{"@attributes":{"version":"2.0"},"channel":{"title":"Security Now (Video)","link":"https:\/\/twit.tv\/shows\/security-now","generator":"TWiT Feed Generator v4.10","docs":"http:\/\/blogs.law.harvard.edu\/tech\/rss","language":"en-US","copyright":"This work is licensed under a Creative Commons License - Attribution-NonCommercial-NoDerivatives 4.0 International - http:\/\/creativecommons.org\/licenses\/by-nc-nd\/4.0\/","managingEditor":"feedmail@twit.tv (TWiT Editors)","webMaster":"feedmail@twit.tv (TWiT Engineering)","ttl":"720","lastBuildDate":"Tue, 14 Apr 2026 19:35:03 PDT","pubDate":"Tue, 14 Apr 2026 19:35:03 PDT","description":"Cybersecurity guru Steve Gibson joins Leo Laporte every Tuesday. Steve and Leo break down the latest cybercrime and hacking stories, offering a deep understanding of what's happening and how to protect yourself and your business. Security Now is a must listen for security professionals every week. You can join Club TWiT for $10 per month and get ad-free audio and video feeds for all our shows plus everything else the club offers...or get just this podcast ad-free for $5 per month.\n\nNew episodes every Tuesday.","category":["Technology","Security"],"image":{"title":"Security Now (Video)","url":"https:\/\/elroy.twit.tv\/sites\/default\/files\/styles\/twit_album_art_2048x2048\/public\/images\/shows\/Security%20Now\/album_art\/hd\/SN_albumart_standard_video.jpg","link":"https:\/\/twit.tv\/shows\/security-now"},"item":[{"title":"SN 1074: What Mythos Means - Marketing or Mayhem","pubDate":"Tue, 14 Apr 2026 19:27:43 PDT","link":"https:\/\/twit.tv\/shows\/security-now\/episodes\/1074","comments":"https:\/\/twit.tv\/shows\/security-now\/episodes\/1074","category":["Help & How To","Technology","Security"],"description":{},"guid":"https:\/\/pscrb.fm\/rss\/p\/mgln.ai\/e\/294\/cdn.twit.tv\/video\/sn\/sn1074\/sn1074_h264m_1920x1080.mp4","enclosure":{"@attributes":{"url":"https:\/\/pscrb.fm\/rss\/p\/mgln.ai\/e\/294\/cdn.twit.tv\/video\/sn\/sn1074\/sn1074_h264m_1920x1080.mp4","length":"2907996325","type":"video\/mp4"}}},{"title":"SN 1073: The FCC Bans New Consumer Routers - LinkedIn's JavaScript Bombshell","pubDate":"Tue, 07 Apr 2026 19:38:55 PDT","link":"https:\/\/twit.tv\/shows\/security-now\/episodes\/1073","comments":"https:\/\/twit.tv\/shows\/security-now\/episodes\/1073","category":["Help & How To","Technology","Security"],"description":{},"guid":"https:\/\/pscrb.fm\/rss\/p\/mgln.ai\/e\/294\/cdn.twit.tv\/video\/sn\/sn1073\/sn1073_h264m_1920x1080.mp4","enclosure":{"@attributes":{"url":"https:\/\/pscrb.fm\/rss\/p\/mgln.ai\/e\/294\/cdn.twit.tv\/video\/sn\/sn1073\/sn1073_h264m_1920x1080.mp4","length":"2924559988","type":"video\/mp4"}}},{"title":"SN 1072: LiteLLM - Click Fix Attacks Surge","pubDate":"Tue, 31 Mar 2026 19:23:56 PDT","link":"https:\/\/twit.tv\/shows\/security-now\/episodes\/1072","comments":"https:\/\/twit.tv\/shows\/security-now\/episodes\/1072","category":["Help & How To","Technology","Security"],"description":{},"guid":"https:\/\/pscrb.fm\/rss\/p\/mgln.ai\/e\/294\/cdn.twit.tv\/video\/sn\/sn1072\/sn1072_h264m_1920x1080.mp4","enclosure":{"@attributes":{"url":"https:\/\/pscrb.fm\/rss\/p\/mgln.ai\/e\/294\/cdn.twit.tv\/video\/sn\/sn1072\/sn1072_h264m_1920x1080.mp4","length":"2869146577","type":"video\/mp4"}}},{"title":"SN 1071: Bucketsquatting - Meta and TikTok's Tracking Pixels","pubDate":"Tue, 24 Mar 2026 17:59:59 PDT","link":"https:\/\/twit.tv\/shows\/security-now\/episodes\/1071","comments":"https:\/\/twit.tv\/shows\/security-now\/episodes\/1071","category":["Help & How To","Technology","Security"],"description":{},"guid":"https:\/\/pscrb.fm\/rss\/p\/mgln.ai\/e\/294\/cdn.twit.tv\/video\/sn\/sn1071\/sn1071_h264m_1920x1080.mp4","enclosure":{"@attributes":{"url":"https:\/\/pscrb.fm\/rss\/p\/mgln.ai\/e\/294\/cdn.twit.tv\/video\/sn\/sn1071\/sn1071_h264m_1920x1080.mp4","length":"2847814665","type":"video\/mp4"}}},{"title":"SN 