{"@attributes":{"version":"2.0"},"channel":{"title":"Security Now (Audio)","link":"https:\/\/twit.tv\/shows\/security-now","generator":"TWiT Feed Generator v4.10","docs":"http:\/\/blogs.law.harvard.edu\/tech\/rss","language":"en-US","copyright":"This work is licensed under a Creative Commons License - Attribution-NonCommercial-NoDerivatives 4.0 International - http:\/\/creativecommons.org\/licenses\/by-nc-nd\/4.0\/","managingEditor":"feedmail@twit.tv (TWiT Editors)","webMaster":"feedmail@twit.tv (TWiT Engineering)","ttl":"720","lastBuildDate":"Tue, 14 Apr 2026 19:35:03 PDT","pubDate":"Tue, 14 Apr 2026 19:35:03 PDT","description":"Cybersecurity guru Steve Gibson joins Leo Laporte every Tuesday. Steve and Leo break down the latest cybercrime and hacking stories, offering a deep understanding of what's happening and how to protect yourself and your business. Security Now is a must listen for security professionals every week. You can join Club TWiT for $10 per month and get ad-free audio and video feeds for all our shows plus everything else the club offers...or get just this podcast ad-free for $5 per month.\n\nNew episodes every Tuesday.","category":["Technology","Security"],"image":{"title":"Security Now (Audio)","url":"https:\/\/elroy.twit.tv\/sites\/default\/files\/styles\/twit_album_art_2048x2048\/public\/images\/shows\/security_now\/album_art\/audio\/sn2022_albumart_standard_2400.jpg","link":"https:\/\/twit.tv\/shows\/security-now"},"item":[{"title":"SN 1074: What Mythos Means - Marketing or Mayhem","pubDate":"Tue, 14 Apr 2026 19:27:43 PDT","link":"https:\/\/twit.tv\/shows\/security-now\/episodes\/1074","comments":"https:\/\/twit.tv\/shows\/security-now\/episodes\/1074","category":["Help & How To","Technology","Security"],"description":{},"guid":"https:\/\/pdst.fm\/e\/pscrb.fm\/rss\/p\/mgln.ai\/e\/294\/cdn.twit.tv\/megaphone\/sn_1074\/ARML7217675741.mp3","enclosure":{"@attributes":{"url":"https:\/\/pdst.fm\/e\/pscrb.fm\/rss\/p\/mgln.ai\/e\/294\/cdn.twit.tv\/megaphone\/sn_1074\/ARML7217675741.mp3","length":"164595068","type":"audio\/mpeg"}}},{"title":"SN 1073: The FCC Bans New Consumer Routers - LinkedIn's JavaScript Bombshell","pubDate":"Tue, 07 Apr 2026 19:38:55 PDT","link":"https:\/\/twit.tv\/shows\/security-now\/episodes\/1073","comments":"https:\/\/twit.tv\/shows\/security-now\/episodes\/1073","category":["Help & How To","Technology","Security"],"description":{},"guid":"https:\/\/pdst.fm\/e\/pscrb.fm\/rss\/p\/mgln.ai\/e\/294\/cdn.twit.tv\/megaphone\/sn_1073\/ARML1930818750.mp3","enclosure":{"@attributes":{"url":"https:\/\/pdst.fm\/e\/pscrb.fm\/rss\/p\/mgln.ai\/e\/294\/cdn.twit.tv\/megaphone\/sn_1073\/ARML1930818750.mp3","length":"165596067","type":"audio\/mpeg"}}},{"title":"SN 1072: LiteLLM - Click Fix Attacks Surge","pubDate":"Tue, 31 Mar 2026 19:23:56 PDT","link":"https:\/\/twit.tv\/shows\/security-now\/episodes\/1072","comments":"https:\/\/twit.tv\/shows\/security-now\/episodes\/1072","category":["Help & How To","Technology","Security"],"description":{},"guid":"https:\/\/pdst.fm\/e\/pscrb.fm\/rss\/p\/mgln.ai\/e\/294\/cdn.twit.tv\/megaphone\/sn_1072\/ARML2290772744.mp3","enclosure":{"@attributes":{"url":"https:\/\/pdst.fm\/e\/pscrb.fm\/rss\/p\/mgln.ai\/e\/294\/cdn.twit.tv\/megaphone\/sn_1072\/ARML2290772744.mp3","length":"162452974","type":"audio\/mpeg"}}},{"title":"SN 1071: Bucketsquatting - Meta and TikTok's Tracking Pixels","pubDate":"Tue, 24 Mar 2026 17:59:59 PDT","link":"https:\/\/twit.tv\/shows\/security-now\/episodes\/1071","comments":"https:\/\/twit.tv\/shows\/security-now\/episodes\/1071","category":["Help & How To","Technology","Security"],"description":{},"guid":"https:\/\/pdst.fm\/e\/pscrb.fm\/rss\/p\/mgln.ai\/e\/294\/cdn.twit.tv\/megaphone\/sn_1071\/ARML7831777533.mp3","enclosure":{"@attributes":{"url":"https:\/\/pdst.fm\/e\/pscrb.fm\/rss\/p\/mgln.ai\/e\/294\/cdn.twit.tv\/megaphone\/sn_1071\/ARML7831777533.mp3","length":"161114901","type":"audio\/mpeg"}}},{"title":"SN 