Ransomware attacks jumped 25% in October, hitting manufacturers and MSPs especially hard. In this episode, we uncover what’s fueling the surge — from Ransomware-as-a-Service to AI-powered phishing — and why MSPs are running out of margin for error. Learn how to isolate clients, test backups, and prepare for the next wave before it cripples your business.
Make sure to subscribe to our podcast on Spotify and Apple Podcasts for more technology insights every Friday at 6 PM (PDT), as well as check out our website at www.frostyos.com.
State-linked hackers are exploiting a zero-day vulnerability in Cisco ASA and Firepower firewalls, infiltrating networks across governments and corporations worldwide. In this episode, we break down how firewalls — once the cornerstone of cybersecurity — have become attackers’ favorite target, why the “secure perimeter” model is dead, and how zero-trust architecture is redefining network defense in the age of constant compromise.
Make sure to subscribe to our podcast on Spotify, Apple Podcasts, or where ever you get your podcasts for more technology insights every Friday at 6 PM (PDT), as well as check out our website at www.frostyos.com.
A massive AWS outage in the US-EAST-1 region brought down everything from Fortnite and Alexa to major banking apps and enterprise platforms. In this episode, we break down how a single software bug triggered a global digital meltdown, exposing the fragility of cloud infrastructure, the risks of vendor concentration, and why companies must plan for the day “the cloud” goes dark.
Make sure to subscribe to our podcast on Spotify, Apple Podcasts, or where ever you get your podcasts for more technology insights every Friday at 6 PM (PDT), as well as check out our website and product at www.frostyos.com.
The U.S. government shutdown and expiration of key cyber-sharing legislation have left CISA — America’s primary cybersecurity agency — furloughed and silent. In this episode, we explore the risks of losing federal threat intelligence, how governance failures jeopardize public safety, and what companies must do to protect themselves when the nation’s cyber watchdog is offline.
Make sure to subscribe to our podcast on Spotify and Apple Podcasts for more technology insights every Friday at 6 PM (PDT), as well as check out our website at www.frostyos.com.
A third-party age verification service for Discord was breached, exposing the government IDs and personal data of 70,000 users. In this episode, we unpack how a small vendor’s mistake spiraled into a platform-wide reputational crisis, the risks of refusing ransom demands, and what every company should do to govern third-party security before it’s too late.
Make sure to subscribe to our podcast on Spotify and Apple Podcasts for more technology insights every Friday at 6 PM (PDT), as well as check out our website at www.frostyos.com.
A fire at a government data center in Daejeon, South Korea, crippled national services — from postal systems and banking transactions to school records and IDs. It wasn’t a hack, but the consequences felt identical to a cyberattack. In this episode, we unpack what went wrong, why centralization creates systemic fragility, and how resilience planning must cover both cyber and physical risks.
Make sure to subscribe to our podcast on Spotify and Apple Podcasts for more technology insights every Friday at 6 PM (PDT), as well as check out our website at www.frostyos.com.
A cyberattack on Collins Aerospace’s MUSE boarding system crippled European airports, forcing manual check-ins and delaying flights across the continent. In this episode, we unpack how one vendor’s compromise cascaded through critical infrastructure, the hidden cost of centralized dependencies, and what resilience strategies organizations must adopt to survive vendor failures.
Make sure to subscribe to our podcast on Spotify and Apple Podcasts for more technology insights every Friday at 6 PM (PDT), as well as check out our website at www.frostyos.com.
Generative AI isn’t just a productivity tool — it’s a force multiplier for attackers. From hidden instructions in emails and images to AI-assisted credential harvesting and semi-autonomous ransomware runs, hackers are weaponizing models today. In this episode we explain how these attacks work, why companies are vulnerable, and what practical defenses (prompt hygiene, AI logging, tabletop drills, and AI-driven detection) every organization should deploy now.
Make sure to subscribe to our podcast on Spotify and Apple Podcasts for more technology insights every Friday at 6 PM (PDT), as well as check out our website at www.frostyos.com.
A 19-year-old hacker breached PowerSchool, exposing sensitive records of 880,000 students and teachers in Texas—including SSNs, medical, and disability information. In this episode, we unpack how basic security failures like missing MFA and weak encryption led to disaster, what this means for EdTech vendors and schools, and how to protect student data from future attacks.
Make sure to subscribe to our podcast on Spotify and Apple Podcasts for more technology insights every Friday at 6 PM (PDT), as well as check out our website at www.frostyos.com.
WhatsApp has revealed a zero-day vulnerability that let attackers deploy spyware on Apple devices—before urgently patching the flaw. In this episode, we dive into how the exploit worked, why mobile threats are escalating, and what users and businesses must do to protect themselves from the next wave of zero-day attacks.
Make sure to subscribe to our podcast on Spotify, Apple Podcasts, and the other big platforms for more technology insights every Friday at 6 PM (PDT), as well as check out our website at www.frostyos.com.
Episode 40: When Outsourcing Crosses the Line: Pentagon vs. Microsoft
Hackers are using Skype to spread GodRAT, a stealthy Remote Access Trojan that hides inside innocent-looking images and screensavers. In this episode, we break down how legacy tools like Skype can become modern attack vectors, the risks of trusting familiar apps, and what businesses must do to protect themselves.
Make sure to subscribe to our podcast on Spotify and Apple Podcasts for more technology insights every Friday at 6 PM (PDT), as well as check out our website at www.frostyos.com.
