All Episodes

September 22, 2025 14 mins

Cybercriminals are exploiting X's Grok AI to bypass ad protections and spread malware to millions—while researchers discover your home Wi-Fi can now monitor your heart rate. This week's news breakdown covers the attack vectors you need to know about. 

Join co-hosts Joshua Schmidt, Eric Brown, and Nick Mellem as they dive into the latest cybersecurity developments that could impact your organization tomorrow. From social media malvertising to biometric data harvesting through everyday devices, these aren't distant threats—they're happening now. 

Key Topics Covered:  

  • How cybercriminals are weaponizing Grok AI for malvertising campaigns 
  • Why 10-15% of employees access risky content at work (and what to do about it)  
  • Wi-Fi devices that can detect heart rates from 10 feet away—privacy implications  
  • Amazon's Project Kuiper vs. Starlink: What 1GB satellite internet means for security  
  • Practical defenses: YubiKeys, browser isolation, and network redundancy strategies 

Don't wait until your organization is the next headline. IT leaders need to stay ahead of evolving threats, and this episode delivers critical insights to help protect your business. Like, share, and subscribe for more in-depth security discussions! 

#cybersecurity #infosec #grok #malware #starlink #wifi #privacy #ITsecurity 

Mark as Played
Transcript

Episode Transcript

Available transcripts are automatically generated. Complete accuracy is not guaranteed.
Speaker 1 (00:04):
All right, we're live .
Welcome to the Audit presentedby IT Audit Labs.
I'm your co-host and producer,joshua Schmidt.
Today, we're joined by theusual suspects Eric Brown and
Nick Mellon from IT Audit Labs.
How are you guys doing today?
Awesome, mark, good, awesome,excellent, happy, it's Friday,
tgif.
Yeah, hey, we're doing a livenews episode today.
We got a couple of articles.
Uh yeah, this is from thehacker.

(00:24):
News came out, uh, september4th.
Cyber criminals exploit x's grokai to bypass ad protections and
spread malware to millions.
Cyber security researchers haveflagged a new technique that
cyber criminals have adopted tobypass social media platform x's
malvertising protections andpropagate malicious links using
its artificial intelligenceassistant, grokk.
You know, nick and I werechopping this up before we went

(00:45):
live and it's like this is kindof nothing new.
It might be new for Grok orjust kind of a new attack vector
, but I was talking about all ofthe bunk ads I see on Instagram
, you know, for like flashlightsthat are supposedly light up a
football field or you know whathave you.
I was curious how you approachthis, eric, or how you would

(01:06):
think about this if you wereworking with someone like me
who's on social media for thejob or at an organization?
Is it just kind of awareness,like talking about it, or how do
you like to like train peopleWell?

Speaker 2 (01:20):
it's both, but we're really seeing a lot of the
malicious ads that are comingthrough because Google doesn't
really filter from adperspective.
If there's malicious content inthe ads and they pop up like
somebody types in angry IP forthe angry IP scanner, the first
one that you're going to see isa Google ad and it's not a

(01:41):
legitimate link to that site todownload the product ad and it's
not a legitimate link to thatsite to download the product.
We're seeing a ton of thosetype of ads that have malicious
content embedded.
There's some pretty goodproducts and ways to block that.
I think there's two ways to dothat.
One is monitoring the usertraffic and filtering it, either

(02:01):
through your firewall, with SSLdecryption or with a tool that
will do browser isolation andthen, most importantly, not
allowing administrative accessto happen on the user endpoint.
Nick, you're living this stufftoo.
I know you've been down a bigYubiKey project to implement
YubiKeys across the enterprise,so another way, right, but

(02:26):
you're probably doing that inconjunction with some local
admin work.

Speaker 3 (02:29):
There's all kinds of technical things that we do and
will do, and YubiKey iscertainly one of them, and we're
doing it at one of ourorganizations right now that
we're working with and we willbe doing it at more.
Yubikey is the way to go,really, and so that's the
technical aspect of it.
But with this stuff and Ericand I talked about this Thursday
we're humans.
We're learning about this stuffreal time as well.

(02:51):
We might have known about it alittle longer because we like
this stuff and we're looking atit sooner, but a lot of this is
just about awareness makingpeople aware of what's happening
.

