Inside The Vercel Supply Chain Exploit

Inside The Vercel Supply Chain Exploit

Author: Jim Love April 24, 2026 Duration: 17:39

Inside the Vercel Breach: Highlighting OAuth Token Risk 

In a special edition of Cybersecurity Today, host Jim Love and guest Jamie Blasco (CTO, Nudge Security) discuss Vercel, a major developer hosting platform, and a breach tied to OAuth grants and shadow AI. Reporting shared by Contrast Security's David Lindner describes how a Context AI employee downloaded Roblox AutoFarm scripts, got infected with an info stealer, and attackers harvested credentials, compromised Context AI, then used an over-permissioned OAuth token from a Vercel employee who had signed up to Context AI with an enterprise account and clicked "allow all," with Vercel working with Mandiant on a breach allegedly being sold for $2 million. The episode emphasizes that MFA may not mitigate OAuth abuse, urges admin-managed consent, continuous inventory and auditing of OAuth grants, and better visibility into risky third-party app access across Google Workspace and Microsoft 365.

Cybersecurity Today would like to thank Meter for their support in bringing you this podcast. Meter delivers a complete networking stack, wired, wireless and cellular in one integrated solution that's built for performance and scale.  You can find them at Meter.com/cst

00:00 Special Edition Intro
00:14 Sponsor Message Meter
00:33 Supply Chain Hack Setup
01:16 Breach Seen In Wild
02:36 Meet Jamie Blasko
02:56 Who Is Vercel
04:34 How The Breach Happened
05:58 Context AI And Shadow IT
07:58 OAuth Controls And Audits
09:11 Impact And Open Questions
11:24 Why MFA Falls Short
12:22 Where To Get Help
14:07 Host Takeaways OAuth Risk
14:53 What To Do Next
16:06 Wrap Up And Feedback
16:42 Sponsor Close Meter
17:24 Final Sign Off

 

 

 

 

 


Every morning, Jim Love sifts through the noise of the digital world to bring you a clear, concise briefing on what actually matters. Cybersecurity Today isn't about fearmongering; it's about practical awareness. You'll hear straightforward analysis of the most recent attacks targeting companies, from sophisticated ransomware campaigns to stealthy data theft. Jim breaks down the implications of major breach disclosures, explaining not just what was stolen, but how it happened and who is affected. The focus remains on actionable intelligence-concrete steps and strategic thinking that can help protect your organization's data and infrastructure. This daily podcast serves as an essential filter for IT professionals, business leaders, and anyone responsible for digital assets, transforming complex threats into understandable insights. Tune in for a grounded perspective on navigating an online landscape where the risks are constantly evolving, and the need for clear, timely information has never been greater.
Author: Language: English Episodes: 100

Cybersecurity Today
Podcast Episodes
OpenClaw, MoltBot, Clawdbot - From Bad to Worse [not-audio_url] [/not-audio_url]

Duration: 11:50
In this episode of Cybersecurity Today, host Jim Love discusses the latest advancements in AI-driven cyber attacks and their implications for security infrastructure. The episode covers a variety of topics, including the…
Critical Cybersecurity Updates: Fortinet, Docker, and Android Malware [not-audio_url] [/not-audio_url]

Duration: 10:24
In this episode of Cybersecurity Today, Jim Love covers major vulnerabilities and security threats, including the exposure of over 3 million Fortinet devices, a critical flaw in Docker's AI assistant, and a sophisticated…
The Rise of Actionable AI Agents: Navigating the Security Landscape [not-audio_url] [/not-audio_url]

Duration: 14:53
In this episode of Cybersecurity Today, host Jim Love explores the burgeoning world of actionable AI agents, examining key developments from companies like Google and Anthropic. The episode delves into the rapid rise of…
What's App Privacy Lawsuit [not-audio_url] [/not-audio_url]

Duration: 13:11
Cybersecurity Today: WhatsApp Privacy Lawsuit, Google's Personal AI, Canada Computers Breach, and Mass Password Leak In this episode, host Jim Love discusses pressing cybersecurity issues, including a lawsuit against Wha…
AWS Flaw Could Have Put Every Account At Risk [not-audio_url] [/not-audio_url]

Duration: 11:56
Cybersecurity Today: Critical Fortinet Flaws, Windows 11 Issues, and Major Cloud Security Near Miss In today's episode of Cybersecurity Today, host David Shipley covers several pressing cybersecurity topics including the…
11 Year Old LInux Bug Allows Root Access [not-audio_url] [/not-audio_url]

Duration: 6:57
Fortinet Firewall Breached, Hidden Linux Vulnerability & Ransomware Boss Pleads Guilty | Cybersecurity Today In this episode of Cybersecurity Today, host David Shipley discusses the latest breach involving Fortinet Forti…
The First Wave Of Sophisticated AI Generated Malware [not-audio_url] [/not-audio_url]

Duration: 13:41
Critical Cybersecurity Updates: Microsoft, Goot Loader, Anthropic, and AI-Generated Malware In this episode of Cybersecurity Today, host Jim Love discusses the latest security patches and threats in the industry. Topics…