{"type":"rich","version":"1.0","provider_name":"Transistor","provider_url":"https://transistor.fm","author_name":"Cybersecurity Awesomeness Podcast","title":"Cybersecurity Awesomeness Podcast - Episode 154","html":"<iframe width=\"100%\" height=\"180\" frameborder=\"no\" scrolling=\"no\" seamless src=\"https://share.transistor.fm/e/f8d5b16b\"></iframe>","width":"100%","height":180,"duration":906,"description":"In this episode of the Cybersecurity Awesomeness Podcast, hosts Chris Steffen and Ken Buckler explore the radical evolution of exploit triage following the RSAC 2026 conference. They highlight Anthropic’s \"Mythos,\" a sophisticated red-teaming AI capable of autonomously discovering and chaining vulnerabilities without human oversight. Unlike traditional hacking methods that rely on static kits, modern AI toolkits can scan massive IP ranges for every vulnerability in history—essentially automating the \"needle in a haystack\" search for attackers. This shift is particularly dangerous for legacy environments—essentially creating \"Terminator\" moments for infrastructure—where Windows XP embedded is still found in modern EV chargers.Citing Shodan statistics, the hosts reveal the alarming presence of public-facing legacy systems: approximately 5,000 instances of Windows Vista/Server 2008, 2,000 Windows Server 2003 systems, and 4 public Windows XP servers running IIS. Steffen and Buckler conclude that we have entered an \"AI arms race\" where automated adversaries outpace manual defenses, making continuous scanning and robust cyber hygiene vital for survival.","thumbnail_url":"https://img.transistorcdn.com/aXLBZ6NEC67VCvUdGdj34FVcP6UogkeOOCd6fCHwEXY/rs:fill:0:0:1/w:400/h:400/q:60/mb:500000/aHR0cHM6Ly9pbWct/dXBsb2FkLXByb2R1/Y3Rpb24udHJhbnNp/c3Rvci5mbS9zaG93/LzM3NTY1LzE2ODAy/ODQ1NTgtYXJ0d29y/ay5qcGc.webp","thumbnail_width":300,"thumbnail_height":300}