{"href":"https://api.simplecast.com/oembed?url=https%3A%2F%2Fsecuritytools.simplecast.com%2Fepisodes%2Fproofpoint-spoofing-NTWlxQY4","width":444,"version":"1.0","type":"rich","title":"Proofpoint Spoofing","thumbnail_width":300,"thumbnail_url":"https://image.simplecastcdn.com/images/59617cff-d258-400b-81f9-af733334da9f/c52cd99a-25d2-4ac1-ba5d-1fd490c79884/soc-podcastart.jpg","thumbnail_height":300,"provider_url":"https://simplecast.com","provider_name":"Simplecast","html":"<iframe src=\"https://player.simplecast.com/246abd81-9b5d-4613-9627-b8981ac003c9\" height=\"200\" width=\"100%\" title=\"Proofpoint Spoofing\" frameborder=\"0\" scrolling=\"no\"></iframe>","height":200,"description":"Matt Radolec and David Gibson discuss how an unknown attacker recently exploited a vulnerability in Proofpoint’s email routing system, allowing them to bypass security measures and send millions of spoofed emails on behalf of major companies. \n\nThe co-hosts also cover: \n\n+ The North Korean threat actor hired using AI \n\n+ The biggest ransomware payment ever made \n\n+ How X is training its Grok AI LLM with your posts \n\n+ The EU’s groundbreaking AI act \n\n+ How anyone can access deleted and private repositories on GitHub \n\n+ Updates on AMD's silicon-level \"SinkClose\" processor flaw"}