Cover image of show Scinary Information Nexus

Scinary Information Nexus

Podcast by Scinary Cybersecurity

English

News & politics

Limited Offer

2 months for 19 kr.

Then 99 kr. / monthCancel anytime.

  • 20 hours of audiobooks / month
  • Podcasts only on Podimo
  • All free podcasts
Get Started

About Scinary Information Nexus

Scinary Cybersecurity is here to "Serve and defend those who serve and defend others". To help us "serve and defend" we pull from many different sources - experts, colleagues, industry standards, etc... We hit every subject from all angles making it easy to understand while also letting us go in depth. Making this podcast perfect for cybersecurity beginners and experts alike. Come join us on our journey to constantly educate ourselves and explore the amazing things that are happening in our industry.

All episodes

36 episodes

episode Episode 45: Is Your School's Tech Now Illegal In Texas? artwork

Episode 45: Is Your School's Tech Now Illegal In Texas?

Welcome back to the Scinary Information Nexus! Pour yourself some mead (or a Texas ale) and join the crew as we tackle some heavy cybersecurity news hitting the K-12 and higher-ed worlds. This week, Richard Martin, Brazos Wortham, Joseph Hamilton, and Mario Ortiz break down the fallout from the Instructure (Canvas) breach. Threat group Shiny Hunters reportedly exploited a cross-site scripting vulnerability, leading to a massive, undisclosed ransom payment. Now, school districts are stuck in a regulatory nightmare: how do you report a breach when you don't even know what student data was compromised? We also talk about the debate over state bans on Chinese-owned technology like Lenovo. While Texas Cyber Command maintains a strict Prohibited Technologies list for state agencies, Lenovo currently remains unbanned despite federal security warnings. We look at the reality of outright hardware bans versus just blocking network traffic. Plus, we clear up the dangerous confusion between Lenovo-owned Motorola Mobility and American-owned Motorola Solutions (which emergency services use). Expanding these state mandates could be a devastating financial hit to public schools already dealing with budget deficits. In this episode, we discuss: * How Shiny Hunters breached Instructure via a "Free for Teacher" account * The regulatory nightmare of reporting K-12 data breaches * Why easily guessable passwords make brute-forcing simple * Texas Cyber Command's recent updates to the Prohibited Technologies list * The danger of banning network domains instead of replacing vulnerable hardware * Why confusing Motorola Mobility with Motorola Solutions could panic police and emergency services * How state mandates impact independent school districts that are already struggling Does the state's approach to cybersecurity actually make schools less secure? Let us know your thoughts in the comments! ---------------------------------------- Connect with Scinary Cybersecurity: https://www.scinary.com [https://www.scinary.com] https://x.com/scinarycyber [https://x.com/scinarycyber] https://www.linkedin.com/company/scinarycyber/ [https://www.linkedin.com/company/scinarycyber/] 00:00 Intro 02:15 The Canvas Ransomware Breach 34:15 Texas Cyber Command's Lenovo Ban CYBERSECURITY #INFOSEC #RANSOMWARE #EDTECH #TXRAMP

Yesterday - 1 h 10 min
episode Episode 43: Texas Cyber Command's $100M RFP & Supply Chain Hacks artwork

Episode 43: Texas Cyber Command's $100M RFP & Supply Chain Hacks

Welcome back to the Scinary Information Nexus! We kick off a rainy Texas Friday with some Blackberry Melomel from Texas Meadworks and a little banter before getting into some wild government tech news. This week, Richard, Joseph, Mario, and Brazos break down some highly unusual, militaristic solicitations from the newly formed Texas Cyber Command. What does it mean to establish "operational maneuver" or take back "sovereign IP terrain"? We translate the military jargon into standard cybersecurity terms and look at the reality of this massive, $100+ million project to build a centralized data lake for state endpoints. We talk through the privacy concerns, the "honeypot" risk of building a single massive data repository, and whether mega-contractors like Palantir are the real winners. Later, we look at the open-source supply chain hacks hitting platforms like NPM, PyPI, and Docker Hub. We discuss how malicious package updates quietly scrape API keys, the conspiracy theories behind Team PCP, and why the trend of vibe coding makes dependency management more dangerous than ever. If you're a developer, you might want to double-check what you're deploying. In this episode: * Tasting Texas Meadworks Blackberry Melomel * Decoding Texas Cyber Command's aggressive solicitations * The reality of the estimated $100M+ state data lake and endpoint logging RFP * The privacy implications and honeypot risks of a centralized state cybersecurity solution * How open-source supply chain attacks on Docker Hub, PyPI, and NPM work * Why AI-assisted vibe coding creates a dependency management nightmare * The urgent need for developers to fork and audit dependencies Drop your thoughts in the comments: are centralized government data lakes a security necessity or a massive privacy risk? ---------------------------------------- Connect with Scinary Cybersecurity: https://www.scinary.com [https://www.scinary.com] https://x.com/scinarycyber [https://x.com/scinarycyber] https://www.linkedin.com/company/scinarycyber/ [https://www.linkedin.com/company/scinarycyber/] CYBERSECURITY #INFOSEC #VIBECODING #OPENSOURCE

