Share

cover art for Cisco Secure Email Gateway CVSS 10.0 Zero-Day Via the Spam Filter

IT SPARC Cast

Cisco Secure Email Gateway CVSS 10.0 Zero-Day Via the Spam Filter

Season 2, Ep. 20

This week on IT SPARC Cast – CVE of the Week, John Barger and Lou Schmidt break down CVE-2025-20393, a CVSS 10.0 zero-day vulnerability affecting Cisco Secure Email Gateway (SEG) and related AsyncOS-based email security products.


The flaw is actively exploited in the wild, remains unpatched, and—ironically—uses the spam filtering engine itself as the attack vector. With no user interaction required and evidence of nation-state activity, this vulnerability represents a worst-case scenario for organizations relying on Cisco’s email security stack.


If you run Cisco Secure Email Gateway or Email Security Appliances, this is an emergency-level issue that demands immediate attention.



📌 Show Notes


🚨 CVE of the Week: CVE-2025-20393

Severity: CVSS 10.0 (Critical)

Status: Actively exploited, no patch available

Vendor: Cisco


🎯 Affected Products

Cisco Secure Email Gateway (SEG)

Cisco Email Security Appliance (ESA)

Cisco Secure Email and Web Manager (SEWM)

• All affected systems run Cisco AsyncOS


🔓 How the Exploit Works

• Attackers deliver a specially crafted email that is processed before a spam verdict is reached

• The payload is executed during email parsing, attachment handling, or content inspection

No user interaction required

• The malicious email never needs to reach an inbox


💥 Real-World Impact

• Full remote code execution on the email gateway

Email interception and exfiltration (espionage risk)

• Persistent access for follow-on attacks

• Credential harvesting and downstream phishing using trusted infrastructure

Log wiping, making detection extremely difficult


🌍 Threat Activity

• Exploits observed as early as November 2025

• Linked to Chinese state-aligned actors

• Tracked under UAT-9686, associated with groups such as APT41 and UNC5174

• Added to CISA’s Known Exploited Vulnerabilities (KEV) catalog


🛡️ Mitigation Guidance (No Patch Available)

• Immediately restrict and segment management interfaces

• Tighten ACLs and allow lists

• Treat SEG as Tier-Zero-adjacent infrastructure

• If compromise is suspected: full system rebuild required

• Assume persistence due to log tampering


🧠 Commentary

• The exploit weaponizes the very system designed to stop malicious email

• Lack of a patch from a vendor of Cisco’s size raises serious concerns

• For some organizations, this may prompt reevaluation of email security platforms altogether



🔚 Wrap-Up & Listener Feedback


We want to thank listeners who continue to engage with the show and help shape the conversation:

GFABasic32 wrote:

“Thanks for the emergency update on n8n. I love the balance of technical deep dives and high-level strategy. You guys make keeping up with CVEs actually entertaining.”

Dennis added:

“I love the CVE of the Week. These episodes are like exposure therapy.”


That’s exactly the goal—helping you face what’s happening in security so you can respond, not react.


Have thoughts on this CVE or want us to cover another one? Reach out.



🔗 Social Links


IT SPARC Cast

@ITSPARCCast on X

https://www.linkedin.com/company/sparc-sales/ on LinkedIn


John Barger

@john_Video on X

https://www.linkedin.com/in/johnbarger/ on LinkedIn


Lou Schmidt

@loudoggeek on X

https://www.linkedin.com/in/louis-schmidt-b102446/ on LinkedIn

More episodes

View all episodes

  • 23. Work-From-Office Fallout, Rocket-Powered Data Center Cooling & Microsoft’s New AI Chip

