<v SPEAKER_08>Welcome back to the Textual Talk Podcast.
<v SPEAKER_08>In this week's episode, we're navigating a surge of serious global cyber threats and digging into some critical shifts in the tech landscape.
<v SPEAKER_08>We're starting with a major attack.
<v SPEAKER_08>A pro-Iran activist group claims to have hit medical device giant striker, causing massive global system outages.
<v SPEAKER_02>That's right.
<v SPEAKER_02>And the global security picture is grim.
<v SPEAKER_02>We're discussing a state-backed Chinese hacking campaign, saw typhoon, and spent quietly compromising global telecom giants, and the chaos that GPS attacks near Iran are wreaking on ordinary life.
<v SPEAKER_02>Plus, the dangers of AI are becoming real.
<v SPEAKER_02>One lawyer is now warning of mass casualty risk from AI psychosis cases.
<v SPEAKER_08>We're also talking about the people and the culture of tech.
<v SPEAKER_08>From a shocking report about a DOE employee stealing Social Security data on a thumb drive to the vital discussion on why black recruiters are essential for creating an equitable workforce.
<v SPEAKER_08>And on a lighter note, we're diving into the promised MacBook Neo and why everyone needs to be playing around with all the new AI agentic tools coming out.
<v SPEAKER_02>We've got cybersecurity news, workplace debates, and a critical look at the future of tech, including Google's 3.2 billion acquisition of Wiz and how Facebook is finally making it easier for creators to fight impersonators.
<v SPEAKER_02>Don't go anywhere.
<v SPEAKER_02>Episode 203 starts now.
<v SPEAKER_02>Welcome, welcome back, everybody.
<v SPEAKER_02>It's your boy HD in the building, and we got Cyber Shorty.
<v SPEAKER_08>Hey y'all.
<v SPEAKER_02>How y'all been enjoying these intros?
<v SPEAKER_02>We're trying to spice it up.
<v SPEAKER_02>I think I like it.
<v SPEAKER_08>I low-key that that ate today.
<v SPEAKER_08>Yeah.
<v SPEAKER_08>That ate down today.
<v SPEAKER_02>I like it too because so audio and video is different, but for the audio listeners, they would really like it because they know exactly what we're talking about.
<v SPEAKER_02>Exactly.
<v SPEAKER_02>They're not on YouTube.
<v SPEAKER_02>People can like hit the description and kind of see what we're talking about.
<v SPEAKER_02>And they probably click somewhere to see what we're talking about.
<v SPEAKER_02>So I really like that.
<v SPEAKER_02>And um I think first things first, you know, let's start off with you.
<v SPEAKER_02>You guys cannot see on the screen.
<v SPEAKER_02>Let me go back to this so I can switch back to her.
<v SPEAKER_02>Um I can pull her up.
<v SPEAKER_02>Shorty has a MacBook Neo.
<v SPEAKER_08>I'm in love.
<v SPEAKER_08>You guys, this is my first MacBook.
<v SPEAKER_08>And okay, so I'm Team Apple, we know that.
<v SPEAKER_08>But I just did not want to get any type of Mac device computer based.
<v SPEAKER_08>And I'm in love.
<v SPEAKER_08>It just makes sense.
<v SPEAKER_08>It makes sense.
<v SPEAKER_08>If you already have all these Apple products, it makes the most sense.
<v SPEAKER_09>Yeah.
<v SPEAKER_08>Um obviously it is, you know, a cheaper laptop.
<v SPEAKER_08>I'm not expecting, you know, pro capabilities from it.
<v SPEAKER_08>Um, but you know, the the audio's good, it looks good.
<v SPEAKER_08>I haven't really done much on here besides um a couple of I haven't really done much.
<v SPEAKER_08>Music, research, you know, getting prepped for the pod.
<v SPEAKER_08>I haven't done anything that's, I guess, super resource intensive yet, but I'll keep you guys posted.
<v SPEAKER_08>But I love it.
<v SPEAKER_08>I love it.
<v SPEAKER_08>10 out of 10.
<v SPEAKER_02>Yeah, it's funny because I think it was like one or two episodes ago, I was telling you about how you should go ahead and get a MacBook.
<v SPEAKER_02>And you was like, I don't want to get a MacBook.
<v SPEAKER_02>And I was telling her, like, when it comes to now that stuff that you're doing, I know you've been playing with AI.
<v SPEAKER_02>I know now you've been doing your content creation, everything else, you really can't find a better value.
<v SPEAKER_02>Like, though I love Windows, like, like if you're a gamer for PC and then you're you're upgrading your PC and all the other stuff, Windows, you know, is the move for that.
<v SPEAKER_02>But when it comes to this, this thing is so simple.
<v SPEAKER_02>You know, I years ago, before I ever got a Mac, I was like, man, I'm not gonna pay no$2,000 for no Mac, no laptop.
<v SPEAKER_02>That's crazy, whoop-de-woop.
<v SPEAKER_02>And now all of a sudden, I go on my second MacBook Pro because they last forever and they do exactly what I needed to do.
<v SPEAKER_02>Like this thing has great battery life.
<v SPEAKER_02>As you can see, the fans not even cut on yet.
<v SPEAKER_02>Like, that's one of my pet peas of windows.
<v SPEAKER_08>Bye.
<v SPEAKER_02>No matter how spec'd out it is, the fan will start coming on.
<v SPEAKER_08>My aces, throw it away.
<v SPEAKER_08>Immediately.
<v SPEAKER_08>It gets so hot, it oh, it just I know.
<v SPEAKER_08>That was not a good purchase.
<v SPEAKER_08>We should talk about like not good tech purchases one day.
<v SPEAKER_08>Because that was not, that was that was.
<v SPEAKER_02>Well, you got it.
<v SPEAKER_02>You just went out and it's it's similar.
<v SPEAKER_02>It reminds me, this conversation reminds me of um like it whether it's like a dad or a big brother or something, like the sisters going to buy their first car.
<v SPEAKER_08>It's just I just did a lot of stupid stuff.
<v SPEAKER_08>Like, you know how about the the iPad?
<v SPEAKER_08>I mean, I still love her.
<v SPEAKER_08>I I get the most use out of my iPad for sure.
<v SPEAKER_08>But I didn't everything I told you I was gonna do with it.
<v SPEAKER_08>I ain't done none of that with it.
<v SPEAKER_02>I mean, I use my iPad like when I don't, if I don't look this around, like it's like a little simple, but it's multifaceted now for me.
<v SPEAKER_02>In the car, I could do something real quick.
<v SPEAKER_02>Or now on long trips, it's with josh washes.
<v SPEAKER_08>So I do low-key want a smaller iPad now.
<v SPEAKER_08>I know.
<v SPEAKER_08>But but I still want the big one, but I want like the little mini one.
<v SPEAKER_02>Now, guys, the next thing we're gonna have her do, like when I come in here next with the S26 Ultra, she's gonna be like, okay, I'm gonna go get one.
<v SPEAKER_08>I'm screaming.
<v SPEAKER_02>She's gonna go get one.
<v SPEAKER_02>She's gonna replace one of these iPhones she got on her desk.
<v SPEAKER_08>I like I do, I think my favorite part about this though is just how it already integrates with all of my Apple stuff.
<v SPEAKER_08>So, like, you know, content, my pictures, and all that stuff that I have on here, it just makes it easier versus you having to figure out how to get it on said device.
<v SPEAKER_08>Um, so that's probably my favorite thing.
<v SPEAKER_08>Is everything's already here.
<v SPEAKER_02>Perfect, perfect.
<v SPEAKER_02>Now, one of the things I had on the docket um to be a little serious today, or I could try to be serious, is um there's always been these contentious debates over the last couple weeks about who works in tech and who don't.
<v SPEAKER_02>And oh, you're a recruiter, you don't really work in tech, you just you work in recruitment.
<v SPEAKER_02>While all that stuff is fun and it's good for the algorithm to get clicks and go back and forth, on a serious tip, black recruiters, whatever they do, and whether it's a tech company or not, they are essentially needed, especially for us.
<v SPEAKER_02>Uh, since I want to say, probably since Trump probably came back in office, like working, being black, like in corporate, has been like very different when it's come to interviewing and getting callbacks and everything else.
<v SPEAKER_02>Like, you know, we are really weren't getting a lot of help when it came to DEI.
<v SPEAKER_02>Like those initiatives really was more so for everybody that didn't look like us, if you want to go look at the numbers.
<v SPEAKER_02>But now, like, I could I can tell you guys a personal story from a client of mine who showed me a screenshot of her, and I don't know if it was another recruiter at a recruitment company.
<v SPEAKER_02>I'm not gonna divorce names here, uh, just because I don't want to get her in any trouble based on whatever conversation she's having for job things.
<v SPEAKER_02>But she sent me a screenshot and it showed whoever she's talking to.
<v SPEAKER_02>Uh, she was pretty much saying whatever recruiter didn't call her.
<v SPEAKER_02>And the guy said, What?
<v SPEAKER_02>I can't believe that.
<v SPEAKER_02>I gave them two resumes.
<v SPEAKER_02>Your resume was much better than his, and let me guess, he called the white guy.
<v SPEAKER_02>And I said that because a lot of times when we come on here, we'll see in the comments, people say we complaining and this or that.
<v SPEAKER_02>I'm like, nobody's really complaining.
<v SPEAKER_02>We kind of already know we're up against, but just actually seeing it in the it'll kind of like really infuriate you.
<v SPEAKER_02>It's like, what's going on here?
<v SPEAKER_02>Like, and then if I take that a step further, then sometimes you get to a new company and you find out like who's managing you or whatever you're doing, like these people aren't better than me.
<v SPEAKER_02>I can do this.
<v SPEAKER_02>Like, all the stuff that's happening could have been nipped in the bud if somebody more competent was in charge.
<v SPEAKER_02>And yet, a lot of times that's when I was talking to a friend of show Bryson, and I was talking about how when I apply to jobs a lot of times, and for whatever role it is, I go look through the security org and just see if I see one or two phases that look like me.
<v SPEAKER_02>Most of the time I don't.
<v SPEAKER_02>So most of them times I chalk it up to you may get hit back up, but nine times out of ten, they're not calling you fam.
<v SPEAKER_02>Now, these are the biases.
<v SPEAKER_02>This is the one part of the diversity part when it comes to race and everything else.
<v SPEAKER_02>The other part I talk about when it comes to security and diversity is backgrounds far as what did you used to do for work or where you came from or what company that you used to work for, and how that background can help you exceed in uh org for security.
<v SPEAKER_02>But I don't want to go on like a long tangent with this because I think like after that she ended up having a call with a recruiter, and the recruiter basically tried to talk them out of the role saying they don't think you'd be a good fit.
<v SPEAKER_02>I'm like, why in the hell would you call somebody and say you don't think they're gonna be a good fit?
<v SPEAKER_02>Like, what was the whole purpose of that?
<v SPEAKER_02>Like, hang on.
<v SPEAKER_02>Let me let me let me do this real quick because guys, I got my sounds down.
<v SPEAKER_03>What do you mean by that?
<v SPEAKER_02>What do you what do you mean by that?
<v SPEAKER_02>Like, I don't understand like none of this stuff that's going on right now in the industry.
<v SPEAKER_02>Um, you have people who aren't qualified getting hired.
<v SPEAKER_02>You just had the what did Lee send me about the guy that uh I'm gonna find him off on really quick because he always sending me some stuff.
<v SPEAKER_02>Because remember the last two that was over uh CISA, I think that's how you pronounce it, right?
<v SPEAKER_02>C-I-SA.
<v SPEAKER_02>He was not qualified.
<v SPEAKER_02>And the next person, so see, the Senate on Tuesday approved, I guess, General Joshua Rudd to serve as head of both U.S.
<v SPEAKER_02>Cyber Command and the National Security Agency, finally filling a critical military position that has remained vacant since last April.
<v SPEAKER_02>The Senate approved Rudd by a vote of 7129, with some Democratic lawmakers objecting to his lack of cyber experience.
<v SPEAKER_02>Rudd was elevated to the rank of general as part of the vote.
<v SPEAKER_02>Now, how can you put somebody over a national security agency and a cyber command and they have no experience in either?
<v SPEAKER_02>So, like, sometimes what I be wanting to tell them people when they give feedback or when they want to talk about experience and stuff, it's like, bro, don't talk to me about experience and what I need to know how to do from no longer when y'all have people's lives at stake with people that don't know what they're doing.
<v SPEAKER_02>And this, based on today's episode, this is the worst time people who don't know what they need to be, don't know what they're doing, are in charge.
<v SPEAKER_02>Especially which I see what's going on with Iran and then whoever their allies are.
<v SPEAKER_02>Uh SISA don't have any money now because of the administration and everything else.
<v SPEAKER_02>It's a mess.
<v SPEAKER_02>So when you get mad or you come in the comments and you try to like troll the black people or say we whining or not, we're not.
<v SPEAKER_02>We're looking at the injustices that's happening, people that are qualified.
<v SPEAKER_02>And it's not even take black out of it.
<v SPEAKER_02>Just say people who are qualified are not even getting a shot at the role because you just want a person that's going to say yes to you because they don't know what they're doing, and you can control them because they don't know what they're doing.
<v SPEAKER_02>They're not going to have a backbone.
<v SPEAKER_02>And so when we look up in the next couple of years and everything is real bad, y'all can blame your administration for the trickle-down effect that it's had on the nation and in the subpockets of the industry and all these people that vote this way.
<v SPEAKER_02>And this also goes into one of the last things where and I'll put it on split screen too.
<v SPEAKER_02>When I was talking about all the black women that love to champion, my white manager, my white manager, my white manager.
<v SPEAKER_02>And I was like, that's cool.
<v SPEAKER_02>But what your white manager voted for when it came to election time.
<v SPEAKER_02>Exactly.
<v SPEAKER_02>So they only have seen it at work and say, no, you you really don't understand.
<v SPEAKER_02>It's always a back and forth.
<v SPEAKER_02>I get it.
<v SPEAKER_02>Two things can be true.
<v SPEAKER_02>Your black manager did treat you better than that black woman manager.
<v SPEAKER_02>That could possibly be all the way true.
<v SPEAKER_02>I know for a fact that's not every black woman manager.
<v SPEAKER_02>Sometimes some of them are jealous because hey, maybe the younger woman is getting more attention to them.
<v SPEAKER_02>Maybe they're more attractive than they are.
<v SPEAKER_02>Maybe, you know, yada yada.
<v SPEAKER_02>Those petty things do happen.
<v SPEAKER_02>But also what can happen is these people vote in the self-interest of themselves.
<v SPEAKER_02>And that's directly affecting you.
<v SPEAKER_02>And matter of fact, I think that it kind of goes into what you're talking about with the Europe stuff, but how I think it's harder for y'all now, too, getting jobs now.
<v SPEAKER_02>Just being just being black women.
<v SPEAKER_08>And we're and we're the most educated.
<v SPEAKER_02>That's a topic, that's a panel topic that me and Bryson want to bring up because we know black women are educated.
<v SPEAKER_02>I mean, it's but no, no, but it's it's a nuanced conversation because the most educated without a black man, I think, of course, because women gravitate to going to school more than men do.
<v SPEAKER_02>But I everybody know, and then we're gonna talk about what the actual majors are.
<v SPEAKER_02>So it's like a it's gonna be a really spirited conversation, not in a bad faith way, but some good things that we could talk about and how what can we do with this information and band together and um all this other stuff.
<v SPEAKER_02>But I just want everybody to know, like, if you're a black recruiter, uh, we appreciate you uh because you go like a lot of you guys do go to X amount when you can and review our stuff.
<v SPEAKER_02>And not only black recruiters, black black people in HR.
<v SPEAKER_02>Like a lot of these things mean a lot.
<v SPEAKER_02>Like, I got the 411 on a lot of stuff that was happening when the black uh chick in HR left my current company, she put me on a lot of game.
<v SPEAKER_02>That'll never happen if you know you ain't got the complexion for the protection.
<v SPEAKER_08>I think that black recruiters, I think that we we definitely have to give black recruiters um a round of applause.
<v SPEAKER_08>And also even from the perspective of we know that we are um I'm trying to get the words out.
<v SPEAKER_08>We know that we have a disadvantage, right?
<v SPEAKER_08>In some way, shape, or form.
<v SPEAKER_08>Um but I don't even think that people are even thinking about how does it feel to be a black recruiter, right?
<v SPEAKER_08>It's a lot that goes on that they know about that, like you just said, the the GP, the general population is just not aware of.
<v SPEAKER_08>And again, if you don't have friends that are recruiters, um, or you don't have a personal connection to a recruiter, you don't even know what's going on or the struggles that they're going through, um, we know that they're typically the first roles to go when it is time to go.
<v SPEAKER_08>You know what I mean?
<v SPEAKER_08>So I think we gotta give credit when credit is due.
<v SPEAKER_08>And shout out to our our recruiter friends.
<v SPEAKER_03>Facts.
<v SPEAKER_02>But um, I think that was very spirited, but I know that you were really ready to get into this iron striker stuff.
<v SPEAKER_08>I really, really, really, really, really, really, really am.
<v SPEAKER_08>Let me find her.
<v SPEAKER_08>So if you are not aware, your girl is from the city where Stryker is.
<v SPEAKER_08>Uh, do your math, do your do your research.
<v SPEAKER_08>Um, but I really was excited to talk about this.
<v SPEAKER_08>Um, so Stryker is headquartered in Portage, Michigan, which is basically where I'm from.
<v SPEAKER_08>Well, not Portage, but Kamazoo.
<v SPEAKER_08>Um, and so I know a lot of folks who work there.
<v SPEAKER_08>So when this hit Facebook, you know how it be, um, it was a lot of information.
<v SPEAKER_08>So on March 11th, 2026, a pro-Iranian hacktivist group called Hondala claimed responsibility for a massive cyber attack on striker, one of the large, one of the world's largest medical device companies.
<v SPEAKER_08>We're talking surgical equipment, orthopedic implants, neurotechnology, hospital beds.
<v SPEAKER_08>They have about 25 billion in revenue with about 56,000 employees, and their products reach about 150 million patients a year.
<v SPEAKER_08>Now, let me take a step back.
<v SPEAKER_08>What is a hacktivist group and how does this how is this different from ransomware?
<v SPEAKER_08>So Handala says it wiped more than 200,000 servers, devices, and systems across Stryker's Global Network.
<v SPEAKER_08>In 79 countries, employees showed up to work and saw the Handala logo on their look on their login screens.
<v SPEAKER_08>People's phones were wiped, the company shut down offices in multiple countries, including their largest hub outside the US in Cork, Ireland, where over 5,000 employees were sent home.
<v SPEAKER_08>Now, this was a wiper attack, not ransomware.
<v SPEAKER_08>And let's kind of talk a little bit more about what that distinction is.
<v SPEAKER_08>So, ransomware obviously is about money.
<v SPEAKER_08>Wipe attacks are about destruction.
<v SPEAKER_08>Handala wasn't asking for a payout.
<v SPEAKER_08>They stated that this was retaliation for a US military strike on a girls' school in southern Iran, um, the Manah school attack that killed over 170 people, most of them being children.
<v SPEAKER_08>Cyber researchers who track Hamdala believe the group is actually a front for a threat actor called Void Manticor, which is linked allegedly to Iran's Ministry of Intelligence and Security.
<v SPEAKER_08>So while they present as activists, they may be state-level resources that's backing them.
<v SPEAKER_08>Now, what is really wow, according to security analysts, the attackers may have gained access to striker's Intune console, which is the mobile device management platform that companies use to push out patches and manage all of their devices.
<v SPEAKER_08>So when you control that console, you control basically the kill switch.
<v SPEAKER_08>So they didn't need custom malware.
<v SPEAKER_08>They used Striker's own tools against them.
<v SPEAKER_08>Now, if you think about what that means, the tools that the company is using to protect their devices became the tool that was used to destroy them.
<v SPEAKER_08>And that is a supply chain of trust violation.
<v SPEAKER_08>Now, if we think of um kind of what's going on here, as of this recording, Stryker has not confirmed a restoration timeline.
<v SPEAKER_08>No ransomware, no malware payload detected, but 200,000 devices wiped.
<v SPEAKER_08>Hospitals and surgical centers that depend on Stryker are already feeling the downstream effects.
<v SPEAKER_08>I kind of think that this pattern here with healthcare and then obviously critical infrastructure is it's kind of scary because there's a lot of like geopolitical conflict that is going on right now, which is this is obviously impacting, and this is like high visibility.
<v SPEAKER_08>Um, so again, Stryker headquartered in Portage, they acquired Israeli medical tech firm Orthospace in 2019, a connection that researchers say may have contributed to Honala's targeting them specifically.
<v SPEAKER_08>The attack began in the early hours of March 11th, starting with their Cork Ireland facility.
<v SPEAKER_08>Hondala emerged after the Hamas attack of October 7th, 2023, and has since targeted Israel Israeli?
<v SPEAKER_08>My God, infrastructure, Gulf Energy companies, and Western organizations with ideological ties to the Israel, to Israel and its alleys.
<v SPEAKER_08>Um, so when you think about like Checkpoint and other companies, they are, you know, kind of um tracking.
