In this episode of The Audit podcast, we unpack the growing risks around software vulnerabilities and cybersecurity—and what you can do to protect yourself in a rapidly changing tech landscape.
Why Software Is Getting Riskier
Software vulnerabilities are increasing at an alarming rate. Why? As software development speeds up and becomes more complex, security flaws often get overlooked.
We discuss a recent example: a malicious toolkit targeting Apple’s macOS and even stolen ChatGPT credentials. These incidents highlight how fast vulnerabilities can grow—and how threat actors are taking advantage.
We also look at the Common Vulnerabilities and Exposures (CVE) system, which tracks these flaws, and how vulnerability trends have evolved since the early 2000s.
The Update Dilemma
Updating your software keeps you safe—but it can also break things. That’s the tough balance developers and users face every day.
We talk about a major breach involving 101,000 stolen ChatGPT account credentials—a reminder of what’s at stake when updates and patches are ignored or delayed.
Data Breaches Are the New Normal
Hackers are targeting cloud databases, running malicious ad campaigns, and exploiting browser weaknesses. These kinds of breaches are becoming more common—and more dangerous.
We dive into the risks of storing data in internet-connected databases and how easily threat actors can exploit everyday tools like web browsers.
The Browser Privacy Problem
Browsers like Chrome and Edge are convenient, but they also collect large amounts of user data for advertising. We discuss how browser design choices—like prioritizing speed and features over security—can leave users exposed.
How to Protect Yourself
Cyber threats are evolving fast, but there are simple ways to stay safer online:
- Keep your browser and software updated
- Use a trusted antivirus or security suite
- Store passwords in a secure manager
- Don’t reuse passwords across sites
- Delete old data you no longer need
The more layers of security you use, the harder it is for attackers to succeed.
Final Takeaway
We’re living in what could be considered the “golden age” of data breaches. But by understanding how vulnerabilities emerge—and taking proactive steps—you can significantly reduce your risk.

