1
00:00:00,000 --> 00:00:03,630
Cybersecurity today would like to thank
Meter for their support in bringing you

2
00:00:03,630 --> 00:00:08,549
This podcast Meter delivers a complete
networking stack, wired, wireless and

3
00:00:08,549 --> 00:00:13,290
cellular in one integrated solution
that's built for performance and scale.

4
00:00:13,560 --> 00:00:18,119
You can find them at meter.com/cst.

5
00:00:19,141 --> 00:00:26,338
Elite iOS exploit Kit Coruna goes mass
market FBI wiretapping tools, again

6
00:00:26,338 --> 00:00:28,978
hacked by Chinese linked threat actors.

7
00:00:29,281 --> 00:00:32,746
Microsoft says attackers  have a new
click fix trick with Windows terminal.

8
00:00:33,243 --> 00:00:37,533
AWS data centers in the Middle
East, targeted in ongoing war

9
00:00:37,953 --> 00:00:42,363
and Iranian hackers becoming
increasingly active and skilled.

10
00:00:43,263 --> 00:00:47,613
This is cybersecurity today, and
I'm your host, David Shipley.

11
00:00:48,633 --> 00:00:49,473
Let's get started.

12
00:00:50,613 --> 00:00:56,853
A new and highly sophisticated iOS exploit
kit dubbed Coruna has been uncovered

13
00:00:56,853 --> 00:00:59,283
in a series of targeted cyber attacks.

14
00:01:00,229 --> 00:01:02,389
Originally reported by Bleeping Computer.

15
00:01:02,599 --> 00:01:06,379
This spyware grade toolkit has
been used in both espionage and

16
00:01:06,379 --> 00:01:10,159
financially motivated attacks,
marking a troubling shift in how

17
00:01:10,159 --> 00:01:11,929
these tools are being deployed.

18
00:01:12,784 --> 00:01:20,164
The Coruna exploit kit contains 23
separate iOS exploits, including five

19
00:01:20,164 --> 00:01:25,834
complete exploit chains that leverage
advanced non-public techniques to

20
00:01:25,834 --> 00:01:32,644
bypass security protections in iOS
versions, ranging from 13 to 17.2 0.1.

21
00:01:33,244 --> 00:01:38,734
Essentially covering devices running
software released from 2019 to late 2023.

22
00:01:39,286 --> 00:01:44,566
Google's threat Intelligence Group
or GTIG first detected the Coruna kit

23
00:01:44,596 --> 00:01:49,546
in February, 2025, initially spotting
its use by a surveillance vendor's

24
00:01:49,546 --> 00:01:52,486
client in a highly targeted operation.

25
00:01:53,266 --> 00:01:59,181
However, the toolkit has since spread and
by late 2025, it appeared on malicious

26
00:01:59,221 --> 00:02:02,056
websites linked to cryptocurrency scams.

27
00:02:02,831 --> 00:02:07,091
GTIG attributed this activity to
a financially motivated Chinese

28
00:02:07,091 --> 00:02:11,501
threat group known as UNC 66 91.

29
00:02:12,311 --> 00:02:16,361
The Coruna kit is capable of
selecting specific exploit chains

30
00:02:16,361 --> 00:02:20,381
based on the target devices, iOS
version, allowing attackers to

31
00:02:20,381 --> 00:02:24,431
take advantage of vulnerabilities
in WebKit bypass security measures

32
00:02:24,431 --> 00:02:26,291
like pointer, authentication code,

33
00:02:26,561 --> 00:02:31,211
and escalate privileges to gain
deeper control of affected devices.

34
00:02:31,991 --> 00:02:35,381
Notably, the kit was also
found to stop its activity.

35
00:02:35,381 --> 00:02:39,401
If Apple's lockdown mode or private
browsing features were enabled.

36
00:02:39,701 --> 00:02:43,311
An important reminder of how
valuable these protections can be.

37
00:02:44,756 --> 00:02:49,376
One particularly alarming aspect of
the Corona kit is its final payload,

38
00:02:49,376 --> 00:02:55,016
a stager loader called plasma loader
tracked as plasma grid, which targets

39
00:02:55,016 --> 00:02:59,666
popular cryptocurrency wallet apps
like Meta Mask, Phantom and Uni swap.

