US Cyberattacks on Venezuela - 2026-01-05
Join us LIVE on Mondays, 4:30pm EST.
A weekly Podcast with BHIS and Friends. We discuss notable Infosec, and infosec-adjacent news stories gathered by our community news team.
https://www.youtube.com/@BlackHillsInformationSecurity
Chat with us on Discord! -
https://discord.gg/bhis
đź”´live-chat
đź”— Register for FREE webcasts, summits, and workshops -
https://poweredbybhis.com
A weekly Podcast with BHIS and Friends. We discuss notable Infosec, and infosec-adjacent news stories gathered by our community news team.
https://www.youtube.com/@BlackHillsInformationSecurity
Chat with us on Discord! -
https://discord.gg/bhis
đź”´live-chat
đź”— Register for FREE webcasts, summits, and workshops -
https://poweredbybhis.com
In this episode, we break down the growing debate around U.S. cyber operations against Venezuela—and what it means for modern cyber warfare, critical infrastructure security, and geopolitics. The conversation explores how nation-state attacks can target a country’s power grid, the challenges of attributing cyberattacks, and why industrial control systems (ICS/SCADA) remain a high-impact battleground. We also discuss the strategic value (and risks) of disrupting energy infrastructure, how these campaigns compare to other real-world incidents, and what defenders can learn to better protect utilities and national systems.
Chapters
- (00:00) - PreShow Banter™ — Undisclosed Closets
- (09:07) - US Cyberattacks on Venezuela - 2026-01-05
- (10:16) - Story # 1:Trump suggests US used cyberattacks to turn off lights in Venezuela during strikes
- (11:14) - Story # 1b: There Were BGP Anomalies During The Venezuela Blackout
- (21:06) - Story # 1c: Pizza index of war: Late-night traffic near Pentagon surges again as US strikes Venezuela
- (32:40) - Story # 2: Finland seizes ship suspected of damaging subsea cable in Baltic Sea
- (35:11) - Story # 3: US cybersecurity experts plead guilty to BlackCat ransomware attacks
- (35:46) - Story # 4: MongoDB Vulnerability CVE-2025-14847 Under Active Exploitation Worldwide
- (39:06) - Story # 5: Hackers claim to hack Resecurity, firm says it was a honeypot
- (42:06) - Story # 6: NordVPN denies breach claims, says attackers have "dummy data"
- (42:35) - Story # 7: Hackers say they have stolen 40 million Condé Nast Records - here's how to stay safe
- (43:43) - Story # 8: Hacker Dressed As Pink Power Ranger Dismantles Racist Websites Live on Stage
- (47:13) - Story # 9: NYC mayoral inauguration bans Flipper Zero, Raspberry Pi devices
- (52:18) - Story # 10: Manufacturer issues remote kill command to disable smart vacuum after engineer blocks it from collecting data — user revives it with custom hardware and Python scripts to run offline
- (55:15) - Story # 11: Ben Jordan Exposes Severe Security Vulnerabilities in Flock Surveillance Cameras
- (57:26) - Story # 11b: We Tracked Ourselves with Exposed Flock Cameras
Links
Story # 1:Trump suggests US used cyberattacks to turn off lights in Venezuela during strikes
Story # 1b: There Were BGP Anomalies During The Venezuela Blackout
Story # 1c: Pizza index of war: Late-night traffic near Pentagon surges again as US strikes Venezuela
Story # 2: Finland seizes ship suspected of damaging subsea cable in Baltic Sea
Story # 3: US cybersecurity experts plead guilty to BlackCat ransomware attacks
Story # 4: MongoDB Vulnerability CVE-2025-14847 Under Active Exploitation Worldwide
Story # 5: Hackers claim to hack Resecurity, firm says it was a honeypot
Story # 6: NordVPN denies breach claims, says attackers have “dummy data”
Story # 7: Hackers say they have stolen 40 million Condé Nast Records - here’s how to stay safe
Story # 8: Hacker Dressed As Pink Power Ranger Dismantles Racist Websites Live on Stage
Story # 9: NYC mayoral inauguration bans Flipper Zero, Raspberry Pi devices
Story # 10: Manufacturer issues remote kill command to disable smart vacuum after engineer blocks it from collecting data — user revives it with custom hardware and Python scripts to run offline
Story # 11: Ben Jordan Exposes Severe Security Vulnerabilities in Flock Surveillance Cameras
Story # 11b: We Tracked Ourselves with Exposed Flock Cameras
Story # 1b: There Were BGP Anomalies During The Venezuela Blackout
Story # 1c: Pizza index of war: Late-night traffic near Pentagon surges again as US strikes Venezuela
Story # 2: Finland seizes ship suspected of damaging subsea cable in Baltic Sea
Story # 3: US cybersecurity experts plead guilty to BlackCat ransomware attacks
Story # 4: MongoDB Vulnerability CVE-2025-14847 Under Active Exploitation Worldwide
Story # 5: Hackers claim to hack Resecurity, firm says it was a honeypot
Story # 6: NordVPN denies breach claims, says attackers have “dummy data”
Story # 7: Hackers say they have stolen 40 million Condé Nast Records - here’s how to stay safe