    23:43||Season 2, Ep. 23
    In this episode of IT SPARC Cast – News Bytes, John Barger & Lou Schmidt break down three stories that reveal how enterprise IT is being reshaped by workforce realities, infrastructure constraints, and custom silicon. From mounting evidence that work-from-office mandates are driving top talent out the door, to a Los Angeles startup using SpaceX rocket technology to cool data centers without water, to Microsoft unveiling a massive new AI inference chip designed to scale efficiently.The discussion connects culture, power, cooling, and compute—showing why AI growth isn’t just about models and GPUs, but about solving the physical and human constraints that come with them. If you’re responsible for enterprise IT strategy, infrastructure planning, or talent retention, this episode delivers context you won’t get from headlines alone.⸻⏱️ Show Notes00:00 – IntroJohn and Lou preview a packed episode covering remote-work backlash, radical new data-center cooling approaches, and Microsoft’s latest move to control its AI destiny with custom silicon.⸻📰 News Bytes01:00 – Work-From-Office Mandate? Expect Top Talent Turnover and Culture RotNew research highlighted by CIO Magazine shows that strict return-to-office mandates are driving increased attrition among top performers, longer hiring cycles, and declining trust. John and Lou unpack why “butts-in-seats” metrics fail modern organizations and how poor remote-management skills—not productivity—are often the real problem.https://www.cio.com/article/4119562/work-from-office-mandate-expect-top-talent-turnover-culture-rot.html ⸻08:14 – L.A. Startup Uses SpaceX Tech to Cool Data Centers With Less Power and No WaterAn LA-based startup is applying SpaceX rocket turbopump technology and supercritical CO₂ to dramatically reduce data-center cooling power, footprint, and water usage. The hosts explain why cooling—not chips—is becoming one of the biggest bottlenecks in AI expansion and how innovations like this could unlock sustainable growth.https://finance.yahoo.com/news/l-startup-uses-spacex-tech-175628363.html⸻14:11 – Microsoft Announces a Powerful New Chip for AI InferenceMicrosoft unveils the Maia 200, a custom AI inference accelerator built on TSMC’s 3-nm process with 100 billion transistors. John and Lou break down why inference-optimized chips matter, how this fits into a broader trend of hyperscalers building custom silicon, and why efficiency per watt is becoming the defining metric for AI at scale.https://techcrunch.com/2026/01/26/microsoft-announces-powerful-new-chip-for-ai-inference/⸻🔁 Wrap Up19:49 – Mail BagListener feedback revisits classic operating systems, early AI roots, and why distributed computing concepts from decades ago are suddenly relevant again.22:47 – Wrap UpJohn and Lou close by emphasizing that AI’s future depends on solving power, cooling, and organizational challenges—not just shipping faster chips.⸻🔗 Connect With UsIT SPARC Cast@ITSPARCCast on Xhttps://www.linkedin.com/company/sparc-sales/ on LinkedInJohn Barger@john_Video on Xhttps://www.linkedin.com/in/johnbarger/Lou Schmidt@loudoggeek on Xhttps://www.linkedin.com/in/louis-schmidt-b102446/ on LinkedIn
  • 22. WhatsApp Encryption on Trial & AI Chat App Data Exposure: Enterprise Messaging Risks

    14:11||Season 2, Ep. 22
    In this episode of IT SPARC Cast – CVE of the Week, John Barger and Lou Schmidt break format to examine two high-impact security and privacy stories that every enterprise IT and security leader should be paying attention to.First, we dive into a new lawsuit alleging that Meta can access or infer WhatsApp message contents, despite years of public claims that WhatsApp is fully end-to-end encrypted. We unpack what “access” really means in modern encrypted messaging systems, including metadata, client-side processing, backups, and enterprise risk implications—especially for organizations using WhatsApp for daily business communications.https://www.bloomberg.com/news/articles/2026-01-25/lawsuit-claims-meta-can-see-whatsapp-chats-in-breach-of-privacyNext, we examine a major data exposure involving Chat & Ask AI, a popular AI chatbot aggregator with tens of millions of users. Due to a backend Firebase misconfiguration, hundreds of millions of private conversations—including highly sensitive topics—were left publicly accessible. This incident highlights the growing risk of Shadow AI inside enterprises and the dangers of third-party AI wrappers that lack enterprise-grade security controls.https://www.404media.co/massive-ai-chat-app-leaked-millions-of-users-private-conversations/The episode closes with listener feedback on a previously covered UniFi Access vulnerability and a broader discussion on how organizations should educate, monitor, and protect users without resorting to blunt enforcement.
  • 22. ERP’s Inevitable Reinvention, UniFi Fabric, and Why OpenAI Isn’t the AI Bubble to Fear

