<?xml version="1.0" encoding="utf-8" ?>
<rss xmlns:atom="http://www.w3.org/2005/Atom" xmlns:media="http://search.yahoo.com/mrss/" xmlns:itunes="http://www.itunes.com/dtds/podcast-1.0.dtd" xmlns:googleplay="http://www.google.com/schemas/play-podcasts/1.0" xmlns:creativeCommons="http://backend.userland.com/creativeCommonsRssModule" xmlns:content="http://purl.org/rss/1.0/modules/content/" xmlns:sy="http://purl.org/rss/1.0/modules/syndication/" xmlns:rawvoice="http://www.rawvoice.com/rawvoiceRssModule/" xmlns:podcast="https://podcastindex.org/namespace/1.0" version="2.0">
	<channel>
		<title>Security Now (Audio)</title>
		<itunes:author>TWiT</itunes:author>
		<link>https://twit.tv/shows/security-now</link>
		<generator>TWiT Feed Generator v4.10</generator>
		<docs>http://blogs.law.harvard.edu/tech/rss</docs>
		<language>en-US</language>
		<copyright>This work is licensed under a Creative Commons License - Attribution-NonCommercial-NoDerivatives 4.0 International - http://creativecommons.org/licenses/by-nc-nd/4.0/</copyright>
		<creativeCommons:license>http://creativecommons.org/licenses/by-nc-nd/4.0/</creativeCommons:license>
		<managingEditor>feedmail@twit.tv (TWiT Editors)</managingEditor>
		<webMaster>feedmail@twit.tv (TWiT Engineering)</webMaster>
		<ttl>720</ttl>
		<sy:updatePeriod>weekly</sy:updatePeriod>
		<sy:updateFrequency>1</sy:updateFrequency>
		<lastBuildDate>Tue, 21 Apr 2026 19:35:03 PDT</lastBuildDate>
		<pubDate>Tue, 21 Apr 2026 19:35:03 PDT</pubDate>
		<rawvoice:frequency>weekly</rawvoice:frequency>
		<rawvoice:location>Petaluma, CA</rawvoice:location>
		<itunes:type>episodic</itunes:type>
		<itunes:subtitle>Steve Gibson explains cybersecurity threats, hacks, vulnerabilities, and defense.</itunes:subtitle>
		<itunes:summary>Cybersecurity guru Steve Gibson joins Leo Laporte every Tuesday. Steve and Leo break down the latest cybercrime and hacking stories, offering a deep understanding of what's happening and how to protect yourself and your business. Security Now is a must listen for security professionals every week. You can join Club TWiT for $10 per month and get ad-free audio and video feeds for all our shows plus everything else the club offers...or get just this podcast ad-free for $5 per month.

New episodes every Tuesday.</itunes:summary>
		<description>Cybersecurity guru Steve Gibson joins Leo Laporte every Tuesday. Steve and Leo break down the latest cybercrime and hacking stories, offering a deep understanding of what's happening and how to protect yourself and your business. Security Now is a must listen for security professionals every week. You can join Club TWiT for $10 per month and get ad-free audio and video feeds for all our shows plus everything else the club offers...or get just this podcast ad-free for $5 per month.

New episodes every Tuesday.</description>
		<itunes:keywords>TWiT, Technology, Steve Gibson, Leo Laporte, security, spyware, malware, hacking, cyber crime, encryption</itunes:keywords>
		<rawvoice:rating tv="tv-g">tv-g</rawvoice:rating>
		<itunes:explicit>no</itunes:explicit>
		<itunes:block>no</itunes:block>
		<googleplay:block>No</googleplay:block>
		<podcast:funding url="https://twit.tv/clubtwit">Become a Club TWiT member!</podcast:funding>
		<itunes:owner>
			<itunes:name>Leo Laporte</itunes:name>
			<itunes:email>feedmail@twit.tv</itunes:email>
		</itunes:owner>
		<itunes:category text="Technology" />
		<category>Technology</category>
		<category>Security</category>
		<image>
			<title>Security Now (Audio)</title>
			<url>https://elroy.twit.tv/sites/default/files/styles/twit_album_art_2048x2048/public/images/shows/security_now/album_art/audio/sn2022_albumart_standard_2400.jpg</url>
			<link>https://twit.tv/shows/security-now</link>
		</image>
		<itunes:image href="https://elroy.twit.tv/sites/default/files/styles/twit_album_art_2048x2048/public/images/shows/security_now/album_art/audio/sn2022_albumart_standard_2400.jpg" />
		<itunes:new-feed-url>https://feeds.twit.tv/sn.xml</itunes:new-feed-url>
		<rawvoice:subscribe feed="https://feeds.twit.tv/sn.xml" itunes="https://podcasts.apple.com/us/podcast/security-now-audio/id79016499" tunein="http://tun.in/pe8vV" html="https://twit.tv/shows/security-now"></rawvoice:subscribe>
		<atom:link href="https://feeds.twit.tv/sn.xml" type="application/rss+xml" rel="self"/>
		<item>
			<title>SN 1075: Yes. Exactly. - The Zero-Day Ticking Clock</title>
			<itunes:title>Yes. Exactly. - The Zero-Day Ticking Clock</itunes:title>
			<itunes:episodeType>full</itunes:episodeType>
			<itunes:author>TWiT</itunes:author>
			<pubDate>Tue, 21 Apr 2026 19:25:44 PDT</pubDate>
			<itunes:episode>1075</itunes:episode>
			<podcast:episode>1075</podcast:episode>
			<link>https://twit.tv/shows/security-now/episodes/1075</link>
			<comments>https://twit.tv/shows/security-now/episodes/1075</comments>
			<category>Help &amp; How To</category>
			<category>Technology</category>
			<category>Security</category>
			<itunes:explicit>no</itunes:explicit>
			<itunes:subtitle>The Zero-Day Ticking Clock</itunes:subtitle>
			<itunes:keywords>Security Now, TWiT, steve gibson, Leo Laporte, AI vulnerability discovery, Mythos, Anthropic, Microsoft bugs, Windows zero days, Bug Bounty, cybersecurity, patch tuesday, Veracrypt, wireguard, driver developer accounts, recaptured domain names, adware</itunes:keywords>
			<description><![CDATA[
<p>Security leaders warn the era of AI-driven bug hunting has arrived, with Mythos uncovering hundreds of overlooked vulnerabilities in code bases as trusted as Firefox. Are defenders ready for the avalanche of exploits and the frantic race to patch?</p><ul> 
<li>A disgruntled developer discloses multiple Windows 0-days.</li> 
<li>Microsoft purchases its own bugs in massive campaign.</li> 
<li>VeraCrypt &amp; Wireshark suddenly lost their dev accounts.</li> 
<li>A serious problem with re-captured domain names.</li> 
<li>How might AI help to secure open source repositories.</li> 
<li>A listener wonders what we thought of Project Hail Mary.</li> 
<li>Cyber security professionals tell us What Mythos Means</li></ul> 
<p>Show Notes - <a href="https://www.grc.com/sn/SN-1075-Notes.pdf">https://www.grc.com/sn/SN-1075-Notes.pdf</a></p> 
<p><strong>Hosts:</strong> <a href="https://twit.tv/people/steve-gibson">Steve Gibson</a> and <a href="https://twit.tv/people/leo-laporte">Leo Laporte</a></p> 
<p>Download or subscribe to <em>Security Now</em> at <a href="https://twit.tv/shows/security-now">https://twit.tv/shows/security-now</a>.</p> 
<p>You can submit a question to <em>Security Now</em> at the <a href="https://www.grc.com/feedback.htm" target="_blank">GRC Feedback Page</a>.</p> 
<p>For 16kbps versions, transcripts, and notes (including fixes), visit Steve's site: <a href="https://www.grc.com/securitynow.htm" target="_blank">grc.com</a>, also the home of the best disk maintenance and recovery utility ever written <a href="https://www.grc.com/sr/spinrite.htm" target="_blank">Spinrite 6</a>.</p> 
<p><strong>Join Club TWiT for Ad-Free Podcasts!</strong><br /> 
Support what you love and get ad-free audio <em>and</em> video feeds, a members-only Discord, and exclusive content. Join today: <a href="https://twit.tv/clubtwit" rel="payment">https://twit.tv/clubtwit</a></p>
<p><strong>Sponsors:</strong><ul>
<li><a href="http://canary.tools/twit" target="_blank" rel="sponsored">canary.tools/twit - use code: TWIT</a></li>
<li><a href="http://joindeleteme.com/twit" target="_blank" rel="sponsored">joindeleteme.com/twit promo code TWIT</a></li>
<li><a href="http://hoxhunt.com/securitynow" target="_blank" rel="sponsored">hoxhunt.com/securitynow</a></li>
<li><a href="http://meter.com/securitynow" target="_blank" rel="sponsored">meter.com/securitynow</a></li>
<li><a href="http://zscaler.com/security" target="_blank" rel="sponsored">zscaler.com/security</a></li>
</ul></p>
]]></description>
			<itunes:summary><![CDATA[
<p>Security leaders warn the era of AI-driven bug hunting has arrived, with Mythos uncovering hundreds of overlooked vulnerabilities in code bases as trusted as Firefox. Are defenders ready for the avalanche of exploits and the frantic race to patch?</p><ul> 
<li>A disgruntled developer discloses multiple Windows 0-days.</li> 
<li>Microsoft purchases its own bugs in massive campaign.</li> 
<li>VeraCrypt &amp; Wireshark suddenly lost their dev accounts.</li> 
<li>A serious problem with re-captured domain names.</li> 
<li>How might AI help to secure open source repositories.</li> 
<li>A listener wonders what we thought of Project Hail Mary.</li> 
<li>Cyber security professionals tell us What Mythos Means</li></ul> 
<p>Show Notes - <a href="https://www.grc.com/sn/SN-1075-Notes.pdf">https://www.grc.com/sn/SN-1075-Notes.pdf</a></p> 
<p><strong>Hosts:</strong> <a href="https://twit.tv/people/steve-gibson">Steve Gibson</a> and <a href="https://twit.tv/people/leo-laporte">Leo Laporte</a></p> 
<p>Download or subscribe to <em>Security Now</em> at <a href="https://twit.tv/shows/security-now">https://twit.tv/shows/security-now</a>.</p> 
<p>You can submit a question to <em>Security Now</em> at the <a href="https://www.grc.com/feedback.htm" target="_blank">GRC Feedback Page</a>.</p> 
<p>For 16kbps versions, transcripts, and notes (including fixes), visit Steve's site: <a href="https://www.grc.com/securitynow.htm" target="_blank">grc.com</a>, also the home of the best disk maintenance and recovery utility ever written <a href="https://www.grc.com/sr/spinrite.htm" target="_blank">Spinrite 6</a>.</p> 
<p><strong>Join Club TWiT for Ad-Free Podcasts!</strong><br /> 
Support what you love and get ad-free audio <em>and</em> video feeds, a members-only Discord, and exclusive content. Join today: <a href="https://twit.tv/clubtwit" rel="payment">https://twit.tv/clubtwit</a></p>
<p><strong>Sponsors:</strong><ul>
<li><a href="http://canary.tools/twit" target="_blank" rel="sponsored">canary.tools/twit - use code: TWIT</a></li>
<li><a href="http://joindeleteme.com/twit" target="_blank" rel="sponsored">joindeleteme.com/twit promo code TWIT</a></li>
<li><a href="http://hoxhunt.com/securitynow" target="_blank" rel="sponsored">hoxhunt.com/securitynow</a></li>
<li><a href="http://meter.com/securitynow" target="_blank" rel="sponsored">meter.com/securitynow</a></li>
<li><a href="http://zscaler.com/security" target="_blank" rel="sponsored">zscaler.com/security</a></li>
</ul></p>
]]></itunes:summary>
			<content:encoded><![CDATA[
<p>Security leaders warn the era of AI-driven bug hunting has arrived, with Mythos uncovering hundreds of overlooked vulnerabilities in code bases as trusted as Firefox. Are defenders ready for the avalanche of exploits and the frantic race to patch?</p><ul> 
<li>A disgruntled developer discloses multiple Windows 0-days.</li> 
<li>Microsoft purchases its own bugs in massive campaign.</li> 
<li>VeraCrypt &amp; Wireshark suddenly lost their dev accounts.</li> 
<li>A serious problem with re-captured domain names.</li> 
<li>How might AI help to secure open source repositories.</li> 
<li>A listener wonders what we thought of Project Hail Mary.</li> 
<li>Cyber security professionals tell us What Mythos Means</li></ul> 
<p>Show Notes - <a href="https://www.grc.com/sn/SN-1075-Notes.pdf">https://www.grc.com/sn/SN-1075-Notes.pdf</a></p> 
<p><strong>Hosts:</strong> <a href="https://twit.tv/people/steve-gibson">Steve Gibson</a> and <a href="https://twit.tv/people/leo-laporte">Leo Laporte</a></p> 
<p>Download or subscribe to <em>Security Now</em> at <a href="https://twit.tv/shows/security-now">https://twit.tv/shows/security-now</a>.</p> 
<p>You can submit a question to <em>Security Now</em> at the <a href="https://www.grc.com/feedback.htm" target="_blank">GRC Feedback Page</a>.</p> 
<p>For 16kbps versions, transcripts, and notes (including fixes), visit Steve's site: <a href="https://www.grc.com/securitynow.htm" target="_blank">grc.com</a>, also the home of the best disk maintenance and recovery utility ever written <a href="https://www.grc.com/sr/spinrite.htm" target="_blank">Spinrite 6</a>.</p> 
<p><strong>Join Club TWiT for Ad-Free Podcasts!</strong><br /> 
Support what you love and get ad-free audio <em>and</em> video feeds, a members-only Discord, and exclusive content. Join today: <a href="https://twit.tv/clubtwit" rel="payment">https://twit.tv/clubtwit</a></p>
<p><strong>Sponsors:</strong><ul>
<li><a href="http://canary.tools/twit" target="_blank" rel="sponsored">canary.tools/twit - use code: TWIT</a></li>
<li><a href="http://joindeleteme.com/twit" target="_blank" rel="sponsored">joindeleteme.com/twit promo code TWIT</a></li>
<li><a href="http://hoxhunt.com/securitynow" target="_blank" rel="sponsored">hoxhunt.com/securitynow</a></li>
<li><a href="http://meter.com/securitynow" target="_blank" rel="sponsored">meter.com/securitynow</a></li>
<li><a href="http://zscaler.com/security" target="_blank" rel="sponsored">zscaler.com/security</a></li>
</ul></p>
]]></content:encoded>
			<itunes:image href="https://elroy.twit.tv/sites/default/files/styles/twit_thumb_720x405/public/images/episodes/2026/04/861071/hero/SN1075_thumbnail.jpg"/>
			<guid isPermaLink="false">https://pdst.fm/e/pscrb.fm/rss/p/mgln.ai/e/294/cdn.twit.tv/megaphone/sn_1075/ARML7816020649.mp3</guid>
			<itunes:duration>2:40:28</itunes:duration>
			<enclosure url="https://pdst.fm/e/pscrb.fm/rss/p/mgln.ai/e/294/cdn.twit.tv/megaphone/sn_1075/ARML7816020649.mp3" length="154327356" type="audio/mpeg"/>
			<media:content url="https://pdst.fm/e/pscrb.fm/rss/p/mgln.ai/e/294/cdn.twit.tv/megaphone/sn_1075/ARML7816020649.mp3" fileSize="154327356" type="audio/mpeg" medium="audio">
				<media:title type="plain">SN 1075: Yes. Exactly. - The Zero-Day Ticking Clock</media:title>
				<media:description type="plain">The Zero-Day Ticking Clock</media:description>
				<media:keywords>Security Now, TWiT, steve gibson, Leo Laporte, AI vulnerability discovery, Mythos, Anthropic, Microsoft bugs, Windows zero days, Bug Bounty, cybersecurity, patch tuesday, Veracrypt, wireguard, driver developer accounts, recaptured domain names, adware</media:keywords>
				<media:thumbnail url="https://elroy.twit.tv/sites/default/files/styles/twit_slideshow_400x300/public/images/episodes/2026/04/861071/hero/SN1075_thumbnail.jpg" width="400" height="225" />
				<media:rating scheme="urn:simple">nonadult</media:rating>
				<media:rating scheme="urn:v-chip">tv-g</media:rating>
