DiscoverIT SPARC Cast
IT SPARC Cast
Claim Ownership

IT SPARC Cast

Author: John Barger

Subscribed: 1Played: 23
Share

Description

IT SPARC Cast is a digest of the Enterprise IT news over the last week, with insights, opinions, and a little sarcasm from 2 experts each with over 20 years of experience working in IT or for IT vendors.

Hosted on Acast. See acast.com/privacy for more information.

130 Episodes
Reverse
In this episode of IT SPARC Cast – News Bytes, John Barger & Lou Schmidt break down three stories that reveal how enterprise IT is being reshaped by workforce realities, infrastructure constraints, and custom silicon. From mounting evidence that work-from-office mandates are driving top talent out the door, to a Los Angeles startup using SpaceX rocket technology to cool data centers without water, to Microsoft unveiling a massive new AI inference chip designed to scale efficiently.The discussion connects culture, power, cooling, and compute—showing why AI growth isn’t just about models and GPUs, but about solving the physical and human constraints that come with them. If you’re responsible for enterprise IT strategy, infrastructure planning, or talent retention, this episode delivers context you won’t get from headlines alone.⸻⏱️ Show Notes00:00 – IntroJohn and Lou preview a packed episode covering remote-work backlash, radical new data-center cooling approaches, and Microsoft’s latest move to control its AI destiny with custom silicon.⸻📰 News Bytes01:00 – Work-From-Office Mandate? Expect Top Talent Turnover and Culture RotNew research highlighted by CIO Magazine shows that strict return-to-office mandates are driving increased attrition among top performers, longer hiring cycles, and declining trust. John and Lou unpack why “butts-in-seats” metrics fail modern organizations and how poor remote-management skills—not productivity—are often the real problem.https://www.cio.com/article/4119562/work-from-office-mandate-expect-top-talent-turnover-culture-rot.html ⸻08:14 – L.A. Startup Uses SpaceX Tech to Cool Data Centers With Less Power and No WaterAn LA-based startup is applying SpaceX rocket turbopump technology and supercritical CO₂ to dramatically reduce data-center cooling power, footprint, and water usage. The hosts explain why cooling—not chips—is becoming one of the biggest bottlenecks in AI expansion and how innovations like this could unlock sustainable growth.https://finance.yahoo.com/news/l-startup-uses-spacex-tech-175628363.html⸻14:11 – Microsoft Announces a Powerful New Chip for AI InferenceMicrosoft unveils the Maia 200, a custom AI inference accelerator built on TSMC’s 3-nm process with 100 billion transistors. John and Lou break down why inference-optimized chips matter, how this fits into a broader trend of hyperscalers building custom silicon, and why efficiency per watt is becoming the defining metric for AI at scale.https://techcrunch.com/2026/01/26/microsoft-announces-powerful-new-chip-for-ai-inference/⸻🔁 Wrap Up19:49 – Mail BagListener feedback revisits classic operating systems, early AI roots, and why distributed computing concepts from decades ago are suddenly relevant again.22:47 – Wrap UpJohn and Lou close by emphasizing that AI’s future depends on solving power, cooling, and organizational challenges—not just shipping faster chips.⸻🔗 Connect With UsIT SPARC Cast@ITSPARCCast on Xhttps://www.linkedin.com/company/sparc-sales/ on LinkedInJohn Barger@john_Video on Xhttps://www.linkedin.com/in/johnbarger/Lou Schmidt@loudoggeek on Xhttps://www.linkedin.com/in/louis-schmidt-b102446/ on LinkedIn Hosted on Acast. See acast.com/privacy for more information.
In this episode of IT SPARC Cast – CVE of the Week, John Barger and Lou Schmidt break format to examine two high-impact security and privacy stories that every enterprise IT and security leader should be paying attention to.First, we dive into a new lawsuit alleging that Meta can access or infer WhatsApp message contents, despite years of public claims that WhatsApp is fully end-to-end encrypted. We unpack what “access” really means in modern encrypted messaging systems, including metadata, client-side processing, backups, and enterprise risk implications—especially for organizations using WhatsApp for daily business communications.https://www.bloomberg.com/news/articles/2026-01-25/lawsuit-claims-meta-can-see-whatsapp-chats-in-breach-of-privacyNext, we examine a major data exposure involving Chat & Ask AI, a popular AI chatbot aggregator with tens of millions of users. Due to a backend Firebase misconfiguration, hundreds of millions of private conversations—including highly sensitive topics—were left publicly accessible. This incident highlights the growing risk of Shadow AI inside enterprises and the dangers of third-party AI wrappers that lack enterprise-grade security controls.https://www.404media.co/massive-ai-chat-app-leaked-millions-of-users-private-conversations/The episode closes with listener feedback on a previously covered UniFi Access vulnerability and a broader discussion on how organizations should educate, monitor, and protect users without resorting to blunt enforcement. Hosted on Acast. See acast.com/privacy for more information.
In this episode of IT SPARC Cast – News Bytes, John Barger & Lou Schmidt dig into three stories that highlight how enterprise IT is quietly—but fundamentally—restructuring itself. From executives questioning the long-term future of traditional ERP systems, to Ubiquiti introducing a new orchestration-driven take on network fabrics, to a grounded discussion on whether the AI bubble is real and why OpenAI may be far less fragile than critics assume.The conversation connects enterprise software evolution, network architecture at scale, and the hard economic realities of AI infrastructure—especially power and compute. If you’re responsible for enterprise platforms, networking strategy, or long-term IT planning, this episode provides context that goes beyond the headlines.⸻⏱️ Show Notes00:00 – IntroJohn and Lou preview the episode, touching on ERP’s looming transformation, UniFi’s new Fabric approach, and why AI demand—especially at OpenAI—is driven by hard infrastructure realities, not hype.⸻📰 News Bytes00:48 – ERP Isn’t Dead Yet – But Most Execs Are Planning the WakeA survey of more than 4,300 executives shows growing skepticism about ERP’s long-term dominance, even as most organizations remain satisfied with current systems. John and Lou explain why AI-driven, modular, and agentic ERP models are likely evolutions—not rip-and-replace events—and what enterprise IT teams should be doing now to prepare.https://www.theregister.com/2026/01/19/erp_survey_rimini_street/ ⸻06:28 – Ubiquiti Introduces UniFi FabricUbiquiti unveils UniFi Fabric, a centralized orchestration layer designed to manage policies, identity-based networking, Zero Trust, and multi-site environments without cloud licensing. The discussion compares UniFi’s approach to traditional network fabrics like VXLAN and SPBM, highlighting why this controller-first model could appeal to MSPs and mid-sized enterprises.https://blog.ui.com/article/introducing-unifi-fabrics ⸻14:14 – AI Bubble? Maybe. OpenAI Risk? Not Anytime Soon.John breaks down why OpenAI’s revenue growth is directly tied to available compute capacity, not speculative demand. Using concrete megawatt, gigawatt, and ARR figures, the hosts explain why AI may see valuation corrections—but why companies like OpenAI, NVIDIA, and Anthropic are unlikely to disappear.https://openai.com/index/a-business-that-scales-with-the-value-of-intelligence/ ⸻🔁 Wrap Up24:16 – Mail BagListener feedback reinforces the growing link between AI growth and power infrastructure, with discussion around electrical safety, regulation, and why energy expertise may be one of the most valuable skills in the coming decade.27:39 – Wrap UpJohn and Lou close with a reminder that enterprise IT leaders will increasingly be asked to validate power, nuclear, and infrastructure decisions at the executive level—and that staying informed now is critical.⸻🔗 Connect With UsIT SPARC Cast@ITSPARCCast on Xhttps://www.linkedin.com/company/sparc-sales/ on LinkedInJohn Barger@john_Video on Xhttps://www.linkedin.com/in/johnbarger/Lou Schmidt@loudoggeek on Xhttps://www.linkedin.com/in/louis-schmidt-b102446/ on LinkedIn Hosted on Acast. See acast.com/privacy for more information.
