SN 1070: CISA's Free Internet Scanning - Malware Disguised as a VPN

SN 1070: CISA's Free Internet Scanning - Malware Disguised as a VPN

Author: TWiT March 18, 2026 Duration: 2:46:12

Meta quietly ditches encryption for Instagram chats while TikTok also backpedals on privacy, shaking up assumptions about how much big tech really values your secrets. Meanwhile, Steve Gibson reveals why CISA's free government security scans are an absolute must for businesses—plus what he learned when GRC took the plunge.

  • The Security Now "Caption That Photo" contest.
  • A mega social media company says "no" to strong encryption.
  • WhatsApp to give parents more control,
  • Consumer bandwidth proxying is becoming a big deal.
  • Meta buys the Moltbook duo.
  • The EU gives up and settles upon the status quo.
  • When a ransomware negotiation is not what it seems.
  • CISA compels federal agencies to submit their logs.
  • Is that a VPN in your pocket or something more malicious.
  • Be careful what you download, thinking it's AI.
  • A super-clever and super-simple A/V scanner bypass.
  • Will AI write code for me?
  • Another listener discovers the Joy of AI.
  • Steve's CISA Internet scanning experience

Show Notes - https://www.grc.com/sn/SN-1070-Notes.pdf

Hosts: Steve Gibson and Leo Laporte

Download or subscribe to Security Now at https://twit.tv/shows/security-now.

You can submit a question to Security Now at the GRC Feedback Page.

For 16kbps versions, transcripts, and notes (including fixes), visit Steve's site: grc.com, also the home of the best disk maintenance and recovery utility ever written Spinrite 6.

Join Club TWiT for Ad-Free Podcasts!
Support what you love and get ad-free audio and video feeds, a members-only Discord, and exclusive content. Join today: https://twit.tv/clubtwit

Sponsors:


Every Tuesday, cybersecurity expert Steve Gibson sits down with Leo Laporte to dissect the week's most pressing digital threats. This isn't just a news recap; it's a detailed analysis where complex topics like emerging malware, data breaches, and software vulnerabilities are explained with clarity. The conversation in Security Now (Video) provides actionable insights, whether you're safeguarding a home network or responsible for enterprise infrastructure. As a production of TWiT, this video podcast delivers both visual aids and in-depth discussion, translating technical jargon into practical knowledge. Regular listeners gain a deeper understanding of the threat landscape and the evolving tools for defense. For those who want an enhanced experience, Club TWiT membership offers ad-free access to this and other shows. Tune in weekly to stay informed and build a more resilient digital life, as Steve and Leo unpack the stories that define our security reality.
Author: Language: en-us Episodes: 10

Security Now (Video)
Podcast Episodes
SN 1075: Yes. Exactly. - The Zero-Day Ticking Clock [not-audio_url] [/not-audio_url]

Duration: 2:40:28
Security leaders warn the era of AI-driven bug hunting has arrived, with Mythos uncovering hundreds of overlooked vulnerabilities in code bases as trusted as Firefox. Are defenders ready for the avalanche of exploits and…
SN 1074: What Mythos Means - Marketing or Mayhem [not-audio_url] [/not-audio_url]

Duration: 2:51:16
We may already be living through the most consequential hundred days in cyber history, and the arrival of AI that can autonomously chain zero-day vulnerabilities into working exploits means the software industry's long-s…
SN 1072: LiteLLM - Click Fix Attacks Surge [not-audio_url] [/not-audio_url]

Duration: 2:48:59
An explosive supply chain hack in Light LLM nearly unleashed catastrophic malware across millions of AI systems, and it took a coder's quick thinking to catch it before it snowballed into disaster. Will California requir…
SN 1071: Bucketsquatting - Meta and TikTok's Tracking Pixels [not-audio_url] [/not-audio_url]

Duration: 2:47:44
When convenience trumps caution, disaster waits in the wings. Join Steve Gibson and Mikah Sargent as they break down the jaw-dropping oversights lurking in mission-critical tax and cloud tools, and examine how a single u…
SN 1067: KongTuke's CrashFix - Click, Paste, Pwned [not-audio_url] [/not-audio_url]

Duration: 2:40:04
A crafty new breed of social engineering attack is tricking users into launching malware straight from their clipboard, exposing a fresh vulnerability in Windows that even tech pros could fall for. Leo Laporte and Steve…
SN 1066: Password Leakage - Zero Trust, Zero Knowledge [not-audio_url] [/not-audio_url]

Duration: 2:50:07
ETH Zurich's deep-dive into the world's top password managers exposes how feature overload and legacy design obscure real security flaws, forcing a rethink of what "zero knowledge" actually means for your vault. Learn wh…