can do that.

01:44:53.359 --> 01:45:07.359
So the good thing is like now home networks have developed to be so much better to where like if you get something from ATT, you can directly kind of whoever's connected to your thing, you can just turn them off.

01:45:07.439 --> 01:45:08.640
Uh so you can do something like that.

01:45:09.039 --> 01:45:11.520
It'll start like, hey, we don't recognize this device.

01:45:11.680 --> 01:45:14.640
And so you can kind of get ahead of it if it's not too late.

01:45:14.800 --> 01:45:19.039
So I do like that, but even then, like a person like me, I use my Nighthawks.

01:45:19.199 --> 01:45:22.880
I have to make sure that my settings on them are set to the right thing.

01:45:23.199 --> 01:45:24.399
Router security.

01:45:24.479 --> 01:45:29.840
That's like the first thing that most folks do when they start learning a little bit about tech.

01:45:30.000 --> 01:45:31.680
They get in that router and start playing around.

01:45:31.840 --> 01:45:37.920
Yeah, they know the real the real dogs, they go build them an actual um home lab.

01:45:38.720 --> 01:45:40.159
They go build them a home lab.

01:45:40.479 --> 01:45:46.720
I will like while I'm here talk about um a person that's been making your state look bad.

01:45:47.199 --> 01:45:47.600
Who?

01:45:47.840 --> 01:45:49.119
Clarissa Shields.

01:45:49.920 --> 01:45:50.960
Let's talk about her.

01:45:51.119 --> 01:45:51.760
What about her?

01:45:52.399 --> 01:45:52.960
She has this.

01:45:53.039 --> 01:45:54.239
Oh, I got I know what I'm talking about.

01:45:54.319 --> 01:45:59.279
But she has this infatuation with always talking about she can beat men in boxing, and she knows she can't.

01:45:59.439 --> 01:46:02.960
Like, she probably can hang with them and sparring, but it's sparring for a reason.

01:46:03.119 --> 01:46:04.479
And she just says stupid stuff.

01:46:04.560 --> 01:46:07.279
And I know I think I told her, I was like, I'm dead.

01:46:07.359 --> 01:46:08.079
You told her what?

01:46:08.239 --> 01:46:08.960
I just retweeted.

01:46:09.039 --> 01:46:13.279
I said, every day you talk, it reminds us why you chose to be around with a married man.

01:46:13.520 --> 01:46:14.239
I'm done.

01:46:14.479 --> 01:46:16.399
Like she says stupid stuff all the time.

01:46:16.479 --> 01:46:22.560
It's just like, and then people like she don't know how because she's not an ugly woman, she don't just know how to just be pretty and shut up.

01:46:22.720 --> 01:46:32.640
I know that sounds misogynistic, but in the sport that they're in, because the women don't even watch boxing like they want them to, similar to why the women don't really watch WNBA.

01:46:33.119 --> 01:46:35.039
Men are the people that really like boxing.

01:46:35.119 --> 01:46:38.960
So if you want our support, you gotta play to what makes us watch.

01:46:39.119 --> 01:46:44.239
Like if you compare her to Alicia Bumgarner, you don't really hear her saying stupid stuff about men.

01:46:44.399 --> 01:46:47.359
She knows they're fighting and she's just trying to look pretty and trying to look cute.

01:46:47.520 --> 01:46:49.520
That's what you gotta do to market yourself.

01:46:49.840 --> 01:46:57.359
But with her, she'll get mad if somebody give an opinion, and then it's not an opinion based off hate, it's an opinion like she got mad at Shannon Sharpie.

01:46:57.520 --> 01:47:02.960
He was like, She called out a boxer named Rolly Romero, and she said that she could beat him in a fight.

01:47:03.039 --> 01:47:06.000
And Shannon was like, Nah, he probably would knock you out.

01:47:06.159 --> 01:47:07.039
I'm dead.

01:47:07.359 --> 01:47:11.680
And it's like, and it said, You're very skilled, but it's just different getting hit from a man.

01:47:11.920 --> 01:47:14.399
And she was like, Well, I'll wait, I'll walk around at 180.

01:47:14.560 --> 01:47:15.439
He was like, It don't matter.

01:47:15.520 --> 01:47:21.359
He's like, This guy's probably walking around close to like 160, so he's squeezing down like a couple of pounds to make 147.

01:47:21.439 --> 01:47:22.399
He's still stronger than you.

01:47:22.640 --> 01:47:25.039
I wouldn't want to get hit in the face by a man.

01:47:25.680 --> 01:47:32.640
Man don't even want to get hit in the face by a man, so like she then she changed like sparring, but it just you know, she just does this all the time.

01:47:32.720 --> 01:47:34.079
She'll just pick a different boxer.

01:47:34.159 --> 01:47:36.479
One of the boxers, Keith Thurman said, You just go, Okay, cool.

01:47:36.560 --> 01:47:36.880
We can fight.

01:47:36.960 --> 01:47:38.000
I'll use one on one.

01:47:38.640 --> 01:47:41.119
Like, it's just a mess, man.

01:47:41.199 --> 01:47:43.279
Um, she really grinds my gears.

01:47:43.520 --> 01:47:44.640
I like Clarissa.

01:47:44.800 --> 01:47:46.960
I like her when she fights, I just don't like when she talks.

01:47:47.199 --> 01:47:49.119
She be doing, she's been doing a lot lately.

01:47:49.199 --> 01:47:52.159
I'm gonna need her to just take a chill pill.

01:47:52.319 --> 01:47:53.520
This is one I found.

01:47:53.600 --> 01:47:54.880
Uh, I want to read.

01:47:54.960 --> 01:47:59.199
Uh oh, it's a it's a page, it's on X called Tech Layout Tracker.

01:47:59.600 --> 01:48:03.920
Atlassian just confirmed 1600 layoffs with 900 plus coming from engineering.

01:48:04.079 --> 01:48:06.479
But I'm hearing the real story from inside.

01:48:06.800 --> 01:48:16.479
Sources that's been running knowledge extraction sprints for six months recording every single engineer screen, logging their pumps, documenting their debugging workflows.

01:48:16.720 --> 01:48:26.079
One architect told me that they made him walk through his entire microservices decision tree while they filmed it, called it knowledge transfer for the transition team.

01:48:26.319 --> 01:48:33.439
The transition team, 47 contractors in Bangalore with access to his recorded sessions and cloud enterprise subscription.

01:48:33.680 --> 01:48:36.800
Same architect just found out his replacement starts Monday.

01:48:37.039 --> 01:48:45.119
Guy makes$28,000 annually and ships code 47 40% faster using the exact prompt libraries they extracted.

01:48:45.279 --> 01:48:51.039
They're not just cutting headcount, they're systemizing 15 years of engineering and expertise into training data.

01:48:51.119 --> 01:48:59.119
The strategic AI focus isn't about building AI products, it's about replacing their entire engineering culture with agents trained on their senior engineers' knowledge.

01:48:59.439 --> 01:49:04.800
Word is the CTO replacement already has the playbook extract, document, offshore, automate.

01:49:04.960 --> 01:49:10.640
If you're still there and they ask you to document your processes for the team, run the knowledge extraction is complete.

01:49:10.880 --> 01:49:11.600
Interesting.

01:49:11.760 --> 01:49:17.680
I thought that was pretty I was trying to find this post.

01:49:20.159 --> 01:49:36.479
It was it was a guy who was saying that he um he got he recently had got a job and he undercut himself when they asked like the salary conversation, but it turned up being a typo or something.

01:49:36.720 --> 01:49:39.760
Like he he they couldn't believe what I'm not just talking about.

01:49:43.279 --> 01:49:43.920
I think I like it.

01:49:44.000 --> 01:49:44.720
Let me see if I like it.

01:49:44.800 --> 01:49:45.680
I know exactly what you're talking about.

01:49:46.079 --> 01:49:50.079
The guy that said 67 66,000 or something, something like that.