				<media:category scheme="urn:iab:categories" label="Technology &amp; Computing">IAB19</media:category>
				<media:credit role="host">Steve Gibson</media:credit>
				<media:credit role="host">Leo Laporte</media:credit>
			</media:content>
				<podcast:person role="host" href="https://twit.tv/people/steve-gibson" img="https://elroy.twit.tv/sites/default/files/styles/twit_album_art_600x600/public/people/34/pictures/Steve_v1.jpg">Steve Gibson</podcast:person>
				<podcast:person role="host" href="https://twit.tv/people/leo-laporte" img="https://elroy.twit.tv/sites/default/files/styles/twit_album_art_600x600/public/people/21/pictures/Leo_v1.jpg">Leo Laporte</podcast:person>
		</item>
		<item>
			<title>SN 1074: What Mythos Means - Marketing or Mayhem</title>
			<itunes:title>What Mythos Means - Marketing or Mayhem</itunes:title>
			<itunes:episodeType>full</itunes:episodeType>
			<itunes:author>TWiT</itunes:author>
			<pubDate>Tue, 14 Apr 2026 19:27:43 PDT</pubDate>
			<itunes:episode>1074</itunes:episode>
			<podcast:episode>1074</podcast:episode>
			<link>https://twit.tv/shows/security-now/episodes/1074</link>
			<comments>https://twit.tv/shows/security-now/episodes/1074</comments>
			<category>Help &amp; How To</category>
			<category>Technology</category>
			<category>Security</category>
			<itunes:explicit>no</itunes:explicit>
			<itunes:subtitle>Marketing or Mayhem</itunes:subtitle>
			<podcast:transcript url="http://twit.tv/posts/tech/ai-biggest-threat-cybersecurity-ever-built" type="text/html" />
			<itunes:keywords>Security Now, TWiT, steve gibson, Leo Laporte, Claude Mythos, anthropic ai, Project Glasswing, zero-day vulnerabilities, AI cybersecurity, OpenBSD exploit, FFMPEG bug, linux kernel, FreeBSD NFS, memory safety, AI code security</itunes:keywords>
			<description><![CDATA[
<p>We may already be living through the most consequential hundred days in cyber history, and the arrival of AI that can autonomously chain zero-day vulnerabilities into working exploits means the software industry's long-standing "ship it and patch it later" era is officially over.</p> 
<p>Show Notes - <a href="https://www.grc.com/sn/SN-1074-Notes.pdf">https://www.grc.com/sn/SN-1074-Notes.pdf</a></p> 
<p><strong>Hosts:</strong> <a href="https://twit.tv/people/steve-gibson">Steve Gibson</a> and <a href="https://twit.tv/people/leo-laporte">Leo Laporte</a></p> 
<p>Download or subscribe to <em>Security Now</em> at <a href="https://twit.tv/shows/security-now">https://twit.tv/shows/security-now</a>.</p> 
<p>You can submit a question to <em>Security Now</em> at the <a href="https://www.grc.com/feedback.htm" target="_blank">GRC Feedback Page</a>.</p> 
<p>For 16kbps versions, transcripts, and notes (including fixes), visit Steve's site: <a href="https://www.grc.com/securitynow.htm" target="_blank">grc.com</a>, also the home of the best disk maintenance and recovery utility ever written <a href="https://www.grc.com/sr/spinrite.htm" target="_blank">Spinrite 6</a>.</p> 
<p><strong>Join Club TWiT for Ad-Free Podcasts!</strong><br /> 
Support what you love and get ad-free audio <em>and</em> video feeds, a members-only Discord, and exclusive content. Join today: <a href="https://twit.tv/clubtwit" rel="payment">https://twit.tv/clubtwit</a></p>
<p><strong>Sponsors:</strong><ul>
<li><a href="http://guardsquare.com" target="_blank" rel="sponsored">guardsquare.com</a></li>
<li><a href="http://hoxhunt.com/securitynow" target="_blank" rel="sponsored">hoxhunt.com/securitynow</a></li>
<li><a href="http://zscaler.com/security" target="_blank" rel="sponsored">zscaler.com/security</a></li>
</ul></p>
]]></description>
			<itunes:summary><![CDATA[
<p>We may already be living through the most consequential hundred days in cyber history, and the arrival of AI that can autonomously chain zero-day vulnerabilities into working exploits means the software industry's long-standing "ship it and patch it later" era is officially over.</p> 
<p>Show Notes - <a href="https://www.grc.com/sn/SN-1074-Notes.pdf">https://www.grc.com/sn/SN-1074-Notes.pdf</a></p> 
<p><strong>Hosts:</strong> <a href="https://twit.tv/people/steve-gibson">Steve Gibson</a> and <a href="https://twit.tv/people/leo-laporte">Leo Laporte</a></p> 
<p>Download or subscribe to <em>Security Now</em> at <a href="https://twit.tv/shows/security-now">https://twit.tv/shows/security-now</a>.</p> 
<p>You can submit a question to <em>Security Now</em> at the <a href="https://www.grc.com/feedback.htm" target="_blank">GRC Feedback Page</a>.</p> 
<p>For 16kbps versions, transcripts, and notes (including fixes), visit Steve's site: <a href="https://www.grc.com/securitynow.htm" target="_blank">grc.com</a>, also the home of the best disk maintenance and recovery utility ever written <a href="https://www.grc.com/sr/spinrite.htm" target="_blank">Spinrite 6</a>.</p> 
<p><strong>Join Club TWiT for Ad-Free Podcasts!</strong><br /> 
Support what you love and get ad-free audio <em>and</em> video feeds, a members-only Discord, and exclusive content. Join today: <a href="https://twit.tv/clubtwit" rel="payment">https://twit.tv/clubtwit</a></p>
<p><strong>Sponsors:</strong><ul>
<li><a href="http://guardsquare.com" target="_blank" rel="sponsored">guardsquare.com</a></li>
<li><a href="http://hoxhunt.com/securitynow" target="_blank" rel="sponsored">hoxhunt.com/securitynow</a></li>
<li><a href="http://zscaler.com/security" target="_blank" rel="sponsored">zscaler.com/security</a></li>
</ul></p>
]]></itunes:summary>
			<content:encoded><![CDATA[
<p>We may already be living through the most consequential hundred days in cyber history, and the arrival of AI that can autonomously chain zero-day vulnerabilities into working exploits means the software industry's long-standing "ship it and patch it later" era is officially over.</p> 
<p>Show Notes - <a href="https://www.grc.com/sn/SN-1074-Notes.pdf">https://www.grc.com/sn/SN-1074-Notes.pdf</a></p> 
<p><strong>Hosts:</strong> <a href="https://twit.tv/people/steve-gibson">Steve Gibson</a> and <a href="https://twit.tv/people/leo-laporte">Leo Laporte</a></p> 
<p>Download or subscribe to <em>Security Now</em> at <a href="https://twit.tv/shows/security-now">https://twit.tv/shows/security-now</a>.</p> 
<p>You can submit a question to <em>Security Now</em> at the <a href="https://www.grc.com/feedback.htm" target="_blank">GRC Feedback Page</a>.</p> 
<p>For 16kbps versions, transcripts, and notes (including fixes), visit Steve's site: <a href="https://www.grc.com/securitynow.htm" target="_blank">grc.com</a>, also the home of the best disk maintenance and recovery utility ever written <a href="https://www.grc.com/sr/spinrite.htm" target="_blank">Spinrite 6</a>.</p> 
<p><strong>Join Club TWiT for Ad-Free Podcasts!</strong><br /> 
Support what you love and get ad-free audio <em>and</em> video feeds, a members-only Discord, and exclusive content. Join today: <a href="https://twit.tv/clubtwit" rel="payment">https://twit.tv/clubtwit</a></p>
<p><strong>Sponsors:</strong><ul>
<li><a href="http://guardsquare.com" target="_blank" rel="sponsored">guardsquare.com</a></li>
<li><a href="http://hoxhunt.com/securitynow" target="_blank" rel="sponsored">hoxhunt.com/securitynow</a></li>
<li><a href="http://zscaler.com/security" target="_blank" rel="sponsored">zscaler.com/security</a></li>
</ul></p>
]]></content:encoded>
			<itunes:image href="https://elroy.twit.tv/sites/default/files/styles/twit_thumb_720x405/public/images/episodes/2026/04/860967/hero/SN1073_thumbnail.jpg"/>
			<guid isPermaLink="false">https://pdst.fm/e/pscrb.fm/rss/p/mgln.ai/e/294/cdn.twit.tv/megaphone/sn_1074/ARML7217675741.mp3</guid>
			<itunes:duration>2:51:16</itunes:duration>
			<enclosure url="https://pdst.fm/e/pscrb.fm/rss/p/mgln.ai/e/294/cdn.twit.tv/megaphone/sn_1074/ARML7217675741.mp3" length="164595068" type="audio/mpeg"/>
			<media:content url="https://pdst.fm/e/pscrb.fm/rss/p/mgln.ai/e/294/cdn.twit.tv/megaphone/sn_1074/ARML7217675741.mp3" fileSize="164595068" type="audio/mpeg" medium="audio">
				<media:title type="plain">SN 1074: What Mythos Means - Marketing or Mayhem</media:title>
				<media:description type="plain">Marketing or Mayhem</media:description>
				<media:keywords>Security Now, TWiT, steve gibson, Leo Laporte, Claude Mythos, anthropic ai, Project Glasswing, zero-day vulnerabilities, AI cybersecurity, OpenBSD exploit, FFMPEG bug, linux kernel, FreeBSD NFS, memory safety, AI code security</media:keywords>
				<media:thumbnail url="https://elroy.twit.tv/sites/default/files/styles/twit_slideshow_400x300/public/images/episodes/2026/04/860967/hero/SN1073_thumbnail.jpg" width="400" height="225" />
				<media:rating scheme="urn:simple">nonadult</media:rating>
				<media:rating scheme="urn:v-chip">tv-g</media:rating>
				<media:category scheme="urn:iab:categories" label="Technology &amp; Computing">IAB19</media:category>
				<media:credit role="host">Steve Gibson</media:credit>
				<media:credit role="host">Leo Laporte</media:credit>
			</media:content>
				<podcast:person role="host" href="https://twit.tv/people/steve-gibson" img="https://elroy.twit.tv/sites/default/files/styles/twit_album_art_600x600/public/people/34/pictures/Steve_v1.jpg">Steve Gibson</podcast:person>
				<podcast:person role="host" href="https://twit.tv/people/leo-laporte" img="https://elroy.twit.tv/sites/default/files/styles/twit_album_art_600x600/public/people/21/pictures/Leo_v1.jpg">Leo Laporte</podcast:person>
		</item>
		<item>
			<title>SN 1073: The FCC Bans New Consumer Routers - LinkedIn's JavaScript Bombshell</title>
			<itunes:title>The FCC Bans New Consumer Routers - LinkedIn's JavaScript Bombshell</itunes:title>
			<itunes:episodeType>full</itunes:episodeType>
			<itunes:author>TWiT</itunes:author>
			<pubDate>Tue, 07 Apr 2026 19:38:55 PDT</pubDate>
			<itunes:episode>1073</itunes:episode>
			<podcast:episode>1073</podcast:episode>
			<link>https://twit.tv/shows/security-now/episodes/1073</link>
			<comments>https://twit.tv/shows/security-now/episodes/1073</comments>
			<category>Help &amp; How To</category>
			<category>Technology</category>
			<category>Security</category>
			<itunes:explicit>no</itunes:explicit>
			<itunes:subtitle>LinkedIn's JavaScript Bombshell</itunes:subtitle>
			<podcast:transcript url="http://twit.tv/posts/tech/fcc-router-ban-what-us-consumers-need-know-about-surprising-new-regulation" type="text/html" />
			<itunes:keywords>Security Now, TWiT, steve gibson, Leo Laporte, FCC router ban, consumer routers, LinkedIn Browser Gate, privacy invading JavaScript, supply chain attacks, Trivi vulnerability scanner, Cisco source code breach, age verification Apple 26.4</itunes:keywords>
			<description><![CDATA[
<p>The FCC has banned all new consumer routers made outside the US, leaving networks stuck with aging, insecure hardware while blocking innovation. Find out why this sweeping move is raising eyebrows and lawsuits—and why it makes zero sense for cybersecurity.</p><ul> 
<li>Apple's 26.4 age queries catches many by surprise.</li> 
<li>LinkedIn's 2.7 MB of privacy-invading javascript.</li> 
<li>Microsoft starts forcing Win11 24H2 to 25H2.</li> 
<li>Cisco loses source code to the Trivy supply-chain mess.</li> 
<li>Proton introduces privacy-first voice and video "Meet."</li> 
<li>GitHub to fix lagging security of its Actions feature.</li> 
<li>Cloudflare reaffirms the privacy of its 1.1.1.1 DNS.</li> 
<li>Cloudflare uses AI to re-code better secure Wordpress.</li> 
<li>The FCC drops a ban on all new consumer-grade routers.</li></ul> 
<p>Show Notes - <a href="https://www.grc.com/sn/SN-1073-Notes.pdf">https://www.grc.com/sn/SN-1073-Notes.pdf</a></p> 
<p><strong>Hosts:</strong> <a href="https://twit.tv/people/steve-gibson">Steve Gibson</a> and <a href="https://twit.tv/people/leo-laporte">Leo Laporte</a></p> 
<p>Download or subscribe to <em>Security Now</em> at <a href="https://twit.tv/shows/security-now">https://twit.tv/shows/security-now</a>.</p> 
<p>You can submit a question to <em>Security Now</em> at the <a href="https://www.grc.com/feedback.htm" target="_blank">GRC Feedback Page</a>.</p> 
<p>For 16kbps versions, transcripts, and notes (including fixes), visit Steve's site: <a href="https://www.grc.com/securitynow.htm" target="_blank">grc.com</a>, also the home of the best disk maintenance and recovery utility ever written <a href="https://www.grc.com/sr/spinrite.htm" target="_blank">Spinrite 6</a>.</p> 
<p><strong>Join Club TWiT for Ad-Free Podcasts!</strong><br /> 
Support what you love and get ad-free audio <em>and</em> video feeds, a members-only Discord, and exclusive content. Join today: <a href="https://twit.tv/clubtwit" rel="payment">https://twit.tv/clubtwit</a></p>
<p><strong>Sponsors:</strong><ul>
<li><a href="http://meter.com/securitynow" target="_blank" rel="sponsored">meter.com/securitynow</a></li>
<li><a href="http://zscaler.com/security" target="_blank" rel="sponsored">zscaler.com/security</a></li>
<li><a href="https://material.security" target="_blank" rel="sponsored">material.security</a></li>
<li><a href="http://bitwarden.com/twit" target="_blank" rel="sponsored">bitwarden.com/twit</a></li>
<li><a href="http://hoxhunt.com/securitynow" target="_blank" rel="sponsored">hoxhunt.com/securitynow</a></li>
</ul></p>
]]></description>
			<itunes:summary><![CDATA[
<p>The FCC has banned all new consumer routers made outside the US, leaving networks stuck with aging, insecure hardware while blocking innovation. Find out why this sweeping move is raising eyebrows and lawsuits—and why it makes zero sense for cybersecurity.</p><ul> 
<li>Apple's 26.4 age queries catches many by surprise.</li> 
<li>LinkedIn's 2.7 MB of privacy-invading javascript.</li> 
<li>Microsoft starts forcing Win11 24H2 to 25H2.</li> 
<li>Cisco loses source code to the Trivy supply-chain mess.</li> 
<li>Proton introduces privacy-first voice and video "Meet."</li> 
<li>GitHub to fix lagging security of its Actions feature.</li> 
<li>Cloudflare reaffirms the privacy of its 1.1.1.1 DNS.</li> 
<li>Cloudflare uses AI to re-code better secure Wordpress.</li> 
<li>The FCC drops a ban on all new consumer-grade routers.</li></ul> 
<p>Show Notes - <a href="https://www.grc.com/sn/SN-1073-Notes.pdf">https://www.grc.com/sn/SN-1073-Notes.pdf</a></p> 
<p><strong>Hosts:</strong> <a href="https://twit.tv/people/steve-gibson">Steve Gibson</a> and <a href="https://twit.tv/people/leo-laporte">Leo Laporte</a></p> 