40
00:03:00,326 --> 00:03:04,496
The malware attempts to steal critical
data such as wallet recovery phrases

41
00:03:04,496 --> 00:03:08,666
and sensitive account information
by luring victims to fake finance

42
00:03:08,666 --> 00:03:10,226
and cryptocurrency websites.

43
00:03:10,893 --> 00:03:15,123
According to GTIG researchers,
stolen data is encrypted and sent to

44
00:03:15,123 --> 00:03:19,473
command and control servers, which
use a domain generation algorithm for

45
00:03:19,473 --> 00:03:21,873
resilience against take down attempts.

46
00:03:22,323 --> 00:03:26,433
While the exact circumstances of
Coruna's proliferation remain unclear,

47
00:03:26,613 --> 00:03:32,103
experts believe it represents a broader
trend of advanced spyware tools once

48
00:03:32,103 --> 00:03:36,273
used nearly exclusively by nation
states and surveillance vendors.

49
00:03:36,708 --> 00:03:40,534
Falling into the hands of cyber
criminals, mobile security

50
00:03:40,534 --> 00:03:42,934
firm, I verify, called Coruna.

51
00:03:42,994 --> 00:03:47,404
A quote, clear example, end quote of
how sophisticated capabilities once

52
00:03:47,404 --> 00:03:51,304
reserved for high value targets, like
government officials are now being

53
00:03:51,304 --> 00:03:53,644
weaponized against everyday people.

54
00:03:54,574 --> 00:03:58,624
This evolution in the mobile threat
landscape highlights why staying

55
00:03:58,624 --> 00:04:02,494
vigilant about software updates
and enabling features like lockdown

56
00:04:02,494 --> 00:04:05,194
mode is more critical than ever.

57
00:04:06,771 --> 00:04:11,571
The FBI is currently investigating a
potential cybersecurity breach involving

58
00:04:11,571 --> 00:04:16,071
one of its most important internal
platforms, raising concerns about threats

59
00:04:16,071 --> 00:04:17,661
to sensitive law enforcement data.

60
00:04:18,396 --> 00:04:21,456
The incident, which occurred in
February, centered around the

61
00:04:21,486 --> 00:04:25,596
FBI's digital Collection System
Network reports the record.

62
00:04:26,346 --> 00:04:30,336
The system supports wiretaps,
pen register, surveillance tools,

63
00:04:30,336 --> 00:04:34,146
and other intelligence gathering
mechanisms used for criminal and

64
00:04:34,146 --> 00:04:36,006
national security investigations.

65
00:04:36,704 --> 00:04:40,749
The breach was reportedly discovered
on February 17th when irregular

66
00:04:40,749 --> 00:04:42,669
network activity was detected.

67
00:04:43,374 --> 00:04:47,394
In a statement to the record, an
FBI spokesperson confirmed that

68
00:04:47,394 --> 00:04:51,384
they had identified and addressed
suspicious activities on FBI

69
00:04:51,384 --> 00:04:55,704
networks and had leveraged all
technical capabilities to respond.

70
00:04:55,704 --> 00:04:55,734
Uh.

71
00:04:56,439 --> 00:05:00,099
The investigation has now expanded
to include the White House, the

72
00:05:00,099 --> 00:05:03,849
Department of Homeland Security,
and the National Security Agency.

73
00:05:04,389 --> 00:05:07,989
While the affected system is
described as unclassified, it

74
00:05:07,989 --> 00:05:12,189
does store sensitive information
related to ongoing investigations

75
00:05:12,429 --> 00:05:14,049
and surveillance operations.

76
00:05:14,049 --> 00:05:17,919
According to a letter sent to
Congress, the attackers may have

77
00:05:17,919 --> 00:05:22,599
gained access via an internet service
provider used as a vendor by the FBI.

78
00:05:23,754 --> 00:05:27,924
This raises significant concerns about
the security of third party vendors

79
00:05:27,924 --> 00:05:32,424
and the potential vulnerabilities they
introduce into these critical national

80
00:05:32,424 --> 00:05:34,764
security and law enforcement systems.

81
00:05:36,234 --> 00:05:39,354
This breach is the latest
in a series of cyber attacks

82
00:05:39,354 --> 00:05:41,334
targeting US federal agencies.