01:49:50.239 --> 01:49:50.720
Let me see.

01:49:50.800 --> 01:49:51.520
I think I liked it.

01:49:51.680 --> 01:49:55.920
I meant to send it to you, but it it it just it's it went away.

01:50:01.600 --> 01:50:15.439
Speaking of Raven said on uh Disney Mount Rushmore for like real TV shows just should it should be her, Hillary Duff, Sha LaBeouf, and uh my boy Lee Thomas.

01:50:15.680 --> 01:50:16.800
Who is Lee Thomas?

01:50:17.039 --> 01:50:18.159
The famous Jet Jackson.

01:50:18.399 --> 01:50:18.800
Who?

01:50:19.039 --> 01:50:20.560
The famous Jet Jackson.

01:50:21.359 --> 01:50:22.960
You don't know who the famous Jet Jackson is?

01:50:23.039 --> 01:50:27.760
You ever seen um you ever seen Friday Night Lights?

01:50:29.760 --> 01:50:31.039
With Derek Luke.

01:50:31.520 --> 01:50:33.439
It's a dude he called on that water bug.

01:50:33.520 --> 01:50:34.720
That's the famous Jet Jackson.

01:50:34.880 --> 01:50:36.000
Man, that's the show.

01:50:36.239 --> 01:50:37.359
You gotta go back and watch that.

01:50:37.439 --> 01:50:46.800
When I say the theme song slapped, let's see.

01:50:53.680 --> 01:50:54.960
I know exactly what you're talking about.

01:50:55.039 --> 01:50:55.840
I cannot find a man.

01:50:55.920 --> 01:50:56.560
It's crazy.

01:50:56.800 --> 01:50:57.760
But you know what I'm talking about.

01:50:58.159 --> 01:51:01.199
Yeah, it actually was more, it's actually like doubled his salary or something like that.

01:51:01.279 --> 01:51:01.600
Yeah.

01:51:01.760 --> 01:51:03.600
So I know exactly what you're talking about.

01:51:03.680 --> 01:51:05.760
But yeah, no, the famous Jet Jackson used to go.

01:51:06.479 --> 01:51:08.720
I feel like I'm looking at Marquise now that you don't know what this is.

01:51:09.840 --> 01:51:10.479
Let me look it up.

01:51:10.640 --> 01:51:12.159
One of your siblings should know.

01:51:12.319 --> 01:51:13.439
Or who's the oldest?

01:51:13.680 --> 01:51:14.800
Famous Jet.

01:51:15.039 --> 01:51:15.840
Is it a cartoon?

01:51:16.000 --> 01:51:17.039
No, it's a real show.

01:51:17.119 --> 01:51:18.319
The famous Jet Jackson.

01:51:18.560 --> 01:51:20.479
Oh, I do remember him.

01:51:20.720 --> 01:51:21.039
Okay.

01:51:21.359 --> 01:51:22.720
I'll give you a pass that you actually.

01:51:22.960 --> 01:51:23.760
What was he doing?

01:51:24.000 --> 01:51:30.159
He played like uh he played in a TV show, so he's it's his TV show, and he played in a TV show on the show.

01:51:30.319 --> 01:51:32.239
Uh an agent called Silverstone.

01:51:32.319 --> 01:51:34.880
He was like a special agent on the TV show inside the show.

01:51:35.119 --> 01:51:37.199
I do remember seeing his face though.

01:51:37.359 --> 01:51:38.960
Yeah, it was it's a good show.

01:51:39.119 --> 01:51:43.039
Who's your who's your childhood kid, Mount Rushmore?

01:51:43.199 --> 01:51:44.880
Like, how many people is that?

01:51:44.960 --> 01:51:46.479
First of all, it depends on it.

01:51:46.640 --> 01:51:47.600
Gotta go by network, right?

01:51:47.680 --> 01:51:49.039
Because if let's start, let's go.

01:51:49.119 --> 01:51:52.399
Because if I go, if I go Disney, I think that's about right.

01:51:52.479 --> 01:51:53.439
I think what she had is right.

01:51:53.520 --> 01:51:59.119
Those all shows watch Evan Stevens, that's all Raven, uh Lizzie McGuire, Jet Jackson.

01:51:59.199 --> 01:52:00.560
I watched them for sure.

01:52:00.720 --> 01:52:04.239
All I ate Kim Possible up and the Proud Family.

01:52:04.399 --> 01:52:05.359
Yeah, but them cartoons.

01:52:05.439 --> 01:52:06.960
I think she was just comparing people.

01:52:08.000 --> 01:52:16.079
Uh, because if that's the case, you would have to put um because you know the voice of Kim Possible was uh uh Ren on Evan Stevens.

01:52:16.399 --> 01:52:18.479
They actually got a podcast, she has a podcast.

01:52:18.720 --> 01:52:20.000
I think I've seen that.

01:52:20.239 --> 01:52:27.199
Um, so like if I go Nickelodeon, I may go all that because you got all the people, Kenny Nikale.

01:52:28.319 --> 01:52:30.159
Yo, stop right now.

01:52:30.239 --> 01:52:32.319
Have you watched that recently?

01:52:33.439 --> 01:52:34.239
Oh my god.

01:52:34.319 --> 01:52:35.920
What what the what is it?

01:52:36.000 --> 01:52:36.479
What was that?

01:52:36.560 --> 01:52:37.680
Why were we watching that?

01:52:37.840 --> 01:52:38.720
That's the times.

01:52:39.359 --> 01:52:42.800
It was it was I I literally like watched like four episodes.

01:52:42.960 --> 01:52:43.760
I was disgusted.

01:52:44.000 --> 01:52:44.319
Why?

01:52:44.479 --> 01:52:47.600
It was just disgusting, it was so stupid, it was so ignorant.

01:52:47.840 --> 01:52:49.359
It was I still like it.

01:52:49.600 --> 01:52:53.760
No, um, I gotta see, I gotta go from okay.

01:52:54.399 --> 01:52:56.880
So I'm gonna really get my Nickelodeon back.

01:52:57.119 --> 01:53:04.399
If I'm gonna go kid TV stars, I'm gonna go Keenan and Kale.

01:53:04.800 --> 01:53:07.119
I'm gonna throw Gulla Gullah Island on there.

01:53:07.279 --> 01:53:08.000
Actually, I'm gonna do this.

01:53:08.079 --> 01:53:15.359
Keenan and Kale, my brother and me, Clarissa Tells It All, and I'm probably gonna go Cousin Skeeter.

01:53:15.840 --> 01:53:17.600
Oh, Cousin Skeeter was so good.

01:53:17.920 --> 01:53:19.199
You never seen Clarissa Tells It All?

01:53:19.439 --> 01:53:20.880
No, no, no, no, no, no.

01:53:21.119 --> 01:53:23.279
Anybody who watches David Mind, my age, they remember the show.

01:53:24.399 --> 01:53:27.520
I want to say it's the same girl who played Sabrina the Teenage Witch.

01:53:27.680 --> 01:53:28.960
Was it Clarissa Tells It All?

01:53:29.199 --> 01:53:29.439
Yeah.

01:53:29.600 --> 01:53:30.479
Oh, I loved her.

01:53:30.640 --> 01:53:31.600
Yeah, I think it's her.

01:53:31.760 --> 01:53:34.720
And then like for Cartoon Network is different because it's cartoons.

01:53:34.800 --> 01:53:41.600
And then if we get to about my middle school years to high school, then I probably would go.

01:53:41.680 --> 01:53:44.640
Uh I used to like Nasty Classified School Survivor God.

01:53:44.960 --> 01:53:47.760
I liked Unfabulous, the Romeo show.

01:53:48.399 --> 01:53:51.199
And I don't know no other ones.

01:53:51.279 --> 01:53:52.399
Did we talk about?

01:53:52.800 --> 01:53:53.439
I don't know.

01:53:53.600 --> 01:53:55.119
I was talking to somebody about this.

01:53:55.279 --> 01:53:56.000
Was it you?