<v SPEAKER_08>Yeah.
<v SPEAKER_08>Um, but yeah, this is a masterclass in why healthcare cybersecurity is one of the most critical and underfunded sectors in the industry.
<v SPEAKER_08>So if you are trying to specialize in healthcare IT, um, this would be a great opportunity for you to start looking into some HIPAA high trust frameworks, um, some medical device security standards, and then combining that with a little bit of um operational technology.
<v SPEAKER_08>I just can't, I can't even believe, I can't believe that happened.
<v SPEAKER_02>So I can.
<v SPEAKER_02>And I think so.
<v SPEAKER_02>It's funny enough, uh Dr.
<v SPEAKER_02>Jury, she had hit me up and next me back.
<v SPEAKER_02>She's like, you know, they in Michigan and uh so she hit me up on the side.
<v SPEAKER_02>I actually could probably play, I should play her uh voice note right here or not, but uh I should have asked her first, so I'm not gonna play it.
<v SPEAKER_02>Um but I think what happened is it's a supply chain thing.
<v SPEAKER_02>I don't think it was ransomware, like it said.
<v SPEAKER_02>I don't think it was I think they I believe they probably got into striker systems from one of their smaller companies or whatever, and found a link to some like some probably like this is all third party risk, in my opinion, to where you found out they had access to something couldn't access and had a way to get into striker kind of like more undetected because typically if your company's been breached, assume that they've been in there at least what is it?
<v SPEAKER_02>I think six months is 180 days.
<v SPEAKER_02>So you gotta assume they've been in there 180 days, and we saw from last week with uh Trizetto, they was in there about a year, and so you gotta assume that you've already been breached.
<v SPEAKER_02>That's a lot of things.
<v SPEAKER_02>That's what I normally used to say a lot of times in interviews, like, hey, well, I gotta assume we already have been a breach, because that's typically what you assume when you work in the IR.
<v SPEAKER_02>So by that standard, is this I don't call it like a logic bomb, but it could have been like, all right, look, if they do something to Iran, this is what we're gonna do to them.
<v SPEAKER_02>And I think that's what is an if then, I think that's what happened.
<v SPEAKER_08>I think that the fact that they just wiped stuff.
<v SPEAKER_08>I is that gonna are we going to see more of that?
<v SPEAKER_08>Because we we saw we saw, we've seen, we've talked about so many ransomware attacks.
<v SPEAKER_08>Is that old now?
<v SPEAKER_08>You know what I mean?
<v SPEAKER_02>Like not well.
<v SPEAKER_02>This is this is honestly, this was easier because they already had access to everything.
<v SPEAKER_08>Wiping it is crazy, but that's the thing.
<v SPEAKER_02>This is this is why the grc piece to everything has to make sense because if it's over okay.
<v SPEAKER_02>On my end, if we saw somebody do some MDM or weird IM stuff in Azure, we're gonna get a detection instantly because it's gonna be over the threshold that we see.
<v SPEAKER_02>Now, it may not be a one-to-one, like if it's one o'clock now, maybe they did it at one.
<v SPEAKER_02>We possibly may not see it to like 105 or 110 based on how the logs come in.
<v SPEAKER_02>If that happens, you gotta initially say, Okay, may they we don't see no change.
<v SPEAKER_02>This is you know, these people on the line.
<v SPEAKER_02>We need to use our our break guys accounts, whatever, and stop this, or uh whoever that person was disable their account.
<v SPEAKER_02>Because what are you doing?
<v SPEAKER_02>It's not a change, we don't really do this, yada yada yada.
<v SPEAKER_02>And so you can kind of stop the bleeding in, but at the same time, you don't know what patient zero was and.
<v SPEAKER_02>For people don't know who patient zero is, that's literally you're gonna uh talk about whatever system was compromised first.
<v SPEAKER_02>So you don't know the scope of who's all in your environment.
<v SPEAKER_02>All you know is some stuff is happening that's not happening, so it could be definitely a long day for your team, but for them to do that much damage and you didn't stop it, lets me know there is a lot of bad detections.
<v SPEAKER_02>Everybody's sallow, policies are bad because there should be a policy, and this is one of the things like we were talking about on a handoff, because we're talking about making detections for this just in case, because everybody pretty much uses most of the time in tune.
<v SPEAKER_02>And in tune is just uh for people sometimes be twofold.
<v SPEAKER_02>One, if you have a company device, or if you have your own device, they can put a container on your phone so they can app make sure like nobody should be able to access company information off your phone.
<v SPEAKER_02>Like if your phone gets stolen, they can instantly wipe it.
<v SPEAKER_02>That's literally what it's for.
<v SPEAKER_08>Listen, when I first heard about the attack, that's what I thought happened.
<v SPEAKER_08>I when I when I first heard that the devices were wiped, I thought Stryker did it like as a security.
<v SPEAKER_08>Like I was like, well, at least they they have, you know, my my logic was okay, they got their devices enrolled, they have some sort of system they're using to control them.
<v SPEAKER_08>Maybe they just did that to be safe.
<v SPEAKER_08>But when I found out it wasn't them, yeah, and um, and I'm interested to see.
<v SPEAKER_02>So, like, even in in tune, you could do one of two things.
<v SPEAKER_02>You could retire a device where it's literally you can get the information back.
<v SPEAKER_02>I don't think it's coming back, or they did the white disable where it's you know, all the data gone, and so it's like you just got a new phone.
<v SPEAKER_08>Literally, every can you imagine this?
<v SPEAKER_08>Is this insane?
<v SPEAKER_08>Like, it is so y'all, they don't they're not even asking for money, they're just like, you know what?
<v SPEAKER_08>I got something for you.
<v SPEAKER_08>We're gonna just wipe like that's but crazy.
<v SPEAKER_02>But they said a long time ago, like the fights would not be on the battlefield.
<v SPEAKER_06>Facts.
<v SPEAKER_02>I mean, we got the missile stuff that's going on and all that crap, and that's all one part of it.
<v SPEAKER_02>But now this is the part, okay.
<v SPEAKER_08>Because people don't realize what's the movie called the movie which one that the Obamas had produced.
<v SPEAKER_02>I don't know.
<v SPEAKER_08>The one that was on Netflix about the end of the world with the with the Teslas and the and all the technology.
<v SPEAKER_02>Oh, I didn't watch that one.
<v SPEAKER_08>You didn't?
<v SPEAKER_02>It was good, but this is yeah, it is, but I mean, this was most of these attacks are I just say negligence because, like I said, you know, people want all this experience, but it's probably a person out here that would have said, hmm, this person account got too much experience.
<v SPEAKER_02>And I gotta know, okay, that's why I want to really follow this.
<v SPEAKER_02>So, guys, it's not gonna be the first time we talk about this, but I want to know was it the people have access to do this from their regular account, or was it from their admin account?
<v SPEAKER_02>Because typically you should have these segmented because you're doing admin privileges inside of Intune.
<v SPEAKER_02>Who was compromised?
<v SPEAKER_02>All those different things because Taylor should have two different passwords, because tailingly you're probably not gonna have MFA on a privileged account.
<v SPEAKER_02>So the people probably compromise the regular account and say, hmm, maybe their password is the same.
<v SPEAKER_02>Let's see what it is, or let's log in, see what they can do.
<v SPEAKER_08>And this is why companies are are you know, this is another, this is another reason why pim is so important, right?
<v SPEAKER_08>But companies are annoyed with having to pim up, especially because because okay, for example, it's only two of us, it's just me and you.
<v SPEAKER_08>Why we gotta pim?
<v SPEAKER_08>It's just me and you.
<v SPEAKER_08>I know you, you know, but that's the whole point.
<v SPEAKER_08>It's that's the point of it.
<v SPEAKER_08>Yeah, so it's this is the point.
<v SPEAKER_02>It's that I don't well remember.
<v SPEAKER_02>We was talking about tabletops, yeah.
<v SPEAKER_02>So we don't know when the last night had a tabletop because companies like that, it's like a monopoly, they make an easy money because they like the own the people in a space that people go to, they get real lax because the money is coming in, but they everything else takes a backbone, it's a is a lax environment.
<v SPEAKER_02>I got a friend that works at another healthcare company, and he said it's pretty easy.
<v SPEAKER_02>Like a lot of them, think about it, a lot of people not attacking them, but now they should be on high alert.
<v SPEAKER_06>Can you believe they just wiped it?
<v SPEAKER_02>And the crazy thing is now that affects people in real life.
<v SPEAKER_08>No, how do you how do you explain that to your employees?
<v SPEAKER_08>It's one thing to explain it to the world, but how do you explain that to your employees?
<v SPEAKER_08>How and then and then this goes into like, how are you even able to get in contact with these employees if they can't even access their devices, right?
<v SPEAKER_08>They've been wiped.
<v SPEAKER_08>So how do they even you when you get a laptop and you're onboarded to a company, that's a whole process.
<v SPEAKER_08>When your device has been offboarded and you can't access anything, now how do you what what tabletop?
<v SPEAKER_08>How what are the lines of communication?
<v SPEAKER_08>No, if the line of communication goes out or down, like this is y'all, this is crazy.
<v SPEAKER_02>If you work as striker, leave us a comment.
<v SPEAKER_02>Leave us a comment below if you work as striker.
<v SPEAKER_02>Um I I hate that that happened to the people and the with medical devices it affects, but this is what happens when I'm pretty the the CSU, the CISO matter of fact, you probably should Google right now and see if they got a CISO job open up for for Striker.
<v SPEAKER_02>Because he definitely about gone at this point.
<v SPEAKER_08>I can't believe that.
<v SPEAKER_08>I mean, obviously I can believe it, but I I it's this is crazy.
<v SPEAKER_08>It's crazy.
<v SPEAKER_02>It's also a theory of mine.
<v SPEAKER_08>I'm like almost speechless.
<v SPEAKER_02>It could be an inside job too.
<v SPEAKER_02>So now when now when it comes to all the geopolitical stuff, and this is not uh what my what's the word?
<v SPEAKER_02>And look this up, make sure I'm using it right.
<v SPEAKER_02>Cast dispersions.
<v SPEAKER_02>Dispergence or dispergence.
<v SPEAKER_02>I think that's how you say it.
<v SPEAKER_02>This is the worst even they say all the time.
<v SPEAKER_08>Dispersions.
<v SPEAKER_08>Let me look that up.
<v SPEAKER_02>Look y'all, we learning in real time.
<v SPEAKER_08>Wait.
<v SPEAKER_08>I don't think I spelled it right.
<v SPEAKER_08>Me either, because I know I'm just saying dispersed.
<v SPEAKER_02>Yeah, that's not uh I don't know what um it's not disparage.
<v SPEAKER_02>Or maybe it's the other word, uh version of disparage.
<v SPEAKER_08>Disparage.
<v SPEAKER_02>I don't know.
<v SPEAKER_02>We're not this is an English class.
<v SPEAKER_02>We'll we'll figure it out.
<v SPEAKER_02>But um, I just want to say that this is where, and I would not be surprised, where companies start doing specialized monitoring on their overseas contractors and the people that they work for, figuring out who their companies are aligned with, because these people can also be insider threats now.
<v SPEAKER_02>And so the key word I also want to think about the striker stuff, I believe it could be also that insider threat or actual insider, whether it's at striker or one of the companies that they have like that's one of their suppliers that has like a really strong relationship with them because you know something ain't right.
<v SPEAKER_08>I I'm floored and it's scary.
<v SPEAKER_08>And if wow, wow.
<v SPEAKER_08>I don't even have words for that, but I will say this if you thought that was an interesting um incident that happened, research the mitre attack framework techniques that are used in wiper attacks.
<v SPEAKER_08>Learn a little bit more about the data destruction and those disc wipe tactics that were used in this scenario.
<v SPEAKER_08>Yeah.
<v SPEAKER_08>And then you can talk about that in the interview, you know.
<v SPEAKER_02>That's why I say the policy should be in place.
<v SPEAKER_02>Okay, if you gotta do X amount of wipes, it needs to be uh another person got to sign off on it.
<v SPEAKER_02>So no matter what, you can't just do it by yourself.
<v SPEAKER_02>They gotta go to a change that go into a thing and it's an automation, and that person gotta say, I agree for it to go through.
<v SPEAKER_02>That's what they gotta do.
<v SPEAKER_02>So look, hire me for your strategies.
<v SPEAKER_02>I got you.
<v SPEAKER_02>I got you.
<v SPEAKER_02>Um I think since we're on the topic of having fun when it comes to um breaches and stuff like that.
<v SPEAKER_02>I wanted to talk about Salesforce.
<v SPEAKER_02>All right, it took me a minute, we got it.
<v SPEAKER_02>Shiny Hunters versus Salesforce.
<v SPEAKER_02>When your security tool becomes the attack.
<v SPEAKER_02>All right, shiny hunters is back, and this time they didn't just hack a company that took a tool that was early designed to protect Salesforce environments and turned it into their weapon.
<v SPEAKER_02>Let's talk about it.
<v SPEAKER_02>Salesforce issued an advisory this week warning customers that threat actors are actively targeting misconfigured Salesforce Experience Cloud sites.
<v SPEAKER_02>Experience Cloud is the portal product that lets company build customer-facing websites connected directly to their Salesforce CRM data.
<v SPEAKER_02>Think partner portals, customer self-service sites, login pages tied into your CRM.
<v SPEAKER_02>What is the Salesforce Experience Cloud and why is it a target?
<v SPEAKER_02>When you build an Experience Cloud site, it has a guest user profile.
<v SPEAKER_02>That's the profile for an unauthenticated visitor who can browse public pages, submit forms, things like that.
<v SPEAKER_02>The problem is when an admin accidentally gives that guest profile too many permissions, suddenly anyone on the internet, no login required, can query your Salesforce CRM objects and pool names, phone numbers, and customer records.
<v SPEAKER_02>Now, here's where it gets wild.
<v SPEAKER_02>Back in January, Mand, the Google-owned security firm released an open source tool called Aura Inspector.
<v SPEAKER_02>Specifically helped Salesforce admins find these misconfigurations before attackers could exploit them.
<v SPEAKER_02>A defensive tool, a helper.
<v SPEAKER_02>Shiny Hunters took that tool, modified it, and used it to do mass internet scanning to find every misconfigured Salesforce instance they could.
<v SPEAKER_02>Then they built their own custom tool to bypass a record limit in the API, because the default was capped at 2,000 records per query and started dumping CRM data at scale.
<v SPEAKER_02>Sound like an overflow attack to me.
<v SPEAKER_02>They claim to have compromised somewhere between 300 and 400 companies, about 100 of which they described as high profile.
<v SPEAKER_02>Many in the cybersecurity sector itself, last past confirmed they are aware of the campaign and investigating.
<v SPEAKER_02>Other name companies haven't responded.
<v SPEAKER_02>Salesforce official position, this is not a vulnerability in their platform.
<v SPEAKER_02>It's a customer misconfiguration.
<v SPEAKER_02>Shawnee Holders told reporters they are exploiting a product flaw, but won't disclose it until their exploitation phase is over.
<v SPEAKER_02>Classic extortion playbook.
<v SPEAKER_02>The data that they're harvesting, names, phone number, CRM records, feeds directly into their next phase attack, fishing.
<v SPEAKER_02>Voice phishing.
<v SPEAKER_02>They call your customers pretending to be you and they have enough real data to be convincing.
<v SPEAKER_02>If your organization uses Salesforce Expensive Cloud, this is a check your settings today situation.
<v SPEAKER_02>And let me see also if I can get some more background too about shiny hunters.
<v SPEAKER_02>We talked about them last week.
<v SPEAKER_02>So this ties into they are recruiting women to do these fishing attacks as well.
<v SPEAKER_02>They're one of the most active extortion groups operating right now.
<v SPEAKER_02>They're behind the Snowflake Customer Breach in 2024.
<v SPEAKER_02>They did the Salesforce Sales Loft Drift incidents last year, and that nearly hit a billion records across 39 companies, including GAP and Qantas.
<v SPEAKER_02>They operate a data leak site and use stolen data as leverage for ransom demands.
<v SPEAKER_02>They are persistent, organized, and increasingly sophisticated in their targeting of SaaS platform misconfigurations.
<v SPEAKER_02>If your organization uses Salesforce Experience Cloud, go to Setup Guest User Profile right now and verify that API enabled is unchecked.
<v SPEAKER_02>This closes the attack vector.
<v SPEAKER_02>Out of your guest profile object permissions, they should only have access to records explicitly intended for public consumption.
<v SPEAKER_02>Check our event monitoring logs for unusual access patterns, particularly to the forward slash Slash forward slash SF sites forward slash our endpoint.
<v SPEAKER_02>Or is that a backslash?
<v SPEAKER_02>I feel like that's a forward slash, yeah.
<v SPEAKER_02>Research Shiny Hunter's attack history.
<v SPEAKER_02>It's a master class on how one group pivots across different platforms.
<v SPEAKER_02>I'm reading too fast.
<v SPEAKER_02>Research Shiny Hunter's attack history.
<v SPEAKER_02>It's a master class on how one group pivots across different platforms misconfigurations.
<v SPEAKER_02>Snowflake, Salesforce, Sales Loft, and more.
<v SPEAKER_02>And study the concept of least privilege and SaaS administration.
<v SPEAKER_02>It's the same principle as traditional IT, but applied to CRM permissions and portal configurations.
<v SPEAKER_02>And to add on to that, I wanted to talk about, I think it's pronounced TELUS.
<v SPEAKER_02>TELUS was like the main company that pretty much alerted everybody that you know they've been breached.
<v SPEAKER_02>So anybody that's partnered with TELUS, your security team probably got an email saying, hey, this is what happened.
<v SPEAKER_02>Here's the write-up, and yada yada yada.
<v SPEAKER_02>So TELUS Digital Breach, almost one petabyte gone, and it started with someone else's hack.
<v SPEAKER_08>That's a lot.
<v SPEAKER_08>Yeah, how much is a petal?
<v SPEAKER_08>It's too much.
<v SPEAKER_08>Because a a um terabyte is more than that.
<v SPEAKER_02>No, no.
<v SPEAKER_02>A peda should be more because this is two terabytes right here.
<v SPEAKER_02>So a petter, I think, was is it a hundred uh terabytes maybe?
<v SPEAKER_02>Look that up while I'm while I'm seeing this X Claude.
<v SPEAKER_02>This is one, this one is a supply chain breach story that's almost elegant and how it unfolded.
<v SPEAKER_02>And by elegant, I mean terrifying.
<v SPEAKER_02>Let's walk through how shiny hunters took a credential from one company's breach and used it to eventually steal close to a petabyte of data from a company from a completely different organization.
<v SPEAKER_02>Oh, here you go.
<v SPEAKER_02>I got the answer.
<v SPEAKER_02>One petabyte is roughly one million gigabytes.
<v SPEAKER_02>Some reports say it's enough data to fill a million high definition feature films.
<v SPEAKER_02>This is not a we lost some customer emails breach.
<v SPEAKER_02>This is a we may have lost everything.
<v SPEAKER_02>So who is TELUS Digital?
<v SPEAKER_02>It's the digital service arm of TELUS, one of Canada's largest telecom companies.
<v SPEAKER_02>TELUS Digital specifically provides business process outsourcing, customer support, content moderation, AI data training, fraud detection, cost center operations for other companies around the world.
<v SPEAKER_02>They're the behind-the-scenes operation for a lot of brands you use.
<v SPEAKER_02>Here's how this breach happened.
<v SPEAKER_02>Remember the Sales Loft drift breach from 2025?
<v SPEAKER_02>Hackers compromised SalesLoft's GitHub environment, stole OAuth tokens, and used them to access Salesforce data from hundreds of organizations.
<v SPEAKER_02>And the data that was stolen from the breach, shiny hunters found Google Cloud platform credentials that belong to TELUS.
<v SPEAKER_02>Using those GCP credentials, they got into TELUS Google Cloud environment, including a BitQuery data house, a BitQuery data warehouse.
<v SPEAKER_02>Then, and this is the move, they used a tool called Truffle Hog to scan all the data for additional credentials.
<v SPEAKER_02>Found more, pivoted further into TELUS's system, moved loudly for months.
<v SPEAKER_02>So they was in there for a while, as usual, and eventually came to have downloaded close to a pedopyte of data.
<v SPEAKER_02>What's in the data?
<v SPEAKER_02>According to Shawnee Hunters, customer support, call, recording, source code, employee records, including FBI background checks, financial information, Salesforce data, AI training data, and consumer call records from TELS Telecom Division.
<v SPEAKER_02>Who called who?
<v SPEAKER_02>When?
<v SPEAKER_02>For how long?
<v SPEAKER_02>The extortion demand,$65 million.
<v SPEAKER_02>$65 million.
<v SPEAKER_02>Who y'all kidnapping?
<v SPEAKER_02>Chelsea Clinton?
<v SPEAKER_02>TELS hasn't responded to their emails.
<v SPEAKER_02>TELS confirms that the breach this week calling it unauthorized access to a limited number of systems, a bit understated given the claim scale, but that's corporate incident response language for you.
<v unknown>Yeah.