<p>Download or subscribe to <em>Security Now</em> at <a href="https://twit.tv/shows/security-now">https://twit.tv/shows/security-now</a>.</p> 
<p>You can submit a question to <em>Security Now</em> at the <a href="https://www.grc.com/feedback.htm" target="_blank">GRC Feedback Page</a>.</p> 
<p>For 16kbps versions, transcripts, and notes (including fixes), visit Steve's site: <a href="https://www.grc.com/securitynow.htm" target="_blank">grc.com</a>, also the home of the best disk maintenance and recovery utility ever written <a href="https://www.grc.com/sr/spinrite.htm" target="_blank">Spinrite 6</a>.</p> 
<p><strong>Join Club TWiT for Ad-Free Podcasts!</strong><br /> 
Support what you love and get ad-free audio <em>and</em> video feeds, a members-only Discord, and exclusive content. Join today: <a href="https://twit.tv/clubtwit" rel="payment">https://twit.tv/clubtwit</a></p>
<p><strong>Sponsors:</strong><ul>
<li><a href="http://meter.com/securitynow" target="_blank" rel="sponsored">meter.com/securitynow</a></li>
<li><a href="http://zscaler.com/security" target="_blank" rel="sponsored">zscaler.com/security</a></li>
<li><a href="https://material.security" target="_blank" rel="sponsored">material.security</a></li>
<li><a href="http://bitwarden.com/twit" target="_blank" rel="sponsored">bitwarden.com/twit</a></li>
<li><a href="http://hoxhunt.com/securitynow" target="_blank" rel="sponsored">hoxhunt.com/securitynow</a></li>
</ul></p>
]]></itunes:summary>
			<content:encoded><![CDATA[
<p>The FCC has banned all new consumer routers made outside the US, leaving networks stuck with aging, insecure hardware while blocking innovation. Find out why this sweeping move is raising eyebrows and lawsuits—and why it makes zero sense for cybersecurity.</p><ul> 
<li>Apple's 26.4 age queries catches many by surprise.</li> 
<li>LinkedIn's 2.7 MB of privacy-invading javascript.</li> 
<li>Microsoft starts forcing Win11 24H2 to 25H2.</li> 
<li>Cisco loses source code to the Trivy supply-chain mess.</li> 
<li>Proton introduces privacy-first voice and video "Meet."</li> 
<li>GitHub to fix lagging security of its Actions feature.</li> 
<li>Cloudflare reaffirms the privacy of its 1.1.1.1 DNS.</li> 
<li>Cloudflare uses AI to re-code better secure Wordpress.</li> 
<li>The FCC drops a ban on all new consumer-grade routers.</li></ul> 
<p>Show Notes - <a href="https://www.grc.com/sn/SN-1073-Notes.pdf">https://www.grc.com/sn/SN-1073-Notes.pdf</a></p> 
<p><strong>Hosts:</strong> <a href="https://twit.tv/people/steve-gibson">Steve Gibson</a> and <a href="https://twit.tv/people/leo-laporte">Leo Laporte</a></p> 
<p>Download or subscribe to <em>Security Now</em> at <a href="https://twit.tv/shows/security-now">https://twit.tv/shows/security-now</a>.</p> 
<p>You can submit a question to <em>Security Now</em> at the <a href="https://www.grc.com/feedback.htm" target="_blank">GRC Feedback Page</a>.</p> 
<p>For 16kbps versions, transcripts, and notes (including fixes), visit Steve's site: <a href="https://www.grc.com/securitynow.htm" target="_blank">grc.com</a>, also the home of the best disk maintenance and recovery utility ever written <a href="https://www.grc.com/sr/spinrite.htm" target="_blank">Spinrite 6</a>.</p> 
<p><strong>Join Club TWiT for Ad-Free Podcasts!</strong><br /> 
Support what you love and get ad-free audio <em>and</em> video feeds, a members-only Discord, and exclusive content. Join today: <a href="https://twit.tv/clubtwit" rel="payment">https://twit.tv/clubtwit</a></p>
<p><strong>Sponsors:</strong><ul>
<li><a href="http://meter.com/securitynow" target="_blank" rel="sponsored">meter.com/securitynow</a></li>
<li><a href="http://zscaler.com/security" target="_blank" rel="sponsored">zscaler.com/security</a></li>
<li><a href="https://material.security" target="_blank" rel="sponsored">material.security</a></li>
<li><a href="http://bitwarden.com/twit" target="_blank" rel="sponsored">bitwarden.com/twit</a></li>
<li><a href="http://hoxhunt.com/securitynow" target="_blank" rel="sponsored">hoxhunt.com/securitynow</a></li>
</ul></p>
]]></content:encoded>
			<itunes:image href="https://elroy.twit.tv/sites/default/files/styles/twit_thumb_720x405/public/images/episodes/2026/04/860879/hero/SN1073_thumbnail.jpg"/>
			<guid isPermaLink="false">https://pdst.fm/e/pscrb.fm/rss/p/mgln.ai/e/294/cdn.twit.tv/megaphone/sn_1073/ARML1930818750.mp3</guid>
			<itunes:duration>2:52:15</itunes:duration>
			<enclosure url="https://pdst.fm/e/pscrb.fm/rss/p/mgln.ai/e/294/cdn.twit.tv/megaphone/sn_1073/ARML1930818750.mp3" length="165596067" type="audio/mpeg"/>
			<media:content url="https://pdst.fm/e/pscrb.fm/rss/p/mgln.ai/e/294/cdn.twit.tv/megaphone/sn_1073/ARML1930818750.mp3" fileSize="165596067" type="audio/mpeg" medium="audio">
				<media:title type="plain">SN 1073: The FCC Bans New Consumer Routers - LinkedIn's JavaScript Bombshell</media:title>
				<media:description type="plain">LinkedIn's JavaScript Bombshell</media:description>
				<media:keywords>Security Now, TWiT, steve gibson, Leo Laporte, FCC router ban, consumer routers, LinkedIn Browser Gate, privacy invading JavaScript, supply chain attacks, Trivi vulnerability scanner, Cisco source code breach, age verification Apple 26.4</media:keywords>
				<media:thumbnail url="https://elroy.twit.tv/sites/default/files/styles/twit_slideshow_400x300/public/images/episodes/2026/04/860879/hero/SN1073_thumbnail.jpg" width="400" height="225" />
				<media:rating scheme="urn:simple">nonadult</media:rating>
				<media:rating scheme="urn:v-chip">tv-g</media:rating>
				<media:category scheme="urn:iab:categories" label="Technology &amp; Computing">IAB19</media:category>
				<media:credit role="host">Steve Gibson</media:credit>
				<media:credit role="host">Leo Laporte</media:credit>
			</media:content>
				<podcast:person role="host" href="https://twit.tv/people/steve-gibson" img="https://elroy.twit.tv/sites/default/files/styles/twit_album_art_600x600/public/people/34/pictures/Steve_v1.jpg">Steve Gibson</podcast:person>
				<podcast:person role="host" href="https://twit.tv/people/leo-laporte" img="https://elroy.twit.tv/sites/default/files/styles/twit_album_art_600x600/public/people/21/pictures/Leo_v1.jpg">Leo Laporte</podcast:person>
		</item>
		<item>
			<title>SN 1072: LiteLLM - Click Fix Attacks Surge</title>
			<itunes:title>LiteLLM - Click Fix Attacks Surge</itunes:title>
			<itunes:episodeType>full</itunes:episodeType>
			<itunes:author>TWiT</itunes:author>
			<pubDate>Tue, 31 Mar 2026 19:23:56 PDT</pubDate>
			<itunes:episode>1072</itunes:episode>
			<podcast:episode>1072</podcast:episode>
			<link>https://twit.tv/shows/security-now/episodes/1072</link>
			<comments>https://twit.tv/shows/security-now/episodes/1072</comments>
			<category>Help &amp; How To</category>
			<category>Technology</category>
			<category>Security</category>
			<itunes:explicit>no</itunes:explicit>
			<itunes:subtitle>Click Fix Attacks Surge</itunes:subtitle>
			<podcast:transcript url="http://twit.tv/posts/tech/can-open-source-dependencies-be-trusted-inside-litellm-malware-scare" type="text/html" />
			<itunes:keywords>Security Now, TWiT, steve gibson, Leo Laporte, Light LLM exploit, PYPI malware, supply chain attack, AI security, age verification law California, Linux age verification, Apple Click Fix vulnerability, quantum computing, NCSC Vibe coding, SaaS disruption,</itunes:keywords>
			<description><![CDATA[
<p>An explosive supply chain hack in Light LLM nearly unleashed catastrophic malware across millions of AI systems, and it took a coder's quick thinking to catch it before it snowballed into disaster.</p><ul> 
<li>Will California require Linux to verify its user's age.</li> 
<li>Apple's iOS 26.4 requires UK users to prove their age.</li> 
<li>Russia chooses to use home grown 5G mobile encryption.</li> 
<li>Ukraine knew the webcam was installed by Russian spies.</li> 
<li>Google moves quantum computing "Q Day" to 2029.</li> 
<li>At RSA, UK's NCSC CEO warns of vibe-coded SaaS replacements.</li> 
<li>More information about nasty ClickFix campaigns.</li> 
<li>More than one in seven Reddit postings are an AI-bot.</li> 
<li>The story behind the LiteLLM disaster that was averted.</li></ul> 
<p>Show Notes - <a href="https://www.grc.com/sn/SN-1072-Notes.pdf">https://www.grc.com/sn/SN-1072-Notes.pdf</a></p> 
<p><strong>Hosts:</strong> <a href="https://twit.tv/people/steve-gibson">Steve Gibson</a> and <a href="https://twit.tv/people/leo-laporte">Leo Laporte</a></p> 
<p>Download or subscribe to <em>Security Now</em> at <a href="https://twit.tv/shows/security-now">https://twit.tv/shows/security-now</a>.</p> 
<p>You can submit a question to <em>Security Now</em> at the <a href="https://www.grc.com/feedback.htm" target="_blank">GRC Feedback Page</a>.</p> 
<p>For 16kbps versions, transcripts, and notes (including fixes), visit Steve's site: <a href="https://www.grc.com/securitynow.htm" target="_blank">grc.com</a>, also the home of the best disk maintenance and recovery utility ever written <a href="https://www.grc.com/sr/spinrite.htm" target="_blank">Spinrite 6</a>.</p> 
<p><strong>Join Club TWiT for Ad-Free Podcasts!</strong><br /> 
Support what you love and get ad-free audio <em>and</em> video feeds, a members-only Discord, and exclusive content. Join today: <a href="https://twit.tv/clubtwit" rel="payment">https://twit.tv/clubtwit</a></p>
<p><strong>Sponsors:</strong><ul>
<li><a href="http://threatlocker.com/twit" target="_blank" rel="sponsored">threatlocker.com/twit</a></li>
<li><a href="https://www.adaptivesecurity.com/?utm_source=podcast&utm_medium=other&utm_campaign=2026_NA_Podcast_security_now&utm_id=701Rd00000d9YqPIAU" target="_blank" rel="sponsored">adaptivesecurity.com</a></li>
<li><a href="http://guardsquare.com" target="_blank" rel="sponsored">guardsquare.com</a></li>
<li><a href="http://meter.com/securitynow" target="_blank" rel="sponsored">meter.com/securitynow</a></li>
</ul></p>
]]></description>
			<itunes:summary><![CDATA[
<p>An explosive supply chain hack in Light LLM nearly unleashed catastrophic malware across millions of AI systems, and it took a coder's quick thinking to catch it before it snowballed into disaster.</p><ul> 
<li>Will California require Linux to verify its user's age.</li> 
<li>Apple's iOS 26.4 requires UK users to prove their age.</li> 
<li>Russia chooses to use home grown 5G mobile encryption.</li> 
<li>Ukraine knew the webcam was installed by Russian spies.</li> 
<li>Google moves quantum computing "Q Day" to 2029.</li> 
<li>At RSA, UK's NCSC CEO warns of vibe-coded SaaS replacements.</li> 
<li>More information about nasty ClickFix campaigns.</li> 
<li>More than one in seven Reddit postings are an AI-bot.</li> 
<li>The story behind the LiteLLM disaster that was averted.</li></ul> 
<p>Show Notes - <a href="https://www.grc.com/sn/SN-1072-Notes.pdf">https://www.grc.com/sn/SN-1072-Notes.pdf</a></p> 
<p><strong>Hosts:</strong> <a href="https://twit.tv/people/steve-gibson">Steve Gibson</a> and <a href="https://twit.tv/people/leo-laporte">Leo Laporte</a></p> 
<p>Download or subscribe to <em>Security Now</em> at <a href="https://twit.tv/shows/security-now">https://twit.tv/shows/security-now</a>.</p> 
<p>You can submit a question to <em>Security Now</em> at the <a href="https://www.grc.com/feedback.htm" target="_blank">GRC Feedback Page</a>.</p> 
<p>For 16kbps versions, transcripts, and notes (including fixes), visit Steve's site: <a href="https://www.grc.com/securitynow.htm" target="_blank">grc.com</a>, also the home of the best disk maintenance and recovery utility ever written <a href="https://www.grc.com/sr/spinrite.htm" target="_blank">Spinrite 6</a>.</p> 
<p><strong>Join Club TWiT for Ad-Free Podcasts!</strong><br /> 
Support what you love and get ad-free audio <em>and</em> video feeds, a members-only Discord, and exclusive content. Join today: <a href="https://twit.tv/clubtwit" rel="payment">https://twit.tv/clubtwit</a></p>
<p><strong>Sponsors:</strong><ul>
<li><a href="http://threatlocker.com/twit" target="_blank" rel="sponsored">threatlocker.com/twit</a></li>
<li><a href="https://www.adaptivesecurity.com/?utm_source=podcast&utm_medium=other&utm_campaign=2026_NA_Podcast_security_now&utm_id=701Rd00000d9YqPIAU" target="_blank" rel="sponsored">adaptivesecurity.com</a></li>
<li><a href="http://guardsquare.com" target="_blank" rel="sponsored">guardsquare.com</a></li>
<li><a href="http://meter.com/securitynow" target="_blank" rel="sponsored">meter.com/securitynow</a></li>
</ul></p>
]]></itunes:summary>
			<content:encoded><![CDATA[
<p>An explosive supply chain hack in Light LLM nearly unleashed catastrophic malware across millions of AI systems, and it took a coder's quick thinking to catch it before it snowballed into disaster.</p><ul> 
<li>Will California require Linux to verify its user's age.</li> 
<li>Apple's iOS 26.4 requires UK users to prove their age.</li> 
<li>Russia chooses to use home grown 5G mobile encryption.</li> 
<li>Ukraine knew the webcam was installed by Russian spies.</li> 
<li>Google moves quantum computing "Q Day" to 2029.</li> 
<li>At RSA, UK's NCSC CEO warns of vibe-coded SaaS replacements.</li> 
<li>More information about nasty ClickFix campaigns.</li> 
<li>More than one in seven Reddit postings are an AI-bot.</li> 
<li>The story behind the LiteLLM disaster that was averted.</li></ul> 
<p>Show Notes - <a href="https://www.grc.com/sn/SN-1072-Notes.pdf">https://www.grc.com/sn/SN-1072-Notes.pdf</a></p> 
<p><strong>Hosts:</strong> <a href="https://twit.tv/people/steve-gibson">Steve Gibson</a> and <a href="https://twit.tv/people/leo-laporte">Leo Laporte</a></p> 
<p>Download or subscribe to <em>Security Now</em> at <a href="https://twit.tv/shows/security-now">https://twit.tv/shows/security-now</a>.</p> 
<p>You can submit a question to <em>Security Now</em> at the <a href="https://www.grc.com/feedback.htm" target="_blank">GRC Feedback Page</a>.</p> 
<p>For 16kbps versions, transcripts, and notes (including fixes), visit Steve's site: <a href="https://www.grc.com/securitynow.htm" target="_blank">grc.com</a>, also the home of the best disk maintenance and recovery utility ever written <a href="https://www.grc.com/sr/spinrite.htm" target="_blank">Spinrite 6</a>.</p> 
<p><strong>Join Club TWiT for Ad-Free Podcasts!</strong><br /> 