In this episode of IT SPARC Cast – CVE of the Week, John Barger and Lou Schmidt break from the traditional single-CVE format to examine VoidLink, a newly discovered Linux malware framework that represents a major shift in how cyberattacks may be built and executed going forward.Rather than focusing on one vulnerability, VoidLink is designed to chain together many smaller flaws across Linux, containers, and cloud platforms like AWS, Azure, GCP, Docker, and Kubernetes—creating a stealthy, long-term access platform. Researchers believe VoidLink was developed rapidly using AI assistants, offering a rare look at how next-generation malware may be authored, iterated, and deployed. This episode explains why VoidLink matters, how defenders should think about chained exploits, and why this may be an early warning sign for the future of cloud and container security.⸻Show Notes (Podcast)Episode OverviewThis week’s CVE of the Week focuses on VoidLink, a newly identified Linux malware framework designed for persistence, stealth, and modular exploitation across cloud and container environments. While not a single CVE, VoidLink highlights how attackers are moving toward framework-driven, AI-assisted exploit chaining rather than isolated vulnerabilities.Key Topics Covered•What VoidLink is and why it’s different from traditional malware•How chaining low-severity vulnerabilities can result in full compromise•Targeted environments: Linux, Docker, Kubernetes, AWS, Azure, and GCP•Use of loaders, implants, evasion techniques, and modular plugins•Evidence suggesting AI-assisted development with rapid iteration•Why this gives defenders a rare opportunity to observe a threat early in its lifecycle•The implications for cloud security, container hardening, and future CVEsWhy This MattersVoidLink represents a shift from one-off exploits to malware platforms—essentially an “IDE for hacking.” Understanding how these frameworks are built and how they operate is critical for anticipating future attacks and improving detection strategies before they become widespread.⸻Listener Feedback HighlightWe’d like to give a shout-out to Nihal for his thoughtful LinkedIn comment on our earlier Top 10 Operating System Failures episode—specifically his hot take defending Windows ME and critiquing Windows XP’s compatibility break. We love informed debate like this and appreciate listeners who challenge conventional wisdom.⸻Wrap-Up & Social LinksThat wraps up this episode of IT SPARC Cast – CVE of the Week. We couldn’t do this without listeners like you.Did we miss something? Do you have a topic you want us to cover?Send feedback to feedback@itsparccast.com or reach out on social.IT SPARC Cast@ITSPARCCast on Xhttps://www.linkedin.com/company/sparc-sales/ on LinkedInJohn Barger@john_Video on Xhttps://www.linkedin.com/in/johnbarger/ on LinkedInLou Schmidt@loudoggeek on Xhttps://www.linkedin.com/in/louis-schmidt-b102446/ on LinkedIn Hosted on Acast. See acast.com/privacy for more information.
In this episode of IT SPARC Cast – News Bytes, John Barger & Lou Schmidt break down a week of moves that signal where enterprise AI, cloud platforms, and data center infrastructure are really headed. From Apple officially leaning on Google to power its AI ambitions, to Microsoft giving IT admins the ability to remove Copilot, this episode highlights growing tension between vendor momentum and enterprise control.They also explore Google’s push to standardize AI-driven commerce through agent protocols and why Meta locking down more than 6 GW of nuclear power may be the clearest sign yet that energy—not silicon—is becoming the limiting factor for AI at scale. If you’re tracking AI strategy, platform lock-in, and the future of data centers, this episode connects the dots.📌 Show Notes00:00 – IntroThis week on IT SPARC Cast, John Barger and Lou Schmidt break down a week dominated by AI power shifts, enterprise pushback, and the growing reality that energy—not compute—may be the biggest constraint on AI’s future.📰 News Bytes00:52 – It’s Official: Apple Going with Google for AIApple confirms it will rely on Google’s Gemini models to power the next generation of Siri and Apple Intelligence. John and Lou discuss what this says about Apple’s AI strategy, the risks of deep vendor lock-in, and whether Apple can realistically switch models later without breaking workflows.https://techcrunch.com/2026/01/12/googles-gemini-to-power-apples-ai-features-like-siri/05:44 – Microsoft to Allow IT Admins to Uninstall CopilotMicrosoft is testing new Windows policies that allow enterprise IT teams to remove the consumer Copilot app from managed devices. The conversation explores enterprise data governance, Intune controls, and why this signals a broader shift toward AI choice rather than forced adoption.https://www.bleepingcomputer.com/news/microsoft/microsoft-may-soon-allow-it-admins-to-uninstall-copilot-on-managed-devices/09:46 – Google Announces a New Protocol for AI-Driven CommerceGoogle introduces the Universal Commerce Protocol (UCP), an open standard designed to let AI agents handle shopping, payments, and transactions across retailers. With backing from major brands and payment networks, John and Lou unpack why agent-driven commerce may become one of AI’s first truly mainstream use cases.https://techcrunch.com/2026/01/11/google-announces-a-new-protocol-to-facilitate-commerce-using-ai-agents/12:47 – Meta Signs Nuclear Power Deals for AI Data CentersMeta secures long-term nuclear power contracts totaling more than 6 GW to fuel its AI infrastructure. The discussion focuses on why power—not chips—is becoming the true bottleneck for AI expansion and why nuclear energy is rapidly moving from “controversial” to “necessary.”https://techcrunch.com/2026/01/09/meta-signs-deals-with-three-nuclear-companies-for-6-plus-gw-of-power/🔚 Wrap Up16:49 – Mail BagListener feedback revisits cross-platform AI agents, Apple’s closed ecosystem, and whether enterprises can afford to exclude Mac users as agentic AI becomes more central to daily workflows.18:53 – Wrap UpJohn and Lou close the episode by reinforcing a key theme: AI’s future will be defined as much by energy, policy, and interoperability as by model performance. Hosted on Acast. See acast.com/privacy for more information.
This week on IT SPARC Cast – CVE of the Week, John Barger and Lou Schmidt break down CVE-2025-20393, a CVSS 10.0 zero-day vulnerability affecting Cisco Secure Email Gateway (SEG) and related AsyncOS-based email security products.The flaw is actively exploited in the wild, remains unpatched, and—ironically—uses the spam filtering engine itself as the attack vector. With no user interaction required and evidence of nation-state activity, this vulnerability represents a worst-case scenario for organizations relying on Cisco’s email security stack.If you run Cisco Secure Email Gateway or Email Security Appliances, this is an emergency-level issue that demands immediate attention.⸻📌 Show Notes🚨 CVE of the Week: CVE-2025-20393•Severity: CVSS 10.0 (Critical)•Status: Actively exploited, no patch available•Vendor: Cisco🎯 Affected Products•Cisco Secure Email Gateway (SEG)•Cisco Email Security Appliance (ESA)•Cisco Secure Email and Web Manager (SEWM)•All affected systems run Cisco AsyncOS🔓 How the Exploit Works•Attackers deliver a specially crafted email that is processed before a spam verdict is reached•The payload is executed during email parsing, attachment handling, or content inspection•No user interaction required•The malicious email never needs to reach an inbox💥 Real-World Impact•Full remote code execution on the email gateway•Email interception and exfiltration (espionage risk)•Persistent access for follow-on attacks•Credential harvesting and downstream phishing using trusted infrastructure•Log wiping, making detection extremely difficult🌍 Threat Activity•Exploits observed as early as November 2025•Linked to Chinese state-aligned actors•Tracked under UAT-9686, associated with groups such as APT41 and UNC5174•Added to CISA’s Known Exploited Vulnerabilities (KEV) catalog🛡️ Mitigation Guidance (No Patch Available)•Immediately restrict and segment management interfaces•Tighten ACLs and allow lists•Treat SEG as Tier-Zero-adjacent infrastructure•If compromise is suspected: full system rebuild required•Assume persistence due to log tampering🧠 Commentary•The exploit weaponizes the very system designed to stop malicious email•Lack of a patch from a vendor of Cisco’s size raises serious concerns•For some organizations, this may prompt reevaluation of email security platforms altogether⸻🔚 Wrap-Up & Listener FeedbackWe want to thank listeners who continue to engage with the show and help shape the conversation:•GFABasic32 wrote:“Thanks for the emergency update on n8n. I love the balance of technical deep dives and high-level strategy. You guys make keeping up with CVEs actually entertaining.”•Dennis added:“I love the CVE of the Week. These episodes are like exposure therapy.”That’s exactly the goal—helping you face what’s happening in security so you can respond, not react.Have thoughts on this CVE or want us to cover another one? Reach out.⸻🔗 Social LinksIT SPARC Cast@ITSPARCCast on Xhttps://www.linkedin.com/company/sparc-sales/ on LinkedInJohn Barger@john_Video on Xhttps://www.linkedin.com/in/johnbarger/ on LinkedInLou Schmidt@loudoggeek on Xhttps://www.linkedin.com/in/louis-schmidt-b102446/ on LinkedIn Hosted on Acast. See acast.com/privacy for more information.