1070: CISA's Free Internet Scanning - Malware Disguised as a VPN","pubDate":"Tue, 17 Mar 2026 19:22:21 PDT","link":"https:\/\/twit.tv\/shows\/security-now\/episodes\/1070","comments":"https:\/\/twit.tv\/shows\/security-now\/episodes\/1070","category":["Help & How To","Technology","Security"],"description":{},"guid":"https:\/\/pscrb.fm\/rss\/p\/mgln.ai\/e\/294\/cdn.twit.tv\/video\/sn\/sn1070\/sn1070_h264m_1920x1080.mp4","enclosure":{"@attributes":{"url":"https:\/\/pscrb.fm\/rss\/p\/mgln.ai\/e\/294\/cdn.twit.tv\/video\/sn\/sn1070\/sn1070_h264m_1920x1080.mp4","length":"2821965894","type":"video\/mp4"}}},{"title":"SN 1069: You can't hide from LLMs - Was Your Smart TV a Stealth Proxy?","pubDate":"Tue, 10 Mar 2026 19:10:06 PDT","link":"https:\/\/twit.tv\/shows\/security-now\/episodes\/1069","comments":"https:\/\/twit.tv\/shows\/security-now\/episodes\/1069","category":["Help & How To","Technology","Security"],"description":{},"guid":"https:\/\/pscrb.fm\/rss\/p\/mgln.ai\/e\/294\/cdn.twit.tv\/video\/sn\/sn1069\/sn1069_h264m_1920x1080.mp4","enclosure":{"@attributes":{"url":"https:\/\/pscrb.fm\/rss\/p\/mgln.ai\/e\/294\/cdn.twit.tv\/video\/sn\/sn1069\/sn1069_h264m_1920x1080.mp4","length":"2777496836","type":"video\/mp4"}}},{"title":"SN 1068: The Call Is Coming From Inside the House - Live From Zero Trust World 2026","pubDate":"Thu, 05 Mar 2026 10:25:00 PST","link":"https:\/\/twit.tv\/shows\/security-now\/episodes\/1068","comments":"https:\/\/twit.tv\/shows\/security-now\/episodes\/1068","category":["Help & How To","Technology","Security"],"description":{},"guid":"https:\/\/pscrb.fm\/rss\/p\/mgln.ai\/e\/294\/cdn.twit.tv\/video\/sn\/sn1068\/sn1068_h264m_1920x1080.mp4","enclosure":{"@attributes":{"url":"https:\/\/pscrb.fm\/rss\/p\/mgln.ai\/e\/294\/cdn.twit.tv\/video\/sn\/sn1068\/sn1068_h264m_1920x1080.mp4","length":"920423201","type":"video\/mp4"}}},{"title":"SN 1067: KongTuke's CrashFix - Click, Paste, Pwned","pubDate":"Tue, 03 Mar 2026 15:28:13 PST","link":"https:\/\/twit.tv\/shows\/security-now\/episodes\/1067","comments":"https:\/\/twit.tv\/shows\/security-now\/episodes\/1067","category":["Help & How To","Technology","Security"],"description":{},"guid":"https:\/\/pscrb.fm\/rss\/p\/mgln.ai\/e\/294\/cdn.twit.tv\/video\/sn\/sn1067\/sn1067_h264m_1920x1080.mp4","enclosure":{"@attributes":{"url":"https:\/\/pscrb.fm\/rss\/p\/mgln.ai\/e\/294\/cdn.twit.tv\/video\/sn\/sn1067\/sn1067_h264m_1920x1080.mp4","length":"2816258082","type":"video\/mp4"}}},{"title":"SN 1066: Password Leakage - Zero Trust, Zero Knowledge","pubDate":"Tue, 24 Feb 2026 19:36:24 PST","link":"https:\/\/twit.tv\/shows\/security-now\/episodes\/1066","comments":"https:\/\/twit.tv\/shows\/security-now\/episodes\/1066","category":["Help & How To","Technology","Security"],"description":{},"guid":"https:\/\/pscrb.fm\/rss\/p\/mgln.ai\/e\/294\/cdn.twit.tv\/video\/sn\/sn1066\/sn1066_h264m_1920x1080.mp4","enclosure":{"@attributes":{"url":"https:\/\/pscrb.fm\/rss\/p\/mgln.ai\/e\/294\/cdn.twit.tv\/video\/sn\/sn1066\/sn1066_h264m_1920x1080.mp4","length":"2888687090","type":"video\/mp4"}}},{"title":"SN 1065: Attestation - Code Signing Gets Tough","pubDate":"Tue, 17 Feb 2026 20:25:13 PST","link":"https:\/\/twit.tv\/shows\/security-now\/episodes\/1065","comments":"https:\/\/twit.tv\/shows\/security-now\/episodes\/1065","category":["Help & How To","Technology","Security"],"description":{},"guid":"https:\/\/pscrb.fm\/rss\/p\/mgln.ai\/e\/294\/cdn.twit.tv\/video\/sn\/sn1065\/sn1065_h264m_1920x1080.mp4","enclosure":{"@attributes":{"url":"https:\/\/pscrb.fm\/rss\/p\/mgln.ai\/e\/294\/cdn.twit.tv\/video\/sn\/sn1065\/sn1065_h264m_1920x1080.mp4","length":"2728493767","type":"video\/mp4"}}}]}}