Support what you love and get ad-free audio <em>and</em> video feeds, a members-only Discord, and exclusive content. Join today: <a href="https://twit.tv/clubtwit" rel="payment">https://twit.tv/clubtwit</a></p>
<p><strong>Sponsors:</strong><ul>
<li><a href="http://threatlocker.com/twit" target="_blank" rel="sponsored">threatlocker.com/twit</a></li>
<li><a href="https://www.adaptivesecurity.com/?utm_source=podcast&utm_medium=other&utm_campaign=2026_NA_Podcast_security_now&utm_id=701Rd00000d9YqPIAU" target="_blank" rel="sponsored">adaptivesecurity.com</a></li>
<li><a href="http://guardsquare.com" target="_blank" rel="sponsored">guardsquare.com</a></li>
<li><a href="http://meter.com/securitynow" target="_blank" rel="sponsored">meter.com/securitynow</a></li>
</ul></p>
]]></content:encoded>
			<itunes:image href="https://elroy.twit.tv/sites/default/files/styles/twit_thumb_720x405/public/images/episodes/2026/03/860787/hero/SN1072_thumbnail.jpg"/>
			<guid isPermaLink="false">https://pdst.fm/e/pscrb.fm/rss/p/mgln.ai/e/294/cdn.twit.tv/megaphone/sn_1072/ARML2290772744.mp3</guid>
			<itunes:duration>2:49:00</itunes:duration>
			<enclosure url="https://pdst.fm/e/pscrb.fm/rss/p/mgln.ai/e/294/cdn.twit.tv/megaphone/sn_1072/ARML2290772744.mp3" length="162452974" type="audio/mpeg"/>
			<media:content url="https://pdst.fm/e/pscrb.fm/rss/p/mgln.ai/e/294/cdn.twit.tv/megaphone/sn_1072/ARML2290772744.mp3" fileSize="162452974" type="audio/mpeg" medium="audio">
				<media:title type="plain">SN 1072: LiteLLM - Click Fix Attacks Surge</media:title>
				<media:description type="plain">Click Fix Attacks Surge</media:description>
				<media:keywords>Security Now, TWiT, steve gibson, Leo Laporte, Light LLM exploit, PYPI malware, supply chain attack, AI security, age verification law California, Linux age verification, Apple Click Fix vulnerability, quantum computing, NCSC Vibe coding, SaaS disruption,</media:keywords>
				<media:thumbnail url="https://elroy.twit.tv/sites/default/files/styles/twit_slideshow_400x300/public/images/episodes/2026/03/860787/hero/SN1072_thumbnail.jpg" width="400" height="225" />
				<media:rating scheme="urn:simple">nonadult</media:rating>
				<media:rating scheme="urn:v-chip">tv-g</media:rating>
				<media:category scheme="urn:iab:categories" label="Technology &amp; Computing">IAB19</media:category>
				<media:credit role="host">Steve Gibson</media:credit>
				<media:credit role="host">Leo Laporte</media:credit>
			</media:content>
				<podcast:person role="host" href="https://twit.tv/people/steve-gibson" img="https://elroy.twit.tv/sites/default/files/styles/twit_album_art_600x600/public/people/34/pictures/Steve_v1.jpg">Steve Gibson</podcast:person>
				<podcast:person role="host" href="https://twit.tv/people/leo-laporte" img="https://elroy.twit.tv/sites/default/files/styles/twit_album_art_600x600/public/people/21/pictures/Leo_v1.jpg">Leo Laporte</podcast:person>
		</item>
		<item>
			<title>SN 1071: Bucketsquatting - Meta and TikTok's Tracking Pixels</title>
			<itunes:title>Bucketsquatting - Meta and TikTok's Tracking Pixels</itunes:title>
			<itunes:episodeType>full</itunes:episodeType>
			<itunes:author>TWiT</itunes:author>
			<pubDate>Tue, 24 Mar 2026 17:59:59 PDT</pubDate>
			<itunes:episode>1071</itunes:episode>
			<podcast:episode>1071</podcast:episode>
			<link>https://twit.tv/shows/security-now/episodes/1071</link>
			<comments>https://twit.tv/shows/security-now/episodes/1071</comments>
			<category>Help &amp; How To</category>
			<category>Technology</category>
			<category>Security</category>
			<itunes:explicit>no</itunes:explicit>
			<itunes:subtitle>Meta and TikTok's Tracking Pixels</itunes:subtitle>
			<podcast:transcript url="http://twit.tv/posts/tech/hr-blocks-tax-prep-blunder-what-you-must-know-about-2025-certificate-vulnerability" type="text/html" />
			<itunes:keywords>Security Now, TWiT, steve gibson, Leo Laporte, H&amp;R Block tax software vulnerability, root certificate authority, WKATX Server Host 2024, private key exposure, browser trusted root store, man-in-the-middle attacks, breathalyzer cyberattack, Intoxalock,</itunes:keywords>
			<description><![CDATA[
<p>When convenience trumps caution, disaster waits in the wings. Join Steve Gibson and Mikah Sargent as they break down the jaw-dropping oversights lurking in mission-critical tax and cloud tools, and examine how a single unchecked decision can upend internet security for years.</p><ul> 
<li>H&amp;R Block's tax software does something SO WRONG.</li> 
<li>The Intoxalock breathalyzer calibration cyber attack.</li> 
<li>Firefox now offers a 100% free built-in VPN.</li> 
<li>TikTok and Meta's tracking pixels are so much more.</li> 
<li>Russians beg for the return of Telegram, WhatsApps and others.</li> 
<li>Never connect your crypto-wallet to an unknown service.</li> 
<li>What would a week be without a Cisco CVSS of 10.0.</li> 
<li>Ubiquiti patches a 10.0 critical flaw.</li> 
<li>Listener feedback and...</li> 
<li>What's "Bucketsquatting" and what can be done to prevent it</li></ul> 
<p>Show Notes - <a href="https://www.grc.com/sn/SN-1071-Notes.pdf">https://www.grc.com/sn/SN-1071-Notes.pdf</a></p> 
<p><strong>Hosts:</strong> <a href="https://twit.tv/people/steve-gibson">Steve Gibson</a> and <a href="https://twit.tv/people/mikah-sargent">Mikah Sargent</a></p> 
<p>Download or subscribe to <em>Security Now</em> at <a href="https://twit.tv/shows/security-now">https://twit.tv/shows/security-now</a>.</p> 
<p>You can submit a question to <em>Security Now</em> at the <a href="https://www.grc.com/feedback.htm" target="_blank">GRC Feedback Page</a>.</p> 
<p>For 16kbps versions, transcripts, and notes (including fixes), visit Steve's site: <a href="https://www.grc.com/securitynow.htm" target="_blank">grc.com</a>, also the home of the best disk maintenance and recovery utility ever written <a href="https://www.grc.com/sr/spinrite.htm" target="_blank">Spinrite 6</a>.</p> 
<p><strong>Join Club TWiT for Ad-Free Podcasts!</strong><br /> 
Support what you love and get ad-free audio <em>and</em> video feeds, a members-only Discord, and exclusive content. Join today: <a href="https://twit.tv/clubtwit" rel="payment">https://twit.tv/clubtwit</a></p>
<p><strong>Sponsors:</strong><ul>
<li><a href="http://hoxhunt.com/securitynow" target="_blank" rel="sponsored">hoxhunt.com/securitynow</a></li>
<li><a href="http://guardsquare.com" target="_blank" rel="sponsored">guardsquare.com</a></li>
<li><a href="http://outsystems.com/twit" target="_blank" rel="sponsored">outsystems.com/twit</a></li>
<li><a href="http://zscaler.com/security" target="_blank" rel="sponsored">zscaler.com/security</a></li>
</ul></p>
]]></description>
			<itunes:summary><![CDATA[
<p>When convenience trumps caution, disaster waits in the wings. Join Steve Gibson and Mikah Sargent as they break down the jaw-dropping oversights lurking in mission-critical tax and cloud tools, and examine how a single unchecked decision can upend internet security for years.</p><ul> 
<li>H&amp;R Block's tax software does something SO WRONG.</li> 
<li>The Intoxalock breathalyzer calibration cyber attack.</li> 
<li>Firefox now offers a 100% free built-in VPN.</li> 
<li>TikTok and Meta's tracking pixels are so much more.</li> 
<li>Russians beg for the return of Telegram, WhatsApps and others.</li> 
<li>Never connect your crypto-wallet to an unknown service.</li> 
<li>What would a week be without a Cisco CVSS of 10.0.</li> 
<li>Ubiquiti patches a 10.0 critical flaw.</li> 
<li>Listener feedback and...</li> 
<li>What's "Bucketsquatting" and what can be done to prevent it</li></ul> 
<p>Show Notes - <a href="https://www.grc.com/sn/SN-1071-Notes.pdf">https://www.grc.com/sn/SN-1071-Notes.pdf</a></p> 
<p><strong>Hosts:</strong> <a href="https://twit.tv/people/steve-gibson">Steve Gibson</a> and <a href="https://twit.tv/people/mikah-sargent">Mikah Sargent</a></p> 
<p>Download or subscribe to <em>Security Now</em> at <a href="https://twit.tv/shows/security-now">https://twit.tv/shows/security-now</a>.</p> 
<p>You can submit a question to <em>Security Now</em> at the <a href="https://www.grc.com/feedback.htm" target="_blank">GRC Feedback Page</a>.</p> 
<p>For 16kbps versions, transcripts, and notes (including fixes), visit Steve's site: <a href="https://www.grc.com/securitynow.htm" target="_blank">grc.com</a>, also the home of the best disk maintenance and recovery utility ever written <a href="https://www.grc.com/sr/spinrite.htm" target="_blank">Spinrite 6</a>.</p> 
<p><strong>Join Club TWiT for Ad-Free Podcasts!</strong><br /> 
Support what you love and get ad-free audio <em>and</em> video feeds, a members-only Discord, and exclusive content. Join today: <a href="https://twit.tv/clubtwit" rel="payment">https://twit.tv/clubtwit</a></p>
<p><strong>Sponsors:</strong><ul>
<li><a href="http://hoxhunt.com/securitynow" target="_blank" rel="sponsored">hoxhunt.com/securitynow</a></li>
<li><a href="http://guardsquare.com" target="_blank" rel="sponsored">guardsquare.com</a></li>
<li><a href="http://outsystems.com/twit" target="_blank" rel="sponsored">outsystems.com/twit</a></li>
<li><a href="http://zscaler.com/security" target="_blank" rel="sponsored">zscaler.com/security</a></li>
</ul></p>
]]></itunes:summary>
			<content:encoded><![CDATA[
<p>When convenience trumps caution, disaster waits in the wings. Join Steve Gibson and Mikah Sargent as they break down the jaw-dropping oversights lurking in mission-critical tax and cloud tools, and examine how a single unchecked decision can upend internet security for years.</p><ul> 
<li>H&amp;R Block's tax software does something SO WRONG.</li> 
<li>The Intoxalock breathalyzer calibration cyber attack.</li> 
<li>Firefox now offers a 100% free built-in VPN.</li> 
<li>TikTok and Meta's tracking pixels are so much more.</li> 
<li>Russians beg for the return of Telegram, WhatsApps and others.</li> 
<li>Never connect your crypto-wallet to an unknown service.</li> 
<li>What would a week be without a Cisco CVSS of 10.0.</li> 
<li>Ubiquiti patches a 10.0 critical flaw.</li> 
<li>Listener feedback and...</li> 
<li>What's "Bucketsquatting" and what can be done to prevent it</li></ul> 
<p>Show Notes - <a href="https://www.grc.com/sn/SN-1071-Notes.pdf">https://www.grc.com/sn/SN-1071-Notes.pdf</a></p> 
<p><strong>Hosts:</strong> <a href="https://twit.tv/people/steve-gibson">Steve Gibson</a> and <a href="https://twit.tv/people/mikah-sargent">Mikah Sargent</a></p> 
<p>Download or subscribe to <em>Security Now</em> at <a href="https://twit.tv/shows/security-now">https://twit.tv/shows/security-now</a>.</p> 
<p>You can submit a question to <em>Security Now</em> at the <a href="https://www.grc.com/feedback.htm" target="_blank">GRC Feedback Page</a>.</p> 
<p>For 16kbps versions, transcripts, and notes (including fixes), visit Steve's site: <a href="https://www.grc.com/securitynow.htm" target="_blank">grc.com</a>, also the home of the best disk maintenance and recovery utility ever written <a href="https://www.grc.com/sr/spinrite.htm" target="_blank">Spinrite 6</a>.</p> 
<p><strong>Join Club TWiT for Ad-Free Podcasts!</strong><br /> 
Support what you love and get ad-free audio <em>and</em> video feeds, a members-only Discord, and exclusive content. Join today: <a href="https://twit.tv/clubtwit" rel="payment">https://twit.tv/clubtwit</a></p>
<p><strong>Sponsors:</strong><ul>
<li><a href="http://hoxhunt.com/securitynow" target="_blank" rel="sponsored">hoxhunt.com/securitynow</a></li>
<li><a href="http://guardsquare.com" target="_blank" rel="sponsored">guardsquare.com</a></li>
<li><a href="http://outsystems.com/twit" target="_blank" rel="sponsored">outsystems.com/twit</a></li>
<li><a href="http://zscaler.com/security" target="_blank" rel="sponsored">zscaler.com/security</a></li>
</ul></p>
]]></content:encoded>
			<itunes:image href="https://elroy.twit.tv/sites/default/files/styles/twit_thumb_720x405/public/images/episodes/2026/03/860665/hero/SN1071_thumbnail.jpg"/>
			<guid isPermaLink="false">https://pdst.fm/e/pscrb.fm/rss/p/mgln.ai/e/294/cdn.twit.tv/megaphone/sn_1071/ARML7831777533.mp3</guid>
			<itunes:duration>2:47:44</itunes:duration>
			<enclosure url="https://pdst.fm/e/pscrb.fm/rss/p/mgln.ai/e/294/cdn.twit.tv/megaphone/sn_1071/ARML7831777533.mp3" length="161114901" type="audio/mpeg"/>
			<media:content url="https://pdst.fm/e/pscrb.fm/rss/p/mgln.ai/e/294/cdn.twit.tv/megaphone/sn_1071/ARML7831777533.mp3" fileSize="161114901" type="audio/mpeg" medium="audio">
				<media:title type="plain">SN 1071: Bucketsquatting - Meta and TikTok's Tracking Pixels</media:title>
				<media:description type="plain">Meta and TikTok's Tracking Pixels</media:description>
				<media:keywords>Security Now, TWiT, steve gibson, Leo Laporte, H&amp;R Block tax software vulnerability, root certificate authority, WKATX Server Host 2024, private key exposure, browser trusted root store, man-in-the-middle attacks, breathalyzer cyberattack, Intoxalock,</media:keywords>
				<media:thumbnail url="https://elroy.twit.tv/sites/default/files/styles/twit_slideshow_400x300/public/images/episodes/2026/03/860665/hero/SN1071_thumbnail.jpg" width="400" height="225" />
				<media:rating scheme="urn:simple">nonadult</media:rating>
				<media:rating scheme="urn:v-chip">tv-g</media:rating>
				<media:category scheme="urn:iab:categories" label="Technology &amp; Computing">IAB19</media:category>
				<media:credit role="host">Steve Gibson</media:credit>
				<media:credit role="host">Mikah Sargent</media:credit>
			</media:content>
				<podcast:person role="host" href="https://twit.tv/people/steve-gibson" img="https://elroy.twit.tv/sites/default/files/styles/twit_album_art_600x600/public/people/34/pictures/Steve_v1.jpg">Steve Gibson</podcast:person>
				<podcast:person role="host" href="https://twit.tv/people/mikah-sargent" img="https://elroy.twit.tv/sites/default/files/styles/twit_album_art_600x600/public/people/346331/pictures/img_5919.png">Mikah Sargent</podcast:person>
		</item>
		<item>
			<title>SN 1070: CISA's Free Internet Scanning - Malware Disguised as a VPN</title>
			<itunes:title>CISA's Free Internet Scanning - Malware Disguised as a VPN</itunes:title>
			<itunes:episodeType>full</itunes:episodeType>
			<itunes:author>TWiT</itunes:author>
			<pubDate>Tue, 17 Mar 2026 19:22:21 PDT</pubDate>
			<itunes:episode>1070</itunes:episode>
			<podcast:episode>1070</podcast:episode>
