Good morning, Security Gang,
This week proved that cybersecurity success or failure fundamentally comes down to leadership, visibility, and cultural discipline not just technology or budget. After months of delay, the U.S. Senate finally confirmed Kirsten Davis as the Pentagon’s permanent Chief Information Officer, bringing deep cybersecurity and business modernization expertise to oversee Zero Trust rollout, cloud transformation, and software procurement at the Department of Defense.
Meanwhile, Aflac disclosed a breach affecting 22.7 million customers, agents, employees, and beneficiaries exposing claims data and Social Security numbers in what appears to be a Scattered Spider operation while Shinhan Card’s insider leak of 192,000 merchant records proved that the biggest threats often come from excessive access granted to employees who never needed it in the first place.
On the nation-state front, North Korea stole $2 billion in cryptocurrency this year while infiltrating tech companies as fake remote workers (Amazon blocked 1,800 fraudulent applicants), China hacked the UK Foreign Office accessing tens of thousands of visa records while officials bizarrely called it “low risk,” and Russia’s NoName057(16) targeted Danish elections and water utilities with living-off-the-land attacks that Western nations responded to with nothing more than “diplomatic condemnations.”
From Romania’s water agency hit by BitLocker ransomware (OT saved by segmentation) to Nova Scotia Power’s report showing how IT chaos can cripple operations even when physical systems stay online, from AI bot floods overwhelming human moderators at 17,000 illicit livestreams in 90 minutes to ServiceNow’s $7.75 billion acquisition of Armis bringing IoT/OT visibility into enterprise workflows this week demonstrated that the gap between organizations that survive and those that become case studies isn’t technology, it’s the willingness to lead with competence, segment with discipline, and operate at adversary speed.
Let’s break down the carnage and the victories—coffee ready, Security Gang, because this one spans leadership, scale, and the AI arms race.
🏛️ LEADERSHIP, GOVERNANCE & POLICY
Senate Confirms Kirsten Davis as Pentagon CIO
After months of delay, the U.S. Senate officially confirmed Kirsten Davis as the new Chief Information Officer of the Department of Defense, replacing acting CIO Katie Arrington. Davis brings leadership experience from Unilever, Barclays Africa, and Booz Allen, and will oversee the Pentagon’s Zero Trust rollout, cloud modernization, and software procurement initiatives.
This confirmation is a big deal for the Defense Department’s digital transformation. For the first time in years, the Pentagon has a permanent CIO with deep cybersecurity and business modernization expertise.
James’s assessment was clear: “Competence in leadership isn’t just refreshing — it’s national security.”
Trump Signs $901B NDAA with Record Cyber Funding
President Donald Trump signed the 2026 National Defense Authorization Act, securing $901 billion in defense spending—with major boosts to Cyber Command, NSA operations, and AI innovation.
Highlights:
$73 million for offensive digital operations
$314 million for Fort Meade infrastructure
Preservation of NSA–Cyber Command’s dual-hat structure
This is the most cyber-focused NDAA in U.S. history—a strong signal that cyber capability is now a core defense pillar, not just a support function.
NIST Releases Draft Framework for AI Security
The National Institute of Standards and Technology (NIST) released a draft “Cybersecurity Framework for AI”, mapping AI system risks to traditional CSF controls. It provides guidance on:
AI supply chain security
Data poisoning detection
Safe AI model deployment
Organizations building or buying AI systems should treat this as a blueprint for AI assurance and accountability heading into 2026. This aligns cybersecurity and AI governance practices into a unified framework.
🚨 MAJOR BREACHES & DATA EXPOSURES
Aflac Breach Impacts 22.7 Million Individuals
Aflac confirmed that 22.7 million customers, agents, employees, and beneficiaries were affected in a June 2025 breach, exposing claims data, Social Security numbers, and personal information. The company said no ransomware was involved, but the identity blast radius is enormous.
Regulators estimate at least 2 million Texans were impacted. The incident has been linked to Scattered Spider, given its signature targeting patterns.
James warned: “A breach of this scale turns claims and contact systems into open doors for fraud — so monitor for redirected payouts and credential resets like your business depends on it, because it does.”
University of Phoenix Breach: 3.5 Million Students and Alumni
The University of Phoenix disclosed a massive breach impacting 3.5 million learners and alumni, with stolen data including names, contact details, enrollment info, and student account metadata. The breach originated in enterprise systems supporting student data before attackers pivoted to mass exfiltration.