CES may be a consumer show, but this week it sent shockwaves through enterprise IT. In this episode of IT SPARC Cast – News Bytes, John Barger and Lou Schmidt break down why nearly every major chip vendor chose CES to unveil next-generation CPUs, what Lenovo’s new agentic AI strategy means for IT teams, and why Microsoft embedding Copilot deep into Windows could fundamentally change how operating systems work.From Intel’s attempt at a comeback, to AMD and Qualcomm’s positioning against NVIDIA, to growing concerns about trust, security, and AI agents living inside your OS, this episode separates meaningful signals from CES noise—and explains why power efficiency, autonomy, and control are becoming the real battlegrounds.⸻⏱️ Show Notes00:00 – IntroJohn and Lou frame CES as the unexpected epicenter of enterprise IT announcements, explaining why CPUs, AI, and robotics dominated the show—and why IT teams should care.⸻📰 News Bytes00:54 – New CPUs AnnouncedCES saw major CPU launches from Intel, AMD, Qualcomm, and NVIDIA—signaling a shift toward mainstream AI hardware announcements. Intel launched Panther Lake, AMD expanded Ryzen AI, Qualcomm pushed Snapdragon X2 for AI agents, and NVIDIA moved Rubin into full production.⸻09:45 – Lenovo’s New AI AgentLenovo unveiled Qira, an agentic AI designed to work across PCs, phones, wearables, and enterprise systems alongside Microsoft Copilot. The move highlights a growing push toward cross-device AI coordination—and raises questions about Apple’s closed ecosystem.⸻12:40 – Microsoft Integrates Copilot Deep into WindowsMicrosoft is embedding AI agent launchers directly into Windows, allowing third-party applications to register system-wide AI agents. While this may keep operating systems relevant, it introduces serious trust and security concerns around deep OS-level access.https://blogs.windows.com/windows-insider/2025/12/19/announcing-windows-11-insider-preview-build-26220-7522-dev-beta-channels/⸻🔁 Wrap Up19:03 – Mail BagListener feedback sparks a discussion on cloud outages, cost structures, and whether on-prem alternatives are becoming viable again for certain businesses.22:15 – Wrap UpJohn and Lou emphasize that resilience in the cloud is still possible—but only if organizations are willing to pay for it—and invite listeners to share what CES announcements stood out to them.IT SPARC Cast@ITSPARCCast on Xhttps://www.linkedin.com/company/sparc-sales/ on LinkedInJohn Barger@john_Video on Xhttps://www.linkedin.com/in/johnbarger/Lou Schmidt@loudoggeek on Xhttps://www.linkedin.com/in/louis-schmidt-b102446/ Hosted on Acast. See acast.com/privacy for more information.
In the first regular IT SPARC Cast - CVE of the Week episode of 2026, John & Lou dive into a critical, actively exploitable vulnerability shaking the automation world. CVE-2026-21858—dubbed Ni8mare—targets the popular workflow automation platform n8n, earning a full CVSS 10.0 due to unauthenticated remote code execution.They break down how a content-type confusion bug inside n8n’s webhook processing engine allows attackers to fully compromise systems, why automation platforms are uniquely dangerous when breached, and what this means for enterprises running self-hosted or lightly governed internal tooling. The episode also highlights listener feedback and calls out a community-built React security tool worth checking out.⸻Show NotesCVE of the Week: n8n “Ni8mare” (CVE-2026-21858)•What is n8n?An open-source, self-hosted workflow automation platform similar to Zapier or Make, widely used in enterprise and regulated environments for visual API-driven automation.•Severity & ScopeCVE-2026-21858 carries a CVSS 10.0, joining multiple recent n8n vulnerabilities rated 9.9–10.0. n8n has over 200,000 deployments across cloud and on-prem environments.•Technical Root CauseA content-type confusion flaw in webhook form-data handling allows attackers to bypass file validation and execute arbitrary code.•Why This Is DangerousWorkflow engines often touch identity systems, APIs, credentials, and business logic—making them high-value targets with blast radii far beyond a single server.•Enterprise TakeawayShadow IT, internally built automation, and lightly governed enablement tools must be continuously audited. Patch known systems—and actively hunt for unknown ones.https://thehackernews.com/2026/01/critical-n8n-vulnerability-cvss-100.htmlListener HighlightDennis called out the Ingram Micro ransomware outage, noting that he hadn’t realized just how disruptive that incident was. And he’s absolutely right—Ingram Micro going offline for roughly 9–10 days created a nightmare scenario for VARs, system integrators, and build shops that rely on Ingram for ordering, RMAs, and emergency drop-ship replacements.To put the scale in perspective, Ingram Micro processes an estimated $30–40 million per day in transactions. Even if some revenue was recovered later, the operational disruption, reputational damage, and downstream impact across the supply chain were massive. This is exactly why incidents like this belong in the conversation when we talk about real-world IT security failures.Thanks for the thoughtful comment, Dennis—we genuinely appreciate the feedback and the conversation it sparked.Wrap Up & Community EngagementThis episode reinforces a core theme: automation without security oversight becomes an enterprise liability. IT teams must partner with business units—not just say “no”—while enforcing continuous audits and rapid patching.Follow & ConnectIT SPARC Cast@ITSPARCCast on Xhttps://www.linkedin.com/company/sparc-sales/John Barger@john_Video on Xhttps://www.linkedin.com/in/johnbarger/Lou Schmidt@loudoggeek on Xhttps://www.linkedin.com/in/louis-schmidt-b102446/ Hosted on Acast. See acast.com/privacy for more information.
