{"id":1705,"date":"2026-03-05T01:05:08","date_gmt":"2026-03-05T01:05:08","guid":{"rendered":"https:\/\/blog.ibvl.in\/index.php\/2026\/03\/05\/smashing-security-podcast-457-how-a-cybersecurity-boss-framed-his-own-employee\/"},"modified":"2026-03-05T01:05:08","modified_gmt":"2026-03-05T01:05:08","slug":"smashing-security-podcast-457-how-a-cybersecurity-boss-framed-his-own-employee","status":"publish","type":"post","link":"https:\/\/blog.ibvl.in\/index.php\/2026\/03\/05\/smashing-security-podcast-457-how-a-cybersecurity-boss-framed-his-own-employee\/","title":{"rendered":"Smashing Security podcast #457: How a cybersecurity boss framed his own employee"},"content":{"rendered":"<div>When a top cybersecurity firm discovered it had a leak, you would expect the FBI to be called. Instead, the person put in charge of the investigation was the actual leaker&#8230; who promptly sent an innocent colleague into a career-ending ambush.<\/p>\n<p>In this episode, we unravel the jaw-dropping tale of a defence contractor caught selling zero-day exploits to a Russia-linked broker.<\/p>\n<p>Plus: are nation states quietly poisoning AI models to bend reality itself? We explore how \u201cforeign information manipulation interference\u201d could target not just social media users, but the large language models we increasingly trust for answers \u2014 and what that might mean for truth, trust, and the future of online influence.<\/p>\n<p>All this, and much more, in episode 457 of the &#8220;Smashing Security&#8221; podcast with cybersecurity veteran Graham Cluley, and special guest Carl Miller.<\/p><\/div>\n","protected":false},"excerpt":{"rendered":"<p>When a top cybersecurity firm discovered it had a leak, you would expect the FBI to be called. Instead, the person put in charge of the investigation was the actual leaker&#8230; who promptly sent an innocent colleague into a career-ending ambush. In this episode, we unravel the jaw-dropping tale of a defence contractor caught selling [&hellip;]<\/p>\n","protected":false},"author":1,"featured_media":0,"comment_status":"closed","ping_status":"closed","sticky":false,"template":"","format":"standard","meta":{"site-container-style":"default","site-container-layout":"default","site-sidebar-layout":"default","disable-article-header":"default","disable-site-header":"default","disable-site-footer":"default","disable-content-area-spacing":"default","footnotes":""},"categories":[4,21,90,750,98,14,301,95,112,107,602],"tags":[91],"class_list":["post-1705","post","type-post","status-publish","format-standard","hentry","category-ai","category-artificial-intelligence","category-cybersecurity","category-exploit","category-law-order","category-podcast","category-russia","category-security-threats","category-smashing-security","category-vulnerability","category-zero-day","tag-cybersecurity"],"yoast_head":"<!-- This site is optimized with the Yoast SEO plugin v26.7 - https:\/\/yoast.com\/wordpress\/plugins\/seo\/ -->\n<title>Smashing Security podcast #457: How a cybersecurity boss framed his own employee - Imperative Business Ventures Limited<\/title>\n<meta name=\"robots\" content=\"index, follow, max-snippet:-1, max-image-preview:large, max-video-preview:-1\" \/>\n<link rel=\"canonical\" href=\"https:\/\/blog.ibvl.in\/index.php\/2026\/03\/05\/smashing-security-podcast-457-how-a-cybersecurity-boss-framed-his-own-employee\/\" \/>\n<meta property=\"og:locale\" content=\"en_US\" \/>\n<meta property=\"og:type\" content=\"article\" \/>\n<meta property=\"og:title\" content=\"Smashing Security podcast #457: How a