TikTok's invasive Privacy Policy - 2026-01-26
🧦 SOC Summit 2026
https://www.antisyphontraining.com/event/soc-summit/
https://www.antisyphontraining.com/event/soc-summit/
Join us LIVE on Mondays, 4:30pm EST.
A weekly Podcast with BHIS and Friends. We discuss notable Infosec, and infosec-adjacent news stories gathered by our community news team.
https://www.youtube.com/@BlackHillsInformationSecurity
Chat with us on Discord! -
https://discord.gg/bhis
đź”´live-chat
In this episode, the hosts break down TikTok’s latest privacy policy and why it’s raising serious red flags. They discuss how the app expands data collection and tracking, what that means for user privacy, and the broader security implications—especially concerns around data access and China. Along the way, the conversation connects these changes to ongoing TikTok ban discussions, real-world risk for individuals and organizations, and what users should consider if they continue using the platform. The episode mixes technical insight with practical takeaways, making the privacy risks easy to understand without losing nuance.
Chapters:
Links:
Story # 1: Fortinet confirms critical FortiCloud auth bypass not fully patched
Story # 2: Hackers exploit critical telnetd auth bypass flaw to get root
Story # 3: Clara Hawking’s Post on TikTok’s Pivacy Policy
Story # 4: Supreme Court to hear Facebook pixel tracking case
Story # 5: Google accused of grooming kids after child receives this email
Story # 6: House of Lords backs legislation to ban social media for children under 16
Story # 6b: Australia has banned social media for kids under 16. How does it work?
Story # 7: Why Software Blocks Won’t Stop Illegally 3D Printed Guns (And What Actually Might)
Story # 8: 1Password adds pop-up warnings for suspected phishing sites
ClawdBot / Moltbot
Troy’s Workshop
ANTI-CAST: Effective AI for Practical SecOps Workflows w/ Hayden Covington
đź”— Register for FREE Infosec Webcasts, Anti-casts & Summits
A weekly Podcast with BHIS and Friends. We discuss notable Infosec, and infosec-adjacent news stories gathered by our community news team.
https://www.youtube.com/@BlackHillsInformationSecurity
Chat with us on Discord! -
https://discord.gg/bhis
đź”´live-chat
In this episode, the hosts break down TikTok’s latest privacy policy and why it’s raising serious red flags. They discuss how the app expands data collection and tracking, what that means for user privacy, and the broader security implications—especially concerns around data access and China. Along the way, the conversation connects these changes to ongoing TikTok ban discussions, real-world risk for individuals and organizations, and what users should consider if they continue using the platform. The episode mixes technical insight with practical takeaways, making the privacy risks easy to understand without losing nuance.
Chapters:
- (00:00) - PreShow Banter™ — Electroshock Therapy
- (02:51) - 2026-01-26
- (07:56) - Story # 1: Fortinet confirms critical FortiCloud auth bypass not fully patched
- (14:50) - Story # 2: Hackers exploit critical telnetd auth bypass flaw to get root
- (18:00) - Story # 3: Clara Hawking’s Post on TikTok's Pivacy Policy
- (24:28) - Story # 4: Supreme Court to hear Facebook pixel tracking case
- (31:25) - Story # 5: Google accused of grooming kids after child receives this email
- (35:01) - Story # 6: House of Lords backs legislation to ban social media for children under 16
- (36:10) - Story # 6b: Australia has banned social media for kids under 16. How does it work?
- (42:43) - Story # 7: Why Software Blocks Won’t Stop Illegally 3D Printed Guns (And What Actually Might)
- (48:52) - Story # 8: 1Password adds pop-up warnings for suspected phishing sites
- (52:32) - ClawdBot / Moltbot
Links:
Story # 1: Fortinet confirms critical FortiCloud auth bypass not fully patched
Story # 2: Hackers exploit critical telnetd auth bypass flaw to get root
Story # 3: Clara Hawking’s Post on TikTok’s Pivacy Policy
Story # 4: Supreme Court to hear Facebook pixel tracking case
Story # 5: Google accused of grooming kids after child receives this email
Story # 6: House of Lords backs legislation to ban social media for children under 16
Story # 6b: Australia has banned social media for kids under 16. How does it work?
