{
  "version": "1.2.0",
  "chapters": [
    {
      "title": "PreShow Banter™ — Government Linux",
      "startTime": 0,
      "endTime": 255
    },
    {
      "title": "Denmark is Done with Teams! - Talkin' Bout [infosec] News 2025-06-16",
      "startTime": 255,
      "endTime": 302
    },
    {
      "title": "Story # 1: 'We're done with Teams': German state hits uninstall on Microsoft",
      "startTime": 302,
      "endTime": 1053,
      "url": "https://www.france24.com/en/live-news/20250613-we-re-done-with-teams-german-state-hits-uninstall-on-microsoft"
    },
    {
      "title": "Story # 1b: Denmark Wants to Dump Microsoft Software for Linux, LibreOffice",
      "startTime": 1053,
      "endTime": 1094,
      "url": "https://www.pcmag.com/news/denmark-wants-to-dump-microsoft-software-for-linux-libreoffice"
    },
    {
      "title": "Story # 2: Zero-click AI data leak flaw uncovered in Microsoft 365 Copilot",
      "startTime": 1094,
      "endTime": 1549,
      "url": "https://www.bleepingcomputer.com/news/security/zero-click-ai-data-leak-flaw-uncovered-in-microsoft-365-copilot/"
    },
    {
      "title": "Story # 3: Fog ransomware attacks use employee monitoring tool to break into business networks",
      "startTime": 1549,
      "endTime": 1824,
      "url": "https://www.techradar.com/pro/security/fog-ransomware-attacks-use-employee-monitoring-tool-to-break-into-business-networks"
    },
    {
      "title": "Story # 4: Expired Discord Invites Hijacked for Stealthy Malware Attacks",
      "startTime": 1824,
      "endTime": 2039,
      "url": "https://cyberinsider.com/expired-discord-invites-hijacked-for-stealthy-malware-attacks/"
    },
    {
      "title": "Story # 5: SmartAttack uses smartwatches to steal data from air-gapped systems",
      "startTime": 2039,
      "endTime": 2425,
      "url": "https://www.bleepingcomputer.com/news/security/smartattack-uses-smartwatches-to-steal-data-from-air-gapped-systems/"
    },
    {
      "title": "Story # 6: Mirai Botnets Exploiting Wazuh Security Platform Vulnerability",
      "startTime": 2425,
      "endTime": 2687,
      "url": "https://www.securityweek.com/mirai-botnets-exploiting-wazuh-security-platform-vulnerability/"
    },
    {
      "title": "Story # 7: Google Cloud and Cloudflare hit by widespread service outages",
      "startTime": 2687,
      "endTime": 2883,
      "url": "https://www.bleepingcomputer.com/news/technology/google-cloud-and-cloudflare-hit-by-widespread-service-outages/"
    },
    {
      "title": "Story # 8: UNFI cyberattack shuts down network and leaves Whole Foods and others in limbo",
      "startTime": 2883,
      "endTime": 3033,
      "url": "https://www.supermarketnews.com/grocery-technology/unfi-cyberattack-shuts-down-network-and-leaves-whole-foods-and-others-in-limbo"
    },
    {
      "title": "Story # 9: New SharePoint Phishing Attacks Using Lick Deceptive Techniques",
      "startTime": 3033,
      "endTime": 3068,
      "url": "https://cybersecuritynews.com/new-sharepoint-phishing-attacks/"
    },
    {
      "title": "Story # 10: US-backed Israeli company’s spyware used to target European journalists, Citizen Lab finds",
      "startTime": 3068,
      "endTime": 3211,
      "url": "https://apnews.com/article/spyware-italy-paragon-meloni-pegasus-f36dd32106f44398ee24001317ccf2bb"
    },
    {
      "title": "Story # 11: Five Zero-Days, 15 Misconfigurations Found in Salesforce Industry Cloud",
      "startTime": 3211,
      "endTime": 3379,
      "url": "https://www.securityweek.com/five-zero-days-15-misconfigurations-found-in-salesforce-industry-cloud/"
    }
  ]
}