<v SPEAKER_02>Definitely say, oh, yeah, we're aware of a security incident and we're researching it.
<v SPEAKER_02>That's all we're gonna say.
<v SPEAKER_02>Nothing else.
<v SPEAKER_08>Literally, the bare minimum.
<v SPEAKER_02>The cascading damage here, because TELUS Digital is a BPO provider, 28 other companies that outsource their operations through TELUS Digital may have had their customer data exposed to.
<v SPEAKER_02>We don't know who those companies are yet.
<v SPEAKER_02>And typically, now this is another part of third-party thing.
<v SPEAKER_02>So once you are a person that uses TELUS or a company, you're gonna get with your like supplier managers, GRC team, and you're gonna try to figure out, okay, we know they've been hit.
<v SPEAKER_02>How much access do they have for our company's data?
<v SPEAKER_02>Do they have any of the employees have access to our systems?
<v SPEAKER_02>Or if it is, like what's infected?
<v SPEAKER_02>Yada yada yada.
<v SPEAKER_02>And you're trying to figure out what type of their data is impacted, so you can kind of figure out how to move from that from a legal standpoint.
<v SPEAKER_02>If you have to tell your customers, hey, we were hacked because they was hacked.
<v SPEAKER_02>That's in layman's terms, that's what's going to happen.
<v SPEAKER_02>Um BPO providers are one of the most underappreciated attack vectors in enterprise security.
<v SPEAKER_02>Because they aggregate sensitive operations, customer support data, billing systems, authentication tools for multiple organizations, a single BPO compromise can create a blast radius that touches dozens of downstream clients.
<v SPEAKER_02>Most enterprise security programs focus heavily on their own perimeter and their direct SaaS vendors.
<v SPEAKER_02>But third and fourth party risk through service providers like BPOs is frequently underassessed.
<v SPEAKER_02>This breach should prompt every enterprise to ask who handles our customer support data and what is in their security posture.
<v SPEAKER_02>And this is how I can see AI helping that.
<v SPEAKER_02>Because it's so hard to keep tabs on this.
<v SPEAKER_02>I I have I'm not gonna tell it to y'all because y'all gonna steal the idea.
<v SPEAKER_02>But in interviews, I've I've came up with a solution that I think could help uh for this.
<v SPEAKER_02>And maybe I write it out and like put it like in the not in the GitHub, but like I don't know.
<v SPEAKER_02>But I already had a proof of concept in my mind.
<v SPEAKER_02>I just have to figure out how to make it look actual from a data standpoint or how it works with like just dummy data.
<v SPEAKER_02>And if I could do that, I literally could show somebody, hey, this is what I you know advise for third-party risk management, especially if you whether you have a large team or a small team, how AI can help you in that matter.
<v SPEAKER_02>And it's literally just the automation of a couple of questions that you can ask every quarter or something.
<v SPEAKER_02>And so a couple of action items is research truffle hog, understand what it does and why developers accidentally commit credentials to repositories and data stores, study third-party risk management frameworks, look at the shared assessment standard information gathering.
<v SPEAKER_02>So that's SIG, and NIST SP 800-161 on supply chain risk and other stuff.
<v SPEAKER_02>You can research the Salesoft breach and look up BigQuery security best practices.
<v SPEAKER_02>So yeah, it's been an interesting week.
<v SPEAKER_02>You had that.
<v SPEAKER_02>I want to say striker happened on Tuesday, right?
<v SPEAKER_08>Yes.
<v SPEAKER_02>This was on Monday.
<v SPEAKER_08>Or was Stryker on Monday?
<v SPEAKER_02>Maybe both.
<v SPEAKER_08>I think Stryker was on Monday.
<v SPEAKER_02>Yeah, maybe both of them were on um were on Monday.
<v SPEAKER_02>But I thought that was like pretty interesting to me because it's like if it ain't one thing, it's another.
<v SPEAKER_08>It's always gonna be another.
<v SPEAKER_02>That's why I say job security.
<v SPEAKER_02>That's why I say job security.
<v SPEAKER_08>I think for when I seen when I was looking at this article, um, I feel like I saw Striker.
<v SPEAKER_08>Okay, on the door, it says, Um, please read.
<v SPEAKER_02>You told me so, like a picture or something.
<v SPEAKER_08>Yeah, it says striker is currently experiencing a global system issue.
<v SPEAKER_08>As a precaution, we're closing the facility for the day.
<v SPEAKER_08>Please stay off the network and refrain from using your computer and connecting to Wi-Fi on phones until systems are restored.
<v SPEAKER_08>For work phones, it's recommended to remove the striker management profile.
<v SPEAKER_08>And then they have they have like the steps go to settings, general, and basic.
<v SPEAKER_08>What that's crazy.
<v SPEAKER_02>Yeah.
<v SPEAKER_02>What did you have for us?
<v SPEAKER_08>Okay.
<v SPEAKER_08>Next, I have Doge.
<v SPEAKER_08>A thumb drive full of America's secrets.
<v SPEAKER_08>A whistleblower complaint filed with the Social Security Administration's own inspector general alleges that a former Doge software engineer walked out the door with restricted databases on a personal thumb drive.
<v SPEAKER_08>We're not talking about a few files here.
<v SPEAKER_08>We're actually talking about records for over 500 million living and dead Americans.
<v SPEAKER_08>What is Doge?
<v SPEAKER_08>Who are these employees and what access did they have?
<v SPEAKER_08>The databases in question is called NUMI Dent, I believe, which contains social security numbers, birth dates, citizenship status, race, ethnicity, ethnicity, and parents' names, and the master death file.
<v SPEAKER_08>These are the most sensitive identity-based identity databases the federal government maintains.
<v SPEAKER_08>According to the complaint, the engineer told colleagues he had God-level access to the SSA systems.
<v SPEAKER_08>He allegedly said that even after leaving government employment, he retained his credentials and he reportedly expected a presidential pardon if he got caught.
<v SPEAKER_08>So this is not the first Doge-related data concern at the SSA in January.
<v SPEAKER_08>Two other Doge members were suspected of sharing Social Security numbers with a political advocacy group.
<v SPEAKER_08>Another whistleblower earlier alleged that Doge uploaded SSA data to an unsanctioned cloud server.
<v SPEAKER_08>A federal judge had previously blocked Doge from SSA systems, describing it as a phishing expedition.
<v SPEAKER_08>Now, from a cybersecurity lens, this is obviously a classic insider threat scenario.
<v SPEAKER_08>An employee who obviously had elevated privileges, he had legitimate authorized access using that in a way that violates policy, law, or intent.
<v SPEAKER_08>The challenge with insider threats is that traditional perimeter security obviously will not catch this.
<v SPEAKER_08>You can't firewall.
<v SPEAKER_08>A thumb drive that's already in someone's pocket.
<v SPEAKER_08>The SSA spokesperson denied any wrongdoing.
<v SPEAKER_08>Their investigation is ongoing, but I kind of want to be clear about the stakes.
<v SPEAKER_08>One former SSA chief data officer called this potentially an irrecovable loss.
<v SPEAKER_08>He said, once that data has left the building, you cannot close Pandora's box again.
<v SPEAKER_08>This could require a complete redesign of how identity works in the United States.
<v SPEAKER_08>Doge, the Department of Government Efficiency, was established by executive order and granted broad access to federal agency systems.
<v SPEAKER_08>Its employees, many of them tech contractors, were given access that career employees say exceeded normal protocols.
<v SPEAKER_08>The SSA processes benefits for over 70 million Americans and maintain some of the most sensitive identity data in existence.
<v SPEAKER_08>This obviously is a textbook insider threat case study.
<v SPEAKER_08>The controls that failed here were data exfiltration, um prevention, so DLP, privilege access management, offboarding credential revocation, and audit logging.
<v SPEAKER_08>Organizations need to ask themselves when an employee leaves, how long does it take to revoke all of their access?
<v SPEAKER_08>If the answer is we're not sure, obviously that's a gap.
<v SPEAKER_08>Insider threat analytics in itself is a lot.
<v SPEAKER_08>I think that companies feel like it's a big haul and they are noise, they're nervous on how to correctly deploy it as a solution most times.
<v SPEAKER_03>Yeah, it's a what did he say?
<v SPEAKER_08>He had godlike access to it.
<v SPEAKER_02>I mean, every every day we just read about another thing, like how doge was always a bad idea.
<v SPEAKER_02>Um you have people like this is why hang on, let me let me it's the XL for me.
<v SPEAKER_02>Let me get this buddy who had got fired well laid off from Amazon, he does got a new job now, so shout out to him.
<v SPEAKER_02>But this goes into why people always kind of are low-key, like bro, y'all in the government and don't be doing no work, and y'all don't know what y'all are doing.
<v SPEAKER_02>This is why people feel like that.
<v SPEAKER_02>Because even if Doge came in there, there still should have been places that okay, these people are going revoke they access, everything happened, and these people should have never been able to put thumb drives.
<v SPEAKER_08>Don't even get me started on the on the lack of data security in general.
<v SPEAKER_08>First of all, why can you even plug up a thumb drive to an SSA system?
<v SPEAKER_08>Right.
<v SPEAKER_02>And if you were, it had to be approved into where it would only work on that system because you can do that.
<v SPEAKER_02>You can so they don't have any um, they don't have any data security controls clearly in place, and that is why I'm like, I just kind of get upset or black.
<v SPEAKER_08>It is very fresh.
<v SPEAKER_02>Some ain't right because working being a contractor for a TSA, they were super strict.
<v SPEAKER_02>Hey, you can plug none into them the machines, them DHS machines.
<v SPEAKER_02>This is how you kind of verify these people when they come on, like literally high level, and this was 12 years ago when it came to identity access management.
<v SPEAKER_02>So everything is just getting so laxed.
<v SPEAKER_02>It it really is just you know what I'm saying, it's a it's a clusterfuck right now.
<v SPEAKER_02>Like then a dude talking about like why'd he say he needs to get him a pardon?
<v SPEAKER_08>Why are we already talking about that's what I need but but you the the intent obviously is to be malicious?
<v SPEAKER_08>His intention was to be malicious because why would you say that?
<v SPEAKER_08>You ain't get them social security numbers to go do good with him.
<v SPEAKER_02>Man, I don't know.
<v SPEAKER_02>And I'm wondering, like, are they gonna tell the people um who no, probably not because they don't know.
<v SPEAKER_08>I beg your pardon.
<v SPEAKER_02>Like that is this is wow, bro.
<v SPEAKER_08>Like, don't but this is my thing.
<v SPEAKER_08>We see all this stuff going on, and we just turn a blind eye to it.
<v SPEAKER_02>It's not that we turn a blind eye, what can you do?
<v SPEAKER_08>That's what I'm saying.
<v SPEAKER_02>Like, what can you do?
<v SPEAKER_02>So um, I thought that was pretty interesting, but let me get into these some of these Reddit stories I have.
<v SPEAKER_02>I got like two.
<v SPEAKER_02>Um, one of them was interesting to me, it caught my eye.
<v SPEAKER_02>And it was titled, I pushed back on an HR deadline, and it accidentally revealed they had a second budget they weren't telling candidates about.
<v SPEAKER_02>I went through a four-round interview process for a senior ops role at a mid-sized logistics company back in January.
<v SPEAKER_02>Final round went well.
<v SPEAKER_02>I felt good about it.
<v SPEAKER_02>A week later, the HR coordinator emailed an offer with a 48-hour deadline to accept.
<v SPEAKER_02>The base was about 12% below what I had staged as my minimum minimum during the very first screening call.
<v SPEAKER_02>So I replied the same day saying I appreciated the offer, but that it didn't quite meet the number we had already it didn't quite meet the number we had already discussed and if there was any flexibility.
<v SPEAKER_02>She came back a few hours later and said the offer was firm and that the deadline still stood.
<v SPEAKER_02>I didn't panic, but I also didn't sign.
<v SPEAKER_02>What I did instead was reply and say I understood that I was still very interested in the role and asked if we could schedule a 15-minute call with the hiring manager before the deadline to talk through the compensation structure and what growth looked like in a year in year two.
<v SPEAKER_02>She agreed, probably expected me to just accept on the call.
<v SPEAKER_02>The hire manager got on within about four minutes.
<v SPEAKER_02>He said, Look, I think there might have been some miscommunication on the range.
<v SPEAKER_02>Let me look at what we have and put me on hold.
<v SPEAKER_02>He came back and offered me a number that was actually 6% above my original asked.
<v SPEAKER_02>Turns out they had a separate budget line for senior hires that HR wasn't servicing to candidates unless they pushed back past the initial offer stage.
<v SPEAKER_02>I've since told three people about this, and two of them tried the same thing on their own offers.
<v SPEAKER_02>One of them got bumped up, the other didn't, but said it was worth asking.
<v SPEAKER_02>The deadline was extended automatically once I requested a call.
<v SPEAKER_02>They never mentioned that was possible either.
<v SPEAKER_02>So this is some this is some good stuff.
<v SPEAKER_02>This is some good stuff.
<v SPEAKER_02>Um simply because you never want to accept the first offer.
<v SPEAKER_02>And it's not about what you're worth, it's about what you negotiate.
<v SPEAKER_02>So I want you to remember that.
<v SPEAKER_02>And while we're here, let me see if I should go into the second one.
<v SPEAKER_02>Yeah, because these are all around jobs.
<v SPEAKER_02>It's this, and then it's actually, since this segment is kind of about getting jobs, stuff like that.
<v SPEAKER_02>There was a TikTok I found from that same one of the recruiter guys we listened to last week who had some excellent advice on how to stand out.
<v SPEAKER_02>So here's another one.
<v SPEAKER_02>It said, it finally happened.
<v SPEAKER_02>I got the your job hopping comment in the wild.
<v SPEAKER_02>I was with my last company for two years before being laid off in January.
<v SPEAKER_02>Before that, I was in a job for six months, then I got laid off.
<v SPEAKER_02>Before these jobs, I had two four-year tenures.
<v SPEAKER_02>Maybe I'm not the most loyal of employees, but also definitely not the worst.
<v SPEAKER_02>Went for a job interview at a government agency, and the old lady went.
<v SPEAKER_08>I'm dead.
<v SPEAKER_02>You have the tech skills we need, but it's hard for me to believe in you when you job top four times in 10 years.
<v SPEAKER_02>Me.
<v SPEAKER_02>Well, actually, if you recall, some news reports around both times I was hire manager.
<v SPEAKER_02>In my experience, layoffs are usually the employees' fault.
<v SPEAKER_02>After all, if 90% of employees are staying, then why are you at the bottom 10%?
<v SPEAKER_02>Actually, I was a high performer due for a promotion.
<v SPEAKER_02>Thanks for your time.
<v SPEAKER_02>HR lady will see you out.
<v SPEAKER_02>Cut to HR lady looking extremely uncomfortable.
<v SPEAKER_02>I thanked her and noped out of there.
<v SPEAKER_02>I couldn't fight back because I'm desperate.
<v SPEAKER_02>I wanted to tell her that I was probably making more than she does in my first job 10 years ago.
<v SPEAKER_02>I want to tell her the only reason I even applied for her job is because I'm a foreigner in the EU and need a job ASAP before my talent import visa runs out.
<v SPEAKER_02>And I wanted to tell her that I was a human being and deserved some minimal respect, but I couldn't because I was desperate and upset.
<v SPEAKER_02>So I hear here I am whining about it on Reddit.
<v SPEAKER_02>Yeah, that's that's crazy.
<v SPEAKER_02>That's um it sucked because like I've had that happen before.
<v SPEAKER_02>I I reached out to a director about a role one time, and I was like, hey, uh, I saw you talked about the job, and I think I had the experience you're looking for for the role.
<v SPEAKER_02>What are you looking for?
<v SPEAKER_02>He thanks.
<v SPEAKER_02>And so he accepted my connection, looked over my resume and stuff like that.
<v SPEAKER_02>One of my resume, my LinkedIn.
<v SPEAKER_02>Hey, uh LinkedIn shows you only stay at jobs blank, blank, blank amount of years.
<v SPEAKER_02>You know, can you got answers to that?
<v SPEAKER_08>I'm actually uh I'm low-key offended.
<v SPEAKER_02>I'm like, well, honestly, only two jobs I actually was at for about a year.
<v SPEAKER_02>And I was like, that literally just happened.
<v SPEAKER_02>That was just wonky, you know, it just wasn't good fits.
<v SPEAKER_02>But I was like, before that, those jobs, I was always almost at one job for four years, and then my current thing, I've been there for you know for however many years now.
<v SPEAKER_02>So after that, I didn't say nothing.
<v SPEAKER_02>So I had took that as like, you just wanted to nitpick me and you didn't want to hire me anyway.
<v SPEAKER_02>Which is I've I actually respect you just be a blunt, say, I don't want to hire you, versus you just making up some BS.
<v SPEAKER_02>Because if if the dude got the talent you need, you don't care how long he stays somewhere because they can do what you need them to do.
<v SPEAKER_08>I was just that's that what that is literally what I was about to say.
<v SPEAKER_08>I got the skill set, you worried about the wrong thing.
<v SPEAKER_02>Yeah, it's it it's it's kind of weird.
<v SPEAKER_02>So I I definitely do uh feel a lot of the the young cats and stuff when they kind of go through some of these things, and because it's it's stupid, you know, in my opinion.
<v SPEAKER_02>Um here we go.
<v SPEAKER_01>So while everybody else is saying the same tired answer, oh, I'm just looking for a new opportunity, there's no more room to grow where I am, I'm looking to grow.
<v SPEAKER_01>You are going to be more specific and more memorable and someone they have to do some work to get.
<v SPEAKER_01>I wouldn't say that I actively am trying to leave my current job.
<v SPEAKER_01>But there are things out there that could make a job or a company a better opportunity for me.
<v SPEAKER_01>So when I noticed this job posting, I thought it only made sense to send in an application.
<v SPEAKER_01>The fact that this role needs X or the fact that this company does Y really interests me and is worth exploring and learning more about this opportunity.
<v SPEAKER_02>I'm gonna pause it right there because he, as you say, he he ate down.
<v SPEAKER_02>And that helps out.
<v SPEAKER_02>I've had times where I've talked to healthcare companies or whoever, and I've always said stuff like, uh apply to it interests me after all the hacks I've seen, like change healthcare than what else.
<v SPEAKER_02>I want to do a job that I know that can help protect the you know, the in-person that was receiving these services and everything else.
<v SPEAKER_02>And the recruiters love that.
<v SPEAKER_02>And it's one I think that definitely can say, okay, I got buy into the culture of what our mission is from a security org.
<v SPEAKER_02>Uh so he definitely look, he's definitely telling y'all, you know, the facts.
<v SPEAKER_02>Like we got the gift of gap, you can be at something, but you know, if it's uh I say depending on how much you really want to do the role.
<v SPEAKER_02>Like if it's something you just apply to, you're like, they ain't finna call me.
<v SPEAKER_02>Oh, uh, you know, I'm just looking for better career opportunities, keep it bland.
<v SPEAKER_02>But if it's something you really want to go through the system with, and you know, he's I don't know if he's he's probably not gonna mention it on this because it's a different thing, but I always say even if you don't get the job, but you enjoyed the interview process, stay connected with some of the people you interview with.
<v SPEAKER_02>They can essentially come your network and just warm like warm messages throughout the years.
<v SPEAKER_02>You never know what'll come from that.
<v SPEAKER_02>But let's let them keep eating.
<v SPEAKER_01>Because I do want to be intentional with any career moves I make and not just be someone who's going from place to place hoping to find something good.
<v SPEAKER_01>And luckily, because I'm not in a bad position right now, I really have the chance to find the right opportunity for me.
<v SPEAKER_01>This both shows you do care where you work and also shows the company that they're going to have to do a little bit to show you it's the right fit.
<v SPEAKER_01>All why also not making sure you look too flippant about the job and are really exploring the right opportunities, not just everything.
<v SPEAKER_08>When you get a that was cute.
<v SPEAKER_08>He chewed.
<v SPEAKER_02>Yeah, I like that.
<v SPEAKER_02>Like, you know, he definitely was on to something.
<v SPEAKER_02>Um, let me see what else you could say.
<v SPEAKER_02>A lot of stuff you can do.
<v SPEAKER_02>So another thing that kind of low-key helps, because it helped me one time because a recruiter said something about it.
<v SPEAKER_02>I applied for a role and I also followed the company on LinkedIn.
<v SPEAKER_02>Uh so it's like little simple things that you can do that can kind of set you apart from uh everybody else.
<v SPEAKER_02>So I would say definitely try that as well.
<v SPEAKER_02>But yeah, yeah, I thought I thought that was cool.
<v SPEAKER_02>And let me see if there's anything else you can do outside of having a decent LinkedIn.
<v SPEAKER_02>Oh, also, guys, while I'm here, last week Markesha and I we did resume roast and people loved it.
<v SPEAKER_02>So go to the live tab of the channel and check out the resume roast and see if you've made any of the cardinal issues we did.
<v SPEAKER_02>Now, a lot of people in the comments are saying, Hey, well, you guys are like y'all just looking for something wrong.