The Clop ransomware gang has claimed responsibility and added Phoenix to its leak site. This is a textbook case of identity exploitation—expect financial aid scams, phishing campaigns, and account takeovers.
Higher education institutions should:
Reset credentials
Enable phishing-resistant MFA
Deploy anomaly detection for mass PDF generation or transcript requests
Shinhan Card Insider Leaks 192,000 Merchant Records
Shinhan Card, one of South Korea’s largest financial firms, confirmed an insider attack after an employee at a sales branch exfiltrated merchant data to a recruiter. The leak impacted 192,000 merchants, including 180,000 phone numbers and 8,000 records with full names and contact info.
This wasn’t a breach—it was a failure of least privilege and data segmentation. No salesperson should have had that much access.
James was unequivocal: “Why would an employee at a sales branch have access to all your data? There’s no logical reason for it. None, none whatsoever... That’s not a data breach. That’s an insider attack because you didn’t segment your data... You need access to what you need to do your job based on your job description.”
If you’re a CISO, it’s time to:
Revisit role-based access controls
Enforce just-in-time permissions for anything involving customer or merchant data
Implement data loss prevention (DLP) with anomaly detection
Nissan Exposes 21,000 Customers via Red Hat Breach
Nissan Japan confirmed that 21,000 customers were affected by a third-party breach stemming from Red Hat’s recent incident, exposing names, physical addresses, emails, and service data. This marks Nissan’s second cyber incident this year, following the Kaleen ransomware attack earlier in 2025.
The attackers, believed to be from the Crimson Collective, exploited shared API integrations across suppliers—a clear reminder that supply chain exposure is still the biggest blind spot in automotive security.
Romania’s National Water Agency Hit by BitLocker Ransomware
Romania’s National Water Authority was hit by a BitLocker ransomware attack, encrypting workstations and servers but leaving OT systems like dams and flood defenses untouched. Authorities confirmed hydrotechnical operations remain safe, thanks to strict segmentation between IT and OT environments.
Attackers used living-off-the-land (LOLBin) tools to evade detection, manipulating built-in Windows binaries to traverse the network. The Romanian National Directorate of Cybersecurity issued a statement warning against negotiation and ransom payment, aligning with EU best practice.
James noted: “Even when OT isn’t hit, taking down IT scheduling or billing can stop operations cold — that’s low-tech pressure with high-impact results.”
Nova Scotia Power Cyberattack Report Released
Months after the Nova Scotia Power breach, the company released its incident report revealing how disruptive the attack was. While OT systems stayed operational, IT systems—email, scheduling, and vendor access—came to a standstill, delaying maintenance and vendor payments.
The report (heavily redacted) shows how administrative dependencies cripple resilience even when physical systems remain safe.
James emphasized: “Paperwork and IT chaos can stop a utility cold — ransomware doesn’t have to touch a turbine to hit your bottom line.”
Key Takeaways:
Segment IT and OT networks
Gate vendor access behind VPNs, MFA, and IP allowlists
Keep offline gold images for engineers
Rehearse manual workflows for dispatch and operations
France’s La Poste Knocked Offline by Christmas DDoS
France’s La Poste, which handles both postal services and La Banque Postale banking operations, suffered a major DDoS attack just before Christmas. The volumetric assault crippled parcel tracking, label printing, and customer logins, disrupting holiday shipments and online banking access.
While no data theft occurred, operational downtime during peak holiday season caused nationwide delays. European regulators continue to warn that essential service operators must maintain DDoS thresholds and redundancy.
🎯 NATION-STATE OPERATIONS & GEOPOLITICAL THREATS
North Korea Steals $2 Billion in Crypto; Amazon Blocks 1,800 Fake IT Workers
According to multiple intelligence reports, North Korean state hackers have stolen over $2 billion this year from cryptocurrency exchanges and financial institutions. The regime has expanded its “fake remote worker” campaigns to infiltrate tech companies and launder stolen funds.
Amazon Web Services reported blocking 1,800 fraudulent job applicants, using anomaly detection and latency analysis to spot North Korean operatives posing as software contractors.
James broke it down: “This is less about crypto theft — it’s about infiltration. North Korea is weaponizing the remote economy.”
