CISA Orders Emergency Patch for Actively Exploited Dell Flaw;

CISA Orders Emergency Patch for Actively Exploited Dell Flaw;

Author: Jim Love February 20, 2026 Duration: 8:33

CISA Orders Emergency Patch for Actively Exploited Dell Flaw; Texas Sues TP-Link; Massive ID Verification Data Leak; SSA Database Leak Allegations

Host Jim Love covers four cybersecurity stories: 

Cybersecurity Today  would like to thank Meter for their support in bringing you this podcast. Meter delivers a complete networking stack, wired, wireless and cellular in one integrated solution that's built for performance and scale.  You can find them at Meter.com/cst

CISA ordered federal civilian agencies to patch an actively exploited critical Dell RecoverPoint for Virtual Machines vulnerability (CVE-2026-2769) within three days, citing hard-coded credentials that allow unauthenticated root access and links to a China-aligned threat cluster; Texas Attorney General filed suit against TP-Link alleging deceptive security and origin claims and risks tied to Chinese state-linked threats, while TP-Link denies the allegations and says it operates independently, stores U.S. user data on AWS, and bases core operations in the U.S.; researchers found an unsecured MongoDB database tied to AI-powered identity verification provider ID Merit exposing nearly 1 billion records with sensitive personal data, attributed to misconfiguration rather than compromise of the AI systems; and a MarketWatch report describes whistleblower Chuck Borges alleging SSA master data was copied to a cloud environment without oversight, contrasted by the Social Security Commissioner stating the core Numident database remained secure, with Love noting no confirmed public evidence but expressing concern about the implications if such foundational data were compromised.

00:00 Sponsor Message: Meter's Full-Stack Networking
00:19 Headlines: Dell Exploit, TP-Link Lawsuit, Massive Data Leak, SSA Claims
00:45 Urgent Patch Order: Actively Exploited Dell RecoverPoint CVE
02:19 Texas Sues TP-Link Over Router Security & China-Ties Allegations
03:31 AI Identity Verification Leak: Nearly 1 Billion Records Exposed
05:07 Did SSA Data Leak? Whistleblower vs. Official Denial
06:54 Host Take: What If the "Foundational" Database Was Compromised?
07:37 Wrap-Up + Sponsor Thanks and Where to Book a Demo


Every morning, Jim Love sifts through the noise of the digital world to bring you a clear, concise briefing on what actually matters. Cybersecurity Today isn't about fearmongering; it's about practical awareness. You'll hear straightforward analysis of the most recent attacks targeting companies, from sophisticated ransomware campaigns to stealthy data theft. Jim breaks down the implications of major breach disclosures, explaining not just what was stolen, but how it happened and who is affected. The focus remains on actionable intelligence-concrete steps and strategic thinking that can help protect your organization's data and infrastructure. This daily podcast serves as an essential filter for IT professionals, business leaders, and anyone responsible for digital assets, transforming complex threats into understandable insights. Tune in for a grounded perspective on navigating an online landscape where the risks are constantly evolving, and the need for clear, timely information has never been greater.
Author: Language: English Episodes: 100

Cybersecurity Today
Podcast Episodes
A Former Black Hat Hacker Advises Us On Security Weaknesses [not-audio_url] [/not-audio_url]

Duration: 55:44
Unveiling the Double-Edged Sword of AI in Cybersecurity with Brian Black In this episode of Cybersecurity Today, host Jim Love interviews Brian Black, the head of security engineering at Deep Instinct and a former black…
Innovative Tools and Tactics in Cybersecurity [not-audio_url] [/not-audio_url]

Duration: 8:15
In this episode of 'Cybersecurity Today,' hosted by Jim Love, the focus is on recent developments and tactics in cybersecurity. The episode discusses Meter's networking solutions, the innovative tactics of the ransomware…
Alarm Bells in Ivy League School [not-audio_url] [/not-audio_url]

Duration: 15:15
In this episode, host David Shipley discusses a significant cybersecurity breach at the University of Pennsylvania, which involved offensive emails sent from legitimate university addresses. The attackers claim to have a…

«1...678910