{
  "version": "1.2.0",
  "chapters": [
    {
      "title": "PreShow Banter™ — Hardcore Mountain J-Biking",
      "startTime": 0,
      "endTime": 157
    },
    {
      "title": "BHIS - Talkin' Bout [infosec] News 2023-05-15",
      "startTime": 157,
      "endTime": 217
    },
    {
      "title": "Story # 1: Discord discloses data breach after support agent got hacked",
      "startTime": 217,
      "endTime": 732,
      "url": "https://www.bleepingcomputer.com/news/security/discord-discloses-data-breach-after-support-agent-got-hacked/"
    },
    {
      "title": "Story # 2: Cybersecurity firm Dragos discloses cybersecurity incident, extortion attempt",
      "startTime": 732,
      "endTime": 782,
      "url": "https://www.bleepingcomputer.com/news/security/cybersecurity-firm-dragos-discloses-cybersecurity-incident-extortion-attempt/"
    },
    {
      "title": "Story # 2b: Deconstructing a Cybersecurity Event",
      "startTime": 782,
      "endTime": 1742,
      "url": "https://www.dragos.com/blog/deconstructing-a-cybersecurity-event/"
    },
    {
      "title": "Story # 3: How Apple catches leakers: From color changes to comma placement",
      "startTime": 1742,
      "endTime": 1892,
      "url": "https://9to5mac.com/2023/05/11/how-apple-catches-leakers/"
    },
    {
      "title": "Story # 3b: The ingenious way ‘Star Trek Beyond’ is making sure its script doesn’t leak online",
      "startTime": 1892,
      "endTime": 2074,
      "url": "https://bgr.com/entertainment/star-trek-beyond-script/"
    },
    {
      "title": "Story # 3c: Genius hid a Morse code message in song lyrics to prove Google was copying them",
      "startTime": 2074,
      "endTime": 2417,
      "url": "https://bgr.com/tech/genius-vs-google-lyrics-results-on-search-copied-from-lyrics-site/"
    },
    {
      "title": "Story # 4: How one of Vladimir Putin’s most prized hacking units got pwned by the FBI",
      "startTime": 2417,
      "endTime": 2583,
      "url": "https://arstechnica.com/information-technology/2023/05/how-the-fbi-pwned-turla-a-kremlin-jewel-and-one-of-worlds-most-skilled-apts/"
    },
    {
      "title": "Story # 4b: Hunting Russian Intelligence “Snake” Malware",
      "startTime": 2583,
      "endTime": 3086,
      "url": "https://www.cisa.gov/news-events/cybersecurity-advisories/aa23-129a"
    },
    {
      "title": "Story # 4c: Microsoft recommended driver block rules",
      "startTime": 3086,
      "endTime": 3350,
      "url": "https://learn.microsoft.com/en-us/windows/security/threat-protection/windows-defender-application-control/microsoft-recommended-driver-block-rules"
    },
    {
      "title": "Story # 4d: Bypassing PatchGuard 3",
      "startTime": 3350,
      "endTime": 3495,
      "url": "https://www.codeproject.com/Articles/28318/Bypassing-PatchGuard-3"
    },
    {
      "title": "Story # 5: The Team of Sleuths Quietly Hunting Cyberattack-for-Hire Services",
      "startTime": 3495,
      "endTime": 3584.95,
      "url": "https://www.wired.com/story/big-pipes-ddos-for-hire-fbi/"
    }
  ]
}