In this special predictions episode of IT SPARC Cast – News Bytes, John Barger and Lou Schmidt kick off 2026 by trading bold, unfiltered forecasts for enterprise IT, AI, cloud, energy, and geopolitics. With five predictions each—and no prior coordination—they round-robin through what they believe will define the next year in technology.From the deflation of the AI hype cycle and Apple’s inevitable AI acquisition, to quantum computing entering nation-state playbooks, nuclear power reshaping data centers, and lawsuits finally challenging cloud provider accountability, this episode puts both hosts on the record. At the end of the year, they’ll revisit every prediction and grade themselves—so these takes are meant to age in public.⸻⏱️ Show Notes00:00 – IntroJohn and Lou explain the format: ten total predictions for 2026, five each, shared live without coordination—and revisited at the end of the year for accountability.⸻🔮 2026 Predictions01:09 – Lou: The AI Bubble DeflatesAI investment cools as rationalization sets in—money keeps flowing, but weaker players and inflated expectations begin to fall away instead of a full collapse.01:29 – John: Apple Acquires an AI / LLM CompanyApple makes a major AI acquisition to avoid long-term dependence on competitors’ models and regain control over its AI strategy.02:53 – Lou: AI Starts to Get Really UsefulAI shifts from hype to practical value, quietly improving everyday workflows and real-world systems rather than flashy demos.04:11 – John: Nation States Use Quantum ComputingEvidence emerges that a nation-state is actively using quantum computing for espionage or cyber operations, even if never formally acknowledged.04:45 – Lou: AI Sneaks Into Places We Never ExpectedAI embeds itself into overlooked products and environments—especially AR, wearables, and location-aware systems—delivering small but meaningful gains.05:50 – John: Negative Reaction to OpenAI HardwareOpenAI’s hardware announcement is initially panned by the press and competitors, only to be vindicated later as its purpose becomes clear.  06:51 – Lou: Power Gets Real for Data CentersEnergy—not chips—becomes the primary constraint for cloud and enterprise infrastructure, forcing new generation strategies into production.08:00 – John: Small Modular Nuclear Reactors Explode (In a Good Way)SMRs rapidly gain funding, deployments, and valuations as they become the only scalable answer to data center power demand.08:36 – Lou: The Privacy Environment Gets WeirdGeopolitics, AI agents, and shifting borders create inconsistent and unpredictable privacy regimes across regions.10:11 – John: Lawsuits Over Cloud OutagesMajor lawsuits—possibly class actions—emerge after cloud outages cause real-world harm, forcing legal accountability for uptime failures.⸻🔁 Wrap Up11:58 – Wrap UpJohn and Lou invite listeners to submit their own 2026 predictions and commit to revisiting all forecasts at year’s end to see who was right.IT SPARC Cast@ITSPARCCast on Xhttps://www.linkedin.com/company/sparc-sales/ on LinkedInJohn Barger@john_Video on Xhttps://www.linkedin.com/in/johnbarger/Lou Schmidt@loudoggeek on Xhttps://www.linkedin.com/in/louis-schmidt-b102446/ Hosted on Acast. See acast.com/privacy for more information.
n this special CVE Year in Review episode of IT SPARC Cast, John Barger and Lou Schmidt break from the usual single-CVE format to count down the five worst IT security failures of 2025.From long-lived remote code execution flaws in enterprise networking gear, to a ransomware attack that shut down a global distributor, to systemic cloud outages that shattered the concept of “five nines” availability, this episode looks at what really went wrong—and why it matters heading into 2026.These weren’t theoretical risks. They were real-world failures that disrupted supply chains, exposed critical infrastructure, and forced the industry to rethink assumptions about resilience, cloud reliability, and operational security.⸻📋 Show Notes🔥 Top 5 IT Security Fails of 202501:39 - #5 – Ruckus NetworksRuckus suffered from multiple long-lived remote code execution and authentication bypass vulnerabilities that persisted across 2024 and 2025. Impacted products included SmartZone, ZoneDirector, Cloudpath, and ICX switch management interfaces. Several flaws allowed unauthenticated access to management planes, enabling attackers to take over wireless controllers, push malicious firmware, and pivot deeper into enterprise networks. The lack of timely patches and limited communication made remediation especially painful for customers.04:32 - #4 – Ingram MicroA ransomware attack forced one of the world’s largest technology distributors to effectively shut down operations for days. Ordering systems went offline, patch access was disrupted, and thousands of downstream partners and customers were impacted. While it remains unclear whether ransom was paid, the incident highlighted how a single distributor outage can cascade across the IT supply chain, delaying hardware replacements, breaking SLAs, and costing millions in lost revenue.07:21 - #3 – SAP NetWeaverCVE-2025-31324 exposed a critical unauthenticated remote code execution flaw in SAP NetWeaver’s Visual Composer. Actively exploited in the wild before many organizations were aware of its existence, the vulnerability gave attackers potential access to finance, HR, procurement, and supply-chain data. For enterprises running SAP at the core of operations, successful exploitation meant full application takeover and deep visibility into business processes.10:26 - #2 – ReactA severe remote code execution issue in React sent shockwaves through the software ecosystem. With an estimated one-third of cloud applications depending on React, attackers were able to chain exploits involving dependency poisoning, build pipeline compromise, and even client-side execution. While patches were released quickly, the sheer scale of affected deployments meant many systems remained vulnerable well after disclosure—and some still are.12:23 - #1 – Cloud Outages2025 marked the year that “five nines” effectively died. Major outages across AWS, Microsoft Azure, Google Cloud, Microsoft 365, and IBM Cloud caused multi-hour disruptions affecting identity systems, collaboration tools, healthcare platforms, and public-safety infrastructure. Many incidents were caused not by attackers, but by control plane failures, DNS issues, NTP misconfigurations, and cascading dependencies. The result: billions in estimated financial impact and renewed concern over life-critical workloads running entirely in the cloud.Watch Cloud SLA Theater: Why 99.999% Uptime Is a Joke in 2025 - https://www.youtube.com/watch?v=ygcYoFBXdjQ⸻17:19 - Wrap UpIf you think we missed a major security failure—or disagree with our rankings—we want to hear from you. Reach out, leave a comment, or send us feedback. Your insights often shape future episodes.🔗 Connect With UsIT SPARC CastX: @ITSPARCCastLinkedIn: https://www.linkedin.com/company/sparc-sales/John BargerX: @john_VideoLinkedIn: https://www.linkedin.com/in/johnbarger/Lou SchmidtX: @loudoggeekLinkedIn: https://www.linkedin.com/in/louis-schmidt-b102446/ Hosted on Acast. See acast.com/privacy for more information.
This week on IT SPARC Cast, John Barger and Lou Schmidt break down three stories shaping the future of enterprise IT—from continued AI spending despite questionable ROI, to radically new approaches to long-term data storage, and a major consolidation in the online learning market.⸻📰 News Bytes00:46 – CEOs Keep Spending on AI Despite Spotty ReturnsDespite mixed financial outcomes, a growing number of CEOs plan to increase AI investment through 2026, viewing AI as strategically unavoidable rather than immediately profitable.Key discussion points:•Fewer than half of current AI projects are delivering clear ROI•Strong gains in sales, marketing, customer service, and developer productivity•Weak performance in regulated, high-risk areas like legal, HR, compliance, and cybersecurity•Layoffs blamed on AI may result in long-term operational backlashThe hosts argue that AI should augment human expertise, not prematurely replace it—and warn against betting the company on incomplete automation strategies.https://www.msn.com/en-us/technology/artificial-intelligence/ceos-to-keep-spending-on-ai-despite-spotty-returns/ar-AA1SkMcE07:34 – 5D Glass Storage: Crystals for the EnterpriseA UK company, SPhotonix, is advancing 5D glass storage, capable of preserving data for billions of years by etching nanoscale structures into glass using femtosecond lasers.Highlights include:•360 TB per 5-inch glass disk•Designed for permanent archival, not hot or warm storage•Potential replacement for long-term tape archives•Early write speeds are slow, but roadmap improvements are promisingThis technology positions itself as a future-proof solution for enterprises, governments, universities, and cultural institutions facing long-term data retention challenges.https://www.tomshardware.com/pc-components/storage/sphotonix-pushes-5d-glass-storage-toward-data-center-pilots15:00 – Coursera Acquires Udemy for $930 MillionOnline education giant Coursera is acquiring Udemy in a deal valued at approximately $930 million, creating a dominant force in enterprise and consumer e-learning.Discussion points:•Udemy’s strong practitioner-led course model•Coursera’s academic and credentialing reach•Expanded use of AI for assessments, personalization, and skills validation•Potential shift toward a “market-driven university” modelThe hosts see this consolidation as a net positive for enterprise IT teams responsible for compliance training, upskilling, and leadership development.https://techcrunch.com/2025/12/17/coursera-and-udemy-enter-a-merger-agreement-valued-at-around-2-5b/🔁 Wrap Up20:00 – Listener Feedback⭐ Community Call-Out: Abdullah’s React Audit ToolA special shout-out to Abdullah ( https://x.com/ozkayabd ) who responded on X after a previous React CVE episode and shared an open-source tool to help teams audit their environments:👉 React Audit Scannerhttp://rsc-auditor.vercel.appThis tool allows teams to quickly check whether they may be impacted by recent React vulnerabilities. As always, review and validate any third-party tool before using it in production.A special shout-out to Megan, who reached out after the episode with thoughtful feedback—and who’s doing important work to tackle a problem far too many people experience: ghosting of job applicants by recruiters and HR teams.Megan is actively pushing for better communication, transparency, and basic professionalism in the hiring process. It’s a reminder that while we talk a lot about AI, automation, and efficiency, the human side of tech and hiring still matters. Follow her on LinkedIn:https://www.linkedin.com/in/megan-julianoConnect with the hosts and the show:IT SPARC Cast@ITSPARCCast on Xhttps://www.linkedin.com/company/sparc-sales/John Barger@john_Video on Xhttps://www.linkedin.com/in/johnbarger/Lou Schmidt@loudoggeek on Xhttps://www.linkedin.com/in/louis-schmidt-b102446/ Hosted on Acast. See acast.com/privacy for more information.