1070: CISA's Free Internet Scanning - Malware Disguised as a VPN","pubDate":"Tue, 17 Mar 2026 19:22:21 PDT","link":"https:\/\/twit.tv\/shows\/security-now\/episodes\/1070","comments":"https:\/\/twit.tv\/shows\/security-now\/episodes\/1070","category":["Help & How To","Technology","Security"],"description":{},"guid":"https:\/\/pdst.fm\/e\/pscrb.fm\/rss\/p\/mgln.ai\/e\/294\/cdn.twit.tv\/megaphone\/sn_1070\/ARML7408701877.mp3","enclosure":{"@attributes":{"url":"https:\/\/pdst.fm\/e\/pscrb.fm\/rss\/p\/mgln.ai\/e\/294\/cdn.twit.tv\/megaphone\/sn_1070\/ARML7408701877.mp3","length":"159817174","type":"audio\/mpeg"}}},{"title":"SN 1069: You can't hide from LLMs - Was Your Smart TV a Stealth Proxy?","pubDate":"Tue, 10 Mar 2026 19:10:06 PDT","link":"https:\/\/twit.tv\/shows\/security-now\/episodes\/1069","comments":"https:\/\/twit.tv\/shows\/security-now\/episodes\/1069","category":["Help & How To","Technology","Security"],"description":{},"guid":"https:\/\/pdst.fm\/e\/pscrb.fm\/rss\/p\/mgln.ai\/e\/294\/cdn.twit.tv\/megaphone\/sn_1069\/ARML2041511297.mp3","enclosure":{"@attributes":{"url":"https:\/\/pdst.fm\/e\/pscrb.fm\/rss\/p\/mgln.ai\/e\/294\/cdn.twit.tv\/megaphone\/sn_1069\/ARML2041511297.mp3","length":"157252908","type":"audio\/mpeg"}}},{"title":"SN 1068: The Call Is Coming From Inside the House - Live From Zero Trust World 2026","pubDate":"Thu, 05 Mar 2026 10:25:00 PST","link":"https:\/\/twit.tv\/shows\/security-now\/episodes\/1068","comments":"https:\/\/twit.tv\/shows\/security-now\/episodes\/1068","category":["Help & How To","Technology","Security"],"description":{},"guid":"https:\/\/pdst.fm\/e\/pscrb.fm\/rss\/p\/mgln.ai\/e\/294\/cdn.twit.tv\/megaphone\/sn_1068\/ARML2553201573.mp3","enclosure":{"@attributes":{"url":"https:\/\/pdst.fm\/e\/pscrb.fm\/rss\/p\/mgln.ai\/e\/294\/cdn.twit.tv\/megaphone\/sn_1068\/ARML2553201573.mp3","length":"49949378","type":"audio\/mpeg"}}},{"title":"SN 1067: KongTuke's CrashFix - Click, Paste, Pwned","pubDate":"Tue, 03 Mar 2026 15:28:13 PST","link":"https:\/\/twit.tv\/shows\/security-now\/episodes\/1067","comments":"https:\/\/twit.tv\/shows\/security-now\/episodes\/1067","category":["Help & How To","Technology","Security"],"description":{},"guid":"https:\/\/pdst.fm\/e\/pscrb.fm\/rss\/p\/mgln.ai\/e\/294\/cdn.twit.tv\/megaphone\/sn_1067\/ARML3843496655.mp3","enclosure":{"@attributes":{"url":"https:\/\/pdst.fm\/e\/pscrb.fm\/rss\/p\/mgln.ai\/e\/294\/cdn.twit.tv\/megaphone\/sn_1067\/ARML3843496655.mp3","length":"166325440","type":"audio\/mpeg"}}},{"title":"SN 1066: Password Leakage - Zero Trust, Zero Knowledge","pubDate":"Tue, 24 Feb 2026 19:36:24 PST","link":"https:\/\/twit.tv\/shows\/security-now\/episodes\/1066","comments":"https:\/\/twit.tv\/shows\/security-now\/episodes\/1066","category":["Help & How To","Technology","Security"],"description":{},"guid":"https:\/\/pdst.fm\/e\/pscrb.fm\/rss\/p\/mgln.ai\/e\/294\/cdn.twit.tv\/audio\/sn\/sn1066\/sn1066.mp3","enclosure":{"@attributes":{"url":"https:\/\/pdst.fm\/e\/pscrb.fm\/rss\/p\/mgln.ai\/e\/294\/cdn.twit.tv\/megaphone\/sn_1066\/ARML5749737698.mp3","length":"163568830","type":"audio\/mpeg"}}},{"title":"SN 1065: Attestation - Code Signing Gets Tough","pubDate":"Tue, 17 Feb 2026 20:25:13 PST","link":"https:\/\/twit.tv\/shows\/security-now\/episodes\/1065","comments":"https:\/\/twit.tv\/shows\/security-now\/episodes\/1065","category":["Help & How To","Technology","Security"],"description":{},"guid":"https:\/\/pdst.fm\/e\/pscrb.fm\/rss\/p\/mgln.ai\/e\/294\/cdn.twit.tv\/megaphone\/sn_1065\/ARML3168693219.mp3","enclosure":{"@attributes":{"url":"https:\/\/pdst.fm\/e\/pscrb.fm\/rss\/p\/mgln.ai\/e\/294\/cdn.twit.tv\/megaphone\/sn_1065\/ARML3168693219.mp3","length":"154573819","type":"audio\/mpeg"}}}]}}