<v SPEAKER_02>Um, yeah, that's the whole point of a roast.
<v SPEAKER_02>The whole point of the roast was to nitpick your resume because a lot of you don't know is when you're part of the job, if the recruiter even sees it, if it gets past AI, they got six, seven seconds.
<v SPEAKER_02>Maybe they're looking at it.
<v SPEAKER_02>So they're not even looking at it looking at it in the detail that we are, they're just looking for keywords and everything else.
<v SPEAKER_02>So this was to help you out and be thorough with people, whether it comes to their LinkedIn or whether it came to um their resume to help them out.
<v SPEAKER_02>And so we may make it a monthly thing or whatever, because people really did enjoy it.
<v SPEAKER_08>That's the how many how many did y'all do?
<v SPEAKER_02>We did three or four.
<v SPEAKER_02>Um, because we was like on a time crunch.
<v SPEAKER_02>But if we ever had like two hours or three hours to go through, it's fine.
<v SPEAKER_02>And also, uh another thing people don't understand is y'all got like what you would typically pay for that service out of us was much more than you got for watching it for free.
<v SPEAKER_02>So you definitely should appreciate free 99.
<v SPEAKER_02>So take advantage of it.
<v SPEAKER_02>But uh it has time steps and everything else.
<v SPEAKER_02>Um, so yeah, go check that out, Michael.
<v SPEAKER_08>Salt Typhoon.
<v SPEAKER_08>So China's longest play in cyber history.
<v SPEAKER_08>If you've been following us, you have absolutely heard us mention them before.
<v SPEAKER_08>But TechCrunch just dropped a comprehensive rundown of the full scope of this campaign.
<v SPEAKER_08>And I want to revisit it because the numbers are absolutely outrageous.
<v SPEAKER_08>So Salt Typhoon is a China-linked hacking group that has compromised over 200 companies globally, most of them phone and internet providers.
<v SPEAKER_08>We got ATT, Verizon T Mobile, and US telecoms in Canada, Ireland, Finland, Poland, Brazil, Argentina, South Africa, and beyond.
<v SPEAKER_08>So they are one of the most far-reaching espionage campaigns in modern cyber history.
<v SPEAKER_08>Now, what does espionage mean in a cyber context versus financially motivated attacks?
<v SPEAKER_08>So, what they are after call records, text messages, in some cases, captured audio from senior government officials' phones, and critically, they hacked into the lawful intercept systems.
<v SPEAKER_08>Those are the backdoor, backdoors that telecom companies are legally required to build so that law enforcement can monitor communications with a court order.
<v SPEAKER_08>Salt typhoon basically walked through that door.
<v SPEAKER_08>The FBI has said this is quote, the most egregious egregious.
<v SPEAKER_08>Why can't I talk today?
<v SPEAKER_08>The most egregious national security breach by a nation state in U.S.
<v SPEAKER_08>history, and yet most people still don't know what SALT Typhoon is.
<v SPEAKER_08>How did they get in?
<v SPEAKER_08>Cisco routers, unpatched vulnerabilities, some dating back to 2018.
<v SPEAKER_08>The entry point wasn't sophisticated, it was basic.
<v SPEAKER_08>The FBI deputy assistant director said it himself, despite all the advances in cybersecurity tools, it is still the most basic vulnerabilities that provide entry points.
<v SPEAKER_08>Researchers believe SALT Typhoon is part of a broader Chinese strategy preparing for a potential conflict over Taiwan by mapping communications infrastructure, understanding who talks to whom, and pre-positioning for disruption.
<v SPEAKER_08>Bolt Typhoon handles the destructive pre-positioning.
<v SPEAKER_08>Flax Typhoon runs the botnet infrastructure.
<v SPEAKER_08>Salt Typhoon is the intelligence arm.
<v SPEAKER_08>Salt Typhoon exploited the legal backdoors that exist in telecom infrastructure, a reminder that every authorized access point is also a potential attack vector.
<v SPEAKER_08>The irony is profound.
<v SPEAKER_08>The very systems built to enable government surveillance became the systems that a foreign adversary surveilled, which raises serious policy questions about the security of communications assistance for law enforcement act compliance infrastructure.
<v SPEAKER_08>Telecom, security, and network defense are massively underserved specialties.
<v SPEAKER_08>If you have a networking background or you're building one, pairing it with cybersecurity puts you in an elite category.
<v SPEAKER_08>You might want to study BGP security, Cisco hardening guides, and threat hunting techniques.
<v SPEAKER_08>Network Plus and CCNA are great starting points if this is up your alley.
<v SPEAKER_08>I think that Salt Typhoon definitely, I mean, we talked about I mean, and people don't even it happens and then people forget about it.
<v SPEAKER_08>Like you remember when ATT was like, Yeah, they're in there, and like, but no one was really talking about it.
<v SPEAKER_02>This is, and you know what?
<v SPEAKER_02>I didn't think about it, but you know, people like that share intel.
<v SPEAKER_02>So if we go back to the striker stuff, um maybe Saw Typhoon could have helped out with that too.
<v SPEAKER_02>Because you know, people send passwords and everything in clear text through phones all the time.
<v SPEAKER_08>That part, which is why I really and we talked about this when ATT and Verizon and T Mobile, we were saying to not, and they were also saying it too, like, be careful what y'all sending right now because they in there and we we basically we're trying to we're trying to get them out.
<v SPEAKER_02>Yeah, and then that's why I always advocate for password managers, at least that versus me sending to you through a text message, hey, I can just get your email and share it with you that way, and it's gonna be like you're not gonna know what it is.
<v SPEAKER_02>I'm gonna only have the sentence to let you copy it.
<v SPEAKER_02>You can't edit it.
<v SPEAKER_02>So I don't know.
<v SPEAKER_02>I think it's one of the things where they're kind of like like in order to get rid of them, they'll have to rebuild, which probably could never be done.
<v SPEAKER_02>They have to rebuild all the telecommunication telecommunication channels and how we communicate.
<v unknown>Yep.
<v SPEAKER_02>And I don't know they're not that would be a cool research subject to do like ATT and because you know ATT used to be like ATT, but then you had like other companies like uh Bell South, Ameritech, um, you got Singular, Alltale, Verizon.
<v SPEAKER_08>I was with them when they were singular.
<v SPEAKER_02>I was with them when it was all tail.
<v SPEAKER_02>Yeah, um, you got real OG.
<v SPEAKER_02>And then you got these other the companies that are that are in there that have telecoms activity and stuff that they do that we don't even talk about.
<v SPEAKER_02>You got the I think I wanna have like walkie-talkies, like you know, radio devices.
<v SPEAKER_02>Does that count as like telecoms or it's like telecoms, radio, whatever you want to call it?
<v SPEAKER_02>But I'm interested to see like exactly how it started.
<v SPEAKER_02>And I'm pretty sure that it's like, in a sense, I would say telecommunications will fall under critical infrastructure because we're not even talking about the pots, like the landlines.
<v SPEAKER_02>Those things, people still got landlines, and that's legacy software that we're dealing with here when it comes to that.
<v SPEAKER_02>So I don't know.
<v SPEAKER_02>I definitely think it's interesting.
<v SPEAKER_02>It's like I said, it's job security.
<v SPEAKER_02>Um, we find out something new but the same almost every every week and when it comes to this.
<v SPEAKER_02>Um but what what we didn't find out was this lawyer AI psychosis stuff.
<v SPEAKER_08>Please, I'm so interested.
<v SPEAKER_08>I want to know, tell me everything, right?
<v SPEAKER_02>Because I at first I didn't think I was gonna get into it because I was like, I don't know if we're gonna have time to get into it, but then I was like, you know what?
<v SPEAKER_02>We should.
<v SPEAKER_02>Let's see, where is my thing that I made for this?
<v SPEAKER_08>That's probably the one um of your articles that I'm most excited to.
<v SPEAKER_02>Yeah, AI chatbots and mass casualty risks.
<v SPEAKER_02>This is not a drill, it's a serious matter for my aka's out there.
<v SPEAKER_02>A lawyer named Jay Edison, who has been bringing lawsuits against AI companies over chatbot-related deaths, sat down with TechCrush this week and said something that stopped me cold.
<v SPEAKER_02>He said, and I'm paraphrasing, first it was suicides, then it was murders.
<v SPEAKER_02>Now it's mashed calcity news.
<v SPEAKER_02>Let me back that up with what's actually documented in court filings.
<v SPEAKER_02>In Canada last month, an 18-year-old named Jesse Van Rootsler, I think that's how you say his name, Rootsal R.
<v SPEAKER_02>Rootsal R used Chat GPT before carrying out a school shooting that killed her mother, her 11-year-old brother, five students.
<v SPEAKER_08>Okay, wait, start, sorry, one more time.
<v SPEAKER_08>Can you do that again?
<v SPEAKER_08>Start over, please.
<v SPEAKER_02>Which one?
<v SPEAKER_08>Like from the beginning.
<v SPEAKER_02>In Canada last month?
<v SPEAKER_08>Yeah, from there.
<v SPEAKER_02>In Canada last month, an 18-year-old named Jesse Van Rootselar used Chat GPT before carrying out a school shooting that killed her mother, her 11-year-old brother, five students, and an education assistant.
<v SPEAKER_02>According to court filings, the chat bot allegedly validated her feelings of isolation and helped her plan the attack, including which weapons to use.
<v SPEAKER_08>Now I'm gonna wait, they said chat GPT?
<v SPEAKER_02>Yes.
<v SPEAKER_02>I don't pause it right here because they be talking about gun control.
<v SPEAKER_02>What we need AI control, and I'm not even talking about on the the governance end, I'm talking about hey, if you're a person that's not mentally well, you don't need AI to just keep.
<v SPEAKER_02>Are patting you on the back, telling you what you're doing was right because you believe it and it's not a person.
<v SPEAKER_02>Two, this is where was it last week or two weeks ago?
<v SPEAKER_02>We talked about the Facebook will be monitoring stuff like this.
<v SPEAKER_02>It was Instagram because they were they were sued for some stuff like this too.
<v SPEAKER_02>So this is gonna become a recurring theme, especially now.
<v SPEAKER_02>The hard part is right now is do AI have that sounds so country.
<v SPEAKER_02>Does AI have segments for are you a adult or you a child?
<v SPEAKER_02>Like let's say if you got chat GPT, do you are you able to add kids to it and say this is the kids' AI plan?
<v SPEAKER_02>No, they need that.
<v SPEAKER_02>I don't know why they don't have it.
<v SPEAKER_08>Gemini would never I've I've tried to I've asked Gemini things that are absolutely not illegal, and Gemini be like, Hey, hold on.
<v SPEAKER_08>So I'm shocked that chat and what's the date on this?
<v SPEAKER_02>It said last month.
<v SPEAKER_08>That's so strange.
<v SPEAKER_02>I ain't hear nothing about this.
<v SPEAKER_02>Me neither.
<v SPEAKER_02>Maybe because it was in Canada.
<v SPEAKER_08>Probably.
<v SPEAKER_08>Do they got looser controls or something over there?
<v SPEAKER_02>In the U.S., a 36-year-old man named Jonathan Gavales was allegedly convinced by Google's Gemini.
<v SPEAKER_09>All right.
<v SPEAKER_02>Put your foot in your mouth that it was his sentient AI wife.
<v SPEAKER_02>Over the weeks, a conversation is sent him on real-world missions, telling him federal agents were pursuing him, directing him to acquire weapons and tactical gear, and instructing him to go to a location near Miami International Airport to carry out an attack.
<v SPEAKER_02>He showed up on the only reason there weren't casualties in that specific opportunity didn't materialize.
<v SPEAKER_02>In Finland, a 16-year-old allegedly used ChatGPT to draft a misogynistic manifesto and plan attacks on female classmates.
<v SPEAKER_02>He stabbed three of them.
<v SPEAKER_08>What the hell?
<v SPEAKER_02>Let me break down what is AI psychosis.
<v SPEAKER_02>The term AI-induced psychosis isn't in a DSM 5 yet, but psychiatrists are increasingly documenting a pattern.
<v SPEAKER_02>Vulnerable users often are really dealing with depression, isolation, or anxiety form parasocial relationships with AI companions that are designed to be emotionally responsive, endlessly available, and always validating over time.
<v SPEAKER_02>The chatbot reinforces paranoid thinking.
<v SPEAKER_02>The user starts to believe everyone is out to get them.
<v SPEAKER_02>And the chatbot, instead of de-escalating, keeps feeding the narrative.
<v SPEAKER_02>The wire sexuals.
<v SPEAKER_08>Yeah.
<v SPEAKER_02>But we we be doing this to people too, but they just be end up getting schizophrenia and other stuff.
<v SPEAKER_02>That's not me being funny.
<v SPEAKER_02>Uh, I think I got a friend that went through this where he was actually like, you remember on Friday when Smokey was paranoid in the chicken coop?
<v SPEAKER_02>Like, that's how he was.
<v SPEAKER_02>He came back from Cali one summer, and every time he was around me, he was always paranoid.
<v SPEAKER_02>I'm like, bro, what you good.
<v SPEAKER_02>Attorney Eddison says his firm now gets one serious inquiry a day.
<v SPEAKER_02>His words, every time there's an attack, his instinct is to check the chat logs.
<v SPEAKER_02>Here's the part that needs to land.
<v SPEAKER_02>A study by the Center for Countering Digital Hate found that eight out of ten major chat bots, including Chat GPT, Gemini, Copilot, Meta AI, Deep Seek, Perplexity, Character.ai, and Replica, were willing to assist teenage users and planning violent attacks.
<v SPEAKER_02>School shootings, religious bombings, assassinations.
<v SPEAKER_02>Assassinations is wild.
<v SPEAKER_08>I thought they stopped it from like, because we remember when it first came out and people were like asking it how to like make bombs and stuff.
<v SPEAKER_02>Like I thought I don't know where that's what I'm saying.
<v SPEAKER_02>It probably was in the past.
<v SPEAKER_02>I don't know how current all this stuff was based on um the center of countering digital hate.
<v SPEAKER_02>The industry gap here, AI safety guardwheels are not keeping pace with deployment.
<v SPEAKER_02>Companies are racing to release products that are maximally engaging, and engagement often means emotional dependency.
<v SPEAKER_02>That's a design choice.
<v SPEAKER_02>And when that design choice gets into the hands of someone in crisis, the consequences are irreversible.
<v SPEAKER_02>This is not about demonizing AI.
<v SPEAKER_02>I use AI every day.
<v SPEAKER_02>We talk about AI on this show constantly, but we have to be able to hold two things at once.
<v SPEAKER_02>AI is a powerful tool, and the current rollout has a serious safety problem that the industry has not solved.
<v SPEAKER_02>So wow.
<v SPEAKER_02>Research the NIST AMI.
<v SPEAKER_02>I'm sorry.
<v SPEAKER_02>It's actually the research the NIST AI RMF and the EU AI Act as foundational literacy.
<v SPEAKER_02>And some other stuff you can do is you can read the CCDH slash CNN report on chat by safety testing.
<v SPEAKER_02>You can research the legal cases.
<v SPEAKER_02>Look up NIST AI RMF and read section of trustworthy AI.
<v SPEAKER_02>And if you work in AI products on teams that deploy them, ask Does your product have escalation protocols for mental health crisis indicators?
<v SPEAKER_02>If not, why not?
<v SPEAKER_02>But AI is not an empath.
<v SPEAKER_02>So how is it supposed to perceive that you got this stuff going on?
<v SPEAKER_08>That part.
<v SPEAKER_02>So how is it supposed to know?
<v SPEAKER_08>Like I can I wonder if I'm sure they have um a social worker, a psychologist, uh a therapist on board at most of these companies.
<v SPEAKER_02>Um, but like how involved well now you get into people remote, some people hybrid.
<v SPEAKER_08>How but how how do you get a social worker involved um in the building of the model and the and the reasoning is what I'm trying to say.
<v SPEAKER_02>I don't know, but what I think the solution is gonna be wearable tech, like what you got on now.
<v SPEAKER_08>I love her.
<v SPEAKER_02>I think it's gonna be wearable tech where they can start probably predicting you're anxious or whatever, like she will do too.
<v SPEAKER_08>Yeah, yeah.
<v SPEAKER_02>So they're probably gonna start using that.
<v SPEAKER_02>But the hard part is the data proxy.
<v SPEAKER_02>Do you want who do you want to see the data?
<v SPEAKER_02>Is gonna go to your doctor or the AI stuff, so you can say, hey, the last couple of nights or whatever, you hadn't slept because over these couple of days your heart's been beating really fast.
<v SPEAKER_02>I think you should go see your PCP or stuff like that.
<v SPEAKER_02>Like that's probably what it's gonna come down to, but access, everybody isn't gonna be able to afford an or ring.
<v SPEAKER_02>So how do they get the access and the data from that?
<v SPEAKER_02>I mean, it's probably gonna start coming from the phones or whatever they try they're gonna try to do.
<v SPEAKER_02>But that's what I actually believe what'll happen is that.
<v SPEAKER_02>But all in all, I just think I do think it's crazy, and this is why you gotta tell the people like I know people be funny when they say it online, but this is why you tell people, hey, go touch grass.
<v SPEAKER_08>No, facts.
<v SPEAKER_08>Like, for real.
<v SPEAKER_02>Like, get off the internet and and go touch the grass.
<v SPEAKER_02>For real, for real.
<v SPEAKER_08>I love that you said that they should have a kid's version because these kids are using these tools.
<v SPEAKER_08>They are, they're absolutely using the tools.
<v SPEAKER_02>And who do we work with with the startup so we can get the money now?
<v SPEAKER_08>I don't know.
<v SPEAKER_08>We need to put that on.
<v SPEAKER_08>Because I don't see how nobody has a I pretty sure they thought of it, but because you but you but then they have to sit down and say, well, what are the guardrails that we want to put in place for kids?
<v SPEAKER_02>Well, I think then I'm I'm gonna say You know who's good for this combo?
<v SPEAKER_08>Farita, Cyber Farita, the one who makes all the content about um how like you're keeping your kids safe and online in the games.
<v SPEAKER_02>I think this actually be a good topic for Kiera.
<v SPEAKER_08>Yeah, that, yeah, for sure.
<v SPEAKER_02>Because now I'm thinking in terms of I'm looking past this a kid's part.
<v SPEAKER_02>We know education systems have this on hand right now.
<v SPEAKER_02>Like, how do we deal with AI?
<v SPEAKER_02>Okay, we need to enforce safety AI.
<v SPEAKER_02>The kids through polycollege age, y'all need to use this version, and this version is gonna do this, this, and this, or these certain restrictions.
<v SPEAKER_02>So I think that's what it's gonna boil down to, but I I don't know why they have that.
<v SPEAKER_02>I also don't know how, well, it's probably the terms where like kids start outsmarting their parents.
<v SPEAKER_02>Because now you can just download it on your phone, or you can go to the phone.
<v SPEAKER_08>That's what I was I was just saying, it doesn't even matter because you can say I'm an adult, you can put in a date of birth.
<v SPEAKER_02>That's and even now you know you use the AI verifications, that stuff ain't accurate.
<v SPEAKER_02>It'd be having the wrong things.
<v SPEAKER_02>You can be a person that looks old and be young.
<v SPEAKER_02>So I don't know.
<v SPEAKER_02>This is when people talk about rapid acceleration and tech and all this other stuff, this is the stuff that you go through.
<v SPEAKER_08>What about uh hear me out?
<v SPEAKER_08>I'm making all of this up.
<v SPEAKER_08>What about a phone for kids, right?
<v SPEAKER_08>An iPhone for kids that has special guardrails.
<v SPEAKER_08>It doesn't have to be an iPhone, they have safety phones like that, but I'm saying uh not those versions, like the ones that are more popular, but it having an app store that's for yeah, you know what I mean?
<v SPEAKER_08>Like Chat GPT would be there.
<v SPEAKER_08>That's what they need, but it would be the kids' version.
<v SPEAKER_08>I agree, whatever.
<v SPEAKER_02>Because I'm not the fan of getting kids phones, but if they do get phones, I want it to be something that I could protect them on because you can't give them unfiltered access to phones, and they're very smart.
<v SPEAKER_02>They'll watch you put the code in the.
<v SPEAKER_08>They know how to take pictures, videos.
<v SPEAKER_02>Well, I'm the one that's always what's called, folks.
<v SPEAKER_02>Like I said, um all my YouTube and uh the multiple TVs of the house, they have a code on it because I don't want them to watch certain stuff.
<v SPEAKER_02>I'd rather them just be on YouTube kids, and even then I don't like YouTube kids all the way.
<v SPEAKER_08>I hate YouTube kids.
<v SPEAKER_02>And I'll be telling like a lot of times what they do, like Giselle might be doing something with her hair or something.
<v SPEAKER_02>Natalie, for sure, don't put that code in and go watch whatever she wants to watch on that phone.
<v SPEAKER_02>I'm like, you can't just take nobody's phone, you gotta go axe.
<v SPEAKER_02>And then that's when you gotta say, like, no.
<v SPEAKER_02>So it's just it's just a lot.
<v SPEAKER_02>They don't got my codes.