In this episode of IT SPARC Cast – CVE of the Week, John Barger and Lou Schmidt break down a long-overdue security move from Microsoft: disabling the RC4 cipher by default across Windows authentication infrastructure. After more than two decades of known cryptographic weaknesses, RC4 is finally being deprecated in favor of modern encryption standards like AES.The discussion covers why RC4 persisted for so long, how legacy Active Directory and Kerberos environments kept it alive, and why attackers have continued to exploit it through techniques like Kerberoasting. The hosts also highlight the new logging, auditing, and PowerShell tools Microsoft released to help enterprises identify and eliminate lingering RC4 dependencies—without breaking production systems.⸻📋 Show Notes🔐 Main Topic: Microsoft Disables RC4 by Default•Microsoft is removing RC4 (Rivest Cipher 4) as a default cipher in Windows authentication after more than 25 years.•RC4 has been known to be cryptographically broken for decades and has been actively exploited in real-world attacks.•The change impacts Kerberos authentication across Windows Server 2008 and later.•RC4 will still function only if explicitly re-enabled—which is strongly discouraged.⚠️ Why RC4 Is Dangerous•RC4 has been abused in Kerberoasting attacks against Active Directory environments.•Weak encryption allows attackers to extract service account credentials offline.•Keeping RC4 enabled significantly increases the blast radius of a compromised domain.🛠️ What Microsoft Did Right This Time•Added enhanced Kerberos logging (Event IDs 4768 and 4769) to identify RC4 usage.•Released PowerShell scripts to audit domain controllers for RC4 dependencies.•Published clear migration guidance to move environments to AES-SHA1 and stronger encryption.•Provided visibility before enforcing the change, helping admins avoid outages.🎧 Listener Feedback Highlight•A YouTube listener praised the CVE of the Week format as being highly valuable from an ops and security standpoint.•Strong validation that actionable vulnerability analysis resonates with enterprise IT teams.⭐ Community Call-Out: Abdullah’s React Audit ToolA special shout-out to Abdullah ( https://x.com/ozkayabd ) who responded on X after a previous React CVE episode and shared an open-source tool to help teams audit their environments:👉 React Audit Scannerhttp://rsc-auditor.vercel.appThis tool allows teams to quickly check whether they may be impacted by recent React vulnerabilities. As always, review and validate any third-party tool before using it in production.⸻🔚 Wrap Up & Social LinksIT SPARC Cast@ITSPARCCast on Xhttps://www.linkedin.com/company/sparc-sales/ on LinkedInJohn Barger@john_Video on Xhttps://www.linkedin.com/in/johnbarger/ on LinkedInLou Schmidt@loudoggeek on Xhttps://www.linkedin.com/in/louis-schmidt-b102446/ on LinkedIn Hosted on Acast. See acast.com/privacy for more information.
In this episode of IT SPARC Cast – News Bytes, John and Lou tackle one of the most emotionally charged weeks in enterprise IT. Google CEO Sundar Pichai openly acknowledges that AI-driven layoffs will cause real pain before progress—a statement that sparks a candid Hot Take on disruption, job loss, and opportunity.From there, the show dives deep into the mounting backlash against U.S. data centers, with over 200 environmental groups demanding a halt to new builds—ironically accelerating plans for orbital data centers. The conversation then turns optimistic as the inventor of the Super Soaker unveils a breakthrough technology that converts waste heat directly into electricity, potentially reshaping geothermal and data center power economics.Finally, the guys explore Boom Supersonic’s unexpected pivot—using jet engines as grid-scale power generators for data centers—and Google’s launch of managed MCP servers that allow AI agents to plug directly into core Google services with minimal integration effort.⸻⏱️ Show Notes00:00 – IntroThis week: Google admits AI pain is coming, environmentalists push data centers toward orbit, waste heat becomes power, and AI agents get a universal plug.⸻HOT TAKE00:55 – Google CEO on AI Layoffs: “We’re All Going to Have to Suffer Through It”•Sundar Pichai acknowledges widespread layoffs and economic strain tied to AI adoption.•John and Lou discuss why AI-driven efficiency gains are being used as justification for premature workforce cuts.•Key argument: AI doesn’t replace people—it amplifies small teams and enables entrepreneurship.https://www.msn.com/en-us/money/companies/google-ceo-says-we-re-all-going-to-have-to-suffer-through-it-as-ai-puts-society-through-the-woodchipper/ar-AA1S5Pzx ⸻NEWS BYTES06:11 – More Than 200 Environmental Groups Demand Halt to New U.S. Data Centers•Greenpeace and others cite water usage, power demand, and CO₂ emissions.•~$64 billion in data center projects already delayed or halted.•Lou explains why this pressure is accelerating interest in orbital data centers—one FCC license vs. hundreds of local permits.https://www.theguardian.com/us-news/2025/dec/08/us-data-centers ⸻10:26 – Super Soaker Inventor Wants to Turn Waste Heat into Electricity•Lonnie Johnson (inventor of the Super Soaker) unveils the Johnson Thermal Electrochemical Converter (JTEC).•Works with small temperature differentials—no turbines, no moving parts.•Could dramatically change how data centers source supplemental power.https://www.ajc.com/business/2025/11/earth-needs-more-energy-atlantas-super-soaker-creator-may-have-a-solution/ ⸻13:08 – Boom Supersonic Uses Jet Engines to Power Data Centers•Boom Supersonic repurposes its jet engine designs into natural gas turbines for data centers.•Each turbine outputs ~42 MW; initial orders exceed 1.2 GW and are rapidly increasing.•First deliveries expected in 2027; turbine factory opening next year.•John and Lou connect this to job creation across manufacturing, operations, and IT management.https://techcrunch.com/2025/12/10/google-is-going-all-in-on-mcp-servers-agent-ready-by-design/ ⸻16:44 – Google Launches Managed MCP Servers for AI Agents•Google introduces managed Model Context Protocol (MCP) servers on GCP.•MCP creates a universal “language” for AI agents to interact with tools and services.•Reduces API complexity—ask questions, get results, take action.•Free during public preview for enterprise customers.•Lou calls this a major step toward AI-native enterprise workflows.https://techcrunch.com/2025/12/10/google-is-going-all-in-on-mcp-servers-agent-ready-by-design/ ⸻Wrap Up20:38 – Mail Bag & Wrap Up•Listener feedback highlights interest in portable and containerized data centers.IT SPARC Cast@ITSPARCCast on Xhttps://www.linkedin.com/company/sparc-sales/ on LinkedInJohn Barger@john_Video on Xhttps://www.linkedin.com/in/johnbarger/ on LinkedInLou Schmidt@loudoggeek on Xhttps://www.linkedin.com/in/louis-schmidt-b102446/ on LinkedIn Hosted on Acast. See acast.com/privacy for more information.