    28:32||Season 2, Ep. 22
    In this episode of IT SPARC Cast – News Bytes, John Barger & Lou Schmidt dig into three stories that highlight how enterprise IT is quietly—but fundamentally—restructuring itself. From executives questioning the long-term future of traditional ERP systems, to Ubiquiti introducing a new orchestration-driven take on network fabrics, to a grounded discussion on whether the AI bubble is real and why OpenAI may be far less fragile than critics assume.The conversation connects enterprise software evolution, network architecture at scale, and the hard economic realities of AI infrastructure—especially power and compute. If you’re responsible for enterprise platforms, networking strategy, or long-term IT planning, this episode provides context that goes beyond the headlines.⸻⏱️ Show Notes00:00 – IntroJohn and Lou preview the episode, touching on ERP’s looming transformation, UniFi’s new Fabric approach, and why AI demand—especially at OpenAI—is driven by hard infrastructure realities, not hype.⸻📰 News Bytes00:48 – ERP Isn’t Dead Yet – But Most Execs Are Planning the WakeA survey of more than 4,300 executives shows growing skepticism about ERP’s long-term dominance, even as most organizations remain satisfied with current systems. John and Lou explain why AI-driven, modular, and agentic ERP models are likely evolutions—not rip-and-replace events—and what enterprise IT teams should be doing now to prepare.https://www.theregister.com/2026/01/19/erp_survey_rimini_street/ ⸻06:28 – Ubiquiti Introduces UniFi FabricUbiquiti unveils UniFi Fabric, a centralized orchestration layer designed to manage policies, identity-based networking, Zero Trust, and multi-site environments without cloud licensing. The discussion compares UniFi’s approach to traditional network fabrics like VXLAN and SPBM, highlighting why this controller-first model could appeal to MSPs and mid-sized enterprises.https://blog.ui.com/article/introducing-unifi-fabrics ⸻14:14 – AI Bubble? Maybe. OpenAI Risk? Not Anytime Soon.John breaks down why OpenAI’s revenue growth is directly tied to available compute capacity, not speculative demand. Using concrete megawatt, gigawatt, and ARR figures, the hosts explain why AI may see valuation corrections—but why companies like OpenAI, NVIDIA, and Anthropic are unlikely to disappear.https://openai.com/index/a-business-that-scales-with-the-value-of-intelligence/ ⸻🔁 Wrap Up24:16 – Mail BagListener feedback reinforces the growing link between AI growth and power infrastructure, with discussion around electrical safety, regulation, and why energy expertise may be one of the most valuable skills in the coming decade.27:39 – Wrap UpJohn and Lou close with a reminder that enterprise IT leaders will increasingly be asked to validate power, nuclear, and infrastructure decisions at the executive level—and that staying informed now is critical.⸻🔗 Connect With UsIT SPARC Cast@ITSPARCCast on Xhttps://www.linkedin.com/company/sparc-sales/ on LinkedInJohn Barger@john_Video on Xhttps://www.linkedin.com/in/johnbarger/Lou Schmidt@loudoggeek on Xhttps://www.linkedin.com/in/louis-schmidt-b102446/ on LinkedIn
  • 21. VoidLink: The AI-Built Linux Malware Framework That Could Change Cyber Attacks Forever

    09:39||Season 2, Ep. 21
    In this episode of IT SPARC Cast – CVE of the Week, John Barger and Lou Schmidt break from the traditional single-CVE format to examine VoidLink, a newly discovered Linux malware framework that represents a major shift in how cyberattacks may be built and executed going forward.Rather than focusing on one vulnerability, VoidLink is designed to chain together many smaller flaws across Linux, containers, and cloud platforms like AWS, Azure, GCP, Docker, and Kubernetes—creating a stealthy, long-term access platform. Researchers believe VoidLink was developed rapidly using AI assistants, offering a rare look at how next-generation malware may be authored, iterated, and deployed. This episode explains why VoidLink matters, how defenders should think about chained exploits, and why this may be an early warning sign for the future of cloud and container security.⸻Show Notes (Podcast)Episode OverviewThis week’s CVE of the Week focuses on VoidLink, a newly identified Linux malware framework designed for persistence, stealth, and modular exploitation across cloud and container environments. While not a single CVE, VoidLink highlights how attackers are moving toward framework-driven, AI-assisted exploit chaining rather than isolated vulnerabilities.Key Topics Covered • What VoidLink is and why it’s different from traditional malware • How chaining low-severity vulnerabilities can result in full compromise • Targeted environments: Linux, Docker, Kubernetes, AWS, Azure, and GCP • Use of loaders, implants, evasion techniques, and modular plugins • Evidence suggesting AI-assisted development with rapid iteration • Why this gives defenders a rare opportunity to observe a threat early in its lifecycle • The implications for cloud security, container hardening, and future CVEsWhy This MattersVoidLink represents a shift from one-off exploits to malware platforms—essentially an “IDE for hacking.” Understanding how these frameworks are built and how they operate is critical for anticipating future attacks and improving detection strategies before they become widespread.⸻Listener Feedback HighlightWe’d like to give a shout-out to Nihal for his thoughtful LinkedIn comment on our earlier Top 10 Operating System Failures episode—specifically his hot take defending Windows ME and critiquing Windows XP’s compatibility break. We love informed debate like this and appreciate listeners who challenge conventional wisdom.⸻Wrap-Up & Social LinksThat wraps up this episode of IT SPARC Cast – CVE of the Week. We couldn’t do this without listeners like you.Did we miss something? Do you have a topic you want us to cover?Send feedback to feedback@itsparccast.com or reach out on social.IT SPARC Cast@ITSPARCCast on Xhttps://www.linkedin.com/company/sparc-sales/ on LinkedInJohn Barger@john_Video on Xhttps://www.linkedin.com/in/johnbarger/ on LinkedInLou Schmidt@loudoggeek on Xhttps://www.linkedin.com/in/louis-schmidt-b102446/ on LinkedIn
  • 21. Apple Taps Google for AI, Copilot Pushback, AI Commerce & Nuclear Power for Data Centers