01:53:56.159 --> 01:53:57.840
Did you watch high school musical?

01:53:58.159 --> 01:53:59.680
No, I didn't like it.

01:53:59.920 --> 01:54:00.239
Ever.

01:54:00.399 --> 01:54:00.720
Ever.

01:54:00.800 --> 01:54:01.920
I never wanted to watch it.

01:54:02.159 --> 01:54:02.560
What?

01:54:02.720 --> 01:54:03.600
I never want to watch it.

01:54:03.840 --> 01:54:13.439
I think I was talking to somebody else about this, but I was like, like when it premiered, me and my friends were on the phone watching it on the phone.

01:54:13.680 --> 01:54:14.479
It was too cheesy for me.

01:54:14.720 --> 01:54:16.319
When it premiered, we were watching it.

01:54:16.399 --> 01:54:17.840
Yeah, it was too cheesy for me.

01:54:17.920 --> 01:54:19.119
I didn't I didn't care for it.

01:54:20.399 --> 01:54:21.359
It really is cheesy.

01:54:21.520 --> 01:54:25.520
But I think by the time high school music came out, I had to either be eighth or ninth grade.

01:54:25.600 --> 01:54:33.840
So like the last movies I watched around like them Disney movies was uh Cheetah Girls, um Go On to the Mat.

01:54:34.159 --> 01:54:39.760
Um did you watch the Eddie's Million Dollar Cook Off and Life is Rough.

01:54:39.840 --> 01:54:43.359
Like them like the last set of Disney original movies I watched.

01:54:43.439 --> 01:54:46.479
And then before that, you had Look of the Irish, Brink.

01:54:47.119 --> 01:54:48.479
Oh, that's my movie.

01:54:48.960 --> 01:54:50.960
Um Look Under the Bed.

01:54:51.199 --> 01:54:55.439
All the all the older Disney movies was good, up in the way, all the stuff.

01:54:55.600 --> 01:54:59.279
But yeah, I I didn't I didn't watch um all the other stuff.

01:54:59.439 --> 01:55:02.560
I was I think I was too old by the time I aged myself out of it.

01:55:02.880 --> 01:55:10.640
You actually ate me up on I didn't watch, I was more of a Disney kid, and when I started watching Nickelodeon, it was more cartoons.

01:55:10.720 --> 01:55:11.840
I wasn't really watching a lot of things.

01:55:12.159 --> 01:55:12.800
They had a lot of shows.

01:55:12.880 --> 01:55:14.560
Like I'm telling you, like no, I'm lying.

01:55:14.640 --> 01:55:15.439
I I ate Zoe.

01:55:15.840 --> 01:55:24.159
If so, for fun fact on uh the show My Brother and Me, Amanda Seals is the best friend of the main two brothers' sister on there.

01:55:24.640 --> 01:55:26.800
So uh her name is Dion on the show.

01:55:26.880 --> 01:55:36.159
It's actually a good show, but they couldn't let the show that show uh was too good for a sense like you had uh mom and dad married.

01:55:36.239 --> 01:55:40.159
I think the dad was a cute dog, I think the mom was a delta, had two boys and a sister.

01:55:40.319 --> 01:55:41.600
It's my it's called my brother and me.

01:55:41.840 --> 01:55:44.159
They was based out of Charlotte on the show.

01:55:44.319 --> 01:55:46.239
They couldn't let that image keep on going on.

01:55:46.319 --> 01:55:49.600
It was too positive an image for us on that show.

01:55:49.840 --> 01:55:51.279
I'm gonna have to check this out.

01:55:51.439 --> 01:55:53.680
Yeah, it's how it's good, and there was only one season.

01:55:53.840 --> 01:55:54.880
Yeah, I'm checking it.

01:55:55.039 --> 01:55:56.960
It came out the year I was born, that's why I don't know.

01:55:57.119 --> 01:55:58.800
Yeah, but they made a lot of reruns.

01:55:58.880 --> 01:55:59.520
That's how I watched it.

01:55:59.600 --> 01:56:00.560
I watched it on the reruns.

01:56:00.720 --> 01:56:03.840
I didn't watch it when it was actually out because I think it came out what 19 what 90 what?

01:56:04.159 --> 01:56:17.600
Oh, yeah, I was two, so I ain't really remember it till I was about five or six when I used to watch the reruns because it's like everybody look, anybody who watched the show, Didi was getting bullied by a bully, so they taught him how to bluff.

01:56:18.079 --> 01:56:20.880
And so he said, They said, Hey, they signed a bully counter.

01:56:21.039 --> 01:56:23.279
You say, if you so bad, hit me.

01:56:23.439 --> 01:56:28.560
And so Didi was country, he's supposed to have that that Carolina like kind of accent.

01:56:28.640 --> 01:56:32.479
So he said, Hit me, and then he gets home.

01:56:32.640 --> 01:56:33.760
They said, What happened?

01:56:33.920 --> 01:56:37.920
I got hit, but yeah, that was beefing out with some girls.

01:56:38.000 --> 01:56:38.720
It was it was funny.

01:56:38.960 --> 01:56:40.159
10 episodes, yeah.

01:56:40.239 --> 01:56:41.439
It's it's good, it's good.

01:56:41.520 --> 01:56:46.720
Um, I think it's on it might I don't even know if it's on Paramount Plus, but it might be on there, and then I had to know Gulligala Island.

01:56:46.800 --> 01:56:48.159
Uh, I'll be about having the kids watching that.

01:56:48.239 --> 01:56:49.039
I don't know if you ever watched that.

01:56:49.199 --> 01:56:51.199
I did, I definitely watched Gulliga Island.

01:56:51.279 --> 01:56:53.600
You know, the baby boy on there, he's actually an actor for real.

01:56:53.760 --> 01:56:55.279
They're actually about to start something new.

01:56:55.439 --> 01:57:03.680
I think I saw that something they're supposed to be doing a remake of my brother and me as well, but like in the vein of how Bel Air became more serious, similar to that.

01:57:04.399 --> 01:57:06.800
Cousin Skeeter was black AF.

01:57:07.119 --> 01:57:08.720
Yeah, I mean, think about the song.

01:57:08.800 --> 01:57:15.920
It was the uh that was actual a real song that they kind of just tweaked a little bit for Cousin Skeeter and Smart Guy too, yeah.

01:57:16.000 --> 01:57:19.680
But that was WB and then it started rerunning on Disney.

01:57:19.920 --> 01:57:25.520
So that's why they had the unreal mention, but it was slightly different because it won, I think it wasn't uh initially just a Disney show.

01:57:25.600 --> 01:57:27.520
I know you gave me the one escorted to Dean.

01:57:27.600 --> 01:57:31.119
I didn't watch it, so it'll be my live reaction to escorted out by the dean.

01:57:31.600 --> 01:57:32.079
Let's see.

01:57:32.319 --> 01:57:32.720
That was good.

01:57:32.800 --> 01:57:39.600
Okay, so have y'all seen the girl who said that the girl that was sitting across from her taking her nursing exam, their final nursing exam got escorted out mid-test by the dean.

01:57:40.000 --> 01:57:40.479
Yeah.

01:57:40.640 --> 01:57:42.479
So she said they taking their test right.

01:57:42.560 --> 01:57:43.520
It's the day of the test.

01:57:43.600 --> 01:57:45.760
They go in her, they're like, damn, what the dean doing here?

01:57:45.920 --> 01:57:46.800
The day of the test.

01:57:47.119 --> 01:57:48.479
So everybody taking their test.

01:57:48.640 --> 01:57:51.520
The dean walk behind the girl that's sitting across from her, right?

01:57:52.319 --> 01:57:54.880
Hey, let's let's head out type shit.

01:57:55.119 --> 01:57:58.000
So they like, this mid-test, what's going on?

01:57:58.159 --> 01:58:01.840
They hear her outside screaming outside the door, screaming.

01:58:02.319 --> 01:58:06.000
So the press and practical exam was like, hey, you know, focus on y'all's stuff.