83
00:05:41,844 --> 00:05:46,194
In 2024, Chinese state sponsored
hackers connected to the Salt

84
00:05:46,194 --> 00:05:50,934
Typhoon operation were discovered to
have breach systems used by US law

85
00:05:50,934 --> 00:05:53,214
enforcement agencies for wiretaps.

86
00:05:53,664 --> 00:05:58,194
More recently, the US Marshal Service
and federal court systems have also

87
00:05:58,194 --> 00:06:02,449
fallen victim to cyber attacks, including
ransomware and other data breaches.

88
00:06:03,744 --> 00:06:07,704
While few details of the February incident
have been disclosed, it underscores the

89
00:06:07,704 --> 00:06:12,084
importance of securing critical systems
and vendor relationships against both

90
00:06:12,084 --> 00:06:14,094
nation state hackers and cyber criminals.

91
00:06:15,129 --> 00:06:18,369
The FBI's efforts to contain and
investigate this breach, highlight

92
00:06:18,369 --> 00:06:22,839
the ongoing challenges agencies face
in protecting sensitive information

93
00:06:22,869 --> 00:06:27,939
and systems against increasingly
persistent and sophisticated adversaries.

94
00:06:28,869 --> 00:06:33,309
This story also highlights why so many
cybersecurity and privacy advocate.

95
00:06:33,379 --> 00:06:38,569
Push back regularly against any notion of
a government back doors into encryption

96
00:06:38,569 --> 00:06:41,329
services used by the regular public.

97
00:06:41,569 --> 00:06:46,609
As such, capabilities can be abused
and even more worrisome, hijacked by

98
00:06:46,609 --> 00:06:51,199
these very same hostile nation states
or potentially by criminal groups.

99
00:06:52,159 --> 00:06:56,839
Microsoft has revealed details of a
new twist on the sophisticated Click

100
00:06:56,839 --> 00:06:58,759
Fix social engineering campaign.

101
00:06:59,509 --> 00:07:03,919
This time, criminals are exploiting
the Windows Terminal app as part

102
00:07:03,919 --> 00:07:07,579
of an elaborate attack chain to
deploy the Luma Steeler malware.

103
00:07:08,339 --> 00:07:12,659
The campaign first observed in
February, 2026 underscores how

104
00:07:12,659 --> 00:07:16,409
attackers are leveraging legitimate
tools to bypass security defenses

105
00:07:16,499 --> 00:07:19,079
and compromise unsuspecting users.

106
00:07:20,329 --> 00:07:23,959
Instead of relying on the traditional
method of tricking users into pasting

107
00:07:23,959 --> 00:07:28,489
malicious commands into the Windows
Run dialogue box, the attackers

108
00:07:28,489 --> 00:07:30,769
employed an interesting evolution.

109
00:07:31,279 --> 00:07:37,459
They instructed targets to instead
use the Windows plus x plus I shortcut

110
00:07:37,489 --> 00:07:39,589
to launch the Windows Terminal app.

111
00:07:39,889 --> 00:07:45,469
WT exe a program often used by IT
professionals for administrative tasks.

112
00:07:46,554 --> 00:07:50,694
This strategy made the attack me
appear more legitimate and bypassed

113
00:07:50,724 --> 00:07:55,974
some existing detections designed to
flag suspicious run dialogue abuse.

114
00:07:58,024 --> 00:08:02,374
Once users opened Windows terminal
and pasted a specially crafted hex

115
00:08:02,374 --> 00:08:08,974
encoded X or compressed command from a
click fix lure page, the attack began.

116
00:08:09,574 --> 00:08:12,994
The command spawned additional
terminal and PowerShell instances,

117
00:08:13,084 --> 00:08:17,434
ultimately invoking a PowerShell
process to decode the malicious script.

118
00:08:18,034 --> 00:08:21,119
From there, the attack
unfolded in the usual stages.

119
00:08:21,930 --> 00:08:25,740
Number one, a zip payload and
a renamed seven zip binary were

120
00:08:25,740 --> 00:08:29,390
downloaded with the binary,
extracting the zip files, contents.

121
00:08:30,020 --> 00:08:32,990
Additional payloads were then
retrieved, and persistence was

122
00:08:32,990 --> 00:08:34,940
established using scheduled tasks.

123
00:08:35,985 --> 00:08:39,065
Microsoft Defender exclusions were
configured to evade detection.