			<link>https://twit.tv/shows/security-now/episodes/1070</link>
			<comments>https://twit.tv/shows/security-now/episodes/1070</comments>
			<category>Help &amp; How To</category>
			<category>Technology</category>
			<category>Security</category>
			<itunes:explicit>no</itunes:explicit>
			<itunes:subtitle>Malware Disguised as a VPN</itunes:subtitle>
			<podcast:transcript url="http://twit.tv/posts/tech/how-protect-your-business-cyber-attacks-cisas-free-scanning-service" type="text/html" />
			<itunes:keywords>Security Now, TWiT, steve gibson, Leo Laporte, CISA free internet scanning, cyber hygiene services, vulnerability scanning, web application scanning, end-to-end encryption, Meta, Instagram encryption, TikTok encryption, WhatsApp parental controls</itunes:keywords>
			<description><![CDATA[
<p>Meta quietly ditches encryption for Instagram chats while TikTok also backpedals on privacy, shaking up assumptions about how much big tech really values your secrets. Meanwhile, Steve Gibson reveals why CISA's free government security scans are an absolute must for businesses—plus what he learned when GRC took the plunge.</p><ul> 
<li>The Security Now "Caption That Photo" contest.</li> 
<li>A mega social media company says "no" to strong encryption.</li> 
<li>WhatsApp to give parents more control,</li> 
<li>Consumer bandwidth proxying is becoming a big deal.</li> 
<li>Meta buys the Moltbook duo.</li> 
<li>The EU gives up and settles upon the status quo.</li> 
<li>When a ransomware negotiation is not what it seems.</li> 
<li>CISA compels federal agencies to submit their logs.</li> 
<li>Is that a VPN in your pocket or something more malicious.</li> 
<li>Be careful what you download, thinking it's AI.</li> 
<li>A super-clever and super-simple A/V scanner bypass.</li> 
<li>Will AI write code for me?</li> 
<li>Another listener discovers the Joy of AI.</li> 
<li>Steve's CISA Internet scanning experience</li></ul> 
<p>Show Notes - <a href="https://www.grc.com/sn/SN-1070-Notes.pdf">https://www.grc.com/sn/SN-1070-Notes.pdf</a></p> 
<p><strong>Hosts:</strong> <a href="https://twit.tv/people/steve-gibson">Steve Gibson</a> and <a href="https://twit.tv/people/leo-laporte">Leo Laporte</a></p> 
<p>Download or subscribe to <em>Security Now</em> at <a href="https://twit.tv/shows/security-now">https://twit.tv/shows/security-now</a>.</p> 
<p>You can submit a question to <em>Security Now</em> at the <a href="https://www.grc.com/feedback.htm" target="_blank">GRC Feedback Page</a>.</p> 
<p>For 16kbps versions, transcripts, and notes (including fixes), visit Steve's site: <a href="https://www.grc.com/securitynow.htm" target="_blank">grc.com</a>, also the home of the best disk maintenance and recovery utility ever written <a href="https://www.grc.com/sr/spinrite.htm" target="_blank">Spinrite 6</a>.</p> 
<p><strong>Join Club TWiT for Ad-Free Podcasts!</strong><br /> 
Support what you love and get ad-free audio <em>and</em> video feeds, a members-only Discord, and exclusive content. Join today: <a href="https://twit.tv/clubtwit" rel="payment">https://twit.tv/clubtwit</a></p>
<p><strong>Sponsors:</strong><ul>
<li><a href="http://outsystems.com/twit" target="_blank" rel="sponsored">outsystems.com/twit</a></li>
<li><a href="http://joindeleteme.com/twit" target="_blank" rel="sponsored">joindeleteme.com/twit promo code TWIT</a></li>
<li><a href="https://material.security" target="_blank" rel="sponsored">material.security</a></li>
<li><a href="http://canary.tools/twit" target="_blank" rel="sponsored">canary.tools/twit - use code: TWIT</a></li>
<li><a href="https://www.adaptivesecurity.com/?utm_source=podcast&utm_medium=other&utm_campaign=2026_NA_Podcast_security_now&utm_id=701Rd00000d9YqPIAU" target="_blank" rel="sponsored">adaptivesecurity.com</a></li>
<li><a href="http://meter.com/securitynow" target="_blank" rel="sponsored">meter.com/securitynow</a></li>
</ul></p>
]]></description>
			<itunes:summary><![CDATA[
<p>Meta quietly ditches encryption for Instagram chats while TikTok also backpedals on privacy, shaking up assumptions about how much big tech really values your secrets. Meanwhile, Steve Gibson reveals why CISA's free government security scans are an absolute must for businesses—plus what he learned when GRC took the plunge.</p><ul> 
<li>The Security Now "Caption That Photo" contest.</li> 
<li>A mega social media company says "no" to strong encryption.</li> 
<li>WhatsApp to give parents more control,</li> 
<li>Consumer bandwidth proxying is becoming a big deal.</li> 
<li>Meta buys the Moltbook duo.</li> 
<li>The EU gives up and settles upon the status quo.</li> 
<li>When a ransomware negotiation is not what it seems.</li> 
<li>CISA compels federal agencies to submit their logs.</li> 
<li>Is that a VPN in your pocket or something more malicious.</li> 
<li>Be careful what you download, thinking it's AI.</li> 
<li>A super-clever and super-simple A/V scanner bypass.</li> 
<li>Will AI write code for me?</li> 
<li>Another listener discovers the Joy of AI.</li> 
<li>Steve's CISA Internet scanning experience</li></ul> 
<p>Show Notes - <a href="https://www.grc.com/sn/SN-1070-Notes.pdf">https://www.grc.com/sn/SN-1070-Notes.pdf</a></p> 
<p><strong>Hosts:</strong> <a href="https://twit.tv/people/steve-gibson">Steve Gibson</a> and <a href="https://twit.tv/people/leo-laporte">Leo Laporte</a></p> 
<p>Download or subscribe to <em>Security Now</em> at <a href="https://twit.tv/shows/security-now">https://twit.tv/shows/security-now</a>.</p> 
<p>You can submit a question to <em>Security Now</em> at the <a href="https://www.grc.com/feedback.htm" target="_blank">GRC Feedback Page</a>.</p> 
<p>For 16kbps versions, transcripts, and notes (including fixes), visit Steve's site: <a href="https://www.grc.com/securitynow.htm" target="_blank">grc.com</a>, also the home of the best disk maintenance and recovery utility ever written <a href="https://www.grc.com/sr/spinrite.htm" target="_blank">Spinrite 6</a>.</p> 
<p><strong>Join Club TWiT for Ad-Free Podcasts!</strong><br /> 
Support what you love and get ad-free audio <em>and</em> video feeds, a members-only Discord, and exclusive content. Join today: <a href="https://twit.tv/clubtwit" rel="payment">https://twit.tv/clubtwit</a></p>
<p><strong>Sponsors:</strong><ul>
<li><a href="http://outsystems.com/twit" target="_blank" rel="sponsored">outsystems.com/twit</a></li>
<li><a href="http://joindeleteme.com/twit" target="_blank" rel="sponsored">joindeleteme.com/twit promo code TWIT</a></li>
<li><a href="https://material.security" target="_blank" rel="sponsored">material.security</a></li>
<li><a href="http://canary.tools/twit" target="_blank" rel="sponsored">canary.tools/twit - use code: TWIT</a></li>
<li><a href="https://www.adaptivesecurity.com/?utm_source=podcast&utm_medium=other&utm_campaign=2026_NA_Podcast_security_now&utm_id=701Rd00000d9YqPIAU" target="_blank" rel="sponsored">adaptivesecurity.com</a></li>
<li><a href="http://meter.com/securitynow" target="_blank" rel="sponsored">meter.com/securitynow</a></li>
</ul></p>
]]></itunes:summary>
			<content:encoded><![CDATA[
<p>Meta quietly ditches encryption for Instagram chats while TikTok also backpedals on privacy, shaking up assumptions about how much big tech really values your secrets. Meanwhile, Steve Gibson reveals why CISA's free government security scans are an absolute must for businesses—plus what he learned when GRC took the plunge.</p><ul> 
<li>The Security Now "Caption That Photo" contest.</li> 
<li>A mega social media company says "no" to strong encryption.</li> 
<li>WhatsApp to give parents more control,</li> 
<li>Consumer bandwidth proxying is becoming a big deal.</li> 
<li>Meta buys the Moltbook duo.</li> 
<li>The EU gives up and settles upon the status quo.</li> 
<li>When a ransomware negotiation is not what it seems.</li> 
<li>CISA compels federal agencies to submit their logs.</li> 
<li>Is that a VPN in your pocket or something more malicious.</li> 
<li>Be careful what you download, thinking it's AI.</li> 
<li>A super-clever and super-simple A/V scanner bypass.</li> 
<li>Will AI write code for me?</li> 
<li>Another listener discovers the Joy of AI.</li> 
<li>Steve's CISA Internet scanning experience</li></ul> 
<p>Show Notes - <a href="https://www.grc.com/sn/SN-1070-Notes.pdf">https://www.grc.com/sn/SN-1070-Notes.pdf</a></p> 
<p><strong>Hosts:</strong> <a href="https://twit.tv/people/steve-gibson">Steve Gibson</a> and <a href="https://twit.tv/people/leo-laporte">Leo Laporte</a></p> 
<p>Download or subscribe to <em>Security Now</em> at <a href="https://twit.tv/shows/security-now">https://twit.tv/shows/security-now</a>.</p> 
<p>You can submit a question to <em>Security Now</em> at the <a href="https://www.grc.com/feedback.htm" target="_blank">GRC Feedback Page</a>.</p> 
<p>For 16kbps versions, transcripts, and notes (including fixes), visit Steve's site: <a href="https://www.grc.com/securitynow.htm" target="_blank">grc.com</a>, also the home of the best disk maintenance and recovery utility ever written <a href="https://www.grc.com/sr/spinrite.htm" target="_blank">Spinrite 6</a>.</p> 
<p><strong>Join Club TWiT for Ad-Free Podcasts!</strong><br /> 
Support what you love and get ad-free audio <em>and</em> video feeds, a members-only Discord, and exclusive content. Join today: <a href="https://twit.tv/clubtwit" rel="payment">https://twit.tv/clubtwit</a></p>
<p><strong>Sponsors:</strong><ul>
<li><a href="http://outsystems.com/twit" target="_blank" rel="sponsored">outsystems.com/twit</a></li>
<li><a href="http://joindeleteme.com/twit" target="_blank" rel="sponsored">joindeleteme.com/twit promo code TWIT</a></li>
<li><a href="https://material.security" target="_blank" rel="sponsored">material.security</a></li>
<li><a href="http://canary.tools/twit" target="_blank" rel="sponsored">canary.tools/twit - use code: TWIT</a></li>
<li><a href="https://www.adaptivesecurity.com/?utm_source=podcast&utm_medium=other&utm_campaign=2026_NA_Podcast_security_now&utm_id=701Rd00000d9YqPIAU" target="_blank" rel="sponsored">adaptivesecurity.com</a></li>
<li><a href="http://meter.com/securitynow" target="_blank" rel="sponsored">meter.com/securitynow</a></li>
</ul></p>
]]></content:encoded>
			<itunes:image href="https://elroy.twit.tv/sites/default/files/styles/twit_thumb_720x405/public/images/episodes/2026/03/860569/hero/SN1070_thumbnail.jpg"/>
			<guid isPermaLink="false">https://pdst.fm/e/pscrb.fm/rss/p/mgln.ai/e/294/cdn.twit.tv/megaphone/sn_1070/ARML7408701877.mp3</guid>
			<itunes:duration>2:46:12</itunes:duration>
			<enclosure url="https://pdst.fm/e/pscrb.fm/rss/p/mgln.ai/e/294/cdn.twit.tv/megaphone/sn_1070/ARML7408701877.mp3" length="159817174" type="audio/mpeg"/>
			<media:content url="https://pdst.fm/e/pscrb.fm/rss/p/mgln.ai/e/294/cdn.twit.tv/megaphone/sn_1070/ARML7408701877.mp3" fileSize="159817174" type="audio/mpeg" medium="audio">
				<media:title type="plain">SN 1070: CISA's Free Internet Scanning - Malware Disguised as a VPN</media:title>
				<media:description type="plain">Malware Disguised as a VPN</media:description>
				<media:keywords>Security Now, TWiT, steve gibson, Leo Laporte, CISA free internet scanning, cyber hygiene services, vulnerability scanning, web application scanning, end-to-end encryption, Meta, Instagram encryption, TikTok encryption, WhatsApp parental controls</media:keywords>
				<media:thumbnail url="https://elroy.twit.tv/sites/default/files/styles/twit_slideshow_400x300/public/images/episodes/2026/03/860569/hero/SN1070_thumbnail.jpg" width="400" height="225" />
				<media:rating scheme="urn:simple">nonadult</media:rating>
				<media:rating scheme="urn:v-chip">tv-g</media:rating>
				<media:category scheme="urn:iab:categories" label="Technology &amp; Computing">IAB19</media:category>
				<media:credit role="host">Steve Gibson</media:credit>
				<media:credit role="host">Leo Laporte</media:credit>
			</media:content>
				<podcast:person role="host" href="https://twit.tv/people/steve-gibson" img="https://elroy.twit.tv/sites/default/files/styles/twit_album_art_600x600/public/people/34/pictures/Steve_v1.jpg">Steve Gibson</podcast:person>
				<podcast:person role="host" href="https://twit.tv/people/leo-laporte" img="https://elroy.twit.tv/sites/default/files/styles/twit_album_art_600x600/public/people/21/pictures/Leo_v1.jpg">Leo Laporte</podcast:person>
		</item>
		<item>
			<title>SN 1069: You can't hide from LLMs - Was Your Smart TV a Stealth Proxy?</title>
			<itunes:title>You can't hide from LLMs - Was Your Smart TV a Stealth Proxy?</itunes:title>
			<itunes:episodeType>full</itunes:episodeType>
			<itunes:author>TWiT</itunes:author>
			<pubDate>Tue, 10 Mar 2026 19:10:06 PDT</pubDate>
			<itunes:episode>1069</itunes:episode>
			<podcast:episode>1069</podcast:episode>
			<link>https://twit.tv/shows/security-now/episodes/1069</link>
			<comments>https://twit.tv/shows/security-now/episodes/1069</comments>
			<category>Help &amp; How To</category>
			<category>Technology</category>
			<category>Security</category>
			<itunes:explicit>no</itunes:explicit>
			<itunes:subtitle>Was Your Smart TV a Stealth Proxy?</itunes:subtitle>
			<podcast:transcript url="http://twit.tv/posts/tech/can-ai-make-your-browser-safer-inside-groundbreaking-llm-vulnerability-hunt-firefox" type="text/html" />
			<itunes:keywords>Security Now, TWiT, steve gibson, Leo Laporte, mozilla, claude, OpenClaw, LLMs, AI security, Anthropic, Firefox vulnerabilities, zero-day vulnerabilities, code security, Ubuntu sudo, rcs encryption, TikTok encrypted messaging, Bright Data proxy</itunes:keywords>
			<description><![CDATA[
<p>Think your online alias keeps you safe? This episode reveals how advanced language models are making it trivial to de-anonymize users at scale, challenging everything we thought we knew about internet privacy.</p><ul> 
<li>Anthropic &amp; Mozilla improve Firefox's security.</li> 
<li>Apple &amp; Google begin testing cross-platform RCS encryption.</li> 
<li>Ubuntu's SUDO starts echoing asterisks.</li> 
<li>Inviting a web proxy into your home.</li> 
<li>Apple devices cleared by Germany for NATO's use.</li> 
<li>A serious remote takeover of OpenClaw.</li> 
<li>TokTok won't encrypt messaging for visibility.</li> 
<li>Microsoft bans the term "Microslop" on Discord.</li> 
<li>Lot's of great listener feedback.</li> 
<li>LLMs could make Orwell's 1984 seem optimistic.</li></ul> 