Organizations Should:
Enforce live KYC for contractors
Implement device attestation and geofencing
For financial firms: 24-hour holds on first-time crypto withdrawals
Auto-hold transactions interacting with known mixer clusters
China Hacks UK Foreign Office; Government Downplays Risk
The UK Foreign, Commonwealth, and Development Office (FCDO) confirmed it was hacked in a China-linked operation tied to APT Storm-1849, which has been active since October. The group accessed tens of thousands of visa records and government email data, exploiting unpatched Cisco firewall vulnerabilities.
Officials initially called the incident “low risk,” but when the Foreign Office gets compromised, that’s national security exposure.
James didn’t mince words: “If you call a Foreign Office breach low-risk, you’re not managing risk — you’re avoiding accountability.”
Russia Targets Danish Elections and Water Utilities
Russia-linked NoName057(16) has been blamed for cyberattacks on Danish local governments and water utilities ahead of national elections. The campaign used living-off-the-land attacks with valid credentials and scheduled task persistence, blending espionage with pre-election disruption.
This is part of Moscow’s broader push to undermine European trust in institutions—a hybrid model combining misinformation, DDoS, and destructive attacks. Western responses have been limited to diplomatic condemnations.
James’s frustration was palpable: “And the best we’re doing right now, the best some of these Western nations are doing is diplomatic. They’re not really – kick people out, limit traveling visas, tariff their trade. Do something, something of meaning, something to weaken the Russian administration within Russia... Not a lot of backbone, unfortunately, in the Western world today.”
Iran’s Infi APT Resurfaces with New Loaders and Beacons
The Infi APT, linked to Iran, has resurfaced targeting diplomatic, NGO, and policy organizations. The group is deploying custom loaders, macro abuse, and PowerShell-based beaconing for long-term persistence.
Organizations Should:
Block all macros
Enforce script execution policies
Monitor for black TLS traffic to rare ASNs
This campaign proves that regional espionage groups are thriving amid global political distraction.
🔥 CRITICAL VULNERABILITIES & ZERO-DAYS
Cisco and WatchGuard Zero-Days Under Exploitation
Two critical edge vulnerabilities are being actively exploited:
Cisco AsyncOS Zero-Day (CVE-2025-20393):
Enables root-level command execution on Secure Email and Web Manager appliances
China-linked APTs are actively abusing it
WatchGuard Firebox RCE (CVE-2025-14733):
Lets unauthenticated attackers execute code remotely
Admins should patch to firmware 12.12.4+ and disable public management
For both: patch immediately, rotate credentials, and monitor for rogue config changes.
James’s warning was stark: “If it’s on the internet and unpatched, assume it’s already compromised.”
FortiCloud Authentication Bypass Leaves 25,000 Devices Exposed
Fortinet’s FortiCloud SSO vulnerability, previously patched, remains unaddressed in tens of thousands of instances still exposed to the internet. Attackers are now exploiting unpatched FortiOS and Proxy Web Manager versions to hijack admin sessions.
James emphasized: “Edge devices are your moat and your minefield. Neglect either, and you’re inviting disaster.”
MongoDB Critical Vulnerability Patched
A critical MongoDB vulnerability was disclosed and patched—a memory leak bug allowing unauthenticated access to sensitive data when zlib network compression is enabled.
The fix is available in versions 8.2.3, 8.0.17, 7.0.28, 6.0.27, 5.0.32, and 4.4.30. If you can’t patch immediately, disable zlib compression and use Snappy or ZSTD as a workaround.
Patch before you head out for Christmas, or risk coming back to a breached database.
CISA Warns of BrickStorm Targeting U.S. Firms
CISA issued an advisory detailing BrickStorm, a living-off-the-land malware campaign leveraging runDLL32, PowerShell, and service abuse to infiltrate U.S. networks.
Organizations Should:
Block unsigned scripts
Alert on suspicious service installs
Monitor local admin creation
This campaign mixes commodity loaders with stealthy persistence, blending ransomware and espionage tactics.
🔗 SUPPLY CHAIN & VENDOR SECURITY
Docker Releases Open-Source Hardened Base Images
Docker announced open-source, minimal hardened images for developers, aimed at reducing attack surface and preventing secret leakage in builds. These images are CIS-aligned, and Docker is encouraging enterprises to mirror them internally and enforce policies requiring builds start from approved base layers.