cybersecurity boss framed his own employee - Imperative Business Ventures Limited\" \/>\n<meta property=\"og:description\" content=\"When a top cybersecurity firm discovered it had a leak, you would expect the FBI to be called. Instead, the person put in charge of the investigation was the actual leaker&#8230; who promptly sent an innocent colleague into a career-ending ambush. In this episode, we unravel the jaw-dropping tale of a defence contractor caught selling [&hellip;]\" \/>\n<meta property=\"og:url\" content=\"https:\/\/blog.ibvl.in\/index.php\/2026\/03\/05\/smashing-security-podcast-457-how-a-cybersecurity-boss-framed-his-own-employee\/\" \/>\n<meta property=\"og:site_name\" content=\"Imperative Business Ventures Limited\" \/>\n<meta property=\"article:published_time\" content=\"2026-03-05T01:05:08+00:00\" \/>\n<meta name=\"author\" content=\"admin\" \/>\n<meta name=\"twitter:card\" content=\"summary_large_image\" \/>\n<meta name=\"twitter:label1\" content=\"Written by\" \/>\n\t<meta name=\"twitter:data1\" content=\"admin\" \/>\n\t<meta name=\"twitter:label2\" content=\"Est. reading time\" \/>\n\t<meta name=\"twitter:data2\" content=\"1 minute\" \/>\n<script type=\"application\/ld+json\" class=\"yoast-schema-graph\">{\"@context\":\"https:\/\/schema.org\",\"@graph\":[{\"@type\":\"Article\",\"@id\":\"https:\/\/blog.ibvl.in\/index.php\/2026\/03\/05\/smashing-security-podcast-457-how-a-cybersecurity-boss-framed-his-own-employee\/#article\",\"isPartOf\":{\"@id\":\"https:\/\/blog.ibvl.in\/index.php\/2026\/03\/05\/smashing-security-podcast-457-how-a-cybersecurity-boss-framed-his-own-employee\/\"},\"author\":{\"name\":\"admin\",\"@id\":\"https:\/\/blog.ibvl.in\/#\/schema\/person\/55b87b72a56b1bbe9295fe5ef7a20b02\"},\"headline\":\"Smashing Security podcast #457: How a cybersecurity boss framed his own employee\",\"datePublished\":\"2026-03-05T01:05:08+00:00\",\"mainEntityOfPage\":{\"@id\":\"https:\/\/blog.ibvl.in\/index.php\/2026\/03\/05\/smashing-security-podcast-457-how-a-cybersecurity-boss-framed-his-own-employee\/\"},\"wordCount\":144,\"keywords\":[\"Cybersecurity\"],\"articleSection\":[\"AI\",\"Artificial Intelligence\",\"Cybersecurity\",\"exploit\",\"Law &amp; order\",\"Podcast\",\"Russia\",\"Security threats\",\"Smashing Security\",\"Vulnerability\",\"zero-day\"],\"inLanguage\":\"en-US\"},{\"@type\":\"WebPage\",\"@id\":\"https:\/\/blog.ibvl.in\/index.php\/2026\/03\/05\/smashing-security-podcast-457-how-a-cybersecurity-boss-framed-his-own-employee\/\",\"url\":\"https:\/\/blog.ibvl.in\/index.php\/2026\/03\/05\/smashing-security-podcast-457-how-a-cybersecurity-boss-framed-his-own-employee\/\",\"name\":\"Smashing Security podcast #457: How a cybersecurity boss framed his own employee - Imperative Business Ventures Limited\",\"isPartOf\":{\"@id\":\"https:\/\/blog.ibvl.in\/#website\"},\"datePublished\":\"2026-03-05T01:05:08+00:00\",\"author\":{\"@id\":\"https:\/\/blog.ibvl.in\/#\/schema\/person\/55b87b72a56b1bbe9295fe5ef7a20b02\"},\"breadcrumb\":{\"@id\":\"https:\/\/blog.ibvl.in\/index.php\/2026\/03\/05\/smashing-security-podcast-457-how-a-cybersecurity-boss-framed-his-own-employee\/#breadcrumb\"},\"inLanguage\":\"en-US\",\"potentialAction\":[{\"@type\":\"ReadAction\",\"target\":[\"https:\/\/blog.ibvl.in\/index.php\/2026\/03\/05\/smashing-security-podcast-457-how-a-cybersecurity-boss-framed-his-own-employee\/\"]}]},{\"@type\":\"BreadcrumbList\",\"@id\":\"https:\/\/blog.ibvl.in\/index.php\/2026\/03\/05\/smashing-security-podcast-457-how-a-cybersecurity-boss-framed-his-own-employee\/#breadcrumb\",\"itemListElement\":[{\"@type\":\"ListItem\",\"position\":1,\"name\":\"Home\",\"item\":\"https:\/\/blog.ibvl.in\/\"},{\"@type\":\"ListItem\",\"position\":2,\"name\":\"Smashing