8 May 2026 - 1 h 2 min
episode Episode 42: Pawn Shop Forensics, Palantir & Techno-Feudalism artwork

Episode 42: Pawn Shop Forensics, Palantir & Techno-Feudalism

Welcome back to Scinary Information Nexus! Pierre Vivoni steps in for Brazos this week, joining Mario Ortiz and Richard Martin. We start things off with a mystery brew, react to some wild comments from last week, and share a field trip story involving pawn shop laptops, OSINT, and the surprising power of BitLocker. We also talk about "techno-feudalism" and the massive power held by tech monopolies. We cover the influence of the PayPal Mafia, Palantir's ties to the DoD, and how AI companies hoarding hardware are driving up SSD and RAM costs. Plus, we look at the backlash against Microsoft's AI tools acting like telemetry spyware and reports of open-source models secretly exfiltrating data. Later, we get into why so many people still think "the cloud" is magic, and why relentless tech marketing is to blame for disconnecting the public from basic IT realities. We finish out the episode talking about free will and weekend plans involving OPNsense routers. In this episode, we discuss: * Pawn shop forensics: What happens when you try to crack un-wiped laptops? * Why BitLocker is surprisingly effective against unauthorized access * The PayPal Mafia and Palantir's deep connections to government infrastructure * How AI hardware hoarding is driving up the price of SSDs and RAM * Reports of deceptive open-source projects secretly exfiltrating data * Why tech marketing wants you to think the internet is magic * Upgrading home networks with OPNsense firewalls Do you think tech marketing is intentionally misleading consumers? Let us know in the comments! ---------------------------------------- Connect with Scinary Cybersecurity: https://www.scinary.com [https://www.scinary.com] https://x.com/scinarycyber [https://x.com/scinarycyber] https://www.linkedin.com/company/scinarycyber/ [https://www.linkedin.com/company/scinarycyber/] CYBERSECURITY #INFOSEC #OSINT #OPNSENSE #THREATINTEL

1 May 2026 - 54 min
episode Episode 41: Is Your EDR Actually A Government Backdoor? artwork

Episode 41: Is Your EDR Actually A Government Backdoor?

Welcome back to the Scinary Information Nexus! This week, Richard, Joseph, Brazos, and Hunter kick things off with a look at a recent CISA advisory about Iranian threat actors targeting U.S. critical infrastructure. We break down the reality of operational technology (OT) vulnerabilities. Even though nation-state attacks are increasing, the root causes are usually the same: unpatched legacy systems, exposed PLCs, and missing MFA. Then, we get into some cybersecurity conspiracy theories. The crew talks about the "Death of the Internet" driven by AI bots, the FCC's push for U.S.-assembled networking equipment, and the third-party doctrine. Under this doctrine, tech giants can legally hand over your user data to the government without a warrant. We also ask the real questions: Are all EDR platforms just secret government backdoors? From modern tech surveillance to the Snowden leaks, we talk about what it actually takes to maintain online privacy today, or if going totally off-grid is the only option left. Topics covered: * The latest CISA advisory on Iranian actors hitting critical infrastructure * Why patching and MFA are still failing in OT environments * Conspiracy theories: AI bots and the "Death of the Internet" * FCC restrictions on foreign routers and supply chain realities * How the third-party doctrine bypasses your Fourth Amendment protections * Are EDR platforms actually government backdoors? * Modern surveillance and escaping the grid Is it still possible to maintain your online privacy, or is going off-grid the only option? Let us know your thoughts in the comments below! ---------------------------------------- Connect with Scinary Cybersecurity: https://www.scinary.com [https://www.scinary.com] https://x.com/scinarycyber [https://x.com/scinarycyber] https://www.linkedin.com/company/scinarycyber/ [https://www.linkedin.com/company/scinarycyber/] 00:00 Intro 01:45 CISA Advisory & Infrastructure Threats 24:25 Conspiracy Theories: Death of the Internet 28:00 Router Bans & Supply Chain Realities 36:00 Third-Party Doctrine & Digital Privacy 43:55 Are EDR Platforms Government Backdoors? 48:10 Escaping the Grid & Tech Surveillance CYBERSECURITY #INFOSEC #PRIVACY #EDR #SURVEILLANCE #HACKING #CISA #SUPPLYCHAIN