This is a huge win for secure DevOps. Organizations should:
Scan all containers for embedded credentials
Standardize base image security before moving to production
Malicious WhatsApp API Package Found on npm
Researchers discovered a malicious npm package impersonating a WhatsApp API SDK to steal tokens and developer secrets. The fake module has thousands of downloads, targeting CI/CD pipelines and app developers.
Organizations Must:
Pin dependencies
Use private registries
Enable secret scanning for every build job
Rotate any exposed credentials immediately
This attack is a supply chain backdoor in disguise.
FCC Bans Foreign-Made Drones and Components
The FCC officially banned foreign-manufactured drones and components, particularly from China, citing national security concerns. This decision will immediately impact public sector and regulated industries using UAVs for inspections, mapping, and infrastructure monitoring.
Organizations must:
Inventory drone fleets
Replace banned components
Plan procurement shifts after the holidays
This aligns with the National Defense Authorization Act (NDAA), closing loopholes on imported hardware in sensitive U.S. infrastructure.
💰 RANSOMWARE & FINANCIAL CRIMES
DOJ Arrests 54 in Global ATM Jackpotting Scheme
The U.S. Department of Justice charged 54 individuals linked to the Tren de Aragua Venezuelan crime syndicate for deploying Ploutus ATM malware across American banks. The malware bypassed ATM security systems, forcing machines to dispense cash on command. The syndicate laundered millions through crypto and prepaid cards.
This operation shows how cybercrime turns kinetic—malware meets organized street-level theft.
James emphasized: “Cyber always turns kinetic, folks. Always. We see with how Russia does that in Europe with critical infrastructure, with gas pipelines, with so much more. We’re seeing it now with gangs in the US and in South America using cyber, turning it into kinetic... this isn’t a victimless crime. Stealing money is never victimless, every dollar stolen turns into higher insurance and fees we all pay.”
Interpol’s Operation Sentinel Takes Down 574 Cybercriminals
Interpol’s Operation Sentinel, spanning 19 countries, led to:
574 arrests
$3 million seized
Takedown of 6 ransomware strains with newly developed decryptor tools
Highlights:
Ghana: $120,000 recovered, 30 TB of data restored from 100 TB encrypted
Nigeria: 10 suspects arrested for fake fast-food scam defrauding 200 victims
Cameroon: Rapid response froze accounts within hours of identifying fraud
This operation underscores the global shift from reactive to offensive law enforcement collaboration—where arrests, decryptors, and domain takedowns hit cyber gangs’ wallets and credibility.
DOJ Takes Down $14.6M Fake Bank Ad Ring
The U.S. Department of Justice seized the adspanel.org domain used in a bank credential theft campaign, which spoofed legitimate bank ads on Google and Bing to steal login credentials. The scammers lured victims through fake sponsored search results, leading them to counterfeit bank websites.
The DOJ confirmed $14.6 million in verified losses and at least $28 million in attempted thefts.
If your company buys digital ads—verify your brand’s ad supply chain. Threat actors are laundering trust through the same ad networks your marketing team uses.
🤖 AI SECURITY & THE MACHINE-SPEED THREAT
AI Bot Attack Cripples Chinese Livestream Platform
Chinese streaming platform Kuaishou, a rival to TikTok, was hit by an AI-driven bot flood that launched 17,000 illicit livestreams in just 90 minutes, overwhelming human moderators and forcing a complete shutdown of its live section.
This is a terrifying look at automated abuse at scale—what happens when AI creates content faster than human teams can moderate.
James warned: “Your AI is only as strong as your guardrails. We’re entering an era where it’s your AI versus theirs.”
He continued: “Imagine this happening in your environment where your SOC has to manually open these tickets, and your SOC’s manually opening tickets while AI is generating stuff that’s happening a thousand times a minute. Humans can’t keep up... That’s the world we’re heading to because as attackers start to really build AI tools, humans can’t keep up. So we have to have our own AIs to defend it.”
Platforms Must:
Build velocity caps and risk-based gating
Deploy AI-assisted moderation to survive the next wave of automated exploitation
Palo Alto and Google Cloud Partner on AI Security
Palo Alto Networks and Google Cloud announced a multi-billion-dollar AI security partnership, integrating Prisma AI and Google’s Vertex/Gemini LLM platforms to unify SOC operations, app security, and posture management.