Security podcast #457: How a cybersecurity boss framed his own employee\"}]},{\"@type\":\"WebSite\",\"@id\":\"https:\/\/blog.ibvl.in\/#website\",\"url\":\"https:\/\/blog.ibvl.in\/\",\"name\":\"Imperative Business Ventures Limited\",\"description\":\"\",\"potentialAction\":[{\"@type\":\"SearchAction\",\"target\":{\"@type\":\"EntryPoint\",\"urlTemplate\":\"https:\/\/blog.ibvl.in\/?s={search_term_string}\"},\"query-input\":{\"@type\":\"PropertyValueSpecification\",\"valueRequired\":true,\"valueName\":\"search_term_string\"}}],\"inLanguage\":\"en-US\"},{\"@type\":\"Person\",\"@id\":\"https:\/\/blog.ibvl.in\/#\/schema\/person\/55b87b72a56b1bbe9295fe5ef7a20b02\",\"name\":\"admin\",\"image\":{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\/\/blog.ibvl.in\/#\/schema\/person\/image\/\",\"url\":\"https:\/\/secure.gravatar.com\/avatar\/4d20b2cd313e4417a599678e950e6fb7d4dfa178a72f2b769335a08aaa615aa9?s=96&d=mm&r=g\",\"contentUrl\":\"https:\/\/secure.gravatar.com\/avatar\/4d20b2cd313e4417a599678e950e6fb7d4dfa178a72f2b769335a08aaa615aa9?s=96&d=mm&r=g\",\"caption\":\"admin\"},\"sameAs\":[\"https:\/\/blog.ibvl.in\"],\"url\":\"https:\/\/blog.ibvl.in\/index.php\/author\/admin_hcbs9yw6\/\"}]}<\/script>\n<!-- \/ Yoast SEO plugin. -->","yoast_head_json":{"title":"Smashing Security podcast #457: How a cybersecurity boss framed his own employee - Imperative Business Ventures Limited","robots":{"index":"index","follow":"follow","max-snippet":"max-snippet:-1","max-image-preview":"max-image-preview:large","max-video-preview":"max-video-preview:-1"},"canonical":"https:\/\/blog.ibvl.in\/index.php\/2026\/03\/05\/smashing-security-podcast-457-how-a-cybersecurity-boss-framed-his-own-employee\/","og_locale":"en_US","og_type":"article","og_title":"Smashing Security podcast #457: How a cybersecurity boss framed his own employee - Imperative Business Ventures Limited","og_description":"When a top cybersecurity firm discovered it had a leak, you would expect the FBI to be called. Instead, the person put in charge of the investigation was the actual leaker&#8230; who promptly sent an innocent colleague into a career-ending ambush. In this episode, we unravel the jaw-dropping tale of a defence contractor caught selling [&hellip;]","og_url":"https:\/\/blog.ibvl.in\/index.php\/2026\/03\/05\/smashing-security-podcast-457-how-a-cybersecurity-boss-framed-his-own-employee\/","og_site_name":"Imperative Business Ventures Limited","article_published_time":"2026-03-05T01:05:08+00:00","author":"admin","twitter_card":"summary_large_image","twitter_misc":{"Written by":"admin","Est. reading time":"1 minute"},"schema":{"@context":"https:\/\/schema.org","@graph":[{"@type":"Article","@id":"https:\/\/blog.ibvl.in\/index.php\/2026\/03\/05\/smashing-security-podcast-457-how-a-cybersecurity-boss-framed-his-own-employee\/#article","isPartOf":{"@id":"https:\/\/blog.ibvl.in\/index.php\/2026\/03\/05\/smashing-security-podcast-457-how-a-cybersecurity-boss-framed-his-own-employee\/"},"author":{"name":"admin","@id":"https:\/\/blog.ibvl.in\/#\/schema\/person\/55b87b72a56b1bbe9295fe5ef7a20b02"},"headline":"Smashing Security podcast #457: How a cybersecurity boss framed his own employee","datePublished":"2026-03-05T01:05:08+00:00","mainEntityOfPage":{"@id":"https:\/\/blog.ibvl.in\/index.php\/2026\/03\/05\/smashing-security-podcast-457-how-a-cybersecurity-boss-framed-his-own-employee\/"},"wordCount":144,"keywords":["Cybersecurity"],"articleSection":["AI","Artificial