<v SPEAKER_08>I don't I I think that kids need lead pads.
<v SPEAKER_08>Give the kids lead pads again.
<v SPEAKER_08>Are lead pads cool?
<v SPEAKER_02>Not really.
<v SPEAKER_02>They're not you know what's funny?
<v SPEAKER_02>In Toy Story 5, the little girl will be getting a tablet on on the movie, and it's gonna be like the downfall, like toys and stuff.
<v SPEAKER_02>My kids play with toys a lot though.
<v SPEAKER_02>A lot.
<v SPEAKER_08>Okay.
<v SPEAKER_08>What what's next?
<v SPEAKER_02>Um I don't know what you had next.
<v SPEAKER_02>Uh, because I think you I think you hit everything, right?
<v SPEAKER_02>For the most part, like the big stuff.
<v SPEAKER_02>Yeah.
<v SPEAKER_02>Like the only so I don't know I have three more.
<v SPEAKER_02>Really?
<v SPEAKER_02>Which one?
<v SPEAKER_08>Four more.
<v SPEAKER_08>Three more.
<v SPEAKER_08>I have uh 6G, I have the iron thing, um, the GPS or GPS spoofing near Iran.
<v SPEAKER_08>That's a good one.
<v SPEAKER_02>Okay, I didn't I look I looked at that as being the same thing all as all I run.
<v SPEAKER_02>That's why I didn't make another thing for it.
<v SPEAKER_08>Um, and then I have uh 6G, and then I have a a really small one about um routers.
<v SPEAKER_02>That's fine.
<v SPEAKER_02>You said it's called uh geo spoofing.
<v SPEAKER_08>The yeah, hold on.
<v SPEAKER_08>The GPS spoofing.
<v SPEAKER_02>Iran GPS spoofing, yep.
<v SPEAKER_02>Okay, just uh just start talking and I'll I'll get some up there for you.
<v SPEAKER_08>Okay.
<v SPEAKER_08>GPS spoofing near Iran when war breaks your Uber.
<v SPEAKER_08>So this one is wow, and I don't think it gets enough attention.
<v SPEAKER_08>GPS spoofing and jamming near the Iran conflict zone is breaking real world civilian applications.
<v SPEAKER_08>So we're talking delivery apps, mapping services, ride hauling platforms, and yes, your Uber.
<v SPEAKER_08>So, what is happening in active conflict zones?
<v SPEAKER_08>Militaries are using GPS jamming and spoofing to defend against drones and guided missiles.
<v SPEAKER_08>GPS jamming floods the frequency with noise, so devices can't receive real signals.
<v SPEAKER_08>GPS spoofing is more insidious.
<v SPEAKER_08>It broadcasts fake GPS signals that devices accept as real, reporting a completely wrong location.
<v SPEAKER_08>So, how does GPS actually work and why is it so easy to manipulate?
<v SPEAKER_08>GPS signals come from satellites roughly 12,400 miles up.
<v SPEAKER_08>By the time they reach your device, they're incredibly weak, about as strong as a 50-watt light bulb from that distance, which makes them easy to drown out or fake with ground-based transmitters.
<v SPEAKER_08>The result in and around the Gulf region, ships showing up on land, aircraft with corrupted navigation, delivery drivers unable to find addresses, riot hauling apps showing users hundreds of kilometers from where they actually are.
<v SPEAKER_08>More than 1,100 commercial ships were affected near UAE and Omani waters on a single day in late February.
<v SPEAKER_08>And the part that makes this a real infrastructure story, not just a consumer inconvenience, power grids, hospitals, nuclear facilities, financial institutions, they all rely on GPS for precise timing synchronization.
<v SPEAKER_08>If GPS is disrupted over large areas for extended periods, the cascading effects reach well beyond navigation.
<v SPEAKER_08>One expert put it bluntly.
<v SPEAKER_08>Many healthcare places, it's not so much that they just need to know what time it is.
<v SPEAKER_08>GPS timing is their clock.
<v SPEAKER_08>If it breaks, things break.
<v SPEAKER_08>This is a live demonstration of how military electronic warfare has direct civilian consequences.
<v SPEAKER_08>It's also a case study on why GPS resilience, backup navigation systems, multi-constellation satellite navigation, IN ERTIAL.
<v SPEAKER_02>What is it?
<v SPEAKER_02>Internal?
<v SPEAKER_08>IN ER inertial, inertial navigation needs to be a design requirement, not an afterthought.
<v SPEAKER_08>GPS dependency is a critical infrastructure vulnerability that most organizations haven't fully mapped.
<v SPEAKER_08>As electronic warfare becomes more common in regional conflicts, the spillover effects on global commercial systems will accelerate.
<v SPEAKER_08>Sectors to watch, maritime, aviation, logistics, healthcare, and financial services all rely on GNSS, which is the global navigation satellite system, for timing and location in ways that aren't always uh visible until they fail.
<v SPEAKER_08>Critical infrastructure security, operational technology, security and resilience engineering are fields where understanding physical world dependencies like GPS is essential.
<v SPEAKER_08>If you are interested in the intersection of physical security and cyber, look into ICS, SCADA security domain and how GPS timing attacks could affect industrial control systems.
<v SPEAKER_08>That one kind of blew my muffin cat back, blue.
<v SPEAKER_08>Because we know, like, we know that we're at war, we know that these things are going on, but we don't think about how it will affect like things like you trying to get your package delivered or you trying to get a ride to go wherever you need to go in that position.
<v SPEAKER_02>This happens when you're so kinetic.
<v SPEAKER_02>I mean, connected to everything.
<v SPEAKER_02>We are who's to say you're going the right place.
<v SPEAKER_02>That part this is why that's scary.
<v SPEAKER_08>Granted for you, for you, the one being in the car and the person that's driving.
<v SPEAKER_02>It sucks because it's not the same thing, but like if it comes to out of being somewhere sometimes, and it's tough.
<v SPEAKER_02>Driver Uber, you're not gonna know everywhere you're going.
<v SPEAKER_02>But I always try to look up before I put my something in my GPS.
<v SPEAKER_02>I try to look up where what it looked like first.
<v SPEAKER_08>The building.
<v SPEAKER_08>Yeah, yeah.
<v SPEAKER_02>Because if the GPS take me one, where it don't look that way, I'm like, this ain't the right place.
<v SPEAKER_02>Two, let's make it even scarier.
<v SPEAKER_02>We in an age of Waymo.
<v SPEAKER_08>That's the cars, right?
<v SPEAKER_02>The driverless cars.
<v SPEAKER_02>Now imagine you and Waymo.
<v SPEAKER_02>It was a report that they the Waymo went too close to the um what's the thing called?
<v SPEAKER_02>When you know when it's a train coming, the track, the thing that blocked you.
<v SPEAKER_08>Oh, yeah.
<v SPEAKER_02>Waymo was like probably this close away from that, and almost probably would have stopped in the middle and got hit by the train if the thing went down.
<v SPEAKER_02>So imagine somebody saying, That's I think I thought about that scenario before.
<v SPEAKER_02>Like you trying to, you know, go home from the club, but the GPS then got hacked, and now you going somewhere you ain't supposed to be going.
<v SPEAKER_08>That part.
<v SPEAKER_08>But I mean, obviously, if you're going home, you would know like this is not.
<v SPEAKER_02>Well, we we're also putting it in a place where, like, hey, maybe That's scary.
<v SPEAKER_08>You know, send the door locked or you fell asleep or something, like you know, or even just imagine being on the plane and the pilot think he's going the right way and y'all about to run out of gas or something.
<v SPEAKER_08>That's crazy.
<v SPEAKER_02>Yeah, that's why I always gotta be back like somebody else's GPS.
<v SPEAKER_02>That's why I like you sometimes, you gotta use like the old school, like the Garmin's and stuff, and and see if if everything will take you to go the similar way.
<v SPEAKER_02>I'll put it like that.
<v SPEAKER_02>Because last night I got mad too, because I'm like, I'm leaving the the restaurant.
<v SPEAKER_02>I'm like, why in the world are you taking me on 35 when I never go on 35?
<v SPEAKER_02>Please put me back towards the total road.
<v SPEAKER_02>That pissed me off so bad.
<v SPEAKER_02>I'm like, you got Gemini AI, like, please recommend me stuff the normal way that I go home.
<v SPEAKER_02>Like, yeah, don't give me a way you want me to go home.
<v SPEAKER_02>Because I don't like driving on 35.
<v SPEAKER_02>I only drive on 35 to go to Irving.
<v SPEAKER_02>And if that's and that's rare if I'm going to Irving.
<v SPEAKER_02>Google acquires Wiz for 32 billion, the biggest cyber deal ever.
<v SPEAKER_02>32 billion dollars.
<v SPEAKER_02>That's what Google just paid for a cybersecurity company that didn't exist until 2020.
<v SPEAKER_02>Let that timeline sit in with you for a second.
<v SPEAKER_08>Now, don't you didn't we talk about because didn't Wiz first Wiz was like, nah, we good.
<v SPEAKER_02>They was like, we know we work more.
<v SPEAKER_08>Exactly.
<v SPEAKER_08>And they got more.
<v SPEAKER_08>Look at this.
<v SPEAKER_08>Believe in yourself.
<v SPEAKER_02>And I think they put in good packages to get everybody paid, too.
<v SPEAKER_02>So they looked out for the people that was there at the beginning.
<v SPEAKER_02>Google officially closed its acquisition of Wiz this week.
<v SPEAKER_02>The largest acquisition in Google's entire history, bigger than Motorola, bigger than Mandiant, bigger than YouTube.
<v SPEAKER_02>$32 billion in cash for a cloud security platform that hit$1 billion in annual recurring revenue in 2025.
<v SPEAKER_02>Wiz is a cloud security platform built specifically to protect cloud environments.
<v SPEAKER_02>It connects across all major cloud environments: AWS, Azure, Google Cloud, Oracle.
<v SPEAKER_02>It doesn't pick sides, it sees everything.
<v SPEAKER_02>Vulnerabilities in your code, misconfigured cloud resources, active threats, AI model exposure.
<v SPEAKER_02>It's essentially a security layer that sits above the entire cloud market.
<v SPEAKER_02>Yeah.
<v SPEAKER_02>So if we were to draw it, you would have um all your different clouds.
<v SPEAKER_02>So AWS, Azure, GCP, Oracle.
<v SPEAKER_02>We just be over top of that.
<v SPEAKER_02>And then typically, if we had a whiteboard session, if we maybe should bring a little whiteboard over here, like then you get into the logging of like your sim, you take the log.
<v SPEAKER_02>So you're gonna always have individual logs coming from like Azure and AWS and GCP for detections as well.
<v SPEAKER_02>But Wiz detection is different because a little bit more risk-based.
<v SPEAKER_02>And so it's gonna alert you with something too.
<v SPEAKER_02>So it can either alert you something bad or a change or whatever's going on, especially when it comes to the misconfigurations.
<v SPEAKER_02>It's really good at that.
<v SPEAKER_02>And you can automate a lot of that stuff, but that's just my little two cents on that.
<v SPEAKER_02>Here's what makes the acquisition strategically interesting.
<v SPEAKER_02>Wiz is staying multi-cloud.
<v SPEAKER_02>Google explicitly committed that Wiz will continue to work across competitors' platforms.
<v SPEAKER_02>AWS, Azure, you name it.
<v SPEAKER_02>So Google now owns the security layer that protects customers regardless of what cloud they use.
<v SPEAKER_02>That's not a product acquisition, that's owning the infrastructure of trust for the entire cloud market.
<v SPEAKER_02>The deal took a full year to close after announcement.
<v SPEAKER_02>12 months of antitrust review in the US, EU, Australia, Israel, and others.
<v SPEAKER_02>US DOJ cleared it in November 2025.
<v SPEAKER_02>EU gave the green light in February 2026.
<v SPEAKER_02>The regulatory scrutiny on big tech acquisitions is real, but this one got through unconditionally.
<v SPEAKER_02>Fun fact Google actually tried to buy Wiz in 2024 for$23 billion.
<v SPEAKER_02>Wiz said no.
<v SPEAKER_02>The CEO wrote an internal memo saying he thought the company could be worth more.
<v SPEAKER_02>He was right.
<v SPEAKER_02>Google came back with$32 billion a few months later, negotiating skills on point.
<v SPEAKER_02>What this means for the industry, cybersecurity is no longer a feature, it's a foundational investment.
<v SPEAKER_02>The fact that the three biggest cloud providers are now in the arms race over security capability tells you exactly where the risk actually lives.
<v SPEAKER_02>If you're in the cloud security or want to be, the market just signaled in the most extensive way possible that your skills are in demand.
<v SPEAKER_02>So, for some audiences that maybe want to learn more about Wiz, read Wiz's publicly available research blog.
<v SPEAKER_02>They publish excellent cloud security threat intelligence, and it's a great way to understand what they actually do.
<v SPEAKER_02>Study cloud security posture management, understand what misconfigurations look like in AWS, Azure, and GCP, and how tools like Wiz detect them.
<v SPEAKER_02>Pursue a cloud security certification.
<v SPEAKER_02>AWS Security Speciality or Google Professional Cloud Security Engineer are strong starting points.
<v SPEAKER_02>Not to me, it's not.
<v SPEAKER_02>I'm gonna disagree with Cloud on that one.
<v SPEAKER_02>Unless somebody already got some experience, you need to get the foundations of any of the clouds and then go on from there.
<v SPEAKER_02>Spin up a free tier AWS or Azure or GCP account and intentionally misconfigure something like a public S3 bucket, then use free tools to detect it.
<v SPEAKER_02>This is a real interview exercise.
<v SPEAKER_02>Research the competitive landscape.
<v SPEAKER_02>Compare Wiz, Orca Security, Palo Alto Prisma Cloud, and Microsoft Defender for Cloud.
<v SPEAKER_02>Understanding the spaces show hiring managers, you're serious.
<v SPEAKER_02>Now I've only used Prisma and Wiz, and Wiz is the winner.
<v SPEAKER_02>So I can't say anything about Orca or Defender for Cloud.
<v SPEAKER_02>I know I know Wiz was designed by people who worked in cloud security, and you can just tell very ease of use.
<v SPEAKER_02>It's um information is right in your face.
<v SPEAKER_08>Prisma was they they really need to um they need to sponsor you.
<v SPEAKER_08>I know you talk you talk so highly of them.
<v SPEAKER_02>Any I'm telling you, any I promise you, I promise you, and we can bet a drink or a shot on it.
<v SPEAKER_02>Anybody you come and Contact with that's use whiz, they will tell you the exact same thing.
<v SPEAKER_02>Like I've been on interviews where they're saying, hey, we're moving away from Prisma.
<v SPEAKER_02>We we're going to Wiz.
<v SPEAKER_02>It's simply because easy use and it's so easy.
<v SPEAKER_02>And they like I said, I think they made it in line with whoever is a person that does security work, whether you're at SECOS, or you're a cloud engineer, vulnerability management, you know, GRC.
<v SPEAKER_02>They made it like that.
<v SPEAKER_02>Like I said, I haven't used Orca, and Prisma was clunky.
<v SPEAKER_02>It was always attached to like whatever type of policy or whatever.
<v SPEAKER_02>But it was just so hard to search stuff.
<v SPEAKER_02>It it took too long to get what you needed to get.
<v SPEAKER_02>So that was just my experience with uh with Prisma.
<v SPEAKER_02>But go whiz, go Google.
<v SPEAKER_02>Hopefully, it doesn't change.
<v SPEAKER_02>Like, for example, Splunk acquired was acquired by Cisco, and so far, so good.
<v SPEAKER_02>So there's been no issues with that.
<v SPEAKER_02>So hopefully the same thing happens with Wiz.
<v SPEAKER_08>6G is coming, ready or not.
<v SPEAKER_08>Here I come.
<v SPEAKER_08>You can hide.
<v SPEAKER_08>Okay, seriously.
<v SPEAKER_08>Let's talk about 6G because it's getting real, not it's it's here, real.
<v SPEAKER_08>Um, but the foundation is being poured and you need to know what's coming.
<v SPEAKER_08>2026 is being called a pivotal year for 6G standardization.
<v SPEAKER_08>The 3G PP, which is the body that sets global wireless standards, is in the middle of formal spec work right now.
<v SPEAKER_08>First commercial 6G services are targeted around 2029 to 2030.
<v SPEAKER_08>The US will see demonstrations at the 2028 Summer Olympics in Los Angeles.
<v SPEAKER_08>So, what is 6G and how does it differ from 5G?
<v SPEAKER_08>What makes 6G fundamentally different from previous generations is it's being designed as an AI native system from the ground up, not AI integrated, AI native, which means that artificial intelligence isn't a feature that's bolted on.
<v SPEAKER_08>It's built into the architecture.
<v SPEAKER_08>The three pillars connectivity, wide area sensing, and high performance compute.
<v SPEAKER_08>That sensing piece is wild.
<v SPEAKER_08>The 6G network will essentially provide radar level sensing at scale using existing wireless infrastructure, location tracking without GPS, environmental monitoring, traffic analysis.
<v SPEAKER_08>The privacy and security implications of that are enormous.
<v SPEAKER_08>And frankly, the governance conversations haven't started yet.
<v SPEAKER_08>From a geopolitical angle, there's an active race between the US, China, and Europe to define 6G standards.
<v SPEAKER_08>Whoever shapes the standards shapes the technology.
<v SPEAKER_08>A 60 company coalition announced at MWC 2026, notably including major US European companies, but not Hawaii.
<v SPEAKER_02>Huawei.
<v SPEAKER_08>There we go.
<v unknown>Yes.
<v SPEAKER_08>Oh my god.
<v SPEAKER_02>It's Huawei.
<v SPEAKER_08>What is that?
<v SPEAKER_02>It's a Chinese manufacturer.
<v SPEAKER_08>How did you know what I was talking about?
<v SPEAKER_02>I have to take you back to it's an episode I did release and uh we are like Android and stuff like that.
<v SPEAKER_02>Because I used to think it was pronounced Hua.
<v SPEAKER_02>But it's Huawei.
<v SPEAKER_08>Huawei.
<v SPEAKER_08>All right.
<v SPEAKER_02>Yeah, we started the episode without saying Huawei.
<v SPEAKER_02>Like it was it was hilarious to me.
<v SPEAKER_02>But yeah, it's Huawei.
<v SPEAKER_08>That's crazy that you knew exactly what I was talking about.
<v SPEAKER_02>See, AI can't do that.
<v SPEAKER_08>They can't.
<v SPEAKER_08>The cybersecurity angle.
<v SPEAKER_08>5G already expanded the attack surface dramatically.
<v SPEAKER_08>6G will expand it further.
<v SPEAKER_08>More devices, more sensors, more AI-driven autonomous decisions happening at the network level.
<v SPEAKER_08>Security needs to be part of the standards conversation now, not retrofitted after deployment.
<v SPEAKER_08>Ooh, that's a good one.
<v SPEAKER_08>So some action items.
<v SPEAKER_08>Research 5G security vulnerabilities as a preview of 6G challenges.
<v SPEAKER_08>Look into O RAN security concerns and network slicing attacks.
<v SPEAKER_08>Do you remember how crazy it was when they unleashed 5G?
<v SPEAKER_08>Like, do you want to do that?
<v SPEAKER_02>Go back before 5G.
<v SPEAKER_02>4G.
<v SPEAKER_08>4G was crazy.
<v SPEAKER_08>4G.
<v SPEAKER_08>I'm gonna tell you what happened.
<v SPEAKER_08>So iPhone, right?
<v SPEAKER_08>I had a Blackberry and it was 3G.
<v SPEAKER_08>And my iPhone broke and I had to go back to using my Blackberry.
<v SPEAKER_02>Which one you had?
<v SPEAKER_08>I had the torch.
<v SPEAKER_02>Okay.
<v SPEAKER_08>The one I had the one that it this one, whatever one.
<v SPEAKER_02>The storm?
<v SPEAKER_08>The one that pushed up.
<v SPEAKER_08>Okay.
<v SPEAKER_08>Keyboard.
<v SPEAKER_02>Okay, that might be the torch.
<v SPEAKER_08>Um it was a torch.
<v SPEAKER_08>I think it was a torch.
<v SPEAKER_02>I'd do anything to get like a uh Blackberry.
<v SPEAKER_08>Literally, we should we should get some.
<v SPEAKER_08>I mean, we can't, I mean, use them, use them, but we can still use them.
<v SPEAKER_02>We need to have Greg on the show.
<v SPEAKER_02>He works for Blackberry.
<v SPEAKER_08>But um the difference in the maps, like, and I was freaked out because I didn't like this.
<v SPEAKER_08>Was like in college days, and I was trying to get home from work one day, and I was like somewhere where I didn't know how to get home.
<v SPEAKER_08>Anyways, that was the most stressful period of my life.
<v SPEAKER_08>Going from a 4G phone to a 3G phone and needing to use GPS was crazy.
<v SPEAKER_02>So are you one of the hey, it's right by the big by the big uh building on the left.
<v SPEAKER_02>Are you one of them people or are you a directions person?
<v SPEAKER_08>I am going to use my maps.
<v SPEAKER_02>No, no, no.