    19:47||Season 2, Ep. 21
    In this episode of IT SPARC Cast – News Bytes, John Barger & Lou Schmidt break down a week of moves that signal where enterprise AI, cloud platforms, and data center infrastructure are really headed. From Apple officially leaning on Google to power its AI ambitions, to Microsoft giving IT admins the ability to remove Copilot, this episode highlights growing tension between vendor momentum and enterprise control.They also explore Google’s push to standardize AI-driven commerce through agent protocols and why Meta locking down more than 6 GW of nuclear power may be the clearest sign yet that energy—not silicon—is becoming the limiting factor for AI at scale. If you’re tracking AI strategy, platform lock-in, and the future of data centers, this episode connects the dots.📌 Show Notes00:00 – IntroThis week on IT SPARC Cast, John Barger and Lou Schmidt break down a week dominated by AI power shifts, enterprise pushback, and the growing reality that energy—not compute—may be the biggest constraint on AI’s future.📰 News Bytes00:52 – It’s Official: Apple Going with Google for AIApple confirms it will rely on Google’s Gemini models to power the next generation of Siri and Apple Intelligence. John and Lou discuss what this says about Apple’s AI strategy, the risks of deep vendor lock-in, and whether Apple can realistically switch models later without breaking workflows.https://techcrunch.com/2026/01/12/googles-gemini-to-power-apples-ai-features-like-siri/05:44 – Microsoft to Allow IT Admins to Uninstall CopilotMicrosoft is testing new Windows policies that allow enterprise IT teams to remove the consumer Copilot app from managed devices. The conversation explores enterprise data governance, Intune controls, and why this signals a broader shift toward AI choice rather than forced adoption.https://www.bleepingcomputer.com/news/microsoft/microsoft-may-soon-allow-it-admins-to-uninstall-copilot-on-managed-devices/09:46 – Google Announces a New Protocol for AI-Driven CommerceGoogle introduces the Universal Commerce Protocol (UCP), an open standard designed to let AI agents handle shopping, payments, and transactions across retailers. With backing from major brands and payment networks, John and Lou unpack why agent-driven commerce may become one of AI’s first truly mainstream use cases.https://techcrunch.com/2026/01/11/google-announces-a-new-protocol-to-facilitate-commerce-using-ai-agents/12:47 – Meta Signs Nuclear Power Deals for AI Data CentersMeta secures long-term nuclear power contracts totaling more than 6 GW to fuel its AI infrastructure. The discussion focuses on why power—not chips—is becoming the true bottleneck for AI expansion and why nuclear energy is rapidly moving from “controversial” to “necessary.”https://techcrunch.com/2026/01/09/meta-signs-deals-with-three-nuclear-companies-for-6-plus-gw-of-power/🔚 Wrap Up16:49 – Mail BagListener feedback revisits cross-platform AI agents, Apple’s closed ecosystem, and whether enterprises can afford to exclude Mac users as agentic AI becomes more central to daily workflows.18:53 – Wrap UpJohn and Lou close the episode by reinforcing a key theme: AI’s future will be defined as much by energy, policy, and interoperability as by model performance.
  • 20. CES Brings New CPUs, AI Agents, and Deep OS-Level Copilot Integration

