In this week’s InfoSec.Watch Podcast, we break down a series of critical security developments shaping the threat landscape. The episode opens with urgent guidance on two actively exploited, unauthenticated remote-code-execution vulnerabilities—one affecting WatchGuard Firebox appliances and the other impacting HPE OneView across multiple versions. The hosts outline the immediate actions every defender must take, from emergency patching to post-patch hunting and access-control validation.
The Vulnerability Spotlight shifts to escalating attacks on email security gateways, a high-leverage target where compromise grants adversaries deep visibility and control across an organization’s communications. Grant and Sloane detail how attackers are abusing these systems for redirection, injection, and lateral movement—and why defenders must adopt a more aggressive hunt posture on these assets.
In Trend to Watch, they examine a troubling new campaign uncovered by Kaspersky: a WebRAT distributed through GitHub repositories masquerading as Proof-of-Concept exploits. The campaign specifically targets students and early-career researchers, weaponizing curiosity to compromise analyst workstations. The hosts share essential operational security guidance for safely handling PoCs and research tooling.
This week’s Quick Hits include new FBI IC3 warnings about rapport-building scams that shift victims to encrypted messaging apps—along with a reminder to expand phishing simulations to include voice and messaging impersonation scenarios.
The Actionable Defense Move of the Week highlights a powerful preparedness tactic: creating a one-hour response checklist for critical edge devices and administrative interfaces. Grant and Sloane walk through what belongs on that list—from isolation steps and forensic captures to credential rotations and enhanced monitoring—emphasizing that speed, not perfection, wins the first hour of a zero-day event.
They close with a Final Word on attacker strategy: adversaries are increasingly targeting high-leverage choke points such as email gateways, identity pathways, and management services. Real resilience now depends on reducing time-to-mitigate and protecting systems that function as force multipliers for attackers.
Stay ahead of the threats that matter with this week’s briefing, and subscribe at infosec.watch for full coverage and daily updates.
Thanks for listening to InfoSec.Watch! Subscribe to our newsletter for in-depth analysis: https://infosec.watch Follow us for daily updates: - X (Twitter) - LinkedIn - Facebook - Stay secure out there!