The deal marks one of the largest AI–security integrations to date—but also signals pricing pressure and consolidation coming in 2026 as renewals align across XDR, CSPM, and cloud suites.
💼 MERGERS & ACQUISITIONS
ServiceNow Acquires Armis for $7.75 Billion
ServiceNow is entering the cybersecurity big leagues with its $7.75 billion acquisition of Armis, the leading IoT and OT security platform. This is a major consolidation play—bringing OT, IoT, and medical device visibility directly into ServiceNow’s enterprise workflows and AI-driven SOC capabilities.
Armis abandoned its IPO plans in favor of this acquisition, signaling how security platforms are converging into end-to-end ecosystems.
James observed: “ServiceNow just bought its way into the SOC. Now it has to earn the trust to stay there.”
🏛️ REGULATORY & LEGAL DEVELOPMENTS
Italy Fines Apple $116 Million for Privacy Violations
Italy’s antitrust regulator fined Apple $116 million for self-preferencing and deceptive tracking practices in its App Tracking Transparency (ATT) feature. While third-party developers must ask permission to track users, Apple’s own apps reportedly bypass those restrictions, collecting behavioral data directly.
James noted: “If your privacy policy has an asterisk for yourself, that’s not privacy — that’s privilege.”
Apple plans to appeal, but this may reshape ATT enforcement across the EU.
South Korea Plans Facial Recognition for SIM Registration
South Korea announced plans to require facial recognition for SIM activation starting March 2026 to combat SIM swapping and identity fraud. Carriers will compare ID photos with real-time facial scans before issuing a new number.
While this may enhance fraud prevention, it raises privacy and data storage concerns across civil rights groups.
James cautioned: “At the end of the day, facial recognition, like passwords, like MFA, is a token. It’s a token on a device... nothing is unhackable. It’s just not done yet, has been my experience in our industry.”
🎭 OTHER NOTABLE STORIES
Spotify Cracks Down on 86 Million Scraped Songs
Spotify has disabled thousands of accounts tied to an open-source scraping operation that harvested over 86 million songs and metadata entries under the banner of “the largest open library in human history.”
The scraped data, posted publicly, poses major copyright and credential risk. Spotify is tightening API security and cracking down on automated third-party tools that fuel account takeovers and fraudulent playback networks.
Data scraping might sound harmless, but when weaponized, it becomes data laundering.
✅ YOUR COMPREHENSIVE ACTION LIST
IMMEDIATE CRITICAL PATCHING:
🌐 Cisco AsyncOS - Apply CVE-2025-20393 mitigations; restrict management interfaces
🔥 WatchGuard Firebox - Patch to firmware 12.12.4+; disable public management
☁️ FortiCloud - Patch SSO bypass; hunt for hijacked admin sessions
💾 MongoDB - Update to latest versions or disable zlib compression
🧱 CISA BrickStorm - Block unsigned scripts; monitor service installs
LEADERSHIP & GOVERNANCE:
🏛️ Track DoD leadership changes - Watch for Zero Trust rollout initiatives
📋 Align with NIST AI Framework - Blueprint for AI assurance and accountability
💼 Monitor ServiceNow-Armis integration - Impacts OT/IoT visibility strategies
📊 Review NDAA cyber funding - $901B total, $73M offensive ops, $314M Fort Meade
BREACH RESPONSE & MONITORING:
🧾 Aflac breach - Monitor for fraud tied to claims, redirects, credential resets
🎓 University of Phoenix - Watch for financial aid scams, phishing campaigns
🚗 Nissan Red Hat breach - Audit third-party vendors and downstream integrations
🇷🇴 Romania/Nova Scotia lessons - Segment IT/OT; rehearse manual continuity processes
INSIDER THREAT & ACCESS CONTROL:
🧍♂️ Enforce least privilege - Shinhan Card proves excessive access enables insider attacks
🔐 Implement just-in-time permissions - Especially for customer/merchant data
📊 Role-based access controls - Verify who has what access and why
🚨 Data loss prevention (DLP) - With anomaly detection for unusual data pulls
NATION-STATE DEFENSE:
💰 Audit remote contractor onboarding - Amazon blocked 1,800 fake North Korean IT workers
🔐 Enforce live KYC and device attestation - For all remote workers and contractors
🇨🇳 Review network telemetry - For Chinese APT indicators (Storm-1849)
🇷🇺 Segment OT systems - Mitigate living-off-the-land attacks (NoName057(16))
📜 Block macros and script execution - Against Iranian Infi APT campaigns
SUPPLY CHAIN SECURITY:
🐳 Adopt Docker hardened base images - Restrict container registries; scan for secrets