<p>Show Notes - <a href="https://www.grc.com/sn/SN-1069-Notes.pdf">https://www.grc.com/sn/SN-1069-Notes.pdf</a></p> 
<p><strong>Hosts:</strong> <a href="https://twit.tv/people/steve-gibson">Steve Gibson</a> and <a href="https://twit.tv/people/leo-laporte">Leo Laporte</a></p> 
<p>Download or subscribe to <em>Security Now</em> at <a href="https://twit.tv/shows/security-now">https://twit.tv/shows/security-now</a>.</p> 
<p>You can submit a question to <em>Security Now</em> at the <a href="https://www.grc.com/feedback.htm" target="_blank">GRC Feedback Page</a>.</p> 
<p>For 16kbps versions, transcripts, and notes (including fixes), visit Steve's site: <a href="https://www.grc.com/securitynow.htm" target="_blank">grc.com</a>, also the home of the best disk maintenance and recovery utility ever written <a href="https://www.grc.com/sr/spinrite.htm" target="_blank">Spinrite 6</a>.</p> 
<p><strong>Join Club TWiT for Ad-Free Podcasts!</strong><br /> 
Support what you love and get ad-free audio <em>and</em> video feeds, a members-only Discord, and exclusive content. Join today: <a href="https://twit.tv/clubtwit" rel="payment">https://twit.tv/clubtwit</a></p>
<p><strong>Sponsors:</strong><ul>
<li><a href="http://bitwarden.com/twit" target="_blank" rel="sponsored">bitwarden.com/twit</a></li>
<li><a href="http://zscaler.com/security" target="_blank" rel="sponsored">zscaler.com/security</a></li>
<li><a href="http://guardsquare.com" target="_blank" rel="sponsored">guardsquare.com</a></li>
<li><a href="http://hoxhunt.com/securitynow" target="_blank" rel="sponsored">hoxhunt.com/securitynow</a></li>
</ul></p>
]]></description>
			<itunes:summary><![CDATA[
<p>Think your online alias keeps you safe? This episode reveals how advanced language models are making it trivial to de-anonymize users at scale, challenging everything we thought we knew about internet privacy.</p><ul> 
<li>Anthropic &amp; Mozilla improve Firefox's security.</li> 
<li>Apple &amp; Google begin testing cross-platform RCS encryption.</li> 
<li>Ubuntu's SUDO starts echoing asterisks.</li> 
<li>Inviting a web proxy into your home.</li> 
<li>Apple devices cleared by Germany for NATO's use.</li> 
<li>A serious remote takeover of OpenClaw.</li> 
<li>TokTok won't encrypt messaging for visibility.</li> 
<li>Microsoft bans the term "Microslop" on Discord.</li> 
<li>Lot's of great listener feedback.</li> 
<li>LLMs could make Orwell's 1984 seem optimistic.</li></ul> 
<p>Show Notes - <a href="https://www.grc.com/sn/SN-1069-Notes.pdf">https://www.grc.com/sn/SN-1069-Notes.pdf</a></p> 
<p><strong>Hosts:</strong> <a href="https://twit.tv/people/steve-gibson">Steve Gibson</a> and <a href="https://twit.tv/people/leo-laporte">Leo Laporte</a></p> 
<p>Download or subscribe to <em>Security Now</em> at <a href="https://twit.tv/shows/security-now">https://twit.tv/shows/security-now</a>.</p> 
<p>You can submit a question to <em>Security Now</em> at the <a href="https://www.grc.com/feedback.htm" target="_blank">GRC Feedback Page</a>.</p> 
<p>For 16kbps versions, transcripts, and notes (including fixes), visit Steve's site: <a href="https://www.grc.com/securitynow.htm" target="_blank">grc.com</a>, also the home of the best disk maintenance and recovery utility ever written <a href="https://www.grc.com/sr/spinrite.htm" target="_blank">Spinrite 6</a>.</p> 
<p><strong>Join Club TWiT for Ad-Free Podcasts!</strong><br /> 
Support what you love and get ad-free audio <em>and</em> video feeds, a members-only Discord, and exclusive content. Join today: <a href="https://twit.tv/clubtwit" rel="payment">https://twit.tv/clubtwit</a></p>
<p><strong>Sponsors:</strong><ul>
<li><a href="http://bitwarden.com/twit" target="_blank" rel="sponsored">bitwarden.com/twit</a></li>
<li><a href="http://zscaler.com/security" target="_blank" rel="sponsored">zscaler.com/security</a></li>
<li><a href="http://guardsquare.com" target="_blank" rel="sponsored">guardsquare.com</a></li>
<li><a href="http://hoxhunt.com/securitynow" target="_blank" rel="sponsored">hoxhunt.com/securitynow</a></li>
</ul></p>
]]></itunes:summary>
			<content:encoded><![CDATA[
<p>Think your online alias keeps you safe? This episode reveals how advanced language models are making it trivial to de-anonymize users at scale, challenging everything we thought we knew about internet privacy.</p><ul> 
<li>Anthropic &amp; Mozilla improve Firefox's security.</li> 
<li>Apple &amp; Google begin testing cross-platform RCS encryption.</li> 
<li>Ubuntu's SUDO starts echoing asterisks.</li> 
<li>Inviting a web proxy into your home.</li> 
<li>Apple devices cleared by Germany for NATO's use.</li> 
<li>A serious remote takeover of OpenClaw.</li> 
<li>TokTok won't encrypt messaging for visibility.</li> 
<li>Microsoft bans the term "Microslop" on Discord.</li> 
<li>Lot's of great listener feedback.</li> 
<li>LLMs could make Orwell's 1984 seem optimistic.</li></ul> 
<p>Show Notes - <a href="https://www.grc.com/sn/SN-1069-Notes.pdf">https://www.grc.com/sn/SN-1069-Notes.pdf</a></p> 
<p><strong>Hosts:</strong> <a href="https://twit.tv/people/steve-gibson">Steve Gibson</a> and <a href="https://twit.tv/people/leo-laporte">Leo Laporte</a></p> 
<p>Download or subscribe to <em>Security Now</em> at <a href="https://twit.tv/shows/security-now">https://twit.tv/shows/security-now</a>.</p> 
<p>You can submit a question to <em>Security Now</em> at the <a href="https://www.grc.com/feedback.htm" target="_blank">GRC Feedback Page</a>.</p> 
<p>For 16kbps versions, transcripts, and notes (including fixes), visit Steve's site: <a href="https://www.grc.com/securitynow.htm" target="_blank">grc.com</a>, also the home of the best disk maintenance and recovery utility ever written <a href="https://www.grc.com/sr/spinrite.htm" target="_blank">Spinrite 6</a>.</p> 
<p><strong>Join Club TWiT for Ad-Free Podcasts!</strong><br /> 
Support what you love and get ad-free audio <em>and</em> video feeds, a members-only Discord, and exclusive content. Join today: <a href="https://twit.tv/clubtwit" rel="payment">https://twit.tv/clubtwit</a></p>
<p><strong>Sponsors:</strong><ul>
<li><a href="http://bitwarden.com/twit" target="_blank" rel="sponsored">bitwarden.com/twit</a></li>
<li><a href="http://zscaler.com/security" target="_blank" rel="sponsored">zscaler.com/security</a></li>
<li><a href="http://guardsquare.com" target="_blank" rel="sponsored">guardsquare.com</a></li>
<li><a href="http://hoxhunt.com/securitynow" target="_blank" rel="sponsored">hoxhunt.com/securitynow</a></li>
</ul></p>
]]></content:encoded>
			<itunes:image href="https://elroy.twit.tv/sites/default/files/styles/twit_thumb_720x405/public/images/episodes/2026/03/860447/hero/SN1069_thumbnail.jpg"/>
			<guid isPermaLink="false">https://pdst.fm/e/pscrb.fm/rss/p/mgln.ai/e/294/cdn.twit.tv/megaphone/sn_1069/ARML2041511297.mp3</guid>
			<itunes:duration>2:43:34</itunes:duration>
			<enclosure url="https://pdst.fm/e/pscrb.fm/rss/p/mgln.ai/e/294/cdn.twit.tv/megaphone/sn_1069/ARML2041511297.mp3" length="157252908" type="audio/mpeg"/>
			<media:content url="https://pdst.fm/e/pscrb.fm/rss/p/mgln.ai/e/294/cdn.twit.tv/megaphone/sn_1069/ARML2041511297.mp3" fileSize="157252908" type="audio/mpeg" medium="audio">
				<media:title type="plain">SN 1069: You can't hide from LLMs - Was Your Smart TV a Stealth Proxy?</media:title>
				<media:description type="plain">Was Your Smart TV a Stealth Proxy?</media:description>
				<media:keywords>Security Now, TWiT, steve gibson, Leo Laporte, mozilla, claude, OpenClaw, LLMs, AI security, Anthropic, Firefox vulnerabilities, zero-day vulnerabilities, code security, Ubuntu sudo, rcs encryption, TikTok encrypted messaging, Bright Data proxy</media:keywords>
				<media:thumbnail url="https://elroy.twit.tv/sites/default/files/styles/twit_slideshow_400x300/public/images/episodes/2026/03/860447/hero/SN1069_thumbnail.jpg" width="400" height="225" />
				<media:rating scheme="urn:simple">nonadult</media:rating>
				<media:rating scheme="urn:v-chip">tv-g</media:rating>
				<media:category scheme="urn:iab:categories" label="Technology &amp; Computing">IAB19</media:category>
				<media:credit role="host">Steve Gibson</media:credit>
				<media:credit role="host">Leo Laporte</media:credit>
			</media:content>
				<podcast:person role="host" href="https://twit.tv/people/steve-gibson" img="https://elroy.twit.tv/sites/default/files/styles/twit_album_art_600x600/public/people/34/pictures/Steve_v1.jpg">Steve Gibson</podcast:person>
				<podcast:person role="host" href="https://twit.tv/people/leo-laporte" img="https://elroy.twit.tv/sites/default/files/styles/twit_album_art_600x600/public/people/21/pictures/Leo_v1.jpg">Leo Laporte</podcast:person>
		</item>
		<item>
			<title>SN 1068: The Call Is Coming From Inside the House - Live From Zero Trust World 2026</title>
			<itunes:title>The Call Is Coming From Inside the House - Live From Zero Trust World 2026</itunes:title>
			<itunes:episodeType>full</itunes:episodeType>
			<itunes:author>TWiT</itunes:author>
			<pubDate>Thu, 05 Mar 2026 10:25:00 PST</pubDate>
			<itunes:episode>1068</itunes:episode>
			<podcast:episode>1068</podcast:episode>
			<link>https://twit.tv/shows/security-now/episodes/1068</link>
			<comments>https://twit.tv/shows/security-now/episodes/1068</comments>
			<category>Help &amp; How To</category>
			<category>Technology</category>
			<category>Security</category>
			<itunes:explicit>no</itunes:explicit>
			<itunes:subtitle>Live From Zero Trust World 2026</itunes:subtitle>
			<podcast:transcript url="http://twit.tv/posts/transcripts/security-now-1068-transcript" type="text/html" />
			<itunes:keywords>Security Now, TWiT, steve gibson, Leo Laporte, zero trust, internal threats, ThreatLocker, enterprise security, network perimeter, authentication failures, ransomware, Social Engineering, least privilege, packet filtering, whitelisting apps</itunes:keywords>
			<description><![CDATA[
<p>Steve Gibson and Leo Laporte host a special episode of Security Now live from ThreatLocker's Zero Trust World 2026 in Orlando, Florida.</p> 
<p>The final frontier of security is internal. Today, we have the tools, techniques and technologies to thwart attacks originating from outside our perimeter. We're now good at protecting our borders. But major high profile breaches occurring over the past several years have revealed that insufficient attention has been given to the security of our internal systems and networks. Today's greatest security weaknesses result from decades of system design, deployment and policy that have placed far too much trust on the conduct of those on the inside, behind our borders. Whether deliberate, inadvertent, or externally penetrating, the greatest challenge we now face is that of designing and deploying our internal security with strict adherence to the principles of least privilege and zero trust.</p> 
<p><strong>Hosts:</strong> <a href="https://twit.tv/people/steve-gibson">Steve Gibson</a> and <a href="https://twit.tv/people/leo-laporte">Leo Laporte</a></p> 
<p>Download or subscribe to <em>Security Now</em> at <a href="https://twit.tv/shows/security-now">https://twit.tv/shows/security-now</a>.</p> 
<p>You can submit a question to <em>Security Now</em> at the <a href="https://www.grc.com/feedback.htm" target="_blank">GRC Feedback Page</a>.</p> 
<p>For 16kbps versions, transcripts, and notes (including fixes), visit Steve's site: <a href="https://www.grc.com/securitynow.htm" target="_blank">grc.com</a>, also the home of the best disk maintenance and recovery utility ever written <a href="https://www.grc.com/sr/spinrite.htm" target="_blank">Spinrite 6</a>.</p> 
<p><strong>Join Club TWiT for Ad-Free Podcasts!</strong><br /> 
Support what you love and get ad-free audio <em>and</em> video feeds, a members-only Discord, and exclusive content. Join today: <a href="https://twit.tv/clubtwit" rel="payment">https://twit.tv/clubtwit</a></p>
<p><strong>Sponsor:</strong><ul>
<li><a href="http://threatlocker.com/twit" target="_blank" rel="sponsored">threatlocker.com/twit</a></li>
</ul></p>
]]></description>
			<itunes:summary><![CDATA[
<p>Steve Gibson and Leo Laporte host a special episode of Security Now live from ThreatLocker's Zero Trust World 2026 in Orlando, Florida.</p> 
<p>The final frontier of security is internal. Today, we have the tools, techniques and technologies to thwart attacks originating from outside our perimeter. We're now good at protecting our borders. But major high profile breaches occurring over the past several years have revealed that insufficient attention has been given to the security of our internal systems and networks. Today's greatest security weaknesses result from decades of system design, deployment and policy that have placed far too much trust on the conduct of those on the inside, behind our borders. Whether deliberate, inadvertent, or externally penetrating, the greatest challenge we now face is that of designing and deploying our internal security with strict adherence to the principles of least privilege and zero trust.</p> 
<p><strong>Hosts:</strong> <a href="https://twit.tv/people/steve-gibson">Steve Gibson</a> and <a href="https://twit.tv/people/leo-laporte">Leo Laporte</a></p> 
<p>Download or subscribe to <em>Security Now</em> at <a href="https://twit.tv/shows/security-now">https://twit.tv/shows/security-now</a>.</p> 
<p>You can submit a question to <em>Security Now</em> at the <a href="https://www.grc.com/feedback.htm" target="_blank">GRC Feedback Page</a>.</p> 
<p>For 16kbps versions, transcripts, and notes (including fixes), visit Steve's site: <a href="https://www.grc.com/securitynow.htm" target="_blank">grc.com</a>, also the home of the best disk maintenance and recovery utility ever written <a href="https://www.grc.com/sr/spinrite.htm" target="_blank">Spinrite 6</a>.</p> 
<p><strong>Join Club TWiT for Ad-Free Podcasts!</strong><br /> 
Support what you love and get ad-free audio <em>and</em> video feeds, a members-only Discord, and exclusive content. Join today: <a href="https://twit.tv/clubtwit" rel="payment">https://twit.tv/clubtwit</a></p>
<p><strong>Sponsor:</strong><ul>
<li><a href="http://threatlocker.com/twit" target="_blank" rel="sponsored">threatlocker.com/twit</a></li>
</ul></p>
]]></itunes:summary>
			<content:encoded><![CDATA[
<p>Steve Gibson and Leo Laporte host a special episode of Security Now live from ThreatLocker's Zero Trust World 2026 in Orlando, Florida.</p> 