124
00:08:40,040 --> 00:08:44,390
Machine and network data were then
exfiltrated and the Luma Steeler

125
00:08:44,390 --> 00:08:48,770
malware was deployed by injecting
malicious code into Chrome XE and

126
00:08:48,830 --> 00:08:53,720
Ms. Edge XE processes, allowing the
attackers to harvest sensitive browser

127
00:08:53,720 --> 00:08:56,330
data, such as save credentials.

128
00:08:57,110 --> 00:09:00,650
A second attack pathway was also
detected involving the use of a

129
00:09:00,650 --> 00:09:05,690
batch script to write and execute a
visual basic script via MS. Build xe.

130
00:09:06,110 --> 00:09:08,960
This method abused living
off the land binaries.

131
00:09:09,575 --> 00:09:11,405
To further evade detection.

132
00:09:12,185 --> 00:09:15,425
The campaign also incorporated
techniques like connecting to crypto

133
00:09:15,455 --> 00:09:20,195
blockchain RPC endpoints and leveraging
ether hiding for further obfuscation.

134
00:09:21,800 --> 00:09:25,340
The Luma Steeler malware targeted
high value browser artifacts,

135
00:09:25,340 --> 00:09:29,210
including stored login credentials and
exfiltrated the stolen informations

136
00:09:29,510 --> 00:09:31,370
to attacker controlled infrastructure.

137
00:09:31,970 --> 00:09:36,110
This campaign demonstrates the increased
use of legitimate tools by threat actors

138
00:09:36,110 --> 00:09:40,340
to execute complex attacks while evading
traditional detection mechanisms.

139
00:09:41,630 --> 00:09:44,810
These kinds of attacks also
don't look like the kinds of

140
00:09:44,810 --> 00:09:48,620
phishing that many people have
been trained on for many years.

141
00:09:49,280 --> 00:09:53,180
By asking people to validate that
they're human or fix a problem,

142
00:09:53,450 --> 00:09:59,150
they can get users to execute these
commands with surprising effectiveness.

143
00:10:00,717 --> 00:10:04,527
And now we turn to cyber related
coverage for the ongoing Iran war.

144
00:10:05,517 --> 00:10:07,377
Iranian State-sponsored hacking group.

145
00:10:07,377 --> 00:10:11,037
Muddy Water, also known as seed
Worm, has been linked to a series

146
00:10:11,037 --> 00:10:14,727
of sophisticated cyber attacks
targeting US and Israeli networks.

147
00:10:14,937 --> 00:10:19,227
According to new research from Broadcom
Semantic and Carbon Black threat

148
00:10:19,227 --> 00:10:24,747
hunting teams, the group affiliated
with  Iran's Ministry of Intelligence

149
00:10:24,747 --> 00:10:28,767
and security has been observed
infiltrating networks of US banks,

150
00:10:28,827 --> 00:10:33,957
airports, nonprofit organizations, and
the Israeli branch of a software company.

151
00:10:34,752 --> 00:10:39,072
The campaign, which reportedly began
in early February has escalated

152
00:10:39,072 --> 00:10:43,512
in the wake of the recent US and
Israeli military strikes on Iran.

153
00:10:44,082 --> 00:10:47,922
Muddy Water is using new tools in
these attacks, including a previously

154
00:10:47,922 --> 00:10:53,862
unknown backdoor dubbed din door, which
relies on the Dino JavaScript runtime.

155
00:10:54,367 --> 00:10:59,287
Additionally, a Python based backdoor
called fake set has been identified on the

156
00:10:59,287 --> 00:11:04,057
networks of a US airport and a nonprofit
downloaded from servers belonging to

157
00:11:04,057 --> 00:11:05,887
the American Cloud Storage Company.

158
00:11:06,217 --> 00:11:06,697
Backblaze.

159
00:11:07,430 --> 00:11:11,360
Notably, these attacks highlight
advanced tactics such as leveraging

160
00:11:11,360 --> 00:11:15,530
cloud storage services like Wasabi
and Backblaze for data exfiltration.

161
00:11:16,375 --> 00:11:19,975
Symantec and Carbon Black researchers
noted that digital certificates

162
00:11:19,975 --> 00:11:23,695
used in these attacks have also been
linked to other Muddy Water malware

163
00:11:23,695 --> 00:11:28,345
families, reinforcing the attribution
to the Iranian state sponsored group.

