[00:00] Aaron Cole: Welcome to Prime Cyber Insights. I am Aaron Cole, and we are moving fast today because the federal cyber defense landscape is shifting under our feet.
[00:09] Aaron Cole: CISA is facing a major shutdown just as the threat level hits a new peak.
[00:14] Lauren Mitchell: And I'm Lauren Mitchell. We're looking at a convergence of administrative gridlock and high-stakes technical exploitation that leaves little room for error.
[00:23] Lauren Mitchell: Joining us today is Chad Thompson, who brings a systems-level perspective on AI and security,
[00:29] Lauren Mitchell: blending technical depth with insights from engineering and music production.
[00:34] Lauren Mitchell: Chad, welcome.
[00:35] Aaron Cole: Chad, good have you.
[00:36] Aaron Cole: Lauren, let's start with CISA.
[00:38] Aaron Cole: On Friday, we saw the agency move toward a partial shutdown because of a funding failure in Congress.
[00:44] Aaron Cole: We are looking at over 1,400 personnel being furloughed.
[00:49] Aaron Cole: leaving fewer than 900 people to handle the entire nation's essential cyber defense functions.
[00:55] Aaron Cole: This is happening while the agency is issuing emergency directives.
[01:00] Lauren Mitchell: Exactly, Aaron.
[01:02] Lauren Mitchell: Just this week, CISA ordered federal agencies to patch a critical Microsoft Configuration Manager vulnerability, CVE202243468,
[01:15] Lauren Mitchell: that allows unauthenticated attackers to execute commands with elevated privileges.
[01:20] Lauren Mitchell: They've also been tracking the exploitation of Beyond Trust's remote support tools.
[01:26] Lauren Mitchell: The timing couldn't be worse.
[01:27] Lauren Mitchell: We have state-sponsored groups like China-linked Silk Typhoon already targeting the U.S. Treasury through these exact flaws.
[01:36] Chad Thompson: I mean, the resource strain here is massive.
[01:39] Chad Thompson: When you lose over 60% of your security personnel, your ability to conduct assessments and stakeholder engagements disappears.
[01:47] Chad Thompson: From a systems perspective, we're removing the human monitoring layers exactly when the automated exploits, like those targeting the 11,000 exposed beyond trust instances, are accelerating.
[02:00] Chad Thompson: It's like a producer trying to mix a track with half the channels muted during the crescendo.
[02:05] Aaron Cole: And the impact isn't just domestic.
[02:08] Aaron Cole: Today, we're seeing reports of a sophisticated attack on the European Central Bank.
[02:13] Aaron Cole: It's disrupted banking services across the Eurozone, hitting ATM networks and interbank
[02:19] Aaron Cole: transfers.
[02:20] Aaron Cole: Experts are pointing toward state-sponsored actors, and it reinforces the reality that financial infrastructure is a top-tier target for disruption, not just theft.
[02:30] Lauren Mitchell: It's a global pattern.
[02:32] Lauren Mitchell: While the ECB struggles, we're also seeing the health care sector take a massive hit.
[02:37] Lauren Mitchell: A major hospital system just disclosed a breach affecting 2.3 million patients.
[02:42] Lauren Mitchell: The entry point? A compromised third-party vendor.
[02:46] Lauren Mitchell: Aaron, this goes back to our recurring theme of supply chain vulnerability.
[02:51] Lauren Mitchell: We see it in healthcare and we saw it recently with a GitHub actions flaw
[02:55] Lauren Mitchell: that could have allowed code injection into thousands of automated pipelines.
[02:59] Chad Thompson: The GitHub issue is particularly worrying because it targets the CI slash CD pipeline,
[03:05] Chad Thompson: the very heart of how we build trust in software.
[03:09] Chad Thompson: But we also need to talk about the emerging distillation attacks on AI.
[03:14] Chad Thompson: Researchers have shown that adversaries can now reverse-engineer proprietary training data
[03:19] Chad Thompson: just by analyzing query response patterns.
[03:22] Chad Thompson: If an organization thinks their private data is safe because it's inside the model,
[03:27] Chad Thompson: this research proves that's a dangerous assumption.
[03:31] Aaron Cole: You know, that AI risk is bleeding into the consumer space too.
[03:35] Aaron Cole: Smart homes are essentially becoming data harvesting hubs.
[03:40] Aaron Cole: Between AI-powered robots and always listening assistants, we're creating digital profiles of our domestic lives that are incredibly vulnerable.
[03:49] Aaron Cole: Combine that with a report of over 300 malicious Chrome extensions stealing user data and the average user is surrounded.
[03:58] Lauren Mitchell: It really highlights the need for constant vigilance, whether it's these fake IT support calls targeting remote workers or global syndicates netting billions through coordinated romance scams.
[04:10] Lauren Mitchell: The attackers are playing the long game.
[04:13] Lauren Mitchell: They are exploiting the isolation of remote work and the trust we place in our daily tools.
[04:19] Lauren Mitchell: We have to be as clinical in our defense as they are in their targeting.
[04:24] Aaron Cole: We'll be watching how CISA handles the coming week with such a reduced staff.
[04:28] Aaron Cole: It's a high-stakes moment for national security.
[04:31] Aaron Cole: Chad, thanks for joining us and bringing that systems perspective to the AI conversation.
[04:36] Lauren Mitchell: It's been a vital discussion.
[04:38] Lauren Mitchell: For more analysis on these stories, visit our website.
[04:41] Lauren Mitchell: I'm Lauren Mitchell.
[04:42] Aaron Cole: And I'm Aaron Cole.
[04:44] Aaron Cole: This has been Prime Cyber Insights.
[04:46] Aaron Cole: For the full technical breakdown, head over to pci.neuralnewscast.com.
[04:53] Aaron Cole: Stay secure.
[04:54] Aaron Cole: Neural Newscast is AI-assisted, human-reviewed.
[04:58] Aaron Cole: View our AI transparency policy at neuralnewscast.com.
✓ Full transcript loaded from separate file: transcript.txt