01:58:06.640 --> 01:58:09.520
She's like, girl, how we gonna focus if somebody's out there losing their man?

01:58:09.680 --> 01:58:10.720
We need to know what's going on.

01:58:11.039 --> 01:58:21.680
Well, come to find out after they finished taking the test, they were informed that Miss Mama's had somebody wrote remote into her computer and was taking her final exam for her.

01:58:22.720 --> 01:58:27.279
And when the dean stood behind her, her mouth was moving, but her hand was in her lap.

01:58:30.479 --> 01:58:36.399
Ma'am, you went all the way through nursing school to literally play for the end result.

01:58:37.840 --> 01:58:40.399
Because that shit ain't easy.

01:58:41.279 --> 01:58:47.760
I never wanted to be a nurse, and I commend anybody who ever wanted to do this who genuinely loves that shit and not end it for the study.

01:58:48.079 --> 01:58:49.279
Because that's not some shit you play with.

01:58:49.359 --> 01:58:51.119
You deal with people like that on the daily, right?

01:58:52.079 --> 01:58:54.720
They told her she is banned from taking the inglés.

01:58:56.800 --> 01:58:58.720
You'll you'll never be a nurse now.

01:58:59.039 --> 01:59:00.159
Like you're you're done.

01:59:01.680 --> 01:59:08.560
Like you wasted schooling because you let somebody remote into the computer and take your final exam for you.

01:59:08.960 --> 01:59:11.359
And who's to say you're not good at taking tests, right?

01:59:11.840 --> 01:59:14.159
Maybe you're not good at taking tests, but you knew the information.

01:59:15.119 --> 01:59:18.399
I would have rather failed the test than been bad.

01:59:19.439 --> 01:59:23.520
Like girl.

01:59:26.960 --> 01:59:31.680
The security for that that they got in place for that, they play with somebody else.

01:59:31.920 --> 01:59:35.279
And just like she said, I just that's so spineless.

01:59:35.680 --> 01:59:36.560
It's so spineless.

01:59:36.800 --> 01:59:39.439
This is how the girl felt once she seen the dean behind her.

01:59:41.920 --> 01:59:42.720
That that's her.

01:59:42.800 --> 01:59:44.800
Hang on, that needs to be louder.

01:59:45.359 --> 01:59:48.479
I just there we go.

01:59:48.640 --> 01:59:56.000
You you gotta have a spine, you gotta have a spine, and just like she said, like, who wanna even who wanna finesse a test like that?

01:59:57.039 --> 02:00:01.279
Like she said, somebody where you're it's just too small.

02:00:01.520 --> 02:00:04.319
What was even the point, girl?

02:00:04.560 --> 02:00:05.600
Now you you're done.

02:00:06.880 --> 02:00:07.680
It's embarrassing.

02:00:07.840 --> 02:00:11.600
Your name is tarnished, you wasted all of this time going to school.

02:00:12.640 --> 02:00:18.560
Yeah, if you needed more help or you got anxiety, banned, get go get a note or something.

02:00:18.640 --> 02:00:20.000
Say you need extra notes or something.

02:00:20.159 --> 02:00:23.680
I don't even know how they said to take the test, but like, come on now.

02:00:24.239 --> 02:00:25.359
Come on now, man.

02:00:25.840 --> 02:00:29.520
The fact that they they pulled up on her and peeped game is is the cute part.

02:00:29.600 --> 02:00:30.479
Come on now, dog.

02:00:31.920 --> 02:00:33.119
Come on, man.

02:00:34.479 --> 02:00:36.079
That's how that's how I feel about her.

02:00:36.159 --> 02:00:37.920
I was like, man, I feel bad for her.

02:00:38.000 --> 02:00:54.640
I don't feel bad for her because like I don't feel bad for her, but I feel bad that you know it's excluded her from doing the NCLEX because it's like why go through clinicals because I will say I think it's still hard to go through clinicals and and do nursing just for the money, because it's hard.

02:00:54.880 --> 02:00:58.640
You gotta just like she said, you gotta like it's hard and you have to like it.

02:00:58.720 --> 02:01:09.119
But the fact that you was trying to cheat on the the biggest test, and then imagine being in the the people um that are there trying to take the test, right?

02:01:09.359 --> 02:01:11.119
And you already got a good test taker.

02:01:11.199 --> 02:01:13.439
Now you are throwing off, throwing them off too.

02:01:13.600 --> 02:01:14.720
That's what I'm saying.

02:01:15.119 --> 02:01:16.560
That's that's wow.

02:01:16.800 --> 02:01:19.760
Um I thought this was pretty cool right here.

02:01:19.840 --> 02:01:22.239
Um, we're gonna be reacting to a little bit more of her content.

02:01:22.399 --> 02:01:23.119
This lady right here.

02:01:26.880 --> 02:01:30.880
Not because anyone studied productivity patterns or human cognition.

02:01:31.439 --> 02:01:35.760
It became standard because it was administratively convenient.

02:01:36.000 --> 02:01:43.359
Everyone in the office at the same time meant easier meetings, simpler coordination, and straightforward supervision.

02:01:43.680 --> 02:01:50.399
And after World War II, the nine to five schedule became even more entrenched as suburbs expanded.

02:01:50.560 --> 02:01:54.640
The entire infrastructure of American life was built around it.

02:01:54.960 --> 02:02:09.359
Rush hour, traffic patterns, school schedules, TV programming, even when stores opened, we created a society where everything operated on the assumption that adults worked from 9 to 5.

02:02:09.680 --> 02:02:11.600
And here's where it gets absurd.

02:02:12.000 --> 02:02:18.319
We're now in an era where most knowledge work doesn't require physical presence or synchronized schedules.

02:02:18.640 --> 02:02:22.079
You can send an email at midnight and someone can still read it at 8 a.m.

02:02:22.399 --> 02:02:25.199
You can collaborate on documents asynchronously.

02:02:25.359 --> 02:02:28.000
Video calls can be recorded and watched later.

02:02:28.239 --> 02:02:40.880
Yet we're still organizing work as if we're all operating machinery that needs to be run continuously during set hours, or as if we're coordinating train schedules that require split second timing.

02:02:43.439 --> 02:02:44.079
She's right.

02:02:44.239 --> 02:02:45.840
I think, and that's the thing.

02:02:45.920 --> 02:02:51.199
I think that's one of those, if we go back to uh all the Gen Z slander we did last week.

02:02:51.600 --> 02:02:52.640
I don't think it was slander.

02:02:52.960 --> 02:02:56.000
It wasn't, but I think that's one of the things too, is like, hey, stuff has changed.

02:02:56.079 --> 02:03:03.520
Like we are working in something that was built around things that we can circumvent now that could be more accessible to everybody.

02:03:03.760 --> 02:03:06.720
And that was the beauty of remote work.

02:03:06.880 --> 02:03:24.319
It wasn't the fact that you could just be sitting in your boxes or your underwear working, it was the fact now that people from typically smaller cities that then had the allure of a bigger name city had a fighting chance at getting a job and working anywhere and doing it.

02:03:24.479 --> 02:03:34.560
I would definitely like to see since uh RTO, what's the percentage of small city people still working remote, or did they have to move?

02:03:36.079 --> 02:03:37.199
And go a step further.

02:03:37.520 --> 02:03:39.119
She's talking about nine to five.

02:03:39.680 --> 02:03:44.000
It's stuff now, and that's why I advocate for people with kids that have flexible jobs.

02:03:44.159 --> 02:03:46.800
Hey, I don't have to be sitting down all the time.

02:03:47.039 --> 02:03:50.319
Hey, I don't need to be in the office until five.

02:03:50.479 --> 02:03:52.239
I need to go get my child from school.

02:03:52.319 --> 02:03:53.600
I need to leave here about two.

02:03:54.079 --> 02:03:56.800
I'll be back online and do whatever I need to do.

02:03:57.039 --> 02:03:57.840
Flexibility.

