InfoSec.Watch

130 - When Trusted Tools Turn On You


Listen Later

Send us Fan Mail

We track how trust boundaries fail across the modern stack, from CI/CD supply chain compromise to phishing-driven account takeover and remote assistance abuse. We also break down actively exploited vulnerabilities and a practical tier 0 validation loop that treats patching like incident response, not routine maintenance.
• supply chain compromise risk when trusted CI/CD tooling is abused for credential theft
• behavior-based hunting on build systems, including anomalous execution and network egress
• phishing campaigns against Signal and WhatsApp framed as identity compromise at scale
• Microsoft Teams social engineering path to Quick Assist remote access and intrusion expansion
• vulnerability triage for active exploitation, including Cisco FMC CVE-2026-20131 and rapid weaponization of new disclosures
• mobile exploit kit reporting and why device takeover belongs in tier 0 thinking
• IoT botnet disruption as a prompt to inventory unmanaged devices and validate network visibility
• one-week tier 0 validation loop: verify versions, remove exposure, review logs, rotate secrets
Follow the show on X, Facebook, and LinkedIn, and subscribe at https://infosec.watch.


Support the show

Thanks for listening to InfoSec.Watch!
Subscribe to our newsletter for in-depth analysis: https://infosec.watch
Follow us for daily updates:
- X (Twitter)
- LinkedIn
- Facebook -
Stay secure out there!


...more
View all episodesView all episodes
Download on the App Store

InfoSec.WatchBy Infosec.Watch