164
00:11:29,365 --> 00:11:33,025
This latest revelation is part of
a broader wave of cyber attacks

165
00:11:33,025 --> 00:11:34,765
tied to the ongoing Middle East.

166
00:11:36,235 --> 00:11:40,465
In recent months, Iranian link groups and
their proxies have ramped up offensive

167
00:11:40,465 --> 00:11:44,305
cyber operations targeting critical
infrastructure in Gulf States like the

168
00:11:44,305 --> 00:11:47,395
UAE, Qatar and Bahrain, as well as Israel.

169
00:11:48,730 --> 00:11:54,970
Here's a quick recap of known recent
activity first wiper campaigns in Israel.

170
00:11:55,150 --> 00:11:59,200
Multiple wiper malware campaigns have
been launched against Israeli energy,

171
00:11:59,200 --> 00:12:01,750
financial government, and utility sectors.

172
00:12:02,170 --> 00:12:06,790
Iran's wiper arsenal includes
over 15 malware families, such as

173
00:12:06,790 --> 00:12:08,980
Zero, Clear Meteor and Dust Man.

174
00:12:10,195 --> 00:12:14,545
Second surveillance system exploits
Iranian aligned threat actors

175
00:12:14,545 --> 00:12:17,605
have increased their targeting of
vulnerable surveillance cameras

176
00:12:17,605 --> 00:12:20,005
in Israel and in Gulf nations.

177
00:12:20,695 --> 00:12:24,235
These attacks are suspected to
assist military operations and

178
00:12:24,235 --> 00:12:28,435
even in missile and drone targeting
according to checkpoint researchers.

179
00:12:28,850 --> 00:12:29,930
And that makes sense.

180
00:12:29,990 --> 00:12:34,250
This is the exact same playbook that
Israel and the United States used

181
00:12:34,250 --> 00:12:37,970
in the targeted killing of Iran's
supreme leader by hacking into

182
00:12:37,970 --> 00:12:40,070
Tehran's traffic camera network.

183
00:12:40,867 --> 00:12:45,697
It's not just Iranian activists and other
nation state folks getting involved.

184
00:12:45,847 --> 00:12:50,437
pro-Russian linked activists are
also ramping up in support of Iran.

185
00:12:50,977 --> 00:12:56,347
Groups like ELA Hack and 3 1 3 Team have
targeted industrial control systems and

186
00:12:56,347 --> 00:12:58,117
government portals in the Middle East.

187
00:12:58,717 --> 00:13:02,947
Meanwhile, Z Pen test, a pro-Russian
hacktivist group have claimed

188
00:13:02,947 --> 00:13:05,347
responsibility for compromising US-based.

189
00:13:05,587 --> 00:13:11,587
ICS SCADA systems and CCTV networks
during Operation Epic Fury.

190
00:13:12,304 --> 00:13:16,564
This news comes amidst other
news reports that Russia is

191
00:13:16,564 --> 00:13:21,249
providing Iran with targeting
information to help in its efforts.

192
00:13:22,834 --> 00:13:26,194
Experts warn that these developments
illustrate the growing maturity

193
00:13:26,194 --> 00:13:27,964
of Iran's cyber capabilities.

194
00:13:28,324 --> 00:13:32,254
Rather than relying on cutting edge
zero day exploits, Iranian operators are

195
00:13:32,254 --> 00:13:37,024
employing repeatable, proven tactics like
credential theft, social engineering, and

196
00:13:37,024 --> 00:13:38,434
exploitation of known vulnerabilities.

197
00:13:39,599 --> 00:13:42,989
The focus for them right now is
maintaining persistence in enterprise

198
00:13:42,989 --> 00:13:46,019
environments and leveraging cloud
infrastructure as part of their

199
00:13:46,019 --> 00:13:50,429
operations as the Middle East
remains a geopolitical flashpoint.

200
00:13:50,999 --> 00:13:55,139
Folks like the Canadian Center for
Cybersecurity and others, including CISA,

201
00:13:55,169 --> 00:14:01,079
have issued advisories and warnings about
the Iranian threat on the cyber front, and

202
00:14:01,199 --> 00:14:05,369
warning that it may increasingly target
critical infrastructure in retaliation

203
00:14:05,369 --> 00:14:07,349
for the ongoing military action.

204
00:14:08,404 --> 00:14:11,824
Organizations are urged to
adopt a proactive stance in

205
00:14:11,824 --> 00:14:13,264
their cybersecurity strategies.