<p>The final frontier of security is internal. Today, we have the tools, techniques and technologies to thwart attacks originating from outside our perimeter. We're now good at protecting our borders. But major high profile breaches occurring over the past several years have revealed that insufficient attention has been given to the security of our internal systems and networks. Today's greatest security weaknesses result from decades of system design, deployment and policy that have placed far too much trust on the conduct of those on the inside, behind our borders. Whether deliberate, inadvertent, or externally penetrating, the greatest challenge we now face is that of designing and deploying our internal security with strict adherence to the principles of least privilege and zero trust.</p> 
<p><strong>Hosts:</strong> <a href="https://twit.tv/people/steve-gibson">Steve Gibson</a> and <a href="https://twit.tv/people/leo-laporte">Leo Laporte</a></p> 
<p>Download or subscribe to <em>Security Now</em> at <a href="https://twit.tv/shows/security-now">https://twit.tv/shows/security-now</a>.</p> 
<p>You can submit a question to <em>Security Now</em> at the <a href="https://www.grc.com/feedback.htm" target="_blank">GRC Feedback Page</a>.</p> 
<p>For 16kbps versions, transcripts, and notes (including fixes), visit Steve's site: <a href="https://www.grc.com/securitynow.htm" target="_blank">grc.com</a>, also the home of the best disk maintenance and recovery utility ever written <a href="https://www.grc.com/sr/spinrite.htm" target="_blank">Spinrite 6</a>.</p> 
<p><strong>Join Club TWiT for Ad-Free Podcasts!</strong><br /> 
Support what you love and get ad-free audio <em>and</em> video feeds, a members-only Discord, and exclusive content. Join today: <a href="https://twit.tv/clubtwit" rel="payment">https://twit.tv/clubtwit</a></p>
<p><strong>Sponsor:</strong><ul>
<li><a href="http://threatlocker.com/twit" target="_blank" rel="sponsored">threatlocker.com/twit</a></li>
</ul></p>
]]></content:encoded>
			<itunes:image href="https://elroy.twit.tv/sites/default/files/styles/twit_thumb_720x405/public/images/episodes/2026/03/860376/hero/SN1068_thumbnail.jpg"/>
			<guid isPermaLink="false">https://pdst.fm/e/pscrb.fm/rss/p/mgln.ai/e/294/cdn.twit.tv/megaphone/sn_1068/ARML2553201573.mp3</guid>
			<itunes:duration>51:55</itunes:duration>
			<enclosure url="https://pdst.fm/e/pscrb.fm/rss/p/mgln.ai/e/294/cdn.twit.tv/megaphone/sn_1068/ARML2553201573.mp3" length="49949378" type="audio/mpeg"/>
			<media:content url="https://pdst.fm/e/pscrb.fm/rss/p/mgln.ai/e/294/cdn.twit.tv/megaphone/sn_1068/ARML2553201573.mp3" fileSize="49949378" type="audio/mpeg" medium="audio">
				<media:title type="plain">SN 1068: The Call Is Coming From Inside the House - Live From Zero Trust World 2026</media:title>
				<media:description type="plain">Live From Zero Trust World 2026</media:description>
				<media:keywords>Security Now, TWiT, steve gibson, Leo Laporte, zero trust, internal threats, ThreatLocker, enterprise security, network perimeter, authentication failures, ransomware, Social Engineering, least privilege, packet filtering, whitelisting apps</media:keywords>
				<media:thumbnail url="https://elroy.twit.tv/sites/default/files/styles/twit_slideshow_400x300/public/images/episodes/2026/03/860376/hero/SN1068_thumbnail.jpg" width="400" height="225" />
				<media:rating scheme="urn:simple">nonadult</media:rating>
				<media:rating scheme="urn:v-chip">tv-g</media:rating>
				<media:category scheme="urn:iab:categories" label="Technology &amp; Computing">IAB19</media:category>
				<media:credit role="host">Steve Gibson</media:credit>
				<media:credit role="host">Leo Laporte</media:credit>
			</media:content>
				<podcast:person role="host" href="https://twit.tv/people/steve-gibson" img="https://elroy.twit.tv/sites/default/files/styles/twit_album_art_600x600/public/people/34/pictures/Steve_v1.jpg">Steve Gibson</podcast:person>
				<podcast:person role="host" href="https://twit.tv/people/leo-laporte" img="https://elroy.twit.tv/sites/default/files/styles/twit_album_art_600x600/public/people/21/pictures/Leo_v1.jpg">Leo Laporte</podcast:person>
		</item>
		<item>
			<title>SN 1067: KongTuke's CrashFix - Click, Paste, Pwned</title>
			<itunes:title>KongTuke's CrashFix - Click, Paste, Pwned</itunes:title>
			<itunes:episodeType>full</itunes:episodeType>
			<itunes:author>TWiT</itunes:author>
			<pubDate>Tue, 03 Mar 2026 15:28:13 PST</pubDate>
			<itunes:episode>1067</itunes:episode>
			<podcast:episode>1067</podcast:episode>
			<link>https://twit.tv/shows/security-now/episodes/1067</link>
			<comments>https://twit.tv/shows/security-now/episodes/1067</comments>
			<category>Help &amp; How To</category>
			<category>Technology</category>
			<category>Security</category>
			<itunes:explicit>no</itunes:explicit>
			<itunes:subtitle>Click, Paste, Pwned</itunes:subtitle>
			<podcast:transcript url="http://twit.tv/posts/tech/how-latest-clickfix-exploit-targets-windows-users" type="text/html" />
			<itunes:keywords>Security Now, TWiT, steve gibson, Leo Laporte, Zero Trust World, Kong Tuk CrashFix exploit, AI-driven hacking, Fortinet firewalls, code signing certificate, hardware security module, Social Engineering, Lapsus$, scattered lapsus hunters</itunes:keywords>
			<description><![CDATA[
<p>A crafty new breed of social engineering attack is tricking users into launching malware straight from their clipboard, exposing a fresh vulnerability in Windows that even tech pros could fall for. Leo Laporte and Steve Gibson break down how the latest ClickFix and CrashFix exploits are outsmarting traditional defenses.</p><ul> 
<li>The lowdown on last week's "no turn" picture of the week.</li> 
<li>Is an AI-driven hacking campaign a big deal now.</li> 
<li>Clause used in multiple Mexican government attacks.</li> 
<li>Apple continues to be confronted with age restrictions.</li> 
<li>COPPA needs an exception to allow age collection.</li> 
<li>Meta swamps law enforcement with AI-slop CSAM reports.</li> 
<li>Roskomnadzor has been busy blocking VPNs. Guess how many.</li> 
<li>The UK tries to report their self-scanning success.</li> 
<li>Remember that hacker who extorted the psychotherapy patients.</li> 
<li>Scattered Lapsus$ Hunters is actively recruiting women.</li> 
<li>Cisco lands another breathtakingly rare 10.0 CVSS.</li> 
<li>VulnCheck's report on 2025 vulnerabilities and exploits.</li> 
<li>Steve discovers a fabulous $72 Hardware Security Module.</li> 
<li>A listener shares an interesting AI service discovery.</li> 
<li>The very potent "ClickFix" exploit evolves</li></ul> 
<p>Show Notes - <a href="https://www.grc.com/sn/SN-1067-Notes.pdf">https://www.grc.com/sn/SN-1067-Notes.pdf</a></p> 
<p><strong>Hosts:</strong> <a href="https://twit.tv/people/steve-gibson">Steve Gibson</a> and <a href="https://twit.tv/people/leo-laporte">Leo Laporte</a></p> 
<p>Download or subscribe to <em>Security Now</em> at <a href="https://twit.tv/shows/security-now">https://twit.tv/shows/security-now</a>.</p> 
<p>You can submit a question to <em>Security Now</em> at the <a href="https://www.grc.com/feedback.htm" target="_blank">GRC Feedback Page</a>.</p> 
<p>For 16kbps versions, transcripts, and notes (including fixes), visit Steve's site: <a href="https://www.grc.com/securitynow.htm" target="_blank">grc.com</a>, also the home of the best disk maintenance and recovery utility ever written <a href="https://www.grc.com/sr/spinrite.htm" target="_blank">Spinrite 6</a>.</p> 
<p><strong>Join Club TWiT for Ad-Free Podcasts!</strong><br /> 
Support what you love and get ad-free audio <em>and</em> video feeds, a members-only Discord, and exclusive content. Join today: <a href="https://twit.tv/clubtwit" rel="payment">https://twit.tv/clubtwit</a></p>
<p><strong>Sponsors:</strong><ul>
<li><a href="http://meter.com/securitynow" target="_blank" rel="sponsored">meter.com/securitynow</a></li>
<li><a href="http://guardsquare.com" target="_blank" rel="sponsored">guardsquare.com</a></li>
<li><a href="http://threatlocker.com/twit" target="_blank" rel="sponsored">threatlocker.com/twit</a></li>
<li><a href="https://www.adaptivesecurity.com/?utm_source=podcast&utm_medium=other&utm_campaign=2026_NA_Podcast_security_now&utm_id=701Rd00000d9YqPIAU" target="_blank" rel="sponsored">adaptivesecurity.com</a></li>
<li><a href="http://outsystems.com/twit" target="_blank" rel="sponsored">outsystems.com/twit</a></li>
</ul></p>
]]></description>
			<itunes:summary><![CDATA[
<p>A crafty new breed of social engineering attack is tricking users into launching malware straight from their clipboard, exposing a fresh vulnerability in Windows that even tech pros could fall for. Leo Laporte and Steve Gibson break down how the latest ClickFix and CrashFix exploits are outsmarting traditional defenses.</p><ul> 
<li>The lowdown on last week's "no turn" picture of the week.</li> 
<li>Is an AI-driven hacking campaign a big deal now.</li> 
<li>Clause used in multiple Mexican government attacks.</li> 
<li>Apple continues to be confronted with age restrictions.</li> 
<li>COPPA needs an exception to allow age collection.</li> 
<li>Meta swamps law enforcement with AI-slop CSAM reports.</li> 
<li>Roskomnadzor has been busy blocking VPNs. Guess how many.</li> 
<li>The UK tries to report their self-scanning success.</li> 
<li>Remember that hacker who extorted the psychotherapy patients.</li> 
<li>Scattered Lapsus$ Hunters is actively recruiting women.</li> 
<li>Cisco lands another breathtakingly rare 10.0 CVSS.</li> 
<li>VulnCheck's report on 2025 vulnerabilities and exploits.</li> 
<li>Steve discovers a fabulous $72 Hardware Security Module.</li> 
<li>A listener shares an interesting AI service discovery.</li> 
<li>The very potent "ClickFix" exploit evolves</li></ul> 
<p>Show Notes - <a href="https://www.grc.com/sn/SN-1067-Notes.pdf">https://www.grc.com/sn/SN-1067-Notes.pdf</a></p> 
<p><strong>Hosts:</strong> <a href="https://twit.tv/people/steve-gibson">Steve Gibson</a> and <a href="https://twit.tv/people/leo-laporte">Leo Laporte</a></p> 
<p>Download or subscribe to <em>Security Now</em> at <a href="https://twit.tv/shows/security-now">https://twit.tv/shows/security-now</a>.</p> 
<p>You can submit a question to <em>Security Now</em> at the <a href="https://www.grc.com/feedback.htm" target="_blank">GRC Feedback Page</a>.</p> 
<p>For 16kbps versions, transcripts, and notes (including fixes), visit Steve's site: <a href="https://www.grc.com/securitynow.htm" target="_blank">grc.com</a>, also the home of the best disk maintenance and recovery utility ever written <a href="https://www.grc.com/sr/spinrite.htm" target="_blank">Spinrite 6</a>.</p> 
<p><strong>Join Club TWiT for Ad-Free Podcasts!</strong><br /> 
Support what you love and get ad-free audio <em>and</em> video feeds, a members-only Discord, and exclusive content. Join today: <a href="https://twit.tv/clubtwit" rel="payment">https://twit.tv/clubtwit</a></p>
<p><strong>Sponsors:</strong><ul>
<li><a href="http://meter.com/securitynow" target="_blank" rel="sponsored">meter.com/securitynow</a></li>
<li><a href="http://guardsquare.com" target="_blank" rel="sponsored">guardsquare.com</a></li>
<li><a href="http://threatlocker.com/twit" target="_blank" rel="sponsored">threatlocker.com/twit</a></li>
<li><a href="https://www.adaptivesecurity.com/?utm_source=podcast&utm_medium=other&utm_campaign=2026_NA_Podcast_security_now&utm_id=701Rd00000d9YqPIAU" target="_blank" rel="sponsored">adaptivesecurity.com</a></li>
<li><a href="http://outsystems.com/twit" target="_blank" rel="sponsored">outsystems.com/twit</a></li>
</ul></p>
]]></itunes:summary>
			<content:encoded><![CDATA[
<p>A crafty new breed of social engineering attack is tricking users into launching malware straight from their clipboard, exposing a fresh vulnerability in Windows that even tech pros could fall for. Leo Laporte and Steve Gibson break down how the latest ClickFix and CrashFix exploits are outsmarting traditional defenses.</p><ul> 
<li>The lowdown on last week's "no turn" picture of the week.</li> 
<li>Is an AI-driven hacking campaign a big deal now.</li> 
<li>Clause used in multiple Mexican government attacks.</li> 
<li>Apple continues to be confronted with age restrictions.</li> 
<li>COPPA needs an exception to allow age collection.</li> 
<li>Meta swamps law enforcement with AI-slop CSAM reports.</li> 
<li>Roskomnadzor has been busy blocking VPNs. Guess how many.</li> 
<li>The UK tries to report their self-scanning success.</li> 
<li>Remember that hacker who extorted the psychotherapy patients.</li> 
<li>Scattered Lapsus$ Hunters is actively recruiting women.</li> 
<li>Cisco lands another breathtakingly rare 10.0 CVSS.</li> 
<li>VulnCheck's report on 2025 vulnerabilities and exploits.</li> 
<li>Steve discovers a fabulous $72 Hardware Security Module.</li> 
<li>A listener shares an interesting AI service discovery.</li> 
<li>The very potent "ClickFix" exploit evolves</li></ul> 
<p>Show Notes - <a href="https://www.grc.com/sn/SN-1067-Notes.pdf">https://www.grc.com/sn/SN-1067-Notes.pdf</a></p> 
<p><strong>Hosts:</strong> <a href="https://twit.tv/people/steve-gibson">Steve Gibson</a> and <a href="https://twit.tv/people/leo-laporte">Leo Laporte</a></p> 
<p>Download or subscribe to <em>Security Now</em> at <a href="https://twit.tv/shows/security-now">https://twit.tv/shows/security-now</a>.</p> 
<p>You can submit a question to <em>Security Now</em> at the <a href="https://www.grc.com/feedback.htm" target="_blank">GRC Feedback Page</a>.</p> 
<p>For 16kbps versions, transcripts, and notes (including fixes), visit Steve's site: <a href="https://www.grc.com/securitynow.htm" target="_blank">grc.com</a>, also the home of the best disk maintenance and recovery utility ever written <a href="https://www.grc.com/sr/spinrite.htm" target="_blank">Spinrite 6</a>.</p> 
<p><strong>Join Club TWiT for Ad-Free Podcasts!</strong><br /> 
Support what you love and get ad-free audio <em>and</em> video feeds, a members-only Discord, and exclusive content. Join today: <a href="https://twit.tv/clubtwit" rel="payment">https://twit.tv/clubtwit</a></p>
<p><strong>Sponsors:</strong><ul>
<li><a href="http://meter.com/securitynow" target="_blank" rel="sponsored">meter.com/securitynow</a></li>
<li><a href="http://guardsquare.com" target="_blank" rel="sponsored">guardsquare.com</a></li>
