On this week’s show Patrick Gray talks through the news with Chris Krebs and Dmitri Alperovitch. They discuss:
- The SEC enforcement action against Solarwinds’ CISO
- The White House AI Executive Order
- CitrixBleed exploitation goes wide
- How Kaspersky captured some (likely) Five Eyes iOS 0day
- Elon Musk’s Gaza Strip adventures
- Much, much more
This week’s show is brought to you by Greynoise. Andrew Morris, Greynoise’s founder and CEO, is this week’s sponsor guest. He talks about how Greynoise is using large language models to help them analyse massive quantities of malicious internet traffic.
Show notes
- comp-pr2023-227.pdf
- Biden signs executive order to oversee and invest in AI tech
- Risky Biz News: CitrixBleed vulnerability goes from bad to disastrous
- Andrew Morris on X: "Confluence bug is popping off. VAST majority of it is blasting thru Tor, similar to the first wave of Log4J exploitation two years ago. If you haven't patched, it's probably popped. https://t.co/4JC0uiTaqc https://t.co/wLDgQpq7r0" / X
- Andrew Morris on X: "Confluence bug is popping off. VAST majority of it is blasting thru Tor, similar to the first wave of Log4J exploitation two years ago. If you haven't patched, it's probably popped. https://t.co/4JC0uiTaqc https://t.co/wLDgQpq7r0" / X
- How Kaspersky obtained all stages of Operation Triangulation | Securelist
- Kaspersky reveals 'elegant' malware resembling NSA code | CyberScoop
- Sophisticated StripedFly Spy Platform Masqueraded for Years as Crypto Miner
- A cascade of compromise: unveiling Lazarus' new campaign | Securelist
- Near-total internet and cellular blackout hits Gaza as Israel ramps up strikes
- Amichai Stein on X: "Israel's Communications Minister @shlomo_karhi in response to Elon Musk: Israel will use all the means at its disposal to fight this. Hamas will use this for terrorist activity. There is no doubt about it. We know it, and Musk knows it. Hamas is ISIS." / X
- Shashank Joshi on X: "Wonder what encryption, if any, they use? Vulnerable to tapping. "Hamas has maintained operational security by going “stone age” and using hard-wired phone lines while eschewing devices that are hackable or emit an electronic signature." https://t.co/ALVSXb55Zn" / X
- Hackers that breached Las Vegas casinos rely on violent threats, research shows | CyberScoop
- Octo Tempest crosses boundaries to facilitate extortion, encryption, and destruction | Microsoft Security Blog
- GitHub - cloudflare/har-sanitizer
- Russia to launch its own version of VirusTotal due to US snooping fears
- iPhones have been exposing your unique MAC despite Apple’s promises otherwise | Ars Technica
- VMware warns of critical vulnerability affecting vCenter Server product
- Judge tosses Khashoggi widow’s lawsuit against NSO Group