📦 Audit npm dependencies - Pin dependencies; use private registries
🚁 Inventory and replace banned UAV components - FCC foreign drone ban compliance
🔍 Rotate exposed credentials - From malicious WhatsApp API package
INFRASTRUCTURE & OT:
💧 Segment IT/OT networks aggressively - Romania and Nova Scotia lessons
🧱 Block LOLBin abuse - Living-off-the-land techniques across critical infrastructure
🔐 Gate vendor access - Behind VPNs, MFA, and IP allowlists
💾 Keep offline gold images - For engineers; rehearse manual workflows
DETECTION & THREAT HUNTING:
🔍 Hunt for rogue config changes - In edge devices after patching
🎯 Monitor for black TLS traffic - To rare ASNs (Iranian APT indicators)
🚨 Alert on suspicious service installs - BrickStorm campaign
📊 Track mass PDF generation - Or transcript requests (education sector)
TRAINING & AWARENESS:
🎭 Educate on fake bank ads - Verify domains; monitor for spoofed login pages
💳 ATM security awareness - For physical security teams
📊 Contractor vetting training - North Korean fake worker indicators
🔐 Least privilege education - For all employees with data access
🧠 JAMES AZAR’S CISO TAKE
This week’s stories illuminate a fundamental truth that every security leader must internalize: cybersecurity is leadership, not technology. The Senate’s confirmation of Kirsten Davis as Pentagon CIO represents more than just filling a vacant position it signals that competence, expertise, and strategic vision in cybersecurity leadership are finally being recognized as national security imperatives.
Meanwhile, the contrast between organizations that survive and those that become headlines comes down to cultural discipline, not budget size. Aflac’s 22.7 million exposed records and Shinhan Card’s insider leak of 192,000 merchants both prove that visibility without access control is an illusion, and that the biggest breaches stem from excessive permissions granted to people who never needed them in the first place.
When a sales branch employee can access an entire merchant database, or when IT chaos can cripple a utility despite OT systems staying operational, we’re not dealing with technical failures—we’re witnessing governance collapses where policy existed on paper but discipline failed in practice.
From Romania’s water agency saved by IT/OT segmentation to Nova Scotia Power’s painful lesson that “paperwork chaos can stop a utility cold,” the pattern is unmistakable: resilience isn’t just about detection—it’s about cultural readiness, segmentation discipline, and the willingness to operate manual workflows when digital systems fail.
The second defining theme this week is that we’ve officially entered the AI arms race where human-speed response is obsolete. When 17,000 illicit livestreams can flood a platform in 90 minutes, when North Korea can infiltrate tech companies with 1,800 fake remote workers while stealing $2 billion in crypto, when China can hack the UK Foreign Office and officials call it “low risk,” and when nation-states respond with nothing more than diplomatic statements despite Russia actively targeting elections and water utilities the gap between adversary capability and defender response has become a chasm that no amount of human effort can bridge.
ServiceNow’s $7.75 billion acquisition of Armis, Palo Alto’s multi-billion-dollar AI partnership with Google Cloud, and NIST’s new AI Cybersecurity Framework all signal that the industry recognizes we’re in total machine-speed warfare where humans can’t manually triage tickets fast enough, can’t patch systems before exploits go live, and can’t moderate content before AI bot floods overwhelm platforms.
The criminals aren’t pausing for Christmas, nation-states aren’t waiting for Western backbone to materialize, and AI-driven attacks won’t slow down because your change control board meets quarterly. The difference between organizations that survive 2026 and those that become case studies will be their willingness to lead with competence, segment with discipline, automate with purpose, and operate at adversary speed—because in a world where your AI fights theirs, the slowest responder is the first casualty.
Leadership, scale, and AI define the new battleground. Organizations led by competent leaders who segment with discipline and automate with purpose will survive. Everyone else becomes a case study.
Stay sharp, stay disciplined, lead with competence, and as always—stay cyber safe, Security Gang!
Thanks for tuning in. We’ll be back Monday at 9 AM Eastern Live with all the latest. Check out cyberhubpodcast.com