<li><a href="http://threatlocker.com/twit" target="_blank" rel="sponsored">threatlocker.com/twit</a></li>
<li><a href="https://www.adaptivesecurity.com/?utm_source=podcast&utm_medium=other&utm_campaign=2026_NA_Podcast_security_now&utm_id=701Rd00000d9YqPIAU" target="_blank" rel="sponsored">adaptivesecurity.com</a></li>
<li><a href="http://outsystems.com/twit" target="_blank" rel="sponsored">outsystems.com/twit</a></li>
</ul></p>
]]></content:encoded>
			<itunes:image href="https://elroy.twit.tv/sites/default/files/styles/twit_thumb_720x405/public/images/episodes/2026/03/860347/hero/SN1067_thumbnail.jpg"/>
			<guid isPermaLink="false">https://pdst.fm/e/pscrb.fm/rss/p/mgln.ai/e/294/cdn.twit.tv/megaphone/sn_1067/ARML3843496655.mp3</guid>
			<itunes:duration>2:53:08</itunes:duration>
			<enclosure url="https://pdst.fm/e/pscrb.fm/rss/p/mgln.ai/e/294/cdn.twit.tv/megaphone/sn_1067/ARML3843496655.mp3" length="166325440" type="audio/mpeg"/>
			<media:content url="https://pdst.fm/e/pscrb.fm/rss/p/mgln.ai/e/294/cdn.twit.tv/megaphone/sn_1067/ARML3843496655.mp3" fileSize="166325440" type="audio/mpeg" medium="audio">
				<media:title type="plain">SN 1067: KongTuke's CrashFix - Click, Paste, Pwned</media:title>
				<media:description type="plain">Click, Paste, Pwned</media:description>
				<media:keywords>Security Now, TWiT, steve gibson, Leo Laporte, Zero Trust World, Kong Tuk CrashFix exploit, AI-driven hacking, Fortinet firewalls, code signing certificate, hardware security module, Social Engineering, Lapsus$, scattered lapsus hunters</media:keywords>
				<media:thumbnail url="https://elroy.twit.tv/sites/default/files/styles/twit_slideshow_400x300/public/images/episodes/2026/03/860347/hero/SN1067_thumbnail.jpg" width="400" height="225" />
				<media:rating scheme="urn:simple">nonadult</media:rating>
				<media:rating scheme="urn:v-chip">tv-g</media:rating>
				<media:category scheme="urn:iab:categories" label="Technology &amp; Computing">IAB19</media:category>
				<media:credit role="host">Steve Gibson</media:credit>
				<media:credit role="host">Leo Laporte</media:credit>
			</media:content>
				<podcast:person role="host" href="https://twit.tv/people/steve-gibson" img="https://elroy.twit.tv/sites/default/files/styles/twit_album_art_600x600/public/people/34/pictures/Steve_v1.jpg">Steve Gibson</podcast:person>
				<podcast:person role="host" href="https://twit.tv/people/leo-laporte" img="https://elroy.twit.tv/sites/default/files/styles/twit_album_art_600x600/public/people/21/pictures/Leo_v1.jpg">Leo Laporte</podcast:person>
		</item>
		<item>
			<title>SN 1066: Password Leakage - Zero Trust, Zero Knowledge</title>
			<itunes:title>Password Leakage - Zero Trust, Zero Knowledge</itunes:title>
			<itunes:episodeType>full</itunes:episodeType>
			<itunes:author>TWiT</itunes:author>
			<pubDate>Tue, 24 Feb 2026 19:36:24 PST</pubDate>
			<itunes:episode>1066</itunes:episode>
			<podcast:episode>1066</podcast:episode>
			<link>https://twit.tv/shows/security-now/episodes/1066</link>
			<comments>https://twit.tv/shows/security-now/episodes/1066</comments>
			<category>Help &amp; How To</category>
			<category>Technology</category>
			<category>Security</category>
			<itunes:explicit>no</itunes:explicit>
			<itunes:subtitle>Zero Trust, Zero Knowledge</itunes:subtitle>
			<podcast:transcript url="http://twit.tv/posts/transcripts/security-now-1066-transcript" type="text/html" />
			<itunes:keywords>Security Now, TWiT, steve gibson, Leo Laporte, password managers, BitWarden, lastpass, dashlane, ETH Zurich security study, password leakage, zero knowledge encryption, TNO, pie, cloud security, ransomware, shiny hunters breach</itunes:keywords>
			<description><![CDATA[
<p>ETH Zurich's deep-dive into the world's top password managers exposes how feature overload and legacy design obscure real security flaws, forcing a rethink of what "zero knowledge" actually means for your vault. Learn why recent fixes matter—and why open source may be your safest bet.</p><ul> 
<li>CA's warn us to urgently prepare for the inevitable.</li> 
<li>Three U.S. states attempt to ban 3D printed firearms.</li> 
<li>Denied ransom, ShinyHunters leaks 967,000 personal details.</li> 
<li>"Billions" of U.S. social security numbers leaked.</li> 
<li>Is Apple planning to add cameras to three new gadgets.</li> 
<li>No more security fixes for Firefox on Windows 7 &amp; 8.</li> 
<li>Russia blocks the official Linux kernel site they need.</li> 
<li>Will the U.S."freedom.gov" site post EU blocked content.</li> 
<li>LLM's will offer secure passwords. Do Not Use Them.</li> 
<li>As predicted, the "ClickFix" attack strategy takes over.</li> 
<li>A listener believes his computer is compromised.</li> 
<li>How could three popular password managers get things wrong. </li></ul> 
<p>Show Notes - <a href="https://www.grc.com/sn/SN-1066-Notes.pdf">https://www.grc.com/sn/SN-1066-Notes.pdf</a></p> 
<p><strong>Hosts:</strong> <a href="https://twit.tv/people/steve-gibson">Steve Gibson</a> and <a href="https://twit.tv/people/leo-laporte">Leo Laporte</a></p> 
<p>Download or subscribe to <em>Security Now</em> at <a href="https://twit.tv/shows/security-now">https://twit.tv/shows/security-now</a>.</p> 
<p>You can submit a question to <em>Security Now</em> at the <a href="https://www.grc.com/feedback.htm" target="_blank">GRC Feedback Page</a>.</p> 
<p>For 16kbps versions, transcripts, and notes (including fixes), visit Steve's site: <a href="https://www.grc.com/securitynow.htm" target="_blank">grc.com</a>, also the home of the best disk maintenance and recovery utility ever written <a href="https://www.grc.com/sr/spinrite.htm" target="_blank">Spinrite 6</a>.</p> 
<p><strong>Join Club TWiT for Ad-Free Podcasts!</strong><br /> 
Support what you love and get ad-free audio <em>and</em> video feeds, a members-only Discord, and exclusive content. Join today: <a href="https://twit.tv/clubtwit" rel="payment">https://twit.tv/clubtwit</a></p>
<p><strong>Sponsors:</strong><ul>
<li><a href="http://guardsquare.com" target="_blank" rel="sponsored">guardsquare.com</a></li>
<li><a href="http://bitwarden.com/twit" target="_blank" rel="sponsored">bitwarden.com/twit</a></li>
<li><a href="http://zscaler.com/security" target="_blank" rel="sponsored">zscaler.com/security</a></li>
<li><a href="http://hoxhunt.com/securitynow" target="_blank" rel="sponsored">hoxhunt.com/securitynow</a></li>
<li><a href="https://material.security" target="_blank" rel="sponsored">material.security</a></li>
</ul></p>
]]></description>
			<itunes:summary><![CDATA[
<p>ETH Zurich's deep-dive into the world's top password managers exposes how feature overload and legacy design obscure real security flaws, forcing a rethink of what "zero knowledge" actually means for your vault. Learn why recent fixes matter—and why open source may be your safest bet.</p><ul> 
<li>CA's warn us to urgently prepare for the inevitable.</li> 
<li>Three U.S. states attempt to ban 3D printed firearms.</li> 
<li>Denied ransom, ShinyHunters leaks 967,000 personal details.</li> 
<li>"Billions" of U.S. social security numbers leaked.</li> 
<li>Is Apple planning to add cameras to three new gadgets.</li> 
<li>No more security fixes for Firefox on Windows 7 &amp; 8.</li> 
<li>Russia blocks the official Linux kernel site they need.</li> 
<li>Will the U.S."freedom.gov" site post EU blocked content.</li> 
<li>LLM's will offer secure passwords. Do Not Use Them.</li> 
<li>As predicted, the "ClickFix" attack strategy takes over.</li> 
<li>A listener believes his computer is compromised.</li> 
<li>How could three popular password managers get things wrong. </li></ul> 
<p>Show Notes - <a href="https://www.grc.com/sn/SN-1066-Notes.pdf">https://www.grc.com/sn/SN-1066-Notes.pdf</a></p> 
<p><strong>Hosts:</strong> <a href="https://twit.tv/people/steve-gibson">Steve Gibson</a> and <a href="https://twit.tv/people/leo-laporte">Leo Laporte</a></p> 
<p>Download or subscribe to <em>Security Now</em> at <a href="https://twit.tv/shows/security-now">https://twit.tv/shows/security-now</a>.</p> 
<p>You can submit a question to <em>Security Now</em> at the <a href="https://www.grc.com/feedback.htm" target="_blank">GRC Feedback Page</a>.</p> 
<p>For 16kbps versions, transcripts, and notes (including fixes), visit Steve's site: <a href="https://www.grc.com/securitynow.htm" target="_blank">grc.com</a>, also the home of the best disk maintenance and recovery utility ever written <a href="https://www.grc.com/sr/spinrite.htm" target="_blank">Spinrite 6</a>.</p> 
<p><strong>Join Club TWiT for Ad-Free Podcasts!</strong><br /> 
Support what you love and get ad-free audio <em>and</em> video feeds, a members-only Discord, and exclusive content. Join today: <a href="https://twit.tv/clubtwit" rel="payment">https://twit.tv/clubtwit</a></p>
<p><strong>Sponsors:</strong><ul>
<li><a href="http://guardsquare.com" target="_blank" rel="sponsored">guardsquare.com</a></li>
<li><a href="http://bitwarden.com/twit" target="_blank" rel="sponsored">bitwarden.com/twit</a></li>
<li><a href="http://zscaler.com/security" target="_blank" rel="sponsored">zscaler.com/security</a></li>
<li><a href="http://hoxhunt.com/securitynow" target="_blank" rel="sponsored">hoxhunt.com/securitynow</a></li>
<li><a href="https://material.security" target="_blank" rel="sponsored">material.security</a></li>
</ul></p>
]]></itunes:summary>
			<content:encoded><![CDATA[
<p>ETH Zurich's deep-dive into the world's top password managers exposes how feature overload and legacy design obscure real security flaws, forcing a rethink of what "zero knowledge" actually means for your vault. Learn why recent fixes matter—and why open source may be your safest bet.</p><ul> 
<li>CA's warn us to urgently prepare for the inevitable.</li> 
<li>Three U.S. states attempt to ban 3D printed firearms.</li> 
<li>Denied ransom, ShinyHunters leaks 967,000 personal details.</li> 
<li>"Billions" of U.S. social security numbers leaked.</li> 
<li>Is Apple planning to add cameras to three new gadgets.</li> 
<li>No more security fixes for Firefox on Windows 7 &amp; 8.</li> 
<li>Russia blocks the official Linux kernel site they need.</li> 
<li>Will the U.S."freedom.gov" site post EU blocked content.</li> 
<li>LLM's will offer secure passwords. Do Not Use Them.</li> 
<li>As predicted, the "ClickFix" attack strategy takes over.</li> 
<li>A listener believes his computer is compromised.</li> 
<li>How could three popular password managers get things wrong. </li></ul> 
<p>Show Notes - <a href="https://www.grc.com/sn/SN-1066-Notes.pdf">https://www.grc.com/sn/SN-1066-Notes.pdf</a></p> 
<p><strong>Hosts:</strong> <a href="https://twit.tv/people/steve-gibson">Steve Gibson</a> and <a href="https://twit.tv/people/leo-laporte">Leo Laporte</a></p> 
<p>Download or subscribe to <em>Security Now</em> at <a href="https://twit.tv/shows/security-now">https://twit.tv/shows/security-now</a>.</p> 
<p>You can submit a question to <em>Security Now</em> at the <a href="https://www.grc.com/feedback.htm" target="_blank">GRC Feedback Page</a>.</p> 
<p>For 16kbps versions, transcripts, and notes (including fixes), visit Steve's site: <a href="https://www.grc.com/securitynow.htm" target="_blank">grc.com</a>, also the home of the best disk maintenance and recovery utility ever written <a href="https://www.grc.com/sr/spinrite.htm" target="_blank">Spinrite 6</a>.</p> 
<p><strong>Join Club TWiT for Ad-Free Podcasts!</strong><br /> 
Support what you love and get ad-free audio <em>and</em> video feeds, a members-only Discord, and exclusive content. Join today: <a href="https://twit.tv/clubtwit" rel="payment">https://twit.tv/clubtwit</a></p>
<p><strong>Sponsors:</strong><ul>
<li><a href="http://guardsquare.com" target="_blank" rel="sponsored">guardsquare.com</a></li>
<li><a href="http://bitwarden.com/twit" target="_blank" rel="sponsored">bitwarden.com/twit</a></li>
<li><a href="http://zscaler.com/security" target="_blank" rel="sponsored">zscaler.com/security</a></li>
<li><a href="http://hoxhunt.com/securitynow" target="_blank" rel="sponsored">hoxhunt.com/securitynow</a></li>
<li><a href="https://material.security" target="_blank" rel="sponsored">material.security</a></li>
</ul></p>
]]></content:encoded>
			<itunes:image href="https://elroy.twit.tv/sites/default/files/styles/twit_thumb_720x405/public/images/episodes/2026/02/860272/hero/SN1066_thumbnail.jpg"/>
			<guid isPermaLink="false">https://pdst.fm/e/pscrb.fm/rss/p/mgln.ai/e/294/cdn.twit.tv/audio/sn/sn1066/sn1066.mp3</guid>
			<itunes:duration>2:50:07</itunes:duration>
			<enclosure url="https://pdst.fm/e/pscrb.fm/rss/p/mgln.ai/e/294/cdn.twit.tv/megaphone/sn_1066/ARML5749737698.mp3" length="163568830" type="audio/mpeg"/>
			<media:content url="https://pdst.fm/e/pscrb.fm/rss/p/mgln.ai/e/294/cdn.twit.tv/megaphone/sn_1066/ARML5749737698.mp3" fileSize="163568830" type="audio/mpeg" medium="audio">
				<media:title type="plain">SN 1066: Password Leakage - Zero Trust, Zero Knowledge</media:title>
				<media:description type="plain">Zero Trust, Zero Knowledge</media:description>
				<media:keywords>Security Now, TWiT, steve gibson, Leo Laporte, password managers, BitWarden, lastpass, dashlane, ETH Zurich security study, password leakage, zero knowledge encryption, TNO, pie, cloud security, ransomware, shiny hunters breach</media:keywords>
				<media:thumbnail url="https://elroy.twit.tv/sites/default/files/styles/twit_slideshow_400x300/public/images/episodes/2026/02/860272/hero/SN1066_thumbnail.jpg" width="400" height="225" />
				<media:rating scheme="urn:simple">nonadult</media:rating>
				<media:rating scheme="urn:v-chip">tv-g</media:rating>
				<media:category scheme="urn:iab:categories" label="Technology &amp; Computing">IAB19</media:category>
				<media:credit role="host">Steve Gibson</media:credit>
				<media:credit role="host">Leo Laporte</media:credit>
			</media:content>
				<podcast:person role="host" href="https://twit.tv/people/steve-gibson" img="https://elroy.twit.tv/sites/default/files/styles/twit_album_art_600x600/public/people/34/pictures/Steve_v1.jpg">Steve Gibson</podcast:person>
				<podcast:person role="host" href="https://twit.tv/people/leo-laporte" img="https://elroy.twit.tv/sites/default/files/styles/twit_album_art_600x600/public/people/21/pictures/Leo_v1.jpg">Leo Laporte</podcast:person>
		</item>
	</channel>
</rss>