Intelligence","Cybersecurity","exploit","Law &amp; order","Podcast","Russia","Security threats","Smashing Security","Vulnerability","zero-day"],"inLanguage":"en-US"},{"@type":"WebPage","@id":"https:\/\/blog.ibvl.in\/index.php\/2026\/03\/05\/smashing-security-podcast-457-how-a-cybersecurity-boss-framed-his-own-employee\/","url":"https:\/\/blog.ibvl.in\/index.php\/2026\/03\/05\/smashing-security-podcast-457-how-a-cybersecurity-boss-framed-his-own-employee\/","name":"Smashing Security podcast #457: How a cybersecurity boss framed his own employee - Imperative Business Ventures Limited","isPartOf":{"@id":"https:\/\/blog.ibvl.in\/#website"},"datePublished":"2026-03-05T01:05:08+00:00","author":{"@id":"https:\/\/blog.ibvl.in\/#\/schema\/person\/55b87b72a56b1bbe9295fe5ef7a20b02"},"breadcrumb":{"@id":"https:\/\/blog.ibvl.in\/index.php\/2026\/03\/05\/smashing-security-podcast-457-how-a-cybersecurity-boss-framed-his-own-employee\/#breadcrumb"},"inLanguage":"en-US","potentialAction":[{"@type":"ReadAction","target":["https:\/\/blog.ibvl.in\/index.php\/2026\/03\/05\/smashing-security-podcast-457-how-a-cybersecurity-boss-framed-his-own-employee\/"]}]},{"@type":"BreadcrumbList","@id":"https:\/\/blog.ibvl.in\/index.php\/2026\/03\/05\/smashing-security-podcast-457-how-a-cybersecurity-boss-framed-his-own-employee\/#breadcrumb","itemListElement":[{"@type":"ListItem","position":1,"name":"Home","item":"https:\/\/blog.ibvl.in\/"},{"@type":"ListItem","position":2,"name":"Smashing Security podcast #457: How a cybersecurity boss framed his own employee"}]},{"@type":"WebSite","@id":"https:\/\/blog.ibvl.in\/#website","url":"https:\/\/blog.ibvl.in\/","name":"Imperative Business Ventures Limited","description":"","potentialAction":[{"@type":"SearchAction","target":{"@type":"EntryPoint","urlTemplate":"https:\/\/blog.ibvl.in\/?s={search_term_string}"},"query-input":{"@type":"PropertyValueSpecification","valueRequired":true,"valueName":"search_term_string"}}],"inLanguage":"en-US"},{"@type":"Person","@id":"https:\/\/blog.ibvl.in\/#\/schema\/person\/55b87b72a56b1bbe9295fe5ef7a20b02","name":"admin","image":{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/blog.ibvl.in\/#\/schema\/person\/image\/","url":"https:\/\/secure.gravatar.com\/avatar\/4d20b2cd313e4417a599678e950e6fb7d4dfa178a72f2b769335a08aaa615aa9?s=96&d=mm&r=g","contentUrl":"https:\/\/secure.gravatar.com\/avatar\/4d20b2cd313e4417a599678e950e6fb7d4dfa178a72f2b769335a08aaa615aa9?s=96&d=mm&r=g","caption":"admin"},"sameAs":["https:\/\/blog.ibvl.in"],"url":"https:\/\/blog.ibvl.in\/index.php\/author\/admin_hcbs9yw6\/"}]}},"_links":{"self":[{"href":"https:\/\/blog.ibvl.in\/index.php\/wp-json\/wp\/v2\/posts\/1705","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/blog.ibvl.in\/index.php\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/blog.ibvl.in\/index.php\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/blog.ibvl.in\/index.php\/wp-json\/wp\/v2\/users\/1"}],"replies":[{"embeddable":true,"href":"https:\/\/blog.ibvl.in\/index.php\/wp-json\/wp\/v2\/comments?post=1705"}],"version-history":[{"count":0,"href":"https:\/\/blog.ibvl.in\/index.php\/wp-json\/wp\/v2\/posts\/1705\/revisions"}],"wp:attachment":[{"href":"https:\/\/blog.ibvl.in\/index.php\/wp-json\/wp\/v2\/media?parent=1705"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/blog.ibvl.in\/index.php\/wp-json\/wp\/v2\/categories?post=1705"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/blog.ibvl.in\/index.php\/wp-json\/wp\/v2\/tags?post=1705"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}