02:03:57.920 --> 02:04:02.239
I have my laptop with me, I have my phone and push gunner shove, I can pull over whatever I need to do.

02:04:02.399 --> 02:04:03.840
That's what we're talking about.

02:04:04.000 --> 02:04:07.439
So if everybody could be more flexible, it should work.

02:04:07.920 --> 02:04:09.840
Like, I ain't gonna lie.

02:04:10.079 --> 02:04:14.319
One of the main things that I don't like about the pandemic is it killed the 24-7 Walmart.

02:04:14.560 --> 02:04:16.560
Bruh, bring them back, bring them back.

02:04:16.720 --> 02:04:22.399
Man, bring bring all stores that used to be open for 24 hours back, like for real.

02:04:22.640 --> 02:04:23.439
Bring them back.

02:04:23.680 --> 02:04:24.800
Like, I miss that.

02:04:24.960 --> 02:04:26.560
It's why not?

02:04:27.439 --> 02:04:30.319
And then think about those people who were like third shifters.

02:04:30.479 --> 02:04:41.119
Like, I know a lot of people who have kids um that are you know a little bit older, they're able to work those third shift jobs and do stuff like stocking and stuff, and that's not even a thing no more.

02:04:41.279 --> 02:04:48.399
Yeah, it's not even we will, I don't we're we're never gonna get that back at all, at all, man.

02:04:48.479 --> 02:04:53.680
It's like that eliminated a lot of stuff, just so much 24-7 stuff.

02:04:53.760 --> 02:04:59.439
Like the only thing a lot of a lot of convenience, only stuff that's really still 24-7 outs were maybe iHop and Waffle House.

02:04:59.760 --> 02:05:11.359
Yeah, and if that's they need to adjust, I need to adjust, and I also tie back into what we just said um with the geopolitical stuff.

02:05:11.439 --> 02:05:23.600
I don't for life, I don't know why every company wants to offshore to India when we've known that some of them people are inside of threats, so they take your information and give it to their country.

02:05:23.920 --> 02:05:28.960
And what be better is it's a lot of people in the US that were willing to work overnight.

02:05:29.840 --> 02:05:31.039
They would love to work overnight.

02:05:31.199 --> 02:05:31.520
For sure.

02:05:31.840 --> 02:05:32.479
Hire them.

02:05:32.800 --> 02:05:33.520
Please.

02:05:34.000 --> 02:05:34.720
I don't understand.

02:05:34.800 --> 02:05:41.520
That's why I like certain industries where they don't allow people to work overseas remote and they just have to keep everything in the US.

02:05:41.680 --> 02:05:42.880
That needs to be a regulation.

02:05:42.960 --> 02:05:56.399
I don't care how people feel about it, but at the end of the day, these people are gonna get so cheap to where it's gonna really mess up all their business because once you outsource everything, nobody's gonna have money to spend on the stuff that you're trying to make people buy anyway.

02:05:57.600 --> 02:06:02.560
So that's what I I see uh foresee happening in the near future.

02:06:03.279 --> 02:06:04.479
Um, let's see.

02:06:06.720 --> 02:06:09.199
And I thought about uh let's see.

02:06:10.960 --> 02:06:12.319
I'm trying to see which one of these.

02:06:13.520 --> 02:06:29.279
This may be for my layout people that got cases as far as a company did you wrong and either you got a service or didn't, but you need to figure out a way to make sure like you're taken care of.

02:06:29.439 --> 02:06:30.479
So let's watch this.

02:06:39.600 --> 02:06:41.359
No experience whatsoever.

02:06:41.520 --> 02:06:46.319
As you can see, I'm a black woman who had been in the role performing at a very high level.

02:06:46.479 --> 02:06:52.399
My performance reviews were either satisfactory or exceeds expectations every single year.

02:06:52.640 --> 02:06:55.680
No write-ups, no warnings, no performance issues.

02:06:56.000 --> 02:06:59.199
Then all of a sudden, he's shadowing me.

02:06:59.359 --> 02:07:02.319
They want full documentation of my job.

02:07:02.560 --> 02:07:08.800
I'm told to train him on everything, but no one could clearly explain what my role would look like after.

02:07:09.039 --> 02:07:19.199
So I said in a professional way, I'm happy to support onboarding, but I need clarity about my position before transferring my full responsibilities.

02:07:19.439 --> 02:07:26.319
And after that, I was labeled as difficult, not a team player, and put under scrutiny.

02:07:26.560 --> 02:07:28.479
Eventually, they laid me off.

02:07:28.720 --> 02:07:30.720
But here's what they didn't think about.

02:07:30.960 --> 02:07:36.560
You can't suddenly claim performance issues when years of documentation say otherwise.

02:07:37.119 --> 02:07:42.000
So I filed a discrimination claim because the optics mattered.

02:07:42.239 --> 02:07:49.520
A high performing black woman replaced by a less qualified younger white male after refusing to train him.

02:07:49.680 --> 02:07:51.520
That wasn't a coincidence.

02:07:51.840 --> 02:07:52.960
And I won.

02:07:53.199 --> 02:07:53.600
Why?

02:07:53.840 --> 02:07:55.920
Because I kept my damn records.

02:07:56.079 --> 02:08:01.520
I had my evaluations, I had my emails, I had proof that the narrative shift didn't match the history, honey.

02:08:01.840 --> 02:08:05.840
I don't know how many times I gotta tell you, but documentation protects you.

02:08:06.079 --> 02:08:15.760
And if you ever feel like you're being pushed out unfairly, especially when race or bias is involved, don't get emotional, get strategic.

02:08:16.159 --> 02:08:23.439
Keep your receipts and protect your value always, because only you are gonna look out for you at the end of the day.

02:08:23.760 --> 02:08:25.439
I'm literally looking for a case.

02:08:25.680 --> 02:08:26.319
I like that.

02:08:26.479 --> 02:08:30.000
She said, don't get emotional, get strategic.

02:08:30.880 --> 02:08:34.239
I like that because you see it happen all the time.

02:08:34.399 --> 02:08:38.560
And I tell people, I've known people who've taken their previous employer to court.

02:08:38.720 --> 02:08:46.479
Well, not court, but they've sued them and one and the company wanted to go settle out of uh court because the negative attention they could draw on it.

02:08:46.800 --> 02:08:51.439
So a lot of times they are just hoping like they have money set aside just for that.

02:08:51.520 --> 02:08:56.880
The the people who want to go the extra mile and do that, they have money set aside just for those situations.

02:08:57.199 --> 02:08:58.960
And um, yes, a lot of times like that.

02:08:59.039 --> 02:09:03.520
You want somebody to start training your um replacements and all this other stuff.

02:09:03.600 --> 02:09:07.920
And I'm I'm glad that she she ain't back down, she told them people no, because it's not right.

02:09:08.239 --> 02:09:09.600
Especially when they're not qualified.

02:09:09.680 --> 02:09:12.640
As I'm saying, this goes into again what we've been talking about the whole time.

02:09:12.800 --> 02:09:15.840
Like, honestly, we probably should name this episode underqualified.

02:09:15.920 --> 02:09:18.079
I want to see, I'm gonna see if that works.

02:09:18.479 --> 02:09:23.680
Um, I know somebody who was in this uh, I know somebody who was in this like a situation like this.

02:09:23.840 --> 02:09:28.479
She um I'm gonna keep her name out of here because she's a bad mamma jamma.

02:09:28.960 --> 02:09:52.720
But what happened was she filed a complaint with the EEOC in 2009 saying that she was being passed over for promotions that were going to uh less qualified white male coworkers, and that the EEOC issued her a right to sue letter in 2011 and she filed a federal lawsuit against them, and she won, and she kept her job, and she got promoted.

02:09:52.960 --> 02:09:54.239
How much he got from the settlement?

02:09:54.720 --> 02:09:58.000
Uh 37,500.

02:09:58.239 --> 02:09:59.840
I think I gotta double check.