206
00:14:13,804 --> 00:14:17,104
That includes strengthening
monitoring capabilities where possible

207
00:14:17,464 --> 00:14:20,464
limiting exposure to the internet,
and restricting remote access to

208
00:14:20,464 --> 00:14:25,984
operational technology, OT systems,
particularly, um, any of these vulnerable

209
00:14:25,984 --> 00:14:28,814
CCTV, , IP camera connected systems.

210
00:14:29,609 --> 00:14:33,329
Implementing phishing resistant
multifactor authentication, segmenting

211
00:14:33,329 --> 00:14:37,709
networks, and maintaining good
validated backups, and regularly

212
00:14:37,709 --> 00:14:41,879
updating applications including
firewalls and other edge devices.

213
00:14:42,779 --> 00:14:45,989
In the words of Adam Meyers, head
of Counter Advisory operations at

214
00:14:45,989 --> 00:14:49,439
CrowdStrike, quote, Western organizations
should continue to remain on a high

215
00:14:49,439 --> 00:14:51,389
alert for potential cyber responses.

216
00:14:51,779 --> 00:14:56,369
As the conflict continues, activity
may escalate beyond hacktivism

217
00:14:56,459 --> 00:14:58,559
into more destructive operations.

218
00:14:59,642 --> 00:15:04,682
On that note, last week, Iranian
drones struck three Amazon Web Services

219
00:15:04,682 --> 00:15:08,837
data centers located in the United
Arab Emirates and Bahrain sparking

220
00:15:08,837 --> 00:15:10,797
global online service outages.

221
00:15:11,807 --> 00:15:16,277
As reported by Futurism, the attacks have
drawn significant concern as they mark

222
00:15:16,277 --> 00:15:20,807
what experts believe to be the first time
American Big tech infrastructure has been

223
00:15:20,807 --> 00:15:23,267
directly targeted in a military operation.

224
00:15:24,347 --> 00:15:27,557
According to Amazon, the strikes
caused significant damage to their

225
00:15:27,557 --> 00:15:30,557
infrastructure, disrupting power
delivery, and even triggering

226
00:15:30,557 --> 00:15:33,902
fire suppression systems that
resulted in further water damage.

227
00:15:34,917 --> 00:15:39,027
Iranian state affiliated media claimed
that Microsoft facilities were also

228
00:15:39,027 --> 00:15:42,927
targeted, though no disruptions have
been reported by Microsoft to date.

229
00:15:43,690 --> 00:15:47,140
The attacks highlight the growing
risks faced by data centers, which are

230
00:15:47,140 --> 00:15:51,250
increasingly being recognized as critical
infrastructure on the modern battlefield.

231
00:15:51,790 --> 00:15:54,130
The Middle East has
become a hotspot for US.

232
00:15:54,130 --> 00:15:59,500
Hyperscalers companies like Amazon,
Microsoft, and Google operate large scale

233
00:15:59,500 --> 00:16:01,660
cloud computing platforms in the region.

234
00:16:02,170 --> 00:16:06,190
This growing presence puts American
assets in the region at greater risk.

235
00:16:07,345 --> 00:16:11,425
Patrick Murphy, executive Director of
the Geopolitical Unit at Hilco Global

236
00:16:11,635 --> 00:16:16,375
pointed out that the attacks represent a
shift in focus for Iran and its proxies.

237
00:16:16,705 --> 00:16:20,935
Historically, oil fields were the
primary target in the region, but now

238
00:16:20,965 --> 00:16:24,955
these strikes demonstrate that these
data centers are viewed as equally

239
00:16:24,955 --> 00:16:30,235
important to their respective countries
and maybe potentially more vulnerable.

240
00:16:30,942 --> 00:16:35,152
Experts warn that fortifying data centers
against attacks could prove challenging

241
00:16:35,182 --> 00:16:38,332
as vital components like turbines,
air conditioning units, and other

242
00:16:38,332 --> 00:16:40,972
exposed systems can be easily targeted.

243
00:16:42,022 --> 00:16:45,202
The incident also underscores the
growing importance of data centers in

244
00:16:45,202 --> 00:16:48,442
the global economy, particularly with
the rise of artificial intelligence.

