Is your robot vacuum safe? Here’s why it matters.

Media Thumbnail
00:00
00:00
1x
  • 0.5
  • 1
  • 1.25
  • 1.5
  • 1.75
  • 2
This is a podcast episode titled, Is your robot vacuum safe? Here’s why it matters.. The summary for this episode is: <p>Can IAM handle AI? Find out →&nbsp;<a href="https://www.ibm.com/think/podcasts/security-intelligence" rel="noopener noreferrer" target="_blank">https://www.ibm.com/think/podcasts/security-intelligence</a>&nbsp;</p><p><br></p><p>A consumer just wanted to control his own personal robot vacuum with a PlayStation controller. He ended up controlling thousands of strangers’ vacuums, too.&nbsp;</p><p><br></p><p>This week on Security Intelligence, we cover one of the wildest IoT security stories in recent memory: How one user accidentally built an army of 6,700 robot vacuums, and what it means for cybersecurity pros. &nbsp;</p><p>&nbsp;</p><p>Then we turn to TOAD — telephone-oriented attack delivery — a deceptively low-tech social engineering method that's quietly becoming one of attackers' favorite tools. We talk about why it works and what defenders can actually do about an attack that skips most of your defenses entirely.&nbsp;</p><p><br></p><p>And finally: healthcare's cybersecurity problems. This season of the hit medical drama <em>The Pitt</em> features a hospital-debilitating ransomware attack, which is perhaps one of the most realistic things to ever happen on a show known for its verisimilitude. We explore why ransomware is so prevalent in healthcare, why patching is rare and what it would actually take to change that.&nbsp;</p><p><br></p><p>00:00 -- Introduction&nbsp;</p><p>0:58 -- Rise of the robot vacuum army&nbsp;</p><p>10:02 -- Anthropic debuts Claude Code Security&nbsp;</p><p>24:39 -- Thwarting distillation attacks&nbsp;</p><p>34:23 -- Why hackers love TOADs&nbsp;</p><p>44:14 -- Healthcare’s cybersecurity woes&nbsp;</p><p><br></p><p><em>The opinions expressed in this podcast are solely those of the participants and do not necessarily reflect the views of IBM or any other organization or entity.</em>&nbsp;</p><p>&nbsp;</p><p>Explore the Threat Intelligence Index 2026 →<strong><em>&nbsp;</em></strong><a href="https://www.ibm.com/reports/threat-intelligence#sipod" rel="noopener noreferrer" target="_blank">https://www.ibm.com/reports/threat-intelligence#sipod</a>&nbsp;</p><p>&nbsp;</p><p>#AIcodesecurity #vibecoding #securitydebt #IoTsecurity #vishing&nbsp;</p>

DESCRIPTION

Can IAM handle AI? Find out → https://www.ibm.com/think/podcasts/security-intelligence 


A consumer just wanted to control his own personal robot vacuum with a PlayStation controller. He ended up controlling thousands of strangers’ vacuums, too. 


This week on Security Intelligence, we cover one of the wildest IoT security stories in recent memory: How one user accidentally built an army of 6,700 robot vacuums, and what it means for cybersecurity pros.  

 

Then we turn to TOAD — telephone-oriented attack delivery — a deceptively low-tech social engineering method that's quietly becoming one of attackers' favorite tools. We talk about why it works and what defenders can actually do about an attack that skips most of your defenses entirely. 


And finally: healthcare's cybersecurity problems. This season of the hit medical drama The Pitt features a hospital-debilitating ransomware attack, which is perhaps one of the most realistic things to ever happen on a show known for its verisimilitude. We explore why ransomware is so prevalent in healthcare, why patching is rare and what it would actually take to change that. 


00:00 -- Introduction 

0:58 -- Rise of the robot vacuum army 

10:02 -- Anthropic debuts Claude Code Security 

24:39 -- Thwarting distillation attacks 

34:23 -- Why hackers love TOADs 

44:14 -- Healthcare’s cybersecurity woes 


The opinions expressed in this podcast are solely those of the participants and do not necessarily reflect the views of IBM or any other organization or entity. 

 

Explore the Threat Intelligence Index 2026 → https://www.ibm.com/reports/threat-intelligence#sipod 

 

#AIcodesecurity #vibecoding #securitydebt #IoTsecurity #vishing