Deepfakes, the Death of Truth, and Verifying AI in the Enterprise: Cybersecurity Today Weekend

Cybersecurity Today Weekend: Deepfakes, the Death of Truth, and Verifying AI in the Enterprise Host Jim Love explores whether increasingly realistic deepfake videos signal a “death of truth,” arguing that loss of trust fuels cybersecurity risk because most breaches involve stolen credentials and identity rather than technical exploits. He interviews Rob Gross, CPA/attorney turned tech […]

Project Synapse April 24th 2026 World’s Longest Lightening Round

Mythos Leaks, Token Billing, Claude Routines, and OpenAI’s Big Week (Image Gen 2.0 + 5.5) The hosts attempt a chaotic “lightning round” covering major AI and tech stories: Anthropic’s Mythos tool was reportedly accessed despite being considered too dangerous to release, yet it helped find serious Firefox bugs; Microsoft is criticized for new monetization moves […]

Mythos Model Unauthorized Access

Anthropic’s “Too Dangerous” Mythos Model Leak, OpenAI’s ChatGPT Images 2.0, and AI Data Centers’ Dirty Power Fix Jim Love covers four major AI stories: reports that a private group gained unauthorized access via a third-party environment to Anthropic’s unreleased internal model “Claude Mythos,” considered too risky to release and reportedly highly effective at finding long-hidden […]

Inside The Vercel Supply Chain Exploit

Inside the Vercel Breach: Highlighting OAuth Token Risk In a special edition of Cybersecurity Today, host Jim Love and guest Jamie Blasco (CTO, Nudge Security) discuss Vercel, a major developer hosting platform, and a breach tied to OAuth grants and shadow AI. Reporting shared by Contrast Security’s David Lindner describes how a Context AI employee […]

Microsoft Faces a $2.8 Billion U.K. Lawsuit Over Cloud Pricing

Microsoft Hit With $2.8B UK Cloud Lawsuit, Meta Monitors Employees to Train AI, Firefox Fixes 271 AI-Found Bugs, and a $60B Cursor Deal? This episode covers four tech stories: a UK tribunal allowing a £2.1B ($2.8B) lawsuit accusing Microsoft of overcharging around 60,000 UK businesses for Windows Server licensing on AWS and Google Cloud while […]

Vercel Breach Started With AI Tool

Vercel Supply-Chain Breach via AI Tool, Meta Sued Over Scam Ads, and Ransomware Surges with “The Gentleman” David Shipley covers new details on the Vercel breach, which began when an employee used the third-party AI tool Context AI; after Context AI was breached, attackers leveraged Google OAuth access to pivot into Vercel systems and enumerate […]

Microsoft GitHub Changes Pricing

Microsoft Moves to Metered AI Pricing, Meta Hit With Scam Ad Lawsuit & BlackBerry Surges on NVIDIA Deal Jim Love covers multiple tech headlines on Hashtag Trending: Microsoft may shift GitHub Copilot to token-based billing and push new enterprise AI-agent licensing as Copilot adoption remains modest, signaling a move away from bundled AI toward metered […]

OpenMythos – An Open Source Reconstruction

China Closes the AI Gap, Open Mythos Hype, Data Center Backlash, and EU Age-Check App Bypassed Jim Love covers a Stanford 2026 AI Index finding that China has nearly erased the U.S. AI model performance lead, narrowing the gap to 2.7% despite U.S. private AI investment of about $286B in 2025, alongside China’s lead in […]

Security Researcher Goes To War Against Microsoft

Microsoft Under Fire, NIST Scales Back NVD, FortiSandbox Critical Bugs, Vercel Breach Claims, Scattered Spider Member Pleads Guilty Host David Shipley covers five major stories: researcher “Chaotic Eclipse” publicly released Windows exploits—first “Blue Hammer,” then “Red Sun,” a Microsoft Defender flaw enabling privilege escalation on fully patched Windows 10/11 and Server—amid claims Microsoft mistreated them, […]

Anthropic MCP Security Dispute Deepens

MCP Security Dispute, Australia’s Kids Social Media Ban Leaks, MacBook Neo Demand, and Bluetooth Tracker Naval Breach Host Jim Love covers multiple tech stories: OX Security says Anthropic’s open source Model Context Protocol (MCP) has a root design issue leading to widespread vulnerabilities, citing 10 high/critical CVEs in tools relying on MCP, over 200,000 internet-exposed […]