This week on IT SPARC Cast – CVE of the Week, John Barger and Lou Schmidt break down a code-red security situation affecting a massive portion of the modern web. CVE-2025-55182 is a critical, actively exploited vulnerability in React Server Components (RSC) that enables unauthenticated remote code execution, even in applications that don’t explicitly use server functions.With an estimated 33–35% of cloud-based services running React, attackers are already leveraging automated tooling to deploy cryptominers, Linux backdoors, and persistent malware across vulnerable systems. If you run React, Next.js, or containerized web workloads, this episode outlines exactly why this exploit is so dangerous, how attackers are weaponizing it, and what you must do right now to mitigate risk—from emergency patching to Zero Trust and micro-segmentation strategies.⸻Show Notes🔴 CVE of the Week: CVE-2025-55182 (React Server Components RCE)In this episode, John and Lou sound the alarm on a critical vulnerability in React Server Components that has escalated from disclosure to active, automated exploitation in the wild.Key points covered:•CVE-2025-55182 allows unauthenticated remote code execution via unsafe serialization and deserialization in React Server Component endpoints•Vulnerable components include:•react-server-dom-webpack•react-server-dom-parcel•react-server-dom-turbopack•A related issue impacts Next.js App Router deployments, tracked separately as CVE-2025-66478•Even applications that do not explicitly use server functions may still be exploitable if RSC support exists🚨 Active Exploitation ConfirmedLou shares real-time intelligence showing attackers using automated tooling dubbed “React-to-Shell”, delivering:•Cryptocurrency miners•Linux backdoors (PeerBlight)•Reverse proxy tooling (CowTunnel)•Go-based post-exploitation implants (ZinFoq)This is no longer theoretical—production systems are being compromised right now.🛡️ Immediate Mitigation GuidanceIf you run React or Next.js workloads:•Patch immediately to fixed versions•Disable or strictly isolate RSC server function endpoints if not required•Place RSC behind WAFs and strict network controls•Harden container and OS permissions•Implement payload anomaly detection•Move toward micro-segmentation and Zero Trust architectures to limit blast radiusJohn and Lou emphasize that patching alone is no longer enough in an era of AI-accelerated exploitation.⸻Wrap Up & Community FeedbackThe episode closes with listener feedback from LinkedIn discussing CXL memory pooling and how it is changing enterprise infrastructure economics—plus a recommendation to check out deep-dive demos from Serve The Home.As always, the team invites listener input on whether future episodes should focus on individual CVEs or broader security themes.⸻Follow & ConnectIT SPARC Cast@ITSPARCCast on Xhttps://www.linkedin.com/company/sparc-sales/John Barger@john_Video on Xhttps://www.linkedin.com/in/johnbarger/Lou Schmidt@loudoggeek on Xhttps://www.linkedin.com/in/louis-schmidt-b102446/ Hosted on Acast. See acast.com/privacy for more information.
In this episode of IT SPARC Cast – News Bytes, John and Lou cover a packed week in tech policy, AI disruption, and cloud infrastructure. Apple loses its AI chief as the company struggles to keep pace with rivals. India orders smartphone makers to preload a government surveillance app—then backpedals after Apple pushes back. Sam Altman declares a “Code Red” inside OpenAI as pressure mounts from Google, Anthropic, and the entire LLM ecosystem. And finally, Amazon and Google partner on a new high-speed multi-cloud interconnect—an unexpected alliance triggered in part by AWS’ recent outages.This episode blends politics, enterprise IT strategy, security concerns, and cloud architecture trends—delivered with classic SPARC Cast sarcasm.⏱️ Show Notes00:00 – IntroThis week: Apple says goodbye to its AI chief, India tests mandatory surveillance apps, OpenAI hits the panic button, and Amazon+Google become “friends with benefits.”NEWS BYTES00:46 – Apple AI Chief ExitsApple confirms that John Giannandrea, SVP of Machine Learning & AI Strategy, will step down in Spring 2026.•He was Apple’s “big hire from Google” and led AI initiatives for eight years.•His replacement: Amar Subramanya, reporting to Craig Federighi.•John & Lou discuss Apple’s AI struggles:– Apple Intelligence is “not what was promised”—delayed, underwhelming, and widely criticized.https://www.apple.com/newsroom/2025/12/john-giannandrea-to-retire-from-apple/ 06:43 – India Orders Smartphone Makers to Preload State-Owned Cyber Safety AppIndia announces a mandate requiring all new smartphones to include a government-built, undeletable cybersecurity app.•Goal: combat rising cybercrime, IMEI cloning, stolen-device fraud.•Users cannot remove or disable the app.•Lou and John highlight the risk.https://www.reuters.com/sustainability/boards-policy-regulation/india-orders-mobile-phones-preloaded-with-government-app-ensure-cyber-safety-2025-12-01/ 11:51 – Sam Altman Declares ‘Code Red’ for ChatGPTOpenAI CEO Sam Altman declares an internal “Code Red” tied to ChatGPT 5.2.•All nonessential projects—including the Pulse personalized assistant—paused.•Focus is entirely on improving 5.2 performance, reliability, and user experience.•Why now?– Gemini just jumped ahead in accuracy.– Claude leads in coding tasks.– Competition is moving at blistering speed.https://www.macrumors.com/2025/12/02/openai-delays-ad-plans/ 16:55 – Amazon and Google Launch Multicloud Service for Faster ConnectivityAmazon Web Services & Google Cloud jointly launch a multi-cloud private interconnect for rapid cross-cloud connectivity.•High-speed AWS ↔ Google Cloud links provisioned in minutes, not weeks.•Early adopter: Salesforce.•Why this matters:– After the major AWS East-1 outage, enterprises need cloud failover options fast.– This partnership essentially creates a safety net: if one cloud fails, the other can pick up load.https://www.reuters.com/business/retail-consumer/amazon-google-launch-multicloud-service-faster-connectivity-2025-12-01/ 20:32 – Mail Bag & Wrap UpSocial Links:IT SPARC Cast@ITSPARCCast on Xhttps://www.linkedin.com/company/sparc-sales/John Barger@john_Video on Xhttps://www.linkedin.com/in/johnbarger/Lou Schmidt@loudoggeek on Xhttps://www.linkedin.com/in/louis-schmidt-b102446/ Hosted on Acast. See acast.com/privacy for more information.