Speaker 1 (03:00):
What would you guys say?
The percentage of employees arelooking at adult content?

Speaker 3 (03:06):
at work in any given organization.

Speaker 1 (03:11):
Let's have a number.

Speaker 2 (03:15):
I want to like a ballpark percentage.
Are you talking about on theirwork computer or are you talking
about in general?

Speaker 1 (03:17):
Like at work logged in, punched in getting paid,
looking at adult content Morethan you would like to know what
do you think the number?

Speaker 3 (03:24):
is though.
Oh, I don't even know if I canget an eric.
You want to take a shot at anumber?

Speaker 2 (03:28):
it's probably 10 to 15.

Speaker 3 (03:31):
Oh wow yeah at least that I would.
I would guess we have thisstuff comes up a lot.

Speaker 1 (03:37):
I feel like do you think they're just getting
sucked into like thirst trapsthat are popping up, or do you
think they're actually justtaking the time to have some
personal time during theirworkday?

Speaker 2 (03:49):
I think I've seen both Right, Like you know, maybe
an after-hours crew that's intheir second or third shift,
Maybe a crew that is nottraditionally office workers.
Yeah, there's all sorts ofthings you see, and you see it
coming across the corporatenetwork, but there's lots of
blocks and filters on thatnetwork.

(04:11):
So then you tend to see it moreon the unfiltered guest network
.
We work with police departmentsand the folks that are either
case officers or police officersthat are doing investigations
of course have to be able to goto any of the sites of machines

(04:31):
or people that they'reinvestigating.

Speaker 3 (04:34):
So those are wide open.
I was seeing it in previousorganizations where people would
be logged into their personalGoogle to review their Gmail or
whatever logged into theirpersonal Google to review their
Gmail or whatever.
So when they're logged intotheir Google, their search
history and everything comes up.
Or they might click onsomething or it shows up and
they're frequently browsed right.
So you might be working ontheir computer or something and

(04:55):
you see or seeing this coming up.
Well, you know, now it's, nowit's got a way in to the network
where these malicious links orwhat have you.

Speaker 1 (05:02):
Reminds me, this Monday we have episode 73 of the
audit coming out with Ed Gaudetfrom SenseNet, who we talked at
length about.
You know kind of this being anew attack vector with
ransomware and whatnot, andthat's why I wanted to bring
this article in.
This is from newsucsc.
Traditionally, measuring heartrate requires some sort of

(05:23):
wearable device, whether it be asmartwatch or hospital-grade
machinery, but new research fromengineers at the University of
California, santa Cruz, showshow the signal from a household
Wi-Fi device can be used forthis crucial health monitoring
and it sounded like, yeah, justwith the Wi-Fi, or like a
Raspberry Pi, some cheap devicethat's maybe $10, 15 dollars

(05:45):
they're achieving this result.

Speaker 3 (05:46):
Like it says here, you're only 10 feet away, or
three meters away for the firstthing I think about when I read
this is you know, if you thinkback, probably more than 10
years ago, the attack space wasyour organization might be 20,
50, 100 devices.
Now in this space, we'reprotecting thousands of devices
our entry points, tvs on thewall of your organization,

(06:10):
printers, everything that'sconnecting.
So now here's just anotherdevice entry, here's another
door that could be unlocked,right or not locked, for
somebody to come in, but it'scool technology.
I wear an Apple Watch as well,regularly too.
So you know, we're all.
We're all have these devices.

Speaker 1 (06:28):
I wonder how you know , this affects governance or how
, what, where this falls, wherethe responsibility falls, of
course, on every person toprotect their own security.
But is this something they'regoing to have to look more at in
a governance way, because thesedevices that we're wearing are
collecting all this data, thismountain of data that then is

(06:51):
being used for advertising, ormaybe to sell pacemakers, or to
sell supplements or whoeverwould like to buy that kind of
data.
And if we're all of a sudden,if they're able to extract that
personal health information fromus without our consent or
without knowing it, I wonderwhat kind of ramifications that
may have.