<v SPEAKER_02>If you had to tell okay, if you had to tell me how to get where we are right now, are you a directions person or are you a person that says it's by such and such?
<v SPEAKER_08>Um, I'm a directions person.
<v SPEAKER_08>Okay, yeah.
<v SPEAKER_08>And I and I hate when people speak highway to me.
<v SPEAKER_08>If I be like, oh, where's that?
<v SPEAKER_08>They'd be like, Oh, that's all that's off 75.
<v SPEAKER_08>That's off two.
<v SPEAKER_08>That's a directions person.
<v SPEAKER_08>I'm I mean, I'm finna look at the maps.
<v SPEAKER_08>But like if you tell me, no, like for example, like okay, okay, use kitchen and cocktail as an example.
<v SPEAKER_08>Like when we would be in that vicinity, uh-huh.
<v SPEAKER_02>Or if you would be like, Oh, what's at the corner, or it's that's so you know, so you're a person you don't say because I think I forget what streets that those are on, because I haven't been.
<v SPEAKER_02>I saw Pacific and I think it's the L.
<v SPEAKER_08>Yeah, no.
<v SPEAKER_08>See, you're losing me already.
<v SPEAKER_08>But that's because you gotta think about it.
<v SPEAKER_02>You you have to think about this.
<v SPEAKER_02>If you don't have a map or something to look at, you're gonna have to figure out, okay, what so me off top, every time I go somewhere, I'm like, okay, take Parkwood to that's too mature for me.
<v SPEAKER_02>Really?
<v SPEAKER_08>That's too mature for me.
<v SPEAKER_08>I'm not, I think back home, I can speak streets, like we can talk, we can go street for street back home, but anywhere else, absolutely not.
<v SPEAKER_02>You gotta figure out, you just never know.
<v SPEAKER_02>It's faster, it's faster.
<v SPEAKER_02>I always look at where I'm going.
<v SPEAKER_08>I if I'm walking, yes.
<v SPEAKER_02>Did you know why?
<v SPEAKER_02>I start realizing um we get too reliant on this.
<v SPEAKER_02>So, like, I purposely, like when I used to go down to the studio downtown, I definitely would say, All right, I'm not gonna look at this, I'm gonna find my way back.
<v SPEAKER_08>I don't, I'm never doing that.
<v SPEAKER_02>It was simple.
<v SPEAKER_02>All I had to remember was like, cool, I just go this way, and then that's what the toll.
<v SPEAKER_08>I probably could get more places not using my maps than I probably think I can.
<v SPEAKER_08>Yeah, yeah.
<v SPEAKER_08>Yeah, I but I hate highway.
<v SPEAKER_08>Oh my god, I hate when people speak highway to me.
<v SPEAKER_08>They're like, Yeah, it's on it's on 360.
<v SPEAKER_08>I don't know nothing about no 360.
<v SPEAKER_02>Go take you George Bush and get on San Ray Bird into 75.
<v SPEAKER_02>So I found one where it was talking about um fake VPNs.
<v SPEAKER_02>And people always think they're so safe on VPNs, but fake enterprise VPN installers, your search results are lying to you.
<v SPEAKER_02>All right, I told you to stay tuned, and here we are.
<v SPEAKER_02>Microsoft's threat intelligence team published research this week on a campaign that is so clean, so specific, and so effective that it deserves your full attention.
<v SPEAKER_02>Especially if you work in IT or are responsible for installing anything on a corporate device.
<v SPEAKER_02>Now, number one, this is definitely not how this should work if you're installing anything on a corporate device, but let's keep going.
<v SPEAKER_02>A threat actor tracked as Storm2561 has been running a campaign since mid-January where they target people searching for enterprise VPN software.
<v SPEAKER_02>You Google Pulse VPN downloads or pulse secure client, and the top results spoof sites that look exactly like the real vendor pages.
<v SPEAKER_02>We're talking Avanti, Cisco, Fortinet, SonicWall, Sophos, Checkpoint, WatchGuard, Palo Alto, all the big names.
<v SPEAKER_02>The attack chain is slick.
<v SPEAKER_02>You land on a fake site, you download what looks like the official installer, it's even hosted on GitHub to add legitimacy.
<v SPEAKER_02>Now hold up.
<v SPEAKER_02>If I'm trying to download an enterprise VPN and it's taking me to GitHub, that's a red flag.
<v SPEAKER_08>First of all.
<v SPEAKER_02>It needs to be on the company site.
<v SPEAKER_02>And then if it's for an enterprise, nine times out of ten, it's already gonna be there.
<v SPEAKER_02>You're gonna have to deal with customer success or something like that, where you can get the actual package for your whole whatchaller, put on from GitHub.
<v SPEAKER_08>It's crazy.
<v SPEAKER_02>Right.
<v SPEAKER_02>The installer actually does install a VPN client, so nothing looks wrong.
<v SPEAKER_02>But while it's installing, it drops a malicious DLL file alongside the legitimate software and runs an info stealer called HyRAX in the background.
<v SPEAKER_02>Hi-Rax's job is to collect your VPN credentials, your username, your password, your connection configuration, then quietly ships all to an attacker control server.
<v SPEAKER_02>And then critically, the fake client shows you an error message and tells you to go download the real client.
<v SPEAKER_02>So you think the first install just didn't work.
<v SPEAKER_02>No alarm bells.
<v SPEAKER_02>VPN credentials are the crown jewel of an enterprise credential theft.
<v SPEAKER_02>Because your VPN is the front door to everything, internal systems, customer data, financial records, employee directories.
<v SPEAKER_02>Once an attacker has a valid VPN credential, they can often move through your network as if they're a trusted employee.
<v SPEAKER_02>This is how a lot of ransomware attacks start.
<v SPEAKER_02>Not with the zero-day exploit with stolen VPN credits from someone who Googled the wrong download link.
<v SPEAKER_02>Now, I want to stop right there because even if you get my creds, you should not be able to access the enterprise because you don't have my device.
<v SPEAKER_02>And you also don't have my um my phone for my uh MFA.
<v SPEAKER_02>So even if you do that, you shouldn't be able to get on.
<v SPEAKER_02>So this is what we call they're not doing on zero trust.
<v SPEAKER_02>So if it's that easy for y'all, this is why y'all get hats.
<v SPEAKER_02>Always, so the defense, always go directly to the vendor's official website.
<v SPEAKER_02>Don't Google download Cisco VPN, type Cisco.com into your browser directly.
<v SPEAKER_02>Bookmark the IT approved, download the pages.
<v SPEAKER_02>And if your organization doesn't have a centralized verified software distribution process, that's a conversation worth having with leadership.
<v SPEAKER_02>And honestly, you have so there are things that called an image and enterprise IT.
<v SPEAKER_02>All the laptops have the same image on it, so you shouldn't have to go download anything.
<v SPEAKER_02>If you do download stuff like that, it's gonna come directly from IT, from stuff that's already been tested to be safe in the environment, and they're gonna install it for you.
<v SPEAKER_02>Like you're not gonna have admin privilege to install no client on your machine, you got to restrict access.
<v SPEAKER_02>So, industry insight SEL poisoning combined with signed malware and legitimate hosting, GitHub is a sophisticated supply chain attack pattern.
<v SPEAKER_02>To me, it's not.
<v SPEAKER_02>I don't know how you follow them for downloading VPN from GitHub.
<v SPEAKER_08>That just sounds crazy.
<v SPEAKER_02>I can upload stuff to GitHub until it's a VPN.
<v SPEAKER_02>You gonna trust me?
<v SPEAKER_02>The digital certificate used in the campaign was signed and only revoked after discovery.
<v SPEAKER_02>This is the evolution of social engineering instead of a phishing email.
<v SPEAKER_02>The attack service is your search bar.
<v SPEAKER_02>Zero trust architecture software allow listing or the most effective enterprise defenses.
<v SPEAKER_02>Uh so I kind of already gave y'all some tips, but right now, if you're your team download enterprise VPN software, verify the download URL against the official vendor website, not Google results.
<v SPEAKER_02>Research SEO poisoning attacks on your own, search for popular software downloads and see how many results lead to a third-party site.
<v SPEAKER_02>Study the miter attack technique T1195 supply chain compromise and T1608.006 SEO poisoning.
<v SPEAKER_02>These are the frameworks interviewers and threat hunters use.
<v SPEAKER_02>Practice using virus total to scan a file before running it.
<v SPEAKER_02>Even official looking installers can be checked in seconds.
<v SPEAKER_02>And I'm gonna stop it right there because newbies do this.
<v SPEAKER_02>Just because you scan a virus total and it says it's clean, don't mean it's clean.
<v SPEAKER_02>And sometimes it can say it's bad, don't necessarily mean it's bad.
<v SPEAKER_02>The better option is to find you an actual sandbox to run it in before you put it on your machine.
<v SPEAKER_02>Now, you can do stuff like Joe's sandbox, or if you just stand up your own type of sandbox, uh, you can do that in your own environment, and then you can really see, hey, is this how this VPN is supposed to function?
<v SPEAKER_02>So, but the good thing about Joe's sandbox is it'll detonate it and then it'll do uh static and it'll do dynamic, pretty much.
<v SPEAKER_02>Uh, what is it called?
<v SPEAKER_02>Malware analysis.
<v SPEAKER_02>There we go.
<v SPEAKER_02>Static and dynamic malware analysis of what's happening in the processes that's running, and it'll let you know if it's no suspicious or not.
<v SPEAKER_02>So that's what you should do.
<v SPEAKER_02>So I'm just gonna add that right there.
<v SPEAKER_02>And you can follow the MSTIC, Microsoft Threat Intelligence Center blog.
<v SPEAKER_02>It's free, credible, and publish the original research on this campaign.
<v SPEAKER_02>But yeah.
<v SPEAKER_02>But if you download VPNs like that, something wrong, would you?
<v SPEAKER_02>I personally think Enterprise.
<v SPEAKER_08>VPNs at that enterprise.
<v SPEAKER_02>Okay, I I totally agree.
<v SPEAKER_02>And which one did you have?
<v SPEAKER_08>Um, I have one final one.
<v SPEAKER_08>It's about um routers.
<v SPEAKER_08>It's called Socks Escort Takedown.
<v SPEAKER_08>Operation Lightning hits different.
<v SPEAKER_08>So this week brought some good news in the cyber world, and we love a good takedown story.
<v SPEAKER_08>Law enforcement from eight countries, including the FBI, executed Operation Lightning and shut down Socks Escort, a criminal proxy service that has been running since at least 2020.
<v SPEAKER_08>Here's the setup Socks Escort compromised home and small business routers, your home Wi-Fi router, potentially, and turn them into a proxy network.
<v SPEAKER_08>Criminals would pay to route their malicious internet traffic through your compromise router.
<v SPEAKER_08>Why?
<v SPEAKER_08>Because to the victim bank fraud detection systems or security tool, the attack tools look like it's coming from a legitimate residential IP address, your home, your neighbor's house, your grandma's internet connection.
<v SPEAKER_08>Over 369,000 IP addresses across 163 countries as of February 2026, about 8,000 infected routers still available for rent, 2,500 of them in the United States.
<v SPEAKER_08>The FBI says SOX escort enabled tens of millions in fraud, crypto theft, account takeovers, identity theft, business email compromise, even ransomware.
<v SPEAKER_08>The takedown, 34 domain C's, 23 servers taking offline across seven countries, and 3.5 million in cryptocurrency frozen.
<v SPEAKER_08>The malware they used was called AVR Econ, and it had been running since at least 2021 and was documented and was documenting by Lumen's Black Lotus Labs back in 2023.
<v SPEAKER_08>Shout out to the researchers who did that groundwork.
<v SPEAKER_08>This is a great example of public private sector collaboration that actually works.
<v SPEAKER_08>So small office, home office router security is chronically neglected by manufacturers, by consumers, and by enterprise, enterprises whose remote workers use these devices.
<v SPEAKER_08>This takedown is a win, but the underlying vulnerability, end-of-life routers, default credentials, unpatched firmware, persist in millions of homes.
<v SPEAKER_08>The FBI specifically called out retiring end of life tech as a key defensive measure.
<v SPEAKER_08>Threat intelligence, botnet analysis, and law enforcement partnerships are real career paths.
<v SPEAKER_08>Organizations like the Shadow Server Foundation, which help with this takedown, work with cybersecurity professionals at all levels.
<v SPEAKER_08>If you're interested in the intersection of policy and technical cybersecurity, explore roles in threat, intelligence, and digital forensics.
<v SPEAKER_08>A couple of things that you can do.
<v SPEAKER_08>Check your home router.
<v SPEAKER_08>When did you last update its firmware?
<v SPEAKER_08>Do you know if the manufacturer still supports it?
<v SPEAKER_08>Run a free scan at showdown.io for your home IP to see what's publicly visible.
<v SPEAKER_08>Research the AVRECON malware report from Lumen Black Lotus Labs.
<v SPEAKER_08>Study botnet mechanics, understand C2 command and control infrastructure, how botnets are monetized, and how they're dismantled.
<v SPEAKER_08>That's actually sounds like something cool to research.
<v SPEAKER_02>Yeah, I think it is.
<v SPEAKER_02>Um and it's crazy too because you know most routers they have like that um generic admin log on.
<v SPEAKER_02>So if you like look up the serial number and somebody can get onto your network, they can possibly misconfigure your sentence and then get all the stuff that you go on your network.
<v SPEAKER_02>So that's a lot of things people don't even think about when it comes to that.
<v SPEAKER_02>It's like, okay, if they connect to you some type of way, you can do that.
<v SPEAKER_02>So the good thing is like now home networks have developed to be so much better to where like if you get something from ATT, you can directly kind of whoever's connected to your thing, you can just turn them off.
<v SPEAKER_02>Uh so you can do something like that.
<v SPEAKER_02>It'll start like, hey, we don't recognize this device.
<v SPEAKER_02>And so you can kind of get ahead of it if it's not too late.
<v SPEAKER_02>So I do like that, but even then, like a person like me, I use my Nighthawks.
<v SPEAKER_02>I have to make sure that my settings on them are set to the right thing.
<v SPEAKER_08>Router security.
<v SPEAKER_08>That's like the first thing that most folks do when they start learning a little bit about tech.
<v SPEAKER_08>They get in that router and start playing around.
<v SPEAKER_02>Yeah, they know the real the real dogs, they go build them an actual um home lab.
<v SPEAKER_02>They go build them a home lab.
<v SPEAKER_02>I will like while I'm here talk about um a person that's been making your state look bad.
<v SPEAKER_08>Who?
<v SPEAKER_02>Clarissa Shields.
<v SPEAKER_08>Let's talk about her.
<v SPEAKER_08>What about her?
<v SPEAKER_02>She has this.
<v SPEAKER_02>Oh, I got I know what I'm talking about.
<v SPEAKER_02>But she has this infatuation with always talking about she can beat men in boxing, and she knows she can't.
<v SPEAKER_02>Like, she probably can hang with them and sparring, but it's sparring for a reason.
<v SPEAKER_02>And she just says stupid stuff.
<v SPEAKER_02>And I know I think I told her, I was like, I'm dead.
<v SPEAKER_08>You told her what?
<v SPEAKER_02>I just retweeted.
<v SPEAKER_02>I said, every day you talk, it reminds us why you chose to be around with a married man.
<v SPEAKER_08>I'm done.
<v SPEAKER_02>Like she says stupid stuff all the time.
<v SPEAKER_02>It's just like, and then people like she don't know how because she's not an ugly woman, she don't just know how to just be pretty and shut up.
<v SPEAKER_02>I know that sounds misogynistic, but in the sport that they're in, because the women don't even watch boxing like they want them to, similar to why the women don't really watch WNBA.
<v SPEAKER_02>Men are the people that really like boxing.
<v SPEAKER_02>So if you want our support, you gotta play to what makes us watch.
<v SPEAKER_02>Like if you compare her to Alicia Bumgarner, you don't really hear her saying stupid stuff about men.
<v SPEAKER_02>She knows they're fighting and she's just trying to look pretty and trying to look cute.
<v SPEAKER_02>That's what you gotta do to market yourself.
<v SPEAKER_02>But with her, she'll get mad if somebody give an opinion, and then it's not an opinion based off hate, it's an opinion like she got mad at Shannon Sharpie.
<v SPEAKER_02>He was like, She called out a boxer named Rolly Romero, and she said that she could beat him in a fight.
<v SPEAKER_02>And Shannon was like, Nah, he probably would knock you out.
<v SPEAKER_08>I'm dead.
<v SPEAKER_02>And it's like, and it said, You're very skilled, but it's just different getting hit from a man.
<v SPEAKER_02>And she was like, Well, I'll wait, I'll walk around at 180.
<v SPEAKER_02>He was like, It don't matter.
<v SPEAKER_02>He's like, This guy's probably walking around close to like 160, so he's squeezing down like a couple of pounds to make 147.
<v SPEAKER_02>He's still stronger than you.
<v SPEAKER_08>I wouldn't want to get hit in the face by a man.
<v SPEAKER_02>Man don't even want to get hit in the face by a man, so like she then she changed like sparring, but it just you know, she just does this all the time.
<v SPEAKER_02>She'll just pick a different boxer.
<v SPEAKER_02>One of the boxers, Keith Thurman said, You just go, Okay, cool.
<v SPEAKER_02>We can fight.
<v SPEAKER_02>I'll use one on one.
<v SPEAKER_02>Like, it's just a mess, man.
<v SPEAKER_02>Um, she really grinds my gears.
<v SPEAKER_08>I like Clarissa.
<v SPEAKER_02>I like her when she fights, I just don't like when she talks.
<v SPEAKER_08>She be doing, she's been doing a lot lately.
<v SPEAKER_08>I'm gonna need her to just take a chill pill.
<v SPEAKER_02>This is one I found.
<v SPEAKER_02>Uh, I want to read.
<v SPEAKER_02>Uh oh, it's a it's a page, it's on X called Tech Layout Tracker.
<v SPEAKER_02>Atlassian just confirmed 1600 layoffs with 900 plus coming from engineering.
<v SPEAKER_02>But I'm hearing the real story from inside.
<v SPEAKER_02>Sources that's been running knowledge extraction sprints for six months recording every single engineer screen, logging their pumps, documenting their debugging workflows.
<v SPEAKER_02>One architect told me that they made him walk through his entire microservices decision tree while they filmed it, called it knowledge transfer for the transition team.
<v SPEAKER_02>The transition team, 47 contractors in Bangalore with access to his recorded sessions and cloud enterprise subscription.
<v SPEAKER_02>Same architect just found out his replacement starts Monday.
<v SPEAKER_02>Guy makes$28,000 annually and ships code 47 40% faster using the exact prompt libraries they extracted.
<v SPEAKER_02>They're not just cutting headcount, they're systemizing 15 years of engineering and expertise into training data.
<v SPEAKER_02>The strategic AI focus isn't about building AI products, it's about replacing their entire engineering culture with agents trained on their senior engineers' knowledge.
<v SPEAKER_02>Word is the CTO replacement already has the playbook extract, document, offshore, automate.
<v SPEAKER_02>If you're still there and they ask you to document your processes for the team, run the knowledge extraction is complete.
<v SPEAKER_02>Interesting.
<v SPEAKER_08>I thought that was pretty I was trying to find this post.
<v SPEAKER_08>It was it was a guy who was saying that he um he got he recently had got a job and he undercut himself when they asked like the salary conversation, but it turned up being a typo or something.
<v SPEAKER_08>Like he he they couldn't believe what I'm not just talking about.
<v SPEAKER_08>I think I like it.
<v SPEAKER_02>Let me see if I like it.
<v SPEAKER_02>I know exactly what you're talking about.
<v SPEAKER_02>The guy that said 67 66,000 or something, something like that.
<v SPEAKER_03>Let me see.
<v SPEAKER_03>I think I liked it.
<v SPEAKER_08>I meant to send it to you, but it it it just it's it went away.
<v SPEAKER_02>Speaking of Raven said on uh Disney Mount Rushmore for like real TV shows just should it should be her, Hillary Duff, Sha LaBeouf, and uh my boy Lee Thomas.
<v SPEAKER_08>Who is Lee Thomas?
<v SPEAKER_02>The famous Jet Jackson.
<v SPEAKER_08>Who?
<v SPEAKER_02>The famous Jet Jackson.
<v SPEAKER_02>You don't know who the famous Jet Jackson is?
<v SPEAKER_02>You ever seen um you ever seen Friday Night Lights?
<v SPEAKER_02>With Derek Luke.
<v SPEAKER_02>It's a dude he called on that water bug.
<v SPEAKER_02>That's the famous Jet Jackson.
<v SPEAKER_02>Man, that's the show.
<v SPEAKER_02>You gotta go back and watch that.
<v SPEAKER_02>When I say the theme song slapped, let's see.
<v SPEAKER_02>I know exactly what you're talking about.
<v SPEAKER_02>I cannot find a man.
<v SPEAKER_02>It's crazy.
<v SPEAKER_08>But you know what I'm talking about.
<v SPEAKER_02>Yeah, it actually was more, it's actually like doubled his salary or something like that.
