Below the Surface (Audio) - The Supply Chain Security Podcast

Navigating Network Edge Vulnerabilities - BTS #69


Listen Later

In this episode of Below the Surface, Paul Asadoorian, Vlad Babkin, and Adrian Sanabria discuss the ongoing vulnerabilities in network edge devices, the implications of legacy systems like Avanti, and the strategies employed by threat actors. They explore the importance of monitoring and detection in cybersecurity, as well as innovative deception techniques to enhance security measures against exploitation. In this conversation, the speakers delve into various aspects of cybersecurity, including innovative strategies to enhance security, the challenges posed by vendor cooperation, the implications of cyber insurance, and the importance of visibility in threat detection. They discuss the use of canary tokens, the exploitation of edge devices, and the reality of zero-day vulnerabilities. The conversation also touches on the need for firmware updates, the shift towards open-source solutions, and the role of AI in developing cybersecurity tools.

Chapters

00:00 Introduction to Below the Surface Podcast

03:27 Network Edge Vulnerabilities and Trends

10:02 Understanding Avanti and Its Impact

12:44 The Consequences of Legacy Systems

18:03 Exploitation Techniques and Threat Actor Strategies

26:50 The Importance of Monitoring and Detection

31:14 Deception Techniques for Enhanced Security

32:55 Leveraging Canary Tokens for Enhanced Security

34:41 The Challenge of Vendor Cooperation in Cybersecurity

35:30 Understanding Cyber Insurance and Its Implications

36:25 The Importance of Visibility in Cyber Defense

39:12 Utilizing Low-Interaction Honeypots for Threat Intelligence

41:48 Exploiting Vulnerabilities in Edge Devices

43:27 The Reality of Zero-Day Vulnerabilities

45:04 Analyzing Recent Exploits in Network Devices

49:02 The Need for Firmware Updates and Alternatives

50:33 Exploring Tailscale and Remote Access Solutions

54:33 Building Secure Lab Environments

56:52 The Shift Towards Open Source in Cybersecurity

01:00:27 Innovations in Memory Forensics

01:03:02 AI's Role in Enhancing Cybersecurity Tools

...more
View all episodesView all episodes
Download on the App Store

Below the Surface (Audio) - The Supply Chain Security PodcastBy Eclypsium

  • 5
  • 5
  • 5
  • 5
  • 5

5

2 ratings


More shows like Below the Surface (Audio) - The Supply Chain Security Podcast

View all
Hacked by Hacked

Hacked

187 Listeners