[00:00] Aaron Cole: Welcome to Prime Cyber Insights.
[00:02] Aaron Cole: We're starting with a brutal reality check today.
[00:06] Aaron Cole: The patch or perish window is now measured in hours, not weeks.
[00:11] Aaron Cole: The attack surface is exploding and our defenses are being tested like never before.
[00:16] Chad Thompson: Joining us today is Chad Thompson, who brings a systems-level perspective on AI, automation, and security, blending technical depth and creative insight from both engineering and music production.
[00:30] Chad Thompson: Chad, it is great to have you back.
[00:32] Lauren Mitchell: Thanks.
[00:34] Lauren Mitchell: Looking at the landscape right now, it feels like we're in a high-speed feedback loop.
[00:39] Lauren Mitchell: I mean, security analysts are forecasting over 50,000 CVEs for 2026.
[00:45] Lauren Mitchell: That's a 25% jump from last year, driven largely by the sheer volume of IoT and AI-powered applications hitting the market.
[00:55] Aaron Cole: It's not just the volume, the speed is terrifying.
[01:00] Aaron Cole: New research shows the average time between disclosure and exploitation has dropped to 4.2 days.
[01:06] Aaron Cole: In 2024, we had 22 days.
[01:09] Aaron Cole: Now look at Apple.
[01:10] Aaron Cole: They just pushed an emergency patch for CVE 2026, their third zero day in as many weeks.
[01:16] Aaron Cole: This was an extremely sophisticated attack, allowing arbitrary code execution.
[01:22] Chad Thompson: Exactly, Aaron.
[01:23] Chad Thompson: Apple is warning that high-value targets were already being exploited.
[01:28] Chad Thompson: But individual users aren't the only ones in the crosshairs.
[01:32] Chad Thompson: The Bridge Pay ransomware attack in Florida disrupted payment portals for retailers and even the city of Palm Bay.
[01:40] Chad Thompson: While card data stayed encrypted, the system-wide service disruption shows how a single point of failure in the payment stack can ripple through the real economy.
[01:50] Lauren Mitchell: It's a complex ecosystem.
[01:54] Lauren Mitchell: That's why the coordinated disclosure event we saw this week was so critical.
[01:58] Lauren Mitchell: Over 60 vendors, including Cisco, Oracle, and S-AP, released patches simultaneously through the CERT Coordination Center.
[02:07] Lauren Mitchell: From a systems perspective, this is the industry trying to harmonize its response to vulnerabilities that were actually shared months ago.
[02:16] Aaron Cole: While industry is coordinating, the government side is struggling.
[02:20] Aaron Cole: CISA Director Jen Easterly just testified that budget uncertainty is actively hampering their ability to protect critical infrastructure.
[02:29] Aaron Cole: During the recent shutdown, threat intelligence sharing delayed in monitoring capabilities were reduced.
[02:35] Aaron Cole: You can't defend a nation's network on a month-to-month budget, Lauren.
[02:39] Chad Thompson: That gap in monitoring is dangerous, especially with what Google is reporting.
[02:45] Chad Thompson: State-sponsored groups from Russia, North Korea, and Iran are now targeting defense sector employees directly through hiring processes.
[02:55] Chad Thompson: They are using AI to profile roles and salaries, even creating spoof job portals to steal credentials from aerospace and drone companies.
[03:06] Chad Thompson: It's becoming deeply personal.
[03:08] Lauren Mitchell: It really is.
[03:10] Lauren Mitchell: A personnel piece is the new perimeter.
[03:13] Lauren Mitchell: Look at that Scottsdale case where two teenagers were allegedly extorted via signal by figures known as Red and Eight to carry out a $66 million crypto theft.
[03:24] Lauren Mitchell: They even used a 3D printed gun.
[03:27] Lauren Mitchell: It's like a black mirror episode where digital extortion forces real-world criminal acts.
[03:34] Lauren Mitchell: We're seeing more of these $5 wrench attacks as digital cash becomes harder to steal remotely.
[03:39] Aaron Cole: Bottom line, the volume of threats is outpacing manual remediation.
[03:44] Aaron Cole: If you aren't looking at automated patch management and risk-based prioritization today,
[03:49] Aaron Cole: you're already behind the four-day exploit curve.
[03:52] Aaron Cole: Chad, thank you for the systems level view.
[03:55] Chad Thompson: And thank you for listening. We will continue to track these evolving threats to keep your digital
[04:01] Aaron Cole: resilience high. I'm your host, signing off for now. This has been Prime Cyber Insights.
[04:08] Aaron Cole: For the latest updates and resources, visit pci.neurlnewscast.com. Stay secure.
[04:15] Aaron Cole: Neurl Newscast is AI-assisted, human-reviewed. View our AI transparency policy at neuralnewscast.com.
✓ Full transcript loaded from separate file: transcript.txt