Story # 8: Hacker Dressed As Pink Power Ranger Dismantles Racist Websites Live on Stage
Story # 9: NYC mayoral inauguration bans Flipper Zero, Raspberry Pi devices
Story # 10: Manufacturer issues remote kill command to disable smart vacuum after engineer blocks it from collecting data — user revives it with custom hardware and Python scripts to run offline
Story # 11: Ben Jordan Exposes Severe Security Vulnerabilities in Flock Surveillance Cameras
Story # 11b: We Tracked Ourselves with Exposed Flock Cameras
Brought to you by:
Black Hills Information Security
Antisyphon Training
Active Countermeasures
Wild West Hackin Fest
Episode Video
Creators and Guests
Host
Bronwen Aker
Bronwen Aker is a BHIS Technical Editor who joined full-time in 2022 after years of contract work, bringing decades of web development and technical training experience to her roles in editing pentest reports, enhancing QA/QC processes, and improving public websites, and who enjoys sci-fi/fantasy, Animal Crossing, and dogs outside of work.
Host
Corey Ham
Corey Ham has been with Black Hills Information Security (BHIS) since 2021 delivering red teaming and OSINT services. Currently, Corey leads the ANTISOC team at BHIS, providing subscription-based continuous red teaming to BHIS clients. Outside of his time at BHIS, you can find him out in the woods or up on a mountain somewhere.
Host
John Strand
John Strand has both consulted and taught hundreds of organizations in the areas of security, regulatory compliance, and penetration testing. He is a coveted speaker and much loved SANS teacher. John is a contributor to the industry-shaping Penetration Testing Execution Standard and 20 Critical Controls frameworks.
Host
Ralph May
Ralph is a U.S. Army veteran and former DoD contractor who supported the United States Special Operations Command (USSOCOM) with information security challenges and threat actor simulations. Over the past decade, he has provided offensive security services at Optiv Security and Black Hills Information Security (BHIS) across various industries. His expertise spans network, physical, and wireless penetration testing, social engineering, and advanced adversarial emulation through red and purple team assessments. Ralph has developed several tools, including Bitor (set to release in January 2025) and Warhorse, which enhance efficiency in penetration testing infrastructure and operations. He has spoken at numerous conferences, including DEF CON, Black Hat, Hack Miami, B-Sides Tampa, and Hack Space Con.
Host
Wade Wells
Wade Wells has been working in cybersecurity for a decade, focusing on detection engineering, threat intelligence, and defensive operations. Wade currently works as a Lead Detection Engineer at 1Password, where he helps build and mature scalable detection programs. Outside of his day-to-day work, Wade is deeply involved in the security community through teaching, mentoring, podcasting, and running local events
Guest
Kent Ickler
Kent Ickler has been a Security Consultant and Systems Administrator for Black Hills Information Security (BHIS) since 2017. He has a Bachelor’s degree in Information Technology Management and a Master’s in Business Management. Kent’s education and management background allow him to be realistic and practical when aiding customers with evaluating risk on their networks. Kent enjoys being a part of the BHIS team because he gets to make a difference in not only the customers’ cybersecurity but also in the Information Security industry as a whole by contributing to the available resources; he has developed frameworks and open-source tools along with building and administering CTFs. When he is away from work, Kent enjoys woodworking and medieval architecture.
Guest
MaryEllen
MaryEllen Kennel has held numerous roles in CyberSecurity, and is currently ranked top 1% in MetaCTF. MaryEllen has spoken at several conferences, including Magnet Forensics, KringleCon, and most recently, Wild West Hackin’ Fest in Deadwood, SD. MaryEllen grew up Mennonite, and treasures spending time with family.
Producer
Ryan Poirier
Ryan Poirier began his time at Black Hills Information Security (BHIS) as the Video Producer and Editor in August 2020. Ryan polishes and perfects every webcast, podcast, and workshop on the BHIS, ACM, and WWHF YouTube Channels. Prior to Ryan’s time at BHIS, he worked for one of the largest public schools in the United States, conducting their video production and live broadcasting. He joined the BHIS team because he felt like it would be a great group of people to work with, and he couldn’t pass up the perfect next step in his career. Outside of his time with BHIS, Ryan does freelance photography, attends Cars & Coffee events, and expands his knowledge of audio and videos.