02:09:59.920 --> 02:10:00.800
I gotta text my man.

02:10:01.039 --> 02:10:02.319
I wonder if I could text him right.

02:10:02.399 --> 02:10:13.439
See, he the type of person, if I text him right now, he may uh try to call me, but I'm thinking he got like, I think he got like 70 G's from his company that he sued.

02:10:13.760 --> 02:10:14.399
I think.

02:10:15.680 --> 02:10:23.520
Because they they they pretty much let him go, assuming that he either took off work or was off work to sell a house or whatever.

02:10:23.600 --> 02:10:24.319
And that wouldn't be.

02:10:24.560 --> 02:10:25.119
We were talking about that.

02:10:25.199 --> 02:10:25.520
Yeah, yeah.

02:10:25.760 --> 02:10:28.239
That wasn't the case, and they they lost bed with that one.

02:10:28.319 --> 02:10:31.359
So I was like, but that just comes from people hating on you at work.

02:10:31.760 --> 02:10:40.720
But you know how difficult it is for us as as people that look like us to get the money to secure the representation.

02:10:40.960 --> 02:10:42.000
Oh, yeah, to even understand.

02:10:42.239 --> 02:10:44.319
That's why you gotta make sure you got a case case, exactly.

02:10:44.479 --> 02:10:45.680
That's why you gotta do the ERC part.

02:10:45.760 --> 02:10:46.800
If they say it, then go for it.

02:10:46.960 --> 02:10:47.119
Yep.

02:10:47.279 --> 02:10:48.159
I'm glad you said that though.

02:10:48.319 --> 02:10:48.960
I need to.

02:10:49.119 --> 02:10:56.560
I wonder that's on the ex chat GPT, like you uh uh or Claude, you're an experienced experienced legal professional.

02:10:56.720 --> 02:11:00.079
Can you sue your company after they've given you a severance?

02:11:02.960 --> 02:11:05.840
If you still felt like you was done, you know, the wrong way.

02:11:06.159 --> 02:11:10.560
Can you sue your company what for discrimination even after receiving the severance?

02:11:10.800 --> 02:11:19.039
Claudette says most severance agreements include a release of claims, legal language where you agree to waive your right to sue the company in exchange for the severance payment.

02:11:19.199 --> 02:11:23.600
If you sign one of those, you likely gave up your right to bring discrimination claims.

02:11:23.920 --> 02:11:27.359
So the first question is always Did you sign a release and what did it cover?

02:11:27.520 --> 02:11:31.840
However, there are exceptions and circumstances where you still may have claims.

02:11:32.000 --> 02:11:40.479
If the release was signed under duress, the release was not knowing and voluntary, the release language didn't cover your specific claim, fraud or misrepresentation.

02:11:40.560 --> 02:11:45.760
The release is unconscionable What is it?

02:11:46.479 --> 02:11:47.600
Break it down.

02:11:52.159 --> 02:11:57.520
Unconscionable the second to last bullet.

02:11:57.680 --> 02:11:58.640
What does that say?

02:12:00.159 --> 02:12:01.279
Second to last bullet.

02:12:01.439 --> 02:12:01.840
Yeah.

02:12:02.079 --> 02:12:04.239
I guess it's like unconscious, unconscionable.

02:12:04.560 --> 02:12:05.199
Did I say it right?

02:12:05.359 --> 02:12:05.520
Yeah.

02:12:05.680 --> 02:12:06.640
Extremely one sided.

02:12:06.720 --> 02:12:06.880
Yeah.

02:12:07.119 --> 02:12:07.760
It's not conscious.

02:12:08.159 --> 02:12:10.720
I need some speech therapy in my life, y'all.

02:12:10.960 --> 02:12:16.960
Um, so even if you signed a release, you can generally still file a charge with the EEOC.

02:12:18.960 --> 02:12:19.199
Yeah.

02:12:19.359 --> 02:12:24.399
I think again, because like a lot of times the duress is hey, you got X amount of time to sign it.

02:12:24.640 --> 02:12:25.119
That part.

02:12:25.359 --> 02:12:40.479
So like I know in the person we was talking about, I think a couple of days ago, in their situation, they wanted some more time, but they only gave them a deadline and they kind of played ball with them a little bit, but they really couldn't do what they want to do because they gave them okay, well, you need to do it by the end, that type stuff.

02:12:41.039 --> 02:12:43.600
So um that sucks.

02:12:43.840 --> 02:12:49.199
And all this stuff is really just about layoffs.

02:12:49.279 --> 02:12:50.079
So here's another one.

02:12:50.159 --> 02:12:52.079
It's called your boss is sabotaging you.

02:12:52.880 --> 02:12:55.199
That's how you spot a boss who's trying to sabotage you.

02:12:55.520 --> 02:12:56.880
They keep shifting the goalpost.

02:12:56.960 --> 02:12:59.680
The expectations for you change every single time you meet with them.

02:13:00.000 --> 02:13:04.800
They gaslight you by rewriting history, having you wondering if you dreamt that meeting you had last week.

02:13:05.119 --> 02:13:06.159
They withhold information.

02:13:06.239 --> 02:13:09.680
You're the last person to find out the information that is meant for you to know.

02:13:10.000 --> 02:13:14.000
They block your visibility by forgetting to mention your work where it needs to be heard.

02:13:14.239 --> 02:13:15.920
Their feedback is inconsistent.

02:13:16.000 --> 02:13:18.159
You can't win because the rules keep changing.

02:13:19.840 --> 02:13:20.640
Yeah, she's right.

02:13:20.800 --> 02:13:22.000
I thought that was longer.

02:13:22.239 --> 02:13:36.800
Um last one is corporate America deserves compensation far beyond their paycheck.

02:13:37.039 --> 02:13:42.079
Because the bullshit you put up with in kill corporate America, I cannot wrap my head around it.

02:13:42.239 --> 02:13:43.600
I I don't understand it.

02:13:43.680 --> 02:13:45.600
I don't backstory.

02:13:45.680 --> 02:13:55.920
I've been an entrepreneur for a good little amount of time, and I jumped back into uh corporate America, and that was the biggest mistake I've ever made in my entire life.

02:13:56.720 --> 02:14:00.000
Corporate America is trash, okay?

02:14:00.319 --> 02:14:01.359
Trash.

02:14:01.600 --> 02:14:09.119
The the mental capacity you have to have to deal with that shit on a day-to-day blows my mind.

02:14:09.520 --> 02:14:10.640
But I want to stop it.

02:14:10.720 --> 02:14:12.159
I want to know what she does.

02:14:12.399 --> 02:14:16.960
I'm always interested when people say this what is your job and what do you do?

02:14:17.119 --> 02:14:18.640
I was just why do you feel that way?

02:14:18.880 --> 02:14:22.319
And I was just gonna say it can be the culture of the company too.

02:14:22.560 --> 02:14:26.399
Yeah, I agree that can absolutely make or break.

02:14:27.119 --> 02:14:37.760
And then the amount of money that you walk home with for the torture, who push my muffin cat back, blue baby.

02:14:38.000 --> 02:14:38.880
Because what?

02:14:39.439 --> 02:14:39.920
What?

02:14:40.159 --> 02:14:46.319
So I jumped back into corporate America because I panicked as an entrepreneur, and I don't want anybody else to do this.

02:14:46.399 --> 02:14:47.520
So learn from me.

02:14:47.680 --> 02:14:49.680
I had a business, I did very well in business.

02:14:49.760 --> 02:14:54.720
At one point, I was making$15,000 to$20,000 a month from the comfort of my home.

02:14:54.880 --> 02:14:59.199
I was waking up to six to nine hundred dollars from an online store that I had.

02:14:59.359 --> 02:15:02.079
I'll give y'all that story in a minute.

02:15:03.119 --> 02:15:04.960
But I panicked, right?

02:15:05.039 --> 02:15:06.800
They were talking about recession, recession, recession.

02:15:06.880 --> 02:15:09.520
My oldest daughter was going into her junior year high school.