Story # 7: Why Software Blocks Won’t Stop Illegally 3D Printed Guns (And What Actually Might)
Story # 8: 1Password adds pop-up warnings for suspected phishing sites
ClawdBot / Moltbot
Troy’s Workshop
ANTI-CAST: Effective AI for Practical SecOps Workflows w/ Hayden Covington
đź”— Register for FREE Infosec Webcasts, Anti-casts & Summits
Brought to you by:
Black Hills Information Security
Antisyphon Training
Active Countermeasures
Wild West Hackin Fest
Episode Video
Creators and Guests
Host
Corey Ham
Corey Ham has been with Black Hills Information Security (BHIS) since 2021 delivering red teaming and OSINT services. Currently, Corey leads the ANTISOC team at BHIS, providing subscription-based continuous red teaming to BHIS clients. Outside of his time at BHIS, you can find him out in the woods or up on a mountain somewhere.
Host
Hayden Covington
Hayden Covington joined Black Hills Information Security (BHIS) in the Summer of 2022 as a SOC Analyst. He chose BHIS after hearing many great things over the years and seeing the quality of work, as well as finding people who have the same passion for the field as he does. His favorite part of the job so far has been the community. Previously, Hayden worked in a SOC for a Naval contractor, where he also served as their SOAR project manager and SME, as well as insider threat lead. When he’s not working, Hayden can be found doing anything athletic (like triathlons!), as well as enjoying video gaming and Formula 1.
Host
Ralph May
Ralph is a U.S. Army veteran and former DoD contractor who supported the United States Special Operations Command (USSOCOM) with information security challenges and threat actor simulations. Over the past decade, he has provided offensive security services at Optiv Security and Black Hills Information Security (BHIS) across various industries. His expertise spans network, physical, and wireless penetration testing, social engineering, and advanced adversarial emulation through red and purple team assessments. Ralph has developed several tools, including Bitor (set to release in January 2025) and Warhorse, which enhance efficiency in penetration testing infrastructure and operations. He has spoken at numerous conferences, including DEF CON, Black Hat, Hack Miami, B-Sides Tampa, and Hack Space Con.
Host
Wade Wells
Wade Wells has been working in cybersecurity for a decade, focusing on detection engineering, threat intelligence, and defensive operations. Wade currently works as a Lead Detection Engineer at 1Password, where he helps build and mature scalable detection programs. Outside of his day-to-day work, Wade is deeply involved in the security community through teaching, mentoring, podcasting, and running local events
Guest
Michael "Shecky" Kavka
Shecky, as he is commonly called, has been in the professional world of IT for nearly 30 years the last 11 as a blue team security engineer. He is focused on detection engineering, threat intel and analysis. Outside of his day to day he is involved in Bsides312, Hak4Kidz and Burbsec (Chicago's cybersecurity meetup conglomerate).
Guest
Rock Lambros
Kyriakos "Rock" Lambros is CEO and founder of RockCyber, where he helps executive teams build AI and cybersecurity programs that reduce real risk and produce measurable business outcomes. Rock has built and led security programs for multi-billion dollar organizations across energy, eCommerce, government, banking, and manufacturing. His experience includes MPLX, eBay, Honeywell, General Dynamics Information Technology, Wells Fargo, and Agilent. He has guided security strategy through M&A transactions and run large security and network operations teams. He co-leads several OWASP GenAI Project initiatives, serves as a core team member of the Agentic Security Initiative, and is a project author for the OWASP AI Exchange. Rock co-authored The CISO Evolution: Business Knowledge for Cybersecurity Executives, a guide for security leaders who need to speak the language of the board. He writes the Weekly Musings in AI Security Wrap Up newsletter and speaks regularly at industry conferences on AI governance, model safety, and enterprise risk. Rock holds an MBA in finance and entrepreneurship from Arizona State University and a B.S. in management information systems from the University of Nevada Las Vegas. He is currently enrolled in the Master of Applied Data Science and Artificial Intelligence program at the University of Denver.
Guest
Troy Wojewoda
Troy Wojewoda is a Security Consultant at Black Hills Information Security (BHIS). Prior to joining BHIS, Troy has held roles in application and system administration, host and network intrusion detection, wireless security, penetration testing, digital forensics, malware analysis, threat hunting, and incident response. In addition to earning several professional certifications, Troy has a BS in Computer Engineering and Computer Science. Troy enjoys writing custom tools and developing novel techniques for testing the security posture of an organization. Away from work, Troy enjoys spending time with his family, camping/hiking in the mountains, homebrewing, woodworking, and coaching children in STEM programs.