In this episode of IT SPARC Cast – News Bytes, John and Lou break down Ubiquiti’s brand-new UniFi wireless bridging lineup, test drive the surprisingly powerful ChatGPT Group Chat feature, and review the newly released IT Specialist Simulator game—yes, it’s a real thing.Lou also shares his SuperComputing 25 highlights, covering quantum computing, CXL memory extension, and why this year’s show was one of the most energetic he’s ever seen. A packed week for enterprise IT, networking, AI tooling, and HPC.⏱️ Show Notes00:00 – IntroA preview of the week’s topics: ChatGPT enters the chat, Pixel Team Red makes IT into a game, and UniFi pushes wireless bridging further.NEWS BYTES01:21 – All-New UniFi BridgingUbiquiti announces an expanded lineup of UniFi bridging hardware, offering new flexibility for building-to-building links and hard-to-cable environments. Key highlights:•Building Bridge Single Unit – no more buying pairs; units can now be paired or re-paired on demand.•Device Bridge IoT – tiny 2.4 GHz client bridge for connecting wired devices where Ethernet isn’t available.•Device Bridge Switch – 2.5GbE PoE switch + Wi-Fi 7 / 6 GHz bridging for high-throughput deployment without new cabling.•Ideal for renters, campuses, remote buildings, and temporary connectivity.https://blog.ui.com/article/all-new-unifi-bridging 05:00 – ChatGPT Group ChatsChatGPT now offers multi-user group chats, allowing collaborative research, shared notes, and real-time AI-assisted discussions.•Works like “ChatGPT inside Slack or Teams.”•No cross-bleed from personal ChatGPT memory—group chats stay isolated.•Great for brainstorming, problem-solving, and real-time content creation.•John tests memory segmentation and explains why this feature actually matters for privacy.https://openai.com/index/group-chats-in-chatgpt/ 07:38 – IT Specialist Simulator (Game)A new Steam game, IT Specialist Simulator, lets players start as junior IT techs and work their way up the ladder.•Tasks include configuring IP addresses, handling tickets, and climbing into management roles.•John plans to test it using Crossover on his Mac during Thanksgiving vacation.•Lou questions whether this is secretly a recruitment or training tool.•Possible educational value for beginners learning networking basics.https://store.steampowered.com/app/3266090/IT_Specialist_Simulator/10:16 – Lou’s SuperComputing 25 OverviewLou shares additional SC25 observations not covered in the shorts:•Deep dive conversations with quantum computing firms including Alice & Bob.•IBM’s quantum roadmap and why commercial systems are likely 2030+.•How quantum computing targets molecular simulation, advanced materials, next-gen drugs, and computational fluid dynamics.•The rise of CXL, PCIe expansion, and technologies enabling enterprises to extend hardware rather than replace it.•SC25 was one of the most active HPC events Lou has seen in decades.Wrap Up14:42 – Listener Feedback & Wrap UpListeners react to recent shorts, including extreme cooling solutions (0.01 Kelvin) and moon-mined Helium-3 for future fusion and quantum workloads.Full contact and feedback channels below:Social LinksIT SPARC Cast@ITSPARCCast on Xhttps://www.linkedin.com/company/sparc-sales/ on LinkedInJohn Barger@john_Video on Xhttps://www.linkedin.com/in/johnbarger/ on LinkedInLou Schmidt@loudoggeek on Xhttps://www.linkedin.com/in/louis-schmidt-b102446/ on LinkedIn Hosted on Acast. See acast.com/privacy for more information.
In this episode of IT SPARC Cast, Lou brings you a packed 8-minute walkthrough of the biggest themes and technologies from SuperComputing 25—the largest and busiest HPC show he’s ever attended.In this video, Lou covers:🔥 Cooling Wars: immersion cooling, PG25 liquid loops, cavitation risks, phase-change fluids, and long-term hardware reliability.🧠 CXL & Memory Expansion: shared GPU pools, multi-host memory fabrics, and how CXL can extend server life.☁️ Hybrid Cloud AI Platforms: two research-born vendors (including one FedRAMP-compliant) redefining HPC + cloud orchestration.⚡ Infrastructure Giants: the mind-blowing cooling and power equipment that will shape future enterprise data centers.And John reads out Listener Feedback regarding AlmaLinux as the successor to CentOS.If you want a concise, expert-level briefing from the SC25 show floor—this is the one to watch.What it on Youtube Here - https://youtu.be/Ve57fs7efFY00:00 – Intro01:08 – Greeting from Super Computing 25Lou sets the stage after returning from SuperComputing 25, describing the massive scale of the show, packed floors, and how SC25 has effectively replaced events like Interop and SuperComm.NEWS & TECH BREAKDOWN02:22 – The Major Theme: Cooling, Cooling, CoolingLou explains that cooling dominated the show, with two primary approaches emerging:1. Immersion Cooling•Full-system submersion in mineral oil or engineered fluids2. Active Liquid Cooling (PG25 Mix)•Issues explored: erosion, cavitation, biological growth, thermal cycling, solder fatigue3. Phase-Change Approaches•Solutions that vaporize at fixed temperatures (e.g., 55°C boiling point phase-change fluids)Why It Matters: Enterprise hardware longevity, reduced thermal stress, and predictable cooling efficiency.05:41 – CXL & Memory Expansion: The Future of Server Life ExtensionLou discusses a major standout category: CXL (Compute Express Link) technologies allowing:•Shared memory pools & GPUs across multiple hosts•Extending server life by adding external memory instead of replacing hardware•Switching architectures enabling dynamic assignment of terabytes of memory to GPUsEnterprise takeaway: “Do more with less” becomes practical—critical during recessionary or budget-tight periods.⸻07:55 – Hybrid Cloud AI PlatformsLou meets with two research-born companies offering advanced hybrid cloud and orchestration stacks:•One FedRAMP-compliant, built for U.S. federal and defense workloads•One European research derivative, designed for container-heavy hybrid environments without VMware relianceThese solutions focus on orchestration, HPC-to-cloud overflow, container scheduling, and distributed compute for AI.09:19 – Wrap UpJohn closes by encouraging viewers to watch the upcoming shorts and emphasizing how SC25 showcased the next generation of enterprise-class tech. He also covers Listener Feedback on our first short from SC25 regarding AlmaLinuxSocial LinksIT SPARC Cast@ITSPARCCast on Xhttps://www.linkedin.com/company/sparc-sales/ on LinkedInJohn Barger@john_Video on Xhttps://www.linkedin.com/in/johnbarger/ on LinkedInLou Schmidt@loudoggeek on Xhttps://www.linkedin.com/in/louis-schmidt-b102446/ on LinkedIn Hosted on Acast. See acast.com/privacy for more information.
In this episode of IT SPARC Cast – News Bytes, John and Lou tackle a wild week in enterprise IT—from grounded aircraft disrupting hardware logistics, to open-source maintainers calling out Google, to sophisticated VM-based malware hiding inside Windows systems, to Santa Clara’s power grid collapsing under the weight of the AI boom.First, a tragic UPS MD-11 crash in Louisville forces both UPS and FedEx to ground all MD-11 aircraft—creating ripple effects for enterprise sparing strategies and next-day hardware replacement SLAs. John and Lou explain how events outside the IT bubble can quietly break your uptime guarantees.Then, the maintainers of FFmpeg publicly call out Google: either fund the project or stop flooding it with fuzz-generated bugs. The hosts explore the broader lesson: organizations relying on open source must contribute—code, money, or both.Next, the team walks through a jaw-dropping Hyper-V evasion technique, where Russian hackers spin up hidden Alpine Linux VMs to run malware undetected by EDR tools. Lou calls it “one of the most clever attack chains we’ve seen in years,” and John argues that Windows security must evolve to detect surprise VM creation.Finally, Santa Clara—Nvidia’s hometown—has data centers sitting empty because the city literally has no power left to give. With AI megaprojects like Project Stargate on the horizon, John and Lou warn that the grid crisis is about to become every CIO’s problem.Show Notes00:00 – IntroNEWS BYTES01:05 – UPS and FedEx Ground Planes After Louisville Crash•A UPS MD-11 crashes, triggering a fleetwide grounding of MD-11 cargo aircraft.•Immediate supply-chain impact for next-day server replacements and enterprise sparing.•John and Lou highlight why IT leaders must monitor “non-IT” news that affects logistics.•A reminder: SLA = logistics, and logistics depends on the real world.https://www.nbcnews.com/news/us-news/ups-grounds-md-11-fleet-type-plane-louisville-crash-sources-say-rcna242711 04:19 – FFmpeg to Google: Fund Us or Stop Sending Bugs•Google’s fuzzing system floods FFmpeg with nonstop bug reports.•Maintainers say the project is overwhelmed and demand Google contribute.•Discussion: the ethical and practical responsibility companies have to support open source.https://thenewstack.io/ffmpeg-to-google-fund-us-or-stop-sending-bugs 07:25 – Hackers Weaponize Windows Hyper-V to Hide Linux VM and Evade EDR Detection•Threat actor Curly Comrades uses Hyper-V to run hidden Alpine Linux VMs.•Malware (CurlyShell & CurlyCat) routes through host NAT, appearing as normal traffic.•Hard to detect: tiny VM footprint, few forensic artifacts, zero EDR visibility.•John: Windows Defender should alert when a new VM spins up—“Did you mean to do this?”https://thehackernews.com/2025/11/hackers-weaponize-windows-hyper-v-to.html  13:08 – Data Centers in Nvidia’s Hometown Stand Empty Awaiting Power•Two new Santa Clara data centers cannot turn on due to a power shortage.•Signals a coming crisis as AI mega-facilities exceed grid capacity.•Power costs and grid constraints may soon drive enterprise IT budgeting changes.https://finance.yahoo.com/news/data-centers-nvidia-hometown-stand-100009877.html  15:56 – Mail Bag & Wrap UpIT SPARC Cast@ITSPARCCast on Xhttps://www.linkedin.com/company/sparc-sales/ on LinkedInJohn Barger@john_Video on Xhttps://www.linkedin.com/in/johnbarger/ on LinkedInLou Schmidt@loudoggeek on Xhttps://www.linkedin.com/in/louis-schmidt-b102446/ on LinkedIn Hosted on Acast. See acast.com/privacy for more information.