    23:27||Season 2, Ep. 20
    CES may be a consumer show, but this week it sent shockwaves through enterprise IT. In this episode of IT SPARC Cast – News Bytes, John Barger and Lou Schmidt break down why nearly every major chip vendor chose CES to unveil next-generation CPUs, what Lenovo’s new agentic AI strategy means for IT teams, and why Microsoft embedding Copilot deep into Windows could fundamentally change how operating systems work.From Intel’s attempt at a comeback, to AMD and Qualcomm’s positioning against NVIDIA, to growing concerns about trust, security, and AI agents living inside your OS, this episode separates meaningful signals from CES noise—and explains why power efficiency, autonomy, and control are becoming the real battlegrounds.⸻⏱️ Show Notes00:00 – IntroJohn and Lou frame CES as the unexpected epicenter of enterprise IT announcements, explaining why CPUs, AI, and robotics dominated the show—and why IT teams should care.⸻📰 News Bytes00:54 – New CPUs AnnouncedCES saw major CPU launches from Intel, AMD, Qualcomm, and NVIDIA—signaling a shift toward mainstream AI hardware announcements. Intel launched Panther Lake, AMD expanded Ryzen AI, Qualcomm pushed Snapdragon X2 for AI agents, and NVIDIA moved Rubin into full production.⸻09:45 – Lenovo’s New AI AgentLenovo unveiled Qira, an agentic AI designed to work across PCs, phones, wearables, and enterprise systems alongside Microsoft Copilot. The move highlights a growing push toward cross-device AI coordination—and raises questions about Apple’s closed ecosystem.⸻12:40 – Microsoft Integrates Copilot Deep into WindowsMicrosoft is embedding AI agent launchers directly into Windows, allowing third-party applications to register system-wide AI agents. While this may keep operating systems relevant, it introduces serious trust and security concerns around deep OS-level access.https://blogs.windows.com/windows-insider/2025/12/19/announcing-windows-11-insider-preview-build-26220-7522-dev-beta-channels/⸻🔁 Wrap Up19:03 – Mail BagListener feedback sparks a discussion on cloud outages, cost structures, and whether on-prem alternatives are becoming viable again for certain businesses.22:15 – Wrap UpJohn and Lou emphasize that resilience in the cloud is still possible—but only if organizations are willing to pay for it—and invite listeners to share what CES announcements stood out to them.IT SPARC Cast@ITSPARCCast on Xhttps://www.linkedin.com/company/sparc-sales/ on LinkedInJohn Barger@john_Video on Xhttps://www.linkedin.com/in/johnbarger/Lou Schmidt@loudoggeek on Xhttps://www.linkedin.com/in/louis-schmidt-b102446/
  • 19. Ni8mare in n8n: CVSS 10 Workflow RCE Hitting Automation Platforms

    08:18||Season 2, Ep. 19
    In the first regular IT SPARC Cast - CVE of the Week episode of 2026, John & Lou dive into a critical, actively exploitable vulnerability shaking the automation world. CVE-2026-21858—dubbed Ni8mare—targets the popular workflow automation platform n8n, earning a full CVSS 10.0 due to unauthenticated remote code execution.They break down how a content-type confusion bug inside n8n’s webhook processing engine allows attackers to fully compromise systems, why automation platforms are uniquely dangerous when breached, and what this means for enterprises running self-hosted or lightly governed internal tooling. The episode also highlights listener feedback and calls out a community-built React security tool worth checking out.⸻Show NotesCVE of the Week: n8n “Ni8mare” (CVE-2026-21858) • What is n8n?An open-source, self-hosted workflow automation platform similar to Zapier or Make, widely used in enterprise and regulated environments for visual API-driven automation. • Severity & ScopeCVE-2026-21858 carries a CVSS 10.0, joining multiple recent n8n vulnerabilities rated 9.9–10.0. n8n has over 200,000 deployments across cloud and on-prem environments. • Technical Root CauseA content-type confusion flaw in webhook form-data handling allows attackers to bypass file validation and execute arbitrary code. • Why This Is DangerousWorkflow engines often touch identity systems, APIs, credentials, and business logic—making them high-value targets with blast radii far beyond a single server. • Enterprise TakeawayShadow IT, internally built automation, and lightly governed enablement tools must be continuously audited. Patch known systems—and actively hunt for unknown ones.https://thehackernews.com/2026/01/critical-n8n-vulnerability-cvss-100.htmlListener HighlightDennis called out the Ingram Micro ransomware outage, noting that he hadn’t realized just how disruptive that incident was. And he’s absolutely right—Ingram Micro going offline for roughly 9–10 days created a nightmare scenario for VARs, system integrators, and build shops that rely on Ingram for ordering, RMAs, and emergency drop-ship replacements.To put the scale in perspective, Ingram Micro processes an estimated $30–40 million per day in transactions. Even if some revenue was recovered later, the operational disruption, reputational damage, and downstream impact across the supply chain were massive. This is exactly why incidents like this belong in the conversation when we talk about real-world IT security failures.Thanks for the thoughtful comment, Dennis—we genuinely appreciate the feedback and the conversation it sparked.Wrap Up & Community EngagementThis episode reinforces a core theme: automation without security oversight becomes an enterprise liability. IT teams must partner with business units—not just say “no”—while enforcing continuous audits and rapid patching.Follow & ConnectIT SPARC Cast@ITSPARCCast on Xhttps://www.linkedin.com/company/sparc-sales/John Barger@john_Video on Xhttps://www.linkedin.com/in/johnbarger/Lou Schmidt@loudoggeek on Xhttps://www.linkedin.com/in/louis-schmidt-b102446/
  • 19. 2026 Predictions: AI Reality Check, Quantum Breakthroughs, and the Next Cloud Reckoning