Speaker 3 (07:09):
I think you'd certainly run into that kind of
an issue if you're going into apublic space.
But if you're using this athome in a controlled environment
, you know you're probably notgoing to run into this problem
where you.
You know, if you go into a GNCor something, you'd probably
have to sign a waiver for themto see this or whatever it is
you know for it to be publicknowledge.
But I think you know, eric,correct me if you think I'm

(07:29):
wrong, but I think right here,if it's not traceable to a
specific person, you wouldn'ttechnically fall under like a
HIPAA regulation or somethingLike.
If it doesn't say, nick, thisis his information, his address,
social or whatever it is,you're less likely to actually
have a governance problem.
Now it's more of just anethical topic.

Speaker 2 (07:51):
It could be interesting, too, around what
data is available to the serviceproviders that we use.
So could you run into aninsurance issue?
Right now we know Google andYahoo and Microsoft are in our
email and the personal side andthey're gathering information
about us and using that tomarket towards us.
But what if they were usingthat to write policy, like some

(08:14):
of the car insurance providerswant you to stick that device in
your car, track your drivinghabits to increase or decrease
your rates?
Same thing could happen on thehealth care side.

Speaker 1 (08:26):
And there's a lot of talk online too, just about,
like, social credit systems.
I don't know if this relatesdirectly, but the whole picture,
the big picture of how you'reinteracting in society, how
you're driving.
Is that going to be connectedto a real ID?
In society, how you're driving,is that going to be connected
to a real ID?
Is that going to be connectedto some sort of government
database, whether it's privateor public.

Speaker 3 (08:45):
We're certainly on the doorstep to that issue
Because, to Eric's car insurancecomment, I know Tesla has an
option where you can buyinsurance from them and they
obviously have all that datafrom the car right so they can
fluctuate real-time your premiumif you're like heavy on the gas
all the time if you're usingtheir insurance.

Speaker 2 (09:05):
It's like a Dark Mirror episode.
Nick's going to start talkingabout chemtrails and how the
government chipped us.

Speaker 3 (09:13):
That was what that beat of rice was.

Speaker 1 (09:17):
Amazon satellite internet service hits 1280
megabytes per second, though itwas achieved using an enterprise
customer terminal on a networkthat currently has plenty of
capacity.
How does this change yourapproach to cybersecurity?
When you're talking aboutopening up new pathways for
network connectivity, I meanmore operational resilience.
You can always hook up to theinternet If you can have faster,

(09:40):
faster speeds, but are alsogiving those bad actors that
same opportunity.
Does it change how you fortifyorganizations or people that
might be using these services?

Speaker 2 (09:51):
Nick, I think you've got some thoughts here too, but
from my perspective it's another.
It's a redundancy.
We've got a customer that's gota location out in the
Washington area Kent Washingtonand the internet out there is.
There's not a lot of greatoptions and they seem to have
issues with whichever.

(10:12):
We've tried a couple ofdifferent ones and every six
months there seems to be somesort of an outage.
So having satellite-basedredundancy is great and that
ability to failover from onenetwork to the other is great.
As long as all of that trafficis encrypted through the
satellite, they're not going toreally be able to look at that

(10:33):
data.

Speaker 3 (10:34):
Yep Agreed.
I think I was going to sayevery time you can get some
redundancy, it's going to begood.
That's how I have it set up inmy house too.
It's in a monitoring mode, myphone's connected to it.
It will always send and receivemessages from that.
I think the monitoring fee fromStarlink is $5 a month to have

(10:54):
it set up like that.
If you want to kick it over tofull service, it's $60 or $100
or something like that.
But if you want to kick it overto full service, it's 60 or 100
or something like that.
But to get back to yourquestion and Eric already nailed
it I don't see an added risk atall and if anything, us as a
provider or a security advisorto an organization, we would
advocate for something like thisbecause we want to eliminate

(11:15):
any outages.
So to me it's a good thing.

Speaker 2 (11:19):
I think if you get into some customers that have
real low latency like stocktrading type of it's not issues
but requirements then it mightnot be an option but for the
vast majority it's probably agood viable backup To Eric's
point.

