{
  "version": "1.2.0",
  "chapters": [
    {
      "title": "PreShow Banter™ — Fun Jank Decks",
      "startTime": 0,
      "endTime": 324
    },
    {
      "title": "BHIS - Talkin' Bout [infosec] News 2025-03-17 - Malicious Browser Plugins will Destroy us ALL!!",
      "startTime": 324,
      "endTime": 395
    },
    {
      "title": "Story # 1: Polymorphic Extensions: The Sneaky Extension That Can Impersonate Any Browser Extension",
      "startTime": 395,
      "endTime": 877,
      "url": "https://labs.sqrx.com/polymorphic-extensions-dd2310006e04"
    },
    {
      "title": "Story # 1b: Chrome Web Store is a mess",
      "startTime": 877,
      "endTime": 1874,
      "url": "https://palant.info/2025/01/13/chrome-web-store-is-a-mess/"
    },
    {
      "title": "Story # 2: Lazarus Strikes npm Again with New Wave of Malicious Packages",
      "startTime": 1874,
      "endTime": 2177,
      "url": "https://socket.dev/blog/lazarus-strikes-npm-again-with-a-new-wave-of-malicious-packages"
    },
    {
      "title": "Story # 3: China’s Volt Typhoon Hackers Dwelled in US Electric Grid for 300 Days",
      "startTime": 2177,
      "endTime": 2683,
      "url": "https://www.securityweek.com/chinas-volt-typhoon-hackers-dwelled-in-us-electric-grid-for-300-days/"
    },
    {
      "title": "Story # 4: Saudi Arabia Buys Pokémon Go, and Probably All of Your Location Data",
      "startTime": 2683,
      "endTime": 2971,
      "url": "https://www.404media.co/saudi-arabia-buys-pokemon-go-and-probably-all-of-your-location-data/"
    },
    {
      "title": "Story # 5: Second biggest bank in US hit by major data breach stealing social security numbers and other personal info",
      "startTime": 2971,
      "endTime": 3085,
      "url": "https://www.dailymail.co.uk/sciencetech/article-14481925/Bank-america-massive-data-breach.html"
    },
    {
      "title": "Story # 6: Hackers Take Credit for X Cyberattack",
      "startTime": 3085,
      "endTime": 3272,
      "url": "https://www.securityweek.com/hackers-take-credit-for-x-cyberattack/"
    },
    {
      "title": "Story # 7: Hackers Using Advanced MFA-Bypassing Techniques To Gain Access To User Account",
      "startTime": 3272,
      "endTime": 3640,
      "url": "https://cybersecuritynews.com/hackers-using-advanced-mfa-bypassing-techniques/"
    }
  ]
}