    13:18||Season 2, Ep. 19
    In this special predictions episode of IT SPARC Cast – News Bytes, John Barger and Lou Schmidt kick off 2026 by trading bold, unfiltered forecasts for enterprise IT, AI, cloud, energy, and geopolitics. With five predictions each—and no prior coordination—they round-robin through what they believe will define the next year in technology.From the deflation of the AI hype cycle and Apple’s inevitable AI acquisition, to quantum computing entering nation-state playbooks, nuclear power reshaping data centers, and lawsuits finally challenging cloud provider accountability, this episode puts both hosts on the record. At the end of the year, they’ll revisit every prediction and grade themselves—so these takes are meant to age in public.⸻⏱️ Show Notes00:00 – IntroJohn and Lou explain the format: ten total predictions for 2026, five each, shared live without coordination—and revisited at the end of the year for accountability.⸻🔮 2026 Predictions01:09 – Lou: The AI Bubble DeflatesAI investment cools as rationalization sets in—money keeps flowing, but weaker players and inflated expectations begin to fall away instead of a full collapse.01:29 – John: Apple Acquires an AI / LLM CompanyApple makes a major AI acquisition to avoid long-term dependence on competitors’ models and regain control over its AI strategy.02:53 – Lou: AI Starts to Get Really UsefulAI shifts from hype to practical value, quietly improving everyday workflows and real-world systems rather than flashy demos.04:11 – John: Nation States Use Quantum ComputingEvidence emerges that a nation-state is actively using quantum computing for espionage or cyber operations, even if never formally acknowledged.04:45 – Lou: AI Sneaks Into Places We Never ExpectedAI embeds itself into overlooked products and environments—especially AR, wearables, and location-aware systems—delivering small but meaningful gains.05:50 – John: Negative Reaction to OpenAI HardwareOpenAI’s hardware announcement is initially panned by the press and competitors, only to be vindicated later as its purpose becomes clear.  06:51 – Lou: Power Gets Real for Data CentersEnergy—not chips—becomes the primary constraint for cloud and enterprise infrastructure, forcing new generation strategies into production.08:00 – John: Small Modular Nuclear Reactors Explode (In a Good Way)SMRs rapidly gain funding, deployments, and valuations as they become the only scalable answer to data center power demand.08:36 – Lou: The Privacy Environment Gets WeirdGeopolitics, AI agents, and shifting borders create inconsistent and unpredictable privacy regimes across regions.10:11 – John: Lawsuits Over Cloud OutagesMajor lawsuits—possibly class actions—emerge after cloud outages cause real-world harm, forcing legal accountability for uptime failures.⸻🔁 Wrap Up11:58 – Wrap UpJohn and Lou invite listeners to submit their own 2026 predictions and commit to revisiting all forecasts at year’s end to see who was right.IT SPARC Cast@ITSPARCCast on Xhttps://www.linkedin.com/company/sparc-sales/ on LinkedInJohn Barger@john_Video on Xhttps://www.linkedin.com/in/johnbarger/Lou Schmidt@loudoggeek on Xhttps://www.linkedin.com/in/louis-schmidt-b102446/