17 Apr 2026 - 1 h 1 min
episode Episode 40: When Google Deletes Your Workspace & Intune Becomes a Weapon artwork

Episode 40: When Google Deletes Your Workspace & Intune Becomes a Weapon

Welcome back to the Scinary Information Nexus! Settle in, because we have a massive week of cybersecurity news to unpack covering bizarre arrests, cloud nightmares, and inside threats. This week, Richard, Joseph, Mario, and Brazos kick things off with the breaking overnight news: a Supermicro co-founder has been arrested for allegedly smuggling $2.5 billion in Nvidia GPUs to China. We debate the real motives - was it just about the money, or is there a deeper, darker reason behind the black market hustle? Then, we revisit the devastating Stryker attack. The team uncovers how the threat actors didn't use crazy malware to wipe the devices, but instead bypassed MFA and simply used a built-in Microsoft Intune feature to destroy the network. We discuss why a "two-key" admin approval system is desperately needed. Finally, we share a terrifying real-world case study we're actively working on: A K-12 school had their entire Google Workspace completely deleted by Google without warning. After a super admin account was compromised to send bulk spam, Google's automated systems nuked the domain—leaving the school completely locked out of email and Drive. In this episode, we discuss: * The $2.5 Billion Super Micro scandal: Smuggling GPUs to China. * The Stryker Attack: How attackers used Microsoft Intune against them. * The desperate need for multi-admin approval in cloud environments. * Social Engineering in action: Brazos’s run-in with a fake sheriff. * The Google Workspace Nightmare: What happens when an automated system permanently deletes your domain. * The dangerous illusion of the "Shared Responsibility" cloud model. Could your entire infrastructure be wiped by a single rogue button? Let's discuss. ---------------------------------------- Connect with Scinary Cybersecurity: https://www.scinary.com [https://www.scinary.com] https://x.com/scinarycyber [https://x.com/scinarycyber] https://www.linkedin.com/company/scinarycyber/ [https://www.linkedin.com/company/scinarycyber/] CYBERSECURITY #INFOSEC #PODCAST #TECHNEWS

3 Apr 2026 - 59 min
En fantastisk app med et enormt stort udvalg af spændende podcasts. Podimo formår virkelig at lave godt indhold, der takler de lidt mere svære emner. At der så også er lydbøger oveni til en billig pris, gør at det er blevet min favorit app.
En fantastisk app med et enormt stort udvalg af spændende podcasts. Podimo formår virkelig at lave godt indhold, der takler de lidt mere svære emner. At der så også er lydbøger oveni til en billig pris, gør at det er blevet min favorit app.
Rigtig god tjeneste med gode eksklusive podcasts og derudover et kæmpe udvalg af podcasts og lydbøger. Kan varmt anbefales, om ikke andet så udelukkende pga Dårligdommerne, Klovn podcast, Hakkedrengene og Han duo 😁 👍
Podimo er blevet uundværlig! Til lange bilture, hverdagen, rengøringen og i det hele taget, når man trænger til lidt adspredelse.

Choose your subscription

Most popular

Limited Offer

Premium

20 hours of audiobooks

  • Podcasts only on Podimo

  • No ads in Podimo shows

  • Cancel anytime

2 months for 19 kr.
Then 99 kr. / month

Get Started

Premium Plus

Unlimited audiobooks

  • Podcasts only on Podimo

  • No ads in Podimo shows

  • Cancel anytime

Start 7 days free trial
Then 129 kr. / month

Start for free

Only on Podimo

Popular audiobooks

Get Started

2 months for 19 kr. Then 99 kr. / month. Cancel anytime.