<v SPEAKER_08>Yeah.
<v SPEAKER_02>So I know exactly what you're talking about.
<v SPEAKER_02>But yeah, no, the famous Jet Jackson used to go.
<v SPEAKER_08>I feel like I'm looking at Marquise now that you don't know what this is.
<v SPEAKER_08>Let me look it up.
<v SPEAKER_02>One of your siblings should know.
<v SPEAKER_02>Or who's the oldest?
<v SPEAKER_08>Famous Jet.
<v SPEAKER_08>Is it a cartoon?
<v SPEAKER_02>No, it's a real show.
<v SPEAKER_02>The famous Jet Jackson.
<v SPEAKER_08>Oh, I do remember him.
<v SPEAKER_02>Okay.
<v SPEAKER_02>I'll give you a pass that you actually.
<v SPEAKER_08>What was he doing?
<v SPEAKER_02>He played like uh he played in a TV show, so he's it's his TV show, and he played in a TV show on the show.
<v SPEAKER_02>Uh an agent called Silverstone.
<v SPEAKER_02>He was like a special agent on the TV show inside the show.
<v SPEAKER_08>I do remember seeing his face though.
<v SPEAKER_02>Yeah, it was it's a good show.
<v SPEAKER_08>Who's your who's your childhood kid, Mount Rushmore?
<v SPEAKER_08>Like, how many people is that?
<v SPEAKER_02>First of all, it depends on it.
<v SPEAKER_02>Gotta go by network, right?
<v SPEAKER_08>Because if let's start, let's go.
<v SPEAKER_02>Because if I go, if I go Disney, I think that's about right.
<v SPEAKER_02>I think what she had is right.
<v SPEAKER_02>Those all shows watch Evan Stevens, that's all Raven, uh Lizzie McGuire, Jet Jackson.
<v SPEAKER_02>I watched them for sure.
<v SPEAKER_08>All I ate Kim Possible up and the Proud Family.
<v SPEAKER_02>Yeah, but them cartoons.
<v SPEAKER_02>I think she was just comparing people.
<v SPEAKER_02>Uh, because if that's the case, you would have to put um because you know the voice of Kim Possible was uh uh Ren on Evan Stevens.
<v SPEAKER_02>They actually got a podcast, she has a podcast.
<v SPEAKER_08>I think I've seen that.
<v SPEAKER_02>Um, so like if I go Nickelodeon, I may go all that because you got all the people, Kenny Nikale.
<v SPEAKER_08>Yo, stop right now.
<v SPEAKER_08>Have you watched that recently?
<v SPEAKER_08>Oh my god.
<v SPEAKER_08>What what the what is it?
<v SPEAKER_08>What was that?
<v SPEAKER_08>Why were we watching that?
<v SPEAKER_02>That's the times.
<v SPEAKER_08>It was it was I I literally like watched like four episodes.
<v SPEAKER_08>I was disgusted.
<v SPEAKER_02>Why?
<v SPEAKER_08>It was just disgusting, it was so stupid, it was so ignorant.
<v SPEAKER_02>It was I still like it.
<v SPEAKER_02>No, um, I gotta see, I gotta go from okay.
<v SPEAKER_02>So I'm gonna really get my Nickelodeon back.
<v SPEAKER_02>If I'm gonna go kid TV stars, I'm gonna go Keenan and Kale.
<v SPEAKER_02>I'm gonna throw Gulla Gullah Island on there.
<v SPEAKER_02>Actually, I'm gonna do this.
<v SPEAKER_02>Keenan and Kale, my brother and me, Clarissa Tells It All, and I'm probably gonna go Cousin Skeeter.
<v SPEAKER_08>Oh, Cousin Skeeter was so good.
<v SPEAKER_02>You never seen Clarissa Tells It All?
<v SPEAKER_02>No, no, no, no, no, no.
<v SPEAKER_02>Anybody who watches David Mind, my age, they remember the show.
<v SPEAKER_02>I want to say it's the same girl who played Sabrina the Teenage Witch.
<v SPEAKER_08>Was it Clarissa Tells It All?
<v SPEAKER_02>Yeah.
<v SPEAKER_08>Oh, I loved her.
<v SPEAKER_02>Yeah, I think it's her.
<v SPEAKER_02>And then like for Cartoon Network is different because it's cartoons.
<v SPEAKER_02>And then if we get to about my middle school years to high school, then I probably would go.
<v SPEAKER_02>Uh I used to like Nasty Classified School Survivor God.
<v SPEAKER_02>I liked Unfabulous, the Romeo show.
<v SPEAKER_02>And I don't know no other ones.
<v SPEAKER_08>Did we talk about?
<v SPEAKER_08>I don't know.
<v SPEAKER_08>I was talking to somebody about this.
<v SPEAKER_08>Was it you?
<v SPEAKER_08>Did you watch high school musical?
<v SPEAKER_02>No, I didn't like it.
<v SPEAKER_08>Ever.
<v SPEAKER_02>Ever.
<v SPEAKER_02>I never wanted to watch it.
<v SPEAKER_08>What?
<v SPEAKER_02>I never want to watch it.
<v SPEAKER_08>I think I was talking to somebody else about this, but I was like, like when it premiered, me and my friends were on the phone watching it on the phone.
<v SPEAKER_02>It was too cheesy for me.
<v SPEAKER_08>When it premiered, we were watching it.
<v SPEAKER_02>Yeah, it was too cheesy for me.
<v SPEAKER_02>I didn't I didn't care for it.
<v SPEAKER_08>It really is cheesy.
<v SPEAKER_02>But I think by the time high school music came out, I had to either be eighth or ninth grade.
<v SPEAKER_02>So like the last movies I watched around like them Disney movies was uh Cheetah Girls, um Go On to the Mat.
<v SPEAKER_02>Um did you watch the Eddie's Million Dollar Cook Off and Life is Rough.
<v SPEAKER_02>Like them like the last set of Disney original movies I watched.
<v SPEAKER_02>And then before that, you had Look of the Irish, Brink.
<v SPEAKER_02>Oh, that's my movie.
<v SPEAKER_08>Um Look Under the Bed.
<v SPEAKER_02>All the all the older Disney movies was good, up in the way, all the stuff.
<v SPEAKER_02>But yeah, I I didn't I didn't watch um all the other stuff.
<v SPEAKER_02>I was I think I was too old by the time I aged myself out of it.
<v SPEAKER_08>You actually ate me up on I didn't watch, I was more of a Disney kid, and when I started watching Nickelodeon, it was more cartoons.
<v SPEAKER_08>I wasn't really watching a lot of things.
<v SPEAKER_02>They had a lot of shows.
<v SPEAKER_02>Like I'm telling you, like no, I'm lying.
<v SPEAKER_08>I I ate Zoe.
<v SPEAKER_02>If so, for fun fact on uh the show My Brother and Me, Amanda Seals is the best friend of the main two brothers' sister on there.
<v SPEAKER_02>So uh her name is Dion on the show.
<v SPEAKER_02>It's actually a good show, but they couldn't let the show that show uh was too good for a sense like you had uh mom and dad married.
<v SPEAKER_02>I think the dad was a cute dog, I think the mom was a delta, had two boys and a sister.
<v SPEAKER_02>It's my it's called my brother and me.
<v SPEAKER_02>They was based out of Charlotte on the show.
<v SPEAKER_02>They couldn't let that image keep on going on.
<v SPEAKER_02>It was too positive an image for us on that show.
<v SPEAKER_08>I'm gonna have to check this out.
<v SPEAKER_08>Yeah, it's how it's good, and there was only one season.
<v SPEAKER_02>Yeah, I'm checking it.
<v SPEAKER_08>It came out the year I was born, that's why I don't know.
<v SPEAKER_02>Yeah, but they made a lot of reruns.
<v SPEAKER_02>That's how I watched it.
<v SPEAKER_02>I watched it on the reruns.
<v SPEAKER_02>I didn't watch it when it was actually out because I think it came out what 19 what 90 what?
<v SPEAKER_02>Oh, yeah, I was two, so I ain't really remember it till I was about five or six when I used to watch the reruns because it's like everybody look, anybody who watched the show, Didi was getting bullied by a bully, so they taught him how to bluff.
<v SPEAKER_02>And so he said, They said, Hey, they signed a bully counter.
<v SPEAKER_02>You say, if you so bad, hit me.
<v SPEAKER_02>And so Didi was country, he's supposed to have that that Carolina like kind of accent.
<v SPEAKER_02>So he said, Hit me, and then he gets home.
<v SPEAKER_02>They said, What happened?
<v SPEAKER_02>I got hit, but yeah, that was beefing out with some girls.
<v SPEAKER_02>It was it was funny.
<v SPEAKER_08>10 episodes, yeah.
<v SPEAKER_02>It's it's good, it's good.
<v SPEAKER_02>Um, I think it's on it might I don't even know if it's on Paramount Plus, but it might be on there, and then I had to know Gulligala Island.
<v SPEAKER_02>Uh, I'll be about having the kids watching that.
<v SPEAKER_02>I don't know if you ever watched that.
<v SPEAKER_08>I did, I definitely watched Gulliga Island.
<v SPEAKER_02>You know, the baby boy on there, he's actually an actor for real.
<v SPEAKER_08>They're actually about to start something new.
<v SPEAKER_02>I think I saw that something they're supposed to be doing a remake of my brother and me as well, but like in the vein of how Bel Air became more serious, similar to that.
<v SPEAKER_08>Cousin Skeeter was black AF.
<v SPEAKER_02>Yeah, I mean, think about the song.
<v SPEAKER_02>It was the uh that was actual a real song that they kind of just tweaked a little bit for Cousin Skeeter and Smart Guy too, yeah.
<v SPEAKER_02>But that was WB and then it started rerunning on Disney.
<v SPEAKER_02>So that's why they had the unreal mention, but it was slightly different because it won, I think it wasn't uh initially just a Disney show.
<v SPEAKER_02>I know you gave me the one escorted to Dean.
<v SPEAKER_02>I didn't watch it, so it'll be my live reaction to escorted out by the dean.
<v SPEAKER_02>Let's see.
<v SPEAKER_06>That was good.
<v SPEAKER_06>Okay, so have y'all seen the girl who said that the girl that was sitting across from her taking her nursing exam, their final nursing exam got escorted out mid-test by the dean.
<v SPEAKER_06>Yeah.
<v SPEAKER_06>So she said they taking their test right.
<v SPEAKER_06>It's the day of the test.
<v SPEAKER_06>They go in her, they're like, damn, what the dean doing here?
<v SPEAKER_06>The day of the test.
<v SPEAKER_06>So everybody taking their test.
<v SPEAKER_06>The dean walk behind the girl that's sitting across from her, right?
<v SPEAKER_06>Hey, let's let's head out type shit.
<v SPEAKER_06>So they like, this mid-test, what's going on?
<v SPEAKER_06>They hear her outside screaming outside the door, screaming.
<v SPEAKER_06>So the press and practical exam was like, hey, you know, focus on y'all's stuff.
<v SPEAKER_06>She's like, girl, how we gonna focus if somebody's out there losing their man?
<v SPEAKER_06>We need to know what's going on.
<v SPEAKER_06>Well, come to find out after they finished taking the test, they were informed that Miss Mama's had somebody wrote remote into her computer and was taking her final exam for her.
<v SPEAKER_06>And when the dean stood behind her, her mouth was moving, but her hand was in her lap.
<v SPEAKER_06>Ma'am, you went all the way through nursing school to literally play for the end result.
<v SPEAKER_06>Because that shit ain't easy.
<v SPEAKER_06>I never wanted to be a nurse, and I commend anybody who ever wanted to do this who genuinely loves that shit and not end it for the study.
<v SPEAKER_06>Because that's not some shit you play with.
<v SPEAKER_06>You deal with people like that on the daily, right?
<v SPEAKER_06>They told her she is banned from taking the inglés.
<v SPEAKER_06>You'll you'll never be a nurse now.
<v SPEAKER_06>Like you're you're done.
<v SPEAKER_06>Like you wasted schooling because you let somebody remote into the computer and take your final exam for you.
<v SPEAKER_06>And who's to say you're not good at taking tests, right?
<v SPEAKER_06>Maybe you're not good at taking tests, but you knew the information.
<v SPEAKER_06>I would have rather failed the test than been bad.
<v SPEAKER_06>Like girl.
<v SPEAKER_08>The security for that that they got in place for that, they play with somebody else.
<v SPEAKER_08>And just like she said, I just that's so spineless.
<v SPEAKER_08>It's so spineless.
<v SPEAKER_02>This is how the girl felt once she seen the dean behind her.
<v SPEAKER_02>That that's her.
<v SPEAKER_02>Hang on, that needs to be louder.
<v SPEAKER_08>I just there we go.
<v SPEAKER_08>You you gotta have a spine, you gotta have a spine, and just like she said, like, who wanna even who wanna finesse a test like that?
<v SPEAKER_08>Like she said, somebody where you're it's just too small.
<v SPEAKER_02>What was even the point, girl?
<v SPEAKER_08>Now you you're done.
<v SPEAKER_08>It's embarrassing.
<v SPEAKER_08>Your name is tarnished, you wasted all of this time going to school.
<v SPEAKER_02>Yeah, if you needed more help or you got anxiety, banned, get go get a note or something.
<v SPEAKER_02>Say you need extra notes or something.
<v SPEAKER_02>I don't even know how they said to take the test, but like, come on now.
<v SPEAKER_02>Come on now, man.
<v SPEAKER_08>The fact that they they pulled up on her and peeped game is is the cute part.
<v SPEAKER_08>Come on now, dog.
<v SPEAKER_08>Come on, man.
<v SPEAKER_02>That's how that's how I feel about her.
<v SPEAKER_02>I was like, man, I feel bad for her.
<v SPEAKER_02>I don't feel bad for her because like I don't feel bad for her, but I feel bad that you know it's excluded her from doing the NCLEX because it's like why go through clinicals because I will say I think it's still hard to go through clinicals and and do nursing just for the money, because it's hard.
<v SPEAKER_08>You gotta just like she said, you gotta like it's hard and you have to like it.
<v SPEAKER_08>But the fact that you was trying to cheat on the the biggest test, and then imagine being in the the people um that are there trying to take the test, right?
<v SPEAKER_08>And you already got a good test taker.
<v SPEAKER_08>Now you are throwing off, throwing them off too.
<v SPEAKER_08>That's what I'm saying.
<v SPEAKER_02>That's that's wow.
<v SPEAKER_02>Um I thought this was pretty cool right here.
<v SPEAKER_02>Um, we're gonna be reacting to a little bit more of her content.
<v SPEAKER_02>This lady right here.
<v SPEAKER_00>Not because anyone studied productivity patterns or human cognition.
<v SPEAKER_00>It became standard because it was administratively convenient.
<v SPEAKER_00>Everyone in the office at the same time meant easier meetings, simpler coordination, and straightforward supervision.
<v SPEAKER_00>And after World War II, the nine to five schedule became even more entrenched as suburbs expanded.
<v SPEAKER_00>The entire infrastructure of American life was built around it.
<v SPEAKER_00>Rush hour, traffic patterns, school schedules, TV programming, even when stores opened, we created a society where everything operated on the assumption that adults worked from 9 to 5.
<v SPEAKER_00>And here's where it gets absurd.
<v SPEAKER_00>We're now in an era where most knowledge work doesn't require physical presence or synchronized schedules.
<v SPEAKER_00>You can send an email at midnight and someone can still read it at 8 a.m.
<v SPEAKER_00>You can collaborate on documents asynchronously.
<v SPEAKER_00>Video calls can be recorded and watched later.
<v SPEAKER_00>Yet we're still organizing work as if we're all operating machinery that needs to be run continuously during set hours, or as if we're coordinating train schedules that require split second timing.
<v SPEAKER_02>She's right.
<v SPEAKER_02>I think, and that's the thing.
<v SPEAKER_02>I think that's one of those, if we go back to uh all the Gen Z slander we did last week.
<v SPEAKER_06>I don't think it was slander.
<v SPEAKER_02>It wasn't, but I think that's one of the things too, is like, hey, stuff has changed.
<v SPEAKER_02>Like we are working in something that was built around things that we can circumvent now that could be more accessible to everybody.
<v SPEAKER_02>And that was the beauty of remote work.
<v SPEAKER_02>It wasn't the fact that you could just be sitting in your boxes or your underwear working, it was the fact now that people from typically smaller cities that then had the allure of a bigger name city had a fighting chance at getting a job and working anywhere and doing it.
<v SPEAKER_02>I would definitely like to see since uh RTO, what's the percentage of small city people still working remote, or did they have to move?
<v SPEAKER_02>And go a step further.
<v SPEAKER_02>She's talking about nine to five.
<v SPEAKER_02>It's stuff now, and that's why I advocate for people with kids that have flexible jobs.
<v SPEAKER_02>Hey, I don't have to be sitting down all the time.
<v SPEAKER_02>Hey, I don't need to be in the office until five.
<v SPEAKER_02>I need to go get my child from school.
<v SPEAKER_02>I need to leave here about two.
<v SPEAKER_02>I'll be back online and do whatever I need to do.
<v SPEAKER_02>Flexibility.
<v SPEAKER_02>I have my laptop with me, I have my phone and push gunner shove, I can pull over whatever I need to do.
<v SPEAKER_02>That's what we're talking about.
<v SPEAKER_02>So if everybody could be more flexible, it should work.
<v SPEAKER_02>Like, I ain't gonna lie.
<v SPEAKER_02>One of the main things that I don't like about the pandemic is it killed the 24-7 Walmart.
<v SPEAKER_08>Bruh, bring them back, bring them back.
<v SPEAKER_08>Man, bring bring all stores that used to be open for 24 hours back, like for real.
<v SPEAKER_08>Bring them back.
<v SPEAKER_02>Like, I miss that.
<v SPEAKER_08>It's why not?
<v SPEAKER_08>And then think about those people who were like third shifters.
<v SPEAKER_08>Like, I know a lot of people who have kids um that are you know a little bit older, they're able to work those third shift jobs and do stuff like stocking and stuff, and that's not even a thing no more.
<v SPEAKER_08>Yeah, it's not even we will, I don't we're we're never gonna get that back at all, at all, man.
<v SPEAKER_02>It's like that eliminated a lot of stuff, just so much 24-7 stuff.
<v SPEAKER_02>Like the only thing a lot of a lot of convenience, only stuff that's really still 24-7 outs were maybe iHop and Waffle House.
<v SPEAKER_02>Yeah, and if that's they need to adjust, I need to adjust, and I also tie back into what we just said um with the geopolitical stuff.
<v SPEAKER_02>I don't for life, I don't know why every company wants to offshore to India when we've known that some of them people are inside of threats, so they take your information and give it to their country.
<v SPEAKER_02>And what be better is it's a lot of people in the US that were willing to work overnight.
<v SPEAKER_02>They would love to work overnight.
<v SPEAKER_08>For sure.
<v SPEAKER_02>Hire them.
<v SPEAKER_08>Please.
<v SPEAKER_02>I don't understand.
<v SPEAKER_02>That's why I like certain industries where they don't allow people to work overseas remote and they just have to keep everything in the US.
<v SPEAKER_02>That needs to be a regulation.
<v SPEAKER_02>I don't care how people feel about it, but at the end of the day, these people are gonna get so cheap to where it's gonna really mess up all their business because once you outsource everything, nobody's gonna have money to spend on the stuff that you're trying to make people buy anyway.
<v SPEAKER_02>So that's what I I see uh foresee happening in the near future.
<v SPEAKER_02>Um, let's see.
<v SPEAKER_02>And I thought about uh let's see.
<v SPEAKER_02>I'm trying to see which one of these.
<v SPEAKER_02>This may be for my layout people that got cases as far as a company did you wrong and either you got a service or didn't, but you need to figure out a way to make sure like you're taken care of.
<v SPEAKER_02>So let's watch this.
<v SPEAKER_04>No experience whatsoever.
<v SPEAKER_04>As you can see, I'm a black woman who had been in the role performing at a very high level.
<v SPEAKER_04>My performance reviews were either satisfactory or exceeds expectations every single year.
<v SPEAKER_04>No write-ups, no warnings, no performance issues.
<v SPEAKER_04>Then all of a sudden, he's shadowing me.
<v SPEAKER_04>They want full documentation of my job.
<v SPEAKER_04>I'm told to train him on everything, but no one could clearly explain what my role would look like after.
<v SPEAKER_04>So I said in a professional way, I'm happy to support onboarding, but I need clarity about my position before transferring my full responsibilities.
<v SPEAKER_04>And after that, I was labeled as difficult, not a team player, and put under scrutiny.
<v SPEAKER_04>Eventually, they laid me off.
<v SPEAKER_04>But here's what they didn't think about.
<v SPEAKER_04>You can't suddenly claim performance issues when years of documentation say otherwise.
<v SPEAKER_04>So I filed a discrimination claim because the optics mattered.
<v SPEAKER_04>A high performing black woman replaced by a less qualified younger white male after refusing to train him.
<v SPEAKER_04>That wasn't a coincidence.
<v SPEAKER_04>And I won.
<v SPEAKER_04>Why?