Google warned the world about a Salesforce-targeting phishing campaign—then fell for it themselves. ShinyHunters used slick voice phishing to trick staff into exposing SMB contact data. In this episode, we break down how even tech giants get hooked, why human-centered attacks work, and the simple prevention steps your business needs before it’s next.Make sure to subscribe to our podcast on Spotify and Apple Podcasts for more technology insights every Friday at 6 PM (PDT), as well as check out our website at www.frostyos.com.
This episode of the Technology Risk Podcast we spotlight a devastating privacy breach involving the Tea app, a dating and discussion platform built around trust and anonymity. When thousands of user IDs, private messages, and sensitive images were exposed due to poor cloud security, it revealed a disturbing truth: privacy failures in trust-based apps hit the most vulnerable the hardest. We examine what went wrong—from overcollection of sensitive data to opaque handling practices—and explore the real-world consequences, including harassment, psychological harm, and reputational fallout. More importantly, we outline clear, actionable strategies for building privacy-first apps, from anonymization and data minimization to transparent user policies and strong security protocols. Make sure to subscribe to our podcast on Spotify and Apple Podcasts for more technology insights every Friday at 6 PM (PDT), as well as check out our website at www.frostyos.com.
This episode of the Technology Risk Podcast we examine the alarming disappearance of cybersecurity oversight in the U.S.—after the government abruptly disbanded the Cyber Safety Review Board. This independent agency once investigated major cyber incidents like the Salt Typhoon ISP breaches. Now, its absence signals a deeper risk: the erosion of transparency, accountability, and public trust in cyber defense. We explore what happens when no one’s watching the watchdogs, from increased breach risks and regulatory confusion to reputational fallout. You'll also hear strategies for maintaining internal accountability, advocating for oversight, and fostering industry collaboration in an oversight vacuum. Make sure to subscribe to our podcast on Spotify and Apple Podcasts for more technology insights every Friday at 6 PM (PDT), as well as check out our website at www.frostyos.com.
This episode of the Technology Risk Podcast we explore the rise of youth-led cybercrime—and how teenage hackers are outsmarting some of the world’s largest companies. Meet Scattered Spider, a group of highly skilled, college-aged cybercriminals behind major breaches at airlines, insurers, and retailers. Using tactics like SIM-swapping, social engineering, and impersonation, they’re bypassing sophisticated defenses and exposing costly corporate vulnerabilities. We dive into why these attackers are so effective, what makes them different, and how your organization can fight back. From identity verification protocols to Zero Trust architecture and simulated attack training, we break down practical steps to strengthen your defenses. Make sure to subscribe to our podcast on Spotify and Apple Podcasts for more technology insights every Friday at 6 PM (PDT), as well as check out our website at www.frostyos.com.
This episode of the Technology Risk Podcast we explore one of the most chilling frontiers of AI misuse: voice-based deepfakes. When foreign officials were tricked by an AI-generated impersonation of a U.S. senator, the diplomatic world got a wake-up call. We break down how sophisticated voice deepfakes are fueling new forms of social engineering—threatening governments, businesses, and public trust. From financial fraud and regulatory risk to trust decay on a geopolitical scale, we cover what makes these attacks so effective and how you can defend against them. We share prevention strategies like deepfake detection tools, employee training, and secure communication protocols, along with real-world examples of success and failure. Make sure to subscribe to our podcast on Spotify and Apple Podcasts for more technology insights every Friday at 6 PM (PDT), as well as check out our website at www.frostyos.com.
This episode of the Technology Risk Podcast we dive into a rapidly emerging threat: AI chatbots that accidentally spill your company’s secrets. When a Salesforce-integrated chatbot leaked confidential client data in mid-2025, it exposed just how vulnerable businesses can be when deploying AI tools without proper safeguards. We break down how misconfigurations, weak prompt sanitization, and lack of governance turn chatbots from helpful assistants into major liabilities. Through real-world examples, we show the regulatory, reputational, and financial consequences of getting it wrong—and provide a clear roadmap to get it right. From isolating sensitive data to implementing strong AI governance and continuous monitoring, this episode equips you with essential strategies to make your AI chatbots secure and compliant. Make sure to subscribe to our podcast on Spotify and Apple Podcasts for more technology insights every Friday at 6 PM (PDT), as well as check out our website at www.frostyos.com.
This episode of the Technology Risk Podcast we dive into the ironic and alarming reality of employee monitoring tools becoming security threats themselves. What was meant to protect productivity and data is now exposing companies to privacy breaches, regulatory fines, and reputational fallout. We break down a real-world breach involving over 21 million leaked screenshots, unpack the hidden risks like overcollection and weak access controls, and explore the ethical dilemmas these tools raise. You’ll also hear best practices for secure, transparent monitoring—from strong encryption and access controls to building employee trust. If your company uses any form of monitoring software, this episode is a must-listen. Make sure to subscribe to our podcast on Spotify and Apple Podcasts for more technology insights every Friday at 6 PM (PDT), as well as check out our website at www.frostyos.com.
This episode of the Technology Risk Podcast we ask a critical question: are we moving too fast with AI? As OpenAI, Google, Meta, and others race to release powerful tools, the push for market dominance is outpacing safety, regulation, and ethics. We explore how this rapid innovation introduces hidden risks—rushed deployments, cybersecurity gaps, regulatory exposure, and societal harm—and why short-term gains often come at long-term cost. Through real-world examples, we reveal the consequences of cutting corners and the advantages of responsible innovation. We also share strategies for balancing speed with safety, including ethical frameworks, regulatory collaboration, and transparent development practices. Make sure to subscribe to our podcast on Spotify and Apple Podcasts for more technology insights every Friday at 6 PM (PDT), as well as check out our website at www.frostyos.com.