245
00:16:48,717 --> 00:16:52,227
Companies like OpenAI and Nvidia
are investing heavily in the Middle

246
00:16:52,227 --> 00:16:55,797
East, driven by the increased
demand for computing power required

247
00:16:55,797 --> 00:16:57,897
to support advanced AI systems.

248
00:16:58,257 --> 00:17:01,557
However, as these facilities
become more critical, they also

249
00:17:01,557 --> 00:17:03,007
become more valuable to hit.

250
00:17:04,237 --> 00:17:07,657
Amazon has acknowledged the risks
posed by the ongoing geopolitical

251
00:17:07,657 --> 00:17:11,557
instability in the region, and has
urged clients to migrate workloads outta

252
00:17:11,557 --> 00:17:14,197
the Middle East to other AWS regions.

253
00:17:14,257 --> 00:17:18,067
As a precaution, the company
stated that the broader operating

254
00:17:18,067 --> 00:17:22,057
environment in the Middle East remains
unpredictable and it is working

255
00:17:22,117 --> 00:17:23,587
to restore the damage facilities.

256
00:17:24,474 --> 00:17:28,394
The incident serves as a stark reminder
that as technology evolves, so too,

257
00:17:28,424 --> 00:17:33,164
does the nature of modern warfare data
centers once seen as mere enablers

258
00:17:33,164 --> 00:17:37,394
of the digital economy are emerging
as strategic national assets that

259
00:17:37,394 --> 00:17:40,964
require the same level of protection
as traditional critical infrastructure

260
00:17:41,114 --> 00:17:42,629
like energy and water systems.

261
00:17:44,544 --> 00:17:49,034
We covered the opening cyber impacts
tied to the Iran War in Saturday's Month.

262
00:17:49,034 --> 00:17:52,724
In Review panel discussion, it's
well worth a listen if you're

263
00:17:52,724 --> 00:17:56,024
following the conflict and the
evolution of cyber warfare.

264
00:17:57,734 --> 00:18:01,964
That's cybersecurity today
for Monday, March 9th, 2026.

265
00:18:02,414 --> 00:18:04,289
I've been your host, David Shipley.

266
00:18:05,204 --> 00:18:07,994
Thanks for listening and thanks
for your continued support.

267
00:18:08,699 --> 00:18:13,109
Please keep leaving reviews, ratings,
and sharing the show with others.

268
00:18:13,439 --> 00:18:17,219
We'd love to continue to reach even
more people, and we need your help.

269
00:18:18,239 --> 00:18:20,999
To the listener who left the
recent review, complimenting

270
00:18:20,999 --> 00:18:25,139
my pronunciation of Venezuela's
State owned Oil Company, Pedevesa.

271
00:18:25,259 --> 00:18:29,979
Thank you and thank you for the tip
on improving how I pronounce Caracas.

272
00:18:30,689 --> 00:18:31,739
Thanks so much.

273
00:18:31,919 --> 00:18:32,999
Have a wonderful week.

274
00:18:33,269 --> 00:18:33,959
Stay safe.

275
00:18:33,985 --> 00:18:34,733
Saturday morning.

276
00:18:35,733 --> 00:18:40,893
And finally, we'd like to thank
our sponsor meter for their support

277
00:18:40,893 --> 00:18:45,033
in bringing you this podcast Meter
delivers full stack networking

278
00:18:45,063 --> 00:18:49,743
infrastructure, wired, wireless and
cellular to leading enterprises.

279
00:18:50,043 --> 00:18:54,453
Working with their partners, meter
designs, deploys and manages everything

280
00:18:54,453 --> 00:18:59,223
required to get performant, reliable
and secure connectivity in a space

281
00:18:59,523 --> 00:19:01,743
they design the hardware, the firmware.

282
00:19:01,938 --> 00:19:05,628
Build the software, manage
deployments, and run support.

283
00:19:06,168 --> 00:19:09,828
It's a single integrated solution
that scales from branch offices

284
00:19:09,828 --> 00:19:13,998
to warehouses to large campuses,
all the way to data centers.

285
00:19:14,568 --> 00:19:17,988
Book a demo at meter.com/cst.

286
00:19:18,708 --> 00:19:22,608
That's METE r.com/cst.

287
00:19:23,628 --> 00:19:24,798
I'm your host, Jim Love.

288
00:19:25,698 --> 00:19:26,598
Thanks for listening.