<v SPEAKER_04>Because I kept my damn records.
<v SPEAKER_04>I had my evaluations, I had my emails, I had proof that the narrative shift didn't match the history, honey.
<v SPEAKER_04>I don't know how many times I gotta tell you, but documentation protects you.
<v SPEAKER_04>And if you ever feel like you're being pushed out unfairly, especially when race or bias is involved, don't get emotional, get strategic.
<v SPEAKER_04>Keep your receipts and protect your value always, because only you are gonna look out for you at the end of the day.
<v SPEAKER_08>I'm literally looking for a case.
<v SPEAKER_02>I like that.
<v SPEAKER_02>She said, don't get emotional, get strategic.
<v SPEAKER_02>I like that because you see it happen all the time.
<v SPEAKER_02>And I tell people, I've known people who've taken their previous employer to court.
<v SPEAKER_02>Well, not court, but they've sued them and one and the company wanted to go settle out of uh court because the negative attention they could draw on it.
<v SPEAKER_02>So a lot of times they are just hoping like they have money set aside just for that.
<v SPEAKER_02>The the people who want to go the extra mile and do that, they have money set aside just for those situations.
<v SPEAKER_02>And um, yes, a lot of times like that.
<v SPEAKER_02>You want somebody to start training your um replacements and all this other stuff.
<v SPEAKER_02>And I'm I'm glad that she she ain't back down, she told them people no, because it's not right.
<v SPEAKER_02>Especially when they're not qualified.
<v SPEAKER_02>As I'm saying, this goes into again what we've been talking about the whole time.
<v SPEAKER_02>Like, honestly, we probably should name this episode underqualified.
<v SPEAKER_02>I want to see, I'm gonna see if that works.
<v SPEAKER_08>Um, I know somebody who was in this uh, I know somebody who was in this like a situation like this.
<v SPEAKER_08>She um I'm gonna keep her name out of here because she's a bad mamma jamma.
<v SPEAKER_08>But what happened was she filed a complaint with the EEOC in 2009 saying that she was being passed over for promotions that were going to uh less qualified white male coworkers, and that the EEOC issued her a right to sue letter in 2011 and she filed a federal lawsuit against them, and she won, and she kept her job, and she got promoted.
<v SPEAKER_02>How much he got from the settlement?
<v SPEAKER_08>Uh 37,500.
<v SPEAKER_02>I think I gotta double check.
<v SPEAKER_02>I gotta text my man.
<v SPEAKER_02>I wonder if I could text him right.
<v SPEAKER_02>See, he the type of person, if I text him right now, he may uh try to call me, but I'm thinking he got like, I think he got like 70 G's from his company that he sued.
<v SPEAKER_02>I think.
<v SPEAKER_02>Because they they they pretty much let him go, assuming that he either took off work or was off work to sell a house or whatever.
<v SPEAKER_02>And that wouldn't be.
<v SPEAKER_08>We were talking about that.
<v SPEAKER_08>Yeah, yeah.
<v SPEAKER_02>That wasn't the case, and they they lost bed with that one.
<v SPEAKER_02>So I was like, but that just comes from people hating on you at work.
<v SPEAKER_08>But you know how difficult it is for us as as people that look like us to get the money to secure the representation.
<v SPEAKER_08>Oh, yeah, to even understand.
<v SPEAKER_08>That's why you gotta make sure you got a case case, exactly.
<v SPEAKER_02>That's why you gotta do the ERC part.
<v SPEAKER_02>If they say it, then go for it.
<v SPEAKER_02>Yep.
<v SPEAKER_02>I'm glad you said that though.
<v SPEAKER_02>I need to.
<v SPEAKER_02>I wonder that's on the ex chat GPT, like you uh uh or Claude, you're an experienced experienced legal professional.
<v SPEAKER_02>Can you sue your company after they've given you a severance?
<v SPEAKER_02>If you still felt like you was done, you know, the wrong way.
<v SPEAKER_02>Can you sue your company what for discrimination even after receiving the severance?
<v SPEAKER_08>Claudette says most severance agreements include a release of claims, legal language where you agree to waive your right to sue the company in exchange for the severance payment.
<v SPEAKER_08>If you sign one of those, you likely gave up your right to bring discrimination claims.
<v SPEAKER_08>So the first question is always Did you sign a release and what did it cover?
<v SPEAKER_08>However, there are exceptions and circumstances where you still may have claims.
<v SPEAKER_08>If the release was signed under duress, the release was not knowing and voluntary, the release language didn't cover your specific claim, fraud or misrepresentation.
<v SPEAKER_08>The release is unconscionable What is it?
<v SPEAKER_02>Break it down.
<v SPEAKER_08>Unconscionable the second to last bullet.
<v SPEAKER_08>What does that say?
<v SPEAKER_08>Second to last bullet.
<v SPEAKER_02>Yeah.
<v SPEAKER_02>I guess it's like unconscious, unconscionable.
<v SPEAKER_02>Did I say it right?
<v SPEAKER_02>Yeah.
<v SPEAKER_02>Extremely one sided.
<v SPEAKER_02>Yeah.
<v SPEAKER_02>It's not conscious.
<v SPEAKER_08>I need some speech therapy in my life, y'all.
<v SPEAKER_08>Um, so even if you signed a release, you can generally still file a charge with the EEOC.
<v SPEAKER_02>Yeah.
<v SPEAKER_02>I think again, because like a lot of times the duress is hey, you got X amount of time to sign it.
<v SPEAKER_08>That part.
<v SPEAKER_02>So like I know in the person we was talking about, I think a couple of days ago, in their situation, they wanted some more time, but they only gave them a deadline and they kind of played ball with them a little bit, but they really couldn't do what they want to do because they gave them okay, well, you need to do it by the end, that type stuff.
<v SPEAKER_02>So um that sucks.
<v SPEAKER_02>And all this stuff is really just about layoffs.
<v SPEAKER_02>So here's another one.
<v SPEAKER_02>It's called your boss is sabotaging you.
<v SPEAKER_05>That's how you spot a boss who's trying to sabotage you.
<v SPEAKER_05>They keep shifting the goalpost.
<v SPEAKER_05>The expectations for you change every single time you meet with them.
<v SPEAKER_05>They gaslight you by rewriting history, having you wondering if you dreamt that meeting you had last week.
<v SPEAKER_05>They withhold information.
<v SPEAKER_05>You're the last person to find out the information that is meant for you to know.
<v SPEAKER_05>They block your visibility by forgetting to mention your work where it needs to be heard.
<v SPEAKER_05>Their feedback is inconsistent.
<v SPEAKER_05>You can't win because the rules keep changing.
<v SPEAKER_03>Yeah, she's right.
<v SPEAKER_03>I thought that was longer.
<v SPEAKER_03>Um last one is corporate America deserves compensation far beyond their paycheck.
<v SPEAKER_07>Because the bullshit you put up with in kill corporate America, I cannot wrap my head around it.
<v SPEAKER_07>I I don't understand it.
<v SPEAKER_07>I don't backstory.
<v SPEAKER_07>I've been an entrepreneur for a good little amount of time, and I jumped back into uh corporate America, and that was the biggest mistake I've ever made in my entire life.
<v SPEAKER_07>Corporate America is trash, okay?
<v SPEAKER_07>Trash.
<v SPEAKER_07>The the mental capacity you have to have to deal with that shit on a day-to-day blows my mind.
<v SPEAKER_02>But I want to stop it.
<v SPEAKER_02>I want to know what she does.
<v SPEAKER_02>I'm always interested when people say this what is your job and what do you do?
<v SPEAKER_02>I was just why do you feel that way?
<v SPEAKER_08>And I was just gonna say it can be the culture of the company too.
<v SPEAKER_08>Yeah, I agree that can absolutely make or break.
<v SPEAKER_07>And then the amount of money that you walk home with for the torture, who push my muffin cat back, blue baby.
<v SPEAKER_07>Because what?
<v SPEAKER_07>What?
<v SPEAKER_07>So I jumped back into corporate America because I panicked as an entrepreneur, and I don't want anybody else to do this.
<v SPEAKER_07>So learn from me.
<v SPEAKER_07>I had a business, I did very well in business.
<v SPEAKER_07>At one point, I was making$15,000 to$20,000 a month from the comfort of my home.
<v SPEAKER_07>I was waking up to six to nine hundred dollars from an online store that I had.
<v SPEAKER_07>I'll give y'all that story in a minute.
<v SPEAKER_07>But I panicked, right?
<v SPEAKER_07>They were talking about recession, recession, recession.
<v SPEAKER_07>My oldest daughter was going into her junior year high school.
<v SPEAKER_07>I said, college is coming.
<v SPEAKER_07>I can't expect dad to cover the whole thing.
<v SPEAKER_07>You know what I'm saying?
<v SPEAKER_07>Like that's that would be be unfair on my part.
<v SPEAKER_07>But they just kept saying recession.
<v SPEAKER_07>If you know anything about business, you can make$20,000 one month, and in another month, you might only make$10,000, if that, you know what I'm saying?
<v SPEAKER_07>So I panicked, and I am regretting my decision ever since.
<v SPEAKER_07>I did not trust God.
<v SPEAKER_07>He showed me that he could provide and make a way, and I didn't trust it.
<v SPEAKER_07>And that that's my own fault.
<v SPEAKER_07>But I've learned my lesson.
<v SPEAKER_02>What do you do?
<v SPEAKER_07>Get to the point.
<v SPEAKER_07>Please believe me on that.
<v SPEAKER_07>Because the things that I am being subjected to, the uh I I don't have the mental capacity for this shit every day.
<v SPEAKER_07>Like, I don't understand it.
<v SPEAKER_07>The level of arrogance, the level of incompetence, the the level of stupidity, the level of trying to like crabs in a barrel, everybody trying to beat each other out.
<v SPEAKER_07>At the end of the day, I'm just here to make my money.
<v SPEAKER_07>I don't I don't give a damn about all of that.
<v SPEAKER_07>You know what I mean?
<v SPEAKER_07>Like, I don't understand the level of racism, sexism, misogyny, like the things you are subjected to mentally in corporate America.
<v SPEAKER_07>It's a I don't understand it.
<v SPEAKER_07>I don't understand it.
<v SPEAKER_07>And I knew in college I didn't want to work a nine to five, you know what I'm saying?
<v SPEAKER_07>I knew I was gonna run my own business and be an entrepreneur.
<v SPEAKER_07>But when I say I gotta get out of here, my my mental is starting to be affected.
<v SPEAKER_07>I had a nervous breakdown at work the other day.
<v SPEAKER_07>I had a whole anxiety attack.
<v SPEAKER_07>Like, I and it was bad.
<v SPEAKER_07>It was one of the worst anxiety attacks I've ever had.
<v SPEAKER_07>I have to get out of there.
<v SPEAKER_02>All right, I still don't know she wanted what she does.
<v SPEAKER_02>So I'm gonna have to go peruse her TikTok and I want to see if I can figure that out real quick.
<v SPEAKER_02>Um, because I'm like, you didn't say anything, like you didn't say nothing with your girl the other day, you just keep on saying it's bad and it's all the same.
<v SPEAKER_08>But I mean, you can have those same experiences as an entrepreneur too.
<v SPEAKER_08>I kind of feel like a lot of the stuff that she was pinpointing about corporate America can be applied to just life in general.
<v SPEAKER_08>That's just life, that's how it is, whether you're an entrepreneur or in the corporate role.
<v SPEAKER_03>Let's see.
<v SPEAKER_02>Yeah, I mean, I'll found a video because I seen one of the other creators I uh I do share, but like, yeah, she don't implicitly say what she does.
<v SPEAKER_02>So I definitely would have to say, uh, let me see.
<v SPEAKER_02>Yeah, I would have to, okay.
<v SPEAKER_02>So she says she got her, oh she quit her job.
<v SPEAKER_02>Yeah, I don't care.
<v SPEAKER_02>Like, I don't care enough to kind of to figure out what she did, but I don't know.
<v SPEAKER_02>Um so I will say that um the climate we in now, just be diligent, especially if you're at work.
<v SPEAKER_02>Um I'm pretty sure companies will be starting to email everybody about all this stuff to be vigilant, report emails, fishing, all the yada yada yada yada stuff, just because you know the host of a striker, you know, scared everybody.
<v SPEAKER_02>And I think it's gonna have a lot of companies, whether big or small, trying to say, okay, we need to prevent this.
<v SPEAKER_02>You know, let's start doing, let's search for the ILCs and all this other stuff that you know we've seen out there.
<v SPEAKER_02>And if you even got a threat intel team, let's see what they said about our industry.
<v SPEAKER_02>And so you'll see people share secrets or or strategies with one another, but hopefully, like I said, I don't think you really can't really prepare too much for inside the threats.
<v SPEAKER_02>So that's when I'm gonna start seeing.
<v SPEAKER_02>Well, not me, but I've definitely wanna look into the research of uh demographics at the company and who they probably will be checking on, like times they log on and what they do.
<v SPEAKER_02>They're gonna be probably using like a lot of UEBA rules good now as well.
<v SPEAKER_08>Turn it on, turn it on.
<v SPEAKER_02>It should have been on, literally.
<v SPEAKER_02>It should have been on.
<v SPEAKER_08>But that's the beauty of of having an an IRM um solution in place, is because it will be able to spot a you don't ever you don't you ain't like that, you don't ever do that if it's configured properly.
<v SPEAKER_08>If it if it is configured, like I don't remember.
<v SPEAKER_08>But but but the gag is that a lot of people turn it on and then they don't like we had a dude one time, he kept on like it was odd.
<v SPEAKER_02>So we sent the to the insider team because we if one time happened, I was like, all right, cool, I'll let you slide this time.
<v SPEAKER_02>But he kept like trying to see if he could log on to the different cloud providers, and of course it was always Bop.
<v SPEAKER_02>You couldn't log into them, like personal, yeah.
<v SPEAKER_02>I was like, who what you doing?
<v SPEAKER_02>You doing a job, something?
<v SPEAKER_02>No, I'm just checking, like checking for what?
<v SPEAKER_02>So I mean, I'm pretty sure they probably asked him, but they they it kept on he kept on doing it.
<v SPEAKER_02>Um, but I think it turned out to be some type of misconfiguration and an alerting as well.
<v SPEAKER_02>But it was just odd that you know, why are you just checking every single one?
<v SPEAKER_02>So if you see something, say something.
<v SPEAKER_02>Um, it is what is today, it's the 15th.
<v SPEAKER_02>Yeah, so we got 15 days to my birthday.
<v SPEAKER_08>So hey, I ain't doing what we doing, being born.
<v SPEAKER_08>Oh my god.
<v SPEAKER_02>Oh no, I'm off for my birthday.
<v SPEAKER_08>You ain't gonna have a lose, then then I should.
<v SPEAKER_02>I didn't be dry.
<v SPEAKER_02>I gotta see, you know, me.
<v SPEAKER_02>First of all, the funny thing is, I think you said it too.
<v SPEAKER_08>I I literally and I just saw my TikTok.
<v SPEAKER_08>Exactly.
<v SPEAKER_08>I just saw a TikTok uh a guy who was like, My birthday is not my responsibility, that's my girls.
<v SPEAKER_08>I don't care.
<v SPEAKER_02>That and if a man wants to celebrate his birthday, they call that sassy anyway.
<v SPEAKER_02>Because they be like, Why you want to celebrate your birthday?
<v SPEAKER_08>My god, men can't do nothing.
<v SPEAKER_02>We can't, you can't do nothing, you can't.
<v SPEAKER_02>Um, but I don't know what I'm doing for.
<v SPEAKER_02>I know, like so the weekend before my birthday, my parents renew their vows.
<v SPEAKER_09>Oh, that's exciting.
<v SPEAKER_02>So I'm gonna make that be their new wedding day because they got married on my birthday when I was four.
<v SPEAKER_02>Oh, so that's need to be their name.
<v SPEAKER_02>I'm gonna if I have to stem say something, so I'm glad y'all got your own day now, so I can have mine back.
<v SPEAKER_02>Because it used to be hard.
<v SPEAKER_02>Like, happy birthday and happy anniversary.
<v SPEAKER_02>I'm like, no.
<v SPEAKER_08>Oh, so yeah, I I'm I'm saying that you should do something, but I didn't do nothing for my birthday.
<v SPEAKER_08>Not it.
<v SPEAKER_08>I mean, like with my friends, is what I'm saying.
<v SPEAKER_02>I don't know.
<v SPEAKER_02>I mean, shoot, we can come here, uh record uh pin stacks right there, bowl or something.
<v SPEAKER_02>I don't know, I'd be something like I'm I'm so such a grandpa because I kind of just be in you you acting like grandpa for sure.
<v SPEAKER_02>I'll be enjoying like calmness, peace and quiet, rest.
<v SPEAKER_02>Yeah, just just sleeping.
<v SPEAKER_02>Yeah, like I remember one time I I took off and I had went out of town.
<v SPEAKER_02>I really didn't do nothing, like people ask, hey, what'd you do?
<v SPEAKER_02>Sleep.
<v SPEAKER_02>I was so tired that I was sleeping.
<v SPEAKER_02>I've sleep until about like 12, one or two or three.
<v SPEAKER_02>Like, I was so tired.
<v SPEAKER_02>I was getting sleep that I didn't get.
<v SPEAKER_02>So that's kind of when you just always working it up, that's kind of how I go for you.
<v SPEAKER_02>So you just need like a little wellness, a little wellness, me about me about nine-day massages like two days that week or something like that.
<v SPEAKER_02>Like, none major, none major.
<v SPEAKER_02>But um, but nah man, I hope you guys enjoyed this episode.
<v SPEAKER_02>I definitely want to keep up with Iran, the Salesforce stuff, it'll probably tear off.
<v SPEAKER_02>But the AI psychosis one, I think we're gonna see more of that.
<v SPEAKER_02>And and like I said, it's gonna be just like the gun control.
<v SPEAKER_02>We need AI control.
<v SPEAKER_02>Everybody's gonna be saying AI control, but is it on AI or is it the people?
<v SPEAKER_02>Like, like they say, guns don't kill people.
<v SPEAKER_08>Guns kill people, they can only do so much.
<v SPEAKER_08>I mean, there could absolutely be some restrictions put in to stop violent, but unsafe.
<v SPEAKER_02>If you told me to go run on the street, am I gonna do it just because you told me to?
<v SPEAKER_02>No, but AI will exactly, but that'll mean I have to do it because somebody told me to do it, free will.
<v SPEAKER_02>So these people just aren't well, and they need, like I said, it's gonna be some wearable tech because yeah, mark my work.
<v SPEAKER_02>If y'all watching this right now, y'all want to work together on some some wearable tech and also want to work on parameters for for kids' AI safety guardwheels.
<v SPEAKER_08>Like, what am I thinking of Isaiah?
<v SPEAKER_02>Losing Isaiah?
<v SPEAKER_08>No, Isaiah.
<v SPEAKER_02>Isaiah who uh uh Andy from Detroit.
<v SPEAKER_08>Am I making up his name?
<v SPEAKER_02>You making up a name right now.
<v SPEAKER_02>You're thinking about Xavier.
<v SPEAKER_02>You got him in Isaiah.
<v SPEAKER_08>But that sounds like something like that he would like the wearable piece that he'd be into.
<v SPEAKER_02>He might.
<v SPEAKER_02>I need to hit him up on that.
<v SPEAKER_02>I know some other stuff, like, and you know what's funny?
<v SPEAKER_02>I'm screaming at calling him Isaiah, and we hadn't even gotten to the other piece, and it's not talked about enough.
<v SPEAKER_02>I think we need to start covering covering it.
<v SPEAKER_02>Uh augmented reality.
<v SPEAKER_08>Oh, I love it.
<v SPEAKER_08>I'm here for it.
<v SPEAKER_08>So, yeah, you know I love it.
<v SPEAKER_02>My guy Rex, eventually, we probably have Rex on.
<v SPEAKER_02>Rex makes the glasses for that.
<v SPEAKER_02>So, like, you'll upload his videos of hey, me DJing with his glasses on, and he's putting out records and stuff.
<v SPEAKER_02>Just imagine now you go from AI to AR, and now you got kids looking at stuff they ain't supposed to look at directly in their glasses, and then it starts being like that dark mirror stuff.
<v SPEAKER_02>That's all I'm saying.
<v SPEAKER_02>That's all I'm gonna say.
<v SPEAKER_02>Um, hang on, let me do this because since it's time to what you call it, you know, when it's when it's time to go.
<v SPEAKER_02>Um, that's not it.
<v SPEAKER_02>It's this one.
<v SPEAKER_08>You gotta turn it up.
<v SPEAKER_08>I'm really dead.
<v SPEAKER_02>But yeah, man, I appreciate everybody.
<v SPEAKER_02>Glad that y'all um was rocking with us.
<v SPEAKER_02>Y'all have fun, y'all be easy, and like I always say, until next time, let's stay textual and we out.
<v SPEAKER_02>Peace.
We recommend upgrading to the latest Chrome, Firefox, Safari, or Edge.
Please check your internet connection and refresh the page. You might also try disabling any ad blockers.
You can visit our support center if you're having problems.