02:15:09.600 --> 02:15:10.479
I said, college is coming.

02:15:10.640 --> 02:15:12.399
I can't expect dad to cover the whole thing.

02:15:12.479 --> 02:15:13.119
You know what I'm saying?

02:15:13.199 --> 02:15:16.000
Like that's that would be be unfair on my part.

02:15:16.399 --> 02:15:17.760
But they just kept saying recession.

02:15:17.840 --> 02:15:24.079
If you know anything about business, you can make$20,000 one month, and in another month, you might only make$10,000, if that, you know what I'm saying?

02:15:24.239 --> 02:15:28.560
So I panicked, and I am regretting my decision ever since.

02:15:28.640 --> 02:15:29.520
I did not trust God.

02:15:29.680 --> 02:15:33.359
He showed me that he could provide and make a way, and I didn't trust it.

02:15:33.600 --> 02:15:35.439
And that that's my own fault.

02:15:35.680 --> 02:15:37.039
But I've learned my lesson.

02:15:37.920 --> 02:15:39.359
What do you do?

02:15:40.560 --> 02:15:41.359
Get to the point.

02:15:41.680 --> 02:15:42.960
Please believe me on that.

02:15:43.119 --> 02:15:50.560
Because the things that I am being subjected to, the uh I I don't have the mental capacity for this shit every day.

02:15:50.720 --> 02:15:52.399
Like, I don't understand it.

02:15:52.800 --> 02:16:08.159
The level of arrogance, the level of incompetence, the the level of stupidity, the level of trying to like crabs in a barrel, everybody trying to beat each other out.

02:16:08.239 --> 02:16:10.000
At the end of the day, I'm just here to make my money.

02:16:10.079 --> 02:16:11.600
I don't I don't give a damn about all of that.

02:16:11.680 --> 02:16:12.239
You know what I mean?

02:16:12.319 --> 02:16:22.640
Like, I don't understand the level of racism, sexism, misogyny, like the things you are subjected to mentally in corporate America.

02:16:24.319 --> 02:16:27.119
It's a I don't understand it.

02:16:27.760 --> 02:16:28.640
I don't understand it.

02:16:28.720 --> 02:16:31.119
And I knew in college I didn't want to work a nine to five, you know what I'm saying?

02:16:31.199 --> 02:16:33.680
I knew I was gonna run my own business and be an entrepreneur.

02:16:33.840 --> 02:16:38.959
But when I say I gotta get out of here, my my mental is starting to be affected.

02:16:39.040 --> 02:16:40.959
I had a nervous breakdown at work the other day.

02:16:41.120 --> 02:16:43.040
I had a whole anxiety attack.

02:16:43.280 --> 02:16:45.200
Like, I and it was bad.

02:16:45.280 --> 02:16:47.440
It was one of the worst anxiety attacks I've ever had.

02:16:47.600 --> 02:16:48.959
I have to get out of there.

02:16:49.440 --> 02:16:51.920
All right, I still don't know she wanted what she does.

02:16:52.000 --> 02:16:57.840
So I'm gonna have to go peruse her TikTok and I want to see if I can figure that out real quick.

02:16:58.000 --> 02:17:04.399
Um, because I'm like, you didn't say anything, like you didn't say nothing with your girl the other day, you just keep on saying it's bad and it's all the same.

02:17:04.639 --> 02:17:07.520
But I mean, you can have those same experiences as an entrepreneur too.

02:17:07.680 --> 02:17:14.879
I kind of feel like a lot of the stuff that she was pinpointing about corporate America can be applied to just life in general.

02:17:15.040 --> 02:17:23.600
That's just life, that's how it is, whether you're an entrepreneur or in the corporate role.

02:17:23.920 --> 02:17:24.639
Let's see.

02:17:25.520 --> 02:17:34.159
Yeah, I mean, I'll found a video because I seen one of the other creators I uh I do share, but like, yeah, she don't implicitly say what she does.

02:17:34.239 --> 02:17:38.000
So I definitely would have to say, uh, let me see.

02:17:40.799 --> 02:17:42.559
Yeah, I would have to, okay.

02:17:42.639 --> 02:17:44.479
So she says she got her, oh she quit her job.

02:17:44.799 --> 02:17:45.520
Yeah, I don't care.

02:17:45.600 --> 02:17:50.559
Like, I don't care enough to kind of to figure out what she did, but I don't know.

02:17:50.799 --> 02:17:58.559
Um so I will say that um the climate we in now, just be diligent, especially if you're at work.

02:17:59.200 --> 02:18:15.040
Um I'm pretty sure companies will be starting to email everybody about all this stuff to be vigilant, report emails, fishing, all the yada yada yada yada stuff, just because you know the host of a striker, you know, scared everybody.

02:18:15.200 --> 02:18:21.040
And I think it's gonna have a lot of companies, whether big or small, trying to say, okay, we need to prevent this.

02:18:21.120 --> 02:18:26.559
You know, let's start doing, let's search for the ILCs and all this other stuff that you know we've seen out there.

02:18:26.639 --> 02:18:30.719
And if you even got a threat intel team, let's see what they said about our industry.

02:18:30.879 --> 02:18:41.600
And so you'll see people share secrets or or strategies with one another, but hopefully, like I said, I don't think you really can't really prepare too much for inside the threats.

02:18:42.000 --> 02:18:44.719
So that's when I'm gonna start seeing.

02:18:44.799 --> 02:18:54.559
Well, not me, but I've definitely wanna look into the research of uh demographics at the company and who they probably will be checking on, like times they log on and what they do.

02:18:54.639 --> 02:18:58.000
They're gonna be probably using like a lot of UEBA rules good now as well.

02:18:58.399 --> 02:18:59.600
Turn it on, turn it on.

02:19:00.000 --> 02:19:01.360
It should have been on, literally.

02:19:01.600 --> 02:19:02.399
It should have been on.

02:19:02.559 --> 02:19:16.000
But that's the beauty of of having an an IRM um solution in place, is because it will be able to spot a you don't ever you don't you ain't like that, you don't ever do that if it's configured properly.

02:19:16.159 --> 02:19:18.319
If it if it is configured, like I don't remember.

02:19:18.479 --> 02:19:25.280
But but but the gag is that a lot of people turn it on and then they don't like we had a dude one time, he kept on like it was odd.

02:19:25.360 --> 02:19:31.120
So we sent the to the insider team because we if one time happened, I was like, all right, cool, I'll let you slide this time.

02:19:31.280 --> 02:19:38.319
But he kept like trying to see if he could log on to the different cloud providers, and of course it was always Bop.

02:19:38.479 --> 02:19:40.559
You couldn't log into them, like personal, yeah.

02:19:40.639 --> 02:19:42.559
I was like, who what you doing?

02:19:42.719 --> 02:19:43.680
You doing a job, something?

02:19:43.760 --> 02:19:45.520
No, I'm just checking, like checking for what?

02:19:45.680 --> 02:19:49.680
So I mean, I'm pretty sure they probably asked him, but they they it kept on he kept on doing it.

02:19:49.840 --> 02:19:53.600
Um, but I think it turned out to be some type of misconfiguration and an alerting as well.

02:19:53.680 --> 02:19:57.360
But it was just odd that you know, why are you just checking every single one?

02:19:57.600 --> 02:20:00.719
So if you see something, say something.

02:20:01.520 --> 02:20:06.879
Um, it is what is today, it's the 15th.

02:20:06.959 --> 02:20:09.360
Yeah, so we got 15 days to my birthday.

02:20:09.520 --> 02:20:14.079
So hey, I ain't doing what we doing, being born.

02:20:14.399 --> 02:20:15.040
Oh my god.

02:20:15.200 --> 02:20:18.559
Oh no, I'm off for my birthday.

02:20:18.719 --> 02:20:22.000
You ain't gonna have a lose, then then I should.

02:20:22.079 --> 02:20:23.920
I didn't be dry.