Speaker 3 (11:34):
It's not going to be as good as your fiber connection
at home, but the Amazon videothat they were showing I think
it was somewhere in Washingtonas well, it was where Eric was
talking about it's in ClaimKellum or something like that,
where this town they have peopleactually moving out from what I
understand, because theinternet is so expensive and
they're getting like 0.7 of amegabyte of internet and they're

(11:56):
paying like $80 a month for itand it goes out all the time.
So there's cafes that areopening up where kids are doing
their homework in the car, theirparents' car parked next to the
cafe to get internet to connectto do their homework.
So that's what amazon's doingis they're coming in and they're
trying to launch thesesatellites.
Now they're way behind starlink.

(12:18):
Be just on the satellitenumbers.
I think they're going to try toget to 100 satellites launched
this year and starlink's over athousand satellites right now.

Speaker 2 (12:26):
So I think starlink's like seven thousand is it seven
thousand or one way off?
But it's like it wasn't it abelincoln doing his homework on
the back a coal shovel, and nowwe're doing it in the back of an
SUV.

Speaker 3 (12:36):
Going backwards.

Speaker 1 (12:37):
You guys.
The first time I saw Starlink,I thought I was witnessing an
alien invasion out on a dog walk.

Speaker 3 (12:42):
Now, here we go, get the tinfoil hats out 30 lights
going across.

Speaker 1 (12:46):
I saw someone make a post about that recently.
They had a similar experiencethat no one had told them, or
they had not read about howthat's going to look in the sky.
And then, I think, they breakup, don't they?
They reach a differentformation at some point, and
that's how they launch.

Speaker 3 (13:03):
All I know is they get service and it works good.

Speaker 1 (13:07):
All right, Jens.
Anything else top of mind today?
Cybersecurity in September2025?
.

Speaker 2 (13:12):
Get ready for October .

Speaker 1 (13:14):
Is is cybersecurity awareness month yep, that's
right, we got some excitingthings coming up yep, awesome
posters up on the website, uh,for you to download and put in
your office if you're soinclined.
And then, um, yeah, we're goingto be uh, rolling out some
really fun stuff, so make sureyou subscribe, like and share.
Um.
Check out our youtube channel.
Leave a comment so we know thatyou're watching.

(13:35):
Until next time.
My name is Joshua Schmidt.
I'm your co-host and producer.
You've been listening to theAudit.
We've been joined by Eric Brownand Nick Mellon from IT Audit
Labs.
Catch you in the next one,thanks.

Speaker 2 (13:46):
Yeah, have a good weekend.
See you, guys.
You have been listening to theAudit presented by IT Audit Labs
.
We are experts at assessingrisk and compliance, while
providing administrative andtechnical controls to improve
our clients' data security.
Our threat assessments find thesoft spots before the bad guys

(14:09):
do, identifying likelihood andimpact.
While our security controlassessments rank the level of
maturity relative to the size ofyour organization, assessments
rank the level of maturityrelative to the size of your
organization, thanks to ourdevoted listeners and followers,
as well as our producer, joshuaJ Schmidt, and our audio video
editor, cameron Hill.
You can stay up to date on thelatest cybersecurity topics by

(14:30):
giving us a like and a follow onour socials and subscribing to
this podcast on Apple, spotifyor wherever you source your
security content.
Advertise With Us

Popular Podcasts

On Purpose with Jay Shetty

On Purpose with Jay Shetty

I’m Jay Shetty host of On Purpose the worlds #1 Mental Health podcast and I’m so grateful you found us. I started this podcast 5 years ago to invite you into conversations and workshops that are designed to help make you happier, healthier and more healed. I believe that when you (yes you) feel seen, heard and understood you’re able to deal with relationship struggles, work challenges and life’s ups and downs with more ease and grace. I interview experts, celebrities, thought leaders and athletes so that we can grow our mindset, build better habits and uncover a side of them we’ve never seen before. New episodes every Monday and Friday. Your support means the world to me and I don’t take it for granted — click the follow button and leave a review to help us spread the love with On Purpose. I can’t wait for you to listen to your first or 500th episode!

Stuff You Should Know

Stuff You Should Know

If you've ever wanted to know about champagne, satanism, the Stonewall Uprising, chaos theory, LSD, El Nino, true crime and Rosa Parks, then look no further. Josh and Chuck have you covered.

The Joe Rogan Experience

The Joe Rogan Experience

The official podcast of comedian Joe Rogan.

Music, radio and podcasts, all free. Listen online or download the iHeart App.

Connect

© 2025 iHeartMedia, Inc.