In this week’s IT SPARC Cast, John and Lou break down a Cisco security double feature—three critical vulnerabilities impacting Cisco ASA, Cisco Secure Firewall (FTD), and Cisco Identity Services Engine (ISE). These flaws include authentication bypass, chained remote code execution, and a CVSS 10.0 root-level compromise via an undocumented ISE API.We explain how CVE-2025-20333, CVE-2025-20362, and the newly revealed CVE-2025-20337 work, why federal agencies issued emergency patch directives, and what immediate mitigation steps enterprise defenders must take. If you manage Cisco firewalls or identity systems, this episode is mandatory listening.00:00 - Intro01:05 - CVEs of the Week – Cisco ASA & FTD (CVE-2025-20333 & CVE-2025-20362)• Two actively exploited Cisco firewall vulnerabilities enable authentication bypass and chained remote code execution.• Attackers linked to ArcaneDoor/Storm-1849 are using CVE-2025-20362 to bypass authentication, paired with CVE-2025-20333 for full RCE device takeover.• Compromised devices show unexpected reloads, disabled logs, and firmware persistence via ROMMON modification.• Over 50,000 ASA/FTD systems remain exposed, many still unpatched.• Emergency guidance from CISA and NCSC stresses immediate patching, disabling WebVPN/SSL, IP whitelisting, and checking for persistence or odd CLI behavior.• Lou and John emphasize the need for a multi-vendor firewall strategy to avoid single-vendor blast-radius failures.⸻05:00 - Cisco ISE – CVE-2025-20337 (Root-Level RCE via Undocumented API)• Amazon’s threat intelligence team discovered in-the-wild exploitation of an undocumented ISE API endpoint.• This CVSS 10.0 vulnerability allows deserialization attacks leading to unauthenticated root-level access.• Attackers deploy an advanced, stealthy web-shell (“IdentityAuditAction”) featuring:– In-memory execution– Java reflection thread injection– Custom DES-encrypted C2– No disk artifacts• Exploitation activity dates back to at least May and may be earlier.• Mitigation requires updating to patched ISE versions, segmenting management networks, monitoring unexpected listeners, and tightening inbound firewall policies.• John and Lou reiterate that identity remains the “universal attack surface,” and poor segmentation continues to amplify enterprise risk.⸻09:26 - Listener FeedbackA viewer asked whether the F5 BIG-IP source code leak affects only the management plane or the data plane.Answer: Both. Because the entire codebase was leaked, any subsystem could harbor latent zero-day attack surfaces—further stressing the importance of aggressive patching and hardened segmentation.⸻10:28 - Wrap UpWe appreciate every question, comment, and suggestion. Keep them coming.IT SPARC Cast@ITSPARCCast on Xhttps://www.linkedin.com/company/sparc-sales/ on LinkedInJohn Barger@john_Video on Xhttps://www.linkedin.com/in/johnbarger/ on LinkedInLou Schmidt@loudoggeek on Xhttps://www.linkedin.com/in/louis-schmidt-b102446/ on LinkedIn Hosted on Acast. See acast.com/privacy for more information.
In this week’s IT SPARC Cast – News Bytes, John and Lou go galactic—covering AI data centers in orbit, Microsoft’s blunders, and a nasty new Windows backdoor exploiting OpenAI’s API.First, it’s “IT in SPAAAAAACE!” as Google unveils Project Suncatcher, an effort to launch radiation-hardened Tensor Processing Units (TPUs) into orbit for solar-powered, space-based AI compute. Then, SpaceX announces plans to build low-Earth-orbit data centers using its Starlink satellite infrastructure and Tesla’s upcoming AI chips—pushing the data center arms race off-planet.Next up in “Really, Microsoft?” — the latest Windows 11 bug means “Update and Shut Down” doesn’t actually shut down. It just reboots. But the real danger comes from the newly discovered SesameOp backdoor, which uses the OpenAI Assistants API as its command-and-control channel—making it nearly invisible to traditional security tools.Finally, Microsoft ends volume pricing discounts for enterprise customers, sparking frustration across IT departments already battling licensing complexity.Show Notes00:00 - IntroJohn and Lou open with a new segment: “IT in Space!” as data centers literally leave Earth’s surface.01:02 - Google’s Next Moonshot: Project Suncatcher•Google to launch Project Suncatcher—solar-powered AI compute nodes using Tensor Processing Units (TPUs) in orbit.•Partners with Planet Labs for radiation-hardened TPU testing.•Orbiting clusters could provide 8x more energy efficiency than Earth-based systems.•Challenges include cooling, radiation shielding, and debris avoidance.https://9to5google.com/2025/11/04/google-project-suncatcher/03:41 - SpaceX Plans Data Centers in Low-Earth Orbit•SpaceX confirms Starlink v3 satellites will support data center modules.•Tied to Tesla’s AI5 and upcoming AI6 chip platforms.•Starship will be used to deploy orbital compute clusters.•Laser interlinks and orbital energy capture could redefine distributed computing.https://x.com/dimazeniuk/status/1984613494629503484?s=61&t=vt5DZTzMzVaVQd0cNd8iuA06:55 - “Update and Shut Down” No Longer Restarts PC•Microsoft’s November 2025 preview patch fixes a long-standing issue: “Update and Shut Down” reboots instead of powering off.•Optional fix available under Windows 11 build 26200.7019.•Another headache in Windows’ long list of quality-of-life bugs.https://www.windowslatest.com/2025/11/02/update-and-shut-down-no-longer-restarts-pc-as-windows-11-25h2-patch-addresses-a-decades-old-bug/08:10 - SesameOp Backdoor Using OpenAI Assistants API•SesameOp discovered by Microsoft’s DART Team.•Uses OpenAI’s Assistants API as a stealthy command-and-control (C2) channel.•No patch yet—only firewall whitelisting and Defender rules recommended.https://thehackernews.com/2025/11/microsoft-detects-sesameop-backdoor.html13:53 - Microsoft Ends Volume Pricing•As of Nov 1, Microsoft has eliminated tiered volume discounts for Enterprise Agreements.•Large customers will now pay the same flat rate as smaller ones.•Could increase software spend by double digits at renewal.https://www.cio.com/article/4079004/microsoft-ends-volume-pricing-potentially-costing-companies-millions.html15:29 - Mail Bag & Wrap Uphttps://daily.jstor.org/when-the-push-button-was-new-people-were-freaked/IT SPARC Cast@ITSPARCCast on Xhttps://www.linkedin.com/company/sparc-sales/ on LinkedInJohn Barger@john_Video on Xhttps://www.linkedin.com/in/johnbarger/ on LinkedInLou Schmidt@loudoggeek on Xhttps://www.linkedin.com/in/louis-schmidt-b102446/ on LinkedIn Hosted on Acast. See acast.com/privacy for more information.
loading
Comments