Home
Categories
EXPLORE
True Crime
Comedy
Society & Culture
Business
Sports
History
Fiction
About Us
Contact Us
Copyright
© 2024 PodJoint
00:00 / 00:00
Sign in

or

Don't have an account?
Sign up
Forgot password
https://is1-ssl.mzstatic.com/image/thumb/Podcasts221/v4/99/8e/f4/998ef47b-4e95-d7f8-5b6c-567a6b8bef7b/mza_537803305394389172.png/600x600bb.jpg
Legitimate Cybersecurity Podcasts
LegitimateCybersecurity
25 episodes
1 day ago
Legitimate Cybersecurity Podcasts
Show more...
Technology
RSS
All content for Legitimate Cybersecurity Podcasts is the property of LegitimateCybersecurity and is served directly from their servers with no modification, redirects, or rehosting. The podcast is not affiliated with or endorsed by Podjoint in any way.
Legitimate Cybersecurity Podcasts
Show more...
Technology
https://pbcdn1.podbean.com/imglogo/ep-logo/pbblog20937193/687cd5805f0b8cbcba9c98f2a2b15340.jpg
AI Is Spying on You: Zero-Touch Hacks, Secret Data Leaks, and the “No Legal Privilege” Bombshell
Legitimate Cybersecurity Podcasts
37 minutes
3 weeks ago
AI Is Spying on You: Zero-Touch Hacks, Secret Data Leaks, and the “No Legal Privilege” Bombshell
Your AI assistant is helpful… until it isn’t. In this episode, Frank and Dustin break down the zero-touch exploits (EchoLeak & ShadowLeak) that can hijack AI integrations like email and office suites, quietly exfiltrate your prompts and IP, and even leak them to attacker infrastructure—no clicks required. We also talk about why your chats aren’t protected by legal privilege, how AI activity factored into the California wildfire arsonist story, and what actually works: DLP, model governance, and when you should go local with LLMs.We keep it real (and a little nihilistic) while giving CISOs, IT leaders, and curious humans the playbook to reduce risk without killing innovation.👉 Media & interview requests: admin@legitimatecybersecurity.com🎧 Audio listeners: subscribe on any platform via https://legitimatecybersecurity.podbean.com/💬 Drop your idea for our new sign-off catchphrase in the comments!Chapters:0:00 Cold Open — “What if your AI is spying on you?”0:30 Welcome & Today’s Agenda (EchoLeak, ShadowLeak, legal privilege, arsonist story)1:55 Zero-Touch Exploits Explained (no clicks, still owned)3:11 How It Works via Email & Integrations (silent prompt injection → exfil)4:48 Old Tradecraft, New Target (drive-by vibes, LLMs in the loop)7:55 “Plain-Language Hacking” (Gandalf game, prompt judo)10:27 Why This Still Counts as a Hack (intent, abuse of designed behavior)12:52 Why SOCs Might Miss It (looks like normal AI traffic)14:24 DLP, Asset Mgmt, and the “Hated but Needed” Controls16:44 Should You Run Local LLMs? (pros, cons, update churn)20:30 Liability & Definitions — Is This Really a Hack? (yes, and why)22:25 AI Has No Feelings… But It Leaks Yours (reflection, social engineering)23:16 “No Legal Privilege” Bombshell & The Arsonist Example26:36 Privacy Culture Shift (profiling even when you opt-out)29:45 Cat-and-Mouse Prompts (policy workarounds, “encrypt my answer” tricks)31:19 Don’t Panic, Do Fundamentals — Then Regulate32:36 What Good Regulation Looks Like (and where it fails)35:40 Penalties with Teeth (or companies just budget the fines)38:26 Next Week Tease: DOGE whistleblowers & data handling39:01 Help Us Pick a Catchphrase (Outro & CTAs)#cybersecurity #ai #dataprivacy #pentesting #ZeroTouch #llm #copilot #chatgpt #dlp #infosec #datalossprevention
Legitimate Cybersecurity Podcasts
Legitimate Cybersecurity Podcasts