02:20:24.079 --> 02:20:25.760
I gotta see, you know, me.

02:20:26.000 --> 02:20:28.559
First of all, the funny thing is, I think you said it too.

02:20:28.799 --> 02:20:30.879
I I literally and I just saw my TikTok.

02:20:30.959 --> 02:20:31.200
Exactly.

02:20:31.360 --> 02:20:38.000
I just saw a TikTok uh a guy who was like, My birthday is not my responsibility, that's my girls.

02:20:38.159 --> 02:20:38.879
I don't care.

02:20:39.120 --> 02:20:42.879
That and if a man wants to celebrate his birthday, they call that sassy anyway.

02:20:43.200 --> 02:20:45.040
Because they be like, Why you want to celebrate your birthday?

02:20:45.360 --> 02:20:46.879
My god, men can't do nothing.

02:20:47.120 --> 02:20:49.920
We can't, you can't do nothing, you can't.

02:20:50.000 --> 02:20:51.760
Um, but I don't know what I'm doing for.

02:20:51.840 --> 02:20:56.399
I know, like so the weekend before my birthday, my parents renew their vows.

02:20:56.559 --> 02:20:57.120
Oh, that's exciting.

02:20:57.280 --> 02:21:02.239
So I'm gonna make that be their new wedding day because they got married on my birthday when I was four.

02:21:02.479 --> 02:21:05.280
Oh, so that's need to be their name.

02:21:05.360 --> 02:21:10.319
I'm gonna if I have to stem say something, so I'm glad y'all got your own day now, so I can have mine back.

02:21:10.639 --> 02:21:11.680
Because it used to be hard.

02:21:11.920 --> 02:21:13.760
Like, happy birthday and happy anniversary.

02:21:13.840 --> 02:21:14.559
I'm like, no.

02:21:14.719 --> 02:21:19.920
Oh, so yeah, I I'm I'm saying that you should do something, but I didn't do nothing for my birthday.

02:21:21.120 --> 02:21:21.440
Not it.

02:21:21.920 --> 02:21:24.159
I mean, like with my friends, is what I'm saying.

02:21:24.399 --> 02:21:24.879
I don't know.

02:21:25.040 --> 02:21:31.680
I mean, shoot, we can come here, uh record uh pin stacks right there, bowl or something.

02:21:31.760 --> 02:21:37.840
I don't know, I'd be something like I'm I'm so such a grandpa because I kind of just be in you you acting like grandpa for sure.

02:21:38.079 --> 02:21:41.600
I'll be enjoying like calmness, peace and quiet, rest.

02:21:41.840 --> 02:21:43.440
Yeah, just just sleeping.

02:21:43.520 --> 02:21:48.000
Yeah, like I remember one time I I took off and I had went out of town.

02:21:48.079 --> 02:21:50.559
I really didn't do nothing, like people ask, hey, what'd you do?

02:21:50.799 --> 02:21:51.280
Sleep.

02:21:51.520 --> 02:21:53.040
I was so tired that I was sleeping.

02:21:54.079 --> 02:21:57.280
I've sleep until about like 12, one or two or three.

02:21:57.360 --> 02:21:58.239
Like, I was so tired.

02:21:58.319 --> 02:21:59.680
I was getting sleep that I didn't get.

02:21:59.760 --> 02:22:04.159
So that's kind of when you just always working it up, that's kind of how I go for you.

02:22:04.399 --> 02:22:11.040
So you just need like a little wellness, a little wellness, me about me about nine-day massages like two days that week or something like that.

02:22:11.120 --> 02:22:12.799
Like, none major, none major.

02:22:12.959 --> 02:22:16.879
But um, but nah man, I hope you guys enjoyed this episode.

02:22:17.040 --> 02:22:22.079
I definitely want to keep up with Iran, the Salesforce stuff, it'll probably tear off.

02:22:22.159 --> 02:22:25.600
But the AI psychosis one, I think we're gonna see more of that.

02:22:25.760 --> 02:22:27.840
And and like I said, it's gonna be just like the gun control.

02:22:28.079 --> 02:22:29.120
We need AI control.

02:22:29.280 --> 02:22:34.399
Everybody's gonna be saying AI control, but is it on AI or is it the people?

02:22:34.479 --> 02:22:35.920
Like, like they say, guns don't kill people.

02:22:37.280 --> 02:22:39.040
Guns kill people, they can only do so much.

02:22:39.120 --> 02:22:44.479
I mean, there could absolutely be some restrictions put in to stop violent, but unsafe.

02:22:45.040 --> 02:22:49.440
If you told me to go run on the street, am I gonna do it just because you told me to?

02:22:49.600 --> 02:22:54.319
No, but AI will exactly, but that'll mean I have to do it because somebody told me to do it, free will.

02:22:54.639 --> 02:23:02.159
So these people just aren't well, and they need, like I said, it's gonna be some wearable tech because yeah, mark my work.

02:23:02.319 --> 02:23:10.000
If y'all watching this right now, y'all want to work together on some some wearable tech and also want to work on parameters for for kids' AI safety guardwheels.

02:23:10.159 --> 02:23:14.639
Like, what am I thinking of Isaiah?

02:23:14.879 --> 02:23:15.840
Losing Isaiah?

02:23:16.239 --> 02:23:18.559
No, Isaiah.

02:23:18.879 --> 02:23:24.959
Isaiah who uh uh Andy from Detroit.

02:23:25.360 --> 02:23:27.280
Am I making up his name?

02:23:27.520 --> 02:23:28.639
You making up a name right now.

02:23:28.719 --> 02:23:30.000
You're thinking about Xavier.

02:23:31.760 --> 02:23:32.879
You got him in Isaiah.

02:23:36.000 --> 02:23:40.319
But that sounds like something like that he would like the wearable piece that he'd be into.

02:23:40.719 --> 02:23:40.959
He might.

02:23:41.040 --> 02:23:42.000
I need to hit him up on that.

02:23:42.079 --> 02:23:44.479
I know some other stuff, like, and you know what's funny?

02:23:44.639 --> 02:23:50.239
I'm screaming at calling him Isaiah, and we hadn't even gotten to the other piece, and it's not talked about enough.

02:23:50.399 --> 02:23:52.159
I think we need to start covering covering it.

02:23:52.399 --> 02:23:54.159
Uh augmented reality.

02:23:54.399 --> 02:23:55.280
Oh, I love it.

02:23:55.360 --> 02:23:56.000
I'm here for it.

02:23:56.079 --> 02:23:56.959
So, yeah, you know I love it.

02:23:57.200 --> 02:23:59.280
My guy Rex, eventually, we probably have Rex on.

02:23:59.440 --> 02:24:00.879
Rex makes the glasses for that.

02:24:00.959 --> 02:24:05.920
So, like, you'll upload his videos of hey, me DJing with his glasses on, and he's putting out records and stuff.

02:24:06.239 --> 02:24:16.079
Just imagine now you go from AI to AR, and now you got kids looking at stuff they ain't supposed to look at directly in their glasses, and then it starts being like that dark mirror stuff.

02:24:16.159 --> 02:24:17.360
That's all I'm saying.

02:24:17.600 --> 02:24:18.639
That's all I'm gonna say.

02:24:18.879 --> 02:24:23.440
Um, hang on, let me do this because since it's time to what you call it, you know, when it's when it's time to go.

02:24:23.760 --> 02:24:30.799
Um, that's not it.

02:24:30.879 --> 02:24:31.760
It's this one.

02:24:37.280 --> 02:24:38.879
You gotta turn it up.

02:24:43.840 --> 02:24:45.440
I'm really dead.

02:24:47.760 --> 02:24:49.440
But yeah, man, I appreciate everybody.

02:24:49.600 --> 02:24:51.600
Glad that y'all um was rocking with us.

02:24:51.920 --> 02:24:57.680
Y'all have fun, y'all be easy, and like I always say, until next time, let's stay textual and we out.

02